The way of communication between different nodes of the multiprocessor control system

 

The invention relates to communication systems using an extended Protocol message network management and routing of messages in a communication network control elevators, with many nodes. The technical result is the development of the CAN Protocol, which would support communication between tens of thousands of nodes, while messages have different functions. For this purpose, according to the method communicate via a CAN network equipment management, corresponding to a format the CAN standard, in which the identifier of the message format is divided into a part that defines the function of the message, the part of the node ID of the first class to identify the nodes of the first class, which must be able to communicate with each other and with a large number of other nodes in the system, and select part of the identifier of the site, much of which is used for node IDs of the second class to identify the nodes of the second class, which never needed to contact each other, and you only want to communicate with nodes of the first class, and a small part of which is used for node IDs of the first class in cases where/img>

The technical field to which the invention relates.

The present invention relates to a Protocol extension message network management (CAN - control area network) to implement message routing in communication networks Elevator control, with up to tens of thousands of nodes.

The level of technology

It is well known that in lifting systems containing a large number of elevators, usually several elevators in groups, and in the building there are several groups of elevators. Communication between all nodes, including nodes on each cabin, the nodes in the controller group and units in the building, can be carried out through a single communication Protocol through the communication coprocessors, each of which contains a transmitter and receiver.

For such systems required a significant amount of communication equipment. Therefore, it would be useful to be able to use standardized, widespread and cheap equipment.

The latest innovation in the field of local area networks is the CAN standard, which is defined by ISO 11898 and ISO 11519-1. The source CAN standard was developed for the needs of distributed control in real soglasuyushchiesya with this Protocol.

In the CAN Protocol, the same group of bits of the identifier is filtered at each receiving node to identify its relationship to this message. Messages that are passed by the filter, taken and not passed by the filter are ignored. The CAN Protocol is a broadcast system of the type in which the message is simply displayed on the bus, and the receiving nodes, which are data messages that are respectively configured filters. Therefore, the number of receiving nodes, which can vary the CAN Protocol is limited by the number that can be represented in the group of bits of the identifier. The group of bits of the CAN identifier of the Protocol is limited to 11 bits in one format and 29 digits in a different format. Obviously, the 11-bit format, limiting the maximum number of distinguishable messages approximately two thousand, totally inadequate for working with elevators, where the number of nodes usually reaches tens of thousands. The Protocol is suitable for use in the control system lifts should include identification of the sender and recipient, which means the need for two separate identifier 29-bit group ID of the CAN Protocol. More t who should also ensure the existence of multiple priorities and types of network service. If they have enough functional groups, for example from 5 digits, it is 24 bits to identify the node is the sender and node identification of the recipient; as a result, to distinguish between nodes remains 12 bits, which limits the size of the system is approximately 4000 nodes, which is quite insufficient. Examples of control systems, elevators, which can be used in the local control network shown in U.S. patents 5387769 and 5202540, issued in the name of the same applicant, and an example of a message format of the extended CAN Protocol for use in such systems are illustrated in U.S. patent 5854454 also been issued in the name of the same applicant.

The invention

Objectives of the invention include the creation of the CAN Protocol, which would provide support for communication between tens of thousands of nodes, while messages have different functions, and enhancements CAN Protocol for use with lifting systems.

The present invention is based in part on the fact that the control system lifting devices (elevators) has a relatively small number of nodes that must be able to communicate with each other and with the huge number of all other nodes system from the same class, but should contact the nodes of the first class. Thus, the names of the nodes of the second class should never appear in the same message, identifying at the same time, the sending host and the host recipient.

Thus, the object of the invention is a method of communication between the different nodes of the multiprocessor control system, which has a group of nodes of the first class, each of which has the ability to communicate with other mentioned sites first class and sites mentioned control system, which is not mentioned by the nodes of the first class, and which has a group of nodes of the second class, each of which is capable of at least one of the above nodes of the first class, but has no necessary connection with other nodes of these nodes of the second class.

The proposed method provides for communication through CAN-equipment like network management, corresponding to the message format CAN standard, in which the most senior category of the bit start of frame, followed by a 29-bit group ID bit and the remote transmission request, the following six bits contain the group of control bits, the next group 0 is a mini redundant code the following two digits contain a field confirmation of receipt and seven youngest discharges contain field end of frame.

According to the proposed method, use the part that defines the function of the message, consisting of a continuous group share bits of the CAN-ID, including the most significant bit group of bits of the ID by the content of which identify other bits of the group of bits of the identifier, as, respectively, the node ID of the receiver, or the node ID of the sender. In addition, use part of the node ID of the first class, consisting of a continuous group share bits of the CAN-ID, the content of which includes the node identifier of the first class, by means of which identifies one of a group of nodes of the first class, and use the select part of the identifier of the node, which consists of a contiguous group share bits of the CAN-ID that does not belong to defining the function of the message part and the part of the node ID of the first class, and the contents of which while establishing communication between one of the nodes of the first class and one of the nodes of the second class includes the node identifier of the second class, posredstvo class content referred to select part of the identifier of the node includes one of the node IDs of the first class.

The number of bits in the node ID of the second class may exceed, for example, twice the number of bits in the node ID of the first class.

In the private version of the method can be used to select part of the identifier of the node, which when establishing a connection between two nodes of the first class contains a continuous section of binary digits, which all have the same binary value, in particular zero, and the section of the node identifier of the first class. This section of the node identifier of the first class selected part of the node ID may contain the low-order bits select the part of the node ID.

According to the proposed method, it is possible to use part of the node ID of the first class, containing the low-order bits these bits of the CAN identifier.

In accordance with the present invention, the Protocol messages, adapted to work with the equipment CAN standard, uses one part of the group of bits of the identifier to identify the nodes of the first class, each of which will need to contact a significant number of all other nodes in the system, and the second group of bits of the identifier to identify the second class Oslo the South to contact the sites mentioned first class moreover, the above-mentioned second part includes a section that identifies the nodes referred to first class when the rest mentioned the second part of the binary bits have the same binary value, and the part that defines the function of the message mentioned group of bits of the identifier, which determines among other things, identifies whether the node each node ID as the sender or the receiver. The invention has several features. First, it divides the nodes into two classes, the first of which can identify the nodes of the same class as the sender or site-recipients in a single message, and the nodes of the second class, who never communicate with each other and therefore their node IDs of the sender and the destination host never appear simultaneously in a single message. This allows you to use the majority of the group of bits of the identifier to identify a very large number of nodes referred to the second class. Secondly, the invention is excluded distributing part of the group of bits of the identifier as the identifier of the node is the sender and node IDs of the recipient, but instead uses a much smaller capacity in bits to indicate the ID is a small part of what what otherwise could be an identification part of the nodes of the second class, to identify the nodes of the first class when the communication between two nodes of the first class. The invention allows the use of the equipment CAN standard in control systems such as control systems, elevators, which has tens of thousands of nodes that do not communicate with each other.

Other objectives, features and advantages of the present invention will be more understandable in light of the following detailed description of examples of its execution illustrated in the attached drawings.

List of drawings and other materials

In Fig.1 is a diagram of a message format standard CAN Protocol 2.0 known from the prior art.

In Fig.2 is a diagram of the message format CAN Protocol 2.0 modified in accordance with the present invention for the case when communication is established between the first node and second node class.

In Fig.3 is a diagram of the message format CAN Protocol 2.0 modified with the present invention for the case when communication is established between two nodes of the first class.

Information confirming the possibility of implementation the ligature through the CAN hardware like network management contains as the most significant bit bits start of frame, following 33 the most senior level include 29-bit group identifier, consisting of the 11-bit group identifier and an 18-bit group ID. The 11-bit group identifier followed by a bit SRR (Substitute Remote Request) bit in the IDE (Identifier Extension). Then 18-bit group ID bit and the remote transmission request. The next six bits contain the group of control bits, the next group from 0 to 64 bits contains a data field, the next group of 16 bits contains a field control by means of cyclic redundancy code, the following two digits contain a field confirmation of receipt and seven youngest discharges contain field end of frame.

Presented on Fig.2 the format of the message CAN Protocol 2.0 modified specifically for use in control systems elevators division 29-bit group identifier into three parts: the part that defines the function of the message, consisting of a continuous group share bits of the CAN-ID, including the most significant bit group of bits of the ID by the content of which identify other bits of the group of bits of the identifier, as, respectively, the node ID of the receiver is th function of the message, which determines which of the remaining two parts of the 29-bit group ID is the node ID of the sender, and which of these parts is the node ID of the receiver. In one embodiment, the part defines the function of the message may contain five digits. The second part is the select part of the identifier of the node and consists of a contiguous group share bits of the CAN-ID that does not belong to defining the function of the message part and the part of the node ID of the first class. The contents of this part when establishing communication between one of the nodes of the first class and one of the nodes of the second class includes the node identifier of the second class, by means of which identifies one of a group of nodes of the second class. In Fig.2 this part contains n bits. She is the node ID of the second class that identifies one of a large number of nodes in the system that never communicate with each other. In one embodiment, the identifier part of the nodes of the second class contains 16 bits. The third part is a part of the node ID of the first class, consisting of a continuous group share bits of the CAN-ID, the content on which the new class. In Fig.2 this section contains m bits. She is the node ID of the first class, identifying one of the multiple nodes of the first class, which must be able to communicate with each other, as well as two class nodes. In one embodiment, the portion of the node identifier of the first class contains eight bits. That is, the number of bits in the node ID of the second class twice the number of digits in the above-mentioned node identifier of the first class. It is shown in Fig.2, the node ID of the second class is used not only to identify the nodes of the second class, eight the youngest places this group in the case of communication between two nodes of the first class will identify one of the nodes of the first class. As shown in Fig.3, when the eight most senior level of the node identifier of the second class are all equal to zero (in one embodiment), the eight most least significant bits of the node ID of the second class identify the node of the first class. So part of the 29-bit group identifier, which includes the node IDs of the second class, we call the select part. In accordance with the proposed method is used to select a portion broken the stationary discharges, which all have the same binary value, and a partition of the node identifier of the first class, and this binary value is zero. The use of least significant bits select the part to identify the site of the first class leaves much more numbers to identify the nodes of the second class. For example, if you take a selectable portion 256 of the node IDs of the first class, it remains 65 280 node IDs of the second class.

Section ID of the node of the first class selected part of the node ID may contain the low-order bits referred to select part of the identifier of the node. Alternatively, you can use part of the node ID of the first class, containing the low-order bits of the group of bits of the CAN identifier. Instead of zero, as in Fig.3, the higher-order bits select part of the identifier can be set to one to indicate that only the lowest 8 bits are the node ID of the first class. In this case, the ID of the first class would be the number of higher order (i.e., between 65 280 and 65 535) select part. The invention can be implemented in both ways, depending on the desires.Diniz instead of zeros, and to present an implementation of the present invention. As mentioned above, in one embodiment, x is five, n is 16 and m is 8. In another possible embodiment, the Elevator x can be equal to 4, n = 15 and m is 10. This will allow to have more than 1000 nodes of the first class and more than 31 000 nodes of the second class, 16 functional types. Of course, if desired, can be selected and other numbers, satisfying any options for the implementation of the present invention.

Part 29-bit group identifier that identifies the function must be presented by the most senior ranks of the group of bits of the identifier in order to give the opportunity to use one or more of the most senior ranks in the group of bits of the identifier in order to establish the priority level of messages that, in turn, will allow you to implement this priority means the standard conflict CAN Protocol, by a bitwise comparison from the most senior to the most Junior of digits, and a value of zero prevails over the unit. The order of the identifier of the first class and choose the part that identifies the nodes and the first and second classes, it doesn't matter.

All mentioned is redstavlena and described examples of variants of its implementation, professionals should be understood that the described and other modifications, exceptions and additions can be made, and made without departure from the nature of the invention and within its scope of the claims.

Claims

1. The way of communication between different nodes of the multiprocessor control system, which has a group of nodes of the first class, each of which has the ability to communicate with other mentioned sites first class and sites mentioned control system, which is not mentioned by the nodes of the first class, and which has a group of nodes of the second class, each of which is capable of at least one of the above nodes of the first class, but has no necessary connection with other nodes of these nodes of the second class, which communicate via a CAN network equipment management, corresponding to the message format CAN standard, in which the most senior category of the bit start of frame, followed by a 29-bit group ID bit and the remote transmission request, the following six bits contain the group of control bits, the next group from 0 to 64 bits contains a data field, and the next contain a field confirmation of receipt and seven youngest discharges contain a field end of frame used part that defines the function of the message, consisting of a continuous group share places mentioned CAN-ID, including the most significant bit of the mentioned group of digits of the ID by the content of which identify other bits these bits of ID, as, respectively, the node ID of the receiver, or the node ID of the sender, in addition, use part of the node ID of the first class, consisting of a continuous group share places mentioned CAN-ID, the content of which includes the node identifier of the first class, by means of which identifies one of the groups mentioned nodes of the first class, and also use the select part of the identifier of the node, which consists of a contiguous group share places mentioned CAN ID that does not belong to the above defines the function of the message part and the above-mentioned part of the node ID of the first class, and the contents of which while establishing communication between one of these sites first class and one of the mentioned nodes of the second class includes the node identifier of the second class, by which identifier the mentioned nodes of the first class, the content referred to select part of the identifier of the node includes one of the node IDs of the first class.

2. The method according to p. 1, characterized in that the number of digits in the above-mentioned node ID of the second class exceeds the number of digits in the above-mentioned node identifier of the first class.

3. The method according to p. 2, characterized in that the number of digits in the above-mentioned node ID of the second class twice the number of digits in the above-mentioned node identifier of the first class.

4. The method according to p. 1, characterized in that use, select the part of the host ID, which is when the communication between two nodes of these nodes of the first class contains a continuous section of binary digits, which all have the same binary value, and a partition of the node identifier of the first class.

5. The method according to p. 4, characterized in that the said binary value is zero.

6. The method according to p. 4, characterized in that the section of the node identifier of the first class mentioned select part of the identifier of the node contains the low-order bits referred to select part of the identifier of the node.

7. The method according to p. 1, characterized in that use part ID manually is p>

 

Same patents:

The invention relates to communication systems, in particular to the transmission of compressed signals in a communication system

The invention relates to the transmission of data to generate codes using turbocodes in the communication system based on retransmission

The invention relates to the design of traffic used for system Multiprotocol switching on the basis of marks

The invention relates to the field of multi-service networks for the transmission of different traffic types: data, voice, video, etc

The invention relates to the synchronization of telecommunication networks, can be used in network clock synchronization systems

The invention relates to a device and method of payment for services, particularly for services that are called from the Internet

The invention relates to the synchronization of telecommunication networks, namely, to build systems network clock synchronization with a hierarchical structure, with a forced synchronization on the principle of “master-slave”

The invention relates to a switching device for synchronous transfer mode (ARP) for switching systems

The invention relates to computing, and can be used in particular in distributed computing systems

The invention relates to computer systems

The invention relates to automated banking machines and can be used for communication of user institutions with banking machines other institutions

The invention relates to a device for data exchange with setting permissions on data exchange

The invention relates to computer networks

The invention relates to the processing schemes for the recognition and comparison of complex combinations in high-speed data streams, in particular for use in machines of search and retrieval

Computer // 2216033
The invention relates to computing, and in particular to computing devices that process information using flow control

The invention relates to the field of information security and, in particular, refers to the hardware and software components of firewalls are used to prevent unauthorized access and exchange of information between the various subscribers of computer networks
The invention relates to the field of public utilities and can be used in Supervisory control and systems management utilities
Up!