0% found this document useful (0 votes)
3 views

EtherNet[1]

Uploaded by

hemamagdy2911
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

EtherNet[1]

Uploaded by

hemamagdy2911
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

1) EtherNet/IP Introduction

a) EtherNet/IP Overview
i) Understand the OSI Model
The standardization of the various elements of the network enables equipment and devices created
by different companies to work together. Experts in various technologies can contribute their best
ideas on how to develop an efficient network, without regard to the brand or manufacturer of the
equipment.
Typical network, including devices, media, and services, tied together by rules, that work together to
send messages. We use the word messages as a term that encompasses web pages, e-mail, instant
messages, telephone calls, and other forms of communication enabled by the Internet.

The Messages
In the first step of its journey from the computer to its destination, our instant message gets
converted into a format that can be transmitted on the network. All types of messages must be
converted to bits, binary coded digital signals, before being sent to their destinations. This is true no
matter what the original message format was: text, video, voice, or computer data. Once our instant
message is converted to bits, it is ready to be sent onto the network for delivery.

The Devices
A computer is only one type of device that can send and receive messages over a network. Many
other types of devices can also be connected to the network to participate in network services.
Among these devices are PLC, Panels, telephones, cameras, music systems, printers and game
consoles
The Medium
To send our instant message to its destination, the computer must be connected to a wired or
wireless local network. Wireless networks allow the use of networked devices anywhere .
Many installed networks use wires to provide connectivity. Ethernet is the most common wired
networking technology found today. The wires, called cables, connect the computers and other
devices that make up the networks. Wired networks are best for moving large amounts of data at
high speeds, real time.

The Services
Network services are computer programs that support the human network. Distributed on devices
throughout the network, these services facilitate online communication tools.

The Rules or protocols


Important aspects of networks that are neither devices nor media are rules, or protocols. These rules
are the standards and protocols that specify how the messages are sent, how they are directed
through the network, and how they are interpreted at the destination devices.

The Open Systems Interconnection reference model is a layered, abstract representation created as a
guideline for network protocol design. The OSI model divides the networking process into seven
logical layers, each of which has unique functionality and to which are assigned specific services and
protocols.
Allow different types of devices easily to connect.

Physical Layer:
It’s responsible for all Physical properties of the network such Cable length, Cable type, Bit rate,
Voltage levels and H/W interface types.
Data Link:
Responsible for Hop-to hop data delivery, Hop-to-hop addressing (MAC Address in Ethernet), Hop-to-
hop error detection and Hop-to-hop flow control.
Network:
Responsible for End-to-end delivery, Logical addressing [Example: IPv4, IPv6, IPX, APPLETALK],
Routing (choose the best path to destination) [Example: RIP, OSPF, IS-IS, 0045IGRP]
Transport Layer:
Responsible for actual mechanism of:
Establishment of connection, Management of connection, segmentation, sequencing, end-to-end
check, error detection &correction, flow control and Termination of connection [Examples: TCP
(transmission control protocol), UDP (User Datagram Protocol)].
Session Layer:
Ensure that all information required for opening a session is available. Give orders for: establishment,
management, and termination of the session.
Presentation Layer:
This layer is responsible for presenting the data in the proper format. Examples:
ASCII, AVI, JPG and so on
Application Layer:
It’s the S\w that is used to represent a user interface to the network & so aids the user to make
applications. Examples: Email (SMTP,POP3) ,Web browsers (HTTP) ,FTP ,Telnet and CIP.

ii) Understand how Ethernet and EtherNet/IP networks are different


EtherNet/IP is stands for EtherNet Industrial Protocol which different from traditional EtherNet/IP
protocols because it use CIP (common Industrial Protocol) as the Application Layer Protocol. CIP
enable I/O control for variety Automation applications. The CIP protocol support real time I/O
Messaging and message exchange. When using the CIP the Upper 3 Layers of the OSI Model Grouped
in one layer named the CIP Stack.
Ideal application for EtherNet/IP network is the application is the applications needs to mix the
industrial and commercial technology on the same network.

b) IP Address Overview
i) Understand the purpose and composition of IP addresses
Each layer of the OSI Model has a protocol address.
At layer 3 (the network Layer) the most important routing protocol is the Internet Protocol [IP] and
the address if this protocol is Internet Protocol address. The IP address is software address that used
to identify the networks and nodes in network.
It a 32 bit address grouped in 4 bytes separated by dot (IPv4).

Each IP address separated internally in two parts the Network ID or Network address and Host ID or
Host address.

To define the network and host portions of an address, the devices use a separate 32-bit pattern
called a subnet mask. The subnet mask is configured on a host in conjunction with the IPv4 address to
define the network portion of that address.
At layer 2 Data Link Layer the most important Protocol is
EtherNet Protocol. The address if this protocol is MAC
address (Media Access Control) which assigned to devices by
the NIC (Network Interface Card) Manufacture's but the IP
assigned by us while configure the network.
A MAC is a static 6 byte address that embedded in the circuit
of each EtherNet or EtherNet/IP Device by the manufacture
and cannot be changed. The MAC address in most cases
printed on a Lapel fixed to the device. MAC address is also
referred by EtherNet address.
Using the IP address instead of the MAC address when
communicating with EtherNet/IP Devices have many advantage:
• IP is Easier to use and remember.
• IP is User Configurable.
• IP is easily modified.
• Unique, yet reusable.

ii) Determine the class of IP addresses


IP address are grouped in 4 classes A, B, C and D. the size of the network determine the class used. IP
classes directly related to the number of networks and devices that we can have.
IP address class determined by the first bits in the IP address.
Class A:
Used for very large networks [from 1.0.0.0 to 127.0.0.0].

Class B:
Used in medium size networks [from 128.0.0.0 to 191.0.0.0].

Class C:
Used in small size networks [from 192.0.0.0 to 223.0.0.0].

Class D:
Used in Multicast Messaging in all size of networks [from 224.0.0.0 to 239.0.0.0].
Class E:
Are reserved for experimental purposes and should not be used for addressing hosts or multicast
groups
iii) Identify public and private IP addresses
In addition the IP assign to one of four classes. The IP can be either public or private address.
Public IP address are unique in the world which provided and registered by approval registry called
ICANN (the International Corporation for Name and Numbers) which is responsible for
IP address space allocation, Protocols parameters assignment, Doman Name System Management
and Root Server system Management.

Today a hug incremental of internet use and devices needs an IP address which is unexpected in IPv4
design a Limited number of Public IP address now available by ICANN.
This problem solved by many solutions. The new IPv6 solve this problem also working with a private
IP in IPv4 solve this problem partially.
The main idea of private IP address is sharing the public IP address among many nodes in the network
which each node use private IP address. This sharing can be done by using PAT (Port address
Translation mechanisms).
Advantage of Private IP address:
• No registration needed.
• Can be used simultaneously by many companies.
• Will always have enough IP address no matter how large of EtherNet/IP Network we build.
Private IP is in of the following IP address ranges
iv) Understand how domain names and IP addresses relate
To make the IP address easier to use in our application a Domain Name used.
Instead of using the IP address we use a text based address which is translated by the DNS (Domain
Name System) server to the IP.
We use the DNS when surveying the internet

The Domain Name www.google.com or www.ab.com resolved to the IP address of the server host
this web sites DNS server allocated around the world.
We assign a primary and secondary DNS address in the EtherNet/IP network configuration or use
Auto configuration which IP address, subnet mask, default Gateway and DNS (primary and secondary)
obtained from a DHCP server automatically if an DHCP server exist on the network.
2) Designing EtherNet/IP Networks

Designing EtherNet/IP Networks


i) Classify the environments in which an EtherNet/IP networks will be used
In this lesson we discussing design considerations and network components needed to built an
effective EtherNet/IP Network based on our application requirements'.

The first step in designing EtherNet/IP network is systematically classifying the environment where
cables and equipments will be installed. That helps us to select hardware components for our
application ODVA created an environment classification system that we can use in surveying the
EtherNet/IP network in site.
This system called MICA (Mechanical Ingress Climatic EMC).

ii) Select EtherNet/IP networks cable components


The next step in designing EtherNet/IP networks is selecting components for EtherNet/IP network.
Include the following:
The network backbone, Media, Connectors, Topology, Router, Hub, Bridges and switches

The Network backbone:


The part of the Network that handles the major network traffic which use the highest speed band
width in the network
To design the network backbone we must select the type of cables will be used. For EtherNet/IP
networks copper or fiber optic cables can be use
Fiber Optic

Twisted pair copper

Coaxial copper

Copper cables is the wildly used and less expensive that fiber optic cables.
Fiber Optics has a very large band width and used for very large amount of data transferring, Fiber
Optics can carry signals for very long distances and not effected by electromagnetic interference and
provide higher noise immunity that copper cables. Using shielded copper cable provide higher noise
immunity.

Copper Cable:
Copper cables have two main types:
1. Coaxial copper cable:
Coaxial cable consists of a hollow outer cylindrical conductor that surrounds a single inner wire
made of two conducting elements. One of these elements, located in the center of the cable, is a
copper conductor. Surrounding the copper conductor is a layer of flexible insulation. Over this
insulating material is a woven copper braid or metallic foil that acts as the second wire in the
circuit and as a shield for the inner conductor.
This cable can carry high frequency or broadband signals
This kind of cables not used widely in EtherNet/IP networks because of its data transfer limited to
10Mb/sec. It can be run longer distances than shielded twisted pair, STP, and unshielded twisted
pair, UTP, cable without the need for repeaters.

2. (Shielded and un Shielded)Twisted pair copper cables STP,UTP:


Shielded twisted-pair cable (STP) combines the techniques of shielding, cancellation, and twisting
of wires. Each pair of wires is wrapped in metallic foil. The four pairs of wires are wrapped in an
overall metallic braid or foil. STP affords greater protection from all types of external
interference, but is more expensive and difficult to install than UTP. The metallic shielding
materials in STP need to be grounded at both ends.
Unshielded twisted-pair cable (UTP) is a four-pair wire medium used in a variety of networks.
Each of the 8 individual copper wires in the UTP cable is covered by insulating material. In
addition, each pair of wires is twisted around each other. This type of cable relies solely on the
cancellation effect produced by the twisted wire pairs, to limit signal degradation caused by EMI
and RFI.
This type of cables should be used in the noisy environments and if our application includes drives
rated over 10 hp, high current devices or electro static processes.
Unshielded twisted-pair cable has many advantages. It is easy to install and is less expensive than
other types of networking media. However, the real advantage is the size. Since it has such a
small external diameter, UTP does not fill up wiring ducts as rapidly as other types of cable.
CAT5E support 10, 100, MB/Sec and 1GB/Sec
CAT6E support 10, 100, MB/Sec and 1, 10 GB/Sec
CAT6E support 10, 100, MB/Sec and 1, 10GB/Sec and support up to 400 m channel length
Straight-throw and crossover cables:
EtherNet straight-throw cables used to connect a network host to a network devices such a
switch or hub In other word it used to connect DTE (Data Terminal Equipment) to DCE (Data
Communication Equipment). For straight-throw cables both end pins termination is T568A or
T568B.
EtherNet crossover cables used to connect two network hosts or network intermediate devices
such a switch to switch or hub to hub or router to router in other word it used to connect DTE to
DTE or DCE to DCE. For crossover cables one end pins termination is T568A and the other end
T568B.
Two pair cables easily to use that 4 pair cables and have less chance of cross tack of signal. Two
par cables are suitable for use in machine and flexible application such robots. Two pair cables
don’t support 1 or 10GB/Sec or future expansion.

We should select four pair cables if our application support multiple services such voice,
telephone and data or we plan to expand the network in the future.
Consider copper cabling instead of fiber optic cabling for will-grounded system.

Fiber Optics Cables:


In Fiber Optics Electrical interference is not a problem because it transmit light signal instead on
electric signal. It have the ability to transfer data over much longer distances than Twisted Pair
copper cables and can carry information in more speed.
Fiber Optics Cables recommended in one of the following cases:
High magnetic fields, such induction heating process
Application that distributed over a long distances
Poorly grounded process
Outdoor applications
Extreme high noise application

The part of an optical fiber through which light rays travel is called the core of the fiber. If the
diameter of the core of the fiber is large enough so that there are many paths that light can take
through the fiber, the fiber is called “multimode” fiber. Single-mode fiber has a much smaller core
that only allows light rays to travel along one mode inside the fiber.
Every fiber-optic cable used for networking consists of two glass fibers encased in separate
sheaths. One fiber carries transmitted data from device A to device B. The second fiber carries
data from device B to device A

When installing ether fiber optic or copper cable for EtherNet/IP networks we need to connect
network segments together.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy