Network hierarchy The diagram above organizes the content of the web pages according to the OSI reference model. Each box in the diagram may be clicked to go to a page which introduces the appropriate section of the course. The OSI Reference Model The OSI reference model specifies standards for describing Open Systems Interconnection with the term !open! chosen to emphasize the fact that by using these international standards" a system may be defined which is open to all other systems obeying the same standards throughout the world. The definition of a common technical language has been a ma#or catalyst to the standardization of communications protocols and the functions of a protocol layer. 1 The seven layers of the OSI reference model showing a connection between two end systems communicating using one intermediate system. The structure of the OSI architecture is given in the figure above" which indicates the protocols used to exchange data between two users $ and %. The figure shows bidirectional &duplex' information flow( information in either direction passes through all seven layers at the end points. )hen the communication is via a network of intermediate systems" only the lower three layers of the OSI protocols are used in the intermediate systems. Serice! "roided #y each $rotocol Layer The OSI layers may be summarized by* +. $hy!ical layer% ,rovides electrical" functional" and procedural characteristics to activate" maintain" and deactivate physical links that transparently send the bit stream( only recognizes individual bits" not characters or multi character frames. -. Data link layer* ,rovides functional and procedural means to transfer data between network entities and &possibly' correct transmission errors( provides for activation" maintenance" and deactivation of data link connections" grouping of bits into characters and message frames" character and frame synchronization" error control" media access control" and flow control &examples include ./01 and Ethernet' 2. Network layer * ,rovides independence from data transfer technology and relaying and routing considerations( masks peculiarities of data transfer medium from higher layers and provides switching and routing functions to establish" maintain" and terminate network layer connections and transfer data between users. 3. Tran!"ort layer* ,rovides transparent transfer of data between systems" relieving upper layers from concern with providing reliable and cost effective data transfer( provides end4to4end control and information interchange with 5uality of service needed by the application program( first true end4to4end layer. 6. Se!!ion layer* ,rovides mechanisms for organizing and structuring dialogues between application processes( mechanisms allow for two4way simultaneous or two4way alternate operation" establishment of ma#or and minor synchronization points" and techni5ues for structuring data exchanges. 7. $re!entation layer* ,rovides independence to application processes from differences in data representation" which is" in syntax( syntax selection and conversion provided by allowing the user to select a presentation context with conversion between alternative contexts. 8. A""lication layer* 1oncerned with the re5uirements of application. $ll application processes use the service elements provided by the application layer. The elements include library routines which perform inter process communication" provide common procedures for constructing application protocols and for accessing the services provided by servers which reside on the network. The communications engineer is concerned mainly with the protocols operating at the bottom four layers &physical" data link" network" and transport' in the OSI reference model. These layers provide the basic communications service. The layers above are primarily the concern of computer scientists who wish to build distributed applications programs using the services provided by the network. &'o"(#y('o"& &Network(wide& and &End(to(End& )o**+nication 2 The two lowest layers operate between ad#acent systems connected via the physical link and are said to work ho" #y ho". The protocol control information is removed after each hop across a link &i.e. by each System' and a suitable new header added each time the information is sent on a subse5uent hop. The network layer &layer 2' operates &network(wide& and is present in all systems and responsible for overall co4 ordination of all systems along the communications path. The layers above layer 2 operate end to end& and are only used in the End Systems &ES' which are communicating. The 0ayer 3 4 8 protocol control information is therefore unchanged by the IS in the network and is delivered to the corresponding ES in its original form. 0ayers 348 &if present' in Intermediate Systems &IS' play no part in the end4to4end communication. Medi+* Acce!! )ontrol ,MA)- The 9edium $ccess 1ontrol &9$1' protocol is used to provide the data link layer of the Ethernet 0$: system. The 9$1 protocol encapsulates a S/; &payload data' by adding a +3 byte header &,rotocol 1ontrol Information &,1I'' before the data and appending an integrity checksum" The checksum is a 34byte &2-4bit' 1yclic <edundancy 1heck &1<1' after the data. The entire frame is preceded by a small idle period &the minimum inter4frame gap" =.7 microsecond &>S'' and a ? byte preamble &including the start of frame delimiter'. $rea*#le The purpose of the idle time before transmission starts is to allow a small time interval for the receiver electronics in each of the nodes to settle after completion of the previous frame. $ node starts transmission by sending an ? byte &73 bit' preamble se5uence. This consists of 7- alternating +!s and @!s followed by the pattern ++. Strictly speaking the last byte which finished with the !++! is known as the Start of Arame /elimiter. )hen encoded using 9anchester encoding" at +@ 9bps" the 7- alternating bits produce a +@ 9.z s5uare wave &one complete cycle each bit period'. The purpose of the preamble is to allow time for the receiver in each node to achieve lock of the receiver /igital ,hase 0ock 0oop which is used to synchronise the receive data clock to the transmit data clock. $t the point when the first bit of the preamble is received" each receiver may be in an arbitrary state &i.e. have an arbitrary phase for its local clock'. /uring the course of the preamble it learns the correct phase" but in so doing it may miss &or gain' a number of bits. $ special pattern &++'" is therefore used to mark the last two bits of the preamble. )hen this is received" the Ethernet 3 receive interface starts collecting the bits into bytes for processing by the 9$1 layer. It also confirms the polarity of the transition representing a !+! bit to the receiver &as a check in case this has been inverted'. 'eader 9$1 encapsulation of a packet of data The header consists of three parts* $ 74byte destination address" which specifies either a single recipient node &unicast mode'" a group of recipient nodes &multicast mode'" or the set of all recipient nodes &broadcast mode'. $ 74byte source address" which is set to the sender!s globally uni5ue node address. This may be used by the network layer protocol to identify the sender" but usually other mechanisms are used &e.g. arp'. Its main function is to allow address learning which may be used to configure the filter tables in a bridge. $ -4byte type field" which provides a Service $ccess ,oint &S$,' to identify the type of protocol being carried &e.g. the values @x@?@@ is used to identify the I, network protocol" other values are used to indicate other network layer protocols'. In the case of IEEE ?@-.2 001" this may also be used to indicate the length of the data part. Th type field is also be used to indicate when a Tag field is added to a frame. )R) The final field in an Ethernet 9$1 frame is called a 1yclic <edundancy 1heck &sometimes also known as a Arame 1heck Se5uence'. $ 2-4bit 1<1 provides error detection in the case where line errors &or transmission collisions in Ethernet' result in corruption of the 9$1 frame. $ny frame with an invalid 1<1 is discarded by the 9$1 receiver without further processing. The 9$1 protocol does not provide any indication that a frame has been discarded due to an invalid 1<1. The link layer 1<1 therefore protects the frame from corruption while being transmitted over the physical mediuym &cable'. $ new 1<1 is added if the packet is forwarded by the router on another Ethernet link. )hile the packet is being processed by the router the packet data is not protected by the 1<1. <outer processing errors must be detected by network or transport4layer checksums. Inter Fra*e .a" $fter transmission of each frame" a transmitter must wait for a period of =.7 microseconds &at +@ 9bps' to allow the signal to propagate through the receiver electronics at the destination. This period of time is known as the Inter4Arame Bap &IAB'. )hile every transmitter must wait for this time between sending frames" receivers do not necessarily see a silent period of =.7 microseconds. The way in which repeaters operate is such that they may reduce the IAB between the frames which they regenerate. /yte Order 4 It is important to realise that nearly all serial communications systems transmit the least significant bit of each byte first at the physical layer. Ethernet supports broadcast" unicast" and multicast addresses. The appearance of a multicast address on the cable &in this case an I, multicast address" with group set to the bit pattern @xxx xxxx xxxx xxxx xxxx xxxx' is therefore as shown below &bits transmitted from left to right'* @ -2 I, 9ulticast $ddress Broup 38 C C D444444444444444444444444444EC +@@@ @@@@ @@@@ @@@@ @+++ +@+@ xxxx xxx@ xxxx xxxx xxxx xxxx C C 9ulticast %it @ F Internet 9ulticast + F $ssigned for other uses .owever" when the same frame is stored in the memory of a computer" the bits are ordered such that the least significant bit of each byte is stored in the right most position &the bits are transmitted right4to4left within bytes" bytes transmitted left4to4right'* @ -2 38 C C C @@@@ @@@+ @@@@ @@@@ @+@+ +++@ @xxx xxxx xxxx xxxx xxxx xxxx C D444444444444444444444444444E 9ulticast %it I, 9ulticast $ddress Broup )SMA 0)D The 1arrier Sense 9ultiple $ccess &1S9$' with 1ollision /etection &1/' protocol is used to control access to the shared Ethernet medium. $ switched network &e.g. Aast Ethernet' may use a full duplex mode giving access to the full link speed when used between directly connected :I1s" Switch to :I1 cables" or Switch to Switch cables. Receier $roce!!in1 Al1orith* R+nt Fra*e 5 $ny frame which is received and which is less than 73 bytes is illegal" and is called a runt. In most cases" such frames arise from a collision" and while they indicate an illegal reception" they may be observed on correctly functioning networks. $ receiver must discard all runt frames. .iant Fra*e $ny frame which is received and which is greater than the maximum frame size" is called a giant. In theory" the #abber control circuit in the transceiver should prevent any node from generating such a frame" but certain failures in the physical layer may also give rise to over4sized Ethernet frames. 0ike runts" giants are discarded by an Ethernet receiver. 2+*#o Fra*e Some modern Bigabit Ethernet :I1s support frames that are larger than the traditional +6@@ bytes specified by the IEEE. This new mode re5uires support by both ends of the link to support Gumbo Arames. ,ath 9T; /iscovery is re5uired for a router to utilise this feature" since there is no other way for a router to determine that all systems on the end4to4end path will support these larger sized frames. A Mi!ali1ned Fra*e $ny frame which does not contain an integral number of received bytes &bytes' is also illegal. $ receiver has no way of knowing which bits are legal" and how to compute the 1<142- of the frame. Such frames are therefore also discarded by the Ethernet receiver. Other I!!+e! The Ethernet standard dictates a minimum size of frame" which re5uires at least 37 bytes of data to be present in every 9$1 frame. If the network layer wishes to send less than 37 bytes of data the 9$1 protocol adds sufficient number of zero bytes &@x@@" is also known as null padding characters' to satisfy this re5uirement. The maximum size of data which may be carried in a 9$1 frame using Ethernet is +6@@ bytes &this is known as the 9T; in I,'. $ protocol known as the $ddress <esolution ,rotocol &arp' is used to identify the 9$1 source address of remote computers when I, is used over an Ethernet 0$:. E3ce"tion to the R+le $n extension to Ethernet" known as IEEE ?@-.+p allows for frames to carry a tag. The tag value adds an extra level of ,1I to the Ethernet frame header. This increases the size of the total 9$1 frame when the tag is used. $ side effect of this is that :I1s and network devices designed to support this extension re5uire a modification to the #abber detection circuit. Token $a!!in1 6 In the access method known as token passing" a special type of packet" called a token" circulates around a cable ring from computer to computer. )hen any computer on the ring needs to send data across the network" it must wait for a free token. )hen a free token is detected" the computer will take control of it if the computer has data to send. The computer can now transmit data. /ata is transmitted in frames" and additional information" such as addressing" is attached to the frame in the form of headers and trailers. 0et!s talk more about these later. Aor now" only the computer that has the token can transmit on the network. )hile the token is in use by this one computer other computers cannot send data. %ecause only one computer at a time can use the token" no contention and no collision take place" and no time is spent waiting for computers to resend tokens due to network traffic on the cable The token passing access method is a non4contention method that works very differently from the contention methods previously discussed. Token passing is a more orderly way for a network to conduct its business. $ signal called a token goes from one computer to the next. In a Token <ing network" the token goes around the ring( in a token bus network" it goes down the line of the bus. If a computer has data to transmit" it must wait until the token reaches it( then that computer can capture the token and transmit data. 'i1h Leel Link )ontrol ,'DL)- $rotocol The ./01 protocol is a general purpose protocol which operates at the data link layer of the OSI reference model. The protocol uses the services of a physical layer" and provides either a best effort or reliable communications path between the transmitter and receiver &i.e. with acknowledged data transfer'. The type of service provided depends upon the ./01 mode which is used. Each piece of data is encapsulated in an ./01 frame by adding a trailer and a header. The header contains an ./01 address and an ./01 control field. The trailer is found at the end of the frame" and contains a 1yclic <edundancy 1heck &1<1' which detects any errors which may occur during transmission. The frames are separated by ./01 flag se5uences which are transmitted between each frame and whenever there is no data to be transmitted. 7 ./01 Arame Structure showing flags" header &address and control'" data and trailer &1<14+7'. 'DL) ,'i1h Leel Data Link $rotocol- has been defined by the International Standards Organization for use on both multipoint and point4to4point links. ./01 is a bit4oriented protocol. It is a predecessor to the local area network datalink protocols. The two most common modes of operation for ./01 are* H Un#alanced nor*al re!"on!e *ode ,NRM-. This is used with only one primary &or master' station initiating all transactions. H A!ynchrono+! #alanced *ode ,A/M-. In this mode each node has e5ual status and can act as either a primary or secondary node. Fra*eFor*at The standard format is indicated Aigure. The three different classes of frames used are as follows* Unn+*#ered fra*e!% ;sed for setting up the link or connection and to define whether :<9 or $%9 is to be used. They are called unnumbered frames because no se5uence numbers are included. Infor*ation fra*e!% ;sed to convey the actual data from one node to another. S+"eri!ory fra*e!% ;sed for flow control and error control purposes. They indicate whether the secondary station is available to receive the information frames( they are also used to acknowledge the frames. There are two forms of error control used* a selective re4transmission procedure because of an error" or a re5uest to transmit a number of previous frames. Fra*e )ontent% The frame contents are as follows* H The flag character is a byte with the value @++++++@. To ensure that the receiver always knows that the character it receives is uni5ue &rather than merely some other character in the se5uence'( a procedure called zero insertion is adopted. This re5uires the transmitter to insert a @ after a se5uence of five +s in the text" so that the flag character can never appear in the message text. The receiver removes the inserted zeros. H The frame check se5uence &A1S' uses the 1<1411ITT methodology" with sixteen +s to the tail of the message before the 1<1 calculation proceeds" and the remainder is inverted. H The address field can contain one of three types of address for the re5uest or response messages to or from the 8 secondary node* I Standard secondary address I Broup addresses for groups of nodes on the network I %roadcast addresses for all nodes on the network &here the address contains all +s' H )here there are a large number of secondaries on the network" the address field can be extended beyond eight bits by encoding the least significant bit as a +. This then indicates that there is another byte to follow in the address field. H The control field is indicated in Aigure $rotocol O"eration% $ typical se5uence of operations for a multidrop link is given below* + The primary node sends a :ormal <esponse 9ode frame" with the ,JA bit set to +" together with the address of the secondary node. - The secondary node responds with an unnumbered acknowledgment with the ,JA bit set to +. If the receiving node is unable to accept the setup command" a disconnected mode frame is returned instead. 2 /ata is transferred with the information frames. 3 The primary node sends an unnumbered frame containing a disconnect in the control field. 6 The secondary node responds with an unnumbered acknowledgment. $ similar approach is followed for a point4to4 point link using asynchronous balanced mode" except that both nodes can initiate the setting up of the link and the transfer of information frames" and the clearing of the point4to4point link. The following differences also apply* H )hen the secondary node transfers the data" it transmits the data as a se5uence of information frames with the ,JA bit set to + in the final frame of the se5uence. H In :<9 mode" if the secondary node has no further data to transfer" it responds with a <eceiver :ot <eady frame with the ,JA bit set to +. Error 4 Flow )ontrol% Aor a half duplex exchange of information frames" error control is by means of se5uence numbers. Each end maintains a transmit se5uence number and a receive se5uence number. )hen a node successfully receives a frame" it responds with a supervisory frame containing a receiver ready &<<' indication and a receive se5uence number. The number is that of the next frame expected" thus acknowledging all previous frames. If the receiving node responds with a negative acknowledgment &<EG' frame" the transmitter must transmit all frames from the receive se5uence number in the <EG frame. This happens when the receiver detects an out4of4se5uence frame. It is also possible for selective retransmission to be used. In this case the receiver would return a selection re#ection frame containing only the se5uence number of the missing frame. $ slightly more complex approach is re5uired for a point4to4point link using asynchronous balanced mode with full duplex operation" where information frames are transmitted in two directions at the same time. The same philosophy is followed as for half duplex operation except that checks for correct se5uences of frame numbers must be maintained at both ends of the link. Alow control operates on the principle that the maximum number of information frames awaiting acknowledgment at any time is seven. If seven acknowledgments are outstanding" the transmitting node will suspend transmission until an acknowledgment is received. This can be either in the form of a receiver ready supervisory frame" or piggybacked in an information frame being returned from the receiver. If the se5uence numbers at both ends of the link become so out of se5uence that the number of frames awaiting acknowledgment exceeds seven" the secondary node transmits a frame re#ect or a command re#ect frame to the primary 9 node. The primary node then sets up the link again" and on an acknowledgment from the secondary node" both sides reset all the se5uence numbers and commence the transfer of information frames. It is possible for the receiver to run out of buffer space to store messages. )hen this happens it will transmit a receiver not ready &<:<' supervisory frame to the primary node to instruct it to stop sending any more information frames. )arrier Sen!e M+lti"le Acce!! with )olli!ion Detection ,)SMA0)D- The Ethernet network may be used to provide shared access by a group of attached nodes to the physical medium which connects the nodes. These nodes are said to form a 1ollision /omain. $ll frames sent on the medium are physically received by all receivers" however the 9edium $ccess 1ontrol &9$1' header contains a 9$1 destination address which ensure only the specified destination actually forwards the received frame &the other computers all discard the frames which are not addressed to them'. 1onsider a 0$: with four computers each with a :etwork Interface 1ard &:I1' connected by a common Ethernet cable* One computer &%lue' uses a :I1 to send a frame to the shared medium" which has a destination address corresponding to the source address of the :I1 in the red computer. The cable propagates the signal in both directions" so that the signal &eventually' reaches the :I1s in all four of the computers. Termination resistors at the ends of the cable absorb the frame energy" preventing reflection of the signal back along the cable. $ll the :I1s receive the frame and each examines it to check its length and checksum. The header destination 9$1 address is next examined" to see if the frame should be accepted" and forwarded to the network4layer software in the computer. 10 Only the :I1 in the red computer recognises the frame destination address as valid" and therefore this :I1 alone forwards the contents of the frame to the network layer. The :I1s in the other computers discard the unwanted frame. The shared cable allows any :I1 to send whenever it wishes" but if two :I1s happen to transmit at the same time" a collision will occur" resulting in the data being corrupted. ALO'A 4 )olli!ion! To control which :I1s are allowed to transmit at any given time" a protocol is re5uired. The simplest protocol is known as $0O.$ &this is actually an .awaiian word" meaning hello'. $0O.$ allows any :I1 to transmit at any time" but states that each :I1 must add a checksumJ1<1 at the end of its transmission to allow the receiver&s' to identify whether the frame was correctly received. $0O.$ is therefore a best effort service" and does not guarantee that the frame of data will actually reach the remote recipient without corruption. It therefore relies on $<K protocols to retransmit any data which is corrupted. $n $0O.$ network only works well when the medium has a low utilisation" since this leads to a low probability of the transmission colliding with that of another computer" and hence a reasonable chance that the data is not corrupted. )arrier Sen!e M+lti"le Acce!! ,)SMA- Ethernet uses a refinement of $0O.$" known as 1arrier Sense 9ultiple $ccess &1S9$'" which improves performance when there is a higher medium utilisation. )hen a :I1 has data to transmit" the :I1 fir!t listens to the cable &using a transceiver' to see if a carrier &signal' is being transmitted by another node. This may be achieved by monitoring whether a current is flowing in the cable &each bit corresponds to +?4-@ milli$mps &m$''. The individual bits are sent by encoding them with a +@ &or +@@ 9.z for Aast Ethernet' clock using 9anchester encoding. /ata is only sent when no carrier is observed &i.e. no current present' and the physical medium is therefore idle. $ny :I1 which does not need to transmit" listens to see if other :I1s have started to transmit information to it. .owever" this alone is unable to prevent two :I1s transmitting at the same time. If two :I1s simultaneously try transmit" then both could see an idle physical medium &i.e. neither will see the other!s carrier signal'" and both will conclude that no other :I1 is currently using the medium. In this case" both will then decide to transmit and a collision will occur. The collision will result in the corruption of the frame being sent" which will subse5uently be discarded by the receiver since a corrupted Ethernet frame will &with a very high probability' not have a valid 2-4bit 9$1 1<1 at the end. )olli!ion Detection ,)D- $ second element to the Ethernet access protocol is used to detect when a collision occurs. )hen there is data waiting to be sent" each transmitting :I1 also monitors its own transmission. If it observes a collision &excess current above what it is generating" i.e. E -3 m$ for coaxial Ethernet'" it stops transmission immediately and instead transmits a 2-4bit #am 11 se5uence. The purpose of this se5uence is to ensure that any other node which may currently be receiving this frame will receive the #am signal in place of the correct 2-4bit 9$1 1<1" this causes the other receivers to discard the frame due to a 1<1 error. To ensure that all :I1s start to receive a frame before the transmitting :I1 has finished sending it" Ethernet defines a minimum frame size &i.e. no frame may have less than 37 bytes of payload'. The minimum frame size is related to the distance which the network spans" the type of media being used and the number of repeaters which the signal may have to pass through to reach the furthest part of the 0$:. Together these define a value known as the Ethernet Slot Time" corresponding to 6+- bit times at +@ 9bps. )hen two or more transmitting :I1s each detect a corruption of their own data &i.e. a collision'" each responds in the same way by transmitting the #am se5uence. The following se5uence depicts a collision* $t time tF@" a frame is sent on the idle medium by :I1 $. $ short time later" :I1 % also transmits. &In this case" the medium" as observed by the :I1 at % happens to be idle too'. $fter a period" e5ual to the propagation delay of the network" the :I1 at % detects the other transmission from $" and is aware of a collision" but :I1 $ has not yet observed that :I1 % was also transmitting. % continues to transmit" sending the Ethernet Gam se5uence &2- bits'. $fter one complete round trip propagation time &twice the one way propagation delay'" both :I1s are aware of the collision. % will shortly cease transmission of the Gam Se5uence" however $ will continue to transmit a complete Gam Se5uence. Ainally the cable becomes idle. Retran!*i!!ion /ack(Off 12 $n overview of the transmit procedure is shown below. The transmitter initialises the number of transmissions of the current frame &n' to zero" and starts listening to the cable &using the carrier sense logic &1S' 4 e.g." by observing the <x signal at transceiver to see if any bits are being sent'. If the cable is not idle" it waits &defers' until the cable is idle. It then waits for a small Inter4Arame Bap &IAB' &e.g." =.7 microseconds' to allow to time for all receiving nodes to return to prepare themselves for the next transmission. Transmission then starts with the preamble" followed by the frame data and finally the 1<142-. $fter this time" the transceiver Tx logic is turned off and the transceiver returns to passively monitoring the cable for other transmissions. /uring this process" a transmitter must also continuoulsy monitor the collision detection logic &1/' in the transceiver to detect if a collision ocurs. If it does" the transmitter aborts the transmission &stops sending bits' within a few bit periods" and starts the collision procedure" by sending a Gam Signal to the transceiver Tx logic. It then calculates a retransmission time. If all :I1s attempted to retransmit immediately following a collision" then this would certainly result in another collision. Therefore a procedure is re5uired to ensure that there is only a low probability of simultaneous retransmission. The scheme adopted by Ethernet uses a random back4off period" where each node selects a random number" multiplies this by the slot time &minimum frame period" 6+.- >S' and waits for this random period before attempting retransmission. The small Inter4Arame Bap &IAB' &e.g." =.7 microseconds' is also added. On a busy network" a retransmission may still collide with another retransmission &or possibly new frames being sent for the first time by another :I1'. The protocol therefore counts the number of retransmission attempts &using a variable : in the above figure' and attempts to retransmit the same frame up to +6 times. Aor each retransmission" the transmitter constructs a set of numbers* L@" +" -" 2" 3" 6" ... 0M where 0 is &N- to the power &O'P4+' and where OF:( ODF +@( 13 $ random value < is picked from this set" and the transmitter waits &defers' for a period < x &slot time' i.e. < x 6+.- 9icro Seconds Aor example" after two collisions" :F-" therefore OF-" and the set is L@" +" -" 2M giving a one in four chance of collision. This corresponds to a wait selected from L@" 6+.-" +@-.3" +62.7M micro seconds. $fter 2 collisions" : F 2" and the set is L@" +" -" 2" 3" 6" 7" 8M" that is a one in eight chance of collision. %ut after 3 collisions" :F3" the set becomes L@" +" -" 2" 3" 6" 7" 8" ?" =" +@" ++" +-" +2" +3" +6M" that is a one in +7 chance of collision. The scaling is performed by multiplication and is known as exponential back4off. This is what lets 1S9$J1/ scale to large numbers of :I1s 4 even when collisions may occur. The first ten times" the back4off waiting time for the transmitter suffering collision is scaled to a larger value. The algorithm includes a threshold of +@-3. The reasoning is that the more attempts that are re5uired" the more greater the number of :I1s which are trying to send at the same time" and therefore the longer the period which needs to be deferred. Since a set of numbers L@"+"..."+@-2M is a large set of numbers" there is very little advantage from further increasing the set size. Each transmitter also limits the maximum number of retransmissions of a single frame to +7 attempts &:F+6'. $fter this number of attempts" the transmitter gives up transmission and discards the frame" logging an error. In practice" a network that is not overloaded should never discard frames in this way. Late )olli!ion! In a proper functioning Ethernet network" a :I1 may experience collision within the first slot time after it starts transmission. This is the reason why an Ethernet :I1 monitors the 1/ signal during this time and use 1S9$J1/. $ faulty 1/ circuit" or misbehaving :I1 or transceiver may lead to a late collision &i.e. after one slot time'. 9ost Ethernet :I1s therefore continue to monitor the 1/ signal during the entire transmission. If they observe a late collision" they will normally inform the sender of the error condition. $erfor*ance of )SMA 0 )D 14 It is simple to calculate the performance of a 1S9$J1/ network where only one node attempts to transmit at any time. In this case" the :I1 may saturate the medium and near +@@Q utilisation of the link may be achieved" providing almost +@ 9bps of throughput on a +@ 9bps 0$:. .owever" when two or more :I1s attempt to transmit at the same time" the performance of Ethernet is less predictable. The fall in utilisation and throughput occurs because some bandwidth is wasted by collisions and back4off delays. In practice" a busy shared +@ 9bps Ethernet network will typically supply -43 9bps of throughput to the :I1s connected to it. $s the level of utilisation of the network increases" particularly if there are many :I1s competing to share the bandwidth" an overload condition may occur. In this case" the throughput of Ethernet 0$:s reduces very considerably" and much of the capacity is wasted by the 1S9$J1/ algorithm" and very little is available for sending useful data. This is the reason why a shared Ethernet 0$: should not connect more than +@-3 computers. 9any engineers use a threshold of 3@Q ;tilisation to determine if a 0$: is overloaded. $ 0$: with a higher utilisation will observe a high collision rate" and likely a very variable transmission time &due to back off'. Separating the 0$: in to two or more collision domains using bridges or switches would likely provide a significant benefit &assuming appropriate positioning of the bridges or switches'. Shared networks may also be constructed using Aast Ethernet" operating at +@@ 9bps. Since Aast Ethernet always uses fibre or twisted pair" a hub or switch is always re5uired. Ethernet )a"t+re $ drawback of sharing a medium using 1S9$J1/" is that the sharing is not necessarily fair. )hen each computer connected to the 0$: has little data to send" the network exhibits almost e5ual access time for each :I1. .owever" if one :I1 starts sending an excessive number of frames" it may dominate the 0$:. Such conditions may occur" for instance" when one :I1 in a 0$: acts as a source of high 5uality packetised video. The effect is known as Ethernet 1apture. Ethernet 1apture by :ode $. The figure above illustrates Ethernet 1apture. 1omputer $ dominates computer %. Originally both computers have data to transmit. $ transmits first. $ and % then both simultaneously try to transmit. % picks a larger retransmission interval than $ &shown in red' and defers. $ sends" then sends again. There is a short pause" and then both $ and % attempt to resume transmission. $ and % both back4off" however" since % was already in back4off &it failed to retransmit'" it chooses 15 from a larger range of back4off times &using the exponential back4off algorithm'. $ is therefore more likely to succeed" which it does in the example. The next pause in transmission" $ and % both attempt to send" however" since this fails in this case" % further increases its back4off and is now unable to fairly compete with $. Ethernet 1apture may also arise when many sources compete with one source which has much more data to send. ;nder these situations some nodes may be locked out of using the medium for a period of time. The use of higher speed transmission &e.g. +@@ 9bps' significantly reduces the probability of 1apture" and the use full duplex cabling eliminates the effect. The Internetwork $rotocol ,I$- The I, &Internet ,rotocol' is a protocol that uses datagrams to communicate over a packet4switched network. The I, protocol operates at the network layer protocol of the OSI reference model and is a part of a suite of protocols known as T1,JI,. Today" with over +.6 billion users worldwide" the current Internet is a great success in terms of connecting people and communities. Even though the current Internet continues to work and is capable of fulfilling its current missions" it also suffers from a relative RSTossificationRS " a condition where technological innovation meets natural resistance" as exemplified by the current lack of wide deployment of technologies such as multicast or Internet ,rotocol version 7 &I,v7'. The Internetwork ,rotocol &I,' N<A18=+P provides a best effort network layer service for connecting computers to form a computer network. Each computer is identified by one or more gloablly uni5ue I, addresses. The network layer ,/;s are known as either packets or datagrams. Each packet carries the I, address of the sending computer and also the address of the intended recipient or recipients of the packet. Other management information is also carried. The I, network service transmits datagrams between intermediate nodes using I, routers. The routers themselves are simple" since no information is stored concerning the datagrams which are forwarded on a link. The most complex part of an I, router is concerned with determining the optimum link to use to reach each destination in a network. This process is known as routing. $lthough this process is computationally intensive" it is only performed at periodic intervals. $n I, network normally uses a dynamic routing protocol to find alternate routes whenever a link becomes unavailable. This provides considerable robustness from the failure of either links or routers" but does not guarentee reliable delivery. Some applications are happy with this basic service and use a simple transport protocol known as the ;ser /atagram ,rotocol &;/,' to access this best effort service. 9ost Internet users need additional functions such as end4to4end error and se5uence control to give a reliable service &e5uivalent to that provided by virtual circuits'. This reliability is provided by the Transmission 1ontrol ,rotocol &T1,' which is used end4to4end across the Internet. In a 0$: environment" the protocol is normally carried by Ethernet" but for long distance links" other link protocols using fibre optic links are usually used. Other protocols associated with the I, network layer are the Internet 1ontrol 9essage ,rotocol &I19,' and the $ddress <esolution ,rotocol &arp'. I$ the Ne3t .eneration5 I$6 The I,v3 protocol although widely used" is slowly being superceded by I,v7 N<A1-37@P" a next4generation network4 layer protocol. I,v7 is now widely implemented" and deployed in many networks. 16 The gradual transition from I,v3 towards ma#ority I,v7 deployment will take many years and I,v3 may never itself be phased out completely. In the meantime the two protocols can co4exist and be used together in various ways. I,v7 will ultimately succeed the current version" I,v3" to become the dominant version of I, used in the Internet. I,v7 changes many things" one of the most obvious from the Ethernet perspective is that it uses a different Ether4Types and uses the :eighbor4/iscovery &:/' protocol in place of $<,. Unit II INTER NETWORKIN. Network )la!!ification Ty"e! of Network! 17 Network 'ardware )o*"onenet! Ethernet /rid1e! 4 Switche! $ bridge is a 0$: interconnection device which operates at the data link layer &layer -' of the OSI reference model. It may be used to #oin two 0$: segments &$"%'" constructing a larger 0$:. $ bridge is able to filter traffic passing between the two 0$:s and may enforce a security policy separating different work groups located on each of the 0$:s. %ridges were first specified in IEEE ?@-.+/ &+==@' and later by ISO &in +==2'. 18 The format of ,/;s at this layer in an Ethernet 0$: is defined by the Ethernet frame format &also known as 9$1 4 9edium $ccess 1ontrol'. It consists of two 7 byte addresses and a one byte protocol I/ J length field. The address field allows a frame to be sent to single and groups of stations. The 9$1 protocol is responsible for access to the medium and for the diagnosis of failure in either the medium or the transceiver which attaches to the medium. O"eration of a /rid1e The simplest type of bridge" and that most fre5uently used is the Transparent %ridge &meaning that the nodes using a bridge are unaware of its presence'. The bridge therefore has to forward &receive and subse5uently transmit' frames from one 0$: &e.g. 0$: $ below' to another &e.g. 0$: %'. Obviously" the bridge could forward all frames" but then it would behave rather like a repeater( it would be much smarter if the bridge only forwarded frames which need to travel from one 0$: to another. To do this" the bridge need to learn which computers are connected to which 0$:s. 9ore formally" it need to learn whether to forward to each address. $ bridge connecting two 0$: segments &$ and %'. To learn which addresses are in use" and which ports &interfaces on the bridge' theory are closest to" the bridge observes the headers of received Ethernet frames. %y examining the 9$1 source address of each received frame" and recording the port on which it was received" the bridge may learn which addresses belong to the computers connected via each port. This is called learning. In the figure above" consider three computers U"V"W. $ssume each sends frames to the other computers. The source addresses U"V are observed to be on network $" while the address of computer W will be observed to be on network %. $ bridge stores the hardware addresses observed from frames received by each interface and uses this information to learn which frames need to be forwarded by the bridge. The learned addresses are stored in the an interface address table associated with each port &interface'. Once this table has been setup" the bridge examines the destination address of all received frames" it then scans the interface tables to see if a frame has been received from the same address &i.e. a packet with a source address matching the current destination address'. Three possibilities exist* 19 +. If the address is not found" no frames have been received from the source. The source may not exist" or it may not have sent any frames using this address. &The address may also have been deleted by the bridge because the bridge software was recently restarted" ran short of address entries in the interface table" or deleted the address because it was too old'. Since the bridge does not know which port to use to forward the frame" it will send it to all output ports" except that on which it was received. &It is clearly unnecessary to send it back to the same cable segment from which it was received" since any other computerJbridges on this cable must already have received the packet.' This is called flooding. -. If the address is found in an interface table and the address is associated with the port on which it was received" the frame is discarded. &It must already have been received by the destination.' 2. If the address is found in an interface table and the address is not associated with the port on which it was received" the bridge forwards the frame to the port associated with the address. ,ackets with a source of U and destination of V are received and discarded" since the computer V is directly connected to the 0$: $" whereas packets from U with a destination of W are forwarded to network % by the bridge. /roadca!t and M+ltica!t %ridges forward a broadcast frame out of all connected ports except that on which the frame was received. The normal action for multicast frame is to treat them as broadcast frame. This is clearly suboptimal" since a bridge may send multicast frames to parts of the network for which there are no interested receivers. Some bridges implement extra processing to control the flooding of multicast frames. Mana1in1 the Interface Ta#le! $ bridge may implement an interface table using a software data structure or use a 1ontents $ddressable 9emory &1$9' chip. In either case" the size of the table is finite" and usually constrained to +@@@!s 4 +@ @@@!s of entries. In a large 0$: this may be a limit. To help keep the table small" most bridges maintain a check of how recently each address was used. $ddresses which have not been used for a long period of time &e.g. minutes' are deleted. This has the effect of removing unused entries" but if the address is again used" before a frame is received from the same source" it will re5uire the frame to be flooded to all ports. $ useful side effect of deleting old addresses is that the bridge interface table records only working 9$1 addresses. If a :I1 stops sending" its address will be deleted from the table. If the :I1 is subse5uently reconnected" the entry will be restored" but if the connection is made to another port &the cable is changed' a different &updated' entry will be inserted corresponding to the actual port associated with the address. &The bridge always updates the interface table for each source address in a received 9$1 frame" therefore even if a computer changes the point at which it is connected without first having the interface table entry removed" the bridge will still update the table entry'. Filter Ta#le! In some managed bridges" a system administrator may override the normal forwarding by inserting entries in a filter table to inhibit forwarding between different work groups &for example to provide security for a particular set of 9$1 addresses'. The filter table contains a list of source or destination addresses. Arames which match entries in the filter table will only be forwarded to specific configured ports. This can be used to implement security polcies and also to constrcut Xirtual 0$:s. 20 M+lti"le $ort /rid1e! ,Switche!- $ bridge with more than two interfaces &ports' is also known as a switch. There are important differences between switches and hubs. In particular" the way in which they forward frames. $ .ub sending a packet form A to 1. $ hub &or repeater' forwards a received frame out of all the interfaces &ports'" resulting in the frame reaching all connected e5uipment" even though the frame may be only destined for a system connected to one particular interface &1" in the above diagram'. $ switch" on the other hand" forwards the frame to only the re5uired interface. The switch learns the association between the systems 9$1 addresses and the interface ports in the same way as a bridge &see above'. %y sending the packet only where it need to go" the switch reduces the number of packets on the other 0$: segments &and hence the load on these segments'" increasing the overall performance of the connected 0$:s. The switch also improves security" since frames only travel where they are intended &and can not in this case" for instance" be observed by an unauthorised computer attached to segment $'. 21 $ Switch sending a packet from A to 1 Switches &like bridges' normally forward all multicast and broadcast packets to all receivers &some switches have extra processing to help improve performance of multicast forwarding'. 9ore details about this" and the operation of switches may be found in a related page &see below'. $ Switch sending a frame from A to a multicast J broadcast address :ote* %ridges receive Ethernet frames using a port set in promiscuous mode" and hence see all frames that are sent over the 0$:. the decide whether to forward the frames that they receive based on the Ethernet 9$1 destination address of a received frame. This results in reduced traffic on other ports" since traffic is only forwarded when it has to be. )onnectin1 /rid1e! and Switche! To1ether 22 There is a special rule controlling the inetrconnection of bidges and switches &as there is for Ethernet .ubs'. The rule says simply" that a bridge J switch Jhub 0$: must form a tree" and not a ring. That is" there must be only one "ath between any two computers. If more than one parallel path were to exist" a loop would be formed" resulting in endless circulation of frames over the loop. This would soon result in overload of the network. To prevent this happening" the IEEE &in IEEE ?@-.+/' has defined the Spanning Tree $lgorithm &ST$' which automaticallt detects loops and disables one of the parallel paths. The Spanning Tree $lgorithm may also be used to build fault4tolerent networks" since if the chosen path becomes invalid &e.g. due to a cable J bridge J switch fault'" and an alternate path exists" the alternate path is enabled automatically. Ro+ter! $ router is an Intermediate System &IS' which operates at the network layer of the OSI reference model. <outers may be used to connect two or more I, networks" or an I, network to an internet connection. $ router consists of a computer with at least two network interface cards supporting the I, protocol. The router receives packets from each interface via a network interface and forwards the received packets to an appropriate output network interface. <eceived packets have all link protocol headers removed" and transmitted packets have a new link protocol header added prior to transmission. The router uses the information held in the network layer header &i.e. I, header' to decide whether to forward each received packet" and which network interface to use to send the packet. 9ost packets are forwareded based on the packet!s I, destination address" along with routing information held within the router in a routing table. %efore a packet is forwarded" the processor checks the 9aximum Transfer ;nit &9T;' of the specified interface. ,ackets larger than the interface!s 9T; must be fragmented by the router into two or more smaller packets. If a packet is received which has the /on!t Aragment &/A' bit set in the packet header" the packet is not fragmented" but instead discarded. In this case" an I19, error message is returned to the sender &i.e. to the original packet!s I, source address' informing it of the interface!s 9T; size. This forms the basis for ,ath 9T; discovery &,9T;'. The routing and filter tables resemble similar tables in link layer bridges and switches. Except" that instead of specifying link hardware addresses &9$1 addresses'" the router table sepcify network &I, addresses'. The routing table lists known I, destination addresses with the appropraite network interface to be used to reach that destiantion. $ default entry may be specified to be used for all addresses not explicitly defined in the table &this is very common in routers close to the edge of the networ" where the default routes packets towards the Internet backbone'. $ filter table may also be used to ensure that unwanted packets are discarded. The filter may be used to deny access to particular protocols or to prevent unauthorised access from remote computers by discarding packets to a specified destination address. <outers at the edge of IS, networks also often perform filtering of the I, source address" as a way to prevent spoofing of addresses belonging to other networks. $ router forwards packets from one I, network to another I, network. 0ike other systems" it routes based on the longest4 prefxi match of the I, addresss in the routing table. One exception to this rule is when a router receives an I, packet to a network broadcast address. In this case" the router will process the packet internally &to see if it needs to respond' and then discards the packet. Aorwarding broadcast packet can lead to severe storms of packets" and if uncontrolled could lead to network overload. 23 $ router introduces delay &latency' as it processes the packets it receives. The total delay observed is the sum of many components including* Time taken to process the frame by the data link protocol Time taken to select the correct output link &i.e. filtering and routing' Kueuing delay at the output link &when the link is busy' Other activities which consume processor resources &computing routing tables" network management" generation of logging information' The router 5ueue of packets waiting to be sent also introduces a potential cause of packet loss. Since the router has a finite amount of buffer memory to hold the 5ueue" a router which receives packets at too high a rate may experience a full 5ueue. In this case" the router ahs no other option than to simply discard excess packets. If re5uired" these may later be retransmitted by a transport protocol. $rchitecture of a router <outers are often used to connect together networks which use different types of links &for instance an ./01 or ,,, link connecting a )$: to a local Ethernet 0$:'. The optimum &and maximum' packet lengths &i.e. the maximum transmission unit &9T;'' is different for different types of network. $ router may therefore uses I, to provide segmentation of packets into a suitable size for transmission on a network. $ssociated protocols perform network error reporting &I19,'" communication between routers &to determine appropriate routes to each destination' and remote monitoring of the router operation &network management'. The operation of a simple modern router is described on a separate page. If you want to know how the router actually works click .E<E. Re"eater! <epeaters operate within the physical layer of the OSI reference model and regenerate the signal . <epeaters are used in 0$:s 9$: and )$:s. They may be used to provide more flexibility in design of a network or to extend the distance over which a signal may travel down a cable. One example of a repeater is an Ethernet .ub. 24 The 7(8(9 r+le The 64342 rule is important when considering using repeaters &or +@%T hubs' to build a larger 0$:. This rule states that a single Ethernet 0$: should not have more than*6 :o path between any two end systems &network interface cards or other e5uipment' may cross more than AIXE Ethernets segments. 3 :o path between any two end systems may cross more than AO;< Ethernet hubs or repeaters.2 :o more than T.<EE of the five segments on the longest path may be active segments &i.e. segments with more than two nodes andJor repeater ports'. The remaining two segments must be point4to4point links. .ub J Switch J %ridge J <outer In data communications" a h+# is a place of convergence where data arrives from one or more directions and is forwarded out in one or more other directions. $ hub usually includes a switch of some kind. In telecommunications" a !witch is a network device that selects a path or circuit for sending a unit of data to its next destination. $ !witch may also include the function of the ro+ter" a device or program that can determine the route and specifically what ad#acent network point the data should be sent to. In general" a !witch is a simpler and faster mechanism than a router" which re5uires knowledge about the network and how to determine the route In telecommunication networks" a #rid1e is a product that connects a local area network &0$:' to another local area network that uses the same protocol &for example" Ethernet or token ring'. On the Internet" a ro+ter is a device or" in some cases" software in a computer" that determines the next network point to which a concept of packet should be forwarded toward its destination. The ro+ter is connected to at least two networks and decides which way to send each information packet based on its current understanding of the state of the networks it is connected to. $ ro+ter is located at any gateway &where one network meets another'" including each Internet point4of4 presence. $ router is often included as part of a network switch. Ethernet H developed by Uerox in +=82I+=86 H standardized as IEEE ?@-.2 H has replaced token ring" A//I and $<1:ET 25 H usually uses twisted pair cable & <G436' H IEEE :;<=9% Ethernet is the most widely4installed local area network &0$:' protocol. Specified in a standard" IEEE ?@-.2" Ethernet was originally developed by Uerox and then developed further by Uerox" /E1" and Intel. $n Ethernet 0$: typically uses coaxial cable or special grades of twisted pair wires. H >;/ASE(T% The most commonly installed Ethernet systems are called +@%$SE4T and provide transmission speeds up to +@ 9bitJs. /evices are connected to the cable and compete for access using a 1arrier Sense 9ultiple $ccess with 1ollision /etection &1S9$J1/' protocol. H >;;/ASE(T or Fa!t Ethernet provides transmission speeds up to +@@ megabits per second and is typically used for 0$: backbone systems" supporting workstations with +@%$SE4T cards. H .i1a#it Ethernet provides an even higher level of backbone support at +@@@ megabits per second &+ gigabit or + billion bits per second'. $<1net &$ttached <esource 1omputer network' $<1net is a widely4installed local area network &0$:' technology that uses a token4bus scheme for managing line sharing among the workstations and other devices connected on the 0$:. The 0$: server continuously circulates empty message frames on a bus &a line in which every message goes through every device on the line and a device uses only those with its address'. BE:E<I1 $<1:ET %O$</ 26 BE:E<I1 $<1:ET %O$</ BE:E<I1 $<1:ET %O$</ AE$T;<ES ?@c2+ 1,; +7 9.W 10O1O 73O <$9 73O A0$S. <O9 ? bit IJO port -67 bytes &available for memory mapped IJO' + serial port O< - bit bi4directional IJO port - bit IJO port &dedicated' $utomatic reset on power4up +7 user definable chip selects Two standard +7 bit counters. $<1:ET software interface built4in Airm ware upload feature up to 2=O Token removal &turn off $<1:ET stop noise' -.69bitsJs data rate &$<1:ET' works in high magnetic fields &external power supply needed' optoisolation between each node. What i! AR)NET? $ttached <esource 1omputer :ETwork Token4,assing 0ocal $rea :etwork &0$:' Originally -.6 9bps data rate 27 -66 :odes or Stations Xariable ,acket 0ength %us or /istributed Star )iring ;nicast or %roadcast 9essages One to one or one to all 1oaxial" Aiber Optic" Twisted4pair 1abling Over -@ 9illion Installed :odes Originally developed by /atapoint 1orporation as an office network 1hip sets available from S9S1 $T$ ?8?.+4+=== 0ocal $rea :etwork* Token %us Ideally suited for an industrial network What are AR)NET@! /enefit!? %road $cceptance 0arge Installed %ase /eterministic ,erformance Simple to Install 0ow 1ost per :ode <obust /esign 9ultiple 1able 9edia Support 9ulti4master 1ommunication Where i! AR)NET U!ed? .X$1 9otor /rives ,ower Beneration /ata $c5uisition and 1ontrol 9anufacturing Information Systems 28 Office $utomation Shipboard $utomation ,rinting ,ress 1ontrols Telecommunications Baming 9achines Xehicular :avigation Security Systems AR)NET $rotocol Only Aive Simple 1ommands ITT 4 Invitation to transmit A%E 4 Aree buffer en5uiry ,$1 4 ,acket $1O 4 $cknowledgement :$O 4 :egative acknowledgement AR)NET $rotocol Feat+re! /eterministic Token ,assing ,acket Alow 1ontrol Error /etection $uto <econfiguration Xariable ,acket Size Supports Xarious Transceivers Y 9edia Supports Xarious Software /rivers ;p to -66 :odes ,er :etwork Token ,assing 4 Transmitting on the network is only permitted when a node has the token Every node can transmit once during each token rotation %enefits* 29 Every node has a guaranteed response time to transmit /eterministic behavior $uto4<econfiguration 4 :etwork is automatically reconfigured when a node #oins or leaves the network Token pass is automatically reconfigured Typical time -@ 4 2@ ms Supports live node insertion and deletion Xariable ,acket Size Arom + to 6@8 bytes per packet ,acket Alow 1ontrol 4 Transmitter checks receiver to make sure it is ready to receive a packet <educed software overhead Increased bandwidth :o lost packets due to input buffer overruns Error /etection 4 +7 bit 1<1 checks each packet 1orrupted packets automatically re#ected Transmitter is aware of the error <educed software overhead %etter 1,; utilization 30 Unit III 'ART AND FIELD/US 'ART Oeriew The ma#ority of smart field devices installed worldwide today are .$<T4enabled. %ut some new in the automation field may need a refresher on this powerful technology. Simply put" the .$<T &.ighway $ddressable <emote Transducer' ,rotocol is the global standard for sending and receiving digital information across analog wires between smart devices and control or monitoring system. 9ore specifically" .$<T is a bi4directional communication protocol that provides data access between intelligent field instruments and host systems. $ host can be any software application from technician!s hand4held device or laptop to a plant!s process control" asset management" safety or other system using any control platform. A DI.ITAL U$.RADE FOR EAISTIN. $LANTS .$<T technology offers a reliable" long4term solution for plant operators who seek the benefits of intelligent devices with digital communication I that is included in the ma#ority of the devices being installed. In many cases however" 31 most applications cannot retrofit their existing automation systems with a system that can accept the digital data which is provided by the .$<T ,rotocol. %ecause most automation networks in operation today are based on traditional 34-@m$ analog wiring" .$<T technology serves a critical role because the digital information is simultaneously communicated with the 34-@m$ signal. )ithout it" there would be no digital communication. A )RITI)AL5 DI.ITAL ROLE .$<T technology is easy to use and very reliable when used for commissioning and calibration of smart devices as well as for continuous online diagnostics. There are several reasons to have a host communicate with smart devices. These include* /evice 1onfiguration or re4configuration /evice /iagnostics /evice Troubleshooting <eading the additional measurement values provided by the device /evice .ealth and Status 9uch more* There are many benefits of using .$<T technology" and more users are reporting benefits in their pro#ects on a continual basis. Aor more information please visit Success Stories Vears of success using these benefits explain why .$<T technology is the largest of all communication protocols" installed in more than 2@ million devices worldwide. If you!ve ever used a land4line telephone and noticed the 1aller I/ display to take note of who is calling" you already know half of what the .$<T ,rotocol doesZit tells who is calling. In an industrial automation network who is a microprocessor4based smart field device. In addition to letting such smart field devices phone home" .$<T 1ommunication lets a host system send data to the smart instrument. .$<T emerged in the late+=?@s based on the same technology that brought 1aller I/ to analog telephony. It has undergone continued development" up to and including automation products now shipping with built4in )ireless.$<T 1ommunication. 'ow 'ART Work! [.$<T\ is an acronym for .ighway $ddressable <emote Transducer. The .$<T ,rotocol makes use of the %ell -@- Are5uency Shift Oeying &ASO' standard to superimpose digital communication signals at a low level on top of the 34 -@m$. 32 Are5uency Shift Oeying &ASO' This enables two4way field communication to take place and makes it possible for additional information beyond #ust the normal process variable to be communicated toJfrom a smart field instrument. The .$<T ,rotocol communicates at +-@@ bps without interrupting the 34-@m$ signal and allows a host application &master' to get two or more digital updates per second from a smart field device. $s the digital ASO signal is phase continuous" there is no interference with the 34-@m$ signal. .$<T technology is a masterJslave protocol" which means that a smart field &slave' device only speaks when spoken to by a master. The .$<T ,rotocol can be used in various modes such as point4to4point or multidrop for communicating information toJfrom smart field instruments and central control or monitoring systems. .$<T 1ommunication occurs between two .$<T4enabled devices" typically a smart field device and a control or monitoring system. 1ommunication occurs using standard instrumentation grade wire and using standard wiring and termination practices. The .$<T ,rotocol provides two simultaneous communication channels* the 34-@m$ analog signal and a digital signal. The 34-@m$ signal communicates the primary measured value &in the case of a field instrument' using the 34-@m$ current loop 4 the fastest and most reliable industry standard. $dditional device information is communicated using a digital signal that is superimposed on the analog signal. The digital signal contains information from the device including device status" diagnostics" additional measured or calculated values" etc. Together" the two communication channels provide a low4cost and very robust complete field communication solution that is easy to use and configure. 33 Two 1ommunication 1hannels The .$<T ,rotocol provides for up to two masters &primary and secondary'. This allows secondary masters such as handheld communicators to be used without interfering with communications toJfrom the primary master" i.e. controlJmonitoring system. ,rimary and Secondary 9asters The .$<T ,rotocol permits all digital communication with field devices in either point4to4point or multidrop network configurations* 34 M+ltidro" )onfi1+ration There is also an optional burst communication mode where a single slave device can continuously broadcast a standard .$<T reply message. .igher update rates are possible with this optional burst communication mode and use is normally restricted to point4to4point configuration. 'ART $rotocol S"ecification! The .$<T ,rotocol was developed in the late +=?@!s and transferred to the .$<T Aoundation in the early +==@!s. Since then it has been updated several times. )hen the protocol is updated" it is updated in a way that ensures backward compatibility with previous versions. The current version of the .$<T ,rotocol is revision 8.2. The 8 denotes the ma#or revision level and the 2 denotes the minor revision level. The .$<T ,rotocol implements layers +"-" 2" 3 and 8 of the Open System Interconnection &OSI' 84layer protocol model* The 'ART $hy!ical Layer is based on the %ell -@- standard" using fre5uency shift keying &ASO' to communicate at +-@@ bps. The signal fre5uencies representing bit values of @ and + are --@@ and +-@@.z respectively. This signal is superimposed at a low level on the 34to4-@m$ analog measurement signal without causing any interference with the analog signal. The 'ART Data Link Layer defines a master4slave protocol 4 in normal use" a field device only replies when it is spoken to. There can be two masters" for example" a control system as a primary master and a handheld .$<T 35 communicator as a secodary master. Timing rules define when each master may initiate a communication transaction. ;p to +6 or more slave devices can be connected to a single multidrop cable pair. The Network Layer provides routing" end4to4end security" and transport services. It manages sessions for end4to4end communication with correspondent devices. The Tran!"ort Layer% The /ata40ink 0ayer ensures communications are successfully propagated from one device to another. The Transport 0ayer can be used to ensure end4end communication is successful. The A""lication Layer defines the commands" responses" data types and status reporting supported by the ,rotocol. In the $pplication 0ayer" the public commands of the protocol are divided into four ma#or groups* +. ;niversal 1ommands 4 provide functions which must be implemented in all field devices -. 1ommon ,ractice 1ommands 4 provide functions common to many" but not all field devices 2. /evice Specific 1ommands 4 provide functions that are uni5ue to a particular field device and are specified by the device manufacturer 3. /evice Aamily 1ommands 4 provide a set of standardized functions for instruments with particular measurement types" allowing full generic access without using device4specific commands. 'ART )o**and! The .$<T ,rotocol is a master4slave communication protocol which means that during normal operation" each slave &a field device' communication is initiated by a re5uest &or command' from the master &host' communication device. The master or host is generally a distributed control" ,01" or ,14based asset management system for example. The slave device is typically a field measurement device such as pressure" level" temperature" flow or other transmitters. In order to make certain any .$<T4enabled device from any supplier can communicate properly and respond to a command with the correct information" the set and types of commands are defined in the .$<T Specifications and implemented in all .$<T registered devices. U!er! need not worry about these commands because they are included in the functions of the host. The specific capabilities of a device &device specific commands' are available to the host when the host is given the instructions included in the /evice /escription &//' of a specific device. $n important point is that defined device status indications are included with each communication response to the host. The host then interprets these status indicators and may provide basic device diagnostic information. The 'ART )o**and Set provides uniform and consistent communication for all field devices. .ost applications may implement any of the necessary commands for a particular application. The command set includes three classes* ;niversal $ll devices using the .$<T ,rotocol must recognize and support the universal commands. ;niversal commands provide access to information useful in normal operations &e.g." read primary variable and units'. 1ommon ,ractice commands provide functions implemented by many" but not necessarily all" .$<T 1ommunication devices. 36 /evice Specific commands represent functions that are uni5ue to each field device. These commands access setup and calibration information" as well as information about the construction of the device. Information on /evice Specific commands is available from device manufacturers. A $artial Li!t of 'ART )o**and!% Unier!al )o**and! )o**on $ractice )o**and! Deice S"ecific )o**and! <ead manufacturer and device type <ead primary variable &,X' and units <ead current output and percent of range <ead up to four pre4defined dynamic variables <ead or write eight4character tag" +74character descriptor" date <ead or write 2-4character message <ead device range values" units" and damping time constant <ead or write final assembly number )rite polling address <ead selection of up to four dynamic variables )rite damping time constant )rite device range values 1alibrate &set zero" set span' Set fixed output current ,erform self4test ,erform master reset Trim ,X zero )rite ,X unit Trim /$1 zero and gain )rite transfer function &s5uare rootJlinear' )rite sensor serial number <ead or write dynamic variable assignments <ead or write low4flow cut4 off Start" stop" or clear totalizer <ead or write density calibration factor 1hoose ,X &mass" flow" or density' <ead or write materials or construction information Trim sensor calibration ,I/ enable )rite ,I/ set point Xalve characterization Xalve set point Travel limits ;ser units 0ocal display information 'i1hway Addre!!a#le Re*ote Tran!d+cer $rotocol 'ART $rotocol Infor*ation Ty"e of Network /evice %us &,rocess $utomation' $hy!ical Media 0egacy 34-@ m$ analog instrumentation wiring or -.3 B.z )ireless Network To"olo1y One4on4One" 9ultidrop" )ireless 9esh Ma3i*+* +6 in multidrop 37 Deice! Ma3i*+* S"eed /epends on ,hysical 0ayer employed Deice Addre!!in1 .ardwareJSoftware .oernin1 /ody .$<T 1ommunication Aoundation The .$<T 1ommunications ,rotocol &.ighway $ddressable <emote Transducer ,rotocol' is an early implementation of Aieldbus" a digital industrial automation protocol. Its most notable advantage is that it can communicate over legacy 34-@ m$ analog instrumentation wiring" sharing the pair of wires used by the older system. $ccording to Emerson" N+P due to the huge installed base of 34-@ m$ systems throughout the world" the .$<T ,rotocol is one of the most popular industrial protocols today. .$<T protocol has made a good transition protocol for users who were comfortable using the legacy 34-@ m$ signals" but wanted to implement a smart protocol. Industries seem to be using ,rofibus /,J,$ and Aoundation fieldbus &also by <osemount' more as users become familiar with later technology and look to take advantage of the enhanced diagnostics they can provide. The protocol was developed by <osemount Inc." built off the %ell -@- early communications standard" in the mid4+=?@s as proprietary digital communication protocol for their smart field instruments. Soon it evolved into .$<T. In +=?7" it was made an open protocol. Since then" the capabilities of the protocol have been enhanced by successive revisions to the specification. Mode! There are two main operational modes of .$<T instruments* analogJdigital mode" and multidrop mode. In point4to4point mode &analogJdigital' the digital signals are overlaid on the 34-@ m$ loop current. %oth the 34-@ m$ current and the digital signal are valid output values from the instrument. The polling address of the instrument is set to @. Only one instrument can be put on each instrument cable signal pair. One signal" generally specified by the user" is specified to be the 34-@ m$ signal. Other signals are sent digitally on top of the 34-@ m$ signal. Aor example" pressure can be sent as 34-@ m$" representing a range of pressures" and temperature can be sent digitally over the same wires. In point4to4point mode" the digital part of the .$<T protocol can be seen as a kind of digital current loop interface. In multidrop mode &digital' only the digital signals are used. The analog loop current is fixed at 3 m$. In multidrop mode it is possible to have more than one instruments on one signal cable. .$<T revisions 2 through 6 allowed polling addresses of the instruments to be in the range +4+6. .$<T 7 and later allowed address up to 72. Each instrument needs to have a uni5ue address. The .$<T ,acket has the following structure Field Na*e Len1th ,/yte!- $+r"o!e ,reamble 64-@ Synchronization and 1arrier /etect Start %yte + Specifies 9aster :umber 38 $ddress +46 Specifies slave" Specifies 9aster and Indicates %urst 9ode 1ommand + :umerical Xalue for the command to be executed :umber of data bytes + Indicates the size of the /ata Aield Status 9aster &@' Slave &-' Execution and .ealth <eply /ata @4-62 /ata associated with the command 1hecksum + UO< of all bytes from Start %yte to 0ast byte of /ata $rea*#le 1urrently all the newer devices implement 6 byte preamble" since anything greater reduces the communication speed. .owever" masters are responsible for backwards support. 9aster communication to a new device starts with the maximum preamble length &-@ bytes' and is later reduced once the preamble size for the current device is determined. Start deli*iter This byte contains the 9aster number and specifies the communication packet is starting. Addre!! Specifies the destination address as implemented in one of the .$<T schemes. The original addressing scheme used only 3 bits to specify the device address" which limited the number of devices to +7 including the master. The newer scheme utilizes 2? bits to specify the device address. This address is re5uested from the device using either 1ommand @" or 1ommand ++. )o**and This is a + byte numerical value representing which command is to be executed. 1ommand @ and 1ommand ++ are used to re5uest the device number. N+*#er of data #yte! Specifies the number of communication data bytes to follow. Stat+! The status field is absent for the master and is two bytes for the slave. This field is used by the slave to inform the master whether it completed the task and what its current health status is. Data 39 /ata contained in this field depends on the command to be executed. )heck!+* 1hecksum is composed of an UO< of all the bytes starting from the start byte and ending with the last byte of the data field" including those bytes. Field#+! is the name of a family of industrial computer network protocols used for real4time distributed control" standardized as IE) 6>>7:. $ complex automated industrial system Z such as manufacturing assembly line Z usually needs a distributed control systemZan organized hierarchy of controller systemsZto function. In this hierarchy" there is usually a .uman 9achine Interface &.9I' at the top" where an operator can monitor or operate the system. This is typically linked to a middle layer of programmable logic controllers &,01' via a non4time4critical communications system &e.g. Ethernet'. $t the bottom of the control chain is the fieldbus that links the ,01s to the components that actually do the work" such as sensors" actuators" electric motors" console lights" switches" valves and contactors. De!cri"tion Aieldbus is an industrial network system for real4time distributed control. It is a way to connect instruments in a manufacturing plant. Aieldbus works on a network structure which typically allows daisy4chain" star" ring" branch" and tree network topologies. ,reviously" computers were connected using <S4-2- &serial connections' by which only two devices could communicate. This would be the e5uivalent of the currently used 34-@ m$ communication scheme which re5uires that each device has its own communication point at the controller level" while the fieldbus is the e5uivalent of the current 0$:4type connections" which re5uire only one communication point at the controller level and allow multiple &hundreds' of analog and digital points to be connected at the same time. This reduces both the length of the cable re5uired and the number of cables re5uired. Aurthermore" since devices that communicate through fieldbus re5uire a microprocessor" multiple points are typically provided by the same device. Some fieldbus devices now support control schemes such as ,I/ control on the device side instead of forcing the controller to do the processing. 'i!tory /it#+! The oldest commonly used field bus technology is %itbus. %itbus was created by Intel 1orporation to enhance use of 9ultibus systems in industrial systems by separating slow iJo functions from faster memory access. In +=?2" Intel created the ?@33 %itbus microcontroller by adding field bus firmware to its existing ?@6+ microcontroller. %itbus uses EI$43?6 at the physical layer" with two twisted pairs 4 one for data and the other for clocking and signals. ;se of S/01 at the data link layer permits -6@ nodes on one segment with a total distance of +2.- km. %itbus has one master node and multiple slaves" with slaves only responding to re5uests from the master. %itbus does not define routing at the network layer. The ?@33 permits only a relatively small data packet &+2 bytes'" but embeds an efficient set of <$1 &remote access and control' tasks and the ability to develop custom <$1 tasks. In +==@" the IEEE adopted %itbus as the 9icrocontroller System Serial 1ontrol %us &IEEE4+++?'.N+P N-P Today %IT%;S is maintained by the %E;B 4 %IT%;S European ;sers Broup.N2P 40 StandardiBation $lthough fieldbus technology has been around since +=??" with the completion of the IS$ S6@.@- standard" the development of the international standard took many years. In +===" the IE1 S1761J)B7 standards committee met to resolve difference in the draft IE1 fieldbus standard. The result of this meeting was the initial form of the IE1 7++6? standard with eight different protocol sets called Types as follows* Type + Aoundation Aieldbus .+ Type - 1ontrol:et Type 2 ,<OAI%;S Type 3 ,4:et Type 6 AO;:/$TIO: fieldbus .SE &.igh Speed Ethernet' Type 7 Swift:et &a protocol developed for %oeing" since withdrawn' Type 8 )orldAI, Type ? Interbus This form of standard was first developed for the European 1ommon 9arket" concentrates less on commonality" and achieves its primary purposeZelimination of restraint of trade between nations. Issues of commonality are now left to the international consortia that support each of the fieldbus standard types. $lmost as soon as it was approved" the IE1 standards development work ceased and the committee was dissolved. $ new IE1 committee S1761J9T4= was formed to resolve the conflicts in form and substance within the more than 3@@@ pages of IE1 7++6?. The work on the above protocol types is substantially complete. :ew protocols" such as for safety fieldbuses or real4time ethernet4 fieldbuses are being accepted into the definition of the international fieldbus standard during a typical 64year maintenance cycle. %oth Aoundation Aieldbus and ,rofibus technologies are now commonly implemented within the process control field" both for new developments and ma#or refits. In -@@7" 1hina saw the largest AA &Aoundation Aieldbus' systems installations at :an.ai and SE11O" each with around +6@@@ fieldbus devices connected. Ncitation neededP IE) 6>>7: !"ecification There were many competing technologies for fieldbus and the original hope for one single unified communications mechanism has not been realized. This should not be unexpected since fieldbus technology needs to be implemented differently in different applications( automotive fieldbus is functionally different from process plant control. The final edition of IE1 standard IE1 7++6? allows ? technologies.This are the some hierarchic layer of the automation protocols. IE1 7++6? consists of the following parts" under the general title /igital data communications for measurement and control I Aieldbus for use in industrial control systems* ,art +* Overview and guidance for the IE1 7++6? series ,art -* ,hysical 0ayer specification and service definition ,art 2* /ata 0ink Service definition 41 ,art 3* /ata 0ink ,rotocol specification ,art 6* $pplication 0ayer Service definition ,art 7* $pplication 0ayer ,rotocol specification Standard! There are a wide variety of competing fieldbus standards. Some of the most widely used ones include* $S4Interface 1$: Ether1$T AO;:/$TIO: fieldbus Interbus 0on)orks 9odbus ,rofibus %IT%;S 1ompo:et Safety%;S p <$,IEnet See 0ist of automation protocols for more examples. )o!t adanta1e The amount of cabling re5uired is much lower in Aieldbus than in 34-@ m$ installations. This is because many devices share the same set of cables in a multi4dropped fashion rather than re5uiring a dedicated set of cables per device as in the case of 34-@ m$ devices. 9oreover" several parameters can be communicated per device in a Aieldbus network whereas only one parameter can be transmitted on a 34-@ m$ connection. Aieldbus also provides a good foundation for the creation of a predictive and proactive maintenance strategy. The diagnostics available from fieldbus devices can be used to address issues with devices before they become critical problems. N3P Networkin1 )ith the exception of $<1:ET" which was conceived as early as +=86 for office connectivity and later found uses in industry" the ma#ority of fieldbus standards were developed in the +=?@s and became fully established in the marketplace 42 during the mid4+==@s. In the ;nited States" $llen4%radley developed standards that eventually grew into /evice:et and 1ontrol:et( in Europe" Siemens and other manufacturers developed a protocol which evolved into ,<OAI%;S. /uring the +=?@s" to solve communication problems between different control systems in cars" the Berman company <obert %osch Bmb. first developed the 1ontroller $rea :etwork &1$:'. The concept of 1$: was that every device can be connected by a single set of wires" and every device that is connected can freely exchange data with any other device. 1$: soon migrated into the factory automation marketplace &with many others'. /espite each technology sharing the generic name of fieldbus the various fieldbus are not readily interchangeable. The differences between them are so profound that they cannot be easily connected to each other.N6P To understand the differences among fieldbus standards" it is necessary to understand how fieldbus networks are designed. )ith reference to the OSI model" fieldbus standards are determined by the physical media of the cabling" and layers one" two and seven of the reference model. Aor each technology the physical medium and the physical layer standards fully describe" in detail" the implementation of bit timing" synchronization" encodingJdecoding" band rate" bus length and the physical connection of the transceiver to the communication wires. The data link layer standard is responsible for fully specifying how messages are assembled ready for transmission by the physical layer" error handling" message4filtering and bus arbitration and how these standards are to be implemented in hardware. The application layer standard" in general defines how the data communication layers are interfaced to the application that wishes to communicate. It describes message specifications" network management implementations and response to the re5uest from the application of services. 0ayers three to six are not described in fieldbus standards.N7P Technical committees" with representatives of many different companies" have been responsible for turning the original specifications into international ISO standards. %ury" among others" reports that work is underway to implement a common fieldbus protocol.N8P This will entail a common set of application4layer services that can be provided regardless of the lower4layer implementation details. $lthough very much in its infancy" it is expected that this protocol may become reality by -@+@. )hether designed for low4level sensor communications or high4level machine connectivity &or both'" a fieldbus is an important enabling technology for an open architecture controller.N?P Aeatures /ifferent fieldbuses offer different sets of features and performance. It is difficult to make a general comparison of fieldbus performance because of fundamental differences in data transfer methodology. In the comparison table below it is simply noted if the fieldbus in 5uestion typically supports data update cycles of + millisecond or faster. $roce!! Field#+! != Deice Network! It should be noted that re5uirements of fieldbus networks for process automation applications &flowmeters" pressure transmitters" and other measurement devices and control valves in industries such as hydrocarbon processing and power generation' are different from the re5uirements of fieldbus networks found in discrete manufacturing applications such as automotive manufacturing" where large numbers of discrete sensors are used including motion sensors" position sensors" and so on. /iscrete fieldbus networks are often referred to as device networks. N=P 43 Ethernet and Field#+! <ecently a number of Ethernet4based industrial communication systems have been established" most of them with extensions for real4time communication. These have the potential to replace the traditional fieldbuses in the long term. .ere is a partial list of the new Ethernet4based industrial communication systems* $A/U Ether1$T Ether:etJI, Ethernet ,owerlink AO;:/$TIO: .SE %$1net ,<OAI:ET IO ,<OAI:ET I<T Safety:ET p SE<1OS III TTEthernet X$<$: <$,IEnet Safety Aieldbus can be used for systems which must meet safety4relevant standards like IE1 7+6@? or E: =634+. /epending on the actual protocol" fieldbus can provide measures like counters" 1<1!s" echo" timeout" uni5ue sender and receiver I/!s or cross check. EthernetJI, and SE<1OS III both use the 1I, Safety protocol"N+@P Ethernet ,owerlink uses openS$AETV" while AO;:/$TIO: Aieldbus and ,rofibus &,<OAIsafe' can address SI0 - and SI0 2 process safety applications. In Ganuary -@@7" the Aieldbus Aoundation announced that T]X <heinland Industrie Service Bmb." $utomation" Software and Information Technology" a global" independent and accredited testing agency" had granted ,rotocol Type $pproval for its Safety Specifications. The Aoundation Technical Specifications 4 Safety Instrumented Aunctions are in compliance with International Electrotechnical 1ommission &IE1' 7+6@? standard &functional safety of electricalJelectronicJprogrammable electronic safety4related systems' re5uirements up to" and including" Safety Integrity 0evel 2 &SI0 2'. N++P Interchan1ea#ility ! Intero"era#ility 44 Interchan1ea#ility is an ability that an ob#ect can be replaced by another ob#ect without affecting code using the ob#ect. That chance usually re5uires two ob#ects share an interface that is either same strictly or compatible in particular case. See encapsulation article for detail. If interoperability is the measure of how well devices can interact" interchangeability is the measure of the degree to which multiple items are directly substitutive. 9ore simply" if device $ and device % are functionally e5uivalent" they are interchangeable. One of the ma#or interests in open solutions is the ability to swap components for those from alternate vendors. This has the primary benefit of mitigating vendor lock4in" and the secondary benefit of keeping price pressure on all vendors.The threat of being replaced is typically enough to prevent vendors from substantially #acking up prices. 1ustomization is the enemy of interchangeability. Aeatures that are narrowly supported in the industry become barriers to substitution. )hile vendors are certainly eager to develop and sell these features" the onus is typically on customers to avoid deploying these features en masse. $nd the important point here is that it is ubi5uity not standards that determines this. Open Alow is by far the hottest standard right now" but there is a lot of space for vendors to claim OpenAlow support. Aorgetting even the difference between OpenAlow +.@ and +.2.+" there are multiple capabilities within a single version that need to be supported e5ually across vendors for interchangeability to be the case. It is possible" but customers need to be cognizant of the different levels of support for the standard before they make design decisions if interchangeability is a desire. $nd even when there are not multiple versions of standard" there are instances where standards are not enough to guarantee interchangeability. In the wireless controller space" one of the potential benefits of 1$,)$, was to make it possible to mix and match" but how many )0$: solutions are interchangeable at the deviceJ$, level^ $ more common example" some enterprise networks have adopted 1isco_s EIB<, protocol. :etwork architectures and surrounding infrastructure have been designed with this protocol in mind" essentially making those 1isco devices irreplaceable except by other 1isco devices. $nd even though 1isco has recently opened up the protocol" that doesn!t change the number of commercial4grade alternatives. In effect" users haveIby their own designIgiven up interchangeability. I should note that the power of interchangeability is not necessarily in deploying multiple products alongside each other. <ather the power is in the ability to replace products with alternatives. In the fight against vendor lock4in &read* higher pricing and inability to switch'" it is the threat of replaceability" not interoperability" that makes a difference. Take for example the laptop and ,1 market. $ company will standardize on a single &or small set of' laptop model. They can negotiate pricing because it is not all that difficult to change from one vendor to another &from Intel to /ell" or whatever'. The guys at 0enovo know this" so they have to go into the deal willing to negotiate. So how do you practically navigate the interchangeability waters^ $s with interoperability" where you draw the solution boundaries can have a profound impact on the degree to which two systems are interchangeable. If drawn too narrowly &at the device level" for instance'" the fidelity of feature parity must be extremely high. If drawn more broadly &at the system level" for example'" functional e5uivalence can take many forms. 45 In the latter case" one4for4one feature and protocol parity might be less important than broader technology interchangeability. Aor example" in any fabric solution" individual nodes are not interchangeable because of the proprietary fabric protocols. Expanding the boundary to include the system allows interchangeability to be evaluated in terms of Ethernet and 0- support. In this scenario" interchangeability might actually be achieved despite box4for4box differences. So what do I conclude on interoperability and interchangeability^ I think that interchangeability and interoperability are probably the two most common meanings for open. The extent to which one" the other" or both are desirable is largely dependent on organizational discipline. I actually think customers have more power here than vendors" as counter4intuitive as that seems. 9any customers include interchangeability as a reason to buy &sometimes referring to it in the negative as avoiding vendor lock4in'" but having interchangeability as a selection criterion while lacking the will &or budget' to execute a swap introduces artificial constraints on solution selection. )hile there might be business reasons to advocate this position publicly &price pressure on the primary vendor" for instance'" customers should be preciseIat least internallyI about what really constitutes a purchasing re5uirement. Intero"era#ility Intero"era#ility is the ability of making systems and organizations work together &inter4operate'. )hile the term was initially defined for information technology or systems engineering services to allow for information exchange" N+P a more broad definition takes into account social" political" and organizational factors that impact system to system performance. N-P Task of building coherent services for users when the individual components are technically different and manage by different organizations N2P Syntactic intero"era#ility If two or more systems are capable of communicating and exchanging data" they are exhibiting syntactic interoperability. Specified data formats" communication protocols and the like are fundamental. U90 or SK0 standards are among the tools of syntactic interoperability. This is also true for lower4level data formats" such as ensuring alphabetical characters are stored in a same variation of $S1II or a ;nicode format &for English or international text' in all the communicating systems. Syntactical interoperability is a necessary condition for further interoperability. Se*antic intero"era#ility %eyond the ability of two or more computer systems to exchange information" semantic interoperability is the ability to automatically interpret the information exchanged meaningfully and accurately in order to produce useful results as defined by the end users of both systems. To achieve semantic interoperability" both sides must refer to a common information exchange reference model. The content of the information exchange re5uests are unambiguously defined* what is sent is the same as what is understood. The possibility of promoting this result by user4driven convergence of disparate interpretations of the same information has been ob#ect of study by research prototypes such as S2/%. )ro!!(do*ain intero"era#ility 46 9ain article* 1ross4domain interoperability 9ultiple social" organizational" political" legal entities working together for a common interest andJor information exchange. N3P Intero"era#ility and o"en !tandard! Interoperability must be distinguished from open standards. $lthough the goal of each is to provide effective and efficient exchange between computer systems" the mechanisms for accomplishing that goal differ. Open standards imply interoperability ab4initio" i.e. by definition" while interoperability does not" by itself" imply wider exchange between a range of products" or similar products from several different vendors" or even between past and future revisions of the same product. Interoperability may be developed post4facto" as a special measure between two products" while excluding the rest" or when a vendor is forced to adapt its system to make it interoperable with a dominant system. O"en !tandard! Open standards rely on a broadly consultative and inclusive group including representatives from vendors" academicians and others holding a stake in the development. That discusses and debates the technical and economic merits" demerits and feasibility of a proposed common protocol. $fter the doubts and reservations of all members are addressed" the resulting common document is endorsed as a common standard. This document is subse5uently released to the public" and henceforth becomes an open standard. It is usually published and is available freely or at a nominal cost to any and all comers" with no further encumbrances. Xarious vendors and individuals &even those who were not part of the original group' can use the standards document to make products that implement the common protocol defined in the standard" and are thus intero"era#le #y de!i1n5 with no specific liability or advantage for any customer for choosing one product over another on the basis of standardised features. The vendors! products compete on the 5uality of their implementation" user interface" ease of use" performance" price" and a host of other factors" while keeping the customers data intact and transferable even if he chooses to switch to another competing product for business reasons. Introd+ction to OLE for $roce!! )ontrol ,O$)- O0E for ,rocess 1ontrol &O,1'" is the original name for an open standards specification developed in +==7 by an industrial automation industry task force. The standard specifies the communication of real4time plant data between control devices from different manufacturers. $fter the initial release" the O,1 Aoundation was created to maintain the standard. Since then" standards have been added and names have been changed. 1urrently &Gune" -@@7'" O,1 is a series of standards specifications. &Seven current standards and two emerging standards.' The first standard &originally called simply the O,1 Specification'" is now called the /ata $ccess Specification" or &later on the same page' O,1 /ata $ccess" or O,1 /ata $ccess Specification. O,1 is generally understood to stand for O0E for ,rocess 1ontrol" even though no page on the O,1 Aoundation website suggests that the letters O,1 ever stood for anything" except for some content written by member companies about themselves. Ori1in and +!e! The O,1 Specification was based on the O0E" 1O9" and /1O9 technologies developed by 9icrosoft for the 9icrosoft )indows operating system family. O,1 was designed to bridge )indows based applications and process control hardware and software applications. It is an open standard that permits a consistent method of accessing field 47 data from plant floor devices. This method remains the same regardless of the type and source of data. O,1 servers provide a method for many different software packages to access data from a process control device" such as a ,01 or /1S. Traditionally" any time a package needed access to data from a device" a custom interface" or driver" had to be written. The purpose of O,1 is to define a common interface that is written once and then reused by any business" S1$/$" .9I" or custom software packages. Once an O,1 server is written for a particular device" it can be reused by any application that is able to act as an O,1 client. O,1 servers use 9icrosoft_s O0E technology &also known as the 1omponent Ob#ect 9odel" or 1O9' to communicate with clients. 1O9 technology permits a standard for realtime information exchange between software applications and process hardware to be defined. Deelo"*ent The O,1 ;nified $rchitecture &;$' has been specified and is being tested and implemented through its Early $dopters program. It can be implemented with Gava" 9icrosoft .:ET" or 1" eliminating the need to use a 9icrosoft )indows based platform of earlier O,1 versions. ;$ combines the functionality of the existing O,1 interfaces with new technologies such as U90 and )eb Services to deliver higher level 9ES and E<, support. It looks to become the standard for exchanging industrial data" replacing AactoryTalk" $rchestra" some 9odbus applications" and O,1/$. Unit IC MOD/US AND $ROFI/US $A0D$0FMS AND FF 48 Mod#+! Introd+ction 9odbus is a serial communications protocol originally published by 9odicon &now Schneider Electric' in +=8= for use with its programmable logic controllers &,01s'. Simple and robust" it has since become a de facto standard communication protocol" and it is now a commonly available means of connecting industrial electronic devices.N+P The main reasons for the use of 9odbus in the industrial environment are* developed with industrial applications in mind openly published and royalty4free easy to deploy and maintain moves raw bits or words without placing many restrictions on vendors 9odbus enables communication among many &approximately -3@' devices connected to the same network" for example a system that measures temperature and humidity and communicates the results to a computer. 9odbus is often used to connect a supervisory computer with a remote terminal unit &<T;' in supervisory control and data ac5uisition &S1$/$' systems. 9any of the data types are named from its use in driving relays* a single4bit physical output is called a coil" and a single4bit physical input is called a discrete input or a contact. The development and update of 9odbus protocols has been managed by the 9odbus OrganizationN-P since $pril -@@3" when Schneider Electric transferred rights to that organization" signaling a clear commitment to openness.N2P The 9odbus Organization is an association formed of independent users and suppliers of 9odbus compliant devices that seeks to drive the adoption of the 9odbus communication protocol suite" and its evolution to address architectures for distributed automation systems across multiple market segments.N3P 1ommunication and devices Each device intended to communicate using 9odbus is given a uni5ue address. In serial and 9%` networks" only the node assigned as the 9aster may initiate a command. On Ethernet" any device can send out a 9odbus command" although usually only one master device does so. $ 9odbus command contains the 9odbus address of the device it is intended for. Only the intended device will act on the command" even though other devices might receive it &an exception is specific broadcastable commands sent to node @ which are acted on but not acknowledged'. $ll 9odbus commands contain checksum information" to ensure the command arrives undamaged. The basic 9odbus commands can instruct an <T; to change the value in one of its registers" control or read an IJO port" and command the device to send back one or more values contained in its registers. There are many modems and gateways that support 9odbus" as it is a very simple protocol and often copied. Some of them were specifically designed for this protocol. /ifferent implementations use wireline" wireless communication" such as in the IS9 band" and even short message service &S9S' or Beneral ,acket <adio Service &B,<S'. One of the more common designs of wireless networks makes use of 9esh networking. Typical problems that designers have to overcome include high latency and timing issues. Arame format 49 $ll 9odbus variants choose different frame formats.N+P 9odbus <T; frame format :ame 0ength &bits' Aunction Start -? $t least 2 +a- character times of silence &mark condition' $ddress ? Station address Aunction ? Indicates the function code( e.g." read coilsJinputs /ata n b ? /ata ` length will be filled depending on the message type 1<1 +7 bits 1hecksum End -? $t least 2 +a- character times of silence between frames 9odbus $S1II frame format :ame 0ength &char.' Aunction Start + Starts with colon & * ' &$S1II hex value is @x2$' $ddress - Station address Aunction - Indicates the function codes like read coils J inputs /ata n /ata ` length will be filled depending on the message type 0<1 - 1hecksum End - 1arriage return I line feed &1<J0A' pair &$S1II values of @x@/ Y @x@$' 9odbus T1, frame format :ame 0ength &bytes' Aunction 50 Transaction identifier - Aor synchronization between messages of server Y client ,rotocol identifier - Wero for 9odbusJT1, 0ength field - :umber of remaining bytes in this frame ;nit identifier + Slave address &-66 if not used' Aunction code + Aunction codes as in other variants /ata bytes n /ata as response or commands ;nit identifier is used with 9odbusJT1, devices that are composites of several 9odbus devices" e.g. on 9odbusJT1, to 9odbus <T; gateways. In such case" the unit identifier tells the Slave $ddress of the device behind the gateway. :atively 9odbusJT1,4capable devices usually ignore the ;nit Identifier. The byte order is %ig4Endian &first byte contains 9S%'. Implementations $lmost all implementations have variations from the official standard. /ifferent varieties might not communicate correctly between e5uipment of different suppliers. Some of the most common variations are* /ata types o Aloating point IEEE o 2-4bit integer o ?4bit data o 9ixed data types o %it fields in integers o 9ultipliers to change data toJfrom integer. +@" +@@" +@@@" -67 ... ,rotocol extensions o +74bit slave addresses o 2-4bit data size &+ address F 2- bits of data returned.' o )ord swapped data 0imitations 51 Since 9odbus was designed in the late +=8@s to communicate to programmable logic controllers" the number of data types is limited to those understood by ,01s at the time. 0arge binary ob#ects are not supported. :o standard way exists for a node to find the description of a data ob#ect" for example" to determine if a register value represents a temperature between 2@ and +86 degrees. Since 9odbus is a masterJslave protocol" there is no way for a field device to report by exception &except over Ethernet T1,JI," called open4mbus'4 the master node must routinely poll each field device" and look for changes in the data. This consumes bandwidth and network time in applications where bandwidth may be expensive" such as over a low4bit4rate radio link. 9odbus is restricted to addressing -38 devices on one data link" which limits the number of field devices that may be connected to a master station &once again Ethernet T1,JI, proving the exception'. 9odbus transmissions must be contiguous which limits the types of remote communications devices to those that can buffer data to avoid gaps in the transmission. 9odbus protocol itself provides no security against unauthorized commands or interception of data. F+nction Field The Aunction 1ode field tells the addressed slave what function to perform. The following functions are supported by 9odbus poll ;> READ )OIL STATUS ;< READ IN$UT STATUS ;9 READ 'OLDIN. RE.ISTERS ;8 READ IN$UT RE.ISTERS ;7 WRITE SIN.LE )OIL ;6 WRITE SIN.LE RE.ISTER >7 WRITE MULTI$LE )OILS >6 WRITE MULTI$LE RE.ISTERS The data field contains the re5uested or send data. )ontent! of the Error )heckin1 Field Two kinds of error4checking methods are used for standard 9odbus networks. The error checking field contents depend upon the method that is being used. AS)II )hen $S1II mode is used for character framing" the error4checking field contains two $S1II characters. The error check characters are the result of a 0ongitudinal <edundancy 1heck &0<1' calculation that is performed on the message contents" exclusive of the beginning colon and terminating 1<0A characters. The 0<1 characters are appended to the message as the last field preceding the 1<0A characters. 52 RTU )hen <T; mode is used for character framing" the error4checking field contains a +74bit value implemented as two eight4bit bytes. The error check value is the result of a 1yclical <edundancy 1heck calculation performed on the message contents. The 1<1 field is appended to the message as the last field in the message. )hen this is done" the low4order byte of the field is appended first" followed by the high4order byte. The 1<1 high4order byte is the last byte to be sent in the message. F+nction ;> ,;>he3- Read )oil! <eads the O:JOAA status of discrete coils in the slave. ReD+e!t The re5uest message specifies the starting coil and 5uantity of coils to be read. Example of a re5uest to read +@...-- &1oil ++ to -2' from slave device address 3* Field Na*e RTU ,he3- AS)II )haracter! .eader :one * &1olon' Slave $ddress @3 @ 3 Aunction @+ @ + Starting $ddress .i @@ @ @ Starting $ddress 0o @$ @ $ Kuantity of 1oils .i @@ @ @ Kuantity of 1oils 0o @/ @ / Error 1heck 0o // 0<1 &E 3' Error 1heck .i =? Trailer :one 1< 0A Total %ytes ? +8
Re!"on!e The coil status response message is packed as one coil per bit of the data field. Status is indicated as* + is the value O:" and @ is the value OAA. The 0S% of the first data byte contains the coil addressed in the re5uest. The other coils follow toward the high4order end of this byte and from low order to high order in subse5uent bytes. If the returned coil 5uantity 53 is not a multiple of eight" the remaining bits in the final data byte will be padded with zeroes &toward the high4order end of the byte'. The byte count field specifies the 5uantity of complete bytes of data. Example of a response to the re5uest* Field Na*e RTU ,he3- AS)II )haracter! .eader :one * &1olon' Slave $ddress @3 @ 3 Aunction @+ @ + %yte 1ount @- @ - /ata &1oils 8...+@' @$ @ $ /ata &1oils -8...-@' ++ + + Error 1heck 0o %2 0<1 &/ E' Error 1heck .i 6@ :one Trailer :one 1< 0A Total %ytes 8 +6
Mod#+! Tro+#le !hootin1 This document may help you to solve problem you may encounter when using the 9odbus Serial &<T; or $S1II' protocol with the Engiby driver on ,1/ system. :ote that a good knowledge of the partner device is necessary to correctly configure the driver on the ,1/. Ty"ical tro+#le! with the Slae Drier No co**+nication In the Slave driver this is indicated by the error cSynchro_. It means that the Slave driver does not receive any re5uests from the 9aster. Airst check the cabling &=@Q or the errors'. In <S -2- Tx and <x must be crossed. In <S 3?6 don_t cross the wires. The indication Td` and Td4 is not always identical on different devices. ,ossible labeling for Td` or / or TxJ<x` or TxJ<x4, or $ ,ossible labeling for Td4 or J/ or TxJ<x4 or TxJ<x4: or % )ith a long bus cable" check the end4resistors. The S$I$ recommendation for S4%us network is also valid for 9odbus. <efer to the S4%us manual. Dia1no!tic! error! Typically reasons are* 4 the baudrate or the bit settings are not the same on 9aster and on the Slaves 54 4 wrong cabling &crossed or missing wires' 4 bad ground connection between 9aster and Slaves 4 with <S3?6" bad or missing termination &pul4up" pul4down" resistors inc. supply( termination resistors' Synchro error $s explained above this code is displayed if no re5uest is received from the Slave. This code is also displayed if the interval of the re5uests from the master is lower than the ad#usted timeout in 9odbus Slave Abox. If necessary increase this timeout. SASI error This error indicate that the driver could not take control of the serial line. $ typical error is when the same port is already declared in the .ardware settings as S4%us ,B; port" 9odem or Bateway port. <emove any configuration on the port used by the 9odbus /river. Ensure also that no other part of your program uses the same port. Else the corresponding module may be missing" wrong e5uipped or defective. Aurthermore" the ,B; port &1O9 @ on most systems' is forced in ,B; mode when a ,B; cable is used. On :T4systems check the option F+ll RS<9< hand!hakin1 in the device configurator. ;se the option )hannel ; $.U if you want to use it alternatively with ,B; and 9odbus. Ty"ical tro+#le! with the Ma!ter Drier No co**+nication In the 9aster driver" missing communication is indicated with timeout errors. Airst check the cabling &=@Q or the errors'. In <S -2- Tx and <x must be crossed. In <S 3?6 don_t cross the wires. The indication Td` and Td4 is not always identical on different devices. Tray to exchange Td` with Td4 )ith a long bus cable" check the end4resistors. The S$I$ recommendation for S4%us network are also valid for 9odbus. <efer to the S4%us manual. Some slave device needs an activation or a configuration of the 9odbus port before you can use it. 1heck this point with the manufacturer of the slave device. Some slaves may have a high sensitivity on inter4character delay in <T; mode. The ,1/ firmware doesn!t warrantee that this delay is always respected as specified for 9odbus. This problem is increased with the use of the )eb4server in the ,1/. $ special feature &called the !freeze bit!' has been added in the ,1/ firmware and the 9odbus driver. It gives positive results in all cases till now. Vou need at least 9odbus library version -.6.@-8 and A) +.@?.xx on ,1/2 &other systems not yet known'. Dia1no!tic! error! Typical reasons are* 4 the baudrate or the bit settings are not the same on 9aster and on the Slaves 4 wrong cabling &crossed or missing wires' 4 bad ground connection between 9aster and Slaves 4 with <S3?6" bad or missing termination &pul4up" pul4down" resistors inc. supply( termination resistors' SASI error 55 Same comments as for the Slave /river. See comments above. So*e reD+e!t! re*ain! witho+t re!"on!e Some slaves do not supports all 9odbus functions or have restriction on the number of re5uested values. 1heck the following* 4 Vou use the correct 9odbus function 4 The address where you re5uest values is valid for the slave 4 The number of re5uested values is supported by the slave $ll these data should be given in the manual of the slave device" else ask the manufacturer. Error ESlae *e!!a1e@ in the Ma!ter F#o3 This error means that the slave refused the re5uest and sent an error message back &also called !exception response!'. Typical causes are* 4 The re5uested address is not valid for the slave. 4 The range overpasses the valid address range in the slave. 4 $ value sent is not accepted by the slave. Take care at the address offset option &@ or +'. If this option is not correctly set the address maybe shifted by one and be invalid for the slave. E.g. address -6 in the master with offsetF+" maybe understand as address -3 in the slave if the offset + is not applied by the slave. $ddress -3 may be invalid for the slave. $ROFI/US% Introd+ction ,<OAI%;S is not one communication system" but a variety of protocols built on the same field4bus technology bundle. ;sers can combine varieties of ,<OAI%;S protocols with their own software and other re5uirements" resulting in a uni5ue application profile. )ith many profiles available" ,<OAI%;S can suit specific needs. One thing remains the same" though. Through thorough testing" ,<OAI%;S devices meet a high standard of 5uality befitting a high 5uality network. 'i!tory ,<OAI%;S was born out of a combined push by the Berman government" Berman companies" and other industry leaders in the late +=?@s. Their effort created an automation solution that is not only still viable today" but has led to further solutions. The proud heritage of ,<OAI%;S allows for many European customers to turn to automation specific to their needs. Ori1in The 1entral $ssociation for the Electrical Industry created ,<OAI%;S.In +=?8" -+ companies and institutions in Bermany #oined forces to create a new protocol. Their goal was to create a bit4serial Aieldbus system. In order for the system to be viable" they needed to standardize the field device interface. The group" which had taken the name 1entral $ssociation for the Electrical Industry &WXEI'" completed its goal with the reation of ,<OAI%;S A9S &Aieldbus message Specification'. This new protocol satisfied standardization of Industrial $utomation through a protocol capable of sending complex communications. The WXEI was not finished" though. In +==2" the group introduced a new standard" ,<OAI%;S /, 56 &/ecentralized ,eriphery'. This new version featured more simplicity" including easier configuration and faster messaging. Or1aniBation! ,<OAI%;S standards are maintained and advanced via a pair of important organizations. In +=?=" ,<OAI%;S manufacturers and users created the ,<OAI%;S ;ser Organization &,:O'. This group was" and still is" a non4 commercial venture. 9embers work to advance ,<OAI%;S through support and education" including publishing documents that help users satisfy their needs using existing technology. $ larger group was formed in +==6 and named ,<OAI%;S International" or ,I. $s the largest Aieldbus user association in the world" ,I is able to undertake many tasks vital to the progression of ,<OAI%;S. 0ike the ,:O" ,I educates users on ,<OAI%;S and helps advance its placement throughout the world. The organization goes further" though" by helping with 5uality assurance" setting standards" and developing new ,<OAI%;S technologies. Oeriew ,<OAI%;S is a smart" field4bus technology. /evices on the system connect to a central line. Once connected" these devices can communicate information in an efficient manner" but can go beyond automation messages. ,<OAI%;S devices can also participate in self4diagnosis and connection diagnosis. $t the most basic level" ,<OAI%;S benefits from superior design of its OSI layers and basic topology. OSI Model ,<OAI%;S OSI 9odel ,<OAI%;S networks make use of three separate layers of the OSI :etwork model. Airst" ,<OAI%;S describes the application layer. There are multiple versions of ,<OAI%;S that handle different types of messaging at the application layer. Some of the types of messaging ,<OAI%;S supports include cyclic and acyclic data exchange" diagnosis" alarm4 handling" and isochronous messaging. ,<OAI%;S does not define layers three through six. It does" however" define the data link and physical layers" layers one 57 and two. The data link layer is completed through a Aield bus /ata 0ink" or A/0. The A/0 system combines two common schemes" master4slave methodology and token passing. In a master4slave network" masters" usually controllers" send re5uests to slaves" sensors and actuators. The slaves respond accordingly. ,<OAI%;S also includes token passing" a system in which a [token\ signal is passed between nodes. Only the node with the token can communicate. The token passing concept is like the speaking conch( only the person with the conch is allowed to talk. Ainally" ,<OAI%;S defines a physical layer" though it leaves room for flexibility. ,<OAI%;S systems can have three types of media. The first is a standard twisted4pair wiring system" in this case <S3?6. Two more advanced systems are also available. ,<OAI%;S systems can now operate using fiber4optic transmission in cases where that is more appropriate. $ safety4enhanced system called 9anchester %us ,ower" or 9%," is also available in situations where the chemical environment is prone to explosion. To"olo1y ,<OAI%;S uses the bus topology. In this topology" a central line" or bus" is wired throughout the system. /evices are attached to this central bus. One bus eliminates the need for a full4length line going from the central controller to each individual device. In the past" each ,<OAI%;S device had to connect directly to the central bus. Technological advancements" however" have made it possible for a new [two4wire\ system. In this topology" the ,<OAI%;S central bus can connect to a ,rofi:et Ethernet system. In this way" multiple ,<OAI%;S busses can connect to each other. Ty"e! of $ROFI/US ,<OAI%;S has advanced through a handful of revisions. In some cases" advances have led to a new type of ,<OAI%;S. In other cases" new revisions mean different versions of the same type of ,<OAI%;S. In any case" the variety of ,<OAI%;S solutions mean the system can be adapted to fit the varying needs of different industries. $ROFI/US FMS The initial version of ,<OAI%;S was ,<OAI%;S A9S" Aieldbus 9essage Specification. ,<OAI%;S A9S was designed to communicate between ,rogrammable 1ontrollers and ,1s" sending complex information between them. ;nfortunately" being the initial effort of ,<OAI%;S designers" the A9S technology was not as flexible as needed. This protocol was not appropriate for less complex messages or communication on a wider" more complicated network. :ew types of ,<OAI%;S would satisfy those needs. ,<OAI%;S A9S is still in use today" though the vast ma#ority of users find newer solutions to be more appropriate. $ROFI/US D$ The second type of ,<OAI%;S is more universal. 1alled ,<OAI%;S /," for /ecentralized ,eriphery" this new protocol is much simpler and faster. ,<OAI%;S /, is used in the overwhelming ma#ority of ,<OAI%;S application profiles in use today. $pplication profiles allow users to combine their re5uirements for a specific solution" and they will be discussed in more detail shortly. ,<OAI%;S /, has" itself" three separate versions. Each version" from /,4X@ to /,4X+ and /,4X-" provides newer" more complicated features. $ROFI/US $A 58 ,<OAI%;S ,$ is a protocol designed for ,rocess $utomation. In actuality" ,<OAI%;S ,$ is a type of ,<OAI%;S /, $pplication profile. ,<OAI%;S ,$ standardizes the process of transmitting measured data. It does hold a very important uni5ue characteristic" though. ,<OAI%;S ,$ was designed specifically for use in hazardous environments. In most environments" ,<OAI%;S ,$ operates over <S3?6 twisted pair media. This media" along with the ,$ application profile supports power over the bus. In explosive environments" though" that power can lead to sparks that induce explosions. To handle this" ,<OAI%;S ,$ can be used with 9anchester %us ,owered technology &9%,'. M/$ Technolo1y The 9%, media was designed specifically to be used in ,<OAI%;S ,$. It permits transmission of both data and power. The technology steps the power down" though. $ smaller power reduces" or nearly eliminates" the possibility of explosion. %uses using 9%, can reach +=@@ meters and can support branches. A""lication $rofile! ,<OAI%;S can be tailored to specific needs using application profiles. There are many profiles that combine standards for transmission media" communication protocol &A9S" /,4X@" etcd'" and uni5ue protocols. Each application profile is tailored to a specific use" and new profiles appear regularly. To list them all would be cumbersome. Some application profiles are widespread" though. Two examples are ,<OAIsafe and ,<OAIdrive. ,<OAIsafe ,<OAIsafe uses additional software to create a high4integrity network. This network is useful in situations where high safety is a re5uirement. Aor suppliers and manufacturers to be certified in ,<OAIsafe" they must maintain high standards in 5uality. F+ality A!!+rance The ,<OAI%;S ;ser Organization has created a conformance testing program to ensure devices meet high standards. In this program" a device is sent to an independent laboratory for testing. The device then undergoes a comprehensive series of tests" including .ardware" 1onformity" and Aunction tests" among others. The test results are documented.)hen a device passes all tests" its manufacturer can apply for a conformance certificate. The certificate is valid for three years and can be renewed with further testing. $ROFI/US(FMS )o**+nication Model The ,<OAI%;S4A9S communication model permits distributed application processes to be unified into a common process by using communication relationships. That portion of an application process in a field device which can be reached via communication is called a virtual field device &XA/'. Aigure +? shows the relationship between the real field device and the virtual field device. In this example" only certain variables &i.e." number of units" rate of failure and downtime' are part of the virtual field device and can be read or written via the two communication relationships. 59 Cirt+al field deice with o#Gect dictionary )o**+nication O#Gect! and O#Gect Dictionary ,OD- $ll communication ob#ects of an A9S device are entered in the device!s local ob#ect dictionary. The ob#ect dictionary can be predefined for simple devices. )hen complex devices are involved" the ob#ect dictionary is configured and loaded to the device either locally or remotely. The ob#ect dictionary contains description" structure and data type" as well as the relationship between the internal device addresses of the communication ob#ects and their designation on the bus &indexJname'. The ob#ect dictionary is comprised of the following elements* 'eader 1ontains information on the structure of the ob#ect dictionary
Li!t of !tatic data ty"e! 0ists static data types supported
Static o#Gect dictionary 1ontains all static communication ob#ects
Dyna*ic li!t of the aria#le li!t! 0ists all known variable lists
Dyna*ic "ro1ra* li!t 0ists all known programs The individual parts of the ob#ect dictionary must only be present when the device actually supports these functions. 60 Static co**+nication o#Gect! are entered in the static ob#ect dictionary. They can be predefined by the manufacturer of the device or specified during configuration of the bus system. A9S recognizes five types of communication ob#ects* Si*"le Caria#le Array Series of simple variables of the same type Record Series of simple variables of different types Do*ain Eent Dyna*ic co**+nication o#Gect! are entered in the dynamic portion of the ob#ect dictionary. They can be predefined or defined" deleted or changed with the A9S services. A9S recognizes two types of dynamic communication ob#ects. $ro1ra* inocation Caria#le li!t series of simple variables" arrays or records Lo1ical addre!!in1 is the preferred method of addressing for A9S communication ob#ects. $ccessing is performed with a short address &the index' which is a number of type ;nsigned+7. Each ob#ect has a individual index. $s an option" the ob#ects can also be addressed by name or with their physical address. Every communication ob#ect can be optionally protected against unauthorized access. $ccess to an ob#ect may only be permitted with a certain password or access may only be permitted for a certain group of devices. ,assword and device group can be specified in the ob#ect dictionary for each ob#ect individually. In addition" permissible services &read4only accesses' for accessing an ob#ect can be restricted. $ROFI/US /+! Acce!! $rotocol $ll three ,<OAI%;S versions &/," A9S and ,$' use a uniform bus access protocol. This protocol is implemented by layer - of the OSI reference model. This also includes data security and the handling of the transmission protocols and telegrams. In ,<OAI%;S" layer - is called Aieldbus /ata 0ink &A/0'. The 9edium $ccess 1ontrol &9$1' specifies the procedure when a station is permitted to transmit data. The 9$1 must ensure that only one station has the right to transmit data at a time. The ,<OAI%;S protocol has been designed to meet two primary re5uirements for the 9edium $ccess 1ontrol * e /uring communication between complex automation systems &master'" it must be ensured that each of these stations gets sufficient time to execute its communication tasks within a precisely defined time interval. e 1yclic" real4time data transmission is to be implemented as fast and as simple as possible for communication between a complex programmable controller and its assigned simple IJO devices &slaves'. 61 Therefore" the ,<OAI%;S bus access protocol &see figure 7' includes the token passing procedure which is used by complex bus stations &master' to communicate with each other" and the master4slave procedure which is used by complex bus stations to communicate with the simple IJO devices &slaves'. All three $ROFI/US er!ion! +!e a +nifor* #+! acce!! "rotocol The token "a!!in1 "roced+re guarantees that the bus access right &the token' is assigned to each master within a precisely defined time frame. The token message" a special telegram for passing access rights from one master to the next master must be passed around the logical token ring once to all masters within a prescribed maximum token rotation time. In ,<OAI%;S the token passing procedure is only used for communication between complex stations &master'. The *a!ter(!lae "roced+re permits the master &the active station' which currently owns the token to access the assigned slaves &the passive stations'. The master can send messages to the slaves or read messages from the slaves. )ith this method of access it is possible to implement the following system configurations* e ,ure master4slave system e ,ure master4master system &with token passing' e $ combination of the two Aigure 7 shows a ,<OAI%;S configuration with three active stations &masters' and seven passive stations &slaves'. The three masters form a logical token ring. )hen an active station receives the token telegram" it can perform its master role for a certain period of time. /uring this time it can communicate with all slave stations in a master4slave communication relationship and with all master stations in a master4master communication relationship. $ token ring is the organizational chain of active stations which form a logical ring based on their station addresses. In this ring the token &bus access right' is passed from one master to the next in a specified order &increasing addresses'. 62 In the start4up phase of the bus system" the task of the medium access control &9$1' of the active stations is to detect this logical assignment and to establish the token ring. In the operational phase" defective or switched4 off &active' stations must be removed from the ring and new active stations can be added to the ring. In addition" the bus access control ensures that the token is passed from one master to the next in order of increasing addresses. The actual token hold time of a master depends on the configured token rotation time. In addition the detection of defects on the transmission medium and on the line receiver" as well as the detection of errors in station addressing &e.g." multiple addresses assigned' or in token passing &e.g." multiple tokens or token loss' are characteristic features of the ,<OAI%;S medium access control. Serice F+nction D$ $A FMS SDA Send /ata with $cknowledge e SRD Send and <e5uest /ata with reply e e e SDN Send /ata with :o acknowledge e e e )SRD 1yclic Send and <e5uest /ata with reply e Serice! of the $ROFI/US data !ec+rity layer ,layer <- $nother important task of layer - is data !ec+rity. ,<OAI%;S layer - frame formats ensure high data integrity. $ll telegrams have 'a**in1 Di!tance 'DH8. This is achieved by using special start and end delimiters slip4free synchronization and a parity bit for each octet as defined in the international standard IE1 ?8@464+. ,<OAI%;S layer - operates in a connectionless mode. In addition to logical peer4to4peer data transmission" it provides multi4peer communication &%roadcast and 9ulticast'. /roadca!t co**+nication means that an active station sends an unacknowledged message to all other stations &master and slaves'. M+ltica!t co**+nication means that an active station sends an unacknowledged message to a predetermined group of stations &master and slaves'. In ,<OAI%;S4A9S" /, and ,$ an individual subset of layer4- services is used. See table 8. The services are called via service access points &S$,s' of layer - by the higher layers. In ,<OAI%;S4A9S these service access points are used to address the logical communication relationships. In ,<OAI%;S4/, and ,$ a precisely defined function is assigned to each service access point. Several service access points can be used simultaneously for all active and passive stations. $ distinction is made between source &SS$,' and destination service access points &/S$,'. 63 Unit C INDUSTRIAL ET'ERNET AND WIRELESS )OMMUNI)ATION Ind+!trial Ethernet Industrial Ethernet switch Ind+!trial Ethernet &IE' refers to the use of standard Ethernet protocols with rugged connectors and extended temperature switches in an industrial environment" for automation or process control. 1omponents used in plant process 64 areas must be designed to work in harsh environments of temperature extremes" humidity" and vibration that exceed the ranges for information technology e5uipment intended for installation in controlled environments. The use of fiber Ethernet reduces the problems of electrical noise and provides electrical isolation to prevent e5uipment damage. Some industrial networks emphasized deterministic delivery of transmitted data" whereas Ethernet used collision detection which made transport time for individual data packets difficult to estimate with increasing network traffic. Typically" industrial use of Ethernet use full4duplex standards and other methods so that collisions do not unacceptably influence transmission times. A""lication eniron*ent )hile industrial Ethernet systems use the same protocols as Ethernet applied to office automation" industrial plant use re5uires consideration of the environment in which the e5uipment must operate. ,lant4floor e5uipment must tolerate a wider range of temperature" vibration" and electrical noise than e5uipment installed in dedicated information4technology areas. Since closed4loop process control may rely on an Ethernet link" economic cost of interruptions may be high and availability is therefore an essential criterion. Industrial Ethernet networks must interoperate with both current and legacy systems" and must provide predictable performance and maintainability. In addition to physical compatibility and low4 level transport protocols" a practical industrial Ethernet system must also provide interoperability of higher levels of the OSI model. $n industrial network must provide security both from intrusions from outside the plant" and from inadvertent or unauthorized use within the plant.N+P Industrial networks often use network switches to segment a large system into logical sub4networks" divided by address" protocol" or application. ;sing network switches allows the network to be broken up into many small collision domains. This reduces the risk of a faulty or mis4configured device generating excess network traffic. )hen an industrial network must connect to an office network or external networks" a firewall system can be inserted to control exchange of data between the networks. To preserve the performance and reliability of the industrial network" general office automation systems are separated from the network used for control or IJO devices. Adanta1e! and diffic+ltie! ,01 &,rogrammable logic controller' communicate using one of several possible open or proprietary protocols" such as 9odbus" Sinec .+" ,rofibus" 1$:open" /evice:et or AO;:/$TIO: Aieldbus. The idea to use standard Ethernet makes these systems more inter4operable. Some of the advantages over other types of industrial network are* Increased speed" up from =.7 kbitJs with <S4-2- to + BbitJs with Bigabit Ethernet over 1at6eJ1at7 cables or optical fiber Increased distance $bility to use standard access points" routers" switches" hubs" cables and optical fiber $bility to have more than two nodes on link" which was possible with <S43?6 but not with <S4-2- ,eer4to4peer architectures may replace master4slave ones %etter interoperability 65 /ifficulties of using Industrial Ethernet include* 9igrating existing systems to a new protocol <eal4time uses may suffer for protocols using T1, 9anaging a whole T1,JI, stack is more complex than #ust receiving serial data The minimum Ethernet frame size is 73 bytes" while typical industrial communication data sizes can be closer to +I? bytes. This protocol overhead affects data transmission efficiency. Radio link $ radio repeater is a combination of a radio receiver and a radio transmitter that receives a weak or low4level signal and retransmits it at a higher level or higher power" so that the signal can cover longer distances without degradation. This article refers to professional" commercial" and government radio systems. $ separate article exists for $mateur radio repeaters. In dispatching" amateur radio" and emergency services communications" repeaters are used extensively to relay radio signals across a wider area. )ith most emergency &and some other' dispatching systems" the repeater is synonymous with the base station" which performs both functions. This includes police" fire brigade" ambulance" taxicab" tow truck" and other services. The Beneral 9obile <adio Service in the ;nited States and ;.A 1% service in $ustralia also use repeaters in much the same fashion as amateur radio operators do. Aor decades" cross4band repeaters have been used as fixed links. The links can be used for remote control of base stations at distant sites or to send audio from a diversity &voting' receiver site back to the diversity combining system &voting comparator'. Some legacy links occur in the ;S +6@4+8@ 9.z band. ;S Aederal 1ommunications 1ommission rule changes did not allow +6@ 9.z links after the +=8@s. :ewer links are more often seen on 8-487 9.z &9id4band'" 36@4 38@ 9.z interstitial channels" or =@@ 9.z links. These links" known as fixed stations in ;S licensing" typically connect an e5uipment site with a dispatching office The )o*"onent!
The following diagram illustrate ma#or components in two4way radio system. The diagram shows a typical wide area network. 66 Ty"ical Network )o*"onent In a typical configuration" a wide area radio network consists of 2 ma#or components* 4 Switching system 4 %ase Stations 4 <adio Terminal
:ote that the above configuration applies to a wide area radio network. Aor a single site radio network" typically there is no centralized switching system. Its cswitching_ or commonly known as controller resides in the same physical location as %ase Station. Thus" a single4site radio network consists of* 4 %ase station or site repeater &which includes site controller' 4 <adio Terminal Radio Ter*inal $lso known as* Subscribers ;nit" <adio ;nit" 9obile Station" ,ortable <adio" 9obile <adio" Aixed4Station <adio This is a device for the user to communicate and interface to the network. Aor end4users" they will mostly see these devices more often than the radio infrastructure itself. Thus" the ergonomics and performance of radio terminal &i.e. size" weight" battery life" user interface and ease of use' plays important role for end4user_s acceptance of radio system. In general" radio terminal can be classified into* $orta#le Radio 67 This is the device that users can carry while in the move. Since users carry this device most of the time" the ergonomics of portable radio &i.e. size and weight' is one of important factors for users. .owever" size" weight and battery life are" among others" factors that limit the performance of radio unit. ,ortable radios usually have lower power output compared to mobile or fixed4station radio due to the above limitation factors. Thus" the range of portable radio is typically smaller than mobile or fixed4station radio. In many cases" portable radio with higher power comes with bigger form factors. ;sually there will be a trade4off between the size of portable and power output. Either you can have smaller form factor radio but lower power or higher power but bigger form factor. Mo#ile Radio This is the device that permanently installed in a vehicle or a car. The size and weight of this mobile radio is bigger than portable radio but it usually does not really matter to user because mobile radio is permanently fixed into the vehicle &i.e. users do not have to ccarry_ a mobile radio'. Typically" mobile radio has higher power output than portable radio due to its form factor which facilitate more components to produce higher power as well as it does not have issue with battery life &it uses vehicle battery for its power'. Thus" the range of a mobile radio is usually greater than portable radio. Fi3ed(Station Radio This device is usually installed in a fixed location such as a branch office or a field post. Typically" a fixed4 station radio is a mobile radio with a power supply" external microphone or speaker and better antenna system &such as directional antenna'. Thus" the range of fixed4station radio is greater than mobile and portable radio. /a!e Station or Re"eater $lso known as* Site repeater" <A <epeater" Site This is a network component that provides <A coverage in a radio network. In typical configuration" a base station can consist of <A <epeater&s'" 1ontroller&s'" antenna distribution system &i.e. duplexer" combiner" etc' and ,ower Supply. In the traditional Two4way <adio world" the term /a!e Station is also known as a fixed station that receives a signal but do not re4broadcast the signal to other radio users in the system. This configuration allows an operator" commonly known as the dispatcher" sitting in the office to communicate with the radio terminals in the field. The term Re"eater is used referring to a transceiver that receive a signal and re4transmit it at the same time. The primary purpose of repeaters is to extend coverage. The main difference between base station and repeater is that a repeater repeats a signal that it receives" a base station doesn_t. :owadays" the term of %ase Station and <epeaters are often mixed referring to network component that provides <A coverage. In one radio network" there can be multiple base stations or repeaters to provide necessary coverage. In a wide area configuration" these base stations are connected to a central switch that manages the entire network. The connection from the base stations to switch is called a Site 0ink. 68 Switchin1 Sy!te* or )ontroller $lso known as* 1entral controller" central switch" 9obile Switching Office &9SO' This is a network component that manages the entire network. The switching system" for example" manages the traffic in and out and route the communication to and from base stations. Switching system is the brain of the network without which the network will not be able to handle wide area network calls. In typical configuration" a switching system can consist of multiple devices or e5uipments. Each e5uipment handles specific function. Aor example" one e5uipment handles the routing of the calls while the other handles interaction with base stations. 9ore often than not" these devices or e5uipments are placed in rack&s' or cabinet&s'. /epending on the complexity of the network" the switching system can have from one to tens of racks. Mo#ile Switchin1 Office ,MSO- $lso known as* Switching system" 1ontroller" 1entral controller" central switch This refers to physical location where all of network switching or controller is placed. This term is derived from cellular network for a common term to refer to its switching system. Since the switching system is located in one physical location" the [generic\ term is 9obile Switching Office &9SO' with an [office\ word added to emphasize a location that accommodates various e5uipment of the switch. In two4way radio" this term is sometimes also used to refer to the radio switching system" especially for radio network with complex switching system. $ digital trunked radio system like i/E:" for example" has an architecture similar to a cellular system. Its switching system is as complex as the cellular system. Thus" the i/E: switching system sometimes refers to i/E: 9SO. Site Link This is a facility to connect base station&s' to its switching system. /epending on the technology and products" site link can be E+" partial E+" microwave" 3)" fiber4optic network and any other means to connect base station to its switching with necessary bandwidth and performance. In many radio network installations" site link&s' can be leased from a telecom provider &i.e. E+ line' or owned by the organization &i.e. microwave'. 0eased line will typically incur a monthly recurring cost but has lower maintenance cost while privately owned link will need a higher capital expenditure to buy the e5uipment and maintenance expenses but organizations do not to need to pay monthly subscription like leased line. There are several discussions on the use of satellite as site link. The long delay of satellite link is one of the main factors that need to be considered for two4way radio network implementation" especially for group call type of communication. The use of satellite link for two4way radio is discussed in the $dvanced Topics. Antenna Sy!te* This is a device connected to the base station J repeater to propagate the <adio Are5uency &<A' energy. $ntenna system plays an important role to determine the efficiency of converting electrical energy into <A energy. Thus" determine the area of coverage. 69 There are several antenna configurations to meet various condition and terrain. $ typical antenna parameters are* H FreD+ency /and* This is the range of the band that the antenna will operate in &i.e. ?@74?8@ 9.z'. This only means that the antenna will operate within this band. It usually does not necessarily mean that the antenna will operate over the entire band. H /andwidth* The maximum fre5uency separation that this antenna will operate within the fre5uency band. H .ain* $ntenna gain is proportional to the product of directivity and the antenna_s efficiency. /irectivity is a measure of how an antenna focuses energy. $ntenna_s efficiency accounts for loss associated with antenna. Bain is achieved in an antenna by re4directing energy from some directions into the desired directions. The higher the gain of the antenna" the further the coverage obtained. .owever" a higher gain antenna typically means higher cost. H Radiation $attern* In Two4)ay <adio" there are usually uni4directional antenna or omni4directional antenna. The names reflect the radiation pattern produced by each type of antenna. H Ma3i*+* In"+t $ower* 0ook for the specs with the maximum input power rating of the antenna is greater than the <A power output rating of the transmitter&s'. H CSWR ,Colta1e Standin1 Wae Ratio-* $ high XS)< &Xoltage Standing )ave <atio' implies a large amount of reflected power. This means that the amount of forward power is less. Therefore" the higher the XS)<" the less efficient the antenna. H Len1th* This refers to the physical length of the antenna. $ long antenna is cumbersome to ship" store or install. H Wind Loadin1* In windy areas" the load of the wind on the antenna must be taken into account.
Di!"atcher or )on!ole Sy!te* This is a network sub4system where an operator" commonly known as dispatcher" interface with the network to monitor users_ activities and communicate with users in the field. The dispatcher acts as the central focus of the most two4way radio system and usually has more powerful features to allow the dispatcher operator to effectively monitor and manage the users in the field. The dispatcher is usually located at organization_s control center &also known as* 1ommand and 1ontrol room or 9onitor room'. In traditional two4way radio system" console or dispatcher system has various buttons and 0E/s to facilitate monitoring and managing various talk group. In a modern two4way radio system" these buttons and 0E/s are replaced with ,ersonal 1omputer e5uipped with specialized /igital Sound ,rocessing &/S,' card and other specialized e5uipment to facilitate monitoring and managing users effectively. 9any dispatcher and console system has a Braphical ;ser Interface &B;I' for ease of use. Network Mana1e*ent Sy!te* This is a network sub4system to monitor and manage all related components in the entire network. /epending on the products" :etwork 9anagement System can vary in term of functionalities and performance. $n industry standard for 70 network management which follows the Open System Interconnection &OSI' reference model will have" at least" the following functional management known as A1$,S* 4 Fa+lt management 4 )onfi1+ration management 4 Acco+ntin1 management 4 $erfor*ance management" and 4 Sec+rity management In modern two4way radio system" the :etwork 9anagement System uses computerized system" such as ,ersonal 1omputer with specialized hardware and software to perform the function. The use of ,ersonal 1omputer with Braphical ;ser Interface &B;I' will make it easier for network manager to monitor and manage the network. Area of )oera1e $rea of coverage indicates the area where the radio terminals have usable signal &uplink and downlink' to use the radio network. The usable signal means an acceptable signal level that allows user to communicate. $ term that is mostly used in area of coverage is coverage reliability. $ =6Q coverage reliability means that there is =6Q chance that user will have the acceptable signal level in particular area of coverage. The higher the number" the better the coverage but it usually comes with higher cost due to the need to build more base station or repeater sites. Radio Mode*! for Data A""lication! INTRODU)TION to RTco* TM Radio Mode*! )e have a wide and diverse customer base using our <Tcom T9 modems. %ut what makes them so popular you may askf The answer is the uni5ue <Tcom T9 protocol used by the modem for its on air communications. This protocol is to code efficient that it permits real time data transfers without any significant delay. In fact the transmit to receive acknowledge is often as little as 2ms making the link transparent to the sending terminal as if it were over cablef Radio Mode*! for "oint to "oint data link!% )ith the <T1om!s basically what goes in comes out f There are versions offering communications over distances of #ust a +@@ meters to over 6@Om" at data rates from +-@@baud to 68"7@@Obps" with full support for 8 or ? bit $S1II" + or - stop bits and even or odd parityf. Wire Free /roadca!t5 M+lti(Dro" Sy!te*!5 wire free #+! #rid1e!% 71 The transparency of the <Tcom T9 protocol and the minimal latency make it practical to set up star multi4drop broadcast networks where a single radio modem is connected to the master and slaves are each connected to their own modem or share a modem using <S3?6 or <S3-- local bus. Effectively the either becomes the cable with the master modem connected to it and the slaves the slaves hang off the cable &either' as beforef The broadcast comes from the master and the slave with the matching address responds. Radio Mode*! for Ind+!try% With RS8:7 and RS8<<% Interfaces* TT0" <S-2-" <S3-- and or 34wire <S3?6 are supported. 1ustom interface standards are also available to special order. <S3-- and <S3?6 interfaces are very common in industry and are valued for their ability to operate over long distances and for supporting multi4drop access. &more than one modem or device shares the same cable'. Our <adio 9odems such as the Blobal" ;niversal and Outback all feature <S-2- ` <S3-- and <S3?6 interfaces as standard. This makes these units ideal for networking with ,01!s and other similar industrial devices. They also include internal links that permit selection of - or 34wire operation" a rarity these daysf The universal modem operates at up to 68"7@@bps over distances of up to 2@@m" whilst the global +@m) up to 2km and the Blobal B6@@ &6@@m)' up to 2@Om. 'alf D+"le3 ! F+ll D+"le3 and /+ffered )o**+nication! .alf duplex communications is the mainstay of professional industrial communications systems. It is used by ,01!s and on scanning telemetry alike. .alf duplex communications is where the sending station sends and receives a message over a single radio channel or cable. The se5uence is as follows*4 N@+@+@+@+P*NaddressP*NmessageP*N1<1P....turnaround delay......N+@+@+@+@+P*Nreply addressP*Nreply messageP*N1<1P 72 )ith full duplex operation the system normally re5uires two channels to communicate. In the case of cabled systems and second cable pair or a second modulated carrier and in the case of radio systems a second radio channel normally spaced at least +@9.z away from the sending carrier. In theory full duplex communications offers many advantages of speed over half duplex. .owever the improvement are often marginal in particular if packets of data are small. This is because the reply still cannot be generated until the outgoing message is complete and checked for errors. N@+@+@+@+P*NaddressP*NmessageP*N1<1P....D+ms delay....N+@+@+@+@+P*Nreply addressP*Nreply messageP*N1<1P In cases of high noise the :$O can be sent 5uicker to re5uest another packet. %ut in general most links are operated over conditions with a SI:$/ of better than -@d%. The only saving can be in turn around timef In our case something that can be as little as +6msf Aake full duplex or buffered systems can be supplied where the data is loaded into a buffer at the sending end. The message is then sent over the radio channel and loaded into a buffer at the other end. Ainally it is down loaded into the remote terminal. This type of system is very slow and can has the ma#or problem of an indeterminate time for reply due to buffering effect. It is only suitable for a very limited number of applications. Radio !"ectr+* Radio !"ectr+* refers to the part of the electromagnetic spectrum corresponding to radio fre5uencies I that is" fre5uencies lower than around 2@@ B.z &or" e5uivalently" wavelengths longer than about + mm'. Electromagnetic waves in this fre5uency range" called radio waves" are used for radio communication and various other applications" such as heating. The generation of radio waves is strictly regulated by the government in most countries" coordinated by an international standards body called the International Telecommunications ;nion &IT;'. /ifferent parts of the radio spectrum are allocated for different radio transmission technologies and applications. In some cases" parts of the radio spectrum is sold or licensed to operators of private radio transmission services &for example" cellular telephone operators or broadcast television stations'. <anges of allocated fre5uencies are often referred to by their provisioned use &for example" cellular spectrum or television spectrum'. N+P /y freD+ency $ #and is a small section of the spectrum of radio communication fre5uencies" in which channels are usually used or set aside for the same purpose. $bove 2@@ B.z" the absorption of electromagnetic radiation by Earth!s atmosphere is so great that the atmosphere is effectively opa5ue" until it becomes transparent again in the near4infrared and optical window fre5uency ranges. To prevent interference and allow for efficient use of the radio spectrum" similar services are allocated in bands. Aor example" broadcasting" mobile radio" or navigation devices" will be allocated in non4overlapping ranges of fre5uencies. Each of these bands has a basic bandplan which dictates how it is to be used and shared" to avoid interference and to set protocol for the compatibility of transmitters and receivers. See detail of bands*http*JJwww.ntia.doc.govJfilesJntiaJSpectrumg;segSummaryg9aster4@7-+-@+@.pdf 73 $s a matter of convention" bands are divided at wavelengths of +@ n metres" or fre5uencies of 2b+@ n hertz. Aor example" 2@ 9.z or +@ m divides shortwave &lower and longer' from X.A &shorter and higher'. These are the parts of the radio spectrum" and not its fre5uency allocation. /and na*e A##reiation ITU #and FreD+ency and waelen1th in air E3a*"le +!e! Tremendously low fre5uency T0A D 2 .z E +@@"@@@ km :atural and artificial electromagnetic noise Extremely low fre5uency E0A 2I2@ .z +@@"@@@ km I +@"@@@ km 1ommunication with submarines Super low fre5uency S0A 2@I2@@ .z +@"@@@ km I +@@@ km 1ommunication with submarines ;ltra low fre5uency ;0A 2@@I2@@@ .z +@@@ km I +@@ km Submarine communication" 1ommunication within mines Xery low fre5uency X0A 3 2I2@ k.z +@@ km I +@ km :avigation" time signals" submarine communication" wireless heart rate monitors" geophysics 0ow fre5uency 0A 6 2@I2@@ k.z +@ km I + km :avigation" time signals" $9 longwave broadcasting &Europe and parts of $sia'" <AI/" amateur radio 9edium fre5uency 9A 7 2@@I2@@@ k.z + km I +@@ m $9 &medium4wave' broadcasts" amateur radio" avalanche beacons .igh fre5uency .A 8 2I2@ 9.z +@@ m I +@ m Shortwave broadcasts" citizens! band radio" amateur radio and over4the4horizon aviation communications" <AI/" Over4the4horizon radar" $utomatic link establishment &$0E' J :ear Xertical Incidence Skywave &:XIS' radio communications" 9arine and mobile radio telephony Xery high fre5uency X.A ? 2@I2@@ 9.z +@ m I + m A9" television broadcasts and line4of4sight ground4to4aircraft and aircraft4to4aircraft communications. 0and 9obile and 9aritime 9obile communications" amateur radio" weather 74 radio ;ltra high fre5uency ;.A = 2@@I2@@@ 9.z + m I +@@ mm Television broadcasts" 9icrowave oven" 9icrowave devicesJcommunications" radio astronomy" mobile phones" wireless 0$:" %luetooth" Wig%ee" B,S and two4way radios such as 0and 9obile" A<S and B9<S radios" amateur radio Super high fre5uency S.A +@ 2I2@ B.z +@@ mm I +@ mm <adio astronomy" microwave devicesJcommunications" wireless 0$:" most modern radars" communications satellites" satellite television broadcasting" /%S" amateur radio Extremely high fre5uency E.A ++ 2@I2@@ B.z +@ mm I + mm <adio astronomy" high4fre5uency microwave radio relay" microwave remote sensing" amateur radio" directed4energy weapon" millimeter wave scanner Terahertz or Tremendously high fre5uency T.z or T.A +- 2@@I2"@@@ B.z + mm I +@@ hm Terahertz imaging I a potential replacement for U4rays in some medical applications" ultrafast molecular dynamics" condensed4matter physics" terahertz time4domain spectroscopy" terahertz computingJcommunications" sub4mm remote sensing" amateur radio ITU The ITU radio #and! are designations defined in the IT; <adio <egulations. $rticle -" provision :o. -.+ states that the radio spectrum shall be subdivided into nine fre5uency bands" which shall be designated by progressive whole numbers in accordance with the following table N-P . The table originated with a recommendation of the IXth 11I< meeting" held in %ucharest in +=28" and was approved by the International <adio 1onference held at $tlantic 1ity in +=38. The idea to give each band a number" in which the number is the logarithm of the approximate geometric mean of the upper and lower band limits in .z" originated with %.1. Aleming4)illiams" who suggested it in a letter to the editor of )ireless Engineer in +=3-. &Aor example" the approximate geometric mean of %and 8 is +@ 9.z" or +@ 8 .z.' N2P Table of IT; <adio %ands /and N+*#er Sy*#ol! FreD+ency Ran1e Waelen1th Ran1e I 3 X0A 2 to 2@ k.z +@ to +@@ km 6 0A 2@ to 2@@ k.z + to +@ km 75 7 9A 2@@ to 2@@@ k.z +@@ to +@@@ m 8 .A 2 to 2@ 9.z +@ to +@@ m ? X.A 2@ to 2@@ 9.z + to +@ m = ;.A 2@@ to 2@@@ 9.z +@ to +@@ cm +@ S.A 2 to 2@ B.z + to +@ cm ++ E.A 2@ to 2@@ B.z + to +@ mm +- T.A 2@@ to 2@@@ B.z @.+ to + mm IEEE <adar4fre5uency bands according to IEEE standard N3P /and de!i1nation FreD+ency ran1e Jcitation neededK .A 2 to 2@ 9.z .igh Are5uency N6P X.A 2@ to 2@@ 9.z Xery .igh Are5uency N6P ;.A 2@@ to +@@@ 9.z ;ltra .igh Are5uency N6P 0 + to - B.z 0ong wave S - to 3 B.z Short wave 1 3 to ? B.z 1ompromise between S and U U ? to +- B.z ;sed in )) II for fire control" U for cross &as in crosshair'. Exotic. N7P Ou +- to +? B.z Ourz4under O +? to -8 B.z Berman Ourz &short' Oa -8 to 3@ B.z Ourz4above X 3@ to 86 B.z ) 86 to ) follows X in the EU5 NATO5 US E)M freD+ency de!i1nation! <adar4fre5uency bands as defined by :$TO for E19 systems N8PN7P /and FreD+ency ran1e $ band @ to @.-6 B.z % band @.-6 to @.6 B.z 1 band @.6 to +.@ B.z / band + to - B.z E band - to 2 B.z A band 2 to 3 B.z B band 3 to 7 B.z . band 7 to ? B.z I band ? to +@ B.z G band +@ to -@ B.z O band -@ to 3@ B.z 0 band 3@ to 7@ B.z 9 band 7@ to +@@ B.z Wae1+ide freD+ency #and! See also* )aveguide &electromagnetism' i )aveguide in practice /and FreD+ency ran1e J:K < band +.8@ to -.7@ B.z / band -.-@ to 2.2@ B.z S band -.7@ to 2.=6 B.z E band 2.2@ to 3.=@ B.z B band 2.=6 to 6.?6 B.z A band 3.=@ to 8.@6 B.z 1 band 6.?6 to ?.-@ B.z . band 8.@6 to +@.+@ B.z U band ?.- to +-.3 B.z Ou band +-.3 to +?.@ B.z O band +6.@ to 76 ++@ B.z alphabet mm ++@ to 2@@ B.z Nnote +P 9illimeter N3P 1. The designation mm is also used to refer to the range from 2@ to 2@@ B.z. N3P -7.6 B.z Oa band -7.6 to 3@.@ B.z K band 22 to 6@ B.z ; band 3@ to 7@ B.z X band 6@ to 86 B.z ) band 86 to ++@ B.z A band =@ to +3@ B.z / band ++@ to +8@ B.z V band 2-6 to 6@@ B.z )o*"ari!on of radio #and de!i1nation !tandard! FreD+ency IEEE J8K EU5 NATO5 US E)M ITU no= a##r= $ T0A 2 .z + E0A 2@ .z - S0A 2@@ .z 2 ;0A 2 k.z 3 X0A 2@ k.z 6 0A 2@@ k.z 7 9A 2 9.z .A 8 .A 2@ 9.z X.A ? X.A -6@ 9.z % 2@@ 9.z ;.A = ;.A 6@@ 9.z 1 + B.z 0 / - B.z S E 77 2 B.z A +@ S.A 3 B.z 1 B 7 B.z . ? B.z U I +@ B.z G +- B.z Ou +? B.z O -@ B.z O -8 B.z Oa 2@ B.z ++ E.A 3@ B.z X 0 7@ B.z 9 86 B.z ) +@@ B.z ++@ B.z mm 2@@ B.z +- T.A 2 T.z /y a""lication /roadca!tin1 %roadcast fre5uencies* 0ongwave $9 <adio F +3?.6 k.z I -?2.6 k.z &0A' 9ediumwave $9 <adio F 62@ k.z I +8+@ k.z &9A' Shortwave $9 <adio F 2 9.z I 2@ 9.z &.A' /esignations for television and A9 radio broadcast fre5uencies vary between countries" see Television channel fre5uencies and A9 broadcast band. Since X.A and ;.A fre5uencies are desirable for many uses in urban areas" in :orth $merica some parts of the former television broadcasting band have been reassigned to cellular phone and various land mobile communications systems. Even within the allocation still dedicated to television" TX4band devices use channels without local broadcasters. 78 The $pex band in the ;nited States was a pre4))II allocation for X.A audio broadcasting( it was made obsolete after the introduction of A9 broadcasting. Air #and $irband refers to X.A fre5uencies used for navigation and voice communication with aircraft. Trans4oceanic aircraft also carry .A radio and satellite transceivers. Marine #and The greatest incentive for development of radio was the need to communicate with ships out of visual range of shore. Arom the very early days of radio" large oceangoing vessels carried powerful long4wave and medium4wave transmitters. .igh4fre5uency allocations are still designated for ships" although satellite systems have taken over some of the safety applications previously served by 6@@ k.z and other fre5uencies. -+?- k.z is a medium4wave fre5uency still used for marine emergency communication. 9arine X.A radio is used in coastal waters and relatively short4range communication between vessels and to shore stations. <adios are channelized" with different channels used for different purposes( marine 1hannel +7 is used for calling and emergencies. A*ate+r radio freD+encie! $mateur radio fre5uency allocations vary around the world. Several bands are common for amateurs world4wide" usually in the shortwave part of the spectrum. Other bands are national or regional allocations only due to differing allocations for other services" especially in the X.A and ;.A parts of the radio spectrum. )itiBen!L #and and "er!onal radio !erice! 1itizens! band radio is allocated in many countries" using channelized radios in the upper .A part of the spectrum &around -8 9.z'. It is used for personal" small business and hobby purposes. Other fre5uency allocations are used for similar services in different #urisdictions" for example ;.A 1% is allocated in $ustralia. $ wide range of personal radio services exist around the world" usually emphasizing short4range communication between individuals or for small businesses" simplified or no license re5uirements" and usually A9 transceivers using around + watt or less. Ind+!trial5 !cientific5 *edical The IS9 bands were initially reserved for non4communications uses of <A energy" such as microwave ovens" radio4 fre5uency heating" and similar purposes. .owever in recent years the largest use of these bands has been by short4range low4power communications systems" since users do not have to hold a radio operator!s license. 1ordless telephones" wireless computer networks" %luetooth devices" and garage door openers all use the IS9 bands. IS9 devices do not have regulatory protection against interference from other users of the band. Land *o#ile #and! 79 %ands of fre5uencies" especially in the X.A and ;.A parts of the spectrum" are allocated for communication between fixed base stations and land mobile vehicle4mounted or portable transceivers. In the ;nited States these services are informally known as business band radio. See also ,rofessional mobile radio. ,olice radio and other public safety services such as fire departments and ambulances are generally found in the X.A and ;.A parts of the spectrum. Trunking systems are often used to make most efficient use of the limited number of fre5uencies available. The demand for mobile telephone service has led to large blocks of radio spectrum allocated to cellular fre5uencies. Radio control <eliable radio control uses bands dedicated to the purpose. <adio4controlled toys may use portions of unlicensed spectrum in the -8 9.z or 3= 9.z bands" but more costly aircraft" boat" or land vehicle models use dedicated remote control fre5uencies near 8- 9.z to avoid interference by unlicensed uses. 0icensed amateur radio operators use portions of the 74meter band in :orth $merica. Industrial remote control of cranes or railway locomotives use assigned fre5uencies that vary by area. Radar <adar applications use relatively high power pulse transmitters and sensitive receivers" so radar is operated on bands not used for other purposes. 9ost radar bands are in the microwave part of the spectrum" although certain important applications for meteorology make use of powerful transmitters in the ;.A band. 80 81