Data Flow Model

This section defines the elements involved in the transmission of data across USB.

Endpoint

Endpoints function as the point of origin or the point of reception for data. An endpoint is a logical entity identified using an endpoint address. The endpoint address of a device is fixed, and is assigned when the device is designed, as opposed to the device address, which is assigned by the host dynamically during enumeration. An endpoint address consists of an endpoint number field (0 to 15), and a direction bit that indicates if the endpoint sends data to the host (IN) or receives data from the host (OUT). The maximum number of endpoints allowed on a single device is 32.

Endpoints contain configurable characteristics that define the behavior of a USB device:

  • Bus access requirements
  • Bandwidth requirement
  • Error handling
  • Maximum packet size that the endpoint is able to send or receive
  • Transfer type
  • Direction in which data is sent and receive from the host

Endpoint Zero Requirement

Endpoint zero (also known as Default Endpoint) is a bi-directional endpoint used by the USB host system to get information, and configure the device via standard requests. All devices must implement an endpoint zero configured for control transfers (see section Control Transfers for more information).

Pipes

A USB pipe is a logical association between an endpoint and a software structure in the USB host software system. USB pipes are used to send data from the host software to the device’s endpoints. A USB pipe is associated to a unique endpoint address, type of transfer, maximum packet size, and interval for transfers.

The USB specification defines two types of pipes based on the communication mode:

  • Stream Pipes: Data carried over the pipe is unstructured.
  • Message Pipes: Data carried over the pipe has a defined structure.

Transfer Types

The USB specification requires a default control pipe for each device. A default control pipe uses endpoint zero. The default control pipe is a bi-directional message pipe.

The USB specification defines four transfer types that match the bandwidth and services requirements of the host and the device application using a specific pipe. Each USB transfer encompasses one or more transactions that send data to and from the endpoint. The notion of transactions is related to the maximum payload size defined by each endpoint type. That is, when a transfer is greater than this maximum, it will be split into one or more transactions to fulfill the action.

Control Transfers

Control transfers are used to configure and retrieve information about the device capabilities. They are used by the host to send standard requests during and after enumeration. Standard requests allow the host to learn about the device capabilities; for example, how many and which functions the device contains. Control transfers are also used for class-specific and vendor-specific requests.

A control transfer contains three stages: Setup, Data, and Status. These stages are listed in Table - Control Transfer Stages.

Table - Control Transfer Stages
StageDescription
SetupThe Setup stage includes information about the request. This SETUP stage represents one transaction.
DataThe Data stage contains data associated with request. Some standard and class-specific request may not require a Data stage. This stage is an IN or OUT directional transfer and the complete Data stage represents one ore more transactions.
StatusThe Status stage, representing one transaction, is used to report the success or failure of the transfer. The direction of the Status stage is opposite to the direction of the Data stage. If the control transfer has no Data stage, the Status stage always is from the device (IN).


Bulk Transfers

Bulk transfers are intended for devices that exchange large amounts of data where the transfer can take all of the available bus bandwidth. Bulk transfers are reliable, as error detection and retransmission mechanisms are implemented in hardware to guarantee data integrity. However, bulk transfers offer no guarantee on timing. Printers and mass storage devices are examples of devices that use bulk transfers.

Interrupt Transfers

Interrupt transfers are designed to support devices with latency constrains. Devices using interrupt transfers can schedule data at any time. Devices using interrupt transfer provide a polling interval which determines when the scheduled data is transferred over the bus. Interrupt transfers are typically used for event notifications.

Isochronous Transfers

Isochronous transfers are used by devices that require data delivery at a constant rate with a certain degree of error-tolerance. Retransmission is not supported by isochronous transfers. Audio and video devices use isochronous transfers.

USB Data Flow Model

Figure - USB Data Flow shows a graphical representation of the data flow model.


Figure - USB Data Flow

USB Data Flow

(1) The host software uses standard requests to query and configure the device using the default pipe. The default pipe uses endpoint zero (EP0).

(2) USB pipes allow associations between the host application and the device’s endpoints. Host applications send and receive data through USB pipes.

(3) The host controller is responsible for the transmission, reception, packing and unpacking of data over the bus.

(4) Data is transmitted via the physical media.

(5) The device controller is responsible for the transmission, reception, packing and unpacking of data over the bus. The USB controller informs the USB device software layer about several events such as bus events and transfer events.

(6) The device software layer responds to the standard request, and implements one or more USB functions as specified in the USB class document.


Transfer Completion

The notion of transfer completion is only relevant for control, bulk and interrupt transfers as isochronous transfers occur continuously and periodically by nature. In general, control, bulk and interrupt endpoints must transmit data payload sizes that are less than or equal to the endpoint’s maximum data payload size. When a transfer’s data payload is greater than the maximum data payload size, the transfer is split into several transactions whose payload is maximum-sized except the last transaction which contains the remaining data. A transfer is deemed complete when:

  • The endpoint transfers exactly the amount of data expected.
  • The endpoint transfers a short packet, that is a packet with a payload size less than the maximum.
  • The endpoint transfers a zero-length packet.