A network for controling model railroads

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Introduction to MS-Aloha R. Scopigno, Networking Lab – 1.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 16 – High Speed LANs.
Topic 7 Local Area Networks (LAN)
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Synchronous Links/Networks Modems are asynchronous - penalized by start bits and stop bits on each character (and dead time) Synchronous Networks recover.
COS 461 Fall 1997 COS 461: Networks and Distributed Computing u Prof. Ed Felten u u.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Lecture 5: IEEE Wireless LANs (Cont.). Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN a.
1 SpaceWire Update NASA GSFC November 25, GSFC SpaceWire Status New Link core with split clock domains complete (Much faster) New Router core.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
Network based System on Chip Final Presentation Part B Performed by: Medvedev Alexey Supervisor: Walter Isaschar (Zigmond) Winter-Spring 2006.
Control Area Network CAN Developed by Bosch in 1983 as an automotive protocol, it was adopted by the Society of Automotive Engineers (SAE) in As.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
1 Link Layer Message M A B Problem: Given a message M at a node A consisting of several packets, how do you send the packets to a “neighbor” node B –Neighbor:
EEC-484/584 Computer Networks Lecture 8 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Dave Mills CANbus: A brief introduction Incorporating: The Fujitsu status Dave Mills Queen Mary, University of London.
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
Introduction to Media Access Control Protocols Yerang Hur and Jiaxiang Zhou System Design Research Lab. Dept. of Computer and Information Science.
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
SERIAL BUS COMMUNICATION PROTOCOLS
Enhanced CSMA Additional improvement  Use CSMA access  Listen while transmitting  Stop immediately if collision sensed  Called collision detection.
Review: Medium Access Control Sublayer –What is the problem to be addressed in this sublayer? –Protocols that allow collision Pure ALOHA Slotted ALOHA.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Ethernet. Ethernet Goals Simplicity Low Cost Compatibility Address flexibility Fairness –All nodes have equal access to the network High speed Stability.
CIS 725 Media Access Layer. Medium Access Control Sublayer MAC sublayer resides between physical and data link layer Broadcast/multiacess channels N independent.
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
: Data Communication and Computer Networks
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
DEVICES AND COMMUNICATION BUSES FOR DEVICES NETWORK
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
CCNA 3 Week 4 Switching Concepts. Copyright © 2005 University of Bolton Introduction Lan design has moved away from using shared media, hubs and repeaters.
Review:. Chapter 3: The Data Link Layer –achieve reliable, efficient communication between two physically connected machines. –Example problems to be.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Protocols n ISO OSI 7-layer model n TCP/IP suite l TCP/UDP l IP l Ethernet/Token Ring l ICMP.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
©2008 R. Gupta, UCSD COSMOS Summer 2008 Peripheral Interfaces Rajesh K. Gupta Computer Science and Engineering University of California, San Diego.
Department of Computer Science, University of Peshawar Multiple Access.
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
Marwan Al-Namari Week 3. Line codes send symbols that represent one or more bits NRZ is the simplest, literal line code (+1V=“1”, -1V=“0”) Other codes.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Chapter 12 Multiple Access
1 Ethernet “dominant” LAN technology: cheap $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token LANs and ATM Kept up with speed.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
1 Copyright © 2014 Tata Consultancy Services Limited Controller Area Network (CAN) By Renukacharya A. Thakare.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:
LonWorks Introduction Hwayoung Chae.
Ch. 16 Ethernet Traditional Ethernet IEEE Medium Access Control –Carrier Sense Multiple Access with Collision Detection (CSMA/CD) –The most.
Multiple Access Methods
Lab 7 – CSMA/CD (Data Link Layer Layer)
CT301 LECTURE 8.
Local Area Networks: Topologies
Layered Architectures
ISM Band Radio Radio Protocols and Topology
Data Link Layer: Data Link Control
Chapter 12 Local Area Networks
Multiple Access Methods
7- chapter Seven Local Area Networks (LAN)
Chapter 12 Local Area Networks
Chapter 12 Local Area Networks
Multiple Access Methods
Computer Interfacing and Protocols
Presentation transcript:

A network for controling model railroads 11.04.2017 LocoNet A network for controling model railroads by Stefan Bormann (stefan.bormann@gmx.de)

Contents LocoNet? System overview. Physical layer Packet layer 11.04.2017 Contents LocoNet? System overview. Physical layer Packet layer Application layer – an overview Loco operation Example: FRED References.

1a) System overview DCC C:> LocoNet . Command Station

1b) What is LocoNet? invented by Digitrax proprietory Peer to peer CSMA/CD ~3 Layers.

2a) Physical layer - electrical master any device +12V 15mA 3V . RX TX Net Ground

2b) Physikal layer - timing 16600 Baud, 60µs bit time 8N1 600µs . 60µs 1 Start D0 D1 D2 D3 D4 D5 D6 D7 Stop 1

3a) Packet layer bytes are transmitted back-to-back Opcode Data Check ... bytes are transmitted back-to-back packets consist of 2, 4, 6 or N bytes first byte is „opcode“ last byte is checksum (xor of all other bytes).

3b) Opcode D7 D6 D5 D4 D3 D2 D1 D0 5 bits to encode 32 possible opcodes. always 1 (all other bytes have D7=0) 6 bytes 1 4 bytes N bytes 2 bytes packet length (including opcode and checksum)

3c) Packet timing, net access CD 20 bit times MD 6 PD 0..20 . CD: carrier detect (defines end of packet) MD: master delay (only master may transmit) PD: priority delay (high prio. = small PD)

3d) Packet timing, collisions Collisions are avoided, by shortening the time between still observing the net is idle until the first bit is transmitted onto the net. Collision is detected, when a 0 is seen on the net, while a 1 is being transmitted On detection of a collision, a break (15 bit times 0) is transmitted.

4. Application layer -- an overview turnouts signals message exchange decoder programming fast clock loco operation station local not used control locally well, interesting... YES Only limited mission for layout-wide LocoNet.

5a) Loco operation Table with loco data in command station Slot # = Index in table = Handle Slot # is a 7 bit number 128 Slots: 1..120 are loco slots 0 dispatch slot >120 are special slots (fast clock, programming) loco slots have fields:

5b) Fields of a slot loco address (14 bits) state of slot (free/common/idle/IN_USE) protocol selection (# of speed steps, ...) state of loco speed (7 bit) functions (9 bits, F0, F1, ..., F8) consist tree ID (14 bits, can be a device ID of controller)

5c) Operations on slots (requests) requests to master: OPC_LOCO_ADR: get slot by address OPC_RQ_SL_DATA: get slot by slot # OPC_WR_SL_DATA: write slot by slot # OPC_MOVE_SLOTS: move slot from # to # dispatch put (destination=0) dispatch get (source=0) NULL move (source=destination!=0) OPC_SLOT_STAT1: modify slot status

5d) Operations on slots (responses, operation) responses from master: OPC_LONG_ACK: simple acknowledge OPC_SL_RD_DATA: slot data realtime operation OPC_LOCO_SPD: 7 bits of speed OPC_LOCO_DIRF: direction and F0, ..., F4 OPC_LOCO_SND: F5, ..., F8

6a) FRED FRemos Einfacher Drehregler Simple to use Can only control one engine speed, direction, F0, F1, F2.

6b) FRED: Example for protocol (acquire loco) master FRED master FRED Dispatch Get Dispatch Get Slot Read NACK. Write Slot ACK

6c) FRED: Example of protocol (reconnect) master FRED master FRED if slot data changed Get Slot By Address Null Move Slot Read Slot Read Write Slot ACK.

7. References This clinic: Digitrax homepage: http://www.nord-com.net/ stefan.bormann/dcc/dcc_e.html Digitrax homepage: http://www.digitrax.com LocoNet-Hackers mailing list: http://groups.yahoo.com/group/loconet_hackers.