0% found this document useful (0 votes)
18 views20 pages

Networked Embedded Systems

The document discusses distributed embedded architectures, focusing on Processing Elements (PEs) and their communication through networks. It highlights the advantages of distributed systems, such as improved diagnostics and cost-effectiveness in data processing. Additionally, it covers various communication protocols used in embedded systems, including inter and intra system protocols, along with their functionalities and applications.

Uploaded by

K S Rajasekhar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views20 pages

Networked Embedded Systems

The document discusses distributed embedded architectures, focusing on Processing Elements (PEs) and their communication through networks. It highlights the advantages of distributed systems, such as improved diagnostics and cost-effectiveness in data processing. Additionally, it covers various communication protocols used in embedded systems, including inter and intra system protocols, along with their functionalities and applications.

Uploaded by

K S Rajasekhar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

DISTRIBUTED EMBEDDED ARCHITECTURES:

A distributed embedded system can be organized in many different ways,


but its basic units are the Processing Elements (PE) and the network as illustrated
in Figure 4.4. A PE may be an instruction set processor such as a DSP, CPU,
or microcontroller, as well as a nonprogrammable unit such as the ASICs used to
implement PE 4. An I/O device such as PE 1 (which we call here
a sensor or actuator, depending on whether it provides input or output) may also
be a PE, so long as it can speak the network protocol to communicate with other
PEs.
The network in this case is a bus, but other network topologies are also possible.
It is also possible that the system can use more than one network, such as when
relatively independent functions require relatively little communication among
them. We often refer to the connection between PEs provided by the network as
a communication link.

The system of PEs and networks forms the hardware platform on which the application
runs. In particular, PEs do not fetch instructions over the network as they do on the
microprocessor bus. We take advantage of this fact when analyzing network performance the
speed at which PEs can communicate over the bus would be difficult if not impossible to predict
if we allowed arbitrary instruction and data fetches as we do on microprocessor buses.

1. Why Distributed?
Building an embedded system with several PEs talking over a network is definitely more
complicated than using a single large microprocessor to perform the same tasks. So why would
anyone build a distributed embedded system? All the reasons for designing accelerator systems
also apply to distributed embedded systems, and several more reasons are unique to distributed
systems.
In some cases, distributed systems are necessary because the devices that the PEs communicate
with are physically separated. If the deadlines for processing the data are short, it may be more
cost-effective to put the PEs where the data are located rather than build a higher-speed network
to carry the data to a distant, fast PE.
An important advantage of a distributed system with several CPUs is that one part of
the system can be used to help diagnose problems in another part. Whether you are debugging
a prototype or diagnosing a problem in the field, isolating the error to one part of the system
can be difficult when everything is done on a single CPU. If you have several CPUs in the
system, you can use one to generate inputs for another and to watch its output.

2. Network Abstractions
Networks are complex systems. Ideally, they provide high-level services while hiding
many of the details of data transmission from the other components in the system. In order to
help understand (and design) networks, the International Standards Organization has developed
a seven-layer model for networks known as Open Systems Interconnection (OSI) models
[Sta97A]. Understanding the OSI layers will help us to understand the details of real networks.
The seven layers of the OSI model, shown in Figure 4.5, are intended to cover a broad
spectrum of networks and their uses. Some networks may not need the services of one or more
layers because the higher layers may be totally missing or an intermediate layer may not be
necessary. However, any data network should fit into the OSI model. The OSI layers from
lowest to highest level of abstraction are described below.
Physical: The physical layer defines the basic properties of the interface
between systems, including the physical connections ( plugs and wires), electrical
properties, basic functions of the electrical and physical components, and the basic
procedures for exchanging bits.
Data link: The primary purpose of this layer is error detection and control across
a single link. However, if the network requires multiple hops over several data links,
the data link layer does not define the mechanism for data integrity between hops,
but only within a single hop.
Network: This layer defines the basic end-to-end data transmission service. The
network layer is particularly important in multi hop networks.
Transport: The transport layer defines connection-oriented services that ensure
that data are delivered in the proper order and without errors across multiple links.
This layer may also try to optimize network resource utilization.
Session: A session provides mechanisms for controlling the interaction of end
user services across a network, such as data grouping and check pointing.
Presentation: This layer defines data exchange formats and provides
transformation utilities to application programs.
Application: The application layer provides the application interface between
the network and end-user programs.

Elements of Protocol Design:


The elements of protocols in an embedded system are communication protocols. These
protocols are a set of rules that allow two or more communication systems to communicate
data via any physical medium. The rules, regulations, synchronization between communication
systems, syntax to be followed and semantics are all defined by the term protocol. Protocols
can be implemented by both hardware and software or combination of both.
In embedded systems the components must communicate with each other to provide
the anticipated output. Each communicating entity should agree to some protocol to exchange
information. Many different protocols are available for embedded systems and are deployed
depending upon the application area.
In general, the communication protocols is associated with physical layer describing
the signals incorporated, signal strength, hand shaking mechanism, bus arbitration, device
addressing, wired or wireless, data lines etc.The processes such as system configuration,
selection of baud rate and transmitting & receiving data is associated with application layer.

Types of Communication Protocols in Embedded Systems:


Communication protocols are broadly classified into two types:
• Inter System Protocol
• Intra System Protocol

Inter System Protocol:


Inter system protocols establish communication between two communicating devices
i.e. between PC and microprocessor kit, developmental boards, etc. In this case,
the communication is achieved through inter bus system.Inter system protocol can be
categorized into:

• USB Communication protocols


• UART Communication protocols
• USART Communication protocols

USB Communication protocols:


• Universal Serial Bus (USB) is a two-wired serial communication protocol. It allows
127 devices to be connected at any given time. USB supports plug & play
functionality.
• USB protocol sends and receives the data serially between host and external
peripheral devices through data signal lines D+ and D-. Apart from two data lines,
USB has VCC and Ground signals to power up the device. The USB pin out is
shown in below Figure.
Data is transmitted in the form of packets where two devices communicate each other. Data
packets compose of 8 bits (byte) with LSB (Least Significant Bit) transmitted first.

USB associates NRZI (Non Return to Zero Invert) encoding scheme to transmit data with sync
field to synchronize the host system and receiver clock signals.

In USB, data is transferred in three different speeds such as:

Advantages of USB Communication Protocol

The advantages of USB Communication Protocol are as follows:

• Fast and simple.


• It is of low cost.
• Plug and Play hardware.

Disadvantages of USB Communication Protocol

The disadvantages of USB Communication Protocol are as follows:

• Needs powerful master device.


• Specific drivers are required.

UART Communication Protocols

Universal Asynchronous Receiver/Transmitter (UART) is not a communication protocol but


just a physical piece of hardware which converts parallel data into serial data. Its main purpose
is to transmit and receive data serially. UART is also two-wired i.e., the serial data is handled
by Tx (Transmitter) and Rx (Receiver) pins.
UART transmits data asynchronously, which induces that no clock signal is associated
in transmitting and receiving data. Instead of clock signal, UART embed start and stop bits
with actual data bits, which defines the start and end of data packet.
When receiver end detects the start bit, it starts to read the data bits at specific baud rate
meaning both transmitting and receiving peripherals should work under same baud rate. UART
works under half duplex communication mode meaning it either transmits or receives at a time.

USART Communication Protocol

Universal Synchronous Asynchronous Receiver/Transmitter (USART) is identical to


that of UART with only added functionality synchronous. That is, the transmitter will generate
a clock signal which will be recovered at the receiver end from the data stream transmitted
without knowing baud rate ahead. USART encompass the abilities of UART, which enables
application of both depending on the applications area.

2. Intra System Communication Protocols:

The Intra system protocol establishes communication between components within the circuit
board. In embedded systems, intra system protocol increases the number of components
connected to the controller. Increase in components lead to circuit complexity and increase in
power consumption. Intra system protocol promises secure access of data from the peripherals.

Types of Intra System Communication Protocols


Intra system protocol can be categorized into:

• I2C Protocol
• SPI Protocol
• CAN Protocol

I2C Communication Protocols


• Inter Integrated Circuit (I2C) is a serial communication protocol developed by
Philips Semiconductors. The main purpose of this protocol is to provide easiness to
connect peripheral chips with microcontroller. In embedded systems, all peripheral
devices are connected as memory mapped devices to the microcontroller.
• I2C necessitates two wires SDA (Serial Data Line) and SCL (Serial Clock Line) to
carry information between devices. These two active wires are said to be
bidirectional.
• The inter-integrated circuit or I2C Protocol is a way of serial
communication between different devices to exchange their data with each other. It
is a half-duplex bi-directional two-wire bus system for transmitting and receiving
data between masters (M) and slaves (S). These two wires are Serial clock line or
SCL and Serial data line or SDA. Masters and Slaves play important role in I2C
communication. Master is the one which initiates a communication, generates a
clock and terminates the communication and Slave is the one which is handled by
master and acts according to the master command. It can also be possible that
multiple masters can communicate with multiple slaves. In the below Figure , we
can see two Masters are communicating with multiple slaves over I2C Bus.

Each I2C device (Master/slave) is identified by its 7-bit or 10-bit unique address known as
device ID which is provided by device manufacturer only and can act as a transmitter or
receiver at a time, depending on the configuration of it. As we know, the bus consists of SCL
and SDA line, SCL (serial clock line) is responsible for synchronizing the communication and
is controlled by Master (the slave can also control the clock line, we will discuss about this
topic later) and SDA (serial data line) is responsible for providing the data bi-directionally and
can be used by master or slave or both.

• I²C stands for Inter-integrated-circuit


• It is a serial communication interface with a bidirectional two-wire synchronous serial
bus normally consists of two wires – SDA (Serial data line) and SCL (Serial clock line)
and pull-up resistors.
• They are used for projects that require many different parts (eg. sensors, pin,
expansions, and drivers) working together as they can connect up to 128 devices to the
mainboard while maintaining a clear communication pathway!
• It is used to connect various low-speed devices together like microcontrollers,
EEPROMs, A/D and D/A converters, etc.
• Unlike UART or SPI, I2C bus drivers are open-drain which prevents bus contention
and eliminates the chances for damage to the drivers.

• Each signal line in I2C contains pull-up resistors to restore the signal to a high of the
wire when no device is pulling it low.
• All transfers are initiated and terminated by the “master device”; the “master device”
can write data to one or more “slave devices” or request data from the “slave devices”.
“Master” and “Slave” are not fixed in the system. In fact, any device can be used as
“Master” or “Slave” as long as it is configured with appropriate hardware or firmware.
• The data is transmitted in one byte, and each byte is followed by a 1-bit handshake
signal as the ACK/NACK bit (acknowledgement/no response).

Working of I2C:

• I2C data is transferred in messages which are broken up into data frames.
• Each message contains:
• Start condition
• Stop condition
• Read and write bits
• ACK/NACK bits
• Address of the Slave
• Data frame

Start and Stop Condition

• Start Condition:
• The transmission will start when the master device switches the SDA line
from high voltage level to low voltage level then switches the SCL line from
high to low.
• Signals to other slave devices that a transmission is going to happen.
• If two masters send a start condition at one time wants to take ownership of
the bus, whoever pulls the SDA low first “wins”
• Stop Condition:
• A stop condition will be transmitted after all the data frames have been sent.
• The SCL line will switch from a low voltage level to high first before the
SDA line switches from a low voltage to high
• Value on SDA should not change when SCL is high during normal data
writing operation as it can cause false stop conditions.

Read/Write Bit

• Single bit specifying whether the master is transmitting (write) data to the slave (low
voltage level) or requesting (read) data from it (high voltage level).

ACK/NACK Bit

• Sent by the receiving device after each frame to signal to the sender whether the data
frame was successfully received (ACK) or not (NACK)
Addressing:
The master device sends the address of the slave device with which it wants to communicate
to each slave device connected to it. The slave device compares the received address with its
own address.

• If the match is successful, the slave device knows that it will establish communication
with the master device. It will send an ACK bit back to the master device.
• Compared to SPI, I2C do not have slave select lines which cause the slave devices not
being able to know when data is being sent to him instead of other slaves.
• To solve this problem, I2C uses an address frame which is the first frame after the start
bit in a new message.
• Master devices will first send the unique address of the slave it wants to communicate
with. I
• If the address does match with the slave own address, it will send an ACK
bit back to the master device.
• If it does not match, the slave will do nothing which leaves the SDA line
high.

10-bit device address

• I2C normally has a 7-bit address and there are only 127 different I2C devices. However,
in reality, there are way more types of I2C devices and an I2C device has a high chance
of having the same address on a bus.
• In order to overcome this limitation, many of the devices use dual address through
external configuration pins and also a 10-bit address scheme.
• The 10-bit address scheme has two effects on the normal I2C protocol:
• The address frame now has two bytes instead of 1 byte.
• The first five most significant bits of the first byte is used to identify the 10-
bit address with the convention being “11110”.

Data Frame:

After the master detects the ACK bit from the slave, the first data frame is ready to be
sent. The data frame is always 8 bits long, and sent with the most significant bit first. Each data
frame is immediately followed by an ACK/NACK bit to verify that the frame has been received
successfully. The ACK bit must be received by either the master or the slave (depending on
who is sending the data) before the next data frame can be sent.

After all of the data frames have been sent, the master can send a stop condition to the
slave to halt the transmission. The stop condition is a voltage transition from low to high on
the SDA line after a low to high transition on the SCL line, with the SCL line remaining high.
Protocols for Industrial and Control Applications:

Industrial Network Protocols are often referred to generically as SCADA


and/or fieldbus protocols. SCADA protocols are primarily used for the communication of
supervisory systems, whereas fieldbus protocols are used for the communication of industrial,
automated control systems (ICS or IACS). Modbus is the oldest and perhaps the most widely
deployed industrial control communications protocol. Modbus is an application layer
messaging protocol operating at layer 7 of the OSI model. It allows for efficient
communications between interconnected assets based on a request/reply methodology. It can
be used by extremely simple devices such as sensors or motors to communicate with a more
complex computer that can read measurements and perform analysis and control. Another
protocol is the Inter Control Center Protocol that is designed for communication between
control centers within the energy industry. The ICCP protocol defines communication between
two control centers using a client/server model. One control center (the server) contains
application data and defined functions. Another control center (the client) issues requests to
read from the server, and the server responds. Communications over ICCP occur using a
common format in order to ensure interoperability.

SCADA:
SCADA (supervisory control and data acquisition) is a category of software
applications for controlling industrial processes, which is the gathering of data in real time from
remote locations in order to control equipment and conditions. SCADA provides organizations
with the tools needed to make and deploy data-driven decisions regarding their industrial
processes.
SCADA systems include hardware and software components. The hardware gathers
and feeds data into field controller systems, which forward the data to other systems that
process and present it to a human-machine interface (HMI) in a timely manner. SCADA
systems also record and log all events for reporting process status and issues. SCADA
applications warn when conditions become hazardous by sounding alarms.

Components of a SCADA system:


SCADA systems include components deployed in the field to gather real-time data, as
well as related systems to enable data collection and enhance industrial automation. SCADA
components include the following:
• Sensors and actuators. A sensor is a feature of a device or system that detects
inputs from industrial processes. An actuator is a feature of the device or system
that controls the mechanism of the process. In simple terms, a sensor functions like
a gauge or meter, which displays the status of a machine; an actuator acts like a
switch, dial or control valve that can be used to control a device. Both sensors and
actuators are controlled and monitored by SCADA field controllers.

• SCADA field controllers. These interface directly with sensors and actuators.
There are two categories of field controllers:

1. Remote telemetry units, also called remote terminal units (RTUs),


interface with sensors to collect telemetry data and forward it to a
primary system for further action.

2. Programmable logic controllers (PLCs) interface with actuators to


control industrial processes, usually based on current telemetry
collected by RTUs and the standards set for the processes.

• SCADA supervisory computers. These control all SCADA processes and are
used to gather data from field devices and to send commands to those devices to
control industrial processes.

• HMI software. This provides a system that consolidates and presents data from
SCADA field devices and enables operators to understand and, if needed, modify
the status of SCADA-controlled processes.

• Communication infrastructure. This enables SCADA supervisory systems to


communicate with field devices and field controllers. This infrastructure enables
SCADA systems to collect data from field devices and to control those devices.

Features of SCADA systems


Although SCADA systems may include special features for specific industries or applications,
most systems support the following features:

• Data acquisition is a foundation of SCADA systems; sensors collect data and


deliver it to field controllers, which, in turn, feed data to the SCADA computers.

• Remote control is achieved through the control of field actuators, based on the data
acquired from field sensors.
• Networked data communication enables all SCADA functions. Data collected
from sensors must be transmitted to SCADA field controllers, which, in turn,
communicate with the SCADA supervisory computers; remote control commands
are transmitted back to actuators from the SCADA supervisory computers.

• Data presentation is achieved through HMIs, which represent current and


historical data to the operators running the SCADA system.

• Real-time and historical data are both important parts of the SCADA system, as
they enable users to track current performance against historical trends.

• Alarms alert SCADA operators to potentially significant conditions in the system.


Alerts can be configured to notify operators when processes are blocked, when
systems are failing, or when other aspects of SCADA processes need to be stopped,
started or adjusted.

• Reporting on SCADA system operations can include reports on system status,


process performance and reports customized to specific uses.

SCADA architecture:
• Level 0. The field level includes field devices, such as sensors, used to forward data
relating to field processes and actuators used to control processes.

• Level 1. The direct control level includes local controllers, such as PLCs and RTUs,
that interface directly with field devices, including accepting data inputs from
sensors and sending commands to field device actuators.

• Level 2. The plant supervisory level includes local supervisory systems that
aggregate data from level controllers and issue commands for those controllers to
carry out.

• Level 3. The production control level includes systemwide supervisory systems


that aggregate data from Level 2 systems to produce ongoing reporting to the
production scheduling level, as well as other site or regionwide functions, like alerts
and reporting.

• Level 4. The production scheduling level includes business systems used to manage
ongoing processes.

Field Bus:
A digital, serial, multi-drop, two-way data bus or communication path or link between
low-level industrial field equipment such as sensors, transducers, actuators, local controllers,
and even control room devices. Use of fieldbus technologies eliminates the need of point-to-
point wiring between the controller and each device. A protocol is used to define messages
over the fieldbus network with each message identifying a particular sensor on the network.
Computers and instruments are needed to connect in single network in a manufacturing plant,
so that the sensing and real time control is possible. This connecting network is known as Field
bus. A field bus network bus allow an industry working smoothly.
A simple field bus is shown above, which consist of mainly four levels. As the level increases
the the level of complexity increases.

• Level 1 : sensor bus network


• Level 2 : Device bus network
• Level 3 : Control bus network
• Level 4 : Enterprise level network or information level network.

Level 1:Sensor bus Network:


This level includes all the basic field devices , which mean all the sensors and controller
outputs in an unit. All the sensors are connected to one network cable, same as the controller
output devices.

Level 2: Device bus network:


Just as like the sensor bus network but large in size, work in large scale. All the Sensor bus
Network are connected to this network. Variable speed drives and motor control centers are
connected to them to have control over individual elements.

Level 3: Control bus network:


Control bus network is where high level data communication happens. The controllers like
PLCs are connected to each other anlong side HMI( Human Machine Interface) for the
complete control on the network.

Level 4: Enterprise level network:


Most complex level in network, here all computers and departments are inter- connected
together. this computer driven level allows data monitoring, file management, file transfer in a
large scale etc,.

Internet Enabled Systems:


Some of the different types of distributed embedded system are rapidly
emerging the Internet-enabled embedded system and Internet appliances.

Internet:

The Internet Protocol (IP) is the fundamental protocol on the Internet. It


provides connectionless, packet-based communication. Industrial automation has
long been a good application area for Internet-based embedded systems.
The IP allows data to flow seamlessly through these networks from one end user
to another. The relationship between IP and individual networks is illustrated in
below Figure. IP works at the network layer.

When node A wants to send data to node B, the application’s data pass through
several layers of the protocol stack to send to the IP. IP creates packets for routing
to the destination, which are then sent to the data link and physical layers. A node
that transmits data among different types of networks is known as a router.
Information appliances that use the Internet are rapidly becoming another use of
IP in embedded computing. Internet protocol is not defined over a particular
physical implementation it is an internetworking standard. Internet packets are
assumed to be carried by some other network, such as an Ethernet. In general, an
Internet packet will travel over several different networks from source to
destination.
The router’s functionality must go up to the IP layer, but since it is not running
applications, it does not need to go to higher levels of the OSI model.
In general, a packet may go through several routers to get to its destination. At
the destination, the IP layer provides data to the transport layer and ultimately the
receiving application.
As the data pass through several layers of the protocol stack, the IP packet data
are encapsulated in packet formats appropriate to each layer.
The basic format of an IP packet is shown in Figure 4.7. The header and data
payload are both of variable length. The maximum total length of the header and
data payload is 65,535 bytes.
An Internet address is a number (32 bits in early versions of IP, 128 bits in IPv6).
The IP address is typically written in the form xxx.xx.xx.xx. The names by which
users and applications typically refer to Internet nodes, such as foo.baz.com, are
translated into IP addresses via calls to a Domain Name Server, one of the higher-
level services built on top of IP.
The fact that IP works at the network layer tells us that it does not guarantee that
a packet is delivered to its destination. Furthermore, packets that do arrive may
come out of order. This is referred to as best-effort routing.
Since routes for data may change quickly with subsequent packets being routed
along very different paths with different delays, real-time performance of IP can
be hard to predict.
The Transmission Control Protocol (TCP) is one such example. It provides a
connection oriented service that ensures that data arrive in the appropriate order,
and it uses an acknowledgment protocol to ensure that packets arrive. Because
many higher-level services are built on top of TCP, the basic protocol is often
referred to as TCP/IP.
Below Fig shows the relationships between IP and higher-level Internet services.
Using IP as the foundation, TCP is used to provide File Transport Protocol for
batch file transfers, Hypertext Transport Protocol (HTTP) for Worldwide Web
service, Simple Mail Transfer Protocol for email, and Telnet for virtual
terminals.
A separate transport protocol, User Datagram Protocol, is used as the basis for
the network management services provided by the Simple Network Management
Protocol.
Internetworking Protocol :
Internetworking is the process or technique of connecting different networks by using
intermediary devices such as routers or gateway devices. It ensures data communication among
networks owned and operated by different entities using common data communication and the
Internet Routing Protocol.

Transmission Control Protocol/Internet Protocol (TCP/IP) is the most popular internetworking


protocol.

TCP/IP is the communication protocol for the Internet. The TCP/IP protocol has two
parts: TCP and IP.

Transmission Control Protocol (TCP)

Transmission Control Protocol (TCP) provides reliable transport service, i.e. it ensures that
messages sent from sender to receiver are properly routed and arrive intact at the destination.

TCP converts messages into a set of packets at the source, which are then reassembled back
into messages at the destination. TCP operates with the packet switching technique, which is
described as follows:

• The message is divided into small packets.


• Each packet contains address, sequencing information, and error control
information.

The address is used to route the packet to its destination.

Since multiple users can send or receive information over the same communication line,
the packets can arrive out of order at the destination. The sequencing information in the packet
is used to reassemble the packets in order, at their destination.
The error control information is used to check that the packet arrived at the destination is
the same as that sent from the source (i.e. has not got corrupted).

Internet Protocol (IP)

Internet Protocol (IP) allows different computers to communicate by creating a network of


networks.

IP handles the dispatch of packets over the network.

It handles the addressing of packets, and ensures that a packet reaches its destination
traveling through multiple networks with multiple standards.

TCP/IP protocol makes it possible for any pair of computers connected to Internet to
communicate, despite their hardware differences.

Bluetooth:

Bluetooth is a network technology that connects mobile devices wirelessly over a short range
to form a personal area network (PAN). They use short-wavelength, ultra-high frequency
(UHF) radio waves within the range 2.400 to 2.485 GHz, instead of RS-232 data cables of
wired PANs.
There are two types of Bluetooth networks −
• Piconets
• Scatternets

Piconets

Piconets are small Bluetooth networks, formed by at most 8 stations, one of which is the master
node and the rest slave nodes (maximum of 7 slaves). Master node is the primary station that
manages the small network. The slave stations are secondary stations that are synchronized
with the primary station.
Communication can take place between a master node and a slave node in either one-to-one
or one-to-many manner. However, no direct communication takes place between slaves. Each
station, whether master or slave, is associated with a 48-bit fixed device address.
Besides the seven active slaves, there can be up to 255 numbers of parked nodes. These are in
a low power state for energy conservation. The only work that they can do is respond to a
beacon frame for activation from the master node.
Scatternodes

A scatternet is an interconnected collection of two or more piconets. They are formed when a
node in a piconet, whether a master or a slave, acts as a slave in another piconet. This node is
called the bridge between the two piconets, which connects the individual piconets to form the
scatternet.

Spectrum
Bluetooth technology operates in the unlicensed industrial, scientific and medical (ISM) band
at 2.4 to 2.485 GHZ, using a spread spectrum hopping, full-duplex signal at a nominal rate of
1600 hops/sec. the 2.4 GHZ ISM band is available and unlicensed in most countries.
Range
Bluetooth operating range depends on the device Class 3 radios have a range of up to 1 meter
or 3 feet Class 2 radios are most commonly found in mobile devices have a range of 10 meters
or 30 feet Class 1 radios are used primarily in industrial use cases have a range of 100 meters
or 300 feet.
Data rate
Bluetooth supports 1Mbps data rate for version 1.2 and 3Mbps data rate for Version 2.0
combined with Error Data Rate.

You might also like