Documente Academic
Documente Profesional
Documente Cultură
System PROFINET
10 x 2
x y y 211
APDU-Status
8 6 6 2 46-1500 4
Preamble/SFD Source address Payload Ethernet-Overhead Payload Cycle Counter
Target address Ethertype FCS-Status Frame-ID IOPS Data-Status
PROFINET-data IOCS Transfer-Status
Figure 3. Structure of a native Ethernet
frame
Figure 5. Structure of a PROFINET frame
a standard Ethernet frame and starts after the ethertype
0x8892 with a 2 byte Frame-ID, which defines the type of
PROFINET IO messages. Afterwards the payload of the
PROFINET device follows. The payload will be finalized
by one byte IOPS (IO-Data Object Producer Status) and
one byte IOCS (IO-Data Object Consumer Status) for ev-
ery submodule in the device. The IOCS and IOPS show
the validity of the cyclic data transfer. A PROFINET
telegram is completed by the APDU-status (Application
Layer Protocol Data Units). The APDU status comprises
a 2 byte cycle counter to control the timeliness of a frame
in a redundant wired system and an 1 byte data-status,
which shows whether the data is valid. The APDU-Status
is completed by an 1 byte Transfer-Status.
3.1 Optimization of Forwarding Delays In the next step it is important to implement the respec-
In this subchapter various ways to decrease the for- tive hierarchy level of the topology. Figure 7 introduces
warding delay of PROFINET devices are described. On the different kinds of ports and the relation between the
an abstract level a PROFINET device can be considered address number and the level of a device. There are three
as a bridging device. The minimum forwarding delay of different port types. The primary port is connected to the
a bridge consists of three components: a) the delay of the preceding neighbour on the same level n in the line. If it
physical layer (PHY), b) the minimum amount of data to is the first device of a line, it realizes the connection to the
be received in order to determine the correct destination higher level n 1, e.g. level 2 to level 1. The secondary
and c) the logic delay for a correct forwarding of the in- port is connected to the successor in this line. The next
coming frame to the corresponding outgoing port. Thus lower level n + 1 can be reached via the branch port, e.g.
we focus on concepts to minimize the time needed for the from level 1 to level 2. In the example shown in Figure 6,
forwarding process. the number of branches is limited to one port. However,
by using a coding shown later, it is also possible to use
more than one branch. Using the rules, it is now possible
3.1.1 Topology based Forwarding by using locally
to address an Ethernet device by using its position within
administered MAC-Addresses
the hierarchy of a certain topology. Consequently, every
Regarding the forwarding delay one important building device will obtain a unique MAC address.
block of a MAC-bridge is the Address lookup. Matured For example, a device with 1:2:2 can be reached from
searching algorithms are used, so that there is no signifi- the controller 0:0:0, by using the branch port of device 1
cant potential for the optimization of the logic delay. To at level 1, the branch port of device 2 at level 2 and at level
reduce the delay spent for the Address lookup, we pro-
pose a topology based algorithm. More complex networks
which are using multi-port bridges have to be supported
and require a solution not limited to line topologies. Fig-
ure 6 shows an example of a tree topology with a maxi-
mum depth of three levels. Every device is marked by a
number starting at the first device of a level with an ad-
dress equal to one. The basic idea of our address calcula-
tion algorithm is based on the concept that every level gets
an explicit byte and the next device in line shall receive the
value of the previous device incremented by one. Figure 7. Device address description
3 the device is addressed at position 2. In this case three
bytes are used to address the device, therefore it resides at
level 3.
The proposed hierarchical address scheme can be im-
plemented by using local MAC addresses [13]. Hence, it
is possible to address up to six levels (one level requires at
least one byte). Figure 8 shows an example of coding a six
byte local MAC address. The least significant bit (LSB) of
the first byte denotes the address type of the frame, if set
to one the frame is a multicast frame, if not it is a unicast
frame. The second bit defines the administry of the frame,
one indicates the frame is locally administered and zero
means globally administered. Because of these two bits,
the byte structure of the MAC-Address is not complete
free selectable and it is unfavourable to use the first byte
to describe a position for the introduced forwarding mech-
anism. Therefore and for future extensions the first byte is
reserved and can be used to implement status information.
The hierarchical address technique, which comprises the
position of a device and the respective level within the tree
topology, starts at byte two.
It can be seen in Figure 8 that every byte which de-
scribes the position does not only consist of the position in Figure 9. Tree topology with defined coding
the line. It also contains the branch for finding the correct
level by using bit six and seven. Exploiting two bits for
the branch decision, the addressing of up to three differ- and third byte contains the destination of the frame. The
ent branch ports is possible for building complex network destination device will be reached from level 1 via branch
structures. The destination level can always be identified 3 (branchcode 11) at position 2. On the next level the
by the vector 00 and defines also the last relevant address bitstream reaches the final destination at position 1, be-
byte. cause the branch code is 00. Therefore the analysed data
Figure 9 shows a tree topology with a depth of three is directly linked to the level of the bitstream. A device at
levels and uses the introduced address coding. As shown, level 1 has to analyse only one relevant byte to make a de-
bit 0 up to bit 5 contain the position within a level where cision about the correct outgoing port. A device at level 2
the branch information is evaluated. Bit 6 and 7 contain has to analyse two address bytes, a device at level 3 needs
information about the branch to be used or, in case of two to analyse three bytes, etc.
zeros, if the frame has reached the destination level. An
example MAC address, based on the introduced coding, 3.1.2 Decreasing the Forwarding Delay by a Short-
is shown in Figure 10. The bitstream is based on the ened Preamble
topology of Figure 9 and shall be forwarded to the de-
vice at destination C2:1:X. The first byte (status) marks Another approach to decrease the forwarding delay is to
the incoming MAC address to be locally administered, so shorten the preamble size. Because Realtime Ethernet
it shall use the introduced forwarding strategy. The second Standards like PROFINET requires a full-duplex connec-
tion (FDX) the purpose of a preamble is obsolete. This
has been disproved by means of some experiments with
commercial off the shelf (COTS) network interface cards
(NIC) from different vendors (Belkin and Marvel). The
NICs were not able to detect an incoming bitstream with-
out a preamble, indicating a principal necessity of the
ns
The conclusion of [10] shows, that the possible bottle- A frame overflow, i.e. payload plus overhead exceeds
neck of a system could be defined by propagation delay max. framesize, is not common by using simple sen-
(tpropag ) and on the other hand by the frame transfer time sor/actor networks. Thus, the presented calculation targets
delay. The forwarding delay of tpropag is defined by the on scenarios with a payload equal to a standard Ethernet
following formula: frame.
Under these conditions the minimum update time of 2,5
tf rame
tpn = max(ndevices tpropag + ndevices , (5)
tpropag + tf rame ) 1,5
0
0 10 20 30 40 50
References
[1] J.-D. Decotignie, Ethernet Based Real-Time and Indus-
trial Communications, Proceedings of the IEEE, vol. 93
issue 6, pp. 110217, 2005.