Wired M-Bus Specification


The Basics of Serial Bus Systems

2.1 Applications and Definitions

The methods by which data processing systems communicate with each other are classified according to the distances involved. With world-wide networks the term used is Global Area Networks (GAN), whereas networks covering continents or large land masses are known as Wide Area Networks (WAN); Local Area Networks (LAN) are concerned with distances up to a few kilometers, and are limited to specific geographical areas, such as laboratories, office buildings and company premises. Such local networks are used, for example, to link terminals, computers, measuring equipment and process automation modules with one another.

In the majority of local networks, one or other of the following methods (topologies) are used to link the components in a system:

Fig. 1 Network Topologies Fig. 1 Network Topologies

A serial bus can be defined as a transmission path over which the participants transmit their data serially (i.e. bit after bit), sequentially in time and using a common medium. In contrast, in parallel bus systems the individual bits which form a character are transmitted simultaneously by a certain number of data lines. This results in increased costs for cable and connectors; the transmission time is shorter than with a serial bus.

2.2 Basic Functions of Bus Systems

The following diagram is intended to provide an overall view of the various forms of serial bus systems:

Fig. 2 Classification of Serial Bus Systems According to Transmission and Access Techniques Fig. 2 Classification of Serial Bus Systems According to Transmission and Access Techniques [1]

The first subdivision can be made according to the multiplex technique which is used. With frequency multiplex, the frequency spectrum of the transmission medium is divided into frequency bands, each representing a channel. Each participant is then allocated a channel. In the next section, the kind of synchronization and access techniques which are used will be described in order to classify serial bus systems using time division multiplex.

2.2.1 Access Techniques

Since in bus systems the transmission medium is used by all participants together, account must be taken of their various transmission requirements. The methods used by participants who want to transmit over the bus are known as access techniques. These techniques must ensure that several stations do not transmit simultaneously, and so cause bus conflicts or collisions, and that each participant can transmit for at least a certain minimum time. The sharing of the bus among stations who want to transmit is implemented with an allocation logic system.

With central allocation logic, the central bus controller receives a request to use the bus and then takes the decision as to whether, and if so when, the user can occupy the bus. For this purpose various methods are used to register the bus occupation request:

The advantage of central allocation logic is the reduced complexity which is required at individual stations.

With decentralized allocation logic, each participant is provided with functions which allow him to recognize whether the bus is already in use. There are various methods which can be used to determine whether the bus is occupied:

A higher degree of logic complexity at each station is needed to implement decentralized allocation logic, but this system also has the advantage that a fault in the central bus controller will not result in a complete breakdown of the bus.

2.2.2 Synchronization of Participants

Synchronization is to be understood as the coordination in time of the communicating participants, with regard to signal transmission and reception. The various methods of synchronization can be classified into data transmission which is synchronous and that which is asynchronous (see Figure 3).

With synchronous transmission, a stable clock signal is supplied either by the central station or one of the communicating partners, which serves to measure transmission times. With asynchronous transmission, a distinction must be made between techniques with and without signal acknowledgment. Where there is signal acknowledgment (handshake), the sender shows with a specific signal on the line that he has data to send, and waits for an acknowledgment from the receiver. Techniques without acknowledgment use a transfer clock on a special line for parallel bit transmission, or start and stop bits to frame a character for bit-serial transmission.

Fig. 3 Classification of Synchronization Techniques Fig. 3 Classification of Synchronization Techniques

2.2.3 Error Processing

The reasons for transmission errors in bus systems are widely known. These include in particular electromagnetic interference from outside, for example: inductive coupling at mains frequencies; high-frequency interference as a result of sparking at the brushes of motors or arcs of discharge lamps; capacitive coupling to other lines; or directly coupled currents from ground loops as a result of multiple grounds.

A bus system must ensure that transmission errors are recognized and corrected. For this reason additional information is supplied with the data to be transmitted, which allows the data to be checked on reception.

Particularly with asynchronous transmission, an additional parity bit is often transmitted with each character. This parity bit is constructed so that the parity conditions (an even number of ones, or an odd number of ones) are fulfilled. Another method is the creation of a block check character from specific mathematical operations e.g. addition without carry (Check Sum), which is derived from all the data. The receiving station can detect whether there have been transmission errors by comparing the check character it has received with one which it has calculated itself. The parity bit allows only the recognition of an odd number of faulty bits.

In order to correct errors the recipient sends an acknowledgment, which indicates that the transmission has been either error free, or that there have been transmission errors. For the same purpose the transmitter checks that the receiver acknowledges the reception of data in a certain period of time. If the time limit is exceeded (Timeout), or if a transmission error has been reported, then the sender repeats the transmission a predetermined number of times.

The Hamming Distance is used in order to specify the security of a character code; this is the number of errors (minus one) which can be recognized for all cases.

2.3 The OSI Reference Model

The ISO-OSI reference model provides a basis for the development of standards for Open Systems Interconnection (OSI). This model devised by the “International Organization for Standardization” (ISO) is intended to ensure that information from systems made by various manufacturers, and having different architecture, can be exchanged and interpreted in accordance with standardized procedures.

This model arranges the communications functions in seven layers, each of which has a virtual connection to the appropriate layer of the communicating partner. Only on the lowest layer (Layer 1) is there a physical connection for exchanging signals. Each layer, with the exception of Layer 1, obtains the necessary service from the layer below it. The OSI model merely defines the servicing and functions of the layers, but not the technical realization (the protocols) within the layers.

Two user programs can exchange information on Layer 7, if there is agreement between them (i.e. there are protocols) on the following points [2]:

7 Application Layer  
6 Presentation Layer Application Oriented Layers
5 Session Layer  
4 Transport Layer  
3 Network Layer Transport Oriented Layers
2 Data Link Layer  
1 Physical Layer  

Fig. 4 The Seven Layers of the OSI Model

The functions of the individual layers shown in Figure 4 will now be explained in more detail:

In the following diagram the route to be followed by data from the transmitting to the receiving application can be seen, indicated by the continuous arrows. At the transmitting side information (Overhead) which is necessary for transmission and processing is added to the actual data in each layer; at the receiving side this information is removed again in the reverse order after processing.

Fig. 5 Data Transmission in Accordance with the OSI Model Fig. 5 Data Transmission in Accordance with the OSI Model