You are on page 1of 97

USB

UNIVERSAL SERIAL BUS


USB
 Fast
 Bi-directional
 Isochronous
 low-cost
 dynamically attachable serial interface
 consistent with the requirements of the PC
platform of today and tomorrow
Taxonomy of Application Space
Feature list
 Easy to use for end user
 Single model for cabling and connectors
 Electrical details isolated from end user (e.g., bus terminations)
 Self-identifying peripherals, automatic mapping of function to driver, and
configuration
 Dynamically attachable and re-configurable peripherals
 Wide range of workloads and applications
 Suitable for device bandwidths ranging from a few kb/s to several Mb/s
 Supports isochronous as well as asynchronous transfer types over the
same set of wires
 Supports concurrent operation of many devices (multiple connections)
 Supports up to 127 physical devices
 Supports transfer of multiple data and message streams between the host
and devices
 Allows compound devices (i.e., peripherals composed of many functions)
 Lower protocol overhead, resulting in high bus utilization
Feature list (con)
 Isochronous bandwidth
 Guaranteed bandwidth and low latencies appropriate for telephony,
audio, etc.
 Isochronous workload may use entire bus bandwidth
 Flexibility
 Supports a wide range of packet sizes, which allows a range of device
buffering options
 Allows a wide range of device data rates by accommodating packet
buffer size and latencies
 Flow control for buffer handling is built into the protocol
 Robustness
 Error handling/fault recovery mechanism is built into the protocol
 Dynamic insertion and removal of devices is identified in user-perceived
real-time
 Supports identification of faulty devices
Feature list (con)
 Relation with PC industry
 Protocol is simple to implement and integrate
 Consistent with the PC plug-and-play architecture
 Leverages existing operating system interfaces
 Low-cost implementation
 Low-cost sub-channel at 1.5Mb/s
 Optimized for integration in peripheral and host hardware
 Suitable for development of low-cost peripherals
 Low-cost cables and connectors
 Uses commodity technologies
 Upgrade path
 Architecture upgradeable to support multiple USB Host Controllers in
a system
USB Interconnect
 Bus Topology: Connection model between USB devices
and the host.
 Inter-layer Relationships: In terms of a capability stack,
the USB tasks that are performed at each layer in the
system.
 Data Flow Models: The manner in which data moves in
the system over the USB between producers and
consumers.
 USB Schedule: The USB provides a shared interconnect.
Access to the interconnect is scheduled in order to support
isochronous data transfers and to eliminate arbitration
overhead.
BUS Topology
Physical Interface
pin Name Descryption
1 Vcc +5 Vdc
2 D- Data-
3 D+ Data+
4 GND Ground
Throughput
 Low speed
1.5 Mbps
 Full speed
12 Mbps
 High speed (in USB 2.0)
480 Mbps

 Dynamic mode switching


 Clock encoding scheme: NRZI (Non Return
to Zero Invert)
Power Distribution
 Devices:
Bus-powered devices
Self-powered devices
 Power management
Host based
Power events:
○ Suspend
○ Resume
Bus Protocol
 Polled bus
 Data transfers initiated only by host
controller
 Three packets:
Token packet
○ Type
○ Direction
○ Address
○ End point number
Data packet
Handshake packet
○ ACK
○ NAK
Transfer Model
 Pipe
Stream pipes
○ No USB standard format
Message pipes
○ USB format
 Request
 Data
 Status

 End point zero


Default control pipe
Always exists
Data Flow Types
 Control Transfers:
 Used to configure a device at attach time and can be used for other
device-specific purposes, including control of other pipes on the device.
 Bulk Data Transfers:
 Generated or consumed in relatively large and bursty quantities.

 Interrupt Data Transfers:


 Used for characters or coordinates with human-perceptible echo or
feedback response characteristics.
 Isochronous Data Transfers:
 Occupy a pre-negotiated amount of USB bandwidth with a pre-
negotiated delivery latency. (Also called streaming real time transfers).
USB Devices
 All have endpoint zero

 Hub
 Function
 Compound
Typical Configuration
Physical / Logical Bus Topology
USB Communication Flow
Control Transfer Format
 Setup packet
 Data packet
 Acknowledge packet

 USB defined structure


 Setup packet: 8 bytes
 Maximum data payload size:
Full speed: 8, 16, 32 or 64 bytes
Low speed: 8 bytes
Control Transfer Constraints
 Best effort
 10% frame time for control
 Use also remaining 90% if no interrupt
or isochronous transfer
Isochronous Transfers
 Guaranteed access to USB bandwidth with bounded latency
 Guaranteed constant data rate through the pipe as long as data
is provided to the pipe
 In the case of a delivery failure due to error, no retrying of the
attempt to deliver the data.

 Stream pipe
 Uni-directional
 Maximum data payload: 1023 bytes
 Only in Full speed.
 No more 90% of frame for isochronous, interrupt
Interrupt Transfers
 Guaranteed maximum service period for the pipe.
 Retry of transfer attempts at the next period, in
the case of occasional delivery failure due to
error on the bus.

 Max. Payload size:


Full speed: 64 bytes
Low speed: 8 bytes
 If there is sufficient bus time, for requested
payload size the pipe is established.
Bulk Transfers
 Large amount of data.
 Access to the USB on a bandwidth-available
basis.
 Retry of transfers, in the case of occasional
delivery failure due to errors on the bus.
 Guaranteed delivery of data, but no
guarantee of bandwidth or latency.

 Stream pipe
 Only in full speed
 Max. Payload: only 8, 16, 32 or 64 bytes
Connectors
Full Speed CMOS Driver
Evaluation Setup
Signals
 Low and Full speed devices:
 A differential ‘1’ is transmitted by pulling D+ over 2.8V
with a 15K ohm resistor pulled to ground and D- under
0.3V with a 1.5K ohm resistor pulled to 3.6V.
 A differential ‘0’ on the other hand is a D- greater than 2.8V
and a D+ less than 0.3V with the same appropriate pull
down/up resistors.
 The receiver defines a differential ‘1’ as D+ 200mV greater
than D- and a differential ‘0’ as D+ 200mV less thanD-.
 The polarity of the signal is inverted depending on the
speed of the bus. Therefore the terms ‘J’ and ‘K’ states are
used in signifying the logic levels. In low speed a ‘J’ state is
a differential 0. In high speed a ‘J’ state I s a differential 1.
Differential and Single Ended
 Differential signals mostly for data
 Certain bus states by single ended signals on
D+, D- or both.
For example a single ended zero or SE0 can be
used to signify a reset if held more than 10ms.
SE0 is holding down both D- and D+ below .3V

 Low and Full speed


90 Ohms +/- 15%
FIRE WIRE
IEEE 1394
IrDA
IR Wireless Communications
 IR data transmission is employed in
short-range communication among
computer peripherals and other devices
that usually conform to standards
published by IrDA, the Infrared Data
Association.
 Remote controls and IrDA devices use
infrared light-emitting diodes (LEDs) to
emit infrared radiation which is focused
by a plastic lens into a narrow beam.
Infrared Data Association (IrDA)

Wireless Communication by Using IrDA

Windows
Laptop Client

Mouse

53
IR Wireless Communications
 The beam is modulated, i.e. switched on and off, to
encode the data.
 The receiver uses a silicon photodiode to convert the
infrared radiation to an electric current. It responds
only to the rapidly pulsing signal created by the
transmitter, and filters out slowly changing infrared
radiation from ambient light.
 Infrared communications are useful for indoor use in
areas of high population density. IR does not
penetrate walls and so does not interfere with other
devices in adjoining rooms.
 Infrared is the most common way for remote controls
to command appliances.
Bluetooth
What is Bluetooth?
 Cable replacement technology primarily
 Bluetooth wireless technology is an
open specification for a low-cost, low-
power, short-range radio technology for
ad-hoc wireless communication of
voice and data anywhere in the world.
Cont’d:
 Bluetooth uses a frequency-hopping scheme in
the unlicensed Industrial Scientific-Medical
(ISM) band at 2.4 GHz.
 The major goal with the Bluetooth wireless
technology is to allow relatively cheap
electronic devices to communicate directly in
an ad-hoc fashion, Moreover, the Bluetooth
equipped devices can also form networks– such
a network of personal devices is often referred
to as a personal Area Network (PAN).
Why Bluetooth?
 Cable replacement between devices.
 Open Specification
 Low power consumption
 Devices can be connected to multiple
devices at the same time.
 Operate in Un-licensed band (2.4GHz ISM)
Bluetooth Technical Features:
 2.4 GHz ISM Open Band
 Globally free available frequency
 79 channels (2400-2483.5 MHz ISM band)
 Frequency Hopping & Time Division Duplex (1600 hops/second
typically)
 10-100 Meter Range
 Class I – 100 meter (300 feet)
 Class II – 20 meter (60 feet)
 Class III – 10 meter (30 feet)
 Link Rate : 1 Mbps
 Simultaneous Voice/Data Capable
 SCO (Synchronous connection oriented) for voice
 ACL (Asynchronous connectionless link) for data
 Transmit Power: 0dbm
 Receiver Sensitivity : -73dbm
 Uses Binary GFSK
Bluetooth Specifications
Connection Type Spread Spectrum (Frequency Hopping)

MAC Scheme FH-CDMA

Spectrum 2.4 GHz ISM

Modulation Gaussian Frequency Shift Keying

Transmission Power 1 mw – 100 mw

Aggregate Data Rate 1 Mbps

Range 30 ft

Supported Stations 8 devices

Voice Channels 3

Data Security- Authentication Key 128 bit key

Data Security-Encryption Key 8-128 bits (configurable)

Bluetooth 60
The Bluetooth Stack:
Packet Format:

 Access Code: timing synchronization, offset


compensation, paging and inquiry.

 Header: information for packet acknowledgement,


packet numbering for out-of-order packet reordering,
flow control, slave address and error check for header.
 Payload: voice field, data field or both
Wi-Fi
Introduction
• Wireless Technology is an alternative to Wired
Technology, which is commonly used, for
connecting devices in wireless mode.

• Wi-Fi (Wireless Fidelity) is a generic term that


refers to the IEEE 802.11 communications
standard for Wireless Local Area Networks
(WLANs).

• Wi-Fi Network connect computers to each other,


to the internet and to the wired network.
The Wi-Fi Technology
Wi-Fi Networks use Radio Technologies to
transmit & receive data at high speed:

• IEEE 802.11b
• IEEE 802.11a
• IEEE 802.11g
IEEE 802.11b

• Appear in late 1999


• Operates at 2.4GHz radio spectrum
• 11 Mbps (theoretical speed) - within 30 m
Range
• 4-6 Mbps (actual speed)
• 100 -150 feet range
• Most popular, Least Expensive
• Interference from mobile phones and
Bluetooth devices which can reduce the
transmission speed.
IEEE 802.11a
• Introduced in 2001
• Operates at 5 GHz (less popular)
• 54 Mbps (theoretical speed)
• 15-20 Mbps (Actual speed)
• 50-75 feet range
• More expensive
• Not compatible with 802.11b
IEEE 802.11g

• Introduced in 2003
• Combine the feature of both standards
(a,b)
• 100-150 feet range
• 54 Mbps Speed
• 2.4 GHz radio frequencies
• Compatible with ‘b’
802.11 Physical Layer
There are three sublayers in physical
layer:

• Direct Sequence Spread Spectrum (DSSS)


• Frequency Hoping Spread Spectrum
(FHSS)
• Diffused Infrared (DFIR) - Wide angle
DSSS
• Direct sequence signaling technique divides the 2.4 GHz band into
11 22-MHz channels. Adjacent channels overlap one another
partially, with three of the 11 being completely non-overlapping.
Data is sent across one of these 22 MHz channels without hopping
to other channels.
IEEE 802.11 Data Link Layer
The data link layer consists of two
sublayers :

• Logical Link Control (LLC)


• Media Access Control (MAC).

802.11 uses the same 802.2 LLC and 48-bit addressing


as other 802 LANs, allowing for very simple bridging from
wireless to IEEE wired networks, but the MAC is unique to
WLANs.
802.11 Media Access Control
• Carrier Sense Medium Access with collision
avoidance protocol (CSMA/CA)
• Listen before talking
• Avoid collision by explicit Acknowledgement (ACK)
• Problem: additional overhead of ACK packets, so
slow performance
• Request to Send/Clear to Send
(RTS/CTS) protocol
• Solution for “hidden node” problem
• Problem: Adds additional overhead by temporarily
reserving the medium, so used for large size
packets only retransmission would be expensive
802.11 Media Access Control(cont.)
• Power Management
• MAC supports power conservation to extend the battery
life of portable devices
• Power utilization modes
• Continuous Aware Mode
• Radio is always on and drawing power
• Power Save Polling Mode
• Radio is “dozing” with access point queuing any data for it
• The client radio will wake up periodically in time to receive
regular beacon signals from the access point.
• The beacon includes information regarding which stations
have traffic waiting for them
• The client awake on beacon notification and receive its
data
802.11 Media Access Control(cont.)
• Fragmentation
• CRC checksum
• Each pkt has a CRC checksum calculated
and attached to ensure that the data was not
corrupted in transit
• Association & Roaming
Elements of a WI-FI Network
• Access Point (AP) - The AP is a wireless LAN
transceiver or “base station” that can connect one or
many wireless devices simultaneously to the Internet.

• Wi-Fi cards - They accept the wireless signal and


relay information.They can be internal and external.(e.g
PCMCIA Card for Laptop and PCI Card for Desktop PC)

• Safeguards - Firewalls and anti-virus software


protect networks from uninvited users and keep
information secure.
How a Wi-Fi Network Works
• Basic concept is same as Walkie talkies.
• A Wi-Fi hotspot is created by installing an access
point to an internet connection.
• An access point acts as a base station.
• When Wi-Fi enabled device encounters a hotspot
the device can then connect to that network
wirelessly.
• A single access point can support up to 30 users
and can function within a range of 100 – 150 feet
indoors and up to 300 feet outdoors.
• Many access points can be connected to each other
via Ethernet cables to create a single large network.
Wi-Fi Network Topologies
• AP-based topology (Infrastructure Mode)

• Peer-to-peer topology (Ad-hoc Mode)

• Point-to-multipoint bridge topology


AP-based topology
• The client communicate through Access Point.
• BSA-RF coverage provided by an AP.
• ESA-It consists of 2 or more BSA.
• ESA cell includes 10-15% overlap to allow
roaming.
Peer-to-peer topology
• AP is not required.
• Client devices within a
cell can communicate
directly with each
other.
• It is useful for setting
up of a wireless
network quickly and
easily.
Point-to-multipoint bridge topology
This is used to connect a LAN in one building to a LANs
in other buildings even if the buildings are miles
apart.These conditions receive a clear line of sight
between buildings. The line-of-sight range varies based
on the type of wireless bridge and antenna used as well
as the environmental conditions.
Wi-Fi Configurations
Wi-Fi Configurations
Wi-Fi Configurations
Wi-Fi Applications
• Home
• Small Businesses or SOHO
• Large Corporations & Campuses
• Health Care
• Wireless ISP (WISP)
• Travellers
Zigbee(IEEE 802.15.4-2006)
What is ZigBee?
 Technological Standard Created for
Control and Sensor Networks
 Based on the IEEE 802.15.4 Standard
 Created by the ZigBee Alliance
The 802 Wireless Space

Source: http://www.zigbee.org/en/resources/
ZigBee and Other Wireless
Technologies
ZigBee Aims Low
 Low data rate
 Low power consumption
 Small packet devices
ZigBee Frequencies
 Operates in Unlicensed Bands
 ISM 2.4 GHz Global Band at 250kbps
 868 MHz European Band at 20kbps
 915 MHz North American Band at
40kbps
How ZigBee Works
 Topology
Star
Cluster Tree
Mesh
 Network coordinator, routers, end
devices
How ZigBee Works
 States of operation
Active
Sleep
 Devices
Full Function Devices (FFD’s)
Reduced Function Devices (RFD’s)
 Modes of operation
Beacon
Non-beacon
ZigBee Mesh Networking

Slide Courtesy of

Source: http://www.zigbee.org/en/resources/#SlidePresentations
ZigBee Mesh Networking

Slide Courtesy of

Source: http://www.zigbee.org/en/resources/#SlidePresentations
ZigBee Mesh Networking

Slide Courtesy of

Source: http://www.zigbee.org/en/resources/#SlidePresentations
ZigBee Mesh Networking

Slide Courtesy of

Source: http://www.zigbee.org/en/resources/#SlidePresentations
ZigBee Mesh Networking

Slide Courtesy of

Source: http://www.zigbee.org/en/resources/#SlidePresentations

You might also like