[go: up one dir, main page]

WO1999044337A1 - Procede et dispositif de commande, procede et dispositif de traitement de donnees, systeme de communication et support lisible par ordinateur - Google Patents

Procede et dispositif de commande, procede et dispositif de traitement de donnees, systeme de communication et support lisible par ordinateur Download PDF

Info

Publication number
WO1999044337A1
WO1999044337A1 PCT/JP1999/000952 JP9900952W WO9944337A1 WO 1999044337 A1 WO1999044337 A1 WO 1999044337A1 JP 9900952 W JP9900952 W JP 9900952W WO 9944337 A1 WO9944337 A1 WO 9944337A1
Authority
WO
WIPO (PCT)
Prior art keywords
node
controlled
control
control device
signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/JP1999/000952
Other languages
English (en)
Japanese (ja)
Inventor
Masatoshi Ueno
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sony Corp
Original Assignee
Sony Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sony Corp filed Critical Sony Corp
Publication of WO1999044337A1 publication Critical patent/WO1999044337A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5053Lease time; Renewal aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5084Providing for device mobility
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/604Address structures or formats

Definitions

  • the present invention relates to a control device and method, an information processing device and method, a communication system, and a computer-readable medium.
  • the present invention relates to a control device and method suitable for application to, for example, a wireless network, an information processing device and method, a communication system, and a computer-readable medium.
  • wireless LAN local area network
  • IrDA IrDA
  • networks are being built through non-contact connections not only between portable devices but also with stationary devices.
  • wireless LAN enables communication between multiple nodes by using an access control protocol called carrier sense multiple access (CSMA).
  • CSMA carrier sense multiple access
  • IrDA enables communication between two nodes by using an access control protocol called IrLAP (infrared link access protocol).
  • mobile devices used in wireless networks can be easily carried, so mobile devices that were connected to the network have already been taken out of the network and become unable to communicate or move. As a result, communication may be disabled due to obstacles.
  • the mobile device may not transmit data at the data transmission permission timing. Also, even if a mobile device sends data, Data may not be received by other devices. Such communication, after all, does not pass through anything, resulting in useless communication and hindering efficient network operation.
  • An object of the present invention is to eliminate a portable device having a poor communication state from a network, eliminate unnecessary communication, and improve communication efficiency. Disclosure of the invention
  • a control device is a control device that controls a plurality of controlled devices that can communicate on a network, and whether the controlled device is normally controlled in response to a signal from the control device.
  • Determining means for determining whether the controlled device is not normally controlled in response to a signal from the control device, and measuring the duration of the state in which the device is not normally controlled. It comprises a measuring means and an opening means for releasing an identifier assigned to identify a controlled device when the duration measured by the measuring means exceeds a certain value.
  • the control device further includes a use restriction release unit that sets an identifier released by the release unit to a state that can be given to any of the plurality of controlled devices after a predetermined time has elapsed. is there.
  • a control method is a control method of a control device that controls a plurality of controlled devices communicable on a network, wherein the controlled device operates normally in response to a signal from the control device.
  • control method further includes a use restriction releasing step of setting the identifier released in the releasing step to a state in which the identifier can be given to any of the plurality of controlled devices after a predetermined time has elapsed. .
  • a computer-readable medium includes a computer for a control device that controls a plurality of controlled devices communicable over a network. Determining whether or not the device is controlled normally in response to a signal from the control device; and in this determination step, if the controlled device is not properly controlled in response to the signal from the control device. If it is determined, the measurement step measures the duration of the state where control is not performed normally, and if the duration measured in this measurement step exceeds a certain value, it is allocated to identify the controlled device. And a program for executing the releasing step of releasing the identifier.
  • the computer-readable medium according to the present invention executes a use restriction releasing step of setting the identifier released in the release step to a state in which the identifier can be given to any of the plurality of controlled devices after a predetermined time has elapsed.
  • the program for this was further recorded.
  • An information processing apparatus is an information processing apparatus connected to a control device via a network and controlled by the control device, and is normally controlled in response to a signal from the control device.
  • an information processing method is an information processing method for an information processing device connected to a control device via a network and controlled by the control device, and which normally operates in response to a signal from the control device.
  • the computer-readable medium according to the present invention is connected to a control device via a network, and is normally connected to a computer of the information processing device controlled by the control device in response to a signal from the control device.
  • a communication system includes a control device and a plurality of controlled devices controlled by the control device, and performs communication between the devices.
  • the control device includes a first determination unit that determines whether the controlled device is controlled normally in response to a signal from the control device. If it is determined that the control is not performed normally in response to the signal from the control device, the control is not performed normally, the first measuring means for measuring the duration of the state, and the first measuring means When the measured duration exceeds the first time, the apparatus has first opening means for releasing an identifier assigned to identify the controlled device.
  • a second determining means for determining whether the controlled device is controlled normally in response to a signal from the control device, and the second determining means determines that the controlled device is not normally controlled. In this case, the second measuring means for measuring the duration of the state where the control is not normally performed, and if the duration measured by the second measuring means exceeds the second time, the control unit allocates the time. Second release means for releasing the assigned identifier.
  • the control device determines whether or not the controlled device is normally controlled in response to a signal from the control device, for example, a signal that permits transmission, and continues the state in which the device is not normally controlled. The time is measured, and if the duration exceeds a certain value (first time), the identifier assigned to the controlled device is released. Further, in the present invention, the controlled device (information processing device) determines whether or not control is performed normally in response to a signal from the control device, and determines the duration of the state where control is not performed normally. When the measured time exceeds a certain value (second time), the identifier assigned by the control device is released. This makes it possible to eliminate a controlled device having a poor communication state from the network, eliminate unnecessary communication, and improve communication efficiency.
  • a signal from the control device for example, a signal that permits transmission
  • the control device is in a state where the released identifier can be assigned to any one of the plurality of controlled devices after a predetermined time (a third time) has elapsed.
  • a predetermined time a third time
  • the control device is in a state where it can be assigned to any of the plurality of controlled devices.
  • FIG. 1 is a system diagram showing a wireless network as an embodiment.
  • FIG. 2 is a block diagram showing a configuration of a wireless network node.
  • FIG. 3 is a diagram for explaining the configuration of the node ID.
  • FIG. 4 is a diagram showing a basic format of a bucket of the IEEE1394 standard.
  • FIG. 5 is a diagram showing a data format of an asynchronous packet of the IEEE1394 standard.
  • FIG. 6 is a diagram showing a data format of an isochronous bucket of the IEEE1394 standard.
  • FIGS. 7A to 7C are diagrams showing types of data blocks and contents of headers.
  • FIG. 8 is a diagram showing a data format of an access layer command.
  • FIG. 9 is a diagram showing a data format of wireless communication using infrared rays.
  • FIG. 10 is a diagram showing a data format of a cycle start bucket of the IEEE1394 standard.
  • FIG. 11 is a diagram showing a configuration of cycle time data.
  • FIG. 12 is a diagram showing an example of time slot allocation.
  • FIGS. 13A to 13E are diagrams for explaining operations of data block conversion and packet reconfiguration.
  • FIG. 14 is a diagram showing the storage contents of the storage area relating to each node ID.
  • FIG. 15 is a flowchart showing a control operation of the node initialization processing.
  • FIG. 16 is a flowchart showing the control operation of the node ID release processing.
  • FIG. 17 is a flowchart showing a control operation of a communication state monitoring process in the control node.
  • FIG. 10 is a diagram showing a data format of a cycle start bucket of the IEEE1394 standard.
  • FIG. 11 is a diagram showing a configuration of cycle time data.
  • FIG. 12 is a diagram showing an example of time slot allocation.
  • FIG. 18 is a flowchart showing the control operation of the call permission node determination process.
  • FIG. 19 is a flowchart illustrating the control operation of the communication state monitoring process in the controlled node.
  • FIG. 20 is a flowchart showing the control operation of the delay processing for reusing the identifier in the control node.
  • FIG. 1 shows the structure of wireless network 1 that uses infrared light as the wireless communication medium. An example is shown.
  • the network 1 includes five wireless network nodes (hereinafter, referred to as “WN nodes”) 2 to 6.
  • WN nodes wireless network nodes
  • the WN node 2 is connected to the IEEE 1394 bus 21.
  • the bus 21 also includes a satellite receiver 22 as an IEEE 1394 node, a receiver (set-top 'box) 23 for CA TV (cable television), a digital video disc (DVD).
  • Device 24 and video 'cassette' recorder (VCR) 25 are connected.
  • An antenna 26 for receiving a satellite broadcast signal is connected to the satellite broadcast receiver 22.
  • a cable 27 through which a CATV signal is transmitted is connected to the CATV receiving device 23.
  • the WN node 3 is connected to the IEEE 1394 bus 31. Further, a video camera 32 as an IEEE 1394 node is connected to the bus 31. WN node 4 is connected to IEEE 1394 bus 41. The bus 41 is further connected to a monitor 42 as an IEEE 394 node.
  • WN node 5 is connected to IEEE 1394 bus 51. Further, a computer 52 as an IEEE 1394 node is connected to the bus 51. The WN node 6 is connected to the IEEE 1394 bus 61. Further, a monitor 62 as an IEEE 394 node is connected to the bus 61.
  • the IEEE 1394 standard allows up to 63 nodes to be connected to the IEEE1394 bus.
  • the node ID consists of a bus ID (BUS_ID: 10 bits) that indicates the bus to which the node is connected and a physical layer ID (PHY_ID: 6 bits) that is a serial number within the bus, as shown in Figure 3. Is done. Therefore, the maximum number of buses connected in the network is 1023.
  • the bus ID of each node that has not been set (for example, when the power is turned on) is set to the initial value (3 FF).
  • every node has its own unique The device ID is assigned in advance.
  • FIG. 4 shows a data format for performing data communication according to the IEEE1394 standard, that is, a basic format of a packet. That is, this packet is roughly divided into a header, a transaction code (tcode), a header CRC user data, and a data CRC.
  • the header CRC is generated based only on the header.
  • the IEEE 1394 standard specifies that a node must not take action or respond to a header that does not pass the header CRC check.
  • the header must include a transaction code, which defines the main bucket type.
  • asynchronous (synchronous) packets there are two types of derivatives of the packets shown in Fig. 4, namely, asynchronous (synchronous) packets and asynchronous (asynchronous) packets, which are distinguished by transaction codes.
  • FIG. 5 shows a data format of the asynchronous packet.
  • the header is the identifier of the destination node.
  • destination—ID transaction label
  • rt transaction code
  • tcode priority information
  • pri source node identifier
  • Packet type specific report destination One of f set, rcode, reserved
  • Packet-type specific data quaddlet data, data—length, extended one tcode
  • header CRC power etc.
  • FIG. 6 shows the data format of an isochronous packet.
  • the header includes a data length (data—length), a format tag (tag) of isochronous eggplant data, an isochronous channel (channel), a transaction code (tcode), and a synchronization code. (Sy), which consists of a header CRC.
  • the bucket (isochronous bucket, asynchronous packet) in the above-mentioned IEEE 1394 standard has a variable length, as is well known.
  • the unit of the long data block Then, data transfer is performed. Therefore, in this embodiment, a fixed-length data packet is created at each WN node from bucket data such as an IEEE 1394 isochronous bucket and a synchronous bucket.
  • the packet is divided into a plurality of packets, and the data of the packet is included in the plurality of data blocks.
  • three types of fixed-length data blocks are created.
  • a header is arranged before the user data, and an error correction code (ECC: Error Correction Code) for the header and the user data is arranged.
  • ECC Error Correction Code
  • FIG. 7B a data block having user data consisting of data of a plurality of packets (two packets in the example in the figure).
  • a header is arranged before each user data, and an error correction parity for the entire header and user data is arranged.
  • Fig. 7C there is user data consisting of data of one or more packets (one packet in the example in the figure), and zero data (free data) is stored in the free space.
  • a header is arranged before the user data, and parity for error correction for the entire header, user data and zero data is arranged.
  • the data block is composed of 8 bytes of parity and 52 bytes of others, and is subjected to 0-3 modulation and transferred as data of 240 symbols.
  • the transmission rate is 2 ⁇ 24.576M bps
  • the parity is composed of 16 bytes and the other is composed of 104 bytes, and is transmitted as data of 240 symbols after 16 QAM modulation.
  • the transmission rate is 4 ⁇ 24.576 Mbps
  • the parity is composed of 32 bytes and the others are composed of 208 bytes, and is transmitted as data of 240 symbols after being subjected to 256 QAM modulation.
  • the header is composed of 4 bytes.
  • the packet ID area It has a sender ID area, data length information area, data type information area, division information area, and reserved area.
  • the bucket ID area stores, for example, a 7-bit bucket ID.
  • the original packet is identified by using the packet IDs “1” to “1 2 7” in order. After using “1 2 7”, use again from “1”.
  • the source ID area stores the node ID for wireless communication of the source WN node (different from the node ID shown in Fig. 2). This node ID is, for example, 3-bit data when a wireless network is configured with up to seven WN nodes. Note that the node ID of the control node is “1 1 1”.
  • the data length information area stores information indicating the length of the user data.
  • the data type information area stores a code that indicates whether the user data is data of an isochronous bucket, data that is a data of an asynchronous bucket, and data of an access layer command. Is done.
  • a data format access layer command is arranged in the user data of the data block as shown in FIG.
  • Access layer commands are used for mutual access and dedicated command communication between layers to communicate setting information between the WN node as a control node and the WN node as a controlled node. Although it is placed in the user data of the data block, it does not take the form of IEEE1394 packets because it is completed only between the access layers.
  • the command code indicates the type of access 'layer' command.
  • the payload length indicates the length of the command occupied in the user data (payload) in bytes.
  • the access payload command is stored in the data payload. The data is stored MSB justified, and the data short of the quadlet (4 bytes) unit is filled with 0 data.
  • the division information area includes packets such as “not divided”, “the beginning of the divided packet”, “the middle of the divided packet”, and “the end of the divided packet”. Information about division is stored.
  • FIG. 9 shows a data format of wireless communication according to the present embodiment.
  • time slots 1 to 6 are provided.
  • One of the WN nodes 2 to 6 described above is set to operate as a control node, as described later, and the control node controls transmission of each WN node.
  • the WN node as a control node transmits a control block before time slots 1 to 6 in each cycle.
  • This control block is Q P S K
  • the controlled node reproduces the transfer clock signal at the control node from the data of the control block, and synchronizes its own transfer clock signal with the transfer clock signal at the reproduced control node. Do the processing.
  • the control block transmitted from the control node is also used as a clock synchronization signal.
  • a sink for detecting a control block is provided in the sink area.
  • an IEEE 1394 node called a cycle master transfers data to the IEEE 1394 bus at a rate of once every 125 / isec (isochronous cycle). Stores the lower 12 bits of the 32-bit cycle time data contained in the start bucket. The remaining 2-bit (1 symbol) area of the cycle sync area is reserved.
  • FIG. 10 shows the data format of the cycle start bucket.
  • the header contains the destination node identifier (destination_ID), transaction label (tl), retry code (rt), transaction code (tcode), priority information (pri), and the source node It consists of an identifier (source—ID), a memory address of the destination node (destination—offset), cycle time data, and a header CRC.
  • FIG. 11 shows the structure of the 32-bit cycle time data. The 7 most significant bits represent the number of seconds, the next 13 bits represent the number of cycles, and the 12 least significant bits represent 24.5 7 6 It shows the count value (number of clocks) of the MHz clock signal.
  • the WN node as a controlled node extracts the 12-bit data stored in the cycle sync area of the control block in this way, and uses the extracted 12-bit data to generate its own cycle time data. Update the cycle time data generated in. As a result, the relative time of all nodes is automatically synchronized at the beginning of each cycle.
  • each IEEE 1394 node has CSR (Control and Status Registers) defined by ISIEC / IEC 13 213, in which the synchronization data of the cycle time register is almost 1 2 5
  • CSR Control and Status Registers
  • the 12-bit data stored in the cycle sync area of the control block which is transmitted from the control node at each cycle of 125 ⁇ sec, is generated at the cycle time data generator of the controlled node.
  • the same processing as the automatic synchronization of the IEEE 1394 cycle time register can be realized.
  • the slot permission area stores 5-bit information on time slots 1 to 6, respectively.
  • the 5-bit information consists of bit 0 to bit 4.
  • Bit 4 is “1" to indicate transmission of a tone request, and "0" to indicate transmission of data.
  • the tone request is a request for transmitting a tone signal for controlling transmission power.
  • Bit 3 is "1" to indicate isochronous data,
  • Bits 2 to 0 indicate the node ID of the WN node that permits transmission.
  • the node ID of the WN node as the control node is “1 1 1”.
  • the node ID for temporary use which is used to give a transmission opportunity to a WN node having no node ID, is set to “0 0 0”. Therefore, as the node ID of the WN node as the controlled node, "0 0 1"
  • the error correction area has a cycle sync area and a slot permission area.
  • the corresponding error correction code is stored.
  • As the error correction code a BCH (62, 44, 3) code is used.
  • Data blocks transferred using time slots 1 to 6 are omitted in the description of FIGS. 7A to 7C, but actually, as shown in FIG.
  • a gap area for 6 symbols and a sync area for 2 symbols are added to the area.
  • the sync area is provided with a sync for detecting a data block. Note that this sync area is always QPSK modulated irrespective of the modulation scheme of the data area.
  • FIG. 12 shows an example of allocation of time slots 1 to 6.
  • the control node can control the transmission of each WN node (control node and controlled node) using the slot permission area of the control block.
  • the control node determines each time slot 1 to 4 according to the data transfer information of each WN node, such as the transfer width reserved by the controlled node and the data status of the transfer schedule reported by the controlled node. It becomes possible to determine a node that is permitted to make a call in each of 6.
  • the reservation of the transfer width from the controlled node to the control node and the report of the data status of the transfer schedule are performed by using, for example, the access layer command described above.
  • control node can allocate a time slot to a given WN node and give permission to transmit the reserved transmission width, and to allocate another time slot to another WN node. Can be assigned.
  • control node can easily manage the maximum transfer width that can be reserved by the number of time slots in order to allow transfer other than the reserved transfer width. For example, asynchronous For example, data that does not reserve a transfer width and has no periodicity, such as a packet, can be transferred by using a time slot corresponding to a transfer width that is not reserved in the transfer of a narrow mouth bucket.
  • the controlled node When using a time slot with an unreserved transfer width, the controlled node reports the status of the data to be transferred to the control node using, for example, the access layer 'command described above.
  • the control node uses the various information such as the transfer width of the data to be transferred and the type of packet obtained from the controlled node, as well as the priority of the contents and the maximum allowable transfer time, to the transfer width that is not reserved. Calculate the distribution of the corresponding time slots, and determine the nodes that are allowed to transmit and the types of packets. As a result, for example, if data easily accumulates in a WN node that has a large amount of data to be transferred, it is possible to avoid the occurrence of a phenomenon such as delay in transfer of data requiring power and transfer speed.
  • the transfer process can be changed for each time slot. For example, in asynchronous transfer, the transfer width and transfer time of data are guaranteed, whereas in asynchronous transfer, the transfer contents need to be guaranteed rather than the transfer time. Therefore, by transferring in a different time slot for transmissions with different priorities on these wireless networks, for example, providing a free transmission width for transmissions that prioritize transmission time As a result, transfer processing such as enabling retransmission processing in the event of an error can be easily realized in units of time slots for transfer in which priority is given to power and content assurance.
  • FIG. 2 shows a configuration of a WN node 100 that is a control node or a controlled node.
  • the WN node 100 includes a microcomputer and has a control unit 101 that controls the operation of the entire system.
  • the control unit 101 stores a cycle time data generation unit 102 for generating 32 bits of cycle time data (see FIG. 11), and a microcomputer operation program in the control unit 101.
  • the read ROM (read only memory) 104 and the RAM (random access memory) 104 serving as a working memory are connected.
  • the cycle time data generator 102 is configured to count up a clock signal of 24.576 MHz.
  • WN node 100 becomes the control node
  • the lower 12 bits of the 32 bits of cycle time data generated by the cycle time data generator 102 are inserted into the cycle sync area of the controller block to be controlled. Will be supplied to the node.
  • the cycle time generated by the cycle time data generator 102 based on the 12-bit data extracted from the cycle sync area of the received control block The data will be updated.
  • the WN node 100 is connected to an isochronous bucket transmitted from another IEEE 1394 node (not shown) connected to the IEEE 1394 bus 105 and a synchronous bucket.
  • a data creation unit 107 for creating a DBL is provided.
  • the data creation unit 107 uses the control block (the cycle sync area and the slot permission area only) transmitted at the beginning of each cycle of 125 ⁇ sec. (See Fig. 9) A CBL is also created.
  • the data creation unit 107 also includes an access layer command used for mutual command communication between access layers in order to communicate setting information between the control node and the controlled node. Created. This access 'layer' command is placed and transmitted in the user data of the data block as described above.
  • the WN node 100 includes an error correction code adding unit 108 that adds parity (ECC) for error correction to the deblockable DBL output from the data generating unit 107, It has a scramble Z modulating section 109 which performs scrambling processing and modulation processing on the output data of the correction code adding section 109 and thereafter adds a sync to the head.
  • ECC parity
  • the WN node 100 includes an error correction code adding section 110 for adding an error correction code to the control block CBL output from the data generation section 107, and an error correction code adding section 111.
  • a scramble modulator and a modulator that perform scramble processing and modulation processing on the output data of 0, and then add a sync to the beginning, and modulate signals output from the scramble Z modulators 1109 and 1111
  • Corresponding infrared A light emitting element (light emitting diode) 112 for outputting a signal.
  • the error correction code adding unit 110 and the scramble / modulation unit 111 are used. Not done.
  • the WN node 100 detects the pattern of the sync of the data block (see Fig. 9) based on the light receiving element (photodiode) 115 that receives the infrared signal and the output signal of the light receiving element 115. It has a sync detection and playback unit 116 that outputs a timing signal SYd and generates a clock signal CKd synchronized with the data block whose sync is detected.
  • the mouth signal CKd is used when processing the data block in which the sink is detected.
  • the WN node 100 also performs a demodulation descrambling unit 117 that performs demodulation processing and descrambling processing on the decoded packet whose sync has been detected based on the detection timing signal SYd.
  • An error correction unit 118 that corrects errors in the header and the user data using the parity for the data block output from the descrambling unit 117, and an error correction unit 1
  • a user data extraction unit 119 extracts user data from the data block DBL output from 18, and a header extraction unit 120 extracts a header added to user data from the data block DBL. are doing.
  • the header extracted by the header extraction unit 120 is supplied to the control unit 101.
  • the WN node 100 uses the RAMI 21 for temporarily storing the user data extracted by the user data extraction unit 119 and the user data stored in the RAMI 21 for the header information. And a data restoration unit 122 for restoring the packet data based on the data and sending the packet data to the IEEE 1394 node connected to the bus 105.
  • the command is sent from the data restoration unit 122 to the control unit 101.
  • the WN node 100 detects a pattern of the sync of the control block (see FIG. 9) from the output signal of the light receiving element 115, outputs a detection timing signal SYc, and detects the sync. It has a sync detection / clock recovery unit 125 that generates a clock signal #CKc synchronized with the control block.
  • the clock signal CKc is used when processing the control block in which the sync is detected, and is used as a transfer clock signal for transmission processing.
  • the WN node 100 performs demodulation processing and descrambling processing on the control block in which the sync is detected based on the detection timing signal SYc.
  • An error correction code is used on the output data of the no-descramble section 126 to correct the error of the control block (cycle sync area and slot permission area) CBL and supply it to the control section 101.
  • Correction section 127 is used on the output data of the no-descramble section 126 to correct the error of the control block (cycle sync area and slot permission area) CBL and supply it to the control section 101.
  • WN node 100 when WN node 100 is a control node, demodulation / descrambling section 126 and error correction section 127 are not used.
  • the sync detection clock recovery unit 125 When the WN node 100 is a control node, the sync detection clock recovery unit 125 does not perform synchronization processing with reference to the clock signal reproduced from the control block, but simply runs on its own. Function as a transfer clock signal generator.
  • the transmission operation is performed as follows.
  • the data creation unit 107 creates a control block CBL (see FIG. 9) at the beginning of each cycle of 125 ⁇ sec. Then, an error correction code is added to the control block CBL by the error correction code addition section 110, and a sync is added after the scrambling and modulation processing is performed by the scramble / modulation section 111. Thus, a control block transmission signal is formed. The light emitting element 112 is driven by the transmission signal, and the control block is output from the light emitting element 112 as an infrared signal.
  • the data creator 107 outputs one data block DBL at the timing of each time slot for which its own transmission is permitted. Then, an error correction code is added to the data block DBL by an error correction code addition section 108, and a scramble / modulation section 109 performs scramble processing and modulation processing. Is added to form the outgoing signal of the data block. Then, the light emitting element 112 is driven by the transmission signal, and the data block is output from the light emitting element 112 as an infrared signal.
  • the receiving operation is performed as follows.
  • the infrared signal of the data block is received by the light receiving element 1 15.
  • the output signal of the light receiving element 115 is supplied to the sync detection / clock recovery section 116, where the sync of the data block is detected, and the detection timing signal SYd is obtained, and the sync is detected.
  • a clock signal CK d synchronized with the data block is generated.
  • the output signal of the light receiving element 115 is supplied to the demodulation / descrambling unit 117, and demodulation processing and descrambling processing are performed based on the detection timing signal S Yd. Further, the output data of the demodulation descrambler 117 is supplied to the error corrector 118, and the error correction of the data block DBL is performed using the error correction code.
  • the data block DBL from the error correction unit 118 is supplied to the header extraction unit 120 to extract a header, and the header is supplied to the control unit 101.
  • the data block DBL from the error correction unit 118 is supplied to the user data extraction unit 119, and this user data is supplied to the data restoration unit 122.
  • the data restoration unit under the control of the control unit 101 based on the header information, the bucket data is reconstructed from the extracted user data, and the reconstructed bucket data is transmitted to the IEEE 101 via the bus 105. Sent to 3 94 node.
  • the transmission operation is performed as follows.
  • An IEEE 1394 node sends data to the data generator 107 via bus 105.
  • the packet data is temporarily stored in the RAM I06.
  • the data creation unit 107 creates a data block DBL (see FIGS. 7A to 7C) from the packet data stored in the RAM I06.
  • the data generator 107 outputs one data block DBL at the timing of each time slot for which its own transmission is permitted.
  • an error correction code is added to the data block DBL by an error correction code addition section 108, and a scramble / modulation section 109 performs scramble processing and modulation processing.
  • the signal is added to form a data block transmission signal.
  • the light emitting element 112 is driven by the transmission signal, and the data block is output from the light emitting element 112 as an infrared signal.
  • the receiving operation is performed as follows. Infrared signals of control block No. data block are received by photodetectors 1 15. The output signal of the light receiving element 115 is detected as a sink. The signal is supplied to the clock recovery section 125, and the sync of the control block is detected, and the detection timing signal SYc is obtained and the sync is detected. A clock signal CK c synchronized with the control block is generated. The clock signal CKc is used for the control block processing as described above, and is also used as a transfer clock signal. That is, the above-described transmission operation is executed in synchronization with the transfer clock signal.
  • the output signal of the light receiving element 115 is supplied to the demodulation / descrambling unit 126, and demodulation processing and descrambling processing are performed based on the detection timing signal SYc. Further, the output data of the demodulation / descrambling unit 126 is supplied to the error correction unit 127, and the error correction of the control block CBL is performed using the error correction code.
  • control block CBL output from the error correction unit 127 is supplied to the control unit 101.
  • the control unit 101 extracts the 12-bit data included in the cycle sync area of the control block CBL, and uses the 12-bit data to generate the cycle time data generated by the cycle time data generation unit 102. Update. This allows automatic synchronization of the relative time of all nodes at the beginning of each cycle. Is performed. Further, control section 101 can recognize a time slot in which its own transmission is permitted, from information in the slot area of the control block CBL.
  • the output signal of the light receiving element 115 is supplied to the sync detection / clock recovery section 116, and the sync of the data block is detected, and the detection timing signal SYd is obtained.
  • a cook signal C Kd synchronized with the block is generated.
  • the output signal of the light receiving element 115 is supplied to the demodulation / descrambling unit 117, and demodulation processing and descrambling processing are performed based on the detection timing signal S Yd. Further, the output data of the demodulation / descrambling unit 117 is supplied to the error correcting unit 118, and the error correction of the data block DBL is performed using the error correcting code.
  • the data block DBL from the error correction unit 118 is supplied to the header extraction unit 120 to extract a header, and the header is supplied to the control unit 101.
  • the data block DBL from the error correction unit 118 is supplied to the user data extraction unit 119, and the user data is supplied to the data restoration unit 122.
  • the data restoration unit under the control of the control unit 101 based on the header information, the bucket data is reconstructed from the extracted user data, and the reconstructed bucket data is transferred via the bus 105 to the IEEE 1394. Sent to node.
  • the cycle start packet (CS) is sent from the I EE 1394 node to the data creation unit 107 of the first WN node
  • packet A and packet B are transmitted as packet data.
  • the cycle 'start' packet is sent from the cycle 'master' once every 125 ⁇ sec, but it is not always sent at a 125 ⁇ sec time interval, and the size of the bucket data is large. Depending on the case, the time interval may be larger than 125 ⁇ sec.
  • the data creation unit 107 obtains the packet A and the packet B from FIG. As shown in 3B, a fixed-length data block is created.
  • a data block having only the data of the packet A for example, a data block having only the data of the packet A, a data block having the data of the bucket A and the packet B, and having only the data of the bucket B, A data block or the like in which 0 data is arranged in the area is created.
  • a header having information on the original packet, division information, etc. is arranged at the head of the data (user data) constituting each packet.
  • the data block created by the data creation unit 107 of the first WN node is, as shown in FIG. 13C, the time slot for which transmission is permitted by the WN node as a control node. Calls are sent to the second WN node using 1-3. In this case, a parity for error correction is added to the data block, and a sync is added after the scramble processing and the modulation processing are performed, and the data block is transmitted as an infrared signal.
  • a data block sent from the first WN node is received, and user data extracted from this data block is used as a data restoration unit 12 2 and the header extracted from the data block is supplied to the control unit 101.
  • the data restoration unit 122 the original packet data is reconstructed from the user data based on the information of the original packet, the division information and the like included in the header as shown in FIG. 13E. Then, this bucket data is sent to the IEEE1394 node.
  • the node ID for wireless communication is composed of 3-bit data.
  • “1 1 1” is the node ID of the control node
  • “0 0 0” is the node ID for the purpose of temporary use
  • the node ID of the controlled node is ⁇ 0 0 1 ” To any of "1 1 0”.
  • Assignment of node IDs to controlled nodes is managed collectively by the control node. Therefore, as shown in FIG. 14, the RAM 104 of the WN node 100 (see FIG. 2) that can be a control node stores a use flag indicating the use status of the node ID.
  • Third and fourth storage areas are provided for storing the information.
  • a node ID with a use flag of “1” indicates that the node is in use, and a node ID with a use flag of “0” indicates that the node ID is unused.
  • the frequency information is 2-bit data. “1 1” indicates high frequency, “10” indicates normal frequency, and “0 0” indicates low frequency. The frequency corresponding to the unused node ID is set to “0 0”.
  • the control program for this node initialization process is started, for example, by turning on the power.
  • the WN node 100 starts receiving signals from other WN nodes in step S51, and from the WN node 100 as a control node in step S52. It is determined whether the control block can be received. If the control block cannot be received, it means that the wireless network has not been constructed yet, so in step S53, it is determined whether or not itself can be a control node.
  • the RAM I 04 of the WN node 100 that can be the control node stores the first storage area for storing the use flag indicating the use state of the node ID, and the node ID thereof.
  • a second storage area for storing transmission frequency information of the WN node is provided, and a third and fourth storage area for storing a monitoring power counter and a value of a delay counter. If it is not possible to become a control node, return to step S51. On the other hand, when it is possible to become the control node, the process proceeds to step S54, and becomes the control node, and shifts to the control node processing state.
  • the WN node 100 that has just become a control node does not have a controlled node as a communication target in the wireless network. Therefore, the control node The WN node 100 keeps transmitting control blocks at intervals of, for example, 125 ⁇ sec. This transmission of the control block prevents another WN node 100 from becoming a control node in the wireless space. If it is possible in step S52 to receive a signal from the WN node 100 as a control node, for example, a control block, the process proceeds to step S55 in order to join the wireless network as a controlled node. . As described above, in the slot permission area of the control block (see Fig.
  • the WN node 100 capable of transmitting in each of the time slots 1 to 6 in the next period uses the node ID for wireless communication. Is specified. Then, by using the node ID “0 0 0” for the purpose of temporary use, a transmission opportunity is given to the WN node 1 ⁇ 0 having no node ID.
  • step S55 the control node requests the control node to transmit the use status of the node ID for wireless communication using the time slot specified by the node ID “0000”. This request is made using an access layer command.
  • the WN node 100 as a control node refers to the use flag stored in the first storage area of RAM I 04 and uses the ID for the requested new node. Send status. This usage is also transmitted using the access layer 'command.
  • step S56 it is determined whether there is an unused node ID based on the usage state of the node ID. If there is no unused node ID, the process proceeds to step S57 to stop the process of joining the wireless network. This makes it impossible for more than six controlled nodes to join the wireless network. If there is an unused node ID in step S56, the process proceeds to step S58 to determine a node ID to be used by itself. Then, in step S59, the WN node 100 as a control node is used for the determined node ID by using the time slot specified by the node ID “0 0 0” described above. Request to update the use flag from "0" to "1". This request is made using an access layer command.
  • WN node 100 As a control node Of the use flags stored in the first storage area of M104, the use flag of the node ID requested to be updated is rewritten from “0” to “1” as described above.
  • the request flag from another new node changes the use flag of the node ID while the new node is processing. It is highly probable that it has been updated to “1”, and the update fails.
  • the WN node 100 as a control node notifies the new node that has requested the update of the use flag of the node ID of the success or failure of the update. This notification is also made using the access 'layer' command.
  • step S60 it is determined whether the use flag has been successfully updated. If the update fails, the process returns to step S55 to request the control node to transmit the node ID usage status again to join the wireless network as a controlled node. Operation is repeated.
  • step S61 the node becomes the controlled node specified by the node ID, and shifts to the controlled node processing state. In this case, the controlled node is given a node ID for wireless communication from the control node.
  • the new node automatically acquires the node ID for wireless communication, and joins the wireless network with the acquired node ID. As a result, the controlled node can perform wireless communication using the assigned node ID.
  • the control program for the node ID release processing is started by, for example, turning off the power.
  • the WN node 100 requests the control node to transmit the use state of the node ID to the control node using the time slot specified by its own node ID in step S71. I do.
  • the WN node 100 as a control node refers to the use flag of the node ID stored in the first storage area of the RAM 104, and Sends node ID usage.
  • step S72 it is confirmed from the usage status of the node ID that its own node ID is being used.
  • the use flag corresponding to the own node ID is set to “1” for the WN node 100 as a control node using the time slot specified by the own node ID. Is requested to be updated from "" to "0", and the process ends in step S74.
  • the WN node 100 as a control node, among the use flags stored in the first storage area of the RAM I04, the node whose update has been requested as described above. Rewrite the ID use flag from “1” to “0”. As a result, the control node has released the wireless communication node ID assigned to the controlled node.
  • the controlled node having the wireless communication node ID automatically releases the node ID and leaves the wireless network.
  • the control program for the node initialization process starts when the WN node 100 is powered on, while the control program for the node ID release process (Fig. 16) Is started when the power of the WN node 100 is turned off. Therefore, the wireless network continues to exist unless the power of the control node is turned off. Also, by turning on the power, the other nodes can acquire the node ID for wireless communication and join the wireless network as a controlled node, and conversely, by turning off the power, By releasing the node ID, the user can leave the wireless network.
  • the WN node 100 that constructs the wireless network moves out of the network, or the signal is shielded even in the network, so that the communication between the control node and the controlled node becomes impossible. Communication may be disrupted. Even in such a case, the network cannot be operated efficiently even if the controlled node gives a transmission permission to the controlled node in the same manner as the other controlled nodes. Therefore, in the WN node 100 as a control node, monitoring processing of the communication state is executed.
  • the WN node 100 as the control node
  • the monitoring process of the communication state in the embodiment will be described.
  • the control program for this monitoring process is performed, for example, every 125 seconds, which is a cycle unit.
  • step S75 the minimum value of the wireless communication node ID is set to n.
  • step S76 it is determined whether or not the node ID of n is in use. If not, the process proceeds to step S77 to determine whether or not n is the last node ID. If ⁇ is not the last node ID, in step S78, the next largest node ID is set to ⁇ , and the process returns to step S76. On the other hand, when ⁇ is the last node ID, the process proceeds to step S79 to end the monitoring process.
  • node ( ⁇ ) the signal from the node having the node ID of ⁇ (hereinafter referred to as “node ( ⁇ )”) is obtained in step S82. Investigate whether or not was successfully received. That is, it is checked whether or not there is a time slot for which transmission has been permitted since the last time this monitoring process was performed, and whether or not a signal from the node ( ⁇ ) has been received in that time slot.
  • step S83 the result of the investigation is determined. If it is determined that the signal from the node ( ⁇ ) has not been received normally, the process proceeds to step S84, and the monitoring stored in the third storage area (see FIG. 14) of RAM I04 is performed. Increment the counter value by one. Then, in a step S85, it is determined whether or not the transmission permission frequency of the node (n) is low. That is, it is determined whether or not the frequency information corresponding to the node (n) stored in the second storage area (see FIG. 14) of the RAM 104 is “0 0”.
  • step S86 it is determined whether the value of the monitoring counter is the set value, that is, the number of times that it is determined that the reception is not normally received is performed. It is determined whether the set number of times has been reached. When the value of the monitoring counter is not the set value, the process proceeds to step S77. On the other hand, when the value of the monitoring counter is the set value, the process proceeds to step S87, and the frequency information of the node (n) stored in the second storage area of RAM I 04 is set to “0 0 And set the outgoing call permission frequency of node (n) to a low frequency.
  • step S88 the value of the monitoring counter of the node (n) is cleared to 0, and the process proceeds to step S77.
  • the outgoing permission of this node (n) is The frequency will be reduced as described later, and the opportunity for permitting transmission to other nodes will increase, enabling efficient operation of the wireless network.
  • step S95 determines whether or not the value of the monitoring counter is the set value. If the value of the monitoring counter is not the set value, the process proceeds to step S77. On the other hand, if the value of the monitoring counter is the set value, the flow advances to step S96 to forcibly release the node ID of the node (n), and that delay processing is being performed. Then, in step S97, the value of the monitoring counter of the node ( n ) is cleared to 0, and thereafter, the process proceeds to step S77.
  • the use flag of the node ID of n stored in the first storage area of RAM 104 (see FIG. 14) is kept at “1”, and a new net is stored. Although it is not in a state that can be assigned to the controlled node that joins the work, the node ID of n is treated as unused in the transmission permission node determination process described later.
  • the state during the delay processing is released after a lapse of a predetermined time by the delay processing control operation described later, the use flag is changed from “1” to “0”, and the node ID of the n is newly set.
  • the state can be given to a controlled node that joins the network.
  • a state in which the node ID of n can be assigned after a certain time elapses is that, for example, communication from the control node to the controlled node has reached to some extent, but from the controlled node to the control node.
  • the monitoring counter (described later) of the controlled node has not yet reached the set value. A case is assumed. In such a case, the controlled node does not release the node ID and keeps holding the node ID.
  • step S83 If it is determined in step S83 that the signal of the node (n) has been received normally, the process proceeds to step S90, and the value of the monitoring counter of the node (n) is cleared to 0. Then, in step S91, it is determined whether there is a request from the node (n) to return to the normal frequency. This return request is sent using the access layer 'command described above. If there is a request to return to the normal frequency, the process proceeds to step S92, and the transmission permission frequency is set to the normal frequency. That is, the frequency information of the node (n) stored in the second storage area of RAM I04 is rewritten from “0 0” to “10”. After that, it proceeds to step S77.
  • step S91 If there is no request to return to the normal frequency from the node (n) in step S91, the process proceeds to step S93, and it is determined whether or not there is a request for the high frequency from the node (n). This request is also sent using the access layer 'command described above. If there is no request for high frequency, go to step S77. On the other hand, when there is a request for a high frequency, the process proceeds to step S94, and the frequency of outgoing call permission is set to a high frequency. That is, the frequency information of the node (n) stored in the second storage area of RAM I04 is rewritten to “11 J. Thereafter, the process proceeds to step S77.
  • the control node prepares a node ID for temporary use in order to give a transmission opportunity to a node having no node ID.
  • the control node can permit the node ID for the temporary use to permit transmission, for example, by cycling a node set infrequently.
  • transmission permission by the node ID for temporary use can be performed. This is because the nodes that want to join the wireless network are not always present in the network.
  • each WN node 100 is restricted by the transmission permission frequency of each node adjusted by the above-described communication state monitoring process (see Fig. 17).
  • FIG. 18 shows an example of a control operation of the WN node 100 as a control node, which determines a node that permits transmission in a certain time slot.
  • the example in Fig. 18 shows a wireless network with up to seven WN nodes 100 including the control node. This shows a case where a network is constructed.
  • the WN node 100 transmits the transmission permission frequency for one time slot within one cycle of the transmission permission processing.
  • a decision is made.
  • a process of determining whether transmission permission should be sequentially performed for all WN nodes 100 is performed.
  • the WN node 100 when the transmission permission frequency of a certain WN node 100 is set to a high frequency, the WN node 100 has three consecutive time slots within one cycle of the transmission permission processing. Is determined. Furthermore, when the transmission permission frequency of a certain WN node 100 is set to a low frequency, the WN node 100 transmits a transmission to one time slot within 32 cycles of the transmission permission process. A permission decision is made.
  • step S101 it is determined whether the count value N of the ID counter is greater than six.
  • the count value N of 0 to 6 respectively corresponds to the node ID “001” to “1 1 1”. If N> 6 is not satisfied, it means that it is in the middle of one cycle of the call permission process, and the process proceeds to step S102 to determine whether the node ID corresponding to the count value N is in use. I do. If the node ID is not in use, the flow advances to step S109 to increment the count value N of the ID counter, and then returns to step S101. On the other hand, if the node ID is in use, it is determined in step S103 whether the frequency of permitting transmission to the WN node having the node ID is low.
  • step S105 it is determined whether or not the transmission permission frequency for the WN node 100 having the node ID is high. Not frequently, the count value L of the high frequency counter is set to 0, and the count value of the ID counter is incremented in step S107. Thereafter, the process proceeds to step S 108, and the process of determining a transmission-permitted node for one time slot ends.
  • step S110 the count value L of the high frequency counter is incremented, and the process proceeds to step S111.
  • step S111 it is determined whether the count value L is greater than two. If L> 2 is not satisfied, the process proceeds to step S108, and the process for determining a call permitted node is ended. On the other hand, if L> 2, the process proceeds to step S106, where the count value L of the high frequency counter is set to 0, and the count value of the ID counter is incremented in step S107. Thereafter, the process proceeds to step S108, and the process of determining a call permitted node for one time slot ends.
  • step S101 it means that one cycle of the transmission permission process has been completed, the process proceeds to step S113, and the count value N of the ID counter is set to 0, and in step S114, The count value M of the low frequency counter is incremented. Then, in a step S115, it is determined whether or not the count value M is larger than 31. If not M> 31, it means that it is in the middle of 32 cycles of the transmission permission process, and the process proceeds to step S102, and the same operation as described above is performed. On the other hand, when M> 31, it means that the above-described 32 cycles have been completed, and the count value M is set to 0, and the process proceeds to step S102.
  • step S From 102 when the WN node 100 having the wireless communication ID corresponding to the count value N of the ID counter is in use and the transmission permission frequency is set to the normal frequency, step S From 102, the process proceeds to step S104 via step S103, and it is determined that transmission permission using the node ID is permitted for one time slot in the process. Then, the process proceeds to step S107 via step S106, the count value N is incremented, and the process ends.
  • the WN node 100 has one Is determined to be permitted to transmit for the time slot of.
  • step S102 if the WN node 100 having the node ID corresponding to the count value N of the ID counter is in use and its transmission permission frequency is high, the process proceeds from step S102 to step S102.
  • the process proceeds to step S104 via 103, and it is determined that transmission permission by the above-described node ID is permitted for one time slot in the process.
  • step S110 the count value L of the high frequency counter is incremented, and when the count value L is not greater than 2, the process ends without incrementing the count value N of the ID counter.
  • the operation shown in Fig. 18 is performed three times in succession for the node ID of the WN node 100, and A decision is made to allow transmission for the three time slots. Therefore, in the WN node 100, transmission permission for three consecutive time slots is determined within one cycle of the transmission permission process.
  • step S102 if the WN node 100 having a node ID corresponding to the count value N of the ID counter is in use and its transmission permission frequency is set to low frequency, the process proceeds from step S102 to step S102. Via 103, go to step S112. Then, only when the count value M of the low frequency counter is 0, the process proceeds to step S104, and it is determined that the transmission by the above-described node ID is permitted for one time slot in the process. Is done. Then, the process proceeds to step S107 via step S106, the count value N is incremented, and the process ends.
  • the transmission permission frequency is determined to be low.
  • the transmission permission is determined only in the first cycle of the 32 cycles of the transmission permission processing. Therefore, when the transmission permission frequency of the WN node 100 is set to low frequency, the WN node 100 transmits the transmission permission for one time slot within 32 cycles of the transmission permission processing. Will be determined.
  • control program for this monitoring process is, for example, in cycle units This is performed every 125 ⁇ sec.
  • step S121 a check is made for a transmission permission signal from the control node. That is, it is checked whether or not the transmission permission signal from the control node has been normally received since the last time this monitoring process was performed. Then, in step S122, the result of the investigation is determined, and when it is determined that the transmission permission signal from the control node has been normally received, the process proceeds to step S122, and the value of the monitoring counter is cleared to 0. Then, the process proceeds to step S127 to end the communication state monitoring process.
  • step S122 determines whether the transmission permission signal from the control node has not been normally received. If it is determined in step S122 that the transmission permission signal from the control node has not been normally received, the process proceeds to step S123. In step S123, the value of the monitoring counter is increased by one. Then, the process proceeds to step S124 to determine whether or not the value of the monitoring counter is the set value. If it is determined that the value is not the set value, the process proceeds to step S127, and the communication state monitoring process ends.
  • the value of the monitoring counter is the set value, it means that the controlled node has not normally received the transmission permission signal from the control node for a long time. It is also conceivable that the control node has already forcibly released the node ID of the controlled node. In such a case, the controlled node cannot communicate with the control node even if it has the node ID that has already been set, so the setting is cleared in step S125. Release the node ID. Then, the process proceeds to step S127, and the communication state monitoring process ends. In order for the controlled node to rejoin the wireless network after releasing the node ID, node initialization processing (see Figure 15) is required again.
  • the set value of the monitoring power center of the control node and the controlled node is a factor that determines how easily the controlled node departs from the network with respect to the communication state. Therefore, if the value is set to a small value, the controlled node can easily disconnect from the network, and the line stability of the network deteriorates. However, it is suitable for a network that emphasizes communication efficiency. On the other hand, if the value of the setting value is increased, the controlled node is less likely to leave the network, and the line stability of the network is improved, but the communication efficiency when the communication condition is poor is appropriately improved. It becomes difficult to do. Considering this, the control node and the controlled node The set value of the monitoring counter is set.
  • step S131 ⁇ is set to the minimum value of the node ID.
  • step S132 the node ID of ⁇ determines whether or not delay processing is being performed. If it is determined that the delay processing is not being performed, the process proceeds to step S137 to determine whether ⁇ is the last node ID. If ⁇ is not the last node ID, in step S138, the next largest node ID is set to ⁇ , and the process returns to step S132. On the other hand, if it is the last node ID, the flow proceeds to step S139 to end the delay processing.
  • step S1332 determines whether or not the node ID of ⁇ is in the process of being delayed.
  • the process proceeds to step S133, and the fourth storage area of RAM I04 (see FIG. 14)
  • the value of the delay counter of the node (n) stored in () is incremented by one.
  • the flow proceeds to step S134, and it is determined whether or not the value of the delay counter is a set value.
  • the set value of the delay counter is set to a value larger than the set value of the monitoring counter of the controlled node described above. If the value is set to a small value, the control node delay processing is performed earlier than the processing of releasing the node ID held by the controlled node (the processing of step S125 in FIG. 19). This is because there is a possibility that it will be terminated in the end. In such a case, there may be two controlled nodes with the same node ID in one network, and the delay processing performed to avoid such a situation makes no sense. .
  • step S134 If it is determined in step S134 that the value of the delay counter is not the set value, the process proceeds to step S137.
  • step S135. the use restriction on the node ID of n is released. That is, the use flag of the node ID of n stored in the first storage area of RAM I04 (see FIG. 14) is changed from “1” to “0”, and The node ID can be assigned to a controlled node that newly joins the network.
  • step S136 the value of the delay counter of the node (n) is cleared to 0, and thereafter, the process proceeds to step S137.
  • the node ID of ⁇ which has been forcibly released, is in a state where it can be given to a controlled node newly joining the network after a certain time has elapsed.
  • a node ID can be prevented from being owned by a plurality of controlled nodes, and the occurrence of an interference state can be suppressed.
  • the above-described communication state monitoring process is preferably performed frequently because it becomes a factor that changes the efficiency of the network. For example, as described above, in the IE 1394 system, it is preferable to perform the operation every 125 ⁇ sec which is a cycle unit. If the probability of occurrence of a communication error is a random network, the control node and the controlled node have the same probability of clearing the monitoring counter performed by the controlled node. Is preferable.
  • a monitoring counter is provided for each of the control node and the controlled node, and when the value of the counter reaches a set value, the node ID is released, so that useless communication is performed. Control can be performed so that communication efficiency can be improved.
  • the computer programs that perform the above-described processes are provided to users via recording media such as magnetic disks and CD-ROMs, and transmitted to users via networks such as the Internet and digital satellites. Alternatively, this may be provided by recording it on a recording medium such as a hard disk or a memory.
  • the present invention is applied to a wireless network for transferring bucket data such as an IEEE 1394 isochronous bucket and a synchronous bucket. (Universal serial bus) and other wireless networks that transfer high-speed serial bus data.
  • a wireless network for transferring bucket data such as an IEEE 1394 isochronous bucket and a synchronous bucket. (Universal serial bus) and other wireless networks that transfer high-speed serial bus data.
  • the present invention is applied to a wireless network using infrared rays as a wireless communication medium.
  • the present invention uses other wireless communication media such as a radio wave laser. Equally suitable for wireless networks Can be used.
  • the control device determines whether or not the controlled device is normally controlled in response to a signal from the control device, for example, a signal for permitting transmission, and determines whether the controlled device is not normally controlled. Is measured, and if the measured time exceeds a certain value (first time), the identifier assigned to the controlled device is released. Further, according to the present invention, the controlled device (information processing device) determines whether or not the control is normally performed in response to a signal from the control device, and determines whether or not the control is normally performed. The time is measured, and if the duration exceeds a certain value (second time), the identifier assigned by the controller is released.
  • the control device sets the released identifier to a state that can be assigned to any of the plurality of controlled devices after a predetermined time (third time) has elapsed.
  • a predetermined time third time
  • the identifier released by the control device is released by the previously-controlled device, and then becomes a plurality of identifiers. It becomes a state that can be given to any of the control devices.
  • control device and method, the information processing device and method, the communication system, and the computer-readable medium according to the present invention are suitable for application to a wireless network using, for example, infrared rays as a wireless communication medium. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un appareil de commande destiné à être utilisé dans un réseau radio. Un noeud de commande décide (S82, S83) si un noeud est correctement commandé par un signal du noeud de commande, par exemple, un signal qui permet de faire un appel. Le noeud de commande mesure (S84) le temps pendant lequel le noeud a été correctement commandé. Le noeud de commande retire forcément le ID du noeud (S96) si le temps dépasse une valeur déterminée (compte moniteur). Après une période de temps déterminée, l'ID retiré peut être affecté au nouveau noeud qui entre dans le réseau. Ainsi, les noeuds pauvres en communication sont retirés du réseau pour améliorer l'efficacité de communication.
PCT/JP1999/000952 1998-02-27 1999-02-26 Procede et dispositif de commande, procede et dispositif de traitement de donnees, systeme de communication et support lisible par ordinateur Ceased WO1999044337A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP10/46678 1998-02-27
JP4667898 1998-02-27

Publications (1)

Publication Number Publication Date
WO1999044337A1 true WO1999044337A1 (fr) 1999-09-02

Family

ID=12754047

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP1999/000952 Ceased WO1999044337A1 (fr) 1998-02-27 1999-02-26 Procede et dispositif de commande, procede et dispositif de traitement de donnees, systeme de communication et support lisible par ordinateur

Country Status (2)

Country Link
KR (1) KR20010020297A (fr)
WO (1) WO1999044337A1 (fr)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS6047534A (ja) * 1983-08-26 1985-03-14 Fujitsu Ltd ポ−リング制御方式
JPH06303174A (ja) * 1993-04-14 1994-10-28 Tokyo Electric Co Ltd 無線式データ処理装置
JPH08102742A (ja) * 1994-09-30 1996-04-16 Matsushita Electric Ind Co Ltd 無線中継装置
JPH09116562A (ja) * 1995-10-16 1997-05-02 Canon Inc 無線通信システム
JPH09162814A (ja) * 1995-12-05 1997-06-20 Tec Corp 通信監視装置
JPH10135955A (ja) * 1996-10-24 1998-05-22 Nec Eng Ltd 赤外線通信方法及び赤外線通信システム並びにこれらに用いる送受信装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS6047534A (ja) * 1983-08-26 1985-03-14 Fujitsu Ltd ポ−リング制御方式
JPH06303174A (ja) * 1993-04-14 1994-10-28 Tokyo Electric Co Ltd 無線式データ処理装置
JPH08102742A (ja) * 1994-09-30 1996-04-16 Matsushita Electric Ind Co Ltd 無線中継装置
JPH09116562A (ja) * 1995-10-16 1997-05-02 Canon Inc 無線通信システム
JPH09162814A (ja) * 1995-12-05 1997-06-20 Tec Corp 通信監視装置
JPH10135955A (ja) * 1996-10-24 1998-05-22 Nec Eng Ltd 赤外線通信方法及び赤外線通信システム並びにこれらに用いる送受信装置

Also Published As

Publication number Publication date
KR20010020297A (ko) 2001-03-15

Similar Documents

Publication Publication Date Title
US7450604B2 (en) Method and apparatus for establishing circuit connections over local area networks with frequency selective impairments
JP3576019B2 (ja) 通信ノード
JP2004515090A (ja) 電力線通信ネットワークシステムにおけるメディアアクセス制御用の方法及び装置
JP4731096B2 (ja) 通信システム及びデバイス
EP1169812B1 (fr) Decouverte de diffusion dans un reseau pourvu d'un ou plusieurs bus 1394
WO1999044336A1 (fr) Appareil de traitement de donnees et support lisible par ordinateur
JP3561107B2 (ja) ネットワーク接続装置
WO2004047376A1 (fr) Dispositif et programme de relais de reseau, support d'enregistrement contenant ce programme de relais de reseau
EP1009116B1 (fr) Réseau sans fils et procédé d'établissement de synchronisation temporelle parmi une pluralité de bus
US6658475B1 (en) Method and device for initializing a wireless network using a plurality of controlled devices
WO1999017500A1 (fr) Procede et dispositif de radiocommunication
JP2001016209A (ja) 情報処理装置および方法、並びにコンピュータ読み取り可能な媒体
JPH11331228A (ja) データ通信システム及びデータ通信方法
WO1999044337A1 (fr) Procede et dispositif de commande, procede et dispositif de traitement de donnees, systeme de communication et support lisible par ordinateur
US6671269B1 (en) Radio communication method and radio communication apparatus
JP2004509518A (ja) 通信システムおよびデバイス
JP2002158730A (ja) 通信方法及び通信装置
JPWO1999038290A1 (ja) 制御装置および方法、無線通信装置、並びにコンピュータ読み取り可能な媒体
JPWO1999044337A1 (ja) 制御装置および方法、情報処理装置および方法、通信システム、並びにコンピュータ読み取り可能な媒体
JP2004088330A (ja) ネットワークブリッジ装置及び方法
JPWO1999017500A1 (ja) 無線通信方法および無線通信装置
JP2001144795A (ja) 電子機器
JP2003229857A (ja) シリアルバスシステム、シリアルバスの帯域管理機器および通信機器
JPH11266217A (ja) 時分割多元接続通信システム及び時分割多元接続通信システムにおける信号受信方法並びに時分割多元接続通信システムに使用されるセンター装置
JP3664050B2 (ja) 接続復旧装置

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): JP KR US

WWE Wipo information: entry into national phase

Ref document number: 1019997009901

Country of ref document: KR

WWE Wipo information: entry into national phase

Ref document number: 09403813

Country of ref document: US

WWP Wipo information: published in national office

Ref document number: 1019997009901

Country of ref document: KR

WWW Wipo information: withdrawn in national office

Ref document number: 1019997009901

Country of ref document: KR