Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
EFFICIENT SCHEDULING TELECOMMUNICATION SCHEME USING A FIRST CYCLIC ETHERNET PROTOCOL AND A SECOND CYCLIC ETHERNET PROTOCOL
Document Type and Number:
WIPO Patent Application WO/2019/082493
Kind Code:
A1
Abstract:
The invention relates to a method for transmitting data by hops between communicating entities. The communicating entities comprise: - one master entity (M), configured for communicating according to a first protocol at least, and - a plurality of slave entities, comprising: - a first group of slave entities able to support communications according to said first protocol and unable to support communications according to a second protocol, and - a second group of slave entities (NGS) able to support communications according to at least said second protocol. The first protocol is implemented by a token passing with communication data from the master entity to successively each neighbour slave entity, until the token reaches again the master entity, defining thus a first cycle according to the first protocol. The second protocol is implemented by passing a data frame including data intended to entities of said second group, one current entity of said second group, when receiving said data frame, being configured so as to: - modify said data frame by taking from said data frame data intended to said current entity and/or by adding into said data frame data intended to other entities of said second group, and - transmit the data frame thus modified to a neighbour entity, successively until the data frame reaches said current entity, defining thus a second cycle according to said second protocol.

Inventors:
MANGIN CHRISTOPHE (FR)
Application Number:
PCT/JP2018/031259
Publication Date:
May 02, 2019
Filing Date:
August 17, 2018
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
MITSUBISHI ELECTRIC CORP (JP)
MITSUBISHI ELECTRIC R&D CT EUROPE BV (NL)
International Classes:
H04L12/40; H04L12/407; H04L12/417
Foreign References:
EP2498455A12012-09-12
Other References:
GANZ DAVID ET AL: "Extending summation-frame communication systems for high performance and complex automation applications", 2014 10TH IEEE WORKSHOP ON FACTORY COMMUNICATION SYSTEMS (WFCS 2014), IEEE, 5 May 2014 (2014-05-05), pages 1 - 8, XP032608486, DOI: 10.1109/WFCS.2014.6837596
J-D DECOTIGNIE: "The Many Faces of Industrial Ethernet [Past and Present]", IEEE INDUSTRIAL ELECTRONICS MAGAZINE, IEEE, US, vol. 3, no. 1, 1 March 2009 (2009-03-01), pages 8 - 19, XP011280982, ISSN: 1932-4529, DOI: 10.1109/MIE.2009.932171
Attorney, Agent or Firm:
SOGA, Michiharu et al. (JP)
Download PDF:
Claims:
[CLAIMS] [Claim 1]

A method for transmitting data by hops between communicating entities, said communicating entities comprising:

- one master entity (M), configured for communicating according to a first cyclic Ethernet protocol and according to a second cyclic Ethernet protocol, and

- a plurality of slave entities, comprising:

- a first group of slave entities able to support communications according to said first protocol and unable to support communications according to said second protocol, and

- a second group of slave entities (NGS) able to support communications according to at least said second protocol, said first protocol being implemented by a token passing transmission with communication data from the master entity to successively each neighbour slave entity, until the token reaches again the master entity, defining thus a first cycle according to the first protocol, one current entity of said first group, when receiving an Ethernet data frame, being configured so as to:

- process said data frame and transmit the processed frame according to the token passing transmission, if said Ethernet data frame is according to the first protocol,

- or ignore the content of the data frame and simply transmit said data frame to a next neighbour entity upon its reception, if said Ethernet data frame is according to the second protocol, said second protocol being implemented by passing an Ethernet data frame including data intended to entities of said second group, one current entity of said second group, when receiving said Ethernet data frame, being configured so as to:

- modify said data frame by taking from said data frame data intended to said current entity and/or by adding into said data frame data intended to other entities of said second group, and

- transmit the data frame thus modified to a neighbour entity, successively until the data frame reaches said current entity, defining thus a second cycle according to said second protocol, wherein said master entity is configured to support communications according to both first and second protocols, and is configured further to:

- start the first cycle;

- start the second cycle, and chose in the second group at least one slave entity to start the second cycle at the same time as the master entity starts the second cycle.

[Claim 2]

The method of claim 1, wherein the chosen slave entity is the farthest from the master entity.

[Claim 3]

The method according to anyone of the precedent claims, wherein entities of said second group are configured so as to ignore the content of the data frame according to the first protocol and simply transmit said data frame to a next neighbour entity upon its reception.

[Claim 4] The method according to anyone of the precedent claims, wherein moments when:

- the master entity starts a new first cycle, and

- at the same time, the chosen slave entity of the second group starts a new second cycle, are spaced in time by a third cycle, corresponding to the lowest common multiple of the first cycle and the second cycle.

[Claim 5]

The method according to claim 4, wherein all the communicating entities are configured to apply an "IEEE 802.1Qbv" type communication protocol, said third cycle corresponding to a cycle of said IEEE 802.1Qbv type protocol.

[Claim 6]

The method according to any of the precedent claims, wherein each of said communicating entities, comprising at least two communication ports, is configured to manage:

- one port (U) for upstream communications, for receiving/transmitting to a neighbour entity a token according to said first protocol and/or a data frame according to said second protocol in a first direction towards the master entity, and one port (D) for downstream communications, for receiving/transmitting to a neighbour entity a token according to said first protocol and/or a data frame according to said second protocol in a second direction opposite to said first direction.

[Claim 7] The method according to any of the precedent claims, wherein each of said communicating entities is configured to manage:

- a first traffic class queue (CI) for data transmission according to said second protocol,

- a second traffic class queue (C2) for data transmission according to said first protocol, and

- a best effort traffic class queue for data to transmit when the communicating entity has no more transmissions according to said first and second protocols to perform.

[Claim 8]

The method according to any of the precedent claims, wherein said communicating entities are configured so as to operate in an industrial network.

[Claim 9]

A system comprising a plurality of communicating entities, wherein each entity, belonging to said first group or to said second group, comprises a logical circuit for performing a method according to any of the precedent claims.

[Claim 10]

A communicating entity of the system according to claim 9, comprising a logical circuit for performing transmissions according to said first and second protocols, as a master entity.

[Claim 1 1]

A communicating entity of the system according to claim 9, belonging to said first group, and comprising a logical circuit for performing transmissions according to said first protocol and for ignoring a content of a data frame according to the second protocol and simply transmitting said data frame to a next neighbour entity upon reception of said data frame.

[Claim 12]

A communicating entity of the system according to claim 9, belonging to said second group, and comprising a logical circuit for performing transmissions according to said second protocol and for ignoring a content of a data frame according to the first protocol and simply transmitting said data frame to a next neighbour entity upon reception of said data frame.

[Claim 13]

A computer program comprising instructions, which, when the program is executed by a processor, cause the processor to carry out the method as claimed in any of claims 1 to 8.

Description:
[DESCRIPTION] [Title of Invention]

EFFICIENT SCHEDULING TELECOMMUNICATION SCHEME USING A FIRST CYCLIC ETHERNET PROTOCOL AND A SECOND CYCLIC ETHERNET PROTOCOL

[Technical Field] [0001]

The invention is related to data exchanges using optimized scheduling scheme. More particularly, the invention proposes a way of interleaving data exchanges according to both a first and a second cyclic Ethernet protocol, when for example the second protocol is an updated version (or a next generation) of the first protocol.

[Background Art]

[0002]

Before presenting the main principle of the invention, it is recalled hereafter the principle of operation of a usual cyclic Ethernet protocol (the "first" protocol as defined above), using for example the scheduling scheme specified in standard IEEE 802.1Qbv.

[0003]

A typical usual cyclic Ethernet protocol network consists of a single control station (Master) and a plurality of slave stations (Slaves). The Medium Access Control is based on a token-passing scheme. Referring to figure 1 , the Master M manages the network and starts the token passing sequence by sending the token to a first slave station S I in the network. Reference TOK designates a situation where a slave entity becomes a token holder (successively S I, S3, S2, and back to M). The slave station S I that receives the token performs its transmission, and then passes the token to the next station S2 in the sequence, and so on.

[0004]

After the last slave station completes the process (reference S 1 pointed by the return arrows of figure 1 ), it passes the token back to the Master M and the entire sequence is started again. The time needed to perform the whole token-passing sequence is fixed, constituting one cycle called hereafter "link scan" LS.

[0005]

Of course, that Ethernet protocol uses standard Ethernet frames for data transfers. Three types of frames are usually defined, as shown in figure 2:

- Transmission Control Frames,

- Cyclic Transmission Frames, and

- Transient Transmission Frames. [0006]

A usual protocol generally includes three communication phases:

A. An initialization phase, used by the Master to establish the token- passing route, i.e. the sequence in which the slaves hold the token and during which: a. The Master discovers Slaves, b. The Master collects information about the Slaves, c. The Master distributes the Token Passing Route information, d. The Master distributes Parameters, e. The Master requests the Slaves to reflect the Parameters, f. The Master checks the Parameters reflected by the Slaves.

B. A Refresh Phase corresponding to the actual data exchange phase, during which: g. The Master starts a link scan by broadcasting data to all Slaves and addresses the token to a particular Slave, h. Each node (Slave) after receiving the Token, sends a Status Frame, i. Then sends Cyclic Frame(s), j. Then sends Acyclic Frame(s), k. Finally sends the Token Frame to the next Token holder.

C. A Return Phase where new nodes are detected and included in token passing scheme. The start of a Return Phase is decided by the Master.

[0007]

The actual process data exchange takes place during the Refresh Phase. The size of the cyclic transmissions of each node is fixed during runtime, as shown in figure 3. The volume of acyclic frame per node is fixed during runtime as well. Referring to figure 3, after receiving the token, the slave device first sends its status frame, then one or more cyclic transmission frames, optionally followed by acyclic frames (for the so-called "transient communication"). The number of acyclic frames per node and cycle can be limited in order to avoid cycle time violations. Lastly, the node sends the Token Frame to the next token holder.

[0008]

All Frames are broadcasted: nodes with two ports send all frames to both ports, and switches are used like hubs (making use of broadcast MAC addresses).

[0009]

The protocol may distinguish different node types, which differ by maximum process data size as well as features such as support of acyclic communication. Among these are:

- "Remote Device Stations" which are limited to 128 bits of cyclic I/O data (plus register data) and do not support client functionality in acyclic communication;

- "Remote I/O stations" which are limited to 64 bits of cyclic I/O data (no register data) and do not support acyclic communication at all.

[0010]

That type of cyclic Ethernet protocol can be used for example as industrial communication protocols dedicated to field communications, i.e. communications at the bottom of the control chain of a manufacturing assembly line that links the Programmable Logic Controller (PLCs) to the components that perform the actions, such as sensors, actuators, electric motors, console lights, switches, valves and contactors.

[0011]

An example of that first usual cyclic Ethernet protocol can be the IEC reference 61158-4-23 (data link layer, type 23).

[0012]

Possible evolutions of usual cyclic Ethernet protocols using typically the scheduling scheme specified in standard IEEE 802.1Qbv might lead to a next protocol generation where finally no token route needs to be established. Examples of such a next generation protocol can be SERCOS III, or else EtherCAT. Instead of dedicating an Ethernet frame for a single data exchanged between a source and a destination, that kind of "second cyclic Ethernet protocol" can concatenate multiple data in a single Ethernet frame. Typically, if a Master M has data to send to Slaves SI, S2 and S3, the three respective data sets are transported in the same frame, which is broadcasted to slaves SI, S2 and S3. Referring to figure 4A, each receiver (S I) then extracts, from the frame, data (M-> SI) which are addressed to that Slave (SI), and relays a shorter packet to its neighbour (S2). In a symmetrical way, referring to figure 4B, a transmitter (S2) inserts, on the flight, its data (S2->M) into an existing frame that passes through it, or creates a new frame when required ("Header, S 1->M, FCS", for Slave entity SI, in the example of figures 4A and 4B).

[0013]

Data exchanges in both directions, along a line, are still organized in cycles: within one cycle, a frame containing data exchanged between the Master and the slaves, whatever its direction, is transmitted from one end of the line to the other end.

[0014]

In a line topology, transmission in upstream and downstream direction can be carried out simultaneously. Figures 4A and 4B illustrate indeed separately both downstream and upstream operations in a line arrangement with one Master M and three slaves S I , S2, S3.

[0015]

This communication scheme can make a much more efficient use of the communication medium than previous protocols do and allow for shorter cycles (or equivalent "link scans"). [0016]

However, multiplexing both first and second protocols by reserving time slots exclusively dedicated to each protocol would cause the cycles of the second protocol to be dependent on the link scan LS duration of the first protocol, which imposes then possible limits on the control loop performance of the second protocol.

[0017]

The present invention aims to improve the situation. [Summary of Invention] [0018]

The invention proposes to that end a method for transmitting data by hops between communicating entities, said communicating entities comprising:

- one master entity, configured for communicating according to a first cyclic Ethernet protocol and according to a second cyclic Ethernet protocol, and

- a plurality of slave entities, comprising:

- a first group of slave entities able to support communications according to said first protocol and unable to support communications according to said second protocol, and

- a second group of slave entities able to support communications according to at least said second protocol.

[0019]

The first protocol is implemented by a token passing transmission with communication data from the master entity to successively each neighbour slave entity, until the token reaches again the master entity, defining thus a first cycle according to the first protocol (corresponding to a so-called "link scan" in an embodiment described in details below as for an example). More particularly, one current entity of the first group, when receiving an Ethernet data frame, is configured so as to:

- process said data frame and transmit the processed frame according to the token passing transmission, if the Ethernet data frame is according to the first protocol,

- or ignore the content of the data frame and simply transmit said data frame to a next neighbour entity upon its reception, if the Ethernet data frame is according to the second protocol.

[0020]

The second protocol is implemented by passing an Ethernet data frame including data intended to entities of said second group (directly, without token), one current entity of the second group, when receiving said Ethernet data frame, being configured so as to:

- modify said data frame by taking from said data frame data intended to said current entity and/or by adding into said data frame data intended to other entities of said second group, and

- transmit the data frame thus modified to a neighbour entity, successively until the data frame reaches said current entity, defining thus a second cycle according to said second protocol.

[0021]

Since these first and second protocols are cyclic, all of these entities can be connected in series, or in daisy chain, like in any network operating a usual cyclic Ethernet protocol. [0022]

More particularly, the master entity is configured to support communications according to both first and second protocols, and is configured further to:

- start the first cycle;

- start the second cycle, and chose in the second group at least one slave entity to start the second cycle at the same time as the master entity starts the second cycle.

[0023]

In an embodiment, the chosen slave entity is the farthest from the master entity. [0024]

For example, that chosen entity can be defined as the farthest from the master entity according to a number of hops between entities to reach the master from that chosen entity. As an alternative example, it can be chosen according to measurement of the fading of a communication link with the master.

[0025]

As presented above, entities of said first group are configured so as to ignore the content of the data frame according to the second protocol and simply transmit said data frame to a next neighbour entity upon its reception, and reversely in the same embodiment or in an alternative embodiment, entities of said second group are configured so as to ignore the content of the data frame according to the first protocol and simply transmit said data frame to a next neighbour entity upon its reception. [0026]

Therefore, each of said communicating entities may then comprise at least two communication ports, and can be configured to manage more particularly:

- one port for upstream communications, for receiving/transmitting to a neighbour entity a token according to said first protocol and/or a data frame according to said second protocol in a first direction towards the master entity, and

- one port for downstream communications, for receiving/transmitting to a neighbour entity a token according to said first protocol and/or a data frame according to said second protocol in a second direction opposite to said first direction.

[0027]

In an embodiment, moments when:

- the master entity starts a new first cycle, and

- at the same time, the chosen slave entity of the second group starts a new second cycle, are spaced in time by a third cycle, corresponding to the lowest common multiple of the first cycle and the second cycle.

[0028]

All the communicating entities can be configured to apply for example an "IEEE 802.1Qbv" type communication protocol, the aforesaid third cycle corresponding thus to a cycle of said IEEE 802.1Qbv type protocol. [0029]

In an embodiment, each of said communicating entities can be configured to manage:

- a first traffic class queue for data transmission according to said second protocol (taking incoming data and relaying remaining data when the entity belongs to the second group, or simply relaying data when the entity belongs to the first group),

- a second traffic class queue for data transmission according to said first protocol (taking incoming data and relaying remaining data when the entity belongs to the first group, or possibly relaying data only when the entity belongs to the second group), and further

- a best effort traffic class queue for data to transmit when the communicating entity has no more transmissions according to said first and second protocols to perform.

[0030]

A possible advantageous (but not limiting) application is industrial networks, where said communicating entities can be configured so as to operate in an industrial network.

[0031]

The present invention aims also at a system comprising a plurality of communicating entities, where each entity, belonging to said first group or to said second group, comprises a logical circuit for performing a method according to the invention.

[0032]

The present invention aims also at a communicating entity of that system, comprising a logical circuit for performing transmissions according to said first and second protocols, as a master entity.

[0033]

The present invention aims also at a communicating entity of that system, belonging to said first group, and comprising thus a logical circuit for performing transmissions according to said first protocol and for ignoring a content of a data frame according to the second protocol and simply transmitting said data frame to a next neighbour entity upon reception of said data frame.

[0034]

The present invention aims also at a communicating entity of that system, belonging to said second group, and comprising a logical circuit for performing transmissions according to said second protocol and for ignoring a content of a data frame according to the first protocol and simply transmitting said data frame to a next neighbour entity upon reception of said data frame.

[0035]

The present invention aims also at a computer program, comprising instructions for performing the method according to the invention, when run by a processor. A general algorithm of that computer program can be illustrated by the chart flow of figure 9 described below.

[0036]

The present invention is illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings, in which like reference numerals refer to similar elements.

[Brief Description of Drawings] [0037] [Fig. 1]

Figure 1 shows schematically a communication principle according to a first type of cyclic Ethernet protocol.

[Fig. 2]

Figure 2 shows schematically frame types of the protocol of figure 1. [Fig. 3]

Figure 3 shows schematically communication timelines according to the protocol of figure 1.

[Fig. 4A]

Figure 4A shows schematically a communication principle according to a second cyclic Ethernet protocol.

[Fig. 4B]

Figure 4B shows schematically a communication principle according to a second cyclic Ethernet protocol.

[Fig- 5]

Figure 5 shows schematically a communication principle according to the invention with a multiplexing of both first and second protocols.

[Fig. 6]

Figure 6 shows schematically a two-port Ethernet switch with a scheduler according to an example of protocol according to IEEE 802.1Qbv specification. [Fig- 7]

Figure 7 shows schematically a 802.1Qbv transmission control implementation, in the context of the present invention.

[Fig. 8]

Figure 8 shows schematically both first and second protocol mix communication timelines.

[Fig. 9]

Figure 9 shows steps which can be performed by a communication entity according to the invention.

[Fig. 10]

Figure 10 shows schematically a communication entity according to an embodiment of the invention.

[Description of Embodiments]

[0038]

The invention proposes a multiplexing scheme that avoids having to provision time slots reserved for communications according to a classical cyclic Ethernet protocol (aforesaid "first protocol"), and during which communications according to a possible next generation protocol (aforesaid "second protocol"), would remain "silent".

[0039]

As a main principle shown in figure 5, communications according to both first and second protocols are interleaved. More particularly, the cycles of the second protocol are included in the whole cycle link scan LS according to the first protocol. [0040]

Here, the master entity M can handle both the two protocols. Slave entities which can support the second protocol are referenced NGS: namely S2, and S3, while entities S I and S4 can support only the first protocol.

[0041]

The Master M starts the link scan according to the first protocol but sends both:

- a frame according to the first protocol, including a token TOK, and

- a frame according to the second protocol.

[0042]

Since the slave entity S 1 cannot support the new generation protocol in the example of figure 5, it simply ignores the frame received from the master M according to the second protocol, and transmits it to its neighbour S2, which will exploit this frame. However, the slave entity S I gets the token TOK from the Master M in the frame according to first protocol, and exploits the content of that frame.

[0043]

In the meantime when the Master entity M starts the link scan LS, the slave entity S3 which:

- is the farthest from the master M (for example according to a number of hops between them, or to a measurement of the fading of the communication link with the master M), and

- supports the new generation protocol (second protocol), starts also the communication according to the second protocol. [0044]

In a general way, the slave entities which do not support the communication according to the new generation protocol simply ignore the frames according to that new generation protocol and pass them to their neighbour. However, the other slave entities NGS can take in the frames according to the new generation protocol data which are intended to them, as shown in figure 5 in the arrow from entity S2 to entity S3.

[0045]

The communication scheme shown in the example of figure 5 allows then for transparently keeping short the second protocol cycles while the first protocol link scan remains unchanged.

[0046]

More particularly, the assumption is made hereafter that all the entities participating in the mixed first and second protocol network are IEEE 802.1Qbv-capable. For the Qbv implementation in first protocol nodes, each node in the line can be considered as a two-port Ethernet switch with one upstream port U and one downstream port D. The details of each port are illustrated on figure 6. The transmit side Tx (and "Rx" for reception) of each port is controlled by a transmission selection scheme based on 802.1 Qbv. Figure 7 details the Qbv transmission control implementation with three classes of traffics CI , C2 and C3, that can respectively be used to map the second protocol, the first protocol and best effort transmissions. Each traffic class is associated to a Qbv transmission gate, which is controlled by the port's gate control list. The gate control list implements the time intervals dedicated to the transmission, over the port, of each traffic class data.

[0047] The depth (in time) of the gate control list corresponds finally to the Qbv cycle duration.

[0048]

In this implementation, the time intervals where neither CI (second protocol) traffic, neither C2 (firsdt protocol) traffic, is transmitted over the port, are used to give transmission opportunities to C3 traffic (best effort).

[0049]

To further optimize the use of the transmission resource allocated to C3 traffic, pre-emption and segmentation of C3 traffic can be implemented according to IEEE 802.1 Qbu/802.3br.

[0050]

Slots provided for class C3 traffic can comprise any type of communication data (TCP, UDP, etc.).

[0051]

Regarding now the organisation of the IEEE 802.1 Qbv schedule, the interleaving of the communications of both protocol types is established using an IEEE 802.1 Qbv schedule that can be computed based on:

• The second protocol time-triggered cycle: called "2PTG cycle" in the present description and on figure 8,

• The first protocol token passing cycle: corresponding to the aforesaid Link scan, and called "1PTP cycle" hereafter and on figure 8.

[0052]

In a first approximation, the 802.1 Qbv cycle can be defined as the lowest common multiple of 2PTG cycle and 1PTP cycle. [0053]

Based on the communication mix example of figure 5, the timelines of figure 8 show the multiplexing of the three traffic classes according to gate control lists configured in each Upstream and Downstream port so that the communication pattern of figure 8 is obtained.

[0054]

Referring now to figure 9, upon reception of an Ethernet frame at step ST1 at a current slave entity, it is determined at step ST2 whether this Ethernet frame is a frame according to the second protocol (arrow Y) or not (arrow N). In the first case (Y), it is determined in step ST3 whether that current slave entity supports (arrow Y) or not (arrow N) the second protocol. In the first case (Y), the current slave entity can process the frame in step ST4 and then transmit the processed frame to its next neighbour in step ST5. Otherwise (arrow N from test ST3), the current slave entity simply transfers without any modification the frame according to the second protocol to its next neighbour in step ST6.

[0055]

If the received Ethernet frame is not a frame according to the second protocol, but rather according to the first protocol (arrow Y from step ST7), the current slave entity can process then the frame in step ST8 and transmit the processed frame according to a token passing transmission in step ST9.

[0056]

Once the frame(s) according to first and/or second protocol is (are) processed, a test ST1 1 is performed so as to determine whether the current slave entity is idle (arrow Y) or not (arrow N). In the first case (Y), best effort traffic class data can be processed in step ST12. Otherwise (arrow N from test ST1 1), if a new frame according to the first or the second protocol has been received and needs to be processed at first according to the transmission schedule control shown in figure 7, then the process returns to step ST1.

[0057]

The invention provides then a mean to offer a performance-efficient transition and/or co-existence between current and future cyclic Ethernet protocols.

[0058]

Referring now to figure 10, a communicating entity (master or slave) comprises:

- the two ports U for upstream communications and D for downstream communications, both for transmission Tx and reception Rx, connected to

- a logical circuit comprising a programmed ASIC or more generally any processor PROC cooperating with a memory MEM storing a computer program according to the present invention.

[0059]

The present invention can be embedded thus in such a computer program product (an algorithm of which is described above with reference to figure 9), which comprises all the features enabling the implementation of the methods described herein, and which, when loaded in an information processing system (for example a set of communicating entities), causes the information processing system to carry out the invention. Computer program means or computer program in the present context mean any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after the conversion to another language. Such a computer program can be stored on a computer or machine readable medium allowing data, instructions, messages or message packets, and other machine readable information to be read from the medium. The computer or machine readable medium may include non-volatile memory, such as ROM, Flash memory, Disk drive memory, DVD or CD-ROM, and other permanent storage. Additionally, a computer or machine readable medium may include, for example, volatile storage such as RAM, buffers, cache memory, and network circuits. Furthermore, the computer or machine readable medium may comprise computer or machine readable information in a transitory state medium such as a network link and/or a network interface, including a wired network or a wireless network, that allow a device to read such computer or machine readable information.

[0060]

While there has been illustrated and described what are presently considered to be the preferred embodiments of the present invention, it will be understood by those skilled in the art that various other modifications may be made, and equivalents may be substituted, without departing from the true scope of the present invention. Additionally, many modifications may be made to adapt a particular situation to the teachings of the present invention without departing from the central inventive concept described herein. Furthermore, an embodiment of the present invention may not include all of the features described above. Therefore, it is intended that the present invention not be limited to the particular embodiments disclosed, but that the invention include all embodiments falling within the scope of the invention as broadly defined below.