1. Field of the Invention
The invention relates to a method for assigning subscribers in a wireless data bus network to time slots in transmission cycles for the data messages in a data bus network.
2. Description of the Related Art
In wireless data bus networks, various methods are used to control access by individual communication subscribers to time slots which are available during the data transmission cycles. Wireless data bus networks involve attempts to attain the most collision-free possible engagement of the time slots with data messages from the individual communication subscribers. In principle, a distinction is drawn between two types of access methods for the purpose of organizing the message traffic.
A first type of access method involves an exclusive access right to a channel or time slot being granted for each communication subscriber. The time slots available in the data transmission cycles are thus each permanently assigned to a particular subscriber. These access methods are also called time-division multiplex methods or Time Division Multiple Access (TDMA). Based on the thus granted exclusive access for each communication subscriber to its own time slot, there is assurance that there are no simultaneous transmissions by different subscribers and hence no access conflicts and message destruction. This is assured even when a wireless data bus network involves communication subscribers for which there is no radio link to one another due to the topological structure of the network or because of temporary shadowing. Such pairs of subscribers, which are “hidden” in radio terms and which cannot “hear” one another, are also referred to as “hidden nodes”. Although such subscribers can each send data messages to a third subscriber, such as to a central gateway, they cannot observe the transmission activities of other “hidden nodes”.
Access methods based on the TDMA principle advantageously have not only absolute freedom from collision but also a deterministic cycle time, i.e., there is maximum latency for the transmission of a message. This has the contrasting drawback that the average latency is designed for the maximum possible data traffic and hence cannot be reduced even when data traffic is temporarily weak or low.
A second type of access method allows, in principle, all the communication subscribers to access a channel or the time slots available in the data transmission cycles simultaneously and to attempt to transmit data messages therein. These access methods are also called Carrier Sense Multiple Access (CSMA) and Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). To avoid collisions, subscribers wishing to access a channel or time slot simultaneously intially monitor the current time slot for a short waiting time to ensure that the time slot has not in the meantime been engaged by another subscriber to transmit a data message. If it is not possible to find any radio transmission by another subscriber at the end of the waiting time, the “listening” subscriber assumes that the time slot is free and engages it by transmitting its own data.
Despite this measure, collisions cannot be ruled out completely, even if the probability thereof is relatively low, since such a case occurs only if two communication subscribers actually start to send data at the same time. The message destruction which occurs in this case is recognized by the transmitters by virtue of missing acknowledgements from the communication receiver, e.g., a network coordinator in the form of a gateway. On account of the need to repeat the failed transmission of the messages, however, large time delays arise.
An advantage of these methods is that the latencies are very short in a wireless communication network in the event of a low load. A disadvantage is that, when the channel load is high, the latencies can become very long due to the repetitions of messages, and it is not possible to determine a maximum latency. This problem is exacerbated if a data transmission network operated in this manner contains “hidden nodes”, i.e., at least one pair of subscribers which, in the event of the transmission of a message to a third subscriber, cannot hear one another. In the case of such subscribers, collisions arise not only in the rare case of simultaneous message starts. On the contrary, they can disturb the transmission by the other subscriber at any time, since they cannot “hear” one another. This significantly increases the frequency of occurences of relatively long latencies.
In radio-based wireless data bus networks, which are used for industrial communication, the data transmission needs to meet the requirements of determinism and real-time capability. The data transmission thus needs to have been concluded in such good time that it is process-compatible, i.e., the execution of a technical process is not disturbed thereby. Furthermore, the maximum cycle times which occur need to be able to be calculated and thus to be as short as possible. Finally, latencies need to be as short as possible, and messages need to be transported via different communication paths with as little delay as possible.
To meet requirements of this type, access methods are frequently used which are a combination of TDMA and CSMA methods. This allows the advantages of TDMA methods, preferably the deterministics thereof, and CSMA methods, preferably the short mean latencies, to be combined. Methods of this type are specified in the Institute of Electric and Electronic Engineers (IEEE) standard 802.15.4, for example. Combined access methods produce only a minimal level of added communication complexity and can advantageously be used for “energy-self-sufficient sensors”, i.e., energy-saving sensors, such as with a local power supply comprising a battery, in automation and process engineering. These methods can also be configured such that dynamic matching to variable connections in the relevant wireless data bus networks is possible, such as matching to movable subscribers, variable channel properties, such as shadowing or gain.
In such a combined access method, the time slots that are available in a data transmission cycle admittedly have a stipulation regarding which subscribers can have the respective time slots, i.e., which subscribers may transmit data exclusively in which time slots. In this context, it is not absolutely necessary for all time slots in the cycle to have been assigned, i.e., there may also be free time slots present. However, if one of the subscribers does not exercise its right to data transmission in the assigned time slot of a data transmission cycle, such as because there are no data for transmission, it is possible for other communication subscribers to engage this time slot competitively on a dynamically changing basis.
A combined access method of the above type allows both the maximum latency of a deterministic system to be implemented and, when engagement is not one hundred percent, the mean latency to be reduced. If there are “hidden nodes” in such a network, however, the advantage of the reduced mean latency can be re-lost if two subscribers attempt to engage a time slot which is not being used by an exclusive user simultaneously and hence cause a collision. A particular problem with such a method is that neither the two transmitters which cannot hear one another nor the receiver know which subscribers are “hidden”. It may even occur that the transmitter is disturbed by a “hidden node” while it is using its exclusive time slot.
It is therefore an object of the invention to provide a wireless data bus network which allows combined assignment of subscribers to time slots in a cycle based on the (TDMA) method, i.e., deterministic communication, and based on the Carrier Sense Multiple Access (CSMA) method, i.e., fast event-controlled communication, such that access conflicts and hence mistransmissions can be avoided even when “hidden nodes” are present.
This and other objects and advantages are achieved in accordance with the invention by providing a method in which access to the time slots by the subscribers in a wireless data bus network is coordinated per transmission cycle using an engagement matrix. This is used to reciprocally deny subscribers which cannot reach one another by radio, i.e., subscribers are “hidden nodes” and hence cannot recognize when the time slot of the respective other subscriber is engaged. Here, respective access to the time slice is assigned to the other subscriber for exclusive use. As a result, it is possible to avoid collisions, occurring statistically more often, which result from a subscriber not being able to detect, due to an interruption in radio contact, that a subscriber is sending data in the exclusively assigned time slot and instead inadvertently assuming that the time slot has become free through non-use.
In an embodiment of the invention, for such subscribers, the time slots which are still free in the engagement matrix, i.e., which are neither assigned nor blocked for exclusive use, are additionally distributed over the two subscribers explicitly without overlaps. This allows even statistically more rarely occurring collisions to be avoided, in which two subscribers which cannot reach one another by radio make simultaneous attempts to engage the time slot of another subscriber which has become free through non-use.
Advantageously, the method in accordance with the invention is performed by a central network interface, e.g., by a gateway which all subscribers can reach by radio, i.e., which is not a “hidden node”. This central network interface manages and possibly updates the inventive engagement matrix automatically at stipulated times, and hence organizes the collision-free allocation of the time slots to the communication subscribers for each message cycle. Consequently, the structure of each message cycle, e.g., the time slice cycle, is defined in a collision-free manner. The engagement matrix firstly records what subscribers have been permanently assigned which time slot for exclusive use and secondly what subscribers cannot reach one another by radio, i.e., cannot “hear” one another and need to be reciprocally decoupled from one another by appropriate access blocks to the time slots of the “invisible” partner. That portion of the engagement matrix relevant to each subscriber in a data bus network is transmitted from the network coordinator to all subscribers. In the event of a free or freed time slot, this reveals to said subscribers whether or not they have authorization to engage this time slot.
The disclosed embodiments of the invention advantageously permit the use of a combination of methods to significantly reduce latencies associated with sending data messages in a data bus network with a combination of TDMA and CSMA/CA access methods.
There are various practices available for forming and possibly updating the engagement matrix.
Thus, a first embodiment involves a central network interface, for example, firstly sending a special transmission request to a selected subscriber, requesting the subscriber to send a data message as a test in a particular time slice, particularly in the time slice which is assigned to the subscriber for exclusive use. Secondly, all other subscribers in the wireless data bus system are requested to attempt to receive the data message transmitted in this time slice. If one of the other subscribers is unable to receive a data message in this time slice, both subscribers cannot reach one another by radio, i.e., there is a “hidden nodes” situation between the selected subscriber and the non-receiving subscriber. The non-receiving subscriber then generates a data message with an appropriate indication and sends the message in the time slot exclusively assigned to it to the central network interface. In accordance with the disclosed embodiments of the invention, the thus automatically detected pair of subscribers which cannot reach one another by radio (“hidden nodes”) is then recorded in the engagement matrix in the manner described above. It should be appreciated that this method step can also be performed with other subscribers so as to cover any other subscribers which cannot reach one another by radio.
The presently contemplated embodiment of the method can advantageously be performed at system startup and advantageously permits the identification of a multiplicity of “hidden nodes” even before the actual startup of a data bus network, and possible collisions can be avoided from the outset. Alternatively, the method can be performed or repeated during productive operation to regularly update the engagement matrix under some circumstances. If appropriate, the engagement matrix can also be reset before an update. As a result, it is possible to prevent pairs of effectively virtual “hidden stations” from being permanently recorded in the engagement matrix after the occurrence of only temporary radio interruptions. Here, it would even be possible for the case to arise in which after a certain time the engagement matrix no longer has any unblocked combinations of subscribers. Engagement of unused time slots by other subscribers based on the contemplated embodiments of the CSMA/CA access method would then be permanently no longer permitted and the advantage of the combination of TDMA and CSMA access methods would be lost.
In another embodiment, the detection of subscribers which cannot be reached by radio (“hidden nodes”) and hence the inventive filling of the engagement matrix can also occur in accordance with the disclosed embodiments of the invention during ongoing operation of a data bus network by dynamically recognizing and analyzing collisions. If the transmission of the data message from one subscriber in a time slot has been disturbed, the subscriber can recognize this from the absence of feedback, particularly from the central network interface, signaling the error-free acknowledgement of the transmission. In the subsequent data message, which is transmitted from this subscriber preferably in the next time slot assigned for exclusive use, the number of the time slot in which the erroneous transmission occurred is then additionally transmitted. It is therefore known which subscriber has this time slot exclusively assigned to it. The sending subscriber and the holder of the relevant time slice are then “hidden stations”. Depending on the occurrence of collision cases, it is therefore possible to configure the engagement matrix in accordance with the disclose embodiments of the invention described above on a piece-by-piece basis. The contemplated embodiment has the advantage over purely time-controlled embodiments in that the engagement matrix can immediately, in the event of a collision occurring, have the causal “hidden node” situation added, but with the discontinuation of a collision in turn not being detected immediately. Therefore, both methods can also be used in combination.
The method in accordance with the contemplated embodiments of the invention is advantageous particularly when the wireless data bus network does not contain static subscribers or when movements occur in the vicinity of subscribers, such as when large objects are transported on conveyor belts. In such cases, “hidden node” situations can arise dynamically between subscribers and can be effectively compensated for by the disclosed embodiments of the method in accordance with the invention. If, in such a case, the surroundings in which the wireless data bus network is being used adopt different states, it is also possible to manage a plurality of special engagement matrices optimized therefor and to activate them depending on the state of the installation. A particular advantage is the use of the contemplated embodiments of the method in accordance with the invention even for data bus networks in which a merely low throughput of data messages occurs relatively often (low channel load). Thus, exclusively assigned time slots can be released by the respective subscribers and hence engaged by other subscribers relatively often. In addition, the contemplated embodiments of the method in accordance with the invention can also advantageously be used for data bus networks which have a relatively large number of subscribers. Here, the number of time slots per transmission cycle and hence the cycle times are large anyway in this context. Consequently, it is advantageous to use the contemplated embodiments of the method in accordance with the invention to prevent, as far as possible, data messages from being destroyed by collisions between subscribers which cannot be reached by radio.
Other objects and features of the present invention will become apparent from the following detailed description considered in conjunction with the accompanying drawings. It is to be understood, however, that the drawings are designed solely for purposes of illustration and not as a definition of the limits of the invention. It should be further understood that the drawings are not necessarily drawn to scale and that, unless otherwise indicated, they are merely intended to conceptually illustrate the structures and procedures described herein.
The invention and advantageous embodiments thereof are explained with reference to examples which are shown in the Figures indicated briefly below, in which:
In the example of
Such collisions can be avoided using the method in accordance with the invention. This is explained with reference to
Nevertheless, there are rarely occurring exceptional situations in which a further type of access conflict can arise.
In an advantageous embodiment, the method in accordance with the invention is also used to avoid this type of access collision. This is explained with reference to the continuing
In addition, the further time slots are divided between the two subscribers B, E in the engagement matrix as per rows 2 and 5. This is symbolized by appropriate engagement blocks “x”. Thus, time slots A, C are additionally blocked in the second row for subscriber B, and accordingly time slots D and F are additionally blocked in the fifth row for subscriber E. This allows collisions as per the example in
The method in accordance with the contemplated embodiment of the invention can be used even when more than one time slot is permanently assigned for an actively communicating subscriber, or in principle unassigned, vacant time slots are present in each transmission cycle. Advantageously, the engagement matrix is managed by a central element in a data bus network, e.g. by a gateway which all subscribers can reach by radio.
The method in accordance with the contemplated embodiments of the invention can be used even if a wireless data bus network should contain more than one pair of subscribers which cannot reach one another by radio.
Thus, while there are shown, described and pointed out fundamental novel features of the invention as applied to preferred embodiments thereof, it will be understood that various omissions and substitutions and changes in the form and details of the illustrated apparatus, and in its operation, may be made by those skilled in the art without departing from the spirit of the invention. Moreover, it should be recognized that structures shown and/or described in connection with any disclosed form or embodiment of the invention may be incorporated in any other disclosed or described or suggested form or embodiment as a general matter of design choice.
Number | Date | Country | Kind |
---|---|---|---|
EP 09161516 | May 2009 | EP | regional |