Unit IV
Unit IV
Presentation on
DATA COMMUNICATIONS LINKS AND PROTOCOL
Submitted to
Dr. Girish Paramar
Associate Professor
Electronics Department
Project Co-ordinator
DATA COMMUNICATIONS LINKS AND PROTOCOL
• The OSI model describes how information or data makes its way from
application programs (such as spreadsheets) through a network medium
(such as wire) to another application program located on another network.
• The OSI reference model divides the problem of moving information between
computers over a network medium into SEVEN smaller and more manageable
problems .
1. Physical layer
• Framing.
• Physical addressing.
• Flow control.
• Error control.
• Access control.
3. Network layer
Main Topics:
• Logical addressing
• Routing
4. Transport layer
• Service-point addressing.
• Segmentation and reassembly.
• Connection control.
• Flow control.
• Error control.
5. Session Layer
• Translation
• Encryption
• Compression
7. Application Layer
• The International Organization for Standardization (ISO) recognized this and researched
various network schemes, and in 1984 introduced the Open Systems Interconnection (OSI)
reference model.
• The OSI reference model has standards which ensure vendors greater compatibility and
interoperability between various types of network technologies.
• Each layer provides a service to the layer above it in the protocol specification and
communicates with the same layer’s software or hardware on other computers.
• Layers 1-4 are concerned with the flow of data from end to end through the network
and Layers 5-7 are concerned with services to the applications.
Transmission Media
A Transmission medium can be broadly defined as anything
that can carry information from a source to a destination.
GUIDED MEDIA
Guided media, which are those that provide a conduit from one
device to another, include twisted-pair cable, coaxial cable, and
fiber-optic cable.
Advantages
• Less expensive
• Easy to work with
Disadvantages
• Low data rate
• Short range
Coaxial Cable
• Coaxial Cable having two wires, coax has a central core
conductor of solid or stranded wire (usually copper) enclosed
in an insulating sheath, which is, in turn, encased in an outer
conductor of metal foil, braid, or a combination of the two.
Applications
• Telephone networks
• TV networks
• Traditional Ethernet LANs
Fiber-Optic Cable
• A fiber-optic cable is made of glass or plastic and transmits
signals in the form of light.
Propagation Modes
Optical Fiber - Transmission Characteristics
Operational range
• 1014 to 1015 Hz
• Light source Light Emitting Diode (LED)
• Cheaper
• Wider operating temperature range
• Last longer
Injection Laser Diode (ILD)
• Operates on laser principle
• More efficient
• Greater data rate
• Wavelength Division Multiplexing (WDM)
Optical Fiber Benefits
Greater capacity
• Data rates of hundreds of Gbps
• Smaller size & weight
• Made up of extremely thin fibers
Lower attenuation
• Electromagnetic isolation
Greater repeater spacing
• 10s of km at least
UNGUIDED MEDIA(WIRELESS)
• Bus Topology
• Star Topology
• Ring Topology
• Tree or Hybrid Topology
• Mesh Topology
Bus Topology
• All the nodes (file server, workstations, and peripherals) on
a bus topology are connected by one single cable.
• The hub takes a signal that comes from any node and
passes it along to all the other nodes in the network.
Scale
• How to provide unique names for potentially
billions of nodes? (naming)
• How to find all these nodes? (forwarding and
routing)
Internet Working With Repeaters
r
Repeaters (also
called hubs)
r
(r in the figure)
directly transfer
r bits from their
inputs to their
outputs
r
Internet Working With Repeaters
Telnet, FTP,
HTTP, email application application
transport transport
network network
Pros
Transparency
LANS can be connected without any awareness from the hosts.
Useful for serving multiple machines in an office from one Ethernet
outlet.
Cons
Not scalable
Ethernet standard allows only 4 repeaters.
More than 4 would introduce delays that would break contention
detection.
No heterogeneity
Networks connected with repeaters must have identical electrical
properties.
Internet Working With Bridges
b
Internet Working With Bridges
Telnet, FTP,
HTTP, email application application
transport transport
network network
B1 B2 B1 B2 B1 B2
F1 F2 F2 F1
F1 F2
Internet Working With Application Gateways
application gateways (g in
the figure) connect
Network A
different networks for
particular applications.
g x
Example:
• User on host x posts news
item to gateway machine
phone on network A.
system
• Gateway on A passes item
(along with others) to
Network B gateway B.
• User on host y reads
g y message from gateway on
B.
Internet Working With Application Gateways
Gateway program
usenet news application application
transport
network
host
host host
host
internet
internet
host
host host
host
Building an Internet
AA BB CC XX YY ZZ
adapter
adapter adapter
adapter adapter
adapter adapter
adapter adapter
adapter adapter
adapter
Ethernet ATM
network 1 (SCS) network 2 (ECE)
AA BB CC(router)
(router) XX YY ZZ
adapter
adapter adapter
adapter adapter
adapter adapter
adapter adapter
adapter adapter
adapter adapter
adapter
AA BB CC(router)
(router) XX YY ZZ
adapter
adapter adapter
adapter adapter
adapter adapter
adapter adapter
adapter adapter
adapter adapter
adapter
128.2.250.1 128.2.80.1
128.2.80.1
128.2.250.1
internet
internet
128.2.250.2
128.2.250.2 128.2.80.2
128.2.80.2
128.2.80.3
128.2.80.3
128.2.250.0
128.2.250.0
128.2.80.3
128.2.80.3
Internet Working With Routers
Telnet, FTP,
HTTP, email application application
transport transport
IP network network
User
Userapplication
applicationprogram
program(FTP,
(FTP,Telnet,
Telnet,WWW,
WWW,email)
email)
Reliable
Unreliable User
best effort Userdatagram
datagramprotocol
protocol Transmission
Transmissioncontrol
control byte stream
(UDP)
(UDP) protocol
protocol(TCP)
(TCP) delivery
datagram (process-
delivery Internet process)
(process- InternetProtocol
Protocol(IP)
(IP)
process)
Network
Networkinterface
interface(ethernet)
(ethernet)
Unreliable
best effort
hardware Physical
datagram hardware
connection
delivery
(host-host)
IP Service Model
IP service model:
Delivery model: IP provides best-effort delivery of datagram
(connectionless) packets between two hosts.
IP tries but doesn’t guarantee that packets will arrive (best
effort)
packets can be lost or duplicated (unreliable)
ordering of datagrams not guaranteed (connectionless)
Naming scheme: IP provides a unique address (name) for each
host in the Internet.
Why would such a limited delivery model be useful?
simple, so it runs on any kind of network
provides a basis for building more sophisticated and user-friendly
protocols like TCP and UDP
IP Datagram Delivery: Example Internet
Network 1 (Ethernet)
H1 H2 H3
H7 R3 H8
Network 2
(Ethernet) R1 Network 4
R2
(Point-to-point)
Network 3 (FDDI)
H4 H5 H6
Data Transmission
Data Transmission
• Guided medium
eg. twisted pair, coaxial cable, optical fiber
On a synchronous system
• each character is sent without start or stop bits
Synchronous Transmission
Simplex, Half-Duplex, and Full-Duplex Transmission
A communications channel is classified as one of three types:
(depending on the direction of transfer)
• Simplex
• Full-Duplex
• Half-Duplex
Simplex: a simplex mechanism can only transfer data in a single
direction. It is analogous to broadcast radio or television
Full-Duplex: allows transmission in two directions simultaneously
• It is analogous to a voice telephone conversation
in which a participant can speak even if they are able to hear
background music at the other end
Simplex, Half-Duplex, and Full-Duplex Transmission
DCE and DTE Equipment
• Terms Data Communications Equipment (DCE) and Data Terminal
Equipment (DTE) were originally created by AT&T
• To distinguish between the communications equipment
owned by the phone company and the terminal equipment
owned by a subscriber
• The terminology persists: if a business leases a data circuit from a
phone company
• the phone company installs DCE equipment at the business
• and the business purchases DTE equipment that attaches to
the phone company’s equipment
Shannon Capacity
S = GP0
S: Throughput
G: Mean of Regenerated and New frames
P0: Probability that a frame does not suffer a collision
SLOTTED ALOHA
• In slotted aloha we divide the time into slots.
• Frames can only be transmitted at beginning of slot:
“discrete” ALOHA.
SLOTTED ALOHA
Efficiency
S = G e-G.
S = Smax = 1/e = 0.368 for G = 1.
CARRIER SENSE MULTIPLE ACCESS
148
The Development of CAN
The development of CAN began when more and more
electronic devices were implemented into modern motor
vehicles. Examples of such devices includes air
conditioning, airbags and central locking.
150
Full CAN Controller
Hardware message filters sort & filter messages
without interrupting CPU
151
CAN (SAE J1939) Example: Caterpillar 797
152
Before CAN
153
With CAN
This bus had to fulfill some special requirements due to its usage
in a vehicle. With the use of CAN, point-to-point wiring is
replaced by one serial bus connecting all control systems.
154
The CAN Bus
CAN is a broadcast type of bus.
This means that all nodes can "hear" all transmissions. There is no way to send a
message to just a specific node; all nodes will invariably pick up all traffic. The
CAN hardware, however, provides local filtering so that each node may react
only on the “interesting” messages.
155
Basic Configuration
156
CAN Bus Overview
The nodes are connected to the bus in a wired-and fashion: if just one
node is driving the bus to a logical 0, then the whole bus is in that state
regardless of the number of nodes transmitting a logical 1.
158
CAN Bus Characteristics
159
Bus Characteristics – Wired AND
Only if all nodes transmit recessive bits If any one node transmits a dominant bit
(ones), the Bus is in the recessive state. (zero), the bus is in the dominant state.
T is Transmitter, R is receiver. Note nodes can therefore check the line while
transmitting. This is important particularly during arbitration.
160
Bus Access and Arbitration – CSMA/CD NDA
CSMA/CD NDA – Carrier Sense Multiple Access/Collision avoidance by Non
Destructive arbitration
161
Bus Transmission Speed
Arbitration limits bus speed. Maximum speed = 2 x tpd
tpd = propagation delay of electrical medium
162
The Can Protocol
165
Remote Frame
There's one catch with the Remote Frame: the Data Length Code
must be set to the length of the expected response message.
Otherwise the arbitration will not work.
Sometimes it is claimed that the node responding to the Remote
Frame is starting its transmission as soon as the identifier is
recognized, thereby "filling up" the empty Remote Frame. This is
not the case.
166
The Error Frame
The Error Frame consists of an Error Flag, which is 6 bits of the same
value (thus violating the bit-stuffing rule) and an Error Delimiter, which
is 8 recessive bits. The Error Delimiter provides some space in which the
other nodes on the bus can send their Error Flags when they detect the
first Error Flag.
167
The Overload Frame
It is very similar to the Error Frame with regard to the format and
it is transmitted by a node that becomes too busy.
The Overload Frame is not used very often, as today's CAN
controllers are clever enough not to use it.
In fact, the only controller that will generate Overload Frames is
the now obsolete 82526
168
MAP and TOP PROTOCAL
Manufacturing Automation Protocol (MAP)
• The manufacturing automation protocol (MAP) was developed
by General Motors to meet its manufacturing integration
needs.
Preferred Standards
• Preferred LAN is IEEE 802.4 token-passing bus.
• Uses standard ISO network, transport, session, and
presentation layers
• CNMA has lobbied for the inclusion of Ethernet (IEEE 802.3) as
an
alternative for the standard
MAP Application Layer
• ACSE and FTAM are the same as MAP, MMS is not included
• MOD Bus
Controller Area Network (CAN)
• Cable-bound Transmission:
• Fiber-Optic Cable
• Intrinsically Safe Transmission: PROFIBUS-PA enables the
intrinsically safe transmission and supply of stations across
the bus. The transmission technology is described in
international standard IEC 1158-2.
PROFIBUS Layer 2 (Data Link Layer)
• For write function codes the driver does not itself create a
separate thread.
• Driver does the Modbus I/O immediately in response to the write
operations on the standard asyn interfaces.
• This means that EPICS write operations are asynchronous, i.e.
they do block because Modbus I/O is required.
• When the Modbus driver is created it tells asynManager that it
can block, and asynManager creates a separate thread that
executes the write operations.
Word write operations using the asynUInt32Digital interface (with
a mask parameter that is not 0x0 or 0xFFFF) are done using
read/modify/write operations.
• Allows multiple Modbus clients to write and read single words
in the same block of Modbus memory.
• However, it does not guarantee correct operation if multiple
Modbus clients (or the PLC itself) can modify bits within a
single word.
For write operations it is possible to specify that a single read
operation should be done when the port driver is created.
• This is normally used so that EPICS obtains the current value
of an output device.
Comparison Between Different Types of Field Buses
BACnet: Building Automation Control net.
CAN: Control Area Network.
World FIP: World Factory Instrumentation Protocol.
ISP: Interoperable Systems Project.
CSMA: Carrier Sense Multiple Access.
CR: Collision Resolution.
CA: Collision Avoidance.
CD: Collision Detection.
RF: Radio Frequency.
TP: Twisted Pair (cable).
Coax: Coaxial Cable.
HART
Highway Addressable Remote
Transducer
INTRODUCTION
The HART Communications Protocol is an early implementation
of Fieldbus a digital industrial automation protocol.
Its most notable advantage is that it can communicate over legacy 4-
20 mA analog instrumentation wiring, sharing the pair of wires used by
the older system
HART Protocol is the global standard for sending and receiving digital
information across analog wires between smart devices and control or
monitoring system.
HART is a bi-directional communication protocol that provides data
access between intelligent field instruments and host systems
Smart Field Devices
2. Burst Mode
2. Multidrop Mode
802.4
802.5
Control
Physical Physical
Layer
Layer
• IEEE 802.3 Ethernet LANs
The MAC layer uses CSMA/CD (Carrier Sense Multiple Access
with Collision Detection) technology.
10Base5
• Connections are made using tap to a thick coaxial cable.
• This results in a poor connection between the computer
and the coaxial cable.
10Base2
• This was the most popular 802.3 cable because it was
cheap and there was a good connection between the
computer and the coaxial cable.
10BaseT
• Star topology is used.
• Stations are connected to a hub via two pairs of twisted cable.
• Currently most popular since it is easy to maintain but is more
expensive.
10BaseF
• Good for high speed connections between buildings.
10Base5 10Base2 10BaseT
802.5 Token Ring LANs
The MAC sub layer uses Token Ring Technology.
In a Token Ring LAN, a special bit pattern called the token
circulates around the ring whenever all computers are idle.
When a computer wants to transmit:
• It waits for the token to arrive.
• When it arrives, it removes the token from the ring. There is
only one token so only one computer can transmit at any one
time.
• The computer can now transmit its frame on its output link.
• This frame will now propagate around the ring until it arrives
back at the sender who removes the frame from the ring.
• The sender then regenerates the token and passes it to the next
computer (restarting the above steps).
IEEE 802.5 Frame Format
• Can use any medium twisted pair is cheap and easy to install but
could equally use fiber optic if available.
802.11
Applies to wireless LANs and provides 1 or 2 Mbps
transmission in the 2.4 GHz band using either frequency
hopping spread spectrum (FHSS) or direct sequence spread
spectrum (DSSS).
802.11a
An extension to 802.11 that applies to wireless LANs and
provides up to 54 Mbps in the 5GHz band. 802.11a uses an
orthogonal frequency division multiplexing encoding scheme
rather than FHSS or DSSS.
802.11b
(also referred to as 802.11 High Rate or Wi-Fi) is an
extension to 802.11 that applies to wireless LANs and
provides 11 Mbps transmission (with a fallback to 5.5, 2 and
1 Mbps) in the 2.4 GHz band. 802.11b uses only DSSS.
802.11b was a 1999 ratification to the original 802.11
standard, allowing wireless functionality comparable to
Ethernet.
802.11g
Applies to wireless LANs and provides 20+ Mbps in the 2.4
GHz band.
Thank you