Wireless 2
Wireless 2
Invited Paper
With the success of wireless technologies in consumer elec- environment can be substantially reduced, thus making plant
tronics, standard wireless technologies are envisioned for the setup and reconfiguration more easy. This is especially im-
deployment in industrial environments as well. Industrial appli- portant in harsh environments where chemicals, vibrations,
cations involving mobile subsystems or just the desire to save
cabling make wireless technologies attractive. Nevertheless, these or moving parts exist that could potentially damage any sort
applications often have stringent requirements on reliability and of cabling. In terms of plant flexibility, stationary systems
timing. In wired environments, timing and reliability are well can be wirelessly coupled to any mobile subsystems or mo-
catered for by fieldbus systems (which are a mature technology bile robots that may exist in order to achieve a connectivity
designed to enable communication between digital controllers and that would otherwise be impossible. Furthermore, the task of
the sensors and actuators interfacing to a physical process). When
wireless links are included, reliability and timing requirements are temporarily accessing any of the machinery in the plant for
significantly more difficult to meet, due to the adverse properties of diagnostic or programming purposes can be greatly simpli-
the radio channels. fied by the use of these wireless technologies.
In this paper, we thus discuss some key issues coming up in wire- Along with the simplification of accessing machinery,
less fieldbus and wireless industrial communication systems: 1) fun-
many industrial applications exist that could benefit from the
damental problems like achieving timely and reliable transmission
despite channel errors; 2) the usage of existing wireless technolo- use of wireless technologies. The localization and tracking of
gies for this specific field of applications; and 3) the creation of unfinished parts, the coordination of autonomous transport
hybrid systems in which wireless stations are included into existing vehicles and mobile robots [1]–[3], as well as applications
wired systems. involving distributed control are all areas in which wireless
Keywords—Bluetooth (BT), fieldbus systems, hybrid systems, technologies could be used in an industrial environment.
IEEE 802.11, IEEE 802.15.4, real-time communications, wireless Many of these industrial applications are served by
technologies.
fieldbus systems [4]–[8] like PROFIBUS [9], [10], WorldFIP
[11], [12] or CAN [13], [14], which are wired. Fieldbus sys-
I. INTRODUCTION tems have been specifically designed for solving automation
or control tasks that rely on the interconnection of digital
The true convenience of being able to connect devices
controllers with other digital controllers as well as sensors
without the use of wires has lead to the unprecedented suc-
and/or actuators (including their underlying physical pro-
cess of wireless technologies in the consumer goods industry.
cesses). The primary goal of these systems is to provide
Based on this success, applications using these technologies
real-time communication services that are both predictable
are beginning to appear in various other settings as well. In
and reliable, i.e., make certain guarantees on eventual
an industrial or factory floor setting, for example, the bene-
delivery of packets and delivery times. Some important
fits of using wireless technologies are manifold. First of all,
characteristics of fieldbus traffic are: 1) presence of cyclic
the cost and time needed for the installation and maintenance
(i.e., recurring) or even periodic traffic (bounded jitter be-
of the large number of cables normally required in such an
tween subsequent packets required), subject to deadlines;
2) presence of important acyclic packets like alarms, which
Manuscript received March 25, 2004; revised March 11, 2005. need to be reliably transmitted with bounded latencies; and
A. Willig is with the Hasso-Plattner-Institute, University of Potsdam,
Potsdam 14482, Germany (e-mail: awillig@ieee.org). 3) most packets are short, on the order of a few bytes. The
K. Matheus is with CARMEQ GmbH, Berlin 10587, Germany (e-mail: protocol architecture of most fieldbus systems covers only
kirsten.matheus@carmeq.com). the physical layer, the data link layer including the medium
A. Wolisz is with the Telecommunication Networks Group (TKN), Tech-
nical University Berlin, Berlin 10587, Germany (e-mail: awo@ieee.org). access control (MAC) sublayer, and the application layer of
Digital Object Identifier 10.1109/JPROC.2005.849717 the OSI reference model.
DH2, and DH3), the power consumed by the network as well ZigBee alliance (see http://www.zigbee.org) is a consortium driven by in-
dustry and research institutions. It finalized the ZigBee specification in De-
as the overall load of the network is reduced. In order to ob- cember 2004 and describes higher layer protocols (networking, application)
tain a good throughput and have low interference, it is disad- that operate on top of IEEE 802.15.4.
The IEEE 802.15.4 standard differentiates between two increased delay spread found in industrial plants not to cause
different kinds of devices. A full-function device (FFD) can a problem.
become a network coordinator and can work with other FFDs For security purposes, IEEE 802.15.4 provides authenti-
in a peer-to-peer fashion. Reduced-function devices (RFD), cation, encryption, and integrity service. The developer can
on the other hand, are always associated with one of these choose between no security, an access control list, and a
FFDs and are limited to exchanging data with this device 32–128-b Advanced Encryption Standard (AES) encryption
alone. Among RFDs there is no peer-to-peer communication with authentication.
possible. All devices have a 64-b address, but it is possible
for RFDs to obtain a 16-b shorthand address from their co- C. IEEE 802.11 Technologies
ordinator FFD.
IEEE 802.11 is composed of a number of specifications
With respect to the MAC protocol used by the IEEE that primarily define the physical and MAC layers of WLAN
802.15.4 standard, there are two different modes of oper- systems [15]–[17], [44], [97]. Similar to other standards from
ation. In unbeaconed mode, all stations use an unslotted the IEEE 802.x series, the IEEE 802.11 MAC suggest the
CSMA variant. Here, a station initiating transmission of a IEEE 802.2 logical link control (LLC) [98] as a standard
packet does not perform carrier sensing immediately, but interface to higher layers. Since IEEE 802.11 is a WLAN
introduces a random waiting time, called a backoff time. standard, its key intentions are to provide high throughput
Having such a backoff time facilitates the avoidance of and a continuous network connection. Because of the focus
collisions. In beaconed mode (see Fig. 2), the network co- on COTS technologies for wireless connections in industrial
ordinator imposes a superframe structure. The coordinator deployments, only the most common variations and exten-
transmits beacons periodically, choosing one of a number sions of IEEE 802.11 systems will be discussed here. These
of configurable periods between 15.36 ms and 251.65 s. variations and extensions include the general 802.11 MAC,
The remaining superframe starts with the contention-access IEEE 802.11a, IEEE 802.11b, and IEEE 802.11g for phys-
period, in which the RFDs access the medium according to a ical layers, as well as relevant extensions in respect to net-
slotted CSMA-CA variant, which incurs more overhead than work planning and QoS.
the unslotted variant. An optional contention free period is The main parameters of IEEE 802.11 a/b/g are the
available, where the network coordinator allocates guaran- following.
teed time slots (GTSs) to individual RFDs for either uplink
• IEEE 802.11a [16] is placed in 5-GHz bands that
data or downlink data. In addition to these two modes of
are license exempt in Europe (5.15–5.35 GHz and
operation, an inactive period of operation exists. During this
5.47–5.725 GHz) and unlicensed in the United States
period, all nodes including the coordinator in the network
(UNII bands, 5.15–5.35 GHz and 5.725–5.825 GHz).
are put to sleep in order to conserve energy.
Over the whole spectrum, this allows for 21 systems
Data packets are acknowledged and the protocol supports to be running in parallel in Europe and eight in the
retransmissions, but there is no FEC coding. In the beaconed United States [99]. The IEEE 802.11a physical layer
mode, the throughput is smaller than in the unbeaconed (PHY) is based on the multicarrier system orthogonal
mode, in which no beacon frames exist and the unslotted frequency-division multiplexing (OFDM) [60]. Seven
CSMA variant has less overhead. Under the conditions in- modes are defined, ranging from BPSK modulation
vestigated in [96], the maximum user data rate when running with rate-1/2 FEC and a 6-Mb/s data rate to 64-QAM
in the 2.4-GHz ISM band is 38 kb/s with one source, and up modulation with rate-3/4 FEC and a 54-Mb/s data
to 70 kbs when multiple sources are present. These observed rate. The maximum user-visible rates depend on the
data rates are, in fact, quite small. packet sizes transmitted. In the 54-Mb/s mode, the
Similar to BT, IEEE 802.15.4 uses low transmit power transmission of Ethernet packets that are 1500 B long
levels. In addition to this, IEEE 802.15.4 also uses very results in a maximum user rate of about 30 Mb/s,
short symbol rates (up to 62.5 ksymbols/s), allowing the while sending packets with user payloads of just 60 B
8The hidden terminal problem has been discussed in Section II-B3. In the E. Comparison of Wireless Systems
exposed terminal problem, station A wants to transmit a packet to station C .
Station A senses an interferer B and refrains from transmission, even when In the last few sections, we examined three different
B ’s signals do not reach C . A possible transmission is thus suppressed. systems. All three systems have been designed for use in
different scenarios, thus offering various advantages and • In the case of broadcast packets, there is no RTS/CTS
disadvantages over one another depending on their use. The handshake, there are no ACK frames, and no MAC
802.11 systems are suitable for transmitting large amounts layer retransmissions are performed. Accordingly, the
of data. IEEE 802.15.4 is suitable when communication is transmission of responses or the initiation of retrans-
infrequent, small packet sizes are used, and power consump- missions have to be implemented in higher layers.
tion is an issue. BT fills the gap between these two by being From the perspective of the MAC layer, request and
able to transmit at medium data rates with a lower power response packets are equivalent in the sense that the
consumption than IEEE 802.11 (see also Table 1). MAC entity has to contend for the channel in the
Although all three systems can be used on the factory floor, same way for both types of packets. This contention
none of them will be able to run at their nominal perfor- includes the carrier-sensing operation. As a result, in
mance levels because of the adverse radio conditions that the 802.11 DCF case, an acknowledgment or response
will be present. These conditions, such as frequency-selec- packet might be delayed by interference or traffic
tive fading or interference, are especially prevalent if the from colocated systems, causing the round-trip time
system is placed in the 2.4-GHz ISM band. to become randomized. In fieldbus systems such as
Note that the effects of Doppler shifts caused by mobility PROFIBUS [9], [10], on the other hand, response or
have not been considered. The velocity of moving entities acknowledgment packets are sent immediately, and no
on the factory floor is expected to be too small to matter carrier sensing is required. In this type of system, the
(not more than 20 km/h; see [40], based on a user survey). round-trip time is predictable.
Seamless connectivity of moving entities might require • In the case of unicast packets, the RTS/CTS handshake
hand-over algorithms. While for IEEE 802.11 roaming is can be switched off. All stations, however, generate
specified in IEEE 802.11f (though with some performance ACK frames automatically and the MAC layer per-
limits [119]), it is not covered in the specifications of BT forms retransmissions. These ACK frames are not al-
and IEEE 802.15.4 (though not impossible to realize). ways useful. The PROFIBUS offers a mechanism, for
example, where the responder can place answer data
F. Implementation of Fieldbus Services directly into its MAC layer acknowledgment packet.
When wireless fieldbus systems are to be implemented This answer data is fetched from a link-layer buffer,
with one of the COTS technologies discussed in this section, and it becomes the responsibility of the higher layers
the fieldbus services and communication models have to be to write appropriate data to this buffer. Such an imme-
mapped to the services and interfaces offered by these sys- diate acknowledgment carrying data is not possible in
tems. We discuss mapping approaches for two of these tech- IEEE 802.11, however, since the ACK frames are al-
nologies: IEEE 802.11 with DCF, and BT. ways empty. To emulate this behavior, the responder
1) IEEE 802.11 DCF: Even with problems like channel must issue a separate data packet for the response data.
errors or hidden terminal situations taken aside, the IEEE The overall transaction thus includes two extra ACK
802.11 DCF lacks predictability due to its stochastic ac- packets.
cess mechanism with random backoff times and station The way in which the producer–distributor–consumer
contention. communication model ([120]; see also Section II-B1) can
One can eliminate contention by using a contention-free be implemented using the IEEE 802.11 DCF and the IEEE
access mechanism such as polling9 or token-passing on top 802.2 Logical Link Control (LLC) [98] protocol is investi-
of the IEEE 802.11 DCF. In the case of polling, for example, gated in [121]. The LLC is a common link-layer protocol for
this can mean that a station starts to use the DCF access the IEEE 802.x technologies.10 An additional producer–con-
mechanism only after receiving a poll packet. It is impor- sumer protocol (PCP) uses the services of the LLC to
tant to consider whether the fieldbus packets should be em- implement the producer–distributor–consumer mechanism.
bedded into unicast IEEE 802.11 packets or into broadcast To query a data item, the distributor’s PCP entity first
IEEE 802.11 packets: 10Together, the LLC and the different IEEE 802.x technologies cover
the data link layer and the physical layer of the OSI reference model. The
IEEE 802.x technologies provide the physical layer and the MAC sublayer,
9The “standard” solution for polling with IEEE 802.11, PCF, has not whereas the LLC provides the upper parts of the data link layer. It is com-
found widespread deployment. When only DCF equipment is available, posed of mechanisms for error control, connection management, as well as
polling must be implemented separately. others.
A. Cut-Through Forwarding
IV. HYBRID WIRED/WIRELESS FIELDBUS SYSTEMS
Cut-through forwarding is typically the mode of operation
In a hybrid wired/wireless fieldbus system, both wired sta- used by repeaters, but some types of bridges can also be made
tions (with transceivers being attached to a cable) and wire- to work in this mode.
less stations (having wireless transceivers) should be able to 1) Origins of Forwarding Delay: Some of the factors
communicate with each other. which must be taken into consideration when designing
In master–slave protocols, for example, a wired (wireless) cut-through devices include the following [136].
master should be able to send a request to a wireless (wired) • The media can have different frame format require-
slave and get a response back. Often, there are legacy wired ments. In the IEEE 802.11 DSSS physical layer, for
fieldbus systems running in a plant. The addition of wireless example, all frames are prepended with a 128- s-long
stations should not require any modifications to the protocols preamble and a 64- s-long physical header, indepen-
and applications running on these wired stations. dent of any MAC protocol. In the PROFIBUS RS-485
The wireless interconnection of wired stations by means physical layer, there is no preamble and no physical
of encapsulating bridges has been considered in [132]. The layer header. When a packet is to be forwarded from
idea behind such an interconnection is to cut the cabling of a PROFIBUS segment to an IEEE 802.11 DSSS wire-
a wired fieldbus system at some point and insert a wireless less segment, the data bits that are received during pre-
link between the two ends (cable replacement). This cable amble generation time must be buffered.
replacement is useful, for example, for placing a subset of a • The medium speeds may differ. Because of this dif-
fully wired network on a mobile system, such as on a portal ference, buffering is needed in both forwarding direc-
crane or a guided vehicle. Such approaches are not discussed tions. In the case of forwarding from a faster medium
further in this paper. to a slower one, data bits arrive faster than they can
A segment is defined as a set of stations that are attached to be output, and would get lost without buffering. The
a common medium, run the same protocols, agree on trans- case of forwarding from a slower medium to a faster
mission parameters, and thus are able to directly commu- one is different. Most media types require that bits be
nicate. A wired segment consists entirely of wired stations, transmitted without gaps between them. Because of
while a wireless segment consists entirely of wireless sta- this requirement, the coupling device cannot immedi-
tions. When two wireless segments overlap in space, they ately start transmission on its output medium once the
need to be separated by some means, for example, by the use reception of the packet on its input medium has begun.
of nonoverlapping frequencies. Instead, the coupling device has to buffer the incoming
this approach is the reduced responsiveness to trans- (but applicable to other systems as well) is the insertion of
mission errors. The detection of a missing response extra idle times between requests [139], [140]. With refer-
(even from a slave within the same segment) takes ence to Fig. 3, the distributor, after receiving response one,
much longer than it would if there were just a single waits for an additional time before issuing request two.12
segment and short timeouts. Due to the probability of 3) Relative Temporal Consistency: Some systems rely on
transmission errors on wireless media, this delay can broadcast packets to achieve relative temporal consistency.
become critical if wireless links are involved. The communication between a set of sensors sampling the
• Select the timeout to be the same as the timeout for physical environment, for example, requires such a consis-
single-segment networks without any forwarders. tency (see Section II-B1). If the sensors were to belong to
When a request issued by station is addressed to different segments, however, the temporal consistency could
station located in a distant segment, this timeout be jeopardized by the fact that the forwarding delay intro-
will be too small to accommodate for the round-trip duces additional jitter between the sampling instants.
time. One option to deal with this problem is to avoid One solution would be to keep all stations synchronized
letting retransmit its request packet. The forwarder to a common time reference and instruct them to sample at
, closest to , responds to ’s request with a special an explicitly specified time. The price to pay, however, is
“response-comes-later” packet [138]. If is located the introduction of a time synchronization protocol (see [29,
on another segment attached to , acquires ’s Ch. 8] for a survey) and the need for hardware clock circuitry
response and forward it on to . No further action of even in small sensors.
is required. If is not located in a segment attached
to , directs its request to another forwarder , D. Repeaters Versus Bridges
gets a “response-comes-later” packet, and the process Repeaters essentially convert the physical representation
continues. A drawback to this approach is that existing of signals from one type of medium to another. They usually
fieldbus protocols typically do not contain such a work in cut-through mode, but S+F is also possible. Since
mechanism. Without this mechanism, existing pro- repeaters operate essentially on the physical layer, there
tocols would have to be modified, and wireless links are no medium access delays. The segments connected by
would no longer be able to be seamlessly integrated a repeater run the same MAC protocol and form a single
into them. network. The protocol stack of the stations does not need to
2) Queueing Effects: The presence of preambles or be changed, except maybe for certain configuration settings
different speeds on the medium can have the effect that such as link-layer timeouts. Repeater-based solutions do,
two identical packets have different transmission times on however, expose wired stations to the errors present in the
different media. Because of this fact, queuing delays are now wireless channel.
going to be present [139], [140]. An example illustrating Bridges operate on the data link layer. Their precise oper-
these delays can be seen in Fig. 3. Assume a producer–dis- ation depends on the similarity between the layers on either
tributor–consumer system. There are two different segment side of them [134], [135]. Bridges often operate in S+F mode
types and . The distributor and the producers for and place restrictions on forwarding. As an example: 1) when
requests Req1 and Req2 are located in segment , the the input packet is corrupted (e.g., checksum failure), for-
producer for request Req3 is located in segment , and warding is suppressed, and 2) when the destination station of
consumers are spread throughout and . It is assumed a packet is known to be in the input segment, no forwarding
that both production requests and producer responses have a is necessary.13 The ability to avoid forwarding for intraseg-
duration of s on segment . On segment these same ment traffic has different benefits.
packets have a duration of s. As seen in the figure, the
forwarding delay (indicated by the dashed lines) increases 12When there are only unicast packets in a master–slave system, there is
over time. The packets the coupling device receives from no need for extra idle times when the forwarding device can filter packets
based on addresses. Referring to the example, the forwarder would not for-
that it needs to forward to will be buffered in a queue. ward the first two requests and responses to segment S .
If the distributor issues a third production request Req3 for 13To achieve this, the bridge has to learn which stations can be found
a variable produced by a station in , the request packet in which segments. Such detection can be done, for example, by snooping
experiences a queueing delay in the forwarding device. packets and exchanging information with other bridges [134]. Additional
mechanisms (spanning tree construction) are needed to avoid forwarding
Similar situations can also occur in master–slave systems loops. When the address fields of a packet are placed at its beginning (which
such as PROFIBUS. A solution developed for such systems is common), a filtering bridge can also work in cut-through mode.