Lec 3 - Module 3 - Updated
Lec 3 - Module 3 - Updated
Technologies
Why „asynchronous‟ ?
It doesn‟t have a clock
Format of Communication
If the baud rate is 4800 and there are 2 bits per symbol, then bit
rate R = 4800 * 2 = 9600 bits/sec
Sequence of Transmission
Stop Parity Data Data Data Data Data Data Data Data Start
Bit Bit Bit 7 Bit 6 Bit 5 Bit 4 Bit 3 Bit 2 Bit 1 Bit 0 Bit
1. The master pulls the slave select low and then issues clock
cycles.
2. The clock frequency is not specified in the SPI protocol and
can be anything from 0 up to 70MHz depending on the
characteristics of the slave device.
3. The data transfer then takes place.
4. The master then de-selects the slave.
If individual shift registers are 8 bit long, after 8 clock cycles data is
transferred from master to slave.
The registers within the master and slave act like shift
registers shifting one bit on every cycle of the SCLK.
SS
Limitations
Require more pins in the IC package
No slave acknowledge
Multi master buses are rare and awkward. Normally
limited to single slave.
ECE4010 Winter 2021-2022 21
I2C Protocol
I2C
I2C : Inter - Integrated Circuit
I2C is a serial protocol for two wire interface to connect low speed
devices
SDA SDA
SCL SCL
Start Stop
Condition Condition
One node “broadcasts” the message and every other node uses it.
Unlike I2C , none of the nodes have address.
The message has a field with identifier, which indicates priority. The
receiving node do an acceptance test for the identifier of the
message to verify if the message is relevant for it.
The identifier ( 11 bit or 29 bit) have a dominant bit (0) and recessive
bit (1). The logic is wired AND.
Next is the 11-bit identifier, which establishes the priority of the CAN
message. The smaller the identifier, the higher the priority of the
message.
The data length code (DLC) nibble signifies how many bytes of data
are in this message.
The end of frame (EOF) signifies the end of the CAN message and
is 7 bits wide, for detecting bit-stuffing errors.
The last part of a CAN message is used as a time delay. This time
delay is precisely the amount of time needed for a CAN controller to
move the received message into a buffer for further processing.
USB1.1
USB 1.1 came out in September 1998. USB 1.1 is also known as
full-speed USB.
Initially all packets are sent from the host, via the root hub and
possibly more hubs, to devices.
Wi-Fi supports very fast data transfer rates, but consumes a lot of
power which makes it unviable for low-power applications.
Infrastructure network
The client communicate through Access Point.
It can send data to any of its slaves and request data from them as
well.
Slaves are only allowed to transmit to and receive from their master.
They can‟t talk to other slaves in the piconet.
The also share a common secret key, which allows them to bond
whenever they‟re together in the future.
It is easily upgradeable.
The NFC software stack is fully integrated into Android, iOS and
Windows, mobile operating systems that natively provide a number
of services, creating the opportunity for many applications to use
NFC without the need to install any specific software
Mesh networking allows for redundancy in node links, so that if one node
goes down, devices can find an alternative path to communicate with one
another.
The power of the mesh, devices tend to connect with every near
device, that makes every node of the network reachable from every
other node and expanding the network geographically, also
providing self healing, if the preferable path to a node fails there are
other path to reach the node. The more devices you have the more
reliable the network is.
#include <EEPROM.h>
EEPROM Read: Read the EEPROM and send its values to the computer.
EEPROM Get: Get values from EEPROM and prints as float on serial.
EEPROM Update: Stores values read from A0 into EEPROM, writing the
value only if different, to increase EEPROM life.
Secure
Self-organizing, self-healing
Interoperable
A Gateway provides
One or more Host Interfaces connecting the Gateway to
backbone networks (e.g., the plant automation network)
One or more Access Points providing the physical connection
into the WirelessHART network
A connection to the Network Manager
Buffering and local storage for publishing data, event notification,
and common commands
Time synchronization sourcing
ECE4010 Winter 2021-2022 111
Network Architecture
Handheld devices
Portable applications used to configure, maintain or
control plant assets.
Typically belong to networks of different standards
Plant Automation Network
Connects client applications to the gateway
Security Manager
Industry standard AES-128 ciphers/keys
The concept was created because engineers felt like the smallest
devices were being left out from the Internet of Things.
This differences are overcome within 6LoWPAN and this allows the system
to be used as a layer over the basic 802.15.4.
The IEEE 802.15.4 devices may use either of IEEE 64 bit extended
addresses or 16 bit addresses that are unique within a PAN after
devices have associated.
For systems where UDP is used the transport layer protocol defined
under RFC 6347 can be used, although this may require some
specific hardware requirements.
Revised twice into version 2.1 which is the 64-bit standard that it is
today.
PCI provides direct access to system memory for the devices that
are connected to the bus which is then connected through a bridge
that connects to the front side bus.
Extensions to the base PCI specification can boost this by a factor of four to
528 Mbytes/sec.
Any device on the bus can be a bus master and initiate transactions. One
consequence of this is that there is no need for the traditional notion of
DMA.
Disadvantages
64 48 48 16 32
Repeater
Hub
As the network cannot set priority for the packets, it is not suitable
for a client-server architecture.