Systems. Roland Kammerer. 10. November Institute of Computer Engineering Vienna University of Technology. Communication Protocols for Embedded

Similar documents
Content. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control

Real-Time (Paradigms) (47)

Distributed Embedded Systems and realtime networks

Communication in Avionics

Multiple Access Protocols

Field buses (part 2): time triggered protocols

Communication (III) Kai Huang

16 Time Triggered Protocol

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

DISTRIBUTED REAL-TIME SYSTEMS

Chapter 39: Concepts of Time-Triggered Communication. Wenbo Qiao

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Links. CS125 - mylinks 1 1/22/14

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

ECE 4450:427/527 - Computer Networks Spring 2017

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Atacama: An Open Experimental Platform for Mixed-Criticality Networking on Top of Ethernet

Developing deterministic networking technology for railway applications using TTEthernet software-based end systems

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CS 455/555 Intro to Networks and Communications. Link Layer

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Link Layer and Ethernet

Redes de Computadores. Medium Access Control

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

The Link Layer and LANs. Chapter 6: Link layer and LANs

Chapter 5 Link Layer and LANs

Data and Computer Communications

Data Link Layer Technologies

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Lecture 6: Example LAN: Ethernet

Chapter 6 Medium Access Control Protocols and Local Area Networks

Lecture 2. Basics of networking in automotive systems: Network. topologies, communication principles and standardised protocols

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

CSE 461: Multiple Access Networks. This Lecture

Link Layer and Ethernet

Local Area Networks (LANs) SMU CSE 5344 /

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

An Encapsulated Communication System for Integrated Architectures

Strengthening Unlicensed Band Wireless Backhaul

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

Theory, Concepts and Applications

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

FlexRay International Workshop. Protocol Overview

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Data Link Layer: Overview, operations

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Data and Computer Communications. Chapter 11 Local Area Network

Data Link Layer, Part 5. Medium Access Control

Ethernet. Introduction. CSE 3213 Fall 2011

Protocols for Aerospace Control Systems A Comparison of AFDX, ARINC 429, CAN, and TTP

Real-Time Communications. LS 12, TU Dortmund

Data Link Layer, Part 3 Medium Access Control. Preface

Multimedia Communication Services Traffic Modeling and Streaming

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Message, Segment, Packet, and Frame Link-layer services Encoding, framing, error detection, transmission control Error correction and flow control

A Time-Triggered Ethernet (TTE) Switch

CSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21!

Media Access Control. Networked Systems (H) Lecture 5

Automotive and highly dependable Networks!

Today. Last Time. Motivation. CAN Bus. More about CAN. What is CAN?

EE 122: Ethernet and

Embedded Systems. 8. Communication

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Broadcast Links, Addressing and Media Access Control. Link Layer B. Link and Physical Layers. MAC Addresses

Data Link Layer -2- Network Access

FlexRay and Automotive Networking Future

Media Access Control (MAC) Sub-layer and Ethernet

Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application. Ling Wang

Goals of Today s Lecture. Adaptors Communicating

Outline: Connecting Many Computers

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Operating Systems, Concurrency and Time. real-time communication and CAN. Johan Lukkien

Real-Time Communication

Summary of MAC protocols

Distributed IMA with TTEthernet

Using Time Division Multiplexing to support Real-time Networking on Ethernet

Lecture 9: Bridging & Switching"

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Access Technologies! Fabio Martignon

Real-Time Systems. Real-Time Communication. Hermann Härtig, Jork Löser (following Kopetz, Liu, Almeida, Jon Currey, Schönberg)

CAN protocol enhancement

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Data Link Layer -2- Network Access

Aloha and slotted aloha

Chapter 6 Medium Access Control Protocols and Local Area Networks

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

Medium Access Protocols

The Link Layer II: Ethernet

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

CSMA/CD (Collision Detection)

Transcription:

Communication Roland Institute of Computer Engineering Vienna University of Technology 10. November 2010

Overview 1. Definition of a protocol 2. Protocol properties 3. Basic Principles 4. system communication protocols

Definition Part I Definition of a protocol

What is a communication protocol? Definition A set of formal rules describing how to exchange data Low-level protocols define the electrical and physical standards to be observed, bit- and byte-ordering and the transmission and error detection and correction of the bit stream High-level protocols deal with the data formatting, including the syntax of messages, the terminal to computer dialogue, character sets, sequencing of messages etc.

Requirements for communication Definition Agreed code space: How is the data encoded? Agreed time space: When is the data valid? Agreed name space: What does the transmitted data mean?

Properties Part II Protocol properties

Properties of data exchange Properties Message-based data exchange Data flow Control flow (controlling the information exchange between sender and receiver) Shared memory-based data exchange No control flow over borders of shared memory

State/Event messages Properties State messages: periodic exchange of state information State Information := < Name, Value, t obs > Time-triggered communication Event messages: sporadic exchange of event information Event Information := < Name, Value, t event > Event-triggered communication

State/Event information Properties State Information: At sender: At-least-once transmission At Receiver: Update in place Non-consuming read (one can read the last valid message) No state synchronization Event Information: At sender: Exactly-once transmission At Receiver: Queuing Consumed upon read History state required queuing

Properties Communication parameters Message delay Latency - time interval between the start of message transmission at the sender node and the time of reception of the message at the receiver node d max maximum delay d min minimum delay Jitter ɛ = d max d min Bandwidth Payload vs. total bandwidth Fault handling Message retransmission Forward error correction (Redundancy at sender in message) Message redundancy

Control flow: Push and Pull style Properties Push style communication: Pull style communication:

The PAR Principle Properties Positive Acknowledge or Retry Sender initiates communication (Push principle) Sender waits for receivers answer or timeout Communication errors are detected by the sender Time redundancy is used to correct an error (increased latency and traffic in the presence of errors) Problems: Jitter Thrashing (throughput decreases above particular load) PAR principle used in TCP

Time-Triggered vs. Event-Triggered Properties Time-triggered communication protocols sending and receiving actions are driven by the time exchange of state messages All communicating partners need to have a priory knowledge of the message send/receive instants Event-triggered communication protocols sending and receiving actions are driven by an event exchange of event messages No a priory knowledge of the message send/receive instants is needed

Time-Triggered communication Properties Sender: Push style Receiver: Pull style Control flow is interrupted by memory element (i.e., Temporary Firewall) Communication between memory element occurs at predefined instants

Message-based Clock Synchronization Properties Simple Method - message transmission times are known: A sends message containing its local time Receiver B can correct with term ( dmin+dmax ) 2 Jitter effects precision Round-Trip Method - message transmission times are not known: B requests timestamp message from A B measures duration t until reception of answer B corrects with term t 2 No need to know d min and d max Jitter effects precision

Properties Time-Triggered communication schedule 1 2 3 4 A Send Receive Receive B Receive Send Receive Send C Receive Receive Send Receive D Receive Receive Receive

Basic Principles Part III Basic Principles

Basic Principles Token Principle Token is passed from one station to another according to a set of rules Only the station in possession of the token is allowed to transmit data Token ring is a logical ring topology, but can be physically implemented as bus, star, or ring Recovery from lost/duplicate tokens? Token hold time Token rotation time IEEE 802.5 (IBM token ring), FDDI (Fiber Distributed Data Interface)

Master/Slave Principle - Polling Basic Principles Master sends request message Slave answers on request Usually cyclic polling (e.g., ASi, LIN bus) Multiple masters as token ring (e.g., Profibus)

TDMA Principle - Time Division Multiple Access Basic Principles The time is the token Requires common time base and predefined schedule in all nodes Common time base via distributed reference clocks (TTP/C) Common time base via master reference clock (TTP/A)

CSMA/CD Principle (Push) - Carrier Sense Multiple Access/Collision Detection Basic Principles Listen before transmit. If channel is sensed busy, defer transmission Collisions may still exist, since two stations may sense the channel idle at the same time Verify transmission by read back If collision, back off and retransmit later CSMA/CD principle used in 10Mbps Ethernet (IEEE 802.3), Fast Ethernet (100Mbps), Gigabit Ethernet (1000 Mbps)

CSMA/CD Principle (Push) (2) Basic Principles There are two states on the communication channel: dominant and recessive Listen before transmit. If channel is sensed busy, defer transmission Node first sends an ID and verifies bit by bit by read back Node stops transmit if a bit of the ID is overwritten by other node ID with dominant bits at beginning have higher priority Requires: Bit time > 2 LineDelay E.g., Bus length 40m, propagation delay 200 nsec (CAN)

CSMA/CD Principle (Push) (3) Basic Principles

Basic Principles Minislotting (e.g., ARINC 629) Minislotting requires that each node waits for a certain period after sending a message before it sends another message Advantage: No bus monopolization Media access controlled by three intervals SG: Synchronization Gap same for all nodes controls the sequence of entrance in the waiting room TG: Terminal Gap controlling the access to the bus different for every node longer than propagation delay of the channel TI: Transmit Interval TI > SG > max(tg i ) disables the host from monopolizing the bus same for all nodes

protocols TTP/C CAN Arinc 629 FlexRay TT Ethernet Part IV system communication protocols

protocols TTP/C CAN Arinc 629 FlexRay TT Ethernet TTP/C Synchronous system Common communication schedule - TDMA Known upper bound on the transmission time of a message Bus and/or star topology Fault tolerant two communication channels fault tolerant midpoint (clock synchronization) using a priori knowledge (guardian) Aerospace industry

CAN protocol protocols TTP/C CAN Arinc 629 FlexRay TT Ethernet Event-triggered Bandwidth up to 1 Mbit/s Bus topology Different variants (e.g., TTCAN) Automotive industry

Arinc 629 protocol protocols TTP/C CAN Arinc 629 FlexRay TT Ethernet Aerospace industry (Boeing 777) Synchronization Gap (SG) Terminal Gap (TG): 4-128µs Transmit Interval (TI): 0.5-64 ms Bandwidth: 2 Mbit/s

FlexRay protocol protocols TTP/C CAN Arinc 629 FlexRay TT Ethernet Combination of TDMA and mini-slotting Communication bandwidth is divided into two segments: Static segment (TDMA): State messages Dynamic segment (minislotting): Event messages Bandwidth up to 10 Mbit/s Bus or star topology Automotive industry

Time-Triggered Ethernet protocols TTP/C CAN Arinc 629 FlexRay TT Ethernet Integration of time-triggered and event triggered traffic into same communication infrastructure TT traffic (periodic with 16 different periods) ET traffic - standard Ethernet, TCP/IP, UDP/IP,... Star topology Bandwidth: 100 Mbit/s, 1 Gbit/s

Time-Triggered Ethernet (2) protocols TTP/C CAN Arinc 629 FlexRay TT Ethernet

protocols TTP/C CAN Arinc 629 FlexRay TT Ethernet Time-Triggered Ethernet (3) TT Ethernet switch: transmits TT msg. with a constant delay Transmission of ET msg. is preempted, if during the transmission a TT msg. arrives at a switch port. ET msg. is stored in the buffer of the switch, and retransmitted as soon as the transmission of the TT msg. is finished If during the transmission of TT msg. an ET msg. arrives in a port of the switch, the ET msg. is stored in the buffer of the switch and transmitted after the transmission of TT msg. is finished

Conclusion protocols TTP/C CAN Arinc 629 FlexRay TT Ethernet Communication needs a set of rules describing how to transmit data Push style communication in combination with retransmission mechanism leads to high jitter Polling, Token ring and TDMA are deterministic Usually tradeoff: Flexibility <-> Determinism

Thank you for your attention protocols TTP/C CAN Arinc 629 FlexRay TT Ethernet Any questions?