Vous êtes sur la page 1sur 11

Using ARCNET for industrial

and embedded networking


applications
Frederick Weber

Don He

Director of Strategic Marketing


Standard Microsystems Corporation (SMsC)

Product Manager
Contemporary Control Systems, Inc.

1. Overview
As we gain momentum in the millennium, the possibilities with
regard to network protocols are endless. This paper examines
the basic specifications of several major network protocols such
as Ethernet and ARCNET and the benefits of implementing a
token-passing protocol for industrial applications. When selecting a network protocol for Embedded or Industrial applications
the key point to consider is the networks ability to manage
real-time events. Specifically, each node needs to guarantee the
maximum waiting time to communicate. Additionally, design
considerations like data integrity, throughput, flexible topology interface and synchronization play a major role in the selection process and their performance characteristics are well
suited for control. With the emergence of a host of protocols in
recent years, the token-passing scheme is the best solution for
industrial applications because its deterministic performance
ensures that controlled events occur when they must.

that it is okay to transmit. Both stations start to transmit


frames of data at slightly different times.
2. Their signals propagate away from the points of origin
toward the ends of the wire.
3. The signals collide. Station C, being the nearest transmitting station to the point of collision, detects the collision first and starts broadcasting jamming signals.
4. Station A receives the jamming signal before it finishes
transmitting its data. Now both stations A and C are aware
that a collision has corrupted their transmissions. Both
will now back off and try their transmissions again.
Data delivery to the address is not guaranteed in this method.

2. Network Protocols
2.1 Ethernet
Xerox s Palo Alto Research Center (PARC) developed Ethernet
(the 2.94 Mbps version) in the early 70s. Ethernet is a descendent of early network technologies, including the ALOHA network. The design objective was to create a simple yet efficient
and inexpensive LAN architecture. Ethernet made its commercial debut in 1980 as the collective product of Xerox, Digital
Equipment Corp., and Intel, which boosted the speed of Ethernet
to 10 Mbps. An improved Ethernet II was released in 1982. By
1985, the Institute of Electrical and Electronic Engineers (IEEE)
developed open network standards through the 802 Working
Committee and formed its 802.3 Committee. The 802.3 Committee published the IEEE 802.3 Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and
Physical Layer Specifications.
Ethernet is based on CSMA/CD, which means multiple
nodes can transmit over a single wire.
The graphic below illustrates Ethernets collision detection
and recovery mechanism:
1. Both stations A and C sense the network wire for an ongoing transmission. Sensing none, both stations decide

The formats for an Ethernet and an 802.3 frame are shown


in the chart below. The two used in industry are similar. Both
can be used on the same network. Ethernet devices can distinguish the two types of Ethernet frames. The function of each
field within the frames is described below.

2.2 CAN
CAN employs CSMA/CA (Carrier Sense Multiple Access/
Collision Avoidance). Medium access control is accomplished
using a technique called non-destructive bit-wise arbitration.
Individual nodes brand messages with a unique identifier,
sending their data onto the network. This allows the node to
track the data to ensure successful transmission. If successful
International IC China Conference Proceedings 453

transmission does not occur, the station assumes that a higher


priority message is being sent. Therefore, it halts transmission
and reverts to receive mode. The highest priority message gets
through and the lower priority messages are re-sent at another
time.
This approach has one primary advantage. Collisions on the
network do not destroy data and eventually all stations gain
access to the network. Unfortunately, this approach creates a
problem. The arbitration is done on a bit-by-bit basis requiring
all stations to hear one another within a bit-time (actually less
than a bit-time). At a 500 Kbps bit-rate, a bit-time is 2000ns
which does not allow sufficient time for transceiver and cable
delays. The result is that CAN networks are usually quite short,
frequently less than 100 meters in length at higher speeds. To
increase this distance either the data rate is decreased or additional equipment is required.
The formats for a CAN standard frame are shown in the
chart below.

2.3 ARCNET
The Datapoint Corporation introduced ARCNET the (Attached
Resource Computer Network) in the late 70s which employs a
Token-Passing protocol. The ARCNET protocol has been a
premier choice for embedded designers since the mid-80s. Originally designed for office automation, ARCNET has found its
niche in industrial and embedded real-time applications.
ARCNET is the ideal solution for applications where a deterministic protocol is preferred or required. This deterministic
protocol, based on a token-passing scheme, guarantees delivery of data within a predetermined time frame. ARCNET continues to be a quiet success story in Industrial and Embedded
markets given its high fault tolerance, flexibility to interface
easily with various media, host processors and industrial temperature range. It is suitable fieldbus technology.
A token (ITT) is a unique signaling sequence passed in
an orderly fashion among all the active nodes in the network.
When a particular node receives the token, it has the sole right to initiate a transmission sequence
or it must pass the token to the
next logical node. This neighbor, which can be physically
located any where on the network, has the next highest address to
the node with the token regardless of the networks physical
topology. Once the token is passed, the recipient also has the
right to initiate a transmission. This token-passing sequence continues in a logical ring fashion serving all nodes equally. Node
addresses range from 0 to 255 with 0 reserved for broadcast
messages.
In a transmission sequence, the node with the token becomes
the source node. Any other node selected by the source node
for communication becomes the destination node. First the
source node inquires if the destination node is in a position to
accept a transmission by sending a Free Buffer Enquiry (FBE).
The destination node responds by returning a Acknowledgement
(ACK) meaning that a buffer is available or by returning a Negative Acknowledgment (NAK) meaning that no buffer is available. Upon an ACK, the source node sends out a data transmission from 1 to 507 bytes of data (PAC). If the data was properly
454 International IC China Conference Proceedings

received by the destination node as evidenced by a successful


CRC test, the destination node sends another ACK. If the transmission was unsuccessful, the destination node does nothing,
causing the source node to timeout. Therefore, the source node
will infer that the transmission failed and will retry after it receives the token on the next token pass. The transmission sequence terminates and the token is passed to the next node. If
the desired message exceeds 507 bytes, the message is sent as a
series of packets one packet every token pass. This is called
a fragmented message. The packets are recombined at the destination end to form the entire message.
Another feature of ARCNET is its ability to reconfigure the
network automatically if a node is either added or deleted from
the network. If a node joins the network, it does not automatically participate in the token-passing sequence. Once a node
notices that it is never granted the token; it will jam the network with a reconfiguration burst that destroys the token-passing sequence. Once the token is lost, each node will cease transmitting and begin a timeout sequence based upon their own
node address. The node with the highest address will timeout
first and begin a token pass sequence to the node with the next
highest address. If that node does not respond, it is assumed not
to exist. The destination node address is incremented and the
token resent. This sequence is repeated until each a node responds. At that time, the token is released to the responding
node and the address of the responding node is noted as the
logical neighbor of the originating node. This sequence is repeated by all nodes until each node learns its logical neighbor.
At that time the token passes from neighbor to neighbor without wasting time on absent addresses.
The formats for ARCNET frames are shown in the chart
below. ARCNET allows both short and long frames.

3. CSMA/CD(Ethernet) versus Token-Passing


CSMA/CD
The Ethernet protocol, simply states the following if you want
to transmit a message. Listen for the carrier from other transmitters. If no carrier is detected, then send and listen. If you
hear something different from what you sent, you are detecting
a collision. Stop transmission and wait a stochastic time delay
and start the procedure again. The collision is a function of the
carrier (signal) propagation delay from node-to-node. The probability of a collision is dependent on propagation delay and the
frequency of message transmission. The carrier offers a certain
data band width. This band width can be used to send long
messages such as files or short but frequent messages such as
sample data in Industrial Process Control Systems. The probability for collision will become greater by increasing the frequency of the messages.
Token-Passing
Only one token exists with this protocol. Therefore, no collision can result. Reconfigurations occur by nodes not being serviced or nodes no longer finding successive nodes as destinations for the token.
The overhead associated with the token-passing is best

explained as the token circulating from node-to-node even when


the network is idle, creating the situation that the token simply
passes when no message transmission occurs. The only drawback to the token-passing system as compared to the CSMA/
CD is the minimal time delay when the node has to wait for the
token.
When heavily loaded, the performance of a token-passing
network generally exceeds that of a CSMA/CD network and
more important, the performance is deterministic. Both network
types are of the Flying Master type, i.e. all nodes are identical in functionality, they can receive and initiate transmission
themselves.
Proponents of token-passing argue that because there are
no collisions with token-based protocol, their networks have
the best behavior under heavy loads because the time performance of the networks are deterministic, making it easier to
know whats happening. Advocates of contention view that most
networks operate under lighter load conditions where low overhead translates into greater throughput and efficiency. They also
state the greater cost of token-passing networks.

Reconfiguration - a new node joins the ring automatically


without software intervention
Broadcast and Directed Messages
Multi-master with automatic token generation
Cabling Options - Coax, Fiber, RS485 twisted pair
High Speed - Standard 2.5Mbps, optionally 156Kbps to
10Mbps
Low-cost chips
Low Protocol Overhead - 3 or 4 bytes
Packet Size - small (253 bytes or less) or large (508) bytes
Benefits
Used for industrial high-speed applications
Used in embedded design to communicate between
controllers
A multi-master network of nodes allows equal access to
all nodes
Simple Low Cost Hardware Design - one chip + transceiver
Software drivers are packet driven
Noise Immunity

4. ARCNET for Real-time Applications

6. ARCNET Example

ARCNET, Token-Passing protocol local area network (LAN),


is ideally suited for real-time control applications. In terms of
the International Organization of Standards - OSI (Open Systems Interconnect) Reference Model, ARCNET provides the
Physical and Data-link layers. In other words, ARCNET successfully transmits and receives a data packet between two network nodes. A node refers to an ARCNET controller chip and
cable transceiver connected to the network. Nodes are assigned
addresses called MAC (medium access control) Ids and one
ARCNET network can have up to 255 uniquely assigned nodes.
The key to ARCNETs performance is its token-passing protocol. In a token-passing network, a node can only send a message when it receives the token. This is the preferred media
access control method because all nodes have equal access to
the network, eliminating transmission collisions on busy networks. In fact, the worst case time for receiving a token can be
calculated, an important feature for real-time systems. In other
words, ARCNET provides deterministic performance. Finally,
the ARCNET protocol knows when nodes are added to or
deleted from the network and automatically reconfigures the
network accordingly without software intervention.

A typical example is given below of a photo development and


printing (DPE) system. All function modules for the system are
now connected with ARCNET, which makes the internal connection between the modules much simpler than the original
system.

Bibliography
This documents content is a composition of information from
Standard Microsystems Corporation and ARCNET Trade
Association.

Authors contact details

5. ARCNET Features & Benefits


ARCNET provides the physical and data link layers and some
of the transport functions (flow control and hardware packet
acknowledgement) of the OSI network model. The ARCNET
equipment provides reliable packet delivery and network administration with little software effort.
Features
Deterministic Performance - users can calculate the worst
case node-to-node message time
Logical Ring - nodes automatically find their neighbor to
create a ring; Automatic

Frederick Weber
SMSC
80 Arkay Drive
P.O. Box 18047
Hauppauge, NY 11788 USA
Phone: (1-631) 435 6171
Fax: (1-631) 435 6110
E-mail: fred.weber@smsc.com
Don He
Contemporary Control Systems, Inc.
2431 Curtiss Street
Downer Grove, IL 60515 USA
Phone: (1-630) 963 7070
Fax: (1-630) 963 0109
E-mail: dhe@ccontrols.com
International IC China Conference Proceedings 455

Presentation Materials

456 International IC China Conference Proceedings

International IC China Conference Proceedings 457

458 International IC China Conference Proceedings

International IC China Conference Proceedings 459

460 International IC China Conference Proceedings

International IC China Conference Proceedings 461

462 International IC China Conference Proceedings

International IC China Conference Proceedings 463

Vous aimerez peut-être aussi