Sunteți pe pagina 1din 47

S7 Ethernet-Local

Area Network

GROUP: 4960
MEMBERS:
WILLIAM OBACO
ALEXANDER MÉNDEZ
RAÚL SALTOS
1.- Learning Objectives

 Knowledge of requirements for implementing


Ethernet in an industrial enviroment.
 Familiarity with the basic features of Ethernet.
 Understanding of how the CSMA/CD access
method works.
 Knowledge of configuration technniques.
 Understanding of how the TCP/IP protocol works.
 Familiarity with the Ethernet components and
network structure used in an insdustrial setting.
 Mastery of Ethernet CP configuration in a typical
application example.
2.- Introduction

 Ethernet is the most widely implemented technology for local networks


in the world According to estimates, nearly 85% of all local networks are
based on Ethernet technology.

 In the early 1970s, Robert Metcalfe of


Xerox began to develop the first Ethernet
concept Since then, Ethernet has been standardized
and expanded through a number of specifications.

 The high degree of market acceptance of Ethernet is proven by the


continual development of this technology. Manufactures are currently
discussing a 10 Gbit standard, with further developments to come.

 Industrial automation encompasses many branches. The tasks of these


branches and the flow of information between them can be described
using a simplified level model.
2.- Introduction

 Components within one level communicate over bus systems


that are customized and optimized for the requirements of
that level.
 At the same time, however, vertical communication between
levels is necessary. Production specifications are passed down
to the lower levels. Conversely, process-related information
from the lower is verifed and archived at the management
level.

 This requires a highly standardized bus system to enable


optimal flow of data across all levels.
 Ethernet, currently used in commercial setting with the TCP/IP
protocol, forms the basis for this type of data integration.

 It enables a seamless connection between the automation


network and the office network as well as the internet.
2.- Introduction

The Ethernet-based networking technology was


developed for communication in the commercial
realm. In contrast to an office environment,
additional conditions must be taken into account
for installations in an industrial setting.
2.- Introduction

 Industrial Ethernet uses special network


components to meet the stringent requirements
of the production and process environment
3.- Ethernet
3.- Ethernet

 IEE Standard 802 describes local networks. This


standard defines the behavior and the protocols
on the bottom two layers of the OSI Reference
Model

Data Link divides the data security layer in two


parts:
 LLC (Logical Link Control)
 MAC (Media Access Control)
3.- Ethernet

 This overiew shows the important structures of IEEE


802 with their Standar names.
 In classic Ethernet technology, all stations are
attached to the same cable loom (linear bus).
 Acces control is a task of the MAC protocol layer.
It must detect when two or more stations are
attempting to transmit data simultaneously,
Ethernet implements the Carrier Sense Multiple
Access with Collision Detection (CSMA/CD)access
method.

 Before we examine the CSMA/CD method more


closely, here is a brief description of the acronym.
3.- Ethernet

If the transmission medium (the ether) is free, the


station begins transmission
A particular excution time must be taken into
account for all lines. It can thus happen that station
2 mistakenly considers the bus to be available
because the signal already transmitte by station 1
has not yet traveled past station 2
3.- Ethernet
 This fow chart an overiew of how the
CSMA/CD access method works

A collision area is a network area in which collisions


between transmitting stations can occur due to the
CSMA/CD method.

This Chart Shows that transmission times increase sharply


with CSMA/CD as the bus load increases because this
increases the risk of collision.
3.- Ethernet
 I/G Bit 47: Specifies the type of
destination address:
 G/L Bit 46: Indicates how the address is
administrated
 Manufacturer ID: these 22 bits contain the
ID of the Ethernet adapter card
manufacturer
 Identifier: These 3 Bytes contain the
running serial number of the adapter.
3.- Ethernet
 Preamble: The receiving electronics of the receiver are
synchronized with the seven bytes in the preamble.
 SFD: The start sequence “10101011” is transmitted to signal
the end of the preamble. It tells the receiver that the block
information will follow starting now.
 Destination: This is the six-byte Ethernet (MAC) address of
the receiver.
 Source: This is the six-byte Ethernet (MAC) address of the
sender
 Length: IEEE 802,3 this field contains the length of the
following data fiel
 Data: The data field can contain between 46 and 1500
bytes of useful data
 FCS: The four-byte FCS field contains the CRC checksum.
3.- Ethernet
 IEEE 802,3 defines several Ethernet varieties, The major
differences between these varieties are the transmission
rate and the cable technology used.
 Transmission Rate in Mbps:This field indicates the
transmission rate in Mbps today it ranges from 10 Mbps to
10000 Mbps.
 Transmission Method
 Baseband: Ina a baseband, digital signals are fed directly
into the cable as pulses; that is, the signals are transported
unmodulated.
 Broadband: multiple carrier frecuencies are used and the
transmission signal is modulated up to these carrier
frecuencies.
 Max. length/Cable Type: The information
in this field can have various meanings.
3.- Ethernet
 segments. Two remote repeaters are connected
by means of a fiber-optic cable.

 The Hub is the counterpart of the repeater in a


twisted-pair cable network with star topology.
Because the hub has multiple ports, it is also
called a multiport repeater.
3.- Ethernet
 In contrast to the repeater, the bridge functions at the
data protection level. It's interprets in the MAC address
of data packets and only transmits those date packet
intended for the neighboring segment.
 When a bridge is used, separate collision areas are
created by the decoupling of segments.
 A switch is high-speed packet switching system used to
divide local networks into segments. Like the bridge,
the switch works at layer 2 of the ISO/OSI reference
model.
3.- Ethernet
 Within the switch, a particular port is assigned
to each MAC address by means of a
forwarding table.

 This diagram shows the connection of five


secondary segments to one main segment.
 The use of switch technology and hubs gives
today's Ethernet LANs a typical tree structure.
4.- TCP/IP
 The protocols of the TCP/IP family were developed in
the 1970s for data exchange in heterogeneuos
computer networks. the Origin of TCP/IP date back
to the early 1970s.
 Application Layer: forms the interface to the user. It
contains a number of higher protocols (SMTP - FTP).
 Transport Layer: The transport layer has the task of
enabling a transport connection between different
computers.
 Internet Layer: enables computers to feed packets
into the network and, if applicable, to select the
routing.
 Network Layer: There is no exact specification for the
bottom Layer, The Network Layer.
4.- TCP/IP
 Comparasion.
Although the DOD model was developed
before the OSI Reference Model, TCP/IP,
including layer 4, fits well in the OSI
architecture.
4.- TCP/IP
 TCP/IP encompasses a number of protocols. A
description of the entire protocol family is beyond the
scope of this chapter.
The hierarchical layer model also determines the design
of the transmitted packets. The data pass through each
individual layer.
On the receiver's end, the data packets pass through
the reverse path.
The IP internet protocol corresponds to a large extent to
layer 3 of the ISO/OSI Reference Model.
4.- TCP/IP

Datagram
 Version: Contains the version number of the IP
Protocol. the current version number is 4, but
Version 6 is already being tested.
 IHL: Internet Header Length, Field contains the
length of the protocol header, as this length is not
constant
4.- TCP/IP
 Type of Service: Various criteria can be specified for handling the
datagram.
 Total Length: This contains the total length of the datagram,
consisting of a header and data.
 Identification: A datagram can be split into several parts in the
fragmentation process. The identification field allows the receiver to
determine the datagram to which a fragment belongs
 Flags: These bits control how a packet is fragmented. The first bit is
not used
 Fragment Offset: The fragment Offset Field indicates where the
fragment fils into the datagram
 Time to Live: Indicates the remaining time to live of the diragram. The
timing interval is in seconds
 Protocol: Contains the number of the transport protocol to which the
packet must be forwarded
4.- TCP/IP
 Header Checksum: Caontains the checksum of
the IP header
 Source Address: contains the 32-bit IP address of
the sender.
 Destination Address: contains the 32 bit IP address
of the receiver
 Options: field provides the option of adding
information to the IP protocol. The header is kept
as small as possible to avoid having to continually
create space for seldom required fields
 Padding: Field contains only fillers to fill up the
Options field to a multiple of 4 bytes
4.- TCP/IP
 In order for a computer to be identified as a
sender or a receiver. it must have a unique
32-bit IP address (internet address).
 For better readabilit, the IP address is not re-
presented as a binary address.
 An IP address always consists of two parts,
the network address and the computer
address. The network address identifies the
network. All computers in the same network
have the same network address.
4.- TCP/IP
 Because networks can differ in size, IP addresses
are divided into three classes: A, B, and C. IP
addresses are classifed according to the bit
combination at the beginning of the network
address.

 Class A: number of networks 126


 Class B: number of networks 16.383
 Class C: number of networks 2 Millon
4.- TCP/IP
 One of the main Functions of the IP is
Routing of the datagrams to be
transported. Because there are many
networks, these networks must be
connected for data transport.
 If the receiver is unknow,
the datagram must be forwarded
to another router. For this task,
each router maintains routing
tables that record the next router to be
addresed for each address.
4.- TCP/IP
 Ecah network has so-called maximum transfer Unit
(MTU). So that datagrams can be sent over all
types of networks, the network IP must be able to
adapt the size of the datagram to each network.
This procedure this called fragmentation.

 TCP is a communication protocol situated


functionally in OSI layer 4 (transport layer). The
task of TCP is to ensure reliable frame tranmission.
4.- TCP/IP
 TCP supports the addressing of different
applications in the local System. The data streams
are kept separate through the assignment of port
numbers.

 TCP segment
5.- Industrial Structure
 Communication requirements in an
industrial setting differ greatly from those
in an conventional office setting. This
applies to nearly all aspects of
communication.
 The aim of industrial Ethernet to use
existing standards while adding the
required features for industrial
communication.
5.- Industrial Structure
 Components for industrial Ethernet are
offered b diferent manufactures, these
components differ mainly in design rather
than functionality.
 This shows industrial components with
their typical cabling
5.- Industrial Structure
 When the CSMA/CD access method is used, the
number of collisions increases as the bus load
increases.
 One way to increase network performance is load
separation. This is achieved by structuring using
switches (OSMs). The OSMs separate the network
into differente collision areas.
 Futher performance improvement is achieved by
configuring a fast backbone by means of OSMs.
 The transmission rate can be further increased if full
duplex tranmission (FDX) is used between OSMs. This
is beacause no collisions occur with FDX when data
are transmitted and received simultaneously
5.- Industrial Structure
 The features of switching and full duplex
transmission enable configuration of a
collision - free network. Each station in this
network is connected directly to the port
a switch.
5.- Industrial Structure
 Linear bus structures are used to cover
large distances. A linear bus structure can
be created by connecting ELMs in series.
The number of ELMs in the line depends on
the configuration (13 ELMs, maximum).
 Because OLMs use fiber optic cables, they
can cover larger distances than ELMs. A
distance of up to 3000 m between two link
modules can be covered using fiber-optic
5.- Industrial Structure
 The OSM is used to create high-
speed redundant connections
between 2 subnets. The redundant
connection travels on separate
paths over both itp ports (port 1
and port 2) of an OSM pair.
5.- Industrial Structure
 This network topology is a special type of
linear topology. The First OLM and the last
OLM are connected by means of fiber-
optic cable, thus closing the ring. Port 5 of
one OLM within the ring structure is to be
switched is to be switched to redundant
mode.
6.- Sample Configuration

 This chapter shows you how to set up and


configure an Ethernet CP.
6.- Sample Configuration
 The SIMATIC Manager is the central application used to create and manage projects.

 The SIMATIC Manager is launched using the Start button or by double-clicking its icon

 1.- a new project must be created

 2.- A dialog box is displayed. Here, you specify the project name and storage location.

 3.- Insert a SIMATIC-400 station

 4.- Create the network to which the stations will be connected.

 5.- You must now configure the Station. Start the HW config application.

 6.- The available modules are listed in the hardware catalog.

 7.- the first module to be inserted is the rack. All other modules will then be mounted onto
the rack.

 8.- The power supply must be inserted into slot 1.

 9.- Now insert the CPU. If the CPU has a DP interface, you can now assign parameters to this
interface.

 10.- For initial downloading of the configuration, parameters must be assigned to the MPI
interface.

 11.- the communications processor for Ethernet and TCP/IP is inserted int-slot 5.

 12.- A dialog box for assigning parameters to the CP is displayed.

 13.- The Hardware configuration is now complete, next saved and compiled

 14.- Dowloand the compiled hardware configuration to the CPU


7.- Test Your Knowledge
7.- Test Your Knowledge
7.- Test Your Knowledge
7.- Test Your Knowledge
7.- Test Your Knowledge
7.- Test Your Knowledge
7.- Test Your Knowledge
Reagent

 join with line in the corresponding order the OSI


model layers
a) 1 Application
b) 2 Sesion
c) 3 Presentation
d) 4 Network
e) 5 Data Link
f) 6 Physical
g) 7 Transport
Reagent
 Join with line meaning of the initials

 a) LLC Media Access Control


 b) MAC Logic Link Control
 c) SMTP Carrier Sense Multiple Acces
 d) CSMA Simple Mail Transfer Protocol
 Select the number of networks of class B
according to the bit combination at the beginning
 a) 2,000,000
 b) 16,383
 c) 126
 d) 64

S-ar putea să vă placă și