Anda di halaman 1dari 60

Definition

OLE (Object Linking and Embedding) for Process Control An OPC Server is a software application that acts as an API (Application Programming Interface) or protocol converter. An OPC Server will connect to a device such as a PLC or a data source such as a database or User interface, and translate the data into a standard-based OPC format.

Each software or application developer was required to write a custom interface, or server/driver, to exchange data with hardware field devices. What is needed is a common way for applications to access data from any data source like a device or a database, OPC eliminates this requirement by defining a common, high performance interface that permits this work to be done once, and then easily reused by HMI, SCADA, Control and custom applications.

The OPC standard defines methods for exchanging real-time automation data between PC-based clients using Microsoft operating systems. 1994: The OPC Foundation started in as a task force comprised of five industrial automation vendors. 1996: OPC standard released

why OPC ;
The reasons which leads to (OPC) is there are many client applications that have been developed that require data from a data source and access that data by independently developing Drivers for their own packages, this leads to the following problems: Much duplication of effort high cost Inconsistencies between vendors Access Conflicts

Hardware manufacturers attempt to resolve these problems by developing drivers, but are hindered by differences in client protocols. OLE for Process Control (OPC) draws a line between hardware providers and software developers. It provides a mechanism to provide data from a data source and communicate the data to any client application in a standard way.

A standard mechanism for communicating to numerous data sources, either devices on the factory floor, or a database in a control room is the motivation for OPC

OPC Data exchange (OPC DX): Defines how OPC servers exchange data with other OPC servers OPC Data Access (OPC DA): Provides access to real time process data. Using OPC DA, one can ask the OPC server for the most recent values of flows, pressures, levels, temperatures, densities, and more. OPC Historical Data Access (OPC HDA): Is used to retrieve and analyze historical process data, which is typically stored in a Process Data Archive, database, or RTU.

OPC Alarms and Events (OPC A&E): Is used to exchange process alarms and events. Operations personnel can use OPC A&E to notify them of alarms and obtain a sequence of events.

What is tag?

protocols

By: muhammed faroug yassen

Protocol definition
y

In information technology, a protocol (from the Greek protocollon, which was a leaf of paper glued to a manuscript volume, describing its contents) is the special set of rules that end points in a telecommunication connection use when they communicate.

In computing, a protocol is a convention or standard that controls or enables the connection, and data transfer between two computing endpoints. In its simplest form, a protocol can be defined as the rules governing the synchronization of communication.

MOD BUS
Introduction y MODBUS Protocol is a messaging structure developed by Modicon in 1979, used to establish master-slave/client-server communication between intelligent devices. It is a de facto standard, truly open and the most widely used network protocol in the industrial manufacturing environment. The MODBUS protocol provides an industry standard method that MODBUS devices use for parsing messages.
y

It is currently implemented using: 1. TCP/IP over Ethernet (10 Mbit/s or 100 Mbits/s to carry the MODBUS messaging structure. ) 2.Asynchronous serial transmission over a variety of media (wire : RS232, RS 422, RS485; fiber, radio, etc.. 3.MODBUS PLUS, a high speed token passing network (1 Mbit/s).

Communication between MODBUS devices y MODBUS devices communicate using a master-slave technique in which only one device (the master) can initiate transactions (called queries). The other devices (slaves) respond by supplying the requested data to the master, or by taking the action requested in the query. y A slave is any peripheral device (I/O transducer, valve, network drive, or other measuring device), which processes information and sends its output to the master using MODBUS. y Masters can address individual slaves, or can initiate a broadcast message to all slaves. Slaves return a response to all queries addressed to them individually, but do not respond to broadcast queries.
y

Modbus Frame Structure: y The Modbus frame structure is the same for requests (master to slave messages) and responses (slave to master messages).

MODBUS transmission mode


ASCII Transmission Mode y In the ASCII Transmission Mode (American Standard Code for Information Interchange), each character byte in a message is sent as 2 ASCII characters. This mode allows time intervals of up to a second between characters during transmission without generating errors. y RTU (Remote Terminal Unit) Transmission Mode y In RTU (Remote Terminal Unit) Mode, each 8-bit message byte contains two 4-bit hexadecimal characters, and the message is transmitted in a continuous stream. The greater effective character density increases throughput over ASCII mode at the same baud rate.
y

MODBUS ADDRESSES The master device addresses a specific slave device by placing the 8-bit slave address in the address field of the message (RTU Mode).The address field of the message frame contains two characters (in ASCII mode), or 8 binary bits (in RTU Mode).Valid addresses are from 1-247. When the slave responds, it places its own address in this field of its response to let the master know which slave is responding.

MODBUS FUNCTIONS The function code field of the message frame will contain two characters (in ASCII mode), or 8 binary bits (in RTU Mode) that tell the slave what kind of action to take.Valid function codes are from 1-255, but not all codes will apply to a module and some codes are reserved for future use.

MODBUS DATA FIELD The data field provides the slave with any additional information required by the slave to complete the action specified by the function code.The data is formed from a multiple of character bytes (a pair of ASCII characters in ASCII Mode), or a multiple of two hex digits in RTU mode, in range 00H-FFH. The data field typically includes register addresses; count values, and written data.

If no error occurs, the data field of a response from a slave will return the requested data. If an error occurs, the data field returns an exception code that the masters application software can use to determine the next action to take.

MODBUS networks employ two methods of error checking: y 1. Parity checking of the data character frame (even, odd, or no parity) y 2. Frame checking within the message frame (Cyclical Redundancy Check in RTU Mode, or Longitudinal Redundancy Check in ASCII Mode)
y

y Frame checking (LRC or CRC ) y LRC Longitudinal Redundancy Check (ASCII Mode Only) y In the ASCII transmission mode, the character frame

includes an LRC field as the last field preceding the CRLF characters. This field contains two ASCII characters that represent the result of a longitudinal redundancy calculation for all the fields except the starting colon character and ending CR LF pair of characters. y CRC Error Checking (RTU Mode Only) y RTU Mode message frames include an error checking method that is based on a Cyclical Redundancy Check (CRC). The error-checking field of a message frame contains a 16-bit value (two 8-bit bytes) that contains the result of a Cyclical Redundancy Check (CRC) calculation performed on the message contents.

CANBUS
y y

Introduction CAN Bus is a multiplexed wiring system used to connect intelligent devices such as Electronic Control Units (ECU's) on vehicles, allowing data to be transferred in a low-cost and reliable manner. CAN means 'Controller Area Network' and was developed by Bosch in 1980. Most new vehicles use this system and it is becoming increasingly difficult to install after-market products without using a CAN Bus Interface.

CAN was originally developed by the German company, Robert Bosch, for use in cars, to provide a cost-effective communications bus for in-car electronics. y The car industry continues to use CAN for an increasing number of applications, but because of its proven reliability and robustness, CAN is also being used in many other control applications.
y

CAN BUS Message FRAME


y y

Message Frames : In a CAN system, data is transmitted and received using Message Frames. The Standard CAN protocol , also now known as Base Frame Format, supports messages with 11 bit identifiers. The Extended CAN protocol , also now known as Extended Frame Format, supports both 11 bit and 29 bit identifiers.

       

Start of frame (SOF) Message Identifier (MID) or (Arbitration) either 11 or 29 bits long depending on the chosen mode Remote Transmission Request (RTR) . Control field (CONTROL) . Data Field (DATA) . CRC field(Cyclic Redundancy Checks) containing a fifteen bit cyclic redundancy check code. Acknowledge field (ACK) an empty slot which will be filled by the receiving node on successful reception. End of Frame (EOF)

In situations where two or more nodes attempt to transmit at the same time, a non-destructive arbitration technique guarantees that messages are sent in order of priority and that no messages are lost. Communication is identical for all implementations of CAN. However, there are two principal hardware implementations. The two implementation are known as Basic CAN and Full CAN.

 Basic CAN :  In Basic CAN configurations there is a tight link between the CAN controller and the associated microcontroller. The microcontroller, which will have other system related functions to administer, will be interrupted to deal with every CAN message.  Full CAN :  Full CAN devices contain additional hardware to provide a message "server" that automatically receives and transmits CAN messages without interrupting the associated microcontroller. So will reduce the load on microcontroller .

Data messages transmitted from any node on a CAN bus do not contain addresses of either the transmitting node . Instead, the content of the message is labelled by an identifier that is unique throughout the network. All other nodes on the network receive the message and each performs an acceptance test on the identifier to determine if the message is relevant to that node. If the message is relevant, it will be processed; otherwise it is ignored. The unique identifier also determines the priority of the message.

Profibus
y

PROFIBUS (Process Field Bus) is a standard for field bus communication in automation technology and was first promoted (1989) by BMBF (German department of education and research).

Profibus offers three types of profiles. Process Automation (PA) Fieldbus Message Specification (FMS) communication profile Decentralized Periphery (DP)
y

PROFIBUS FMS The initial version of PROFIBUS was PROFIBUS FMS, Fieldbus Message Specification. PROFIBUS FMS was designed to communicate between Programmable Controllers and PCs, sending complex information between them. PROFIBUS DP The second type of PROFIBUS is more universal. Called PROFIBUS DP, for Decentralized Periphery, this new protocol is much simpler and faster PROFIBUS PA PROFIBUS PA is a protocol designed for Process Automation. In actuality, PA is a type of PROFIBUS DP Application profile. PROFIBUS PA standardizes the process of transmitting measured data.

OSI MODEL

Samir El-Hibir El-Awad 044034

OSI MODEL
OSI is the Open System Interconnection reference model for communications. The OSI reference model consists of seven layers. Each layer defines a set of typical networking functions. When OSI was in active development in the 1980s and 1990s, the OSI committees created new protocols and specifications to implement the functions specified by each layer. Today the OSI model can be used as a standard of comparison to other networking models.
39

A layer, is a collection of conceptually similar functions that provide services to the layer above it and receives service from the layer below it. Conceptionally, two instances at one layer are connected by a horizontal protocol connection on that layer.

40

OSI Layering Benefits


Less Complex: Compared to not using a model, network models break the concepts into smaller parts. Multivendor interoperability: Creating products to meet the same networking standards means that computers and networking gear from multiple vendors can work in the same network. Modular engineering: One vendor can write software that implements higher layers for example, a web browser and another vendor can write software that implements the lower layers for example, Microsoft s built-in TCP/IP software in its operating systems. Easier to learn and develop
41

42

ALL People Seem To Need Digital Processing. Please Do Not Through Samir s Pizza Away.

43

 Physical Layer  Data Link Layer  Network Layer  Transport Layer  Session Layer  Presentation Layer  Application Layer  TCP/IP

PHYSICAL LAYER

The physical layer the lowest layer of the OSI model, is concerned with the transmission and reception of the unstructured raw bit stream over a physical medium. This layer typically refers to standards from other organizations. These standards deal with the physical characteristics of the transmission medium, including connectors, pins, use of pins, electrical currents, encoding, light modulation, and the rules for how to activate and deactivate the use of the physical medium.

 Physical Layer  Data Link Layer  Network Layer  Transport Layer  Session Layer  Presentation Layer  Application Layer  TCP/IP

PHYSICAL LAYER
It provide serializes the frame (i.e. converts it to a series of bits) and sends it across a communications circuit (i.e. cable) to the destination (or intermediate) system via fiber optic, coaxial etc.
Data encoding: modifies the simple digital signal pattern (1s and 0s) used by the PC to better accommodate the characteristics of the physical medium. Transmission technique: determines whether the encoded bits will be transmitted by baseband (digital) or broadband (analog) signaling.

 Physical Layer  Data Link Layer  Network Layer  Transport Layer  Session Layer  Presentation Layer  Application Layer  TCP/IP

DATA LINK LAYER

The data link layer provides error-free transfer of data frames from one node to another over the physical layer, allowing layers above it to assume virtually errorfree transmission over the link.

 Physical Layer  Data Link Layer  Network Layer  Transport Layer  Session Layer  Presentation Layer

DATA LINK LAYER


The data link layer defines

1.

the rules (protocols) that determine when a device can send data over a particular medium. the format of a header and trailer that allows devices attached to the medium to send and receive data successfully. Frame error checking: checks received frames for integrity. For instance (parity bit and CRC)

2.
 Application Layer  TCP/IP

3.

 Physical Layer  Data Link Layer  Network Layer  Transport Layer  Session Layer  Presentation Layer  Application Layer  TCP/IP

DATA LINK LAYER

 Physical Layer  Data Link Layer  Network Layer  Transport Layer  Session Layer  Presentation Layer  Application Layer  TCP/IP

NETWORK LAYER
The network layer establishes the route between the sending and receiving stations. The network layer defines three main features: 1. logical-physical addressing: defines how each device can have an address that can be used by the routing process.

2.

routing (forwarding): define how devices (typically routers) forward packets to their final destination. path determination: refers to the work done by routing protocols by which all possible routes are learned, but the best route is chosen for use.

3.

 Physical Layer  Data Link Layer  Network Layer  Transport Layer  Session Layer  Presentation Layer  Application Layer  TCP/IP

TRANSPORT LAYER
The transport layer ensures that messages are delivered error-free, in sequence, and with no losses or duplications. It relieves the higher layer protocols from any concern with the transfer of data between them and their peers. The size and complexity of a transport protocol depends on the type of service it can get from the network layer. For a reliable connection TCP protocol must be used. If the network layer is unreliable UDP protocol is used, the transport protocol should include extensive error detection and recovery.

 Physical Layer  Data Link Layer  Network Layer  Transport Layer  Session Layer  Presentation Layer  Application Layer  TCP/IP

TRANSPORT LAYER
Its Provides

1. 2.

error check (check sum). segmentation of large data blocks into smaller parts for transmission. Message acknowledgment: provides reliable end-toend message delivery with acknowledgments. Message traffic control: tells the transmitting station to "back-off" when no message buffers are available. Session multiplexing: multiplexes several message streams, or sessions onto one logical link and keeps track of which messages belong to which sessions (see session layer).

3.

4.

5.

 Physical Layer  Data Link Layer  Network Layer  Transport Layer  Session Layer  Presentation Layer  Application Layer  TCP/IP

SESSION LAYER
The session layer allows session establishment between processes running on different stations. It provides:

1.

Session establishment, maintenance and termination: allows two application processes on different machines to establish, use and terminate a connection, called a session. Session support: performs the functions that allow these processes to communicate over the network, performing security, name recognition, logging, and so on.

2.

 Physical Layer  Data Link Layer  Network Layer  Transport Layer  Session Layer  Presentation Layer  Application Layer  TCP/IP

PRESENTATION LAYER
The presentation layer is responsible for the presentation of the data. In other words, the syntax or grammatical rules for communicating computers.

 Physical Layer  Data Link Layer  Network Layer  Transport Layer  Session Layer  Presentation Layer  Application Layer  TCP/IP

PRESENTATION LAYER
two main services performed at this layer:
 

  

translation of data from one form to another, for example File Syntax Translation - Converting file formats to another, when transferring to a different system. E.g. copying Macintosh files to a DOS PC, or from a DOS PC to a Unix workstation. Byte Order Translation Intel - Starts with the Least Significant Byte. - Little Endian Motorola - Starts with the Most Significant Byte. - Big Endian Data encryption: encrypt data for security purposes. For example, password encryption. requests the creation and termination of sessions.

 Physical Layer  Data Link Layer  Network Layer  Transport Layer  Session Layer

APPLICATION LAYER
Layer 7 provides an interface between the communications software and any applications that need to communicate outside the computer on which the application resides. It also defines processes for user authentication.

 Presentation Layer  Application Layer  TCP/IP

The application layer is not the application itself that is doing the communication. A user agent is an interface between the user and the network application.for instance ,intouch ,internet explore ,any video or audio player etc

 Physical Layer  Data Link Layer  Network Layer  Transport Layer  Session Layer  Presentation Layer  Application Layer  TCP/IP

TCP/IP PROTOCOL
The Internet Protocol Suite (commonly known as TCP/IP) is the set of communication protocols used for the internet and other similar networks. It is named from two of the most important protocols in it: the Transmission Control Protocol(TCP) and the Internet Protocol(IP), which were the first two networking protocols defined in this standard. TCP and IP were developed by a Department of Defense (DOD) research project to connect a number different networks designed by different vendors into a network of networks (the "Internet"). It was initially successful because it delivered a few basic services that everyone needs (file transfer, electronic mail, remote logon) across a very large number of client and server systems It is practically impossible to find a computer today that does not support the set of networking protocols called TCP/IP.

 Physical Layer  Data Link Layer  Network Layer  Transport Layer  Session Layer  Presentation Layer  Application Layer  TCP/IP

TCP/IP PROTOCOL

 Physical Layer  Data Link Layer  Network Layer  Transport Layer  Session Layer  Presentation Layer  Application Layer  TCP/IP

TCP/IP PROTOCOL

THERE ARE SO MANY TYPES OF FREEDOM BUT ACADEMICS FREEDOM IS THE BEST EVER.

THANKS FOR YOUR ATTENTION

Anda mungkin juga menyukai