The invention is related to data exchanges using optimized scheduling scheme. More particularly, the invention proposes a way of interleaving data exchanges according to both a first and a second cyclic Ethernet protocol, when for example the second protocol is an updated version (or a next generation) of the first protocol.
Before presenting the main principle of the invention, it is recalled hereafter the principle of operation of a usual cyclic Ethernet protocol (the “first” protocol as defined above), using for example the scheduling scheme specified in standard IEEE 802.1Qbv.
A typical usual cyclic Ethernet protocol network consists of a single control station (Master) and a plurality of slave stations (Slaves). The Medium Access Control is based on a token-passing scheme. Referring to
After the last slave station completes the process (reference S1 pointed by the return arrows of
Of course, that Ethernet protocol uses standard Ethernet frames for data transfers. Three types of frames are usually defined, as shown in
A usual protocol generally includes three communication phases:
A. An initialization phase, used by the Master to establish the token-passing route, i.e. the sequence in which the slaves hold the token and during which:
B. A Refresh Phase corresponding to the actual data exchange phase, during which:
C. A Return Phase where new nodes are detected and included in token passing scheme. The start of a Return Phase is decided by the Master.
The actual process data exchange takes place during the Refresh Phase. The size of the cyclic transmissions of each node is fixed during runtime, as shown in
All Frames are broadcasted: nodes with two ports send all frames to both ports, and switches are used like hubs (making use of broadcast MAC addresses).
The protocol may distinguish different node types, which differ by maximum process data size as well as features such as support of acyclic communication. Among these are:
That type of cyclic Ethernet protocol can be used for example as industrial communication protocols dedicated to field communications, i.e. communications at the bottom of the control chain of a manufacturing assembly line that links the Programmable Logic Controller (PLCs) to the components that perform the actions, such as sensors, actuators, electric motors, console lights, switches, valves and contactors.
An example of that first usual cyclic Ethernet protocol can be the IEC reference 61158-4-23 (data link layer, type 23).
Possible evolutions of usual cyclic Ethernet protocols using typically the scheduling scheme specified in standard IEEE 802.1Qbv might lead to a next protocol generation where finally no token route needs to be established. Examples of such a next generation protocol can be SERCOS III, or else EtherCAT. Instead of dedicating an Ethernet frame for a single data exchanged between a source and a destination, that kind of “second cyclic Ethernet protocol” can concatenate multiple data in a single Ethernet frame. Typically, if a Master M has data to send to Slaves S1, S2 and S3, the three respective data sets are transported in the same frame, which is broadcasted to slaves S1, S2 and S3. Referring to
Data exchanges in both directions, along a line, are still organized in cycles: within one cycle, a frame containing data exchanged between the Master and the slaves, whatever its direction, is transmitted from one end of the line to the other end.
In a line topology, transmission in upstream and downstream direction can be carried out simultaneously.
This communication scheme can make a much more efficient use of the communication medium than previous protocols do and allow for shorter cycles (or equivalent “link scans”).
However, multiplexing both first and second protocols by reserving time slots exclusively dedicated to each protocol would cause the cycles of the second protocol to be dependent on the link scan LS duration of the first protocol, which imposes then possible limits on the control loop performance of the second protocol.
The present invention aims to improve the situation.
The invention proposes to that end a method for transmitting data by hops between communicating entities, said communicating entities comprising:
The first protocol is implemented by a token passing transmission with communication data from the master entity to successively each neighbour slave entity, until the token reaches again the master entity, defining thus a first cycle according to the first protocol (corresponding to a so-called “link scan” in an embodiment described in details below as for an example). More particularly, one current entity of the first group, when receiving an Ethernet data frame, is configured so as to:
The second protocol is implemented by passing an Ethernet data frame including data intended to entities of said second group (directly, without token), one current entity of the second group, when receiving said Ethernet data frame, being configured so as to:
Since these first and second protocols are cyclic, all of these entities can be connected in series, or in daisy chain, like in any network operating a usual cyclic Ethernet protocol.
More particularly, the master entity is configured to support communications according to both first and second protocols, and is configured further to:
In an embodiment, the chosen slave entity is the farthest from the master entity.
For example, that chosen entity can be defined as the farthest from the master entity according to a number of hops between entities to reach the master from that chosen entity. As an alternative example, it can be chosen according to measurement of the fading of a communication link with the master.
As presented above, entities of said first group are configured so as to ignore the content of the data frame according to the second protocol and simply transmit said data frame to a next neighbour entity upon its reception, and reversely in the same embodiment or in an alternative embodiment, entities of said second group are configured so as to ignore the content of the data frame according to the first protocol and simply transmit said data frame to a next neighbour entity upon its reception.
Therefore, each of said communicating entities may then comprise at least two communication ports, and can be configured to manage more particularly:
In an embodiment, moments when:
All the communicating entities can be configured to apply for example an “IEEE 802.1Qbv” type communication protocol, the aforesaid third cycle corresponding thus to a cycle of said IEEE 802.1Qbv type protocol.
In an embodiment, each of said communicating entities can be configured to manage:
A possible advantageous (but not limiting) application is industrial networks, where said communicating entities can be configured so as to operate in an industrial network.
The present invention aims also at a system comprising a plurality of communicating entities, where each entity, belonging to said first group or to said second group, comprises a logical circuit for performing a method according to the invention.
The present invention aims also at a communicating entity of that system, comprising a logical circuit for performing transmissions according to said first and second protocols, as a master entity.
The present invention aims also at a communicating entity of that system, belonging to said first group, and comprising thus a logical circuit for performing transmissions according to said first protocol and for ignoring a content of a data frame according to the second protocol and simply transmitting said data frame to a next neighbour entity upon reception of said data frame.
The present invention aims also at a communicating entity of that system, belonging to said second group, and comprising a logical circuit for performing transmissions according to said second protocol and for ignoring a content of a data frame according to the first protocol and simply transmitting said data frame to a next neighbour entity upon reception of said data frame.
The present invention aims also at a computer program, comprising instructions for performing the method according to the invention, when run by a processor. A general algorithm of that computer program can be illustrated by the chart flow of
The present invention is illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings, in which like reference numerals refer to similar elements.
The invention proposes a multiplexing scheme that avoids having to provision time slots reserved for communications according to a classical cyclic Ethernet protocol (aforesaid “first protocol”), and during which communications according to a possible next generation protocol (aforesaid “second protocol”), would remain “silent”.
As a main principle shown in
Here, the master entity M can handle both the two protocols. Slave entities which can support the second protocol are referenced NGS: namely S2, and S3, while entities S1 and S4 can support only the first protocol.
The Master M starts the link scan according to the first protocol but sends both:
Since the slave entity S1 cannot support the new generation protocol in the example of
In the meantime when the Master entity M starts the link scan LS, the slave entity S3 which:
In a general way, the slave entities which do not support the communication according to the new generation protocol simply ignore the frames according to that new generation protocol and pass them to their neighbour. However, the other slave entities NGS can take in the frames according to the new generation protocol data which are intended to them, as shown in
The communication scheme shown in the example of
More particularly, the assumption is made hereafter that all the entities participating in the mixed first and second protocol network are IEEE 802.1Qbv-capable. For the Qbv implementation in first protocol nodes, each node in the line can be considered as a two-port Ethernet switch with one upstream port U and one downstream port D. The details of each port are illustrated on
The depth (in time) of the gate control list corresponds finally to the Qbv cycle duration.
In this implementation, the time intervals where neither C1 (second protocol) traffic, neither C2 (first protocol) traffic, is transmitted over the port, are used to give transmission opportunities to C3 traffic (best effort).
To further optimize the use of the transmission resource allocated to C3 traffic, pre-emption and segmentation of C3 traffic can be implemented according to IEEE 802.1Qbu/802.3br.
Slots provided for class C3 traffic can comprise any type of communication data (TCP, UDP, etc.).
Regarding now the organisation of the IEEE 802.1Qbv schedule, the interleaving of the communications of both protocol types is established using an IEEE 802.1Qbv schedule that can be computed based on:
In a first approximation, the 802.1Qbv cycle can be defined as the lowest common multiple of 2PTG cycle and 1PTP cycle.
Based on the communication mix example of
Referring now to
If the received Ethernet frame is not a frame according to the second protocol, but rather according to the first protocol (arrow Y from step ST7), the current slave entity can process then the frame in step ST8 and transmit the processed frame according to a token passing transmission in step ST9.
Once the frame(s) according to first and/or second protocol is (are) processed, a test ST11 is performed so as to determine whether the current slave entity is idle (arrow Y) or not (arrow N). In the first case (Y), best effort traffic class data can be processed in step ST12. Otherwise (arrow N from test ST11), if a new frame according to the first or the second protocol has been received and needs to be processed at first according to the transmission schedule control shown in
The invention provides then a mean to offer a performance-efficient transition and/or co-existence between current and future cyclic Ethernet protocols.
Referring now to
The present invention can be embedded thus in such a computer program product (an algorithm of which is described above with reference to
While there has been illustrated and described what are presently considered to be the preferred embodiments of the present invention, it will be understood by those skilled in the art that various other modifications may be made, and equivalents may be substituted, without departing from the true scope of the present invention. Additionally, many modifications may be made to adapt a particular situation to the teachings of the present invention without departing from the central inventive concept described herein. Furthermore, an embodiment of the present invention may not include all of the features described above. Therefore, it is intended that the present invention not be limited to the particular embodiments disclosed, but that the invention include all embodiments falling within the scope of the invention as broadly defined below.
Number | Date | Country | Kind |
---|---|---|---|
17306477 | Oct 2017 | EP | regional |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/JP2018/031259 | 8/17/2018 | WO | 00 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2019/082493 | 5/2/2019 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
5012468 | Siegel | Apr 1991 | A |
6005869 | Sakai | Dec 1999 | A |
7447931 | Rischar | Nov 2008 | B1 |
8559300 | Schulzte | Oct 2013 | B2 |
10628361 | Calvin | Apr 2020 | B2 |
20020110155 | Pearce | Aug 2002 | A1 |
Entry |
---|
Decotignie, “The Many Faces of Industrial Ethernet,” IEEE Industrial Electronics Magazine, vol. 3, No. 1, Mar. 2009, pp. 8-19. |
Ganz et al., “Extending Summation-Frame Communication Systems for High Performance and Complex Automation Applications,” IEEE Workshop on Factory Communication Systems, May 5, 2014, pp. 1-8. |
Number | Date | Country | |
---|---|---|---|
20200287743 A1 | Sep 2020 | US |