1. Field of the Invention
The present invention relates generally to projectiles, and more particularly, to projectiles having a casing and/or interior that act as a communication bus between at least two components of the projectile. For purposes of this disclosure, a projectile is any flying object, such as munitions, rockets, or aircraft. Also for purposes of this disclosure, a communication bus is anything that transmits one or more signals between two or more components. Such transmission may be one-way or two-way. Thus, the transmission may be a simple point-to-point link between two components or a point to many links between several components. Furthermore, the transmission may be such that the transmitted signal(s) are available to any components on the communication bus. Still further, the communication bus may be more than one media, such as a waveguide, potting material, and/or free space in the casing (including the casing itself).
2. Prior Art
Projectiles typically have a casing or shell in which electronic/electrical components are housed. The electronic/electrical (collectively referred to hereinafter as “electronic” or “electronics”) components communicate with each other and/or other devices via internal wiring (which includes printed circuit boards). While the wiring has its advantages, it suffers from certain disadvantages such as susceptibility to noise, brittleness, potential for high bit error, takes up a large amount of space in the interior of the casing or shell, can be fragile particularly when subjected to high-g loads, and can suffer from poor connections. In addition, the process of projectile assembly with wiring is cumbersome and time consuming, thereby costly, particularly since in general, numerous components have to be assembled into relatively small spaces. These disadvantages are amplified in certain devices that house electronic components and operate in harsh environments and under high accelerations.
It is an object of the present invention to provide a projectile that overcomes the disadvantages of the wiring used to link components in projectiles having electronic components.
Accordingly, an optical wireless communications network protocol for use in low latency, deterministic environments is provided. The protocol employs a hybrid (star/mesh) architecture in which a controller node coordinates communications in a star fashion between data nodes that communicate in a mesh network. The controller node ensures positive handoff in all node-to-node communications such that one node cannot dominate the network and further ensures that any node-to-node communication that requires deterministic timing can be met with timing certainty.
Advantages of embodiments of the OWC network protocol include robustness, low cost and improved performance in low latency deterministic operating environments that demand timing certainty. Low cost and improved reliability is achieved through the use of “off-the-shelf” optical transceivers which significantly improves EMI performance as compared with wired approaches. Low cost may also be achieved, in one embodiment, through the use of the structural elements of a munitions as a transmission media (i.e., optical waveguide). The network is deterministic by virtue of network design and a-priori knowledge of key parameters prior to the time of assembly of the munitions.
These and other features, aspects, and advantages of the apparatus and methods of the present invention will become better understood with regard to the following description, appended claims, and accompanying drawings where:
Although the invention is particularly suited to infra-red or optical signal communication between electronic components, such is discussed by way of example only. Those skilled in the art will appreciate that other communication means can also be utilized, such as ultrasound.
Referring now to
At least one transmitter 110 is arranged on the waveguide portion 108 or proximate thereto such that an optical signal can be transmitted to the waveguide portion 108. The transmitter 110 can be integral with a corresponding electronic component 112 or connected thereto. At another location on the waveguide portion 108 are located detectors 114 for detecting the optical signals in the waveguide portion 108. Each detector 114 is either integral with or connected to another electronic/electrical component 116. Thus, those skilled in the art will appreciate that any component can communicate with another component through the waveguide portion 108, which acts as a communication bus. Of course, each of the components can have both a transmitter 110 and detector 114 such that a two-way communication can be achieved. Although not shown, multiplexers and demultiplexers can be used such that certain components can operate at selected frequencies and/or wavelengths and not interfere with other components on the bus. The components, such as the transmitter 110 and detector 114 can be fastened to the waveguide portion 108 in a number of ways, such as those also disclosed in co-pending U.S. application Ser. No. 10/639,001, filed on the same day herewith) entitled Device Having A Casing Acting As A Communication Bus Between Electronic Components, the entire contents of which has incorporated herein by its reference.
Those skilled in the art will also appreciate that the interior is not cluttered with components and internal wiring resulting in more components being able to occupy a given interior size or the projectile 100 being made smaller than a conventional projectile having the same number of internal components. Other advantages include:
*The optical transmission provides robust, interference free channels between physically disconnected components/systems;
*The optical transmission is naturally resistant to very high g-loads and harsh environments;
*For shorter distances between the transmitter and receiver encountered in projectiles, the system is inexpensive and an extremely low bit rate error (better than 10−12) can be readily achieved; and
*Eliminates the need for wires and related problems and space requirements.
*Ease of assembly because two parts can be attached or even screwed together easily, which is very difficult with wires running from one part to the other.
Alternatively, ultrasound can be used to communicate between the internal components. In which case, the shell or a portion thereof needs to be able to carry an ultrasound signal between components. Such a shell, or portion thereof, may be constructed from a suitable metal. In the case of ultrasound, an ultrasonic generator is used to place signals on the “bus” (shell) and a corresponding ultrasonic detector detects the ultrasonic signals and relays them to an appropriate component. As discussed above with regard to the optical signal configuration, each component can have both an ultrasonic generator and detector such that two-way communication between components is possible and multiplexers and demultiplexers can be utilized such that certain components can operate at selected frequencies and/or wavelengths and not interfere with other components on the bus.
Referring now to
IR technology is well known in the art, particularly in the art of remote control of electronic consumer goods. The IR data association (IrDA®) has standards for communicating data via short-range infrared transmission. Transmission rates fall within three broad categories SIR, MIR and FIR, SIR (Serial Infrared) speeds cover transmission speeds normally supported by an RS-232 port. MIR (Medium Infrared) usually refers to speeds of 0.576 Mb/s to 1.152 Mb/s. FIR (Fast Infrared) denotes transmission speeds of about 4 Mb/s. The standard has been modified for faster transmission speeds up to 16 Mb/s (referred to as very fast Infrared VFIR). Although not preferred, visible light, for example from a laser diode, may also be used to transmit communication signals through the potting material 202.
The transmitters 206 may be carried on printed circuit boards 210 which may also be encased in the potting material 202 or disposed freely throughout the potting material 202. The printed circuit boards each 210 preferably carry their own power supply, such as a battery 212 to eliminate internal wiring. Alternatively, the batteries may be charged as discussed below through the casing 201 by directing energy into the casing 201 with a charging cap. Each of the electronic/electrical components 204 has a receiver 208 for communicating with the transmitters 206. As discussed above with regard to the first embodiment, each of the electrical/electronic components 204 preferably have a receiver 208 and a transmitter 206 such that they can carry out a two-way communication. An example of such a transceiver module 300 is shown in the schematic diagram of
The casing 102 can also be provided with a window portion 403, as shown in
The window 403 can also be utilized to partially power a capacitor, rechargeable battery, or electric power storage device in the interior of the projectile, particularly for the purpose of transmitting required data. Thus, a power storage device can be charged, at least partially, thru the window 403 to enable transfer of data. The charging signal transmitted through the window may be modulated to transmit data as well.
Referring now to
Before addressing characteristics of an optical wireless communications (OWC) network protocol of the present invention, implementation aspects will first be addressed, such as those described above (i.e., projectile).
The network in which the OWC network protocol operates includes a group of nodes interconnected by a transmission medium. In a preferred embodiment, the term “node” refers to the various electronic/electrical components in a projectile (i.e., munitions) having a casing housing, as described above. The transmission medium that links each node in the network comprises at least a portion of the projectile casing, as described above. Signals transmitted over the transmission medium in accordance with the OWC protocol may be transmitted, for example, as optical signals or RF signals. The network nodes may have a capability for signal transmission and reception (e.g., a control processor), signal transmission (e.g., a guidance processor) or signal reception (e.g., actuator).
OWC Network Protocol Overview
The OWC network protocol is intended as a robust, low cost, optical network for deterministic network and point-to-point communication suitable for use in both commercial and non-commercial environments. Typical commercial environments may include, without limitation, cell phones and computers that employ an optical network upon which electronic components are connected, such as those disclosed in co-pending U.S. application Ser. No. 10/639,001 filed on Aug. 12, 2003, the entire contents of which is incorporated herein by reference. Military environments include, for example, control applications that support internal communications within the confines of a munition (projectile), as described above. The OWC network protocol is ideally, but not exclusively, suited to an internal munitions environment in that the network protocol is deterministic and the network includes a limited number of nodes. As will be described below, the deterministic nature of the OWC network protocol is a function of the network design and apriori knowledge of key parameters prior to the assembly of the munitions.
The OWC network protocol is ideally suited to support internal communications within the confines of a munition for a number of reasons including, low cost, a capability of meeting the performance constraints of the environment, improved reliability and usability and robustness. Low cost is achieved through the use of “off the shelf” IrDA optical transceivers in addition to utilizing the structural elements within the munition as an optical waveguide. Improved network performance is achieved by virtue of exploiting the small physical size of the network as compared with most other networks. Improved reliability and usability is achieved through the use of optical transceivers as compared to wiring harnesses in a high “g” environment. Network robustness is achieved in the OWC network protocol by virtue of its simplicity and error recovery schemes.
OWC Physical Layer
In one embodiment, the OWC physical layer utilizes low cost “off-the-shelf” IrDA optical transceivers and a custom MAC chip as interfaces to the respective nodes. As is well known, IrDA optical transceivers employ infrared ports and are used in a wide variety of devices ranging from personal computers, printers to mobile phones. The Infrared ports of such devices comply with specifications defined by the Infrared Data Association (IrDA). One benefit of using low cost optical transceivers which replace the traditional wiring harnesses is that the low cost optical transceivers significantly improves the EMI performance. In certain embodiments, optical transceivers having characteristics different than the characteristics of the IrDA optical transceiver may be used. Certain embodiments may also utilize RF transceivers.
OWC MAC Layer
The OWC MAC layer runs above the OWC Physical layer and is configured to construct OWC packets, such as the one described in
OWC Network
Referring now to
In an embodiment, the OWC network protocol supports a 16 node address space. Higher address spaces may be supported in applications that accommodate higher data rates.
In the embodiment, a 16 node address space results from the use of the IrDA optical transceivers and a small media access control (MAC) chip as interfaces to the respective nodes (12-19). In the most recent generation of IrDA transceivers, IrDA defines data rates at either 4 MB/s or 16 MB/s. It is well known that the address space can be any power of 2, i.e., 2N, for N=1, 2, 3, and so on. For example, for N=3, the address space is 8 nodes and for N=4, the address space is 16 nodes. In the preferred embodiment, 16 nodes in combination with an IrDA data rate of 16 MB/s provides the best allocation of bandwidth amongst the 16 nodes. However, this combination also limits the maximum data rate for node-to-node communications to 16 MB/s.
In the embodiment, the 16 node address space may be configured in different ways. One way of configuring the 16 node address space is to utilize a single controller and up to 15 non-controller nodes.
The network topology of
Sequential Grant Access Protocol
Sequential grant access protocol is a feature of the OWC network protocol for determining the sequence or order and manner by which the controller 10 polls the respective network nodes (12-19) to grant access to the network 500.
In operation, the controller 10 sequentially polls the respective network nodes 12-19 in a pre-determined sequence to grant the nodes 12-19 access to the network to conduct node-to-node data communications with another node in the network 500. The controller 10 uses a control message to grant such access. The “access grant” is the mechanism used by the controller 10 to poll or query each network node to determine whether a node 12-19 has a need to communicate data to another node 12-19 in the network 500. It should be understood that the grant process occurs with a much higher frequency than the nodes need to communicate.
The polling sequence is determined prior to system operation, during a system configuration stage, at which time the controller 10 constructs a “grant” list. The “grant” list is a list of the polling order of nodes to be performed in a sequential cyclical manner. An exemplary “grant” list which may be constructed by the controller 10 for the hybrid network 500 of
Grant list={13, 18, 15, 12, 20, 19, 14, 17, 16}
In the exemplary “grant” list shown, controller 10 polls the respective network nodes in the order shown to determine whether each node (12-19) has a need to communicate data to another node in the network 500.
A polled node may respond to the “grant” access offered by the controller 10 in two ways. One possible response of the polled node is to deny the “grant access” offered by the controller 10. In this case, the polled node responds to the “grant” access by sending back, for example, a “NAK” message to the controller 10. A denial occurs when a polled node does not have a need to transmit data to another node in the network 500 at the specific point in time that the “grant access” was received from the controller 10. Upon receiving a denial to the “grant access” at the controller 10, the controller 10 then proceeds to poll the next node in the “grant” list. The second possible response from the polled node to a “grant access” offered by the controller 10 is to accept the “grant access”. In this case, the polled node has a need to transmit data to another node in the network 500 and responds to the “grant” access with an acknowledgement accepting the grant access, such as, for example, an “ACK” message.
Flow Diagram
Referring now to
At activity 605, the controller 10 accesses a grant list created during a system configuration stage.
At activity 610, the controller 10 polls an Ith non-controlling node (where I=1 to # nodes in the grant list) to provide “grant access” to the Ith non-controlling node to allow or permit the Ith non-controlling node to transmit data to an intended receiving node in the network 500.
At activity 615, it is determined whether the Ith non-controlling node accepts or denies the “grant access” provided by the controller 10.
At activity 620, when it is determined that the Ith non-controlling node denies the “grant access”, the Ith non-controlling node responds by transmitting a control message back to the controller 10 indicating denial of the “grant access” (see Table III, control message—0×03). The process then returns to activity 610.
At activity 625, when it is determined that the Ith non-controlling node accepts the “grant access”, the Ith non-controlling node begins to transmit a data packet to an intended destination node in the network 500. It should be understood that the data packets are constructed from the buffer contents prior to the non-controlling accepting a grant access.
Deterministic Protocol
The amount of data that the controller 10 permits to be transmitted across the network by a node receiving a “grant access” is a function of both the latency requirements of the intended receiving node and a parameter referred to herein as a “grant increment”, to be described as follows
The OWC network protocol of the invention is a deterministic protocol that strictly defines the amount of data that a node may transmit whenever the node accepts a “grant access” from the controller 10.
The deterministic protocol differs from so-called ‘ad-hoc’ protocols, such as used in the Internet, in that ‘ad-hoc’ protocols do not demand a guaranteed latency in communications between nodes. Deterministic protocols, by contrast, demand timing certainty. To achieve such timing certainty in the OWC network of the invention, certain parameters are established during system configuration.
A first parameter established during system configuration, directed towards achieving timing certainty relates to bandwidth allocation. Specifically, during system configuration, each node in the network 500 is allocated a fixed percentage or slice of the overall fixed network bandwidth based on that nodes estimated data transmission needs. For example, in many munition applications there can be a large difference in the data transmission requirements for different node elements. In a munitions application, an imaging sensor, for example, might need to send 1 MB/s whereas a control actuator might only require 5 kB/s or 10 kB/s. Bandwidth allocation is a desirable feature which overcomes limitations that are characteristic of most ‘ad-hoc” networks, such as the Internet. A drawback of networks, such as the Internet, is that the node requiring large bandwidth can completely dominate the network's resources, making it impossible for the lower bandwidth nodes to gain the access they need in a timely fashion. The OWCM protocol of the invention is designed such that large bandwidth nodes can meet their data requirements, but not at the expense of low bandwidth nodes.
Table I illustrates, by way of example, how the total fixed network bandwidth may be allocated among the various nodes 12-19 in the network 500 of
As shown in Table I, the node's data transmission needs are estimated during system configuration. It should be appreciated that once the respective bandwidth allocations are determined, a node may not thereafter borrow bandwidth from another node. However, as shown in the last row of Table I, the system typically includes extra unaccounted for bandwidth (i.e., slack) which may, in certain embodiments, be borrowed by a node when its instantaneous transmission needs exceeds its pre-determined bandwidth allocation. Further, in the occurrence that a network node fails, for whatever reason, its bandwidth allocation may be dynamically re-allocated to one or more network “live” nodes based on a pre-defined re-allocation scheme established during system configuration.
Grant Increment
A second parameter directed towards achieving timing certainty relates to, what is referred to herein as a “grant increment”. A “grant increment” is a system parameter created during system configuration that defines the amount of bandwidth that will be made available to each node to perform a data communication with another node at a particular polling interval in response to a “grant access” provided by the controller 10. It should be understood that while each node is allocated some percentage of the total bandwidth as defined above (bandwidth allocation), at each polling interval, the amount of data that a node may transmit to another node in response to a “grant increment” is bound by the “grant increment” parameter value, as will be described below. In other words, the “grant increment” parameter is the limiting factor in determining the amount of data that may be transmitted at a particular polling interval, independent of the bandwidth allocation for the transmitting node.
The grant increment parameter value is preferably calculated by dividing the fixed overall network bandwidth by a divisor that is typically on the order of 10 times the number of nodes in the network. By way of example, for the exemplary network of
Grant increment=(10 MB/s)/(80)=125 kb/s [1]
It should be appreciated that there is flexibility in determining what value to use in the denominator of equation [1].
In operation, the controller 10 sequentially polls the network nodes to offer “grant” accesses in accordance with the sequential grant access protocol described above. Whenever a node accepts a “grant access”, that node is permitted to transfer data to another node in the network. The amount of data the node is permitted to transfer in response to the “grant access” is defined by the “grant increment” parameter value. For example, if a node wishes to transmit 540 kb/s of data to another node, upon receiving a “grant access” from the controller 10, the node may transmit 125 kb/s (the grant increment) of the 540 kb/s to be transferred. A single data transfer of 125 kb/s represents approximately 23% of the 540 kb/s of data to be transferred. The remainder of data is transferred in response to one or more subsequent “grant accesses” from the controller. It should be understood that subsequent grant accesses enabling transfer of the remaining data may occur in the same cycle of operation or over multiple cycles of operation as determined by the “grant” list. This is illustrated by way of example as follows.
Grant list “A” illustrates an exemplary grant list that offers node 12 three consecutive grant accesses in each cycle of operation. Assuming, for example, that node 12 needs to transfer 540 kb/s of data, 375 kb/s of data can be transferred in three consecutive grant accesses, where each grant access permits the transfer of 125 kb/s of data in accordance with a grant increment parameter value of 125 kb/s.
Grant list “A”={13, 18, 15, 12, 12, 12, 20, 19, 14, 17, 16}
In this case, node 12 would wait for the next cycle of operation to transfer any remaining data.
By contrast, grant list “B” illustrates an exemplary grant list that offers node 12 one grant access in each cycle of operation. Therefore, assuming that node 12 needs to transfer the same 540 kb/s of data, 125 kb/s of data can be transferred in each cycle of operation. As such, node 12 requires at least 5 cycles of operation to transfer the entire 540 kb/s of data.
Grant list “B”={13, 18, 15, 12, 20, 19, 14, 17, 16}
The number of grant accesses offered to a node in a single cycle of operation depends upon a number of factors including, without limitation, the latency requirements of an intended receiving node, signal priority and error recovery.
The controller 10 is configured to calculate, during system configuration, with a high degree of certainty, the number of grant accesses required to transmit each nodes entire data payload. Using the instant example, for a data transmission requirement of 540 kb/s, the controller 10 calculates apriori that 5 data “grant” accesses are required at a minimum to transmit the 540 kb/s given a grant increment value of 125 kb/s. While the data requirements of each node is known beforehand with some certainty, the system includes provisions for making dynamic reconfiguration changes during operation in the event of unforeseen occurrences such as damage to a node.
Overall Packet Structure
The format or structure of packets used to formulate the signaling protocol implemented by the present invention are presented below. It should be understood that the protocol is extensible and different packet structures are within contemplation of the invention. The OWC packet structure are labeled as, or divided into, different “packet types” in terms of their function in the overall packet structure (e.g., commands, data, checksums, start/stop packets). As will be readily apparent, the packets may have pre-selected lengths or have variable or dynamically changeable lengths depending upon their respective functions. The packets could also bear differing names, although the same function is still realized, as can occur when protocols are changed during acceptance into a standard. The bytes or byte values used in the various packets are configured as multi-bit (8- or 16-bit) unsigned integers. A summary of the packets being employed along with their byte-count is shown in Table II.
Each of the fields of the OWC packet structure 300 are defined as follows:
1) Start of Frame (SoF) field—consists of the bit sequence “0000 0010” (or 0×02 in hex). The SoF field enables receiving nodes to align their timing and prepare for the remaining packet bits in the packet structure. It should be understood that that network timing is determined by the “grant” allocation process. Network timing occurs on several different levels. A fundamental network timing issue is to synchronize bit timing at each receiving node. Because the OWC protocol is a wireless protocol, there is no opportunity to send a wired “clock” signal to each node. As such, the “clock” for synchronizing the network timing must be included as part of the transmitted signal. In other words, each node adjusts its internal timing to the bit level transitions of the optically encoded bit transitions of the SoF field of the optical signal being transmitted. It should be understood that while the OWC packet structure is optically encoded prior to transmission over the OWC network 500, the bit level transitions referred to are bit level transitions after the optical signal is received at a receiving node and converted into an electrical signal at the receiving node. The “low to high” and “high to low” transitions of the electrical signal become the mechanism for aligning the internal clock signals of the respective nodes.
2) Destination Address (Dst Address)—each node in the network is given a unique node address consisting of four bits, which corresponds to 1 of 15 specific nodes and a controller node. The address 0×00 is typically given to the controller, however, it is not mandatory to do so. Further, in certain embodiments that do not utilize a controller, a single address (e.g., 0×0F) can be assigned or designated as an all nodes address.
3) Packet Type—the OWC packet structure defines six packet types that may be encoded into the 4 bit (½ byte) packet type field. Five of the six packet types consist of control functions and the sixth consists of a data packet. Table III describes the various packet types
4) Payload Size—the payload size field describes the number of data bytes in the payload (i.e., data) field (1 to 256).
5) Checksum—the checksum field provides an easily encoded and decoded error correction checksum for the control bits. As shown, the control field 30 begins after the SOF delimiter field and consists of the 16 bits that collectively make up the destination address field (4 bits), the packet type (4 bits) and the payload size (8 bits). If the checksum field indicates that any part of the destination address field and/or the packet type field and/or the payload size field is corrupt, the receiving node will discard the received packet. The type of error recovery performed is determined by the applications layer of the node sending the packet.
6) Payload Data Bits—a data packet can be up to 256 bytes in length (2048 bits). Whenever a control packet is to be transmitted, the payload data is zero bytes.
7) CRC16—If the payload field includes data, error correction is performed using a CRC-16 polynomial. A CRC failure results in a NAK response to the originating node.
8) End of Frame (EoF)—the End of Frame (EoF) packet consists of a unique hex number (e.g., 0×03) that is preferably selected based on its uniqueness from any of the remaining control or data bits by virtue of Base64 encoding.
Failure Recovery
Recovery from errors in the system is highly application dependent. For example, failure recovery from an actuation signal is different than failure recovery from imaging data. In the former case, the most expedient failure recovery may be to just throw out the data, while in the latter case, a retransmission is required.
The most likely mechanism for a failed packet is a CRC-16 failure. The CRC-16 field is described above and illustrated in
Another mechanism for a failed packet is a failed checksum. In the case of a failed checksum, the receiving node takes no action, the result of which is a timeout. For example, if a polled node receives a grant from the controller and responds by transmitting data to an intended receiving node, the polled node expects to receive either a NAK or ACK packet from the receiving node. If, however, the receiving node, fails the checksum, it takes no action. After a suitable timeout (e.g., an amount of time equivalent to the receiving node transmitting an ACK control packet) both the polled node and controller recognize the checksum failure and the controller transmits a grant packet to the next node on the grant list. Also, the polled node sends an appropriate communications failure message from the MAC to the polled node's applications software.
A third mechanism for a failed packet is a dead (silent) node. Silent nodes are ignored by the system. In the event a controller makes repeated attempts to transmit to a dead (silent) node, after a predetermined number of attempts, the controller will assume that the node is damaged and will no longer attempt to provide grants to the dead node. This frees up bandwidth for the remaining nodes in the network.
Consider the case of a projectile (i.e., munition) being developed that has a requirement for 8 nodes. Four of the nodes are transmitting nodes and the remaining four nodes are receiving nodes. Each of the respective nodes are optically connected in accordance with a star/mesh network configuration. The four transmitting nodes comprise:
The four receiving nodes comprise:
The two processor nodes, i.e., CTL1 and CTL2 are configured to send control data at a 5 kb/s data rate to their respective actuators. The processor, CTL3, is configured to send guidance information at 10 kb/s and the imaging sensor, IMG1, configured to send a 64×64 bit data array with a gray scale value of 8 bits at 10 frames/sec to an image processor. The imaging sensor, IMGI, thus sends data to the image processor at a rate of 327,680 bits/sec.
The system operates at a standard IrDA data rate of 4 MB/s. After initialization, the controller sends access grants to the respective transmitting nodes in accordance with a grant list determined apriori.
grant list=[CTL3, CTL1, CTL2, IMG1]
At each transmitting and receiving node, the data is buffered to meet the latency requirements of the system and to meet the natural generation rate of the transmitting node. For example, data is buffered at nodes CTL1, CTL2 and CTL3 in 8 bit increments, however, CTL3 transmits at a different rate than CTL1 and CTL2, i.e., CTL3 transmits every 0.8 ms as compared to every 1.6 ms for CTL1 and CTL2.
In general, the OWC network protocol satisfies the system requirements of the intended application by ensuring that the net effective data rate is met node-to-node communication and the latency of transmitted data is appropriate for the type of data being transmitted. As an example of satisfying these two requirements, CTRL1 and CTRL2 require data rates of 5 kb/s and the data being transmitted must arrive at the corresponding receiving nodes (i.e., the actuators) in a time interval consistent with controlling the actuators.
While there has been shown and described what is considered to be preferred embodiments of the invention, it will, of course, be understood that various modifications and changes in form or detail could readily be made without departing from the spirit of the invention. It is therefore intended that the invention be not limited to the exact forms described and illustrated, but should be constructed to cover all modifications that may fall within the scope of the appended claims.
This application is a Continuation-In-Part application of U.S. application Ser. No. 10/638,996 filed on Aug. 12, 2003, the entire contents of which is incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
Parent | 10638996 | Aug 2003 | US |
Child | 11080260 | Mar 2005 | US |