Industrial Communication Introduction
Industrial Communication Introduction
Industrial Communication Introduction
Communication
Table of Contents
Table of Contents............................................................I
Chapter 1 Introduction...............................................1
1.1 Industry Overview..................................................................................1
1.2.4 Transportation..............................................................................15
2.1.1 Introduction..................................................................................25
2.1.4 Interface........................................................................................32
2.1.7 Protection.....................................................................................51
2.1.8 Interface........................................................................................52
2.1.9 Quiz..............................................................................................59
2.2.1 Introduction..................................................................................60
II
2.2.4.1 UDP..............................................................................................65
2.2.4.2 TCP...............................................................................................67
2.2.8 Speed............................................................................................79
2.2.9 Wireless........................................................................................82
2.2.10 Quiz..............................................................................................85
3.2 Utility..................................................................................................112
3.3 Practice...............................................................................................113
4.2.1 Peer-to-Peer................................................................................129
4.6 Practice...............................................................................................152
4.7 Hands-On...........................................................................................169
Media Converter........................................................173
5.1 Unmanagement Switch......................................................................173
5.2.1.2 IP Configuration.........................................................................177
5.2.1.7 SNTP..........................................................................................186
5.2.1.8 IP Security..................................................................................187
5.2.3.1 VLAN.........................................................................................199
5.2.3.2 RSTP..........................................................................................205
5.2.3.3 SNMP.........................................................................................207
5.2.3.4 QoS.............................................................................................209
5.2.3.5 IGMP..........................................................................................215
5.2.3.6 X-Ring........................................................................................217
5.2.4.1 802.1x/RADIUS.........................................................................225
5.2.5 Hands-On...................................................................................231
Chapter 6 Conclusion.............................................244
1
Chapter 1 Introduction
specifications, such as the temperature tolerance and vibration protection, are getting
more and more important. Thus, the companies, which develop the industrial
equipments, are focusing on the way to make the industrial computers and devices
more stable and flexible. For example, the industrial computer has more PCI slots so
that the customers can install more PCI cards to extend their applications. Or in
building automation system, there should be an industrial computer (ex: UNO series)
with remote IO modules (ex: ADAM-4000, 6000 series modules) to monitor whole
building status for security. In machine automation field, motion control plays an
important role. The machine designer must consider the motor moving theory and
increase the rate of manufacturing process and prevent the machine mechanism from
damage in any situation or operation. In power and energy system, industrial devices
can provide the efficiency of saving power and provide the stable system to do power
and energy management. This textbook will focus on the base knowledge about
Industrial Communication system so that the users will know how to use ICOM
modules.
these applications, the readers will know more about Industrial Communication.
Project Introduction:
their introduction in the 1980s, especially in the larger cities like Beijing and
Shanghai. Intelligent residential quarters are equipped with elevators, water & sewage
pumps, lighting, security and more. Automatic monitoring is necessary for ensuring
Shanghai city uses Advantechs WebAccess as the kernel of its Building Automation
system.
System Requirements:
providing the best in modern living. This large development required a reliable and
reliable monitoring system that would enhance property management quality, reduce
labor intensity for the management staff, cut down the cost of property management,
and help to provide a safe and comfortable living environment for all residents.
System Description:
composed of an upper computer for monitoring, and a lower computer for control.
The upper computer includes the IPC-610H and Advantech WebAccess components;
while the lower computer includes the ADAM-4051 and its corresponding Modbus
Data Gateway module, EKI-1222. The WebAccess configuration of the system allows
The perimeter alarm system: 24 couples of infrared alarm signals spread across
the Beautiful Garden are connected to the upper computer through two ADAM-
4051 modules and an EKI-1222 module via Modbus RTU universal protocol.
Gate guard: WebAccess acquires card reader data by accessing the SQL data
Conclusion:
Efficient monitoring helps improve the living environment, greatly enhances the
staff, cuts down the cost of property management and provides comfortable living
Project Introduction:
A mudlogger in the modern oil field gathers data and collects samples during the
drilling process. This information is then organized in the form of a graphic log. This
characteristics of the particular geo-strata that the rig crew is about to drill through.
Mudloggers have to connect various sensors to the drilling apparatus and install
specialized equipment before they can monitor or log drill activity. This can be
quite strenuous and challenging, especially when having to be done during drilling
activity. Much of the equipment will require precise calibration or alignment by the
System Requirements:
Mudloggers observe and interpret the indicators in the mud returns during the
drilling process. At regular intervals the mudlogger logs properties such as drilling
rate, mud weight, flow line temperature, natural gas content and type, oil indicators,
pump pressure, pump rate, litho logy (rock type) of the drilled cuttings, and various
other items of interest. The job of a mudlogger requires a good deal of diligence and
and can be difficult during rapid drilling. Our customers specific requirements were
as follows:
The device should be able to withstand the harsh conditions of a modern oil field
System Description:
The host panel PC on the electrical control cabinet of the mudlogging unit
features; 12) User-friendly HMI. The sensor monitors accidents such as pierced pipes,
lost drills, lost bits, breaks, blowouts and slough. The monitoring parameters include:
drilling load, pick-up weight, weight on hook, torque, stack pressure and flow.
Conclusion:
wide temperature and humidity range, and rugged design that withstands
Intelligent control on the modlogging unit could be now implemented through the
Project Introduction:
Conventional wind turbine controllers have only limited resources, and can only
in the hydraulic system, including rotation speeds and vibrations, but also allow
System Requirements:
The customer required a controller that could receive wind data from an
anemometer, direct the nacelle and rotor blade in order to catch the wind, and brake
the blades from moving too fast and becoming damaged, which led to the following
requirements:
A compact system that could fit into space limited towers, and also had front
accessible I/Os
tolerance
System Description:
The UNO-1150 is installed inside the wind power turbine. Hundreds of I/O
distributed over the nacelle, such as wind speed and direction were passed to the
the hydraulic system, rotation speeds and vibrations are all monitored. The UNO-1150
also processes this information and can quickly adjust the rotor blade to the available
wind. However, when the wind is too strong, the UNO-1150 can engage the brake to
stop the rotor blade from damaging. The embedded OS in the system ensures the
general control and regulation lies in the real time time range. The UNO-1150 also
links to the main monitoring network and frequency converter monitors. The
information in the nacelle could be transferred via Ethernet, fiber optic or serial COM
port. This shows the implementation flexibility and the reliability of the UNO-1150
Conclusion:
designed fanless, and cableless for harsh, varied environments with a wide range
temperature. The high vibration and shock tolerance caused by the blade rotation was
within the tolerance of range of UNO-1150. These features not only increase
reliability but also reduce the costs of maintenance. From the implementation point of
view, the front access I/O design saves the time on integration and wiring. The DIN-
rail mounting form factor makes the UNO controller easily align together with other
device such as BUS coupler or Fieldbus circuit without occupying extra space. The
x86 computer architecture extends the possibility for future application adjustment
1.2.4 Transportation
Project Introduction:
products can greatly help improve efficiency and safety on highways worldwide. By
adopting Advantech eAutomation products as the heart of their signal control system,
freeway traffic flow situations, and can use this information to make sure that all
traffic is flowing smoothly, helping people get to their destinations faster and safer
than before.
System Requirements:
As the worlds population expands, the amount of vehicles and traffic on roads
Systems to evolve, become more complex, and be able to provide accurate real time
traffic information to drivers, which can also take into account the weather,
systems, Taiwans National Freeway Bureau turned to Advantech for products to help
them monitor, manage, and maintain control on their roadways nationally. Aside from
the strict demands they had on the products they needed to complete this project, they
also required rugged and powerful components which could adapt to the harsh and
System Description:
The goal of an efficient traffic flow system is to display the real-time traffic and
weather situation for drivers. The remote control room needs to gather the weather
information, taking into account variables such as wind speed, wind direction, and
rain fall through outdoor weather sensors. They are connecting to ADAM-5510M by
RS-232 then the data will transfer to Ethernet packet and send back to the remote
control room. Afterwards, the remote control room will obtain the remote weather
information and send instant traffic information to the remote outdoor display boards
via UNO-2171/2172. Due to the fact that the transmission distance is more than 2km,
converter) is required to convert the Ethernet signals to single mode fiber optic which
Conclusion:
Traffic information display boards now contain more accurate and up-to-date
The EKI-2541S allowed the traffic data to easily be converted into fiber optic
Project Introduction:
Recently libraries have been extending beyond the physical walls of a building,
2005, is the librarys response to the challenge of Google, and an attempt to meet the
changing needs and wants of the users, using Web 2.0 technology. Some aspects of
software, plug-ins, and widgets. Inspired by Web 2.0, it is an attempt to make the
System Requirements:
One of Koreas top vending machine makers wanted to leverage RFID (Radio
returning system. The idea was that customers reserve a book through the librarys
website, choose the location to physically pick up the book, and the computer would
provide the customer with a special barcode that they should print out and bring with
them. The customer then simply goes to the assigned location, shows the printed
barcode information to the vending machine, and the reserved book would show up
automatically. Customers could also return the book to any applicable vending
machine, and due to the fact that all books are tagged with an RFID, the librarys
website and vending machine system can deliver and trace all the books
Easy to mount
System Description:
In this solution, the USB-4751 is setup to control the drawer switches when the
which drawer is not occupied for customers to return their books. The USB-4622 acts
as a USB hub to gather all the necessary information. The industrial display interacts
Conclusion:
This system is the first library 2.0 system in Korea, and was integrated with an
online shopping business model, RFID and vending machine technology. Not only
was the manufacturer able to save cabling and installation efforts, but also a lot of
vending machines operations can be monitored remotely from the central control
room.
The purpose of this ICOM textbook is to assist the users to learn the basic
modules. Further, the author mentions lots of basic knowledge of some Serial and
Ethernet devices and equipments in this text book. After reading this text book, the
reader not only will be able to read and understand the specification of ICOM
products, but also will have basic skill to operate Advantech ICOM products.
Products
In order to know more about ICOM Products, this chapter will introduce the
basic knowledge of Serial and Ethernet communication. It will let users know more
2.1.1 Introduction
Before learning about the Advantech ICOM products, you need to have some
basic knowledge of serial communication. In this chapter, you will learn what are
applications to illustrate:
In the factory automation field, the customers hope the control system can be
apart 1200m from the sensor. For IO card, because the distance is too far, the signal
will be interfered with noises or decay. Therefore, users cannot measure the precise
Figure 2-12
To solve the distance issue, we can utilize the Remote I/O modules nearby the
devices, and through serial communication to get the most correct data.
Figure 2-13
The serial communication is the process of sending data one bit at one time,
sending several data together (on a link comprising of several wired channels in
parallel).
At first sight it would seem that a serial link must be worse than a parallel one,
because serial link can transmit less data on each clock tick. However, it is often the
case that serial links can be clocked considerably faster than parallel links, and
achieves a higher data rate. In addition, serial link is cheaper than parallel to
implement because parallel link requires more numbers of wires, and the IC design of
serial chipset is easier than parallel chipset because serial has fewer pins.
Simplex Communication:
Data flow in a simplex channel is always in one way. Simplex channels are not
often used because it is not possible to send back error or control signals to the
Half-Duplex Communication:
A half-duplex channel can send and receive, but not at the same time. It is like a
one-lane bridge where two-lane traffic must give way in order to cross. Only one end
transmits at a time, the other end receives. The examples of half-duplex are talk-back
radio, RS-485.
from transmit mode to receive mode as in half duplex. It is like a two-lane bridge on a
two-lane highway. Have you ever watched these television talk shows where the host
has a number of people on the show, and they all try to talk at once. Well, thats full
2.1.4 Interface
now I would like to introduce RS-232, RS-422, and RS-485 serial protocol.
RS-232:
Full-Duplex Operation
Protocol:
ground.
c. Most common use as a communication device for a Serial port of the PC and
peripherals
For Single-Ended signaling (See Figure 3.9), the voltage signal goes through
three wires: Rx, Tx, GND. The ground is always the ground and will not be changed
by other signal. That is too say, only the Tx and Rx wires signal will be interfered by
certain noises, or will decay due to long distance transmission. If the transmission
distance is over 15m, the receiver will probably be hard to distinguish from high or
transmit signals, requires the transmitter to use +12V and -12V, but requires the
receiver to distinguish voltages as low as +3V and -3V. Whenever the receiver
receives a signal that higher/lower than +/-3V, it will regard the signal as a high
signal, otherwise it will regard as a low signal. Some manufacturers therefore build
transmitters that supplied +5V and -5V. After a long distance transmission, +/-5V
signal might decay to the signal under +/-3V (For example, +/-1.5V). Consequently,
the receiver is unable to distinguish the high or low status of the signal and causes
data error. However, RS-232 is still commonly used in computer serial ports in short
Request To Send (RTS): DTE informs DCE of preparing for receiving data. DTE
will send RTS signal to DCE that it has data to send. DCE will take action to send
CTS (Clear To Send) signal or to reverse the direction of a half-duplex channel. For
the modern usage of RTS, please refer to the below RTS/CTS handshaking part.
Ready To Receive (RTR): The same pin with RTS. Asserted by DTE to indicate
Clear To Send (CTS): Claimed by DCE to inform RTS and to allow DTE
transmitting data. This signaling was originally used with half-duplex modems and by
slave terminals on multi-drop lines: The DTE would raise RTS to indicate that it had
data to send, and the modem would raise CTS to indicate that it is feasible to send.
connected. If the DCE is a modem, this may "wake up" the modem, bringing it out of
a power saving mode. This behavior is usually applied to the modern PSTN and GSM
modems. When this signal is disclaimed, the modem will return to the standby mode,
Data Set Ready (DSR): DCE will send DSR signal to indicate DCE has been
powered on and is ready to receive commands or data for transmission from the DTE.
Data Carrier Detect (DCD): Claimed by DCE when a connection has been
Ring Indicator (RI): Claimed by DCE when it detects a ring signal from the
telephone line.
Two RS-232 devices can communicate with each other only by connecting Rx,
Tx, GND pins. The user can connect the rest of the pins to employ the hand-shaking
function to ensure the correction of the link between DCE and DTE. For example, by
employing RTS and CTS signals, DTE and DCE can confirm the status of each other
Barcode Reader
RS-485:
Half-Duplex Operation
High transmission speed (35 Mbps up to 10m and 100 kbps at 1200m)
means of two complementary signals sent on two separate wires. The Receiving
Device would read the difference between the two signals. Since the receiver does not
refer to the ground, small changes in ground potential between transmitter and
receiver do not affect the receiver's ability to detect the signal. Since RS-485 uses
differential balanced line over twist pair (Figure3.13), the maximum communication
Use STP (Shielded Twist Pair): To cancel the electromagnetic interference from
external sources.
Terminal Resistor: When the distance of RS-485 is too long or there are too
is suggested) at the both end of the RS-485. Because when the data reach the end
of RS-485, there will be a reflect signal, and the reflect signal would be a noise
signal which can influence the original signal. The function of the terminal
signals to enable them to cover longer distances. For example, if the original
signal is +5V, after a long distance transmission the signal has decayed as +3.5V.
When this signal arrives a repeater, the repeater will strengthen the voltage of
Power/Gas Meters
RS-422:
Current loop:
that uses current instead of voltage for signaling. Current loops can be used over
moderately long distances (tens of kilometers), and can be interfaced with optically
isolated links. Analog current loops are used where a device must be monitored or
controlled remotely over a pair of conductors. Only one current level can be present at
any time.
A big benefit of the current loop is its simple wiring just the two wires. The
supply voltage and measuring current are supplied over the same two wires. Zero
offset of the base current (i.e. 4mA) makes cable break detection simple: If the current
suddenly drops to zero, you have a cable break. In addition, the current signal is
immune to any stray electrical interference, and a current signal can be transmitted
CAN:
The CAN (Controller Area Network) is a serial bus system especially suited for
networking "intelligent" I/O devices as well as sensors and actuators within a machine
noise immunity, the CAN serial bus system, originally developed by Bosch for use in
Communication between the Modbus nodes was achieved with messages. It was an
open standard that described the messaging structure. The physical layer of the
The nice thing of the standard Modbus is the flexibility, but at the same time the easy
implementation of it. Not only intelligent devices like microcontrollers, PLCs etc. are
able to communicate with Modbus, also many intelligent sensors are equipped with a
Modbus interface to send their data to host systems. Advantech ADAM modules also
support Modbus protocol, While Modbus was previously mainly used on wired serial
communication lines, and there are also extensions to the standard for wireless
carried. A complete command is consisted of command head and command body. The
command head is prefixed by six bytes and responded to pack Modbus format; the
command body defines target device and requested action. Following example will
The following picture shows the Modbus Frame structure of Request command.
The following picture shows the Modbus Frame structure of Response Message.
In the command body, the definition of the function code as the picture below.
For example:
Function Code 01
The function code 01 is used to read the discrete outputs ON/OFF status of an
Request: 03 01 00 17 00 08
Read coil number 17 to 24 (address number 00017 to 00024) from ADAM module
with address =3
Response: 03 01 01 42
Coils number 00018 and 00023 are on, all others are off.
In the response the status of coils status is shown as a byte value 42 hexadecimal,
The function code 03 or 04 is used to read the binary contents of input registers
Request: 01 04 00 01 00 02
Response: 01 04 04 42 C8 AE 5D
The RS-485 standard supports half-duplex communication. This means that both
two wires are needed when transmitting or receiving data. Handshaking signals (such
as RTS, Request To Send) are normally used to control the direction of the data flow.
ICOM cards, ADAM I/O modules, UNO, etc.) will automatically sense the
handshaking signal is necessary. So you can build an RS-485 network with just two
If a half-duplex COM port doesnt have a build-in hardware auto flow control
mechanism or hand-shaking pins, the user needs to use software to control the data
2.1.7 Protection
A. Isolation
circuit. Separate of circuit can prevent the abnormal signal from influencing the whole
EFT (Electrical Fast Transient, or Burst) Surge protection is to protect the parts which
are connecting with the input signal. We need it in case the input signal is with an
electrical burst which will damage the receiver. It is for sudden high voltage
protection.
2.1.8 Interface
ISA/PC-104:
The 16-bit ISA interface is defined by the IBM PC/AT and it is also called the AT
Bus. Its data transfer rate is only 8.33MHz which is 16.66Mbytes/s (8.33MHz * 2
bytes). And the most significant feature of the ISA interface is that it cannot support
PnP (Plug and Play) function, so we have to configure the setting in the software to
make sure it is corresponding to the setting on the hardware. By the way, since the
performance and transfer quality of the ISA bus are worse than the PCI bus, it is
The following PCL-746+ is one of our famous ISA ICOM products. It is an ISA
card which can create four RS-232/422/485 ports on your PC, and we have to set the
base address or IRQ jumper manually on the card for the device configuration.
PCI/PC-104+:
The Peripheral Component Interconnect interface which means PCI is the most
common interface in modern computer. It had displaced the ISA bus as the standard
expansion bus. Compare to the ISA bus, there are several superiorities for the PCI
bus. For instance, the data transfer rate for the 32-bit PCI standard bus can be as high
as 133Mbytes/s (33MHz), and the PCI bus can support PnP function so that the
system will configure the device setting automatically. Besides, most of the PCI bus
can support either 5V or 3.3V power suppliers (lower than ISA bus) which we usually
call the Universal Bus. Please refer to the Figure 3-4 to find the difference between
Figure 2-43 The Universal Bus and the difference between the 5V board and 3.3V
board
The following PCI-1620CU is one of Advantech PCI ICOM cards that can create
Compact PCI:
The Compact PCI (CPCI) interface which is defined by the PICMG (PCI
interface with a different physical form factor. The CPCI interface utilizes the Euro
card form factor popularized by the VME bus (Versa Module European bus) and is
usually defined for both 3U (160mm deep * 100mm high) and 6U (160mm deep *
The data transmitting rate for the 32-bit CPCI bus is 133Mbytes/s (33MHz) and
can also support 256 buses as well as the PCI bus. In addition, the CPCI has the
staged power pins for Hot Swap capability, and the excellent shock and vibration
resistance characteristics which can be used in critical applications. Some CPCI cards
are also has the user I/O connections on front or rear of the module. The following
USB:
Up to now, the Universal Serial Bus (USB) interface is becoming popular and
has replaced many legacy varieties of the serial and parallel ports. It is because most
of the USB devices are small and are convenient to carry, and they are usually low-
consumption of the power. The USB interface can also support PnP and Hot Swap
function so that we can connect the USB device without turning off the computer.
Besides, the USB interface can be easily to expand by using the Hub device and it can
connect up to 127 USB devices on one computer. So far the data transfer rate of the
USB interface can be up to 480Mbit/s (USB 2.0, High-Speed) and it is 40 times faster
than the data transfer rate of USB1.1 (12Mbit/s for Full Speed devices, 1.5Mbit/s for
2.1.9 Quiz
principle?
2. ( ) The customer informs us that PC sometimes receives wrong data from the
3. ( ) How many receivers can one driver connect with in RS-485 protocol?
4. ( ) If you want to check the unoccupied IO address & IRQ, where can you go?
5. ( ) Which method can NOT prevent the serial communication from data loss?
(a)Add Terminal Resistor (b)Increase baud rate (c)Add parity check (d)Use
hand-shaking
8. RS-485 uses multi-drop connection. When there is more than one device in the RS-
485 connection, how does the client identify each of the modules?
2.2.1 Introduction
The purpose of this section is to introduce some basic knowledge of Internet that
related to Advantechs ICOM products, such as TCP, UDP, Fiber Optic, etc. This will
help you to understand the specification and features of Advantechs ICOM products
more easily.
Ethernet was originally developed at Xerox and then was standardized by the
DIX association. (Including DEC, Intel, and Xerox) Afterward, the DIX association
transferred the patent right to the IEEE (Institute of Electrical and Electronics
Engineers) and therefore the Ethernet was no long belong to one certain company.
Therefore, many companies were willing to support and develop the Ethernet product
and consequently the Ethernet became the most common type of the LAN today.
microwave, etc.). Ethernet originally used a shared coaxial cable (the shared medium)
carrier sense multiple access with collision detection (CSMA/CD) to govern the way
the computers shared the channel. This scheme was simpler than the competing token
ring or token bus technologies. When a computer wanted to send some information, it
Carrier Sense: The Network member verifies the absence of other traffic before
Multiple Access: The fact that multiple stations send and receive packages on the
medium. Transmissions by one node are generally received by all other stations using
the medium.
Collision Detection: If more than one Network members start transmitting data
simultaneously, a data collision will occur. The transmitting members will detect the
collision and terminate the transmission. A back-off strategy determines when the
Many People have heard about OSI Model (Open System Interconnection
Model), but some of them do not know the purpose of it. I will take a simple example
to illustrate.
project. He needs to report the background, feature, and the design concept of the
whole project in the meeting. If Mr. Chen only reports orally and just uses the reading
report, the reaction of audiences would be very flat even if Mr. Chens expressiveness
is good. It is due to the content of Mr. Chens presentation is very abstract, so every
audience would has different imagination and consequently has less response.
On the contrary, if the Mr. Chen can make a real community model and use this
model to illustrate each item, the audiences would have more positive feedback
because they can understand the advantages of the whole design more concretely.
By referring to the above example, a proper model can make a complex thing more
1984 and divided the whole Internet system into seven layers, each layers has its
specific tasks:
- Reduces complexity
- Standardizes interfaces
different things)
- Easy troubleshooting
As for the task of each layer, we do not mention it in this text book. Please refer to
2.2.4.1 UDP
User Datagram Protocol (UDP) is one of the core protocols of the Internet
includes 16-bit data, which includes the source port number and the destination port
2. Connectionless transmission property. On one hand, this feature can simplify the
process of data transmission. On the other hand, it lowers the reliability of the
transmission. If certain errors occur during the transmission process, UDP will not
re-send the data because UDP doesnt have confirmation and re-send features.
1. To decrease the loading of PC resource. Take the DNS server (Domain Name
Server) as the example, the server may face a bound of queries from the clients. If
DNS uses TCP, it needs to take much PC resource; therefore, DNS uses UDP as
2. Time-sensitive applications often use UDP because dropped packets are preferable
to delayed packets. UDP's stateless nature is also useful for servers that answer
3. UDP is compatible with packet broadcast (sending to all on local network) and
multicasting (send to all subscribers), whereas TCP only supports unicast (point-
to-point).
2.2.4.2 TCP
Comparing with UDP, TCP provides more functionality, but the header and the
Oriented means that before the application transmits the packets via TCP, it has to
make a TCP connection in advance and bases on this connection to send packets.
2. Data Flow Control. Due to the diversity of hardware and software, every PC has
different efficiency. Therefore, TCP will use its data flow control function to adjust
destination, TCP source can confirm that the TCP destination has received the
complete and correct data. Otherwise, TCP source will use the re-send mechanism
b. After receiving the Packet1, B will send ACK1 back to A. The content of ACK1
c. If A receives ACK1 within the estimated time of arrival, it can confirm that the
d. After receiving the Packet2, B will send ACK2 back to A. The content of ACK2 is
Re-Send Process:
If the A doesnt receive the ACK2 from B within the estimated time of arrival, it
Twist Pair: Twist pair is popularly used to decrease the phenomenon of the
RFI) that generated by the copper wires while the electrical data is transmitted via the
copper wires. More twists can have more effective performance against interference.
Basically, we can divide twist pair into two types: UTP (Unshielded Twist Pair)
and STP (Shielded Twist Pair). Either of them has its own feature:
STP: The main feature of STP is that there is a copper net or metal net between the
UTP: There is no copper net or metal net between the internal twist pair and the
external plastic skin; therefore UTP is unable to resist the external electromagnetic
Fiber Optic:
There are two kinds of fiber optic cables and three kinds of fiber optic connectors
Cables:
Multi-Mode Fiber Optic Cable (MM Fiber): There are two common sizes of the core
that the cable has a core size of 62.5 micrometers (m) and a cladding diameter of
125 m. For many years 62.5/125 m and conventional 50/125 m multi-mode fiber
applications ranging from Ethernet (10 Mbit/s) to Gigabit Ethernet (1 Gbit/s) and,
because of their relatively large core size, were ideal for use with LED transmitters.
the transmitter.
Single-Mode Fiber Optic Cable (SM Fiber): A single-mode optical fiber is an optical
fiber designed to carry only a single ray of light (mode), and a typical single mode
optical fiber has a core diameter between 8 and 10 m and a cladding diameter of 125
and requires more expensive laser sources than Multi-Mode Fiber does. Consequently,
the transmitting distance of Single-Mode fiber can be much longer than Multi-Mode
fiber.
Connectors:
Advantechs ICOM products have three types of Fiber Optic connectors, SC, ST,
For more information about these three types of connectors, you can search on the
Internet.
So far, there are three kinds of developed Ethernet Topology, Bus, Star, and Ring.
Bus Ethernet: The main feature of Bus Ethernet is Utilizing one sharing Ethernet
cable to connect all PCs. However, the one sharing Ethernet cable doesnt
represent that one very long physical Ethernet cable; it is connected by many short
Ethernet cables. Therefore, in a sense, we regard those short Ethernet cables as a long
Ethernet cable.
The benefits of Bus Ethernet are that it is a cost effective Ethernet topology. To
build up the Bus Ethernet structure, we do not need any other Ethernet equipment, but
only the adequate cables, connectors, and Network cards. However, if one of these
short cables is broken, the whole Network will crash down, and it is hard to find out
Star Ethernet: In a Star Ethernet, all of the PCs will be connected to one switch or
hub, and each PC will transmit/receive data via this switch or hub.
The benefit of Star Ethernet is that the partial damage will only affect a partial area,
not the whole Network group. Only if the switch or hub is broken the whole Network
will be crash down. The main disadvantage of Star Ethernet is that the user needs to
The data from PC1 to PC3 may go through PC2 or other PC.
Actually, the Bus and Star Ethernet have a common disadvantage that there might
have two or more PCs transmit data simultaneously and lead to the collision of data.
However, in the Ring Ethernet, there is no such this kind of concern because there is
only one PC in this Ring Ethernet can send data at one time. The disadvantage of
Ring Ethernet is that the cost of HW and SW Ring equipment is higher than the
normal one.
Hub: Hub is a Layer1 (Physical layer) device. A network hub or repeater hub is a
device for connecting multiple twisted pair or fiber optic Ethernet devices together,
making them act as a single network segment. It is a fairly simple broadcast device,
and does not manage any of the traffic that comes through it. Since every packet is
being sent out through every other port, packet collisions result--which greatly
impedes the smooth flow of traffic. Therefore, although there are multiple Ethernet
devices can connect to one Hub, only one pair of them can transmit data at one time,
other Ethernet devices must wait till the first transmission is over. Thus, the more
Ethernet devices connect to one hub, the lower bandwidth each device can be shared.
The advantage of hub is its price is very cheap and the operating temperature is low.
Advantech used to have Hub module named ADAM-6510, but its phased out now.
Switch: Switch is a Layer2 (Data Link layer) device, also called Switch Hub. The
Switch has a build-in MAC address table and is able to record which address is
connected to which port. The data from one port will be sent to the correct port only,
not sent to all of the ports. Therefore, the other un-used ports can still transmit/receive
data at one time. This algorithm dramatically increases the bandwidth of each pair of
communicating ports.
2.2.8 Speed
100Mbps Ethernet:
100BaseTX: It uses twist pair to transmit data and requires high quality twist pair
(Cat. 5) because its signal frequency is higher than before (10Mbps). 100BaseTx is
100BaseT4: It can use Cat. 3 ~Cat. 6 level cable as the communication interface.
100BaseFX: Using Fiber Optic cable as its communication interface, therefore the
1Gbps Ethernet:
1000BaseSX: Short wave length (850nm) Fiber Optic Ethernet. It can only use Multi-
1000BaseLX: Long wave length (1300/1310nm) Fiber Optic Ethernet. It can use
1000BaseT is that it can use Cat. 5 Twist Pair to transmit, and the maximum
100BaseTX Ethernet. However, the quality of the cable has a significant effect on the
transmission rate; therefore, it still needs to work with Cat.5e or Cat.6 cable to
2.2.9 Wireless
the use of electrical conductors or "wires". The distances involved may be short (a
few meters as in television remote control) or very long (thousands or even millions
of kilometers for radio communications). When the context is clear the term is often
be a branch of telecommunications.
802.11b/802.11g:
IEEE 802.11 is a set of standards for wireless local area network (WLAN) computer
in the 5 GHz and 2.4 GHz public spectrum bands. Since the maximum data rate of
802.11 team had worked out the improvement version, that is, 802.11b.
2.4GHz Band and it has a maximum raw data rate of 11 Mbit/s. It uses the same
media access method defined in the original standard. 802.11b products appeared on
the market in early 2000, since 802.11b is a direct extension of the modulation
802.11b (compared to the original standard) along with simultaneous substantial price
reductions led to the rapid acceptance of 802.11b as the definitive wireless LAN
technology.
In June 2003, a third modulation standard was ratified: 802.11g. This works in the
2.4 GHz band (like 802.11b), but uses the same OFDM based transmission scheme as
encumbered with legacy issues that reduce throughput when compared to 802.11a by
~21%.
Advantech wireless device server, such as EKI-135x, supports both 802.11b and
802.11g to provide the most efficient and stable wireless communication quality for
the users.
WEP:
encryption technology.
802.11 wireless networks. Wireless networks broadcast messages using radio and are
wired network.
2.2.10 Quiz
(a) Filter the broadcast packages (b) Strengthen the strength of the signal (c)
Compress the incoming packages (d) Let each pair of communicating ports to
(a) The number of twist pair, STP has four twist pairs and UTP only has four. (b)
The color of STP is different from UTP (c) UTP isnt shielded by metal net
(d) The maximum data rate of UTP is 1Gbps but STP is only 100Mbps
4. ( ) Which of the following is NOT the reason why 802.11b/g has high acceptance
of the market?
(a) The dramatic increase in throughput (b) Substantial price reductions (c) The
6. Please describe the features of three Network topologies (Star, Bus, Ring).
7. What is the difference between Multi-Mode Fiber Optic and Single-Mode Fiber
Optic?
We can generally divided Advantechs ICOM products into two categories, the
serial products and Ethernet products. In the following sections, we will have a brief
performance peripherals for field devices that use the RS-232/422/485 serial
communication protocol. Each card requires only one PCI or ISA slot to provide
can be saved. Serial device servers are especially suitable for remotely controlling and
In the previous ICOM ADAM modules, there are three types of device server
remotely via Ethernet. The W means wireless module. (Virtual COM Mode)
to let the host device send/receive data from serial slave device via a
(PS. EDG-4508/4516-BE support both Virtual COM Mode and Data Mode.)
As for the new EKI series device server, the following is the brief description:
1. EKI-152x/135x: Support both Virtual COM Mode and Data Mode(The new
name of Data Mode is USDG mode). EKI-152x is wired device server and
offer a wide range of transmission media options, including: copper, fiber optic and
wireless. Data transmission rates can range from 10 Mbps, 100 Mbps to 1000Mbps,
making the process of manufacturing data not just available at the field level, but also
7000 series X-Ring technology offers the fastest redundant ring recovery time (<
10ms) to secure data communication and reliability. Furthermore, the robust design,
DIN-rail mounting and +12~48 VDC redundant power inputs make EKI-2000/7000
value. With no setup required, they are truly plug-and-play. Models are available in
standard 10/100Mbps and gigabit 10/100/1000Mbps speeds, with both copper wire
users to expand their industrial network fast and cost-effectively, while the rugged
technology offers the fastest recovery time (< 10 ms) to increase the reliability and
speed of network infrastructures. EKI-7000 series are an ideal solution for easily
devices designed to convert and transmit Gigabit Ethernet or Fast Ethernet networks
ICOM Card
performance peripherals for field devices that use the RS-232/422/485 serial
communication protocol. Each card requires only one PCI or ISA slot to provide
ports. In order to fully utilize the advanced features of Windows 2000/XP/Vista, such
are provided for the PCI communication cards. All these drivers conform to the
Before you install the card into your system, we recommend you install the
driver first. Please follow the steps below for the PCI communication cards Windows
1. Insert your companion CD.ROM disc into your CD.ROM drive, or go to our
http://support.advantech.com.tw/support/default.aspx
4. Power on the PC and wait for the PC detecting the new Hardware.
5. When you reboot your system, Windows 98/2000/XP will recognize your card
devices and will automatically search for the device driver for PCI UARTs as
Figure 3-80
4. Choose Search for the best driver for your device radio button, and click next.
Figure 3-81
to look for the Device Name that will appear after you have installed the driver.
Figure 3-82
Note: If your device has not been properly installed, there will be an exclamation
mark (!) on the device name to indicate a conflicting device. If this is the case,
just remove that device and start the driver installation process all over again.
Since ISA is not a PnP (Plug-n-Play) bus, the users need to assign a specific I/O
address and IRQ for their ISA interface cards and therefore ISA interface ICOM cards
dont need a driver. However, Advantech provide a tool called ISA Configure Tool to
make the users install their ICOM cards easier. The following is the procedure to use
1. You need to check the available IRQ and IO address in Windows Device Manager.
Figure 3-83
Figure 3-84
Figure 3-85
6. Add a new board and choose the module name of your card.
4. Assign the I/O address of port1 and the starting COM port number. Some of the
ICOM cards support share IRQ, so the whole ports of one ICOM card can share
one IRQ.
7. After finishing the setting, click Exit and close PC. Now we need to configure the
HW of the card.
8. The below figure is the description of each part of an ICOM ISA card. (The
Base Address: Set the I/O address of each serial port of the card. Most of the ICOM
ISA cards only have one base address switch. The user just needs to set the First
ports IO address and the following ports address will be +8, +16, For example, the
I/O address of port1 is set to 300H, then the address of port2 will be 308H, the
address of port3 will be 310H. As for the switch setting of each address, please refer
IRQ: Use the jumper to plug-in the IRQ number you would like to assign to your
card. If your card supports shared IRQ mode, you can just set the IRQ for port1 and
Vector Address: You only need to configure this part when the card uses shares IRQ
Port Mode: Some ICOM cards support both RS-422/485, or support RS-
232/422/485, the user need to configure HW jumpers to select the protocol of each
port.
Most of the Advantech ISA Interface ICOM cards are able to be installed by using
ISA Configure Tool; however, there are few cards that need to installed manually by
3.2 Utility
ICOM Tools:
Advantech ICOM Tools is a convenient utility that has been designed to help you
test the performance of ICOM cards through analyzing the port status. It features an
easy to use graphical user interface that will soon make you familiar with testing via
menu commands and toolbar buttons. Advantech ICOM Tools is applicable to all
series of Advantech ICOM cards, and can even be used with other third-party ICOM
cards. It is included for free on the diskette or on the companion CD.ROM with all
Tools folder or click the Advantech ICOM Utility hyperlink in the installation window
to launch the ICOM Tools setup program. The setup program will copy the program
files to the destination folder you choose or to the default installation path (i.e.
Start/Programs menu. (Later you can just access the program through
3.3 Practice
A. How to Configure the Dip Switch of Base Address and Vector Address
You can learn how to configure the dip switches of ICOM cards without referring
to user manual. Please prepare one Advantech ISA interface ICOM card in advance.
Please divide A0~A9 dip switches into three groups, that is, A0~A3, A4~A7,
A8~A9. You can imagine that A8~A9 is in charge of the first digit number of the I/O
address, A4~A7 is in charge of the second digit number of the I/O address, and
A0~A3 is in charge of the third digit number of the I/O address. For example, if you
want to set the I/O address of the card to 210H. A8~A9 is responsible for 2, A4~A7 is
There is one thing important you need to note when you are adjusting the dip
switch. If you set the dip switch to OFF, it represents to High (1), otherwise, it
Please follow the instruction below to practice three example addresses and you
After installing all ports of your ICOM card on PC, how to testify that these created
COM ports are workable. The user can use ICOM Tools to have a simple test first.
Please install one ICOM card on your PC first and execute COM Examine Tool.
1. Launch ICOM Tools. You will first see the Program Window such as Figure 4.1.
Since you havent selected any port for testing yet, all you can see now is a blank
window area.
2. Select the port(s) you want to test by the Port/Select menu command or by
clicking the Port Select button on the Toolbar, and a dialog box will appear.
3. Select the port(s) you want to perform test on from the checkboxes next to each
COM port. You can either click the checkbox or double-click the name(s) of the
port(s) to select/deselect port(s) to perform the test on. The port(s) you selected
Figure 3-99 Ports You Select Will Appear in the Selected Port Checkbox Group
5. You can choose to configure a specific port (or to configure all ports) before
running your test. Just click a Com Port Tab to select the port you want to
configure, and then click the Port Setup button or use the Port/Setup menu
command (or if you want to configure all ports at once, just click the All Ports
Setup button or access the All Ports/Setup menu command) to bring up the
Figure 3-101
6. After you have completed the configuration of the port(s), you can now start the
test on the port you have selected by clicking the Run button or accessing the
Port/Run menu command (or you want to run all ports at once, just click the All
Ports Run button or access All Ports/Run menu command). Once the test is
started, you can see relevant test information of port performance on the
Device Server
can be saved. Serial device servers are especially suitable for remotely controlling and
The purpose of using virtual COM mode is to extend the quantity of serial COM
port remotely for PC via Ethernet. If the customers used to use serial COM ports in
their old application and want to implement Ethernet ability into their application,
they dont need to change their old setting of serial port- based SW or program. They
just need to utilize our serial device server that supports virtual COM mode and install
the virtual COM driver in their PC to map a virtual COM port for their PC. Then,
their PC will have a remote serial COM port via Ethernet. You can just imagine that
the Ethernet part of this structure is transparent in this structure. The following is the
The benefit of using virtual COM mode is as the description in the first paragraph.
However, when a user wants to map a virtual COM on his PC, he must needs to install
the virtual COM driver and utility in advance. That is to say, to use virtual COM
mode, the host device must be a PC or a certain device that is able to install third-
party software. If this host device is a PLC or PAC and cannot install virtual COM
driver and utility, the user cannot use virtual COM mode. Further, the user needs to
concern the driver compatible issue. For instance, if the OS of the host PC is Linux or
UNIX and the virtual COM driver provider happen to support Windows system only,
the user cannot use virtual COM mode on his host PC. Even if the user uses Windows
system, the performance of the virtual COM port still depends on the performance of
Although virtual COM mode has several disadvantages, many users still like to use
Multi-Access Mode:
There is a very special function of virtual COM in new EKI device server and it
is also one of the main features of EKI device server, that is, Multi-Access mode.
Generally, one serial COM port only can be occupied by one application or one host
PC if mapped by device server. However, by using new EKI series device server,
there are up to 5 host PCs or applications are allowed to access the same port of EKI
There are two major operation modes for Multi-Access Mode. First one is
Normal Mode: EKI serial device server handles a command from one application and
replies the data from the serial port to all applications that are connecting to the same
The other one is Round-Robin mode: EKI serial device server handles the
command from one application and reply to this application only. Query from other
The users can choose one of these two modes according to their application.
The multi-access will operate in which mode depends on whether the user marks the
Response Timeout, which can be found in the EKI device server configuration
utility. The multi-access function will run in normal mode if the user disabling the
response timeout, and will run in Round-Robin mode if the user enable it.
The full name of USDG mode is Universal Serial Data Gateway Mode. Instead
of mapping virtual COM ports, USDG mode is used to build up a TCP/UDP (Socket)
connection between host device and the device server using USDG mode. The
The benefits of using USDG mode are that the users dont need to install any driver
in their host device so that there is no driver compatible issue, any system or device
that supports socket connection is able to use USDG mode. However, if the host
device doesnt have a built-in socket functionality, the users need to write their own
socket connection program, which is kind of more difficult than serial connection one.
4.2.1 Peer-to-Peer
structure. Two native serial devices can communicate over an Ethernet network
without any intermediate host PC and software programming. Serial Tunneling is very
simple to use. You can use Advantech Serial Device Server Configuration Utility to
designate one serial port as the tunneling master and another serial device server port
when the EKI-1521 acts as a TCP Server, there are up to 5 TCP Clients are allowed to
access the same port of EKI-1521. The concept is similar with the Multi-Access Mode
when the EKI-1521 acts as a TCP Server, there are up to 5 TCP Clients are allowed to
access the same port of EKI-1521. The concept is similar with the Multi-Access Mode
In TCP Client mode, the TCP connection will be established from EKI serial
device server. This operation mode supports max.16 simultaneous connections for
each serial port on EKI-1521/1522/1524 to one host or several hosts. You should
configure the IP address and TCP port number of the network hosts which the EKI
serial device server connect to using Advantech Serial Device Server Configuration
Utility. After configuration, when EKI serial device server receives the data from
serial port, the device server will employ the connection to hosts which are
configured.
when it acts as a TCP Client. The user can add up to 16 IP addresses and TCP ports
into the Peer to Receiving Data block, then, the data from the serial device will be
In control mode, the serial device server presents a modem interface to the
to other networking device. If you want serial device running application program to
connect/disconnect to different devices by request, you can use control mode. The
control mode provides three kinds of modem AT-style commands. The serial devices
to remote networking devices. Thus intelligent serial devices such as stand-alone PLC
will send /receive data to/from devices one by one via Ethernet.
Many control devices today do not have a network port and can only communicate
enabling technology is now allowing control devices with serial ports to connect to
the Ethernet and share networks quickly and cost-effectively. The EKI-
based devices. Manufacturers, system integrators, and end users can now take
managing and accessing data for their control devices that wasnt possible before.
There are two operations modes when using Modbus Data Gateway, Modbus Slave
The Modbus Slave Mode means that the Serial device acts as a slave device
that will be polled by Ethernet Master Device for the data. The old ADAM-4572
supports this mode as well. The following figure is the example application of
This is the new function that EKI-122x has but ADAM-4572 doesnt. The
Modbus Master Mode means that the Serial device acts as a master that will send
Advantech is not only providing the wired device server, but also provide the
wireless device server. The EKI-1351/1352 provides one or two serial ports,
Basically, the function of wireless device server is the same with wired device
server. However, there are few differences between wireless and wired device server,
There are two kinds of standard wireless connection modes used by Advantech
The wireless device server builds up a connection to the host PC or other wireless
There are several utilities for Advantech device server, such as EDG
Configuration Utility, COM Port Mapping utility, and so on. These are all used for old
ADAM and EDG series device server modules. After the release of new Serial Device
Server Configuration Utility, the functionality of all other utilities has been combined
into it. Therefore, in this text book, we will focus on the introduction to the new utility
and EDG-4504. It will automatically search all the EDG devices on the network and
show them on the left side of the utility. From here you can easily configure various
parameters, such as IP address, the parameters of the serial ports of the module, etc,
After the release of new Serial Device Server Configuration Utility, the EDG
configuration utility is gradually replaced by it because the new utility supports all
The function of it is the same with EDG Configuration Utility. It is a utility only
This utility is used for mapping virtual COM ports for the device servers on PC.
There is a virtual COM driver inside the utility. Therefore, in past, the users need to
install two utilities, EDG (II) configuration utility and COM Port Mapping Utility.
One is for configuration and the other one is for mapping virtual COM ports.
The purpose of testing utility is to help you diagnose the communication between
Regarding the procedure of using this utility, you can refer to the manual of ADAM-
4579.
management and virtual COM port mapping utility. After installation, this utility not
only configures the EKI-1521/1522/1524, but also connects and configures the
ADAM series and EDG series device servers. Virtual COM port configuration and
management was also integrated in this utility. The best improvement, you dont
restart the host computer while you setup new virtual COM ports. When you map the
virtual COM port, the COM port will enable immediately and show in Windows
Device Manager.
The new utility has plenty of built-in user-friendly functionalities for users. The
2. The users can configure and map virtual COM ports in the same utility.
3. The user can monitor the status of each ports of the device server.
5. There is a built-in Virtual COM Test Tool inside the utility. After mapping a
virtual COM ports, the user can use this tool to confirm whether he has mapped
These two options can be utilized in both virtual COM mode and USDG mode.
Response Timeout:
Disabling the Response Timeout: The Multi-Access function will operate in Normal
Enabling the Response Timeout: The Multi-Access function will operate in Round-
Robin Mode (For detailed introduction, please refer to Sec 4.1). After enabling the
response timeout, the user needs to set an interval (ms) further. When there are multi
commands coming from multi hosts to the same serial port of EKI device server, EKI
will send the first coming command out, and others will queue up in the memory for
being sent in order. After receiving the first coming command, the EKI will start
counting for the interval that the user keys in the Response Timeout, for example,
1000ms. The response from the serial slave device must be within 1000ms, otherwise
it will be abandoned and then EKI will continue to send the second coming command
out.
However, if the EKI receives the response of the first coming command from the
serial slave device within 1000ms, for example, 50ms, it will still wait until 1000ms is
up and then second the second coming command out. This scenario will waste a lot of
Frame Break:
To prevent the time-wasting situation, the user can utilize Frame Break with
After enabling the Frame Break, if the EKI has received the response from the
serial slave device, the EKI will not wait until the response timeout is up and then
send the second coming command out. Instead, EKI will only wait until the Frame
Break is up. That is too say, the number of Frame Break must be smaller than the
4.6 Practice
5. You can choose manual or auto mapping. The picture below is manual mapping.
7. Key in the IP and choose the comport number you want and then click Map it.
Then the virtual COM port will show up under EDG Serial Ports.
1. Use the EKI Serial Device Server Configuration Utility to search the EKI
modules.
2. Set up the valid IP addresses and other parameters for both modules. All of the
changes will be saved until you click Apply button. Then, the module will be
rebooted.
3. Go to the Operation section and set the operation mode to USDG Mode
5. Next, key in the IP address and TCP port of the destination EKI in the Peer to
6. Now, connect the COM1 of PC1 to the Port1 of EKI 1, and connect COM1 of PC2
7. Open Hyper Terminal in each PC, and connect to COM1. Key in some numbers in
each Hyper Terminal screen and see whether these numbers will appear in the other
1. Open EKI Serial Device Server Configuration Utility and detect the EKI-122x.
2. Set the serial parameters of the port1 of EKI-122x to RS-485, 9600, None, 8, 1.
3. Set the operating mode to Modbus Slave Mode, and add the ADAM-4000s ID
7. Then, the Modscan is able to get the value of ADAM-4000 via EKI-122x.
4.7 Hands-On
Scenario:
Use more than 2 applications or host PCs to access the same port of one EKI-
152x. One of the application or host PC sends command to the serial port and the
command will go through Loopback and will be sent back to the application or host
PC as the response. Lets check whether other application or host PCs would receive
the response simultaneously. Besides, what will happen after enabling the Response
Structure:
Material:
1. EKI-152x *1
2. PC *1 (More than two host PCs would be better; however, this hands-on is able to
3. Loopback *1
Procedure:
1. You can choose either map virtual COM port on each PC (up to 5) or map two
virtual COM ports on one PC but these two are pointed to the same port of EKI-
152x. In the following example, I will map two virtual COM ports for the same
3. Send data into one of the Hyper Terminals and see whether both terminals can
receive data or only the terminal, which sent data, will receive data.
offer a wide range of transmission media options, including: copper, fiber optic and
wireless. Data transmission rates can range from 10 Mbps, 100 Mbps to 1000Mbps,
making the process of manufacturing data not just available at the field level, but also
7000 series X-Ring technology offers the fastest redundant ring recovery time (<
10ms) to secure data communication and reliability. Furthermore, the robust design,
DIN-rail mounting and +12~48 VDC redundant power inputs make EKI-2000/7000
value. With no setup required, they are truly plug-and-play. Models are available in
standard 10/100Mbps and gigabit 10/100/1000Mbps speeds, with both copper wire
The unmanaged switch doesnt have much special functionality, but the rugged HW
and power redundant design. Of course, it supports din-rail and wall mounting. In
addition, there is a special module, EKI-2525P, which provides the POE (Power-
users to expand their industrial network fast and cost-effectively, while the rugged
technology offers the fastest recovery time (< 10 ms) to increase the reliability and
speed of network infrastructures. EKI-7000 series are an ideal solution for easily
various applications. These functions are categorized into 4 groups, System Tool Box,
Port Tool Box, Network Protocol, and Security Tool. We will have the introduction to
Besides, EKI managed switch provides various methods to let the users configure
it, such as Web Browser, Telnet, Serial Console, SNMP, X-Ring Utility, etc.
Assign the system name, location and view the system information
5.2.1.2 IP Configuration
User can configure the IP address and enable the DHCP client function here.
The system provides the DHCP server function. After enabling the DHCP server
When the DHCP server function is active, the system will collect the DHCP
You can assign the specific IP address that is the IP in dynamic IP assign range to
the specific port. When the device is connecting to the port and asks for dynamic IP
assigning, the system will assign the IP address that has been assigned before to the
connected device.
It provides the functions to allow a user to update the switch firmware. Before
updating, make sure you have your TFTP server ready and the firmware image is on
You can restore EEPROM value from TFTP server, but you must put the image
file on TFTP server first, switch will download back flash image.
You can save current EEPROM value from the switch to TFTP server, then go to
The EKI switch can not only record certain events in its memory, but also can
You can set up the mail server IP, mail account, account password, and
You can select the system log events and SMTP events. Whenever the selected
events occur, the EKI will send out the log information. Also, per port log and SMTP
There is a built-in Relay inside every EKI module. When one of the power input is
broken or a certain port is link down, the Relay will be turned on automatically. The
customer can connect a boozer or an indicator to this relay to have a real-time monitor
ability.
5.2.1.7 SNTP
You can configure the SNTP (Simple Network Time Protocol) settings. The
SNTP allows you to synchronize switchs clock with the SNTP server on the Internet.
5.2.1.8 IP Security
Before enabling this IP security function, every PC is able to configure the EKI
switch as long as this PC is in the same Network group with the EKI switch.
However, after enabling the IP security function, you can assign 10 specific IP
addresses that have permission to access and configure the switch via web browser or
You can change the web management login user name and password of the EKI
The user can monitor the condition and status of each LAN port of EKI switch.
In Port control, you can view every ports status that depends on user setting and
the negotiation result. The user can disable the unused LAN port for security issue
here as well.
Port Security:
The Port Security function needs to work with Static MAC Address function.
(Please refer to Sec 5.2.4.2) After the user enable the port security for Port1, the
authority of send/receive package of the device that the MAC address has been listed
the link speed beyond the limits of any one single cable or port, and to increase the
and is part of IEEE specification 802.3ad that can control the bundling of several
physical ports together to form a single logical channel. LACP allows a network
LACP works by sending frames (LACPDUs) down all links that have the protocol
enabled. If a device is present on the other end of the link that also has LACP enabled,
it will also independently send frames along the same links enabling the two units to
detect multiple links between themselves and then combine them into a single logical
link. LACP can be configured in one of two modes: Active or Passive. In Active mode
it will always send frames along the configured links. In passive mode however, it
acts as "speak when spoken to", and therefore can be used as a way of controlling
Aggregator Information:
When you have setup the aggregator setting with LACP disabled, you will see the
State Activity
When you had setup the LACP aggregator, you can configure port state activity.
You can mark or un-mark the port. When you mark the port and click Apply button
Passive: The port does not automatically send LACP protocol packets, and
responds only if it receives LACP protocol packets from the opposite device.
Note: IGMP Function is not compatible to Port Trunk. Therefore, please turn off the
The Port mirroring is a method for monitor traffic in switched networks. Traffic
through ports can be monitored by one specific port. That means traffic goes in/out
the monitored (source) ports will be duplicated into the mirror (destination) port. This
You can adjust each ports bandwidth rate and frame limitation type. There are
Broadcast/Multicast, and Broadcast only. The user can limit the ingress/egress rate of
5.2.3.1 VLAN
logical networks within a physical network. It helps in reducing the broadcast domain
client can exchange data when they are in the same VLAN group even though they
are connected to different switches, and cannot exchange data when they are in
different VLAN groups even though they are connected to the same switch.
There are two ways to set up the VLAN structure. The first one is port-based, the
users use the number of each LAN port to set up different VLAN groups. In this way,
the user can only set up VLAN groups in ONE switch. Packages can go among only
members of the same VLAN group. Note all unselected ports are treated as belonging
The VLAN information is written into the Ethernet packet itself. Each packet
carries a VLAN ID (called Tag) as it traveled across the network. The switch uses
these tags to distinguish the data that belongs to which VLAN group. In this way, the
VLAN groups can be extended to many switches. For example, two LAN ports in two
switches:
Access Link: Once the LAN port has been being chosen as an Access Link, it needs
to connected to other Network devices, such as PC. The incoming package from the
Network Device will not contain VLAN Tag. Once the package arrives this LAN port,
it will be added a VLAN Tag in front of it and then sent to other LAN port depending
on its destination address. For example, by referring to the above figure, the receiving
package of LAN Port1~3 will be added a Tag that the value is 200, and the receving
package of LAN Port 4~6 will be added a Tag that the value is 300.
When this package has been sent to other LAN port internally, this LAN port
will inspect whether the VLAN tag of the package is the same with itself. If so, the
package is accepted and can be output from this LAN port; if not, this package will be
dropped.
Trunk Link: If the user would like to set up the VLAN group cross several managed
switches, the LAN ports link each switches should be set as Trunk Link ports. A
Trunk Link Port acts as a tagged package gateway, so that is able to receive packages
containing VLAN tags, and forward them to other switches, but it cannot add VLAN
For example, by referring to the above figure, Port9 and Port10 are able to
forward the packages, which contain 100, 200, 300 tags, to the conneted switches. Of
cource, the adjacent LAN port of other switch should be set as a Trunk Link Port as
well.
Hybrid Link: It can be either a Trunk Link or a Access Link. Depends on what type
of Network Device is connected and which value is added (Tagged Vid/ Untagged
Vid).
between the switch and nodes. If the switch is connected to a device with GVRP
enabled, you can send a GVRP request using the VID of a VLAN defined on the
switch; the switch will automatically add that device to the existing VLAN.
Management VLAN ID: This is a security feature. Only the LAN Ports belong to a
certain VLAN group are allowed to configure this EKI managed switch. For example,
if the administrator adds 100 into the Management VLAN ID section, the user can
5.2.3.2 RSTP
The Spanning Tree Protocol is an OSI layer-2 protocol that ensures a loop-free
topology for any bridged LAN and is implemented in many applications that require
working for Digital Equipment Corporation. Spanning tree allows a network design to
include spare (redundant) links to provide automatic backup paths if an active link
fails, without the danger of bridge loops, or the need for manual enabling/disabling of
these backup links. Bridge loops must be avoided because they result in flooding the
network.
In 1998, the IEEE with document 802.1w introduced an evolution of the Spanning
Tree Protocol: Rapid Spanning Tree Protocol (RSTP), which provides for faster
spanning tree convergence after a topology change. Standard IEEE 802.1D-2004 now
incorporates RSTP and obsoletes STP. While STP can take 30 to 50 seconds to
second.
Please check the users manual of EKI managed switches for details.
5.2.3.3 SNMP
and solve network problems, and plan for network growth. Network management
systems learn of problems by receiving traps or change notices from network devices
implementing SNMP.
Advantech provides MIB files for each EKI managed switch to let the
administrators upload these files into SNMP software, and then they are able to
SNMP Trap
It is similar to the system event log function. The switch will send SNMP trap to
5.2.3.4 QoS
data flow. For example, a required bit rate, delay, jitter, packet dropping probability
The EKI switch provides two types of transmission scenario to transmit packages for
The switch will follow 8:4:2:1 rate to process priority queue from High to lowest
queue. For example: the system will process 80 % high queue traffic, 40 % middle
queue traffic, 20 % low queue traffic, and 10 % lowest queue traffic at the same time.
And the traffic in the Low Priority queue are not transmitted until all High, Medium,
Figure 5-199 QoS - Using the 8,4,2,1 weight fair queue scheme
The switch will process the package from the highest priority source first until
the package is end up. Then, switch will start transmit the packages from the second
priority source.
1. Port-based:
The users can assign the priority for each LAN port, and the switch will handle the
2. CoS:
Class of Service (CoS) is a layer two Ethernet frame header when using IEEE
(signifying priority real-time data) that can be used by Quality of Service disciplines
to differentiate traffic.
3. ToS:
The system will refer to the ToS (Type of Service) byte of the IP header to assign
the priority for the packages. The modern definition of the TOS byte is a six-bit
Notification field (ECN). Differentiated Services Code Point (DSCP) is a field in the
header of IP packets for packet classification purposes. (For more information, please
The EKI switch provides 0~63 TOS priority level. Each level has 4 types of
priority high, middle, low, and lowest. The default value is Lowest priority for
each level. When the IP packet is received, the EKI system will check the TOS level
value in the IP packet that has received. For example, user set the TOS level 25 to
high priority. The port 1 is following the TOS priority policy only. When the port1
packet received, the system will check the TOS value of the received IP packet. If the
TOS value of received IP packet is 25(priority = high), then the packet priority will
5.2.3.5 IGMP
used to manage the membership of Internet Protocol multicast groups. IGMP is used
is an integral part of the IP multicast specification, operating above the network layer,
unicast connections. IGMP can be used for online streaming video and gaming, and
allows more efficient use of resources when supporting these types of applications.
IGMP does allow some attacks and firewalls commonly allow the user to disable it if
not needed.
The switch support IP multicast, you can enable IGMP protocol on web
managements switch setting advanced page, then displays the IGMP snooping
239.255.255.255.
5.2.3.6 X-Ring
X-Ring provides a faster redundant recovery than Spanning Tree topology. The
action is similar to STP or RSTP, but the algorithm is not the same.
In the X-Ring topology, every switch should enable X-Ring function and assign
two member ports in the ring. Only one switch in the X-Ring group would be set as a
backup switch that would be blocked, called backup port, and another port is called
working port. Other switches are called working switches and their two member ports
are called working ports. When the failure of network connection occurs, the backup
The switch supports the function and interface for setting the switch as the ring
master or slave mode. The ring master can negotiate and place command to other
switches in the X-Ring group. If there are 2 or more switches in master mode, then
software will select the switch with lowest MAC address number as the ring master.
The X-Ring master ring mode will be enabled by the X-Ring configuration interface.
Also, user can identify the switch as the ring master from the R.M. LED panel of the
Couple-Ring:
Using the coupling ring function can connect each X-Ring for the redundant
backup. It can ensure the transmissions between two ring groups will no failure.
Dual-Homing:
Dual Homing function is to prevent the connection lose between X-Ring group
protocols
Dual-Ring:
In a Dual Ring topology, one EKI managed switch can be the ring master of two
basic X-Rings.
Central-Ring:
One EKI Managed Switch can be the ring master of four basic X-Rings.
Key-Ring:
EKI managed switch. The ring Master of the Smart Ring on the top circle can also be
the Ring Master of the three smart rings in the second layer.
Each X-Ring is not supported by all EKI managed switches. The following is X-
There is one important information about X-Ring the reader needs to note.
When using either 1G Fiber Optic ports or 100M Copper ports to set up a X-Ring, the
recovery time will be under 10ms. However, this number will extend to 150ms when
The reason is the limitation or feature of PHY Chip inside EKI Switch. There
has one registry inside the PHY chip is utilized to represent the status of the Ethernet
connection (Connected or disconnected). When we plug off the Ethernet cable (FO or
This is the feature of the 100M PHY chip, but not for the 1G speed PHY chip.
The registry inside 1G speed PHY chip will turn to Disconnected about 100ms
after we plug off the Ethernet cable. That is why the recovery time cannot be under
You may wonder why 1G Fiber Optic port is able to commit that since it uses the
same PHY chip with 1G copper port. It is because there is an I/O pin inside the Fiber
Optic module that represents the status of the Ethernet connection as well, and it can
represent the condition in time. Thus, when using 1G Fiber Optic port, the switch will
not refer to the registry of PHY chip, but the I/O ping of the Fiber Optic module.
5.2.4.1 802.1x/RADIUS
wireless access point or wired switch but prevents the client from gaining access to
the Internet until it provides authority, like a user name and password that are verified
by a separate server.
After enabling the IEEE 802.1X function, you can configure the parameters of this
function.
You can configure 802.1x authentication state for each port. The State provides
Disable, Accept, Reject and Authorize. Use Space key change the state value.
Use the MAC address table to ensure the port security. You can add a static MAC
address; it remains in the switch's address table, regardless of whether the device is
physically connected to the switch. This saves the switch from having to re-learn a
device's MAC address when the disconnected or powered-off device is active on the
network again. You can add / modify / delete a static MAC address.
When you key in one MAC address (For example, 01 02 03 04 05 06) into the
static MAC address table of a certain port on the EKI switch, all packages that are
delivered to port1, no matter this device is connected to any other port of the same
EKI switch. That is to say, this device is only allowed to receive any package in port1.
However, this device is allowed to send data from any other port.
If you would like to limit both receive and transmission authority of a certain
MAC address in one specific port, you need to add that MAC address into the Static
MAC address table and enable Port Security function for that LAN port. (Please
refer to Sec 5.2.2.2 Port Control) That is to say, from now on, the device has this
MAC address can only plug in this specific LAN port of EKI switch, otherwise it
MAC Filtering:
By filtering MAC address, the switch can easily filter pre-configure MAC
address and reduce the un-safety. You can add and delete filtering MAC address. For
example, if my PCs MAC address, 00FF3837465F, has been added into the MAC
You can view the port that connected devices MAC address and related devices
MAC address.
5.2.5 Hands-On
Scenario: There are five ways to configure and monitor EKI managed switch, Web,
Telnet, SNMP, Utility, and Console. In this hands-on, we will teach you have to
Structure:
Material:
Procedure:
1. Connect the Console port (9-pin, DB9) of the EKI Switch to the RS-232 serial
port of your laptop (COM1). (The serial parameters are 9600, None, 8, 1)
3.
5. At the COM1 Properties dialog, make the following selections and click OK.
6.
7. Now, click Enter button on your keyboard, and see if there are some information
appear on your screen. At User Name: Type admin, hit enter. At Password: Type
8. For a list of commands: Type ?, hit enter. Enter Privileged EXEC mode: Type
10. We will use Show function: Type show? to display a list of functions that can be
shown.
11. We will use Show system IP information: Type show ip, hit enter. This displays
192.168.1.1.
Scenario: Use three EKI Management Switches to set up a basic X-Ring. Then,
connect two PC to two difference EKI switches. Use Ping command on one of the
PCs to ping the other one continueously. Then, disconnect any one of the LAN cable
Structure:
Material:
Procedure:
2. Enable the X-Ring and Ring Master for three EKI switches. Then, select Port9
3. The EKI switch that has the smallest MAC address will be selected to be the Ring
4. Circle the three EKI switches to a loop and connect another PC to the EKI switch.
5. Use ping on one PC to see if it can get the ack from the other PC.
6. Disconnect one of the cable and see whether the ping program faces error.
Advantech's Industrial Ethernet Media Converters are compact and robust devices
designed to convert and transmit Gigabit Ethernet or Fast Ethernet networks into
Based on different types of EKI media converter (EKI-2541 series and EKI-2741
series), there are two and four dip switch on the front panel of the module
respectively.
The Following is the description of the dip switch on EKI-2541 series modules.
The Following is the description of the dip switch on EKI-2741 series modules.
There is a built-in Relay on each EKI series module. The user can connect an
indicator, boozer, or other device to this Relay to monitor the status of the EKI
module. LFP (Link Fault Pass-Through): When LFP is enabled; it allows UTP link
failures to be reported to the fiber side and also allows Fiber link failures to be
reported to the UTP side. Therefore, an LFP feature is provided in both UTP and Fiber
side.
Link Fault Pass Through is usually used to solve the problem encountered when
operating traditional media converters. The problem is that when one side of the link
fails, the other side still continues to transmit packets, and waits for a response that
will never arrive. When the user enable the LFP function, it allows UTP link failures
to be reported to the fiber side and also allows Fiber link failures to be reported to the
UTP side. Therefore, an LFP feature is provided in both UTP and Fiber side.
Let user to switch the operation mode of Fiber Optic port manually to adapt to
When pure converter mode is enabled (on), it operates with the minimum latency.
The transmission flow does not wait until entire frame is ready, but instead it forwards
the received data immediately after the data being received. UTP port should be
forced at 100M in this application. When DIP Switch is in Switch Converter mode
Note: Please dont change the DIP-switch setting when UTP or fiber port is
transmitting or receiving data. It may cause some data error. Besides, if you change
the DIP-switch setting, please power off the converter and power on again to make
Chapter 6 Conclusion
products not only have the ability to connect sensors and I/O devices
from field sites and factories, but also provide an Ethernet backbone to