Embedded Systems. 8. Communication

Similar documents
Real-Time Communications. LS 12, TU Dortmund

UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore.

CS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth

Local Area Networks NETW 901

Bluetooth: Short-range Wireless Communication

ENRNG3076 : Oral presentation BEng Computer and Communications Engineering

CS263: Wireless Communications and Sensor Networks

Amarjeet Singh. February 7, 2012

Introduction to Wireless Networking ECE 401WN Spring 2009

Bluetooth. Basic idea

Introduction to Bluetooth Wireless Technology

e-pg Pathshala Quadrant 1 e-text

Inside Bluetooth. Host. Bluetooth. Module. Application RFCOMM SDP. Transport Interface. Transport Bus. Host Controller Interface

Computer Networks II Advanced Features (T )

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Bluetooth Demystified

12/2/09. Mobile and Ubiquitous Computing. Bluetooth Networking" George Roussos! Bluetooth Overview"

Bluetooth. The Bluetooth Vision. Universal Wireless Connectivity. Universal Wireless Connectivity

By FaaDoOEngineers.com

Wireless Sensor Networks

Lecture Computer Networks

Wireless Communications

Guide to Wireless Communications, 3 rd Edition. Objectives

Ad Hoc Nets - MAC layer. Part II TDMA and Polling

[A SHORT REPORT ON BLUETOOTH TECHNOLOGY]

Special Course in Computer Science: Local Networks. Lecture

MOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Communication Systems. WPAN: Bluetooth. Page 1

Wireless Personal Area Networks

Lecture Objectives. Lecture and Bluetooth technology. Agenda. IEEE b. Characteristics. Center Frequencies

Bluetooth. Bluetooth Basics Bluetooth and Linux Bluetooth at AG Tech. Dr.-Ing. H. Ritter, 7.1

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

CHAPTER 12 BLUETOOTH AND IEEE

Implementing A Bluetooth Stack on UEFI

Ah-Hoc, PAN, WSN,... Introduction Bluetooth ( ) Zigbee ( ) Renato Lo Cigno

Solving the Interference Problem due to Wireless LAN for Bluetooth Transmission Using a Non- Collaborative Mechanism. Yun-Ming, Chiu 2005/6/09

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Bluetooth. Bluetooth Radio

Wireless Local Area Network. Internet Protocol Suite

Data Link Layer Technologies

MULTIPLE ACCESS PROTOCOLS 2. 1

Simulation of Bluetooth Network

ECE 4450:427/527 - Computer Networks Spring 2017

Inside Bluetooth Low Energy

System Level Analysis of the Bluetooth standard

Objectives of the Bluetooth Technology

Data Link Layer: Collisions

The Link Layer and LANs. Chapter 6: Link layer and LANs

Sensor Application for Museum Guidance

Structure of the Lecture

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

WPAN-like Systems. UWB Ultra Wide Band. IrDA Infrared Data Association. Bluetooth. Z-Wave. WPAN Wireless Personal Area Network

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Redes de Computadores. Medium Access Control

Systems. Roland Kammerer. 10. November Institute of Computer Engineering Vienna University of Technology. Communication Protocols for Embedded

MOBILE COMPUTING. Bluetooth 9/20/15. CSE 40814/60814 Fall Basic idea

Efficient Multicast Schemes for Mobile Multiparty Gaming Applications

Bluetooth. Renato Lo Cigno

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer

Master. Slave. Master. Slaves. TCP/IP Traffic with Efficient Bluetooth Technology. Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3

Redes Inalámbricas Tema 2.B Wireless PANs: Bluetooth

Content. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control

WIRELESS TECHNOLOGIES

Multiple Access Links and Protocols

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Lecture 2. Basics of networking in automotive systems: Network. topologies, communication principles and standardised protocols

Multiple Access Protocols

By N.Golmie Presented by: Sushanth Divvela

Medium Access Control Sublayer Chapter 4

MI-BPS (Wireless Networks) FIT - CTU

Data Link Layer -2- Network Access

Link Layer and Ethernet

Overview of Bluetooth

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Link Layer and Ethernet

CS 455/555 Intro to Networks and Communications. Link Layer

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Introducing Bluetooth

Bluetooth. Quote of the Day. "I don't have to be careful, I've got a gun. -Homer Simpson. Stephen Carter March 19, 2002

Data Link Layer -2- Network Access

FlexRay International Workshop. Protocol Overview

Chapter 5 Link Layer and LANs

Wireless Protocols Overview

Wireless Local Area Networks. Networks: Wireless LANs 1

Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application. Ling Wang

Dominique Chomienne & Michel Eftimakis NewLogic

Local Area Networks NETW 901

Product Specification

Lecture 8 Link Layer: functionality, error detection, media access algorithm

Bluetooth Tutorial. Bluetooth Introduction. Bluetooth Technology

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Wireless Networked Systems

Transcription:

Embedded Systems 8. Communication Lothar Thiele 8-1

Contents of Course 1. Embedded Systems Introduction 2. Software Introduction 7. System Components 10. Models 3. Real-Time Models 4. Periodic/Aperiodic Tasks 5. Resource Sharing 8. Communication 9. Low Power Design 11. Architecture Synthesis 6. Real-Time OS Software and Programming 12. Model Based Design Processing and Communication 8-2 Hardware

Communication is everywhere 8-3

Where are sensor nodes used? Logistics Maintenance Factory Automation Low resolution Sensor, Test4, Increasing frequency 1 0.5 Acceleration (g) 0-0.5-1 0 2 4 6 8 10 12 14 16 18 Time (sec) Natural Hazards Building Automation Health Care 8-4

Kalray MPPA 256 NoC: Network on Chip 8-5

Communication: Requirements Performance bandwidth and latency guaranteed behavior (real-time) Efficiency cost (material, installation, maintenance) low power Robustness fault tolerance maintainability, diagnose-ability security, safety 8-6

Protocol Classification arbitration time multiplex frequency multiplex synchronous asynchronous controlled access competing access covered in lecture TDMA CSMA/CR/CA Token Bus/Ring FlexRay CSMA/CD Random Bluetooth 8-7

Random Access Random access to communication medium no access control; requires low medium utilization access conflict improved variant: slotted random access 8-8

Random Access Random access to communication medium What is the optimal sending rate p in case of n stations? probability that a slot is not taken by others: probability that a station transmits successfully: determine maximum with respect to p: optimal probability that a station can successfully transmit: P optimal probability that a slot contains useful data: n P P n P 1/e n n 8-9

TDMA Communication in statically allocated time slots Synchronization among all nodes necessary: periodic repetition of communication frame or master node sends out a synchronization frame Examples: TTP, static portion of FlexRay, satellite networks 8-10

CSMA/CD Carrier Sense Multiple Access / Collision Detection Try to avoid and detect collisions: before starting to transmit, check whether the channel is idle if a collision is detected (several nodes started almost simultaneously), wait for some time (backoff timer) repeated collisions result in increasing backoff times Examples: Ethernet, IEEE 802.3 < t pd t pd = max end-to-end latency 8-11

Token Protocols Token value determines which node is transmitting and/or should transmit next Only the token holder may transmit Master/slave polling is a special form Null messages with tokens must be passed to prevent network from going idle Examples: IEEE 802.4, Profibus, TokenRing 8-12

Token Ring null token data ack null token A requests transmission A is token owner A sends data to C C sends acknowledge A sends null token 8-13

CSMA/CA Flexible TDMA (FTDMA) Carrier Sense Multiple Access / Collision Avoidance Operation: reserve s slots for n nodes; note: slots are normally idle they are (short) time intervals, not signals; if slot is used it becomes a slice. nodes keep track of global communication state by sensing nodes start transmitting a message only during the assigned slot If s=n, no collisions; if s<n, collision may occur (see random access) Examples: 802.11, part of FlexRay 8-14

CSMA/CR Carrier Sense Multiple Access / Collision Resolution Operation: Before any message transmission, there is a global arbitration arbitration message arbitration message Each node is assigned a unique identification number All nodes wishing to transmit compete by transmitting a binary signal based on their identification value A node drops out the competition if it detects a dominant state while transmitting a passive state Thus, the node with the lowest identification value wins Example: CAN Bus 8-15

CSMA/CR node 1 node 2 resulting channel signal node 1 recognizes dominance and drops out of competition message message 8-16

FlexRay FlexRay: Developed by the FlexRay consortium (BMW, Ford, Bosch, DaimlerChrysler, General Motors, Motorola, Philips). Combination of a TDMA and the Byteflight [Byteflight Consortium, 2003] (Flexible TDMA, close to CSMA/CA) protocol. High data rates can be achieved: initially targeted for ~ 10Mbit/sec; design allows much higher data rates Operation principle: Cycle is subdivided into a static and a dynamic segment. Static segment is based on a fixed allocation of time slots to nodes. Dynamic segment for transmission of ad-hoc communication with variable bandwidth requirements. 8-17

FlexRay Use of two independent channels to eliminate single-point failures Static segment Communication cycle Channel 1 Channel 2 Dynamic segment because of redundancy Channel 1 Channel 2 [http://www.ixxat.de/english/produkte/flexray/flexray_introduction.shtml] 8-18

FlexRay Basic topologies (any combination also possible): Typical physical layer (twisted pairs and differential encoding to reduce sensitivity to electromagnetic coupling): 8-19

FlexRay TDMA all static slots are the same length whether used or not all slots are repeated in order every communication cycle slots are lock-stepped in order on both channels 8-20

FlexRay Flexible TDMA: each minislot is an opportunity to send a message if message isn t sent, minislot elapses unused (short idle period) all nodes watch whether a message is sent so they can count minislots 8-21

Example Bluetooth 8-22

Who was Bluetooth? Wikinger King of Denmark 940-981 Christianized, unified and controlled Denmark and Norway 8-23

Bluetooth Overview Design Goals small size, low cost, low energy secure transmission (encryption, authentication) robust transmission (interference with wireless LAN) Technical Data 2.4 GHz Band (open band, spectral bandwidth 79 MHz, frequency hopping and time multiplex) 10-100 m transmission range, 1 Mbit/s bandwidth for each connection simultaneous transmission of multimedia streams (synchronous) and data (asynchronous) ad hoc network (spontaneous connections to neighbor nodes, dynamic network topologies, no centralized coordination, multi-hop communication) 8-24

Bluetooth Overview Frequency Hopping Transmitter jumps from one frequency to another with a fixed rate (1600 hops/s). The ordering (channel sequence) is determined by a pseudo random sequence of length 2 27-1. Frequency range (2402 + k) MHz, k = 0 78. The data transmission is partitioned into time windows of length 0.625 ms; each packet is transmitted by means of a different frequency. 8-25

Bluetooth Overview Example frequency hopping: 8-26

8-27

Network Topologies Ad-hoc networks all nodes are potentially mobile dynamic emergence of connections hierarchical structure (scatternet) of small nets (piconet) single slave piconet multi slave piconet scatternet consisting of three piconets 8-28

Network Topologies Piconet A piconet contains 1 master and maximally 7 slaves All nodes in a piconet use the same frequency hopping scheme (channel sequence) which is determined by the device address of the master BD_ADDR and phase which is determined by the system clock of the master. Connections are either one-to-one or between the master and all slaves (broadcast). The following connection types are possible: 432 kbit/s (duplex) or 721/56 kbit/s (asymmetric) or 3 audio channels or a combination of data and audio. 8-29

Netzwerktopologien Scatternet 8-30

Network Topologies Scatternet Several piconets with overlapping nodes form a scatternet. A node can simultaneously have the roles of slaves in several piconets and the role of a master in at most one piconet. The channel sequences of the different piconets are not synchronized. As a result, large network structures can emerge and multihop communication is possible. 8-31

Packet Format The access code identifies all packets between Bluetooth devices. Packet Header identifies and characterizes the connection between master and slave. 8-32

Addressing Bluetooth Device Address: BD_ADDR 48 Bit Unique address for each device Active Member Address AM_ADDR 3 Bit for maximally 7 active Slaves in a piconet. Address Null is a broadcast to all slaves. Parked Member Address PM_ADDR 8 Bit for parked slaves. 8-33

Connection Types Mixed transmission of data and audio. Synchronous Connection-Oriented (SCO) Point to point full duplex connection between master & slaves Master reserves slots to allow transmission of packets in regular intervals. Asynchronous Connection-Less (ACL) Asynchronous service No reservation of slots The master transmits spontaneously, the addressed slave answers in the following interval. 8-34

Frequency Hopping Time Multiplex A packet of the master is followed by a slave packet. After each packet, the channel (frequency) is switched. 8-35

Multi-Slot Communication Master can only start sending in even slot numbers. Packets from master or slave have length of 1, 3 or 5 slots. 8-36

ACL and SCO Connections 8-37

Modes and States Modes of operation: Inquiry (master identifies addresses of neighboring nodes) Page (master attempts connection to a slave whose address BD_ADDR is known) Connected (connection between master and slave is established) States in connection mode (sorted in decreasing order of power consumption) active (active in a connection to a master) hold (does not process data packets) sniff (awakens in regular time intervals) park (passive, in no connection with master but still synchronized) 8-38

States in Connection Mode master active hold sniff park Piconet 8-39

Synchronization in Connection Mode The channel sequence of a piconet is determined by the BD_ADDR of the master. The phase within the sequence is also determined by the master; all slaves follow. Piconet 8-40

Synchronization in Connection Mode 8-41

The Sniff State sniff active A slave in sniff state listens in regular time intervals whether there is a packet with its address. If yes, it answers. 8-42

From Standby to Connection Master Slave FHS 8-43

The Page Mode Synchronization between master and slave. It is a prerequisite for establishing a connection. page page scan Master transmits its own and slave address to slave (it uses a special channel sequence) Slave listens, whether its own address is sent from a master. Problem: Synchronization master page response Slave answers the master with its own address. slave page response Master sends FHS-packet (frequency hop synchronization) to slave. It contains the channel sequence and the phase of the piconet. 8-44

The Page Mode page Page scan time time 8-45

The Page Mode page slave page response page scan master page response synchronized 8-46

Protocol Hierarchy The baseband specification defines the packet formats, the physical and logical channels, the error correction, the synchronization between receiver and transmitter, and the different modes of operation and states that allow the transmission of data and audio. The audio specification defines the transmission of audio signals, in particular the coding and decoding methods. The link manager (LM) covers the authentication of a connection and the encryption, the management of a piconet (synchronous/asynchronous connection), the initiation of a connection (asynchronous/synchronous packet types, exchange of name and ID) and the transition between different modes of operation and states. 8-47

Protocol Hierarchy The host controller interface (HCI) defines a common standardized interface between a host and a bluetooth node; it is specified for several physical interconnections (USB, RS232, PCI,...). The link layer control and adaptation layer (L2CAP) provides an abstract interface for data communication. It segments packets (up to 64kByte) and assembles them again, it allows the multiplexing of connections (simultaneous use of several protocols and connections) and allows the exchange of quality of service information between two nodes (packet rate, packet size, latency, delay variations, maximal rate). 8-48

Protocol Hierarchy RFCOMM is a simple transport protocol that simulates a serial connection (~RS 232). There are several other protocols that are defined such as the telephony control protocol specification (TCS), the service discovery protocol (SDP), the OBEX (Object Exchange Protocol), and TCP/IP. Finally, the application can use the top layers of the protocol stack. 8-49