Industrial Communication Introduction

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 238
At a glance
Powered by AI
The document discusses industrial communication protocols, applications, and concepts such as serial communication, Ethernet communication, Modbus protocol, building automation, machine automation, power and energy systems, and transportation systems.

Some of the main industrial communication protocols discussed include Modbus protocol, serial communication protocols, and Ethernet communication protocols.

Some of the main applications of industrial communication mentioned include building automation, machine automation, power and energy systems, transportation systems, and environmental and facility management systems.

Industrial

Communication

Developed by Advantech IAG Training Center


(Internal Use Only)
I

Table of Contents

Table of Contents............................................................I

Chapter 1 Introduction...............................................1
1.1 Industry Overview..................................................................................1

1.2 Application Story...................................................................................3

1.2.1 Building Automation......................................................................3

1.2.2 Machine Automation......................................................................7

1.2.3 Power & Energy...........................................................................11

1.2.4 Transportation..............................................................................15

1.2.5 Environmental & Facility Management Systems.........................19

1.3 Learning Purpose..................................................................................23

Chapter 2 Basic Concept of ICOM Products.........25


2.1 Serial Communication..........................................................................25

2.1.1 Introduction..................................................................................25

2.1.2 Serial vs. Parallel..........................................................................26

2.1.3 Simplex, Half Duplex, Full Duplex.............................................30

2.1.4 Interface........................................................................................32

2.1.5 Modbus Protocol (Advanced)......................................................44

2.1.6 Data flow control..........................................................................50

2.1.7 Protection.....................................................................................51

2.1.8 Interface........................................................................................52

2.1.9 Quiz..............................................................................................59

2.2 Ethernet Communication......................................................................60

2.2.1 Introduction..................................................................................60
II

2.2.2 What is Ethernet? (Advanced).....................................................60

2.2.3 OSI Model (Advanced)................................................................63

2.2.4 Protocol (Advanced)....................................................................65

2.2.4.1 UDP..............................................................................................65

2.2.4.2 TCP...............................................................................................67

2.2.5 Ethernet Component.....................................................................70

2.2.6 Ethernet Topology........................................................................74

2.2.7 Ethernet Equipments....................................................................77

2.2.8 Speed............................................................................................79

2.2.9 Wireless........................................................................................82

2.2.10 Quiz..............................................................................................85

2.3 Products Selection Guide.....................................................................86

2.3.1 Plug-in ICOM Card......................................................................87

2.3.2 Serial Device Server.....................................................................89

2.3.3 Industrial Ethernet........................................................................92

2.3.3.1 Un-management Switch...............................................................93

2.3.3.2 Management Switch.....................................................................95

2.3.3.3 Media Converter...........................................................................96

Chapter 3 Functionality of Plug-in ICOM Card....99


3.1 Driver & Installation............................................................................99

3.1.1 PCI Interface..............................................................................100

3.1.2 ISA/PC-104 Interface.................................................................103

3.2 Utility..................................................................................................112

3.3 Practice...............................................................................................113

Chapter 4 Functionality of Serial Device Server..121


4.1 Virtual COM mode.............................................................................121

4.2 USDG mode.......................................................................................127


III

4.2.1 Peer-to-Peer................................................................................129

4.2.2 TCP Server (Polling Mode)........................................................129

4.2.3 TCP Client (Event Handling Mode)...........................................131

4.2.4 Control mode..............................................................................133

4.3 Modbus Data Gateway.......................................................................134

4.3.1 Modbus Slave Mode...................................................................135

4.3.2 Modbus Master Mode................................................................136

4.4 Wireless Device Server......................................................................137

4.4.1 Infrastructure Mode....................................................................138

4.4.2 Ad-Hoc Mode.............................................................................139

4.5 Utility & Driver..................................................................................140

4.5.1 EDG Configuration Utility.........................................................141

4.5.2 EDG II Configuration Utility.....................................................142

4.5.3 COM Port Mapping Utility........................................................143

4.5.4 Download and Test Utility.........................................................143

4.5.5 Serial Device Server Configuration Utility................................144

4.6 Practice...............................................................................................152

4.7 Hands-On...........................................................................................169

Chapter 5 Functionality of Ethernet Switch and

Media Converter........................................................173
5.1 Unmanagement Switch......................................................................173

5.2 Management Switch...........................................................................174

5.2.1 System Tool Box........................................................................176

5.2.1.1 System Information....................................................................176

5.2.1.2 IP Configuration.........................................................................177

5.2.1.3 DHCP Server..............................................................................178

5.2.1.4 TFTP Transaction.......................................................................180


IV

5.2.1.5 System Event Log......................................................................182

5.2.1.6 Fault Relay Alarm......................................................................185

5.2.1.7 SNTP..........................................................................................186

5.2.1.8 IP Security..................................................................................187

5.2.1.9 User Authentication....................................................................188

5.2.2 Port Tool Box.............................................................................188

5.2.2.1 Port Statistics..............................................................................189

5.2.2.2 Port Control................................................................................190

5.2.2.3 Port Trunk...................................................................................192

5.2.2.4 Port Mirroring............................................................................196

5.2.2.5 Rate Limiting..............................................................................197

5.2.3 Network Protocol.......................................................................198

5.2.3.1 VLAN.........................................................................................199

5.2.3.2 RSTP..........................................................................................205

5.2.3.3 SNMP.........................................................................................207

5.2.3.4 QoS.............................................................................................209

5.2.3.5 IGMP..........................................................................................215

5.2.3.6 X-Ring........................................................................................217

5.2.4 Security Tool..............................................................................224

5.2.4.1 802.1x/RADIUS.........................................................................225

5.2.4.2 MAC Address Table...................................................................228

5.2.5 Hands-On...................................................................................231

5.3 Media Converter.................................................................................240

Chapter 6 Conclusion.............................................244
1

Chapter 1 Introduction

1.1 Industry Overview

Industrial automation contains various types of automation, such as building

automation, machine automation, environment monitoring system automation, etc.

The overview is shown in Figure 1 -1.

Figure 1-1 eAutomation Overview

Advantech IAG Training Center (Internal Use Only)


2

Since the environment of industrial application is always tough, some

specifications, such as the temperature tolerance and vibration protection, are getting

more and more important. Thus, the companies, which develop the industrial

equipments, are focusing on the way to make the industrial computers and devices

more stable and flexible. For example, the industrial computer has more PCI slots so

that the customers can install more PCI cards to extend their applications. Or in

building automation system, there should be an industrial computer (ex: UNO series)

with remote IO modules (ex: ADAM-4000, 6000 series modules) to monitor whole

building status for security. In machine automation field, motion control plays an

important role. The machine designer must consider the motor moving theory and

machine protection. The most important thing in machine automation is how to

increase the rate of manufacturing process and prevent the machine mechanism from

damage in any situation or operation. In power and energy system, industrial devices

can provide the efficiency of saving power and provide the stable system to do power

and energy management. This textbook will focus on the base knowledge about

Industrial Communication system so that the users will know how to use ICOM

modules.

Advantech IAG Training Center (Internal Use Only)


3

1.2 Application Story

There are so many kinds of Industrial Communication applications that

implement Advantechs ICOM products. We will introduce the most popular

application stories about Industrial Communication in this section. After viewing

these applications, the readers will know more about Industrial Communication.

1.2.1 Building Automation

Security Complex System for Intelligent Residential Quarter

Project Introduction:

Intelligent residential quarters in China have been increasing in popularity since

their introduction in the 1980s, especially in the larger cities like Beijing and

Shanghai. Intelligent residential quarters are equipped with elevators, water & sewage

pumps, lighting, security and more. Automatic monitoring is necessary for ensuring

Advantech IAG Training Center (Internal Use Only)


4

safe operation at all times. An international intelligent residential quarter located in

Shanghai city uses Advantechs WebAccess as the kernel of its Building Automation

system.

System Requirements:

One of Chinas latest high-tech intelligent residential quarters is being touted as

providing the best in modern living. This large development required a reliable and

state-of-the-art equipment monitoring system to provide residential security

monitoring with real-time alarms. The contractors turned to Advantech, seeking a

reliable monitoring system that would enhance property management quality, reduce

labor intensity for the management staff, cut down the cost of property management,

and help to provide a safe and comfortable living environment for all residents.

Advantech IAG Training Center (Internal Use Only)


5

Figure 1-2 Project Implementation

System Description:

This equipment monitoring system for this intelligent residential quarter is

composed of an upper computer for monitoring, and a lower computer for control.

The upper computer includes the IPC-610H and Advantech WebAccess components;

while the lower computer includes the ADAM-4051 and its corresponding Modbus

Data Gateway module, EKI-1222. The WebAccess configuration of the system allows

it to communicate with sub-systems of the lower computer through different

communication protocols, thus creating an integrated system.

The perimeter alarm system: 24 couples of infrared alarm signals spread across

the Beautiful Garden are connected to the upper computer through two ADAM-

4051 modules and an EKI-1222 module via Modbus RTU universal protocol.

Gate guard: WebAccess acquires card reader data by accessing the SQL data

base of the sub-system.

Advantech IAG Training Center (Internal Use Only)


6

BA System: The web-enabled DDC controller of BAS-3520 and its expansion

module BAS-3050 is developed by embedding WebAccess through TCP/IP

protocol. Video monitoring: Integrating a PV-1000E Video/Audio Capture Card

into IPC-610H, allows it to act as a video server. WebAccess is integrated with a

video server so as to integrate the video monitoring screen.

Figure 1-3 System Diagram

Conclusion:

The equipment monitoring system of this intelligent residential quarter features

Advantech IAG Training Center (Internal Use Only)


7

simple wiring, convenient mounting, easy software configuration and reliability.

Efficient monitoring helps improve the living environment, greatly enhances the

property management quality, reduces the labor intensity of property management

staff, cuts down the cost of property management and provides comfortable living

environment for all residents.

1.2.2 Machine Automation

Human Machine Interfaces in Modern Oil Drilling & Data Collection

Project Introduction:

A mudlogger in the modern oil field gathers data and collects samples during the

drilling process. This information is then organized in the form of a graphic log. This

information (known as offset data) can provide valuable clues as to the

characteristics of the particular geo-strata that the rig crew is about to drill through.

Mudloggers have to connect various sensors to the drilling apparatus and install

specialized equipment before they can monitor or log drill activity. This can be

Advantech IAG Training Center (Internal Use Only)


8

quite strenuous and challenging, especially when having to be done during drilling

activity. Much of the equipment will require precise calibration or alignment by the

mudlogger to provide accurate readings.

System Requirements:

Mudloggers observe and interpret the indicators in the mud returns during the

drilling process. At regular intervals the mudlogger logs properties such as drilling

rate, mud weight, flow line temperature, natural gas content and type, oil indicators,

pump pressure, pump rate, litho logy (rock type) of the drilled cuttings, and various

other items of interest. The job of a mudlogger requires a good deal of diligence and

attention. Sampling the drilled cuttings must be performed at predetermined intervals,

and can be difficult during rapid drilling. Our customers specific requirements were

as follows:

Over 30 data parameters needed to be recorded and controlled

The device should be able to withstand the harsh conditions of a modern oil field

(intense electromagnetic interference, noise, vibration, unstable currents)

Distributed control on the mudlogging device should be implemented b advanced

Advantech IAG Training Center (Internal Use Only)


9

computer control technologies, so as to improve the control precision of all

technological parameters during the operation

Figure 1-4 Project Implementation

System Description:

The host panel PC on the electrical control cabinet of the mudlogging unit

implements functions of: 1) Detection processing; 2) Closed loop controlling; 3)

Graphic report forms; 4) Recording; 5) Online adjustment; 6) Printing; 7) Alarming;

8) Statistical analysis; 9) Historical documentation; 10) System safety; 11) Web

features; 12) User-friendly HMI. The sensor monitors accidents such as pierced pipes,

lost drills, lost bits, breaks, blowouts and slough. The monitoring parameters include:

drilling load, pick-up weight, weight on hook, torque, stack pressure and flow.

Advantech IAG Training Center (Internal Use Only)


10

Figure 1-5 System Diagram

Conclusion:

Adding Advantechs IPPC-9151G to this solution provided the following

advantages: touchscreen display, all-in-one design, robust and durable capability, a

wide temperature and humidity range, and rugged design that withstands

environmental conditions such as noise, high temperature, dust & vibration.

Intelligent control on the modlogging unit could be now implemented through the

IPPC-9151G, enhancing the control accuracy of each parameter, saving energy,

improving efficiency, lessening maintenance difficulty, strengthening project

Advantech IAG Training Center (Internal Use Only)


11

monitoring and accurately analyzing oil & gas status.

1.2.3 Power & Energy

Wind Power Turbine Control System

Project Introduction:

Conventional wind turbine controllers have only limited resources, and can only

offer restricted monitoring and diagnostic functions. System developers expect

controllers to not only monitor environmental conditions, temperatures and pressures

in the hydraulic system, including rotation speeds and vibrations, but also allow

remote management and diagnostics through a network.

System Requirements:

The customer required a controller that could receive wind data from an

anemometer, direct the nacelle and rotor blade in order to catch the wind, and brake

Advantech IAG Training Center (Internal Use Only)


12

the blades from moving too fast and becoming damaged, which led to the following

requirements:

An open PC-based control platform to provide compatibility with various I/O

peripherals and unexpected application adjustments

A compact system that could fit into space limited towers, and also had front

accessible I/Os

Sufficient processing power

No moving parts, wide operating temperature range, shock and vibration

tolerance

Embedded OS for real-time control

Advantech IAG Training Center (Internal Use Only)


13

Figure 1-6 Project Implementation

System Description:

The UNO-1150 is installed inside the wind power turbine. Hundreds of I/O

distributed over the nacelle, such as wind speed and direction were passed to the

UNO-1150 controller. The environmental conditions, temperatures and pressures in

the hydraulic system, rotation speeds and vibrations are all monitored. The UNO-1150

also processes this information and can quickly adjust the rotor blade to the available

wind. However, when the wind is too strong, the UNO-1150 can engage the brake to

stop the rotor blade from damaging. The embedded OS in the system ensures the

general control and regulation lies in the real time time range. The UNO-1150 also

links to the main monitoring network and frequency converter monitors. The

information in the nacelle could be transferred via Ethernet, fiber optic or serial COM

Advantech IAG Training Center (Internal Use Only)


14

port. This shows the implementation flexibility and the reliability of the UNO-1150

about the information redundancy.

Figure 1-7 System Diagram

Conclusion:

The UNO-1150 is a compact system with open PC-based control platform. It is

designed fanless, and cableless for harsh, varied environments with a wide range

temperature. The high vibration and shock tolerance caused by the blade rotation was

within the tolerance of range of UNO-1150. These features not only increase

Advantech IAG Training Center (Internal Use Only)


15

reliability but also reduce the costs of maintenance. From the implementation point of

view, the front access I/O design saves the time on integration and wiring. The DIN-

rail mounting form factor makes the UNO controller easily align together with other

device such as BUS coupler or Fieldbus circuit without occupying extra space. The

x86 computer architecture extends the possibility for future application adjustment

and I/O enhancement without a lot of integration effort.

1.2.4 Transportation

Automated Scheduling System for Hydroelectric Power Stations

Project Introduction:

To meet the growing challenges of increasing highway traffic worldwide, more

sophisticated Intelligence Transportation Systems are needed. The latest automation

products can greatly help improve efficiency and safety on highways worldwide. By

adopting Advantech eAutomation products as the heart of their signal control system,

Taiwans National Freeway Bureau now has an intimate understanding of their

Advantech IAG Training Center (Internal Use Only)


16

freeway traffic flow situations, and can use this information to make sure that all

traffic is flowing smoothly, helping people get to their destinations faster and safer

than before.

System Requirements:

As the worlds population expands, the amount of vehicles and traffic on roads

worldwide is increasing exponentially. This requires Intelligent Transportation

Systems to evolve, become more complex, and be able to provide accurate real time

traffic information to drivers, which can also take into account the weather,

emergencies, and speed limits. In an effort to upgrade their intelligent transportation

systems, Taiwans National Freeway Bureau turned to Advantech for products to help

them monitor, manage, and maintain control on their roadways nationally. Aside from

the strict demands they had on the products they needed to complete this project, they

also required rugged and powerful components which could adapt to the harsh and

critical environments of Taiwans roadways.

Advantech IAG Training Center (Internal Use Only)


17

Figure 1-8 Project Implementation

System Description:

The goal of an efficient traffic flow system is to display the real-time traffic and

weather situation for drivers. The remote control room needs to gather the weather

information, taking into account variables such as wind speed, wind direction, and

rain fall through outdoor weather sensors. They are connecting to ADAM-5510M by

RS-232 then the data will transfer to Ethernet packet and send back to the remote

control room. Afterwards, the remote control room will obtain the remote weather

information and send instant traffic information to the remote outdoor display boards

via UNO-2171/2172. Due to the fact that the transmission distance is more than 2km,

the EKI-2541S (an industrial-grade Ethernet to single-mode fiber optic media

converter) is required to convert the Ethernet signals to single mode fiber optic which

can extend the transmission distance up to 30km.

Advantech IAG Training Center (Internal Use Only)


18

Figure 1-9 System Diagram

Conclusion:

Taiwans National Freeway Bureau improved highway efficiency, and created a

safer driving environment

Traffic information display boards now contain more accurate and up-to-date

information for drivers

The EKI-2541S allowed the traffic data to easily be converted into fiber optic

signals for long-distance transmissions

Advantech IAG Training Center (Internal Use Only)


19

1.2.5 Environmental & Facility Management Systems

Self-Service Book Borrowing and Returning System

Project Introduction:

Recently libraries have been extending beyond the physical walls of a building,

by including material accessible by electronic means. Library 2.0, a term coined in

2005, is the librarys response to the challenge of Google, and an attempt to meet the

changing needs and wants of the users, using Web 2.0 technology. Some aspects of

Library 2.0 include commenting, tagging, bookmarking, discussions, using social

software, plug-ins, and widgets. Inspired by Web 2.0, it is an attempt to make the

library a more user-driven institution.

System Requirements:

One of Koreas top vending machine makers wanted to leverage RFID (Radio

Frequency Identification) to design a modern self-service book borrowing and

returning system. The idea was that customers reserve a book through the librarys

website, choose the location to physically pick up the book, and the computer would

Advantech IAG Training Center (Internal Use Only)


20

provide the customer with a special barcode that they should print out and bring with

them. The customer then simply goes to the assigned location, shows the printed

barcode information to the vending machine, and the reserved book would show up

automatically. Customers could also return the book to any applicable vending

machine, and due to the fact that all books are tagged with an RFID, the librarys

website and vending machine system can deliver and trace all the books

automatically. To complete this project, they required:

Compact digital I/O modules with a built-in wiring terminal block

Easy to mount

Firm cable connection

Figure 1-10 Project Implementation

Advantech IAG Training Center (Internal Use Only)


21

System Description:

In this solution, the USB-4751 is setup to control the drawer switches when the

information is retrieved from the barcode/RFID readers. Alternately it can sense

which drawer is not occupied for customers to return their books. The USB-4622 acts

as a USB hub to gather all the necessary information. The industrial display interacts

automatically with customers, which is considerably time-saving and cost-saving.

Figure 1-11 System Diagram

Conclusion:

This system is the first library 2.0 system in Korea, and was integrated with an

Advantech IAG Training Center (Internal Use Only)


22

online shopping business model, RFID and vending machine technology. Not only

was the manufacturer able to save cabling and installation efforts, but also a lot of

maintenance effort by leveraging Advantechs DiagAnywhere utility. All of the

vending machines operations can be monitored remotely from the central control

room.

1.3 Learning Purpose

The purpose of this ICOM textbook is to assist the users to learn the basic

concept of Industrial Communication and know how to use Advantech ICOM

modules. Further, the author mentions lots of basic knowledge of some Serial and

Ethernet devices and equipments in this text book. After reading this text book, the

reader not only will be able to read and understand the specification of ICOM

products, but also will have basic skill to operate Advantech ICOM products.

Advantech IAG Training Center (Internal Use Only)


23

Advantech IAG Training Center (Internal Use Only)


24

Chapter 2 Basic Concept of ICOM

Products

In order to know more about ICOM Products, this chapter will introduce the

basic knowledge of Serial and Ethernet communication. It will let users know more

about the operation principle of ICOM products.

2.1 Serial Communication

2.1.1 Introduction

Before learning about the Advantech ICOM products, you need to have some

Advantech IAG Training Center (Internal Use Only)


25

basic knowledge of serial communication. In this chapter, you will learn what are

serial and parallel communication, the differences between RS-232/422/485, some

serial protocols, and so on.

2.1.2 Serial vs. Parallel

To introduce the Serial Communication, I would like to show you two

applications to illustrate:

In the factory automation field, the customers hope the control system can be

apart 1200m from the sensor. For IO card, because the distance is too far, the signal

will be interfered with noises or decay. Therefore, users cannot measure the precise

value as they wish.

Measuring with a DAC Card:

Advantech IAG Training Center (Internal Use Only)


26

Figure 2-12

To solve the distance issue, we can utilize the Remote I/O modules nearby the

devices, and through serial communication to get the most correct data.

Measuring with a Remote I/O Module:

Figure 2-13

Advantech IAG Training Center (Internal Use Only)


27

So, what is serial communication exactly?

The serial communication is the process of sending data one bit at one time,

continuously, over a communication port or computer bus.

Figure 2-14 Transfer the data bit by bit

The following is the three most popular serial communication interfaces.

Advantech IAG Training Center (Internal Use Only)


28

Figure 2-15 The Most Popular 3 types of Serial Communication

In contract to serial communication, parallel communication is a process of

sending several data together (on a link comprising of several wired channels in

parallel).

Advantech IAG Training Center (Internal Use Only)


29

Figure 2-16 Transfer all data simultaneously

At first sight it would seem that a serial link must be worse than a parallel one,

because serial link can transmit less data on each clock tick. However, it is often the

case that serial links can be clocked considerably faster than parallel links, and

achieves a higher data rate. In addition, serial link is cheaper than parallel to

implement because parallel link requires more numbers of wires, and the IC design of

serial chipset is easier than parallel chipset because serial has fewer pins.

In conclusion, that is why serial communication is much more popular in the

modern industrial application.

2.1.3 Simplex, Half Duplex, Full Duplex

Now, we will introduce 3 types of communication operation types Simplex,

Half-Duplex, and Full-Duplex communication.

Advantech IAG Training Center (Internal Use Only)


30

Simplex Communication:

Figure 2-17 Simplex Communication

Data flow in a simplex channel is always in one way. Simplex channels are not

often used because it is not possible to send back error or control signals to the

transmit end. The examples of simplex are broadcasting, or Radio.

Half-Duplex Communication:

Figure 2-18 Half-Duplex Communication

A half-duplex channel can send and receive, but not at the same time. It is like a

one-lane bridge where two-lane traffic must give way in order to cross. Only one end

transmits at a time, the other end receives. The examples of half-duplex are talk-back

radio, RS-485.

Full Duplex Communication:

Advantech IAG Training Center (Internal Use Only)


31

Figure 2-19 Full-Duplex Communication

Data can travel in both directions simultaneously. There is no need to switch

from transmit mode to receive mode as in half duplex. It is like a two-lane bridge on a

two-lane highway. Have you ever watched these television talk shows where the host

has a number of people on the show, and they all try to talk at once. Well, thats full

duplex! The examples of full-duplex are RS-232, RS-422, and telephone.

2.1.4 Interface

After introducing Simplex, Half-Duplex, and Full-Duplex communication, right

now I would like to introduce RS-232, RS-422, and RS-485 serial protocol.

RS-232:

The features of RS-232:

Full-Duplex Operation

Single-Ended (No noise rejection)

Short transmission distance (within 15m)

Advantech IAG Training Center (Internal Use Only)


32

Low transmission speed (within 115.2kbps)

Protocol:

a. Point-to-point: Handle communication between 2 devices.

b. Unbalanced lines (Single-ended): Signal is applied to one line and referenced to

ground.

c. Most common use as a communication device for a Serial port of the PC and

peripherals

Figure 2-20 Single-Ended Singling

For Single-Ended signaling (See Figure 3.9), the voltage signal goes through

three wires: Rx, Tx, GND. The ground is always the ground and will not be changed

by other signal. That is too say, only the Tx and Rx wires signal will be interfered by

certain noises, or will decay due to long distance transmission. If the transmission

distance is over 15m, the receiver will probably be hard to distinguish from high or

low of the receiving signal.

For instance, the standard RS-232, which uses Single-Ended signaling to

Advantech IAG Training Center (Internal Use Only)


33

transmit signals, requires the transmitter to use +12V and -12V, but requires the

receiver to distinguish voltages as low as +3V and -3V. Whenever the receiver

receives a signal that higher/lower than +/-3V, it will regard the signal as a high

signal, otherwise it will regard as a low signal. Some manufacturers therefore build

transmitters that supplied +5V and -5V. After a long distance transmission, +/-5V

signal might decay to the signal under +/-3V (For example, +/-1.5V). Consequently,

the receiver is unable to distinguish the high or low status of the signal and causes

data error. However, RS-232 is still commonly used in computer serial ports in short

distance transmission application.

Basically, the pin assignment of RS-232 is standardized. Most of the manufactories

follow this standard to design their RS-232 serial COM ports.

Figure 2-21 RS-232 Pin Assignment

Advantech IAG Training Center (Internal Use Only)


34

Transmitted Data (TxD): Data sent from DTE to DCE

Received Data (RxD): Data sent from DCE to DTE

Request To Send (RTS): DTE informs DCE of preparing for receiving data. DTE

will send RTS signal to DCE that it has data to send. DCE will take action to send

CTS (Clear To Send) signal or to reverse the direction of a half-duplex channel. For

the modern usage of RTS, please refer to the below RTS/CTS handshaking part.

Ready To Receive (RTR): The same pin with RTS. Asserted by DTE to indicate

DCE that DTE is ready to receive data.

Clear To Send (CTS): Claimed by DCE to inform RTS and to allow DTE

transmitting data. This signaling was originally used with half-duplex modems and by

slave terminals on multi-drop lines: The DTE would raise RTS to indicate that it had

data to send, and the modem would raise CTS to indicate that it is feasible to send.

Data Terminal Ready (DTR): Claimed by DTE to inform that it is ready to be

connected. If the DCE is a modem, this may "wake up" the modem, bringing it out of

a power saving mode. This behavior is usually applied to the modern PSTN and GSM

modems. When this signal is disclaimed, the modem will return to the standby mode,

immediately hanging up any calls in progress.

Data Set Ready (DSR): DCE will send DSR signal to indicate DCE has been

powered on and is ready to receive commands or data for transmission from the DTE.

Data Carrier Detect (DCD): Claimed by DCE when a connection has been

Advantech IAG Training Center (Internal Use Only)


35

established with remote equipment.

Ring Indicator (RI): Claimed by DCE when it detects a ring signal from the

telephone line.

Two RS-232 devices can communicate with each other only by connecting Rx,

Tx, GND pins. The user can connect the rest of the pins to employ the hand-shaking

function to ensure the correction of the link between DCE and DTE. For example, by

employing RTS and CTS signals, DTE and DCE can confirm the status of each other

and then send/receive data in the correct time.

Figure 2-22 Hand-Shaking Wiring Diagram

The Applications for RS-232:

PCs and Laptops

Advantech IAG Training Center (Internal Use Only)


36

Point of Sales Equipment (POS)

PDAs and GPSs

PC Peripherals (printers, faxes, mouse, etc.)

Barcode Reader

Figure 2-23 RS-232 Applications

RS-485:

RS-485 (EIA-485) is an electrical specification of a two-wire, half-duplex,

multipoint serial communications channel. It is the most popular electrical

specification in the industrial field as well.

RS-485 has the following features:

Half-Duplex Operation

Differential (Noise rejection and cross wire)

Long transmission distance (Up to 1200m(4000 feet))

High transmission speed (35 Mbps up to 10m and 100 kbps at 1200m)

Multi-Drop Network (Driving up to 32 devices)

Cost Effective (Two wires only)

Advantech IAG Training Center (Internal Use Only)


37

Easy to setup and maintain

Figure 2-24 Differential Signaling

Differential signaling is a method of transmitting information electrically by

means of two complementary signals sent on two separate wires. The Receiving

Device would read the difference between the two signals. Since the receiver does not

refer to the ground, small changes in ground potential between transmitter and

receiver do not affect the receiver's ability to detect the signal. Since RS-485 uses

differential balanced line over twist pair (Figure3.13), the maximum communication

distance of it is up to 1200M (4000feet).

There are several methods to enhance the quality of RS-485 communication:

Use STP (Shielded Twist Pair): To cancel the electromagnetic interference from

external sources.

Terminal Resistor: When the distance of RS-485 is too long or there are too

Advantech IAG Training Center (Internal Use Only)


38

many connected modules in RS-485, it is need to put a terminal resistor ( 120

is suggested) at the both end of the RS-485. Because when the data reach the end

of RS-485, there will be a reflect signal, and the reflect signal would be a noise

signal which can influence the original signal. The function of the terminal

resistor is to eliminate the reflect signal.

Figure 2-25 Reflect Signal

Repeater: The ADAM-4510I repeaters simply amplify, or boost, existing RS-485

signals to enable them to cover longer distances. For example, if the original

signal is +5V, after a long distance transmission the signal has decayed as +3.5V.

When this signal arrives a repeater, the repeater will strengthen the voltage of

this signal and let this signal can be transmitted further.

Advantech IAG Training Center (Internal Use Only)


39

Figure 2-26 RS-485 Wiring Diagram

The Applications for RS-485:

Point of Sales Equipment (ex. Remote price checker)

Control System Automation (ex. PLC)

Power/Gas Meters

Figure 2-27 Applications of RS-485

RS-422:

The electrical specification of RS-422 is similar to RS-485 protocol.

The key differences between them are:

One driver only can connect up to 10 receivers

Advantech IAG Training Center (Internal Use Only)


40

RS-422 uses Full-Duplex communication (Rx+, Rx-, Tx+, Tx-)

High Transmission Rate: 10 Mbit/s at 12 meters (40 ft)

Figure 2-28 The Comparison Sheet of RS-232/422/485

Current loop:

For digital serial communications a current loop is a communication interface

that uses current instead of voltage for signaling. Current loops can be used over

moderately long distances (tens of kilometers), and can be interfaced with optically

isolated links. Analog current loops are used where a device must be monitored or

controlled remotely over a pair of conductors. Only one current level can be present at

any time.

A big benefit of the current loop is its simple wiring just the two wires. The

Advantech IAG Training Center (Internal Use Only)


41

supply voltage and measuring current are supplied over the same two wires. Zero

offset of the base current (i.e. 4mA) makes cable break detection simple: If the current

suddenly drops to zero, you have a cable break. In addition, the current signal is

immune to any stray electrical interference, and a current signal can be transmitted

over long distances.

Figure 2-29 Typical Wiring of Current Loop

Figure 2-30 Multi-instrument 4.20mA current loop with panel meter,

chart recorder, computers, etc.

CAN:

Advantech IAG Training Center (Internal Use Only)


42

The CAN (Controller Area Network) is a serial bus system especially suited for

networking "intelligent" I/O devices as well as sensors and actuators within a machine

or plant. Characterized by its protocol, real-time capability, error correction, high

noise immunity, the CAN serial bus system, originally developed by Bosch for use in

automobiles, is increasingly being used in industrial automation.

Figure 2-31 Bus Topology

2.1.5 Modbus Protocol (Advanced)

It is 1979 when PLC manufacturer Modicon published the Modbus

Advantech IAG Training Center (Internal Use Only)


43

communication interface for a multi-drop network based on master/client architecture.

Communication between the Modbus nodes was achieved with messages. It was an

open standard that described the messaging structure. The physical layer of the

Modbus interface was free to choose, RS-232RS-485Ethernet.

The nice thing of the standard Modbus is the flexibility, but at the same time the easy

implementation of it. Not only intelligent devices like microcontrollers, PLCs etc. are

able to communicate with Modbus, also many intelligent sensors are equipped with a

Modbus interface to send their data to host systems. Advantech ADAM modules also

support Modbus protocol, While Modbus was previously mainly used on wired serial

communication lines, and there are also extensions to the standard for wireless

communications and TCP/IP networks.

Modbus Frame Format:

It is important to understand the encapsulation of a Modbus request or response

carried. A complete command is consisted of command head and command body. The

command head is prefixed by six bytes and responded to pack Modbus format; the

command body defines target device and requested action. Following example will

help you to realize this structure quickly.

The following picture shows the Modbus Frame structure of Request command.

Advantech IAG Training Center (Internal Use Only)


44

In the Command Body:

Byte 6: Device Address.

Byte 7: Modbus Function Code

Byte 8, 9: Start Address

Byte 10, 11: Request Number of read Register

Figure 2-32 Request Structure

The following picture shows the Modbus Frame structure of Response Message.

Advantech IAG Training Center (Internal Use Only)


45

Figure 2-33 Response Structure

In the command body, the definition of the function code as the picture below.

Figure 2-34 Modbus Function Code

For example:

Function Code 01

The function code 01 is used to read the discrete outputs ON/OFF status of an

ADAM module in a binary data format.

Advantech IAG Training Center (Internal Use Only)


46

Request: 03 01 00 17 00 08

Read coil number 17 to 24 (address number 00017 to 00024) from ADAM module

with address =3

Figure 2-35 Request message format for function code 01

Response: 03 01 01 42

Coils number 00018 and 00023 are on, all others are off.

In the response the status of coils status is shown as a byte value 42 hexadecimal,

equal to 0100 0010 binary.

Figure 2-36 Response message format for function code 01

Function Code 03/04

Advantech IAG Training Center (Internal Use Only)


47

The function code 03 or 04 is used to read the binary contents of input registers

Request: 01 04 00 01 00 02

Read Analog inputs #1 and #2 in addresses 40001 to 40002 as floating point

value from ADAM module with address=1

Figure 2-37 Request message format for function code 03 or 04

Response: 01 04 04 42 C8 AE 5D

Analog input #1 and #2 values where

AI#1=17096 ( Dec ) => 42 C8 ( Hex )

AI#2=44637 ( Dec ) => AE 5D ( Hex )

Figure 2-38 Response message format for function code 01

2.1.6 Data flow control

Advantech IAG Training Center (Internal Use Only)


48

The RS-485 standard supports half-duplex communication. This means that both

two wires are needed when transmitting or receiving data. Handshaking signals (such

as RTS, Request To Send) are normally used to control the direction of the data flow.

However, a special I/O circuit in Advantechs RS-485 products (Plug-in

ICOM cards, ADAM I/O modules, UNO, etc.) will automatically sense the

direction of the data flow and switches the transmission direction. No

handshaking signal is necessary. So you can build an RS-485 network with just two

wires. This RS-485 control is completely transparent to the user.

If a half-duplex COM port doesnt have a build-in hardware auto flow control

mechanism or hand-shaking pins, the user needs to use software to control the data

flow. It will be more complex.

2.1.7 Protection

A. Isolation

The usage of Opto-isolator (Photocoupler) is to isolate the electric signal and

uses a short optical transmission path to transfer a signal between elements of a

circuit. Separate of circuit can prevent the abnormal signal from influencing the whole

system. It is for continuous high voltage protection

Advantech IAG Training Center (Internal Use Only)


49

Figure 2-39 Isolation Protection- Photo Couple

B. EFT Surge protection

EFT (Electrical Fast Transient, or Burst) Surge protection is to protect the parts which

are connecting with the input signal. We need it in case the input signal is with an

electrical burst which will damage the receiver. It is for sudden high voltage

protection.

Advantech IAG Training Center (Internal Use Only)


50

Figure 2-40 EFT Surge Protection

2.1.8 Interface

ISA/PC-104:

The 16-bit ISA interface is defined by the IBM PC/AT and it is also called the AT

Bus. Its data transfer rate is only 8.33MHz which is 16.66Mbytes/s (8.33MHz * 2

bytes). And the most significant feature of the ISA interface is that it cannot support

PnP (Plug and Play) function, so we have to configure the setting in the software to

make sure it is corresponding to the setting on the hardware. By the way, since the

performance and transfer quality of the ISA bus are worse than the PCI bus, it is

Advantech IAG Training Center (Internal Use Only)


51

replaced by the PCI, AGP, and USB interface gradually.

Figure 2-41 The 16-bit ISA bus

The following PCL-746+ is one of our famous ISA ICOM products. It is an ISA

card which can create four RS-232/422/485 ports on your PC, and we have to set the

base address or IRQ jumper manually on the card for the device configuration.

Figure 2-42 PCL-746+ (4-port RS-232/RS-422/RS-485 Interface Card)

PCI/PC-104+:

Advantech IAG Training Center (Internal Use Only)


52

The Peripheral Component Interconnect interface which means PCI is the most

common interface in modern computer. It had displaced the ISA bus as the standard

expansion bus. Compare to the ISA bus, there are several superiorities for the PCI

bus. For instance, the data transfer rate for the 32-bit PCI standard bus can be as high

as 133Mbytes/s (33MHz), and the PCI bus can support PnP function so that the

system will configure the device setting automatically. Besides, most of the PCI bus

can support either 5V or 3.3V power suppliers (lower than ISA bus) which we usually

call the Universal Bus. Please refer to the Figure 3-4 to find the difference between

the 5V board and 3.3V board.

Figure 2-43 The Universal Bus and the difference between the 5V board and 3.3V

board

The following PCI-1620CU is one of Advantech PCI ICOM cards that can create

Advantech IAG Training Center (Internal Use Only)


53

four RS-232/422/485 serial COM ports.

Figure 2-44 PCI-1620CU (4-port RS-232/422/485 Universal PCI COMM Card)

Compact PCI:

The Compact PCI (CPCI) interface which is defined by the PICMG (PCI

Industrial Computers Manufactures Group) is electrically a superset of desktop PCI

interface with a different physical form factor. The CPCI interface utilizes the Euro

card form factor popularized by the VME bus (Versa Module European bus) and is

usually defined for both 3U (160mm deep * 100mm high) and 6U (160mm deep *

233.35mm high) card sizes.

Advantech IAG Training Center (Internal Use Only)


54

Figure 2-45 The 3U Socket connector

The data transmitting rate for the 32-bit CPCI bus is 133Mbytes/s (33MHz) and

can also support 256 buses as well as the PCI bus. In addition, the CPCI has the

staged power pins for Hot Swap capability, and the excellent shock and vibration

resistance characteristics which can be used in critical applications. Some CPCI cards

are also has the user I/O connections on front or rear of the module. The following

MIC-3620 can create 8 RS-232 serial COM ports.

Figure 2-46 MIC-3620 (8-port RS-232 Communication Card)

Advantech IAG Training Center (Internal Use Only)


55

USB:

Up to now, the Universal Serial Bus (USB) interface is becoming popular and

has replaced many legacy varieties of the serial and parallel ports. It is because most

of the USB devices are small and are convenient to carry, and they are usually low-

consumption of the power. The USB interface can also support PnP and Hot Swap

function so that we can connect the USB device without turning off the computer.

Besides, the USB interface can be easily to expand by using the Hub device and it can

connect up to 127 USB devices on one computer. So far the data transfer rate of the

USB interface can be up to 480Mbit/s (USB 2.0, High-Speed) and it is 40 times faster

than the data transfer rate of USB1.1 (12Mbit/s for Full Speed devices, 1.5Mbit/s for

Low Speed) around 10 years ago.

Figure 2-47 The USB series A plug

Advantech IAG Training Center (Internal Use Only)


56

The following USB-4604BM is a USB-to-Serial Converter. It can convert one USB

port to four RS-232/422/485 serial COM ports.

Figure 2-48 USB-4604BM (4-port USB-to-Serial Converter)

2.1.9 Quiz

1. ( ) Which serial communication protocol can NOT support Full-Duplex operation

principle?

(a)RS-232 (b)RS-422 (c) Two-wire RS-485 (d) All

2. ( ) The customer informs us that PC sometimes receives wrong data from the

devices with RS-485 communication protocols; we could suggest the

customer to add what component to reduce the distortion of signal?

(a)FIFO (b)Hub (c)Switch (d)Terminal resistor

Advantech IAG Training Center (Internal Use Only)


57

3. ( ) How many receivers can one driver connect with in RS-485 protocol?

(a)1 (b)10 (c)16 (d)32 Receivers

4. ( ) If you want to check the unoccupied IO address & IRQ, where can you go?

(a)Windows Media Player (b)Hyper Terminal (c)Windows Device Manager

(d)Users and Passwords

5. ( ) Which method can NOT prevent the serial communication from data loss?

(a)Add Terminal Resistor (b)Increase baud rate (c)Add parity check (d)Use

hand-shaking

6. Please describe the characteristic of Half-Duplex.

7. Please describe the characteristic of Full-Duplex.

8. RS-485 uses multi-drop connection. When there is more than one device in the RS-

485 connection, how does the client identify each of the modules?

2.2 Ethernet Communication

2.2.1 Introduction

The purpose of this section is to introduce some basic knowledge of Internet that

related to Advantechs ICOM products, such as TCP, UDP, Fiber Optic, etc. This will

Advantech IAG Training Center (Internal Use Only)


58

help you to understand the specification and features of Advantechs ICOM products

more easily.

2.2.2 What is Ethernet? (Advanced)

Ethernet was originally developed at Xerox and then was standardized by the

DIX association. (Including DEC, Intel, and Xerox) Afterward, the DIX association

transferred the patent right to the IEEE (Institute of Electrical and Electronics

Engineers) and therefore the Ethernet was no long belong to one certain company.

Therefore, many companies were willing to support and develop the Ethernet product

and consequently the Ethernet became the most common type of the LAN today.

Ethernet is a system consists of two or more autonomous computers/equipments

interconnected by transmission media (e.g., coaxial cable, fiber, twisted pair,

microwave, etc.). Ethernet originally used a shared coaxial cable (the shared medium)

winding around a building or campus to every attached machine. Ethernet utilizes

carrier sense multiple access with collision detection (CSMA/CD) to govern the way

the computers shared the channel. This scheme was simpler than the competing token

ring or token bus technologies. When a computer wanted to send some information, it

uses the following script:

Advantech IAG Training Center (Internal Use Only)


59

CSMA/CD (Carrier Sense Multiple Access/ Collision Detection):

Carrier Sense: The Network member verifies the absence of other traffic before

transmitting on a shared transmission medium, such as an electrical bus, or a band of

the electromagnetic spectrum.

Multiple Access: The fact that multiple stations send and receive packages on the

medium. Transmissions by one node are generally received by all other stations using

the medium.

Collision Detection: If more than one Network members start transmitting data

simultaneously, a data collision will occur. The transmitting members will detect the

collision and terminate the transmission. A back-off strategy determines when the

members can retry the data transmissions.

Advantech IAG Training Center (Internal Use Only)


60

Figure 2-49 CSMA/CD Scenario

2.2.3 OSI Model (Advanced)

Many People have heard about OSI Model (Open System Interconnection

Model), but some of them do not know the purpose of it. I will take a simple example

to illustrate.

Suppose Mr. Chen is the project manager of a certain community development

project. He needs to report the background, feature, and the design concept of the

Advantech IAG Training Center (Internal Use Only)


61

whole project in the meeting. If Mr. Chen only reports orally and just uses the reading

report, the reaction of audiences would be very flat even if Mr. Chens expressiveness

is good. It is due to the content of Mr. Chens presentation is very abstract, so every

audience would has different imagination and consequently has less response.

On the contrary, if the Mr. Chen can make a real community model and use this

model to illustrate each item, the audiences would have more positive feedback

because they can understand the advantages of the whole design more concretely.

By referring to the above example, a proper model can make a complex thing more

concrete and simple. The OSI model is used to do this task.

International Organization for Standardization, ISO, announced the OSI model in

1984 and divided the whole Internet system into seven layers, each layers has its

specific tasks:

Advantech IAG Training Center (Internal Use Only)


62

Figure 2-50 OSI Model

In sum, the benefits of OSI model are listed below:

- Reduces complexity

- Standardizes interfaces

- Facilitates modular engineering (To work together on a project but doing

different things)

- Simplifies teaching and learning

Advantech IAG Training Center (Internal Use Only)


63

- Easy troubleshooting

As for the task of each layer, we do not mention it in this text book. Please refer to

other professional Network textbook or website.

2.2.4 Protocol (Advanced)

2.2.4.1 UDP

User Datagram Protocol (UDP) is one of the core protocols of the Internet

Protocol Suite. It has the following two features:

1. UDP uses ports to allow application-to-application communication. The port field

includes 16-bit data, which includes the source port number and the destination port

number, allowing for data to be transferred to the correct application.

2. Connectionless transmission property. On one hand, this feature can simplify the

process of data transmission. On the other hand, it lowers the reliability of the

transmission. If certain errors occur during the transmission process, UDP will not

re-send the data because UDP doesnt have confirmation and re-send features.

Advantech IAG Training Center (Internal Use Only)


64

What is the purpose of using UDP?

1. To decrease the loading of PC resource. Take the DNS server (Domain Name

Server) as the example, the server may face a bound of queries from the clients. If

DNS uses TCP, it needs to take much PC resource; therefore, DNS uses UDP as

its communication protocol.

2. Time-sensitive applications often use UDP because dropped packets are preferable

to delayed packets. UDP's stateless nature is also useful for servers that answer

small queries from huge numbers of clients.

3. UDP is compatible with packet broadcast (sending to all on local network) and

multicasting (send to all subscribers), whereas TCP only supports unicast (point-

to-point).

Advantech IAG Training Center (Internal Use Only)


65

Figure 2-51 UDP Package Structure

2.2.4.2 TCP

Comparing with UDP, TCP provides more functionality, but the header and the

operating mechanism is more complex. It has the following features:

1. Connection Oriented. TCP is a connection-oriented protocol. The Connection-

Oriented means that before the application transmits the packets via TCP, it has to

make a TCP connection in advance and bases on this connection to send packets.

2. Data Flow Control. Due to the diversity of hardware and software, every PC has

Advantech IAG Training Center (Internal Use Only)


66

different efficiency. Therefore, TCP will use its data flow control function to adjust

the transmission rate and to attempt to decrease the data lost

3. Arrival confirmation and re-send. Through the intercommunication with TCP

destination, TCP source can confirm that the TCP destination has received the

complete and correct data. Otherwise, TCP source will use the re-send mechanism

to re-send the data.

Arrival Confirmation Process:

a. A sends a packet1 to B and starts counting for the ACK from B.

b. After receiving the Packet1, B will send ACK1 back to A. The content of ACK1

is I got the Packet1.

c. If A receives ACK1 within the estimated time of arrival, it can confirm that the

Packet1 was sent to B successfully. Then A will send the Packet2 to B.

d. After receiving the Packet2, B will send ACK2 back to A. The content of ACK2 is

I got the Packet2.

Advantech IAG Training Center (Internal Use Only)


67

Figure 2-52 Use Confirmation to Confirm the Arrival of the Destination

Re-Send Process:

If the A doesnt receive the ACK2 from B within the estimated time of arrival, it

will re-send Packet2 again.

Figure 2-53 Re-Send Process

Advantech IAG Training Center (Internal Use Only)


68

2.2.5 Ethernet Component

Wired Communication Interface:

Twist Pair: Twist pair is popularly used to decrease the phenomenon of the

Electromagnetic Interference (or EMI, also called radio frequency interference or

RFI) that generated by the copper wires while the electrical data is transmitted via the

copper wires. More twists can have more effective performance against interference.

Figure 2-54 Twist Pair

Basically, we can divide twist pair into two types: UTP (Unshielded Twist Pair)

and STP (Shielded Twist Pair). Either of them has its own feature:

STP: The main feature of STP is that there is a copper net or metal net between the

internal twist pair and the external plastic skin

UTP: There is no copper net or metal net between the internal twist pair and the

Advantech IAG Training Center (Internal Use Only)


69

external plastic skin; therefore UTP is unable to resist the external electromagnetic

interference. However, the UTP

Fiber Optic:

There are two kinds of fiber optic cables and three kinds of fiber optic connectors

appearing in the datasheet and manual of Advantechs ICOM products.

Cables:

Multi-Mode Fiber Optic Cable (MM Fiber): There are two common sizes of the core

and cladding diameter of MM Fiber: 62.5/125 m and 50/12 m. 62.5/125 m means

that the cable has a core size of 62.5 micrometers (m) and a cladding diameter of

125 m. For many years 62.5/125 m and conventional 50/125 m multi-mode fiber

were widely deployed in premises applications. These fibers easily support

applications ranging from Ethernet (10 Mbit/s) to Gigabit Ethernet (1 Gbit/s) and,

because of their relatively large core size, were ideal for use with LED transmitters.

The transmitting wavelength of MM fiber is 850 or 1300nm. The maximum

transmitting distance of MM fiber is from 550 m to 2 km according to the strength of

the transmitter.

Single-Mode Fiber Optic Cable (SM Fiber): A single-mode optical fiber is an optical

Advantech IAG Training Center (Internal Use Only)


70

fiber designed to carry only a single ray of light (mode), and a typical single mode

optical fiber has a core diameter between 8 and 10 m and a cladding diameter of 125

m. The SM Fiber used in telecommunications usually operates at 1310 or 1550 nm

and requires more expensive laser sources than Multi-Mode Fiber does. Consequently,

the transmitting distance of Single-Mode fiber can be much longer than Multi-Mode

fiber.

Connectors:

Advantechs ICOM products have three types of Fiber Optic connectors, SC, ST,

and LC. The following is the pictures of these connectors.

Figure 2-55 LC Type Connector

Advantech IAG Training Center (Internal Use Only)


71

Figure 2-56 SC Type Connector

Figure 2-57 ST Type Connector

For more information about these three types of connectors, you can search on the

Internet.

Advantech IAG Training Center (Internal Use Only)


72

2.2.6 Ethernet Topology

So far, there are three kinds of developed Ethernet Topology, Bus, Star, and Ring.

Bus Ethernet: The main feature of Bus Ethernet is Utilizing one sharing Ethernet

cable to connect all PCs. However, the one sharing Ethernet cable doesnt

represent that one very long physical Ethernet cable; it is connected by many short

Ethernet cables. Therefore, in a sense, we regard those short Ethernet cables as a long

Ethernet cable.

The benefits of Bus Ethernet are that it is a cost effective Ethernet topology. To

build up the Bus Ethernet structure, we do not need any other Ethernet equipment, but

only the adequate cables, connectors, and Network cards. However, if one of these

short cables is broken, the whole Network will crash down, and it is hard to find out

the broken cable.

Advantech IAG Training Center (Internal Use Only)


73

Figure 2-58 Bus Ethernet

Star Ethernet: In a Star Ethernet, all of the PCs will be connected to one switch or

hub, and each PC will transmit/receive data via this switch or hub.

The benefit of Star Ethernet is that the partial damage will only affect a partial area,

not the whole Network group. Only if the switch or hub is broken the whole Network

will be crash down. The main disadvantage of Star Ethernet is that the user needs to

purchase the switch or hub.

Figure 2-59 Star Ethernet

Ring Ethernet: In a Ring Ethernet, every PC will be connected as a ring topology.

The data from PC1 to PC3 may go through PC2 or other PC.

Actually, the Bus and Star Ethernet have a common disadvantage that there might

have two or more PCs transmit data simultaneously and lead to the collision of data.

Advantech IAG Training Center (Internal Use Only)


74

However, in the Ring Ethernet, there is no such this kind of concern because there is

only one PC in this Ring Ethernet can send data at one time. The disadvantage of

Ring Ethernet is that the cost of HW and SW Ring equipment is higher than the

normal one.

Figure 2-60 Ring Ethernet

2.2.7 Ethernet Equipments

Hub: Hub is a Layer1 (Physical layer) device. A network hub or repeater hub is a

device for connecting multiple twisted pair or fiber optic Ethernet devices together,

making them act as a single network segment. It is a fairly simple broadcast device,

and does not manage any of the traffic that comes through it. Since every packet is

Advantech IAG Training Center (Internal Use Only)


75

being sent out through every other port, packet collisions result--which greatly

impedes the smooth flow of traffic. Therefore, although there are multiple Ethernet

devices can connect to one Hub, only one pair of them can transmit data at one time,

other Ethernet devices must wait till the first transmission is over. Thus, the more

Ethernet devices connect to one hub, the lower bandwidth each device can be shared.

The advantage of hub is its price is very cheap and the operating temperature is low.

Figure 2-61 The Data Flow of Hub

Advantech used to have Hub module named ADAM-6510, but its phased out now.

Advantech IAG Training Center (Internal Use Only)


76

Figure 2-62 ADAM-6510 Hub

Switch: Switch is a Layer2 (Data Link layer) device, also called Switch Hub. The

Switch has a build-in MAC address table and is able to record which address is

connected to which port. The data from one port will be sent to the correct port only,

not sent to all of the ports. Therefore, the other un-used ports can still transmit/receive

data at one time. This algorithm dramatically increases the bandwidth of each pair of

communicating ports.

Advantech IAG Training Center (Internal Use Only)


77

Figure 2-63 The Data Flow of Switch

2.2.8 Speed

100Mbps Ethernet:

100BaseTX: It uses twist pair to transmit data and requires high quality twist pair

(Cat. 5) because its signal frequency is higher than before (10Mbps). 100BaseTx is

the most common Network type so far.

100BaseT4: It can use Cat. 3 ~Cat. 6 level cable as the communication interface.

However, it is rarely used in the market because it only supports half-duplex

communication mode and its released time is too late.

Advantech IAG Training Center (Internal Use Only)


78

100BaseFX: Using Fiber Optic cable as its communication interface, therefore the

communication distance is related to the type of fiber optic cable.

Figure 2-64 100Mbps Ethernet Specification

1Gbps Ethernet:

1000BaseSX: Short wave length (850nm) Fiber Optic Ethernet. It can only use Multi-

mode Fiber Optic as its transmission interface.

1000BaseLX: Long wave length (1300/1310nm) Fiber Optic Ethernet. It can use

either Multi-mode or Single-mode fiber optic cable as its transmission interface.

1000BaseT: IEEE announced 1000BaseT (802.3ab) in 1999. The feature of

1000BaseT is that it can use Cat. 5 Twist Pair to transmit, and the maximum

Advantech IAG Training Center (Internal Use Only)


79

transmission distance is 100m. That is to say, 100BaseT is 100% compatible to

100BaseTX Ethernet. However, the quality of the cable has a significant effect on the

transmission rate; therefore, it still needs to work with Cat.5e or Cat.6 cable to

achieve real 1000Mbps performance.

Figure 2-65 1000Mbps Ethernet Specification

2.2.9 Wireless

Wireless communication is the transfer of information over a distance without

the use of electrical conductors or "wires". The distances involved may be short (a

few meters as in television remote control) or very long (thousands or even millions

of kilometers for radio communications). When the context is clear the term is often

simply shortened to "wireless". Wireless communications is generally considered to

Advantech IAG Training Center (Internal Use Only)


80

be a branch of telecommunications.

802.11b/802.11g:

IEEE 802.11 is a set of standards for wireless local area network (WLAN) computer

communication, developed by the IEEE LAN/MAN Standards Committee (IEEE 802)

in the 5 GHz and 2.4 GHz public spectrum bands. Since the maximum data rate of

802.11 is up to 2 Mbps, it is hardly to be accepted by the market. Therefore, the

802.11 team had worked out the improvement version, that is, 802.11b.

The official name of 802.11b is Higher-Speed Physical Layer Extension in the

2.4GHz Band and it has a maximum raw data rate of 11 Mbit/s. It uses the same

media access method defined in the original standard. 802.11b products appeared on

the market in early 2000, since 802.11b is a direct extension of the modulation

technique defined in the original standard. The dramatic increase in throughput of

802.11b (compared to the original standard) along with simultaneous substantial price

reductions led to the rapid acceptance of 802.11b as the definitive wireless LAN

technology.

In June 2003, a third modulation standard was ratified: 802.11g. This works in the

2.4 GHz band (like 802.11b), but uses the same OFDM based transmission scheme as

802.11a. It operates at a maximum physical layer bit rate of 54 Mbit/s exclusive of

Advantech IAG Training Center (Internal Use Only)


81

forward error correction codes, or about 19 Mbit/s average throughout. 802.11g

hardware is fully backwards compatible with 802.11b hardware and therefore is

encumbered with legacy issues that reduce throughput when compared to 802.11a by

~21%.

Advantech wireless device server, such as EKI-135x, supports both 802.11b and

802.11g to provide the most efficient and stable wireless communication quality for

the users.

Figure 2-66 The Brief Comparison of Wireless Protocol

WEP:

Besides good communication quality, the security issue is important in some

applications as well. Therefore, Advantech wireless device server supports WEP

encryption technology.

Wired Equivalent Privacy (WEP) is a deprecated algorithm to secure IEEE

802.11 wireless networks. Wireless networks broadcast messages using radio and are

thus more susceptible to eavesdropping than wired networks. When introduced in

Advantech IAG Training Center (Internal Use Only)


82

1997, WEP was intended to provide confidentiality comparable to that of a traditional

wired network.

2.2.10 Quiz

1. ( ) Which of the following is the main function of switch?

(a) Filter the broadcast packages (b) Strengthen the strength of the signal (c)

Compress the incoming packages (d) Let each pair of communicating ports to

have an independent bandwidth.

2. ( ) The main difference between UTP and STP cable is?

(a) The number of twist pair, STP has four twist pairs and UTP only has four. (b)

The color of STP is different from UTP (c) UTP isnt shielded by metal net

(d) The maximum data rate of UTP is 1Gbps but STP is only 100Mbps

3. ( ) Which of the following is NOT the transmission media of Network?

(a) STP (b) Single-mode Fiber Optic (c) RS-232 (d)UTP

4. ( ) Which of the following is NOT the reason why 802.11b/g has high acceptance

of the market?

(a) The dramatic increase in throughput (b) Substantial price reductions (c) The

high reliability of data encryption

5. What is the difference between Hub and Switch?

6. Please describe the features of three Network topologies (Star, Bus, Ring).

Advantech IAG Training Center (Internal Use Only)


83

7. What is the difference between Multi-Mode Fiber Optic and Single-Mode Fiber

Optic?

2.3 Products Selection Guide

We can generally divided Advantechs ICOM products into two categories, the

serial products and Ethernet products. In the following sections, we will have a brief

introduce them respectively.

Figure 2-67 Advantech ICOM Products

Advantech IAG Training Center (Internal Use Only)


84

2.3.1 Plug-in ICOM Card

Advantechs Multiport Serial Cards are designed to accommodate multiple high

performance peripherals for field devices that use the RS-232/422/485 serial

communication protocol. Each card requires only one PCI or ISA slot to provide

independent serial channels. With industrial-grade protection, Advantech multiport

serial cards help to avoid system damage in harsh environments.

Figure 2-68 Full-Range Interface ICOM cards

The Selection Guide of Plug-in ICOM card:

Advantech IAG Training Center (Internal Use Only)


85

*P: Port Number


Figure 2-69 The Selection Guide of Plug-in ICOM card

Advantech IAG Training Center (Internal Use Only)


86

2.3.2 Serial Device Server

The serial device servers enable RS-232/422/485 serial devices to be connected

to a host computer over an Ethernet network quickly and cost-effectively. No extra

programming effort is required at the host computer, so software development costs

can be saved. Serial device servers are especially suitable for remotely controlling and

monitoring your serial devices via the Ethernet.

The Naming Rule of EKI and ADAM Device Server:

Figure 2-70 Naming Rule of ADAM Device Server

Advantech IAG Training Center (Internal Use Only)


87

Figure 2-71 Naming Rule of EKI Device Server

The overview of EKI and ADAM Device Server Products:

In the previous ICOM ADAM modules, there are three types of device server

categorized by their functionalities. The following is the brief description:

1. ADAM-4570L/4571L/4570/4571/4570W/4571W and EDG-4504/4508/4516:

The functionality of these modules is to map a virtual serial COM port

remotely via Ethernet. The W means wireless module. (Virtual COM Mode)

2. ADAM-4577/4579 and EDG-4508/4516: The functionality of these modules is

to let the host device send/receive data from serial slave device via a

TCP/UDP socket connection. (Data Mode)

3. ADAM-4572: This module is able to transfer Modbus/TCP package to

Modbus/RTU data and send to a serial slave device.(Modbus Slave Mode)

Advantech IAG Training Center (Internal Use Only)


88

(PS. EDG-4508/4516-BE support both Virtual COM Mode and Data Mode.)

Figure 2-72 The Overview of ADAM Device Server

As for the new EKI series device server, the following is the brief description:

1. EKI-152x/135x: Support both Virtual COM Mode and Data Mode(The new

name of Data Mode is USDG mode). EKI-152x is wired device server and

EKI-135x is wireless device server.

2. EKI-122x: Able to transfer Modbus/TCP package to Modbus/RTU data actively

and transfer Modbus/RTU data to Modbus/TCP package as well.

Advantech IAG Training Center (Internal Use Only)


89

Figure 2-73 The Overview of EKI Device Server

2.3.3 Industrial Ethernet

The Advantech EKI-2000 and EKI-7000 series of Industrial Ethernet solutions

offer a wide range of transmission media options, including: copper, fiber optic and

wireless. Data transmission rates can range from 10 Mbps, 100 Mbps to 1000Mbps,

making the process of manufacturing data not just available at the field level, but also

seamlessly integrated into higher-level data acquisition systems. Advantechs EKI-

7000 series X-Ring technology offers the fastest redundant ring recovery time (<

10ms) to secure data communication and reliability. Furthermore, the robust design,

Advantech IAG Training Center (Internal Use Only)


90

DIN-rail mounting and +12~48 VDC redundant power inputs make EKI-2000/7000

suitable for rugged industrial applications.

2.3.3.1 Un-management Switch

Advantech's Unmanaged Industrial Ethernet Switches are designed for use in

demanding industrial environments, offering unmatched performance, reliability, and

value. With no setup required, they are truly plug-and-play. Models are available in

standard 10/100Mbps and gigabit 10/100/1000Mbps speeds, with both copper wire

and fiber optic connections.

The Naming Rule of EKI and ADAM Device Server:

Figure 2-74 Naming Rule of EKI Unmanaged Switch

The overview of EKI Unmanaged Switch:

Advantech IAG Training Center (Internal Use Only)


91

Figure 2-75 The Overview of EKI Unmanaged Switch

2.3.3.2 Management Switch

Advantech's EKI-7000 Managed Redundant Industrial Ethernet Switches allow

users to expand their industrial network fast and cost-effectively, while the rugged

industrial-grade design assures reliability and stability. Moreover, Advantech's X-Ring

technology offers the fastest recovery time (< 10 ms) to increase the reliability and

speed of network infrastructures. EKI-7000 series are an ideal solution for easily

managing applications at the central office or local site.

Advantech IAG Training Center (Internal Use Only)


92

The Naming Rule of EKI and ADAM Device Server:

Figure 2-76 Naming Rule of EKI Managed Switch

The overview of EKI Unmanaged Switch:

Figure 2-77 The Overview of EKI Managed Switch

Advantech IAG Training Center (Internal Use Only)


93

2.3.3.3 Media Converter

Advantech's Industrial Ethernet Media Converters are compact and robust

devices designed to convert and transmit Gigabit Ethernet or Fast Ethernet networks

into Gigabit or Ethernet fiber optic networks by transparently converting digital

electric Ethernet signals to optical signals.

The Naming Rule EKI Media Converter:

Figure 2-78 Naming Rule of EKI Media Converter

The overview of EKI Media Converter:

Advantech IAG Training Center (Internal Use Only)


94

Figure 2-79 The Overview of EKI Media Converter

Advantech IAG Training Center (Internal Use Only)


95

Chapter 3 Functionality of Plug-in

ICOM Card

Advantechs Multiport Serial Cards are designed to accommodate multiple high

performance peripherals for field devices that use the RS-232/422/485 serial

communication protocol. Each card requires only one PCI or ISA slot to provide

independent serial channels. With industrial-grade protection, Advantech multiport

serial cards help to avoid system damage in harsh environments.

Advantech IAG Training Center (Internal Use Only)


96

3.1 Driver & Installation

Windows 2000/XP/Vista supports COM1 to COM256, meaning up to 256 serial

ports. In order to fully utilize the advanced features of Windows 2000/XP/Vista, such

as multi-process and multithread, pure 32.bit Windows 2000/XP/Vista device drivers

are provided for the PCI communication cards. All these drivers conform to the

Win32 COMM API standard.

3.1.1 PCI Interface

Before you install the card into your system, we recommend you install the

driver first. Please follow the steps below for the PCI communication cards Windows

2000/XP/Vista driver installation.

1. Insert your companion CD.ROM disc into your CD.ROM drive, or go to our

website to download the latest version PCI ICOM driver.

http://support.advantech.com.tw/support/default.aspx

2. Install the driver by following the instruction of showing message.

Advantech IAG Training Center (Internal Use Only)


97

3. Power off the PC and plug in the PCI ICOM card.

4. Power on the PC and wait for the PC detecting the new Hardware.

5. When you reboot your system, Windows 98/2000/XP will recognize your card

devices and will automatically search for the device driver for PCI UARTs as

shown in the following dialog box.

Figure 3-80

4. Choose Search for the best driver for your device radio button, and click next.

Advantech IAG Training Center (Internal Use Only)


98

Figure 3-81

5. After you have installed your card, go to Control Panel/System/Device Manager

to look for the Device Name that will appear after you have installed the driver.

Advantech IAG Training Center (Internal Use Only)


99

Figure 3-82

Note: If your device has not been properly installed, there will be an exclamation

mark (!) on the device name to indicate a conflicting device. If this is the case,

just remove that device and start the driver installation process all over again.

3.1.2 ISA/PC-104 Interface

Since ISA is not a PnP (Plug-n-Play) bus, the users need to assign a specific I/O

address and IRQ for their ISA interface cards and therefore ISA interface ICOM cards

Advantech IAG Training Center (Internal Use Only)


100

dont need a driver. However, Advantech provide a tool called ISA Configure Tool to

make the users install their ICOM cards easier. The following is the procedure to use

ISA Configure Tool and the HW setting of ICOM card.

ISA Configure Tool:

1. You need to check the available IRQ and IO address in Windows Device Manager.

Figure 3-83

Advantech IAG Training Center (Internal Use Only)


101

Figure 3-84

Figure 3-85

2. Choose un-occupied I/O address and IRQ.

Advantech IAG Training Center (Internal Use Only)


102

Figure 3-86 I/O Address List

Figure 3-87 IRQ List

Advantech IAG Training Center (Internal Use Only)


103

3. Run ISA Configure Tool

Figure 3-88 ISA Configure Tool

6. Add a new board and choose the module name of your card.

Advantech IAG Training Center (Internal Use Only)


104

Figure 3-89 ISA Configure Tool

4. Assign the I/O address of port1 and the starting COM port number. Some of the

ICOM cards support share IRQ, so the whole ports of one ICOM card can share

one IRQ.

Advantech IAG Training Center (Internal Use Only)


105

Figure 3-90 ISA Configure Tool

Figure 3-91 ISA Configure Tool

Advantech IAG Training Center (Internal Use Only)


106

7. After finishing the setting, click Exit and close PC. Now we need to configure the

HW of the card.

8. The below figure is the description of each part of an ICOM ISA card. (The

example card is PCL-746+)

Base Address: Set the I/O address of each serial port of the card. Most of the ICOM

ISA cards only have one base address switch. The user just needs to set the First

ports IO address and the following ports address will be +8, +16, For example, the

I/O address of port1 is set to 300H, then the address of port2 will be 308H, the

address of port3 will be 310H. As for the switch setting of each address, please refer

to the user manual of PCL ICOM card.

IRQ: Use the jumper to plug-in the IRQ number you would like to assign to your

card. If your card supports shared IRQ mode, you can just set the IRQ for port1 and

other ports will all follow up this IRQ.

Vector Address: You only need to configure this part when the card uses shares IRQ

mode. You need to assign an un-occupied I/O address for it.

Advantech IAG Training Center (Internal Use Only)


107

Port Mode: Some ICOM cards support both RS-422/485, or support RS-

232/422/485, the user need to configure HW jumpers to select the protocol of each

port.

Figure 3-92 The HW Description of PCL-746+

Most of the Advantech ISA Interface ICOM cards are able to be installed by using

ISA Configure Tool; however, there are few cards that need to installed manually by

using Windows Add/Remove Hardware Function.

Advantech IAG Training Center (Internal Use Only)


108

3.2 Utility

ICOM Tools:

Advantech ICOM Tools is a convenient utility that has been designed to help you

test the performance of ICOM cards through analyzing the port status. It features an

easy to use graphical user interface that will soon make you familiar with testing via

menu commands and toolbar buttons. Advantech ICOM Tools is applicable to all

series of Advantech ICOM cards, and can even be used with other third-party ICOM

cards. It is included for free on the diskette or on the companion CD.ROM with all

Advantech Industrial Communication cards.

To begin installation, double-click the ICOM_Tools.exe program icon in the

Tools folder or click the Advantech ICOM Utility hyperlink in the installation window

to launch the ICOM Tools setup program. The setup program will copy the program

files to the destination folder you choose or to the default installation path (i.e.

C:\Program Files\Advantech\ICOM Tools). A program folder will be created in your

Start/Programs menu. (Later you can just access the program through

Start/Program/Advantech PCI Comm Tools/COM Examine Tool)

Advantech IAG Training Center (Internal Use Only)


109

3.3 Practice

A. How to Configure the Dip Switch of Base Address and Vector Address

You can learn how to configure the dip switches of ICOM cards without referring

to user manual. Please prepare one Advantech ISA interface ICOM card in advance.

Please divide A0~A9 dip switches into three groups, that is, A0~A3, A4~A7,

A8~A9. You can imagine that A8~A9 is in charge of the first digit number of the I/O

address, A4~A7 is in charge of the second digit number of the I/O address, and

A0~A3 is in charge of the third digit number of the I/O address. For example, if you

want to set the I/O address of the card to 210H. A8~A9 is responsible for 2, A4~A7 is

responsible for 1, and A0~A3 is responsible for 0.

There is one thing important you need to note when you are adjusting the dip

switch. If you set the dip switch to OFF, it represents to High (1), otherwise, it

represents to Low (0).

Please follow the instruction below to practice three example addresses and you

will catch the concept of dip switch configuration.

Advantech IAG Training Center (Internal Use Only)


110

Figure 3-93 I/O Address Setting- 300H

Figure 3-94 I/O Address Setting- 280H

Advantech IAG Training Center (Internal Use Only)


111

Figure 3-95 I/O Address Setting- 3E8H

B. Use ICOM Tools to Test COM Ports

After installing all ports of your ICOM card on PC, how to testify that these created

COM ports are workable. The user can use ICOM Tools to have a simple test first.

Please install one ICOM card on your PC first and execute COM Examine Tool.

Figure 3-96 COM Examine Tool

1. Launch ICOM Tools. You will first see the Program Window such as Figure 4.1.

Since you havent selected any port for testing yet, all you can see now is a blank

window area.

Advantech IAG Training Center (Internal Use Only)


112

Figure 3-97 ICOM Tools program window

2. Select the port(s) you want to test by the Port/Select menu command or by

clicking the Port Select button on the Toolbar, and a dialog box will appear.

Figure 3-98 Select Port dialog box

Advantech IAG Training Center (Internal Use Only)


113

3. Select the port(s) you want to perform test on from the checkboxes next to each

COM port. You can either click the checkbox or double-click the name(s) of the

port(s) to select/deselect port(s) to perform the test on. The port(s) you selected

will immediately appear in the Selected Port field.

Figure 3-99 Ports You Select Will Appear in the Selected Port Checkbox Group

4. Click OK to bring up the ICOM Tools User Interface such as below:

Advantech IAG Training Center (Internal Use Only)


114

Figure 3-100 ICOM Tools User Interface

5. You can choose to configure a specific port (or to configure all ports) before

running your test. Just click a Com Port Tab to select the port you want to

configure, and then click the Port Setup button or use the Port/Setup menu

command (or if you want to configure all ports at once, just click the All Ports

Setup button or access the All Ports/Setup menu command) to bring up the

Configure Port dialog box such as below.

Advantech IAG Training Center (Internal Use Only)


115

Figure 3-101

6. After you have completed the configuration of the port(s), you can now start the

test on the port you have selected by clicking the Run button or accessing the

Port/Run menu command (or you want to run all ports at once, just click the All

Ports Run button or access All Ports/Run menu command). Once the test is

started, you can see relevant test information of port performance on the

performance listing area.

Advantech IAG Training Center (Internal Use Only)


116

Figure 3-102 Test Information on the Performance Listing Area

The Performance Listing Area:

Port The com port number

Rx length Received packet length in bytes

Bytes/Sec Transmission rate in Bytes/Sec

Last Abnormal Status Last abnormal status

Chapter 4 Functionality of Serial

Device Server

Advantech IAG Training Center (Internal Use Only)


117

The serial device servers enable RS-232/422/485 serial devices to be connected

to a host computer over an Ethernet network quickly and cost-effectively. No extra

programming effort is required at the host computer, so software development costs

can be saved. Serial device servers are especially suitable for remotely controlling and

monitoring your serial devices via the Ethernet.

4.1 Virtual COM mode

The purpose of using virtual COM mode is to extend the quantity of serial COM

port remotely for PC via Ethernet. If the customers used to use serial COM ports in

their old application and want to implement Ethernet ability into their application,

they dont need to change their old setting of serial port- based SW or program. They

just need to utilize our serial device server that supports virtual COM mode and install

the virtual COM driver in their PC to map a virtual COM port for their PC. Then,

their PC will have a remote serial COM port via Ethernet. You can just imagine that

the Ethernet part of this structure is transparent in this structure. The following is the

basic structure of virtual COM mode.

Advantech IAG Training Center (Internal Use Only)


118

Figure 4-103 Virtual COM Mode Structure

The benefit of using virtual COM mode is as the description in the first paragraph.

However, when a user wants to map a virtual COM on his PC, he must needs to install

the virtual COM driver and utility in advance. That is to say, to use virtual COM

mode, the host device must be a PC or a certain device that is able to install third-

party software. If this host device is a PLC or PAC and cannot install virtual COM

driver and utility, the user cannot use virtual COM mode. Further, the user needs to

concern the driver compatible issue. For instance, if the OS of the host PC is Linux or

UNIX and the virtual COM driver provider happen to support Windows system only,

the user cannot use virtual COM mode on his host PC. Even if the user uses Windows

system, the performance of the virtual COM port still depends on the performance of

the virtual COM driver.

Advantech IAG Training Center (Internal Use Only)


119

Although virtual COM mode has several disadvantages, many users still like to use

it because the programming of serial communication is comparatively easy and many

old software or devices support serial COM port communication only.

Multi-Access Mode:

There is a very special function of virtual COM in new EKI device server and it

is also one of the main features of EKI device server, that is, Multi-Access mode.

Generally, one serial COM port only can be occupied by one application or one host

PC if mapped by device server. However, by using new EKI series device server,

there are up to 5 host PCs or applications are allowed to access the same port of EKI

device server simultaneously in virtual COM mode.

Figure 4-104 Multi-Access Mode

Advantech IAG Training Center (Internal Use Only)


120

There are two major operation modes for Multi-Access Mode. First one is

Normal Mode: EKI serial device server handles a command from one application and

replies the data from the serial port to all applications that are connecting to the same

serial port of EKI device server.

Figure 4-105 Multi-Access Function- Normal Mode

The other one is Round-Robin mode: EKI serial device server handles the

command from one application and reply to this application only. Query from other

applications must be queued and wait for current process completing.

Advantech IAG Training Center (Internal Use Only)


121

Figure 4-106 Multi-Access- Round-Robin Mode

The users can choose one of these two modes according to their application.

The multi-access will operate in which mode depends on whether the user marks the

Response Timeout, which can be found in the EKI device server configuration

utility. The multi-access function will run in normal mode if the user disabling the

response timeout, and will run in Round-Robin mode if the user enable it.

Advantech IAG Training Center (Internal Use Only)


122

Figure 4-107 Response Timeout

We will have a detailed discussion on this function in Sec 4.5.5, thanks.

4.2 USDG mode

The full name of USDG mode is Universal Serial Data Gateway Mode. Instead

of mapping virtual COM ports, USDG mode is used to build up a TCP/UDP (Socket)

connection between host device and the device server using USDG mode. The

following is the basic structure of USDG mode.

Advantech IAG Training Center (Internal Use Only)


123

Figure 4-108 USDG Mode Structure

The benefits of using USDG mode are that the users dont need to install any driver

in their host device so that there is no driver compatible issue, any system or device

that supports socket connection is able to use USDG mode. However, if the host

device doesnt have a built-in socket functionality, the users need to write their own

socket connection program, which is kind of more difficult than serial connection one.

Advantechs USDG mode supports four kinds of communication structures. We will

introduce each of them in the following sections.

4.2.1 Peer-to-Peer

Advantech IAG Training Center (Internal Use Only)


124

We can also call it Point-to-Point, or Serial Tunneling the following is its

structure. Two native serial devices can communicate over an Ethernet network

without any intermediate host PC and software programming. Serial Tunneling is very

simple to use. You can use Advantech Serial Device Server Configuration Utility to

designate one serial port as the tunneling master and another serial device server port

as the tunneling slave. The following is a simple structure of Peer-to-Peer mode.

Figure 4-109 Peer-to-Peer Structure

4.2.2 TCP Server (Polling Mode)

TCP Server Multi-Access: This is a powerful feature of Advantech device server,

when the EKI-1521 acts as a TCP Server, there are up to 5 TCP Clients are allowed to

Advantech IAG Training Center (Internal Use Only)


125

access the same port of EKI-1521. The concept is similar with the Multi-Access Mode

of Virtual COM Port Mode.

Figure 4-110 TCP Server Mode

TCP Server Multi-Access: This is a powerful feature of Advantech device server,

when the EKI-1521 acts as a TCP Server, there are up to 5 TCP Clients are allowed to

access the same port of EKI-1521. The concept is similar with the Multi-Access Mode

of Virtual COM Port Mode.

Advantech IAG Training Center (Internal Use Only)


126

Figure 4-111 TCP Server Multi-Access

4.2.3 TCP Client (Event Handling Mode)

In TCP Client mode, the TCP connection will be established from EKI serial

device server. This operation mode supports max.16 simultaneous connections for

each serial port on EKI-1521/1522/1524 to one host or several hosts. You should

configure the IP address and TCP port number of the network hosts which the EKI

serial device server connect to using Advantech Serial Device Server Configuration

Utility. After configuration, when EKI serial device server receives the data from

serial port, the device server will employ the connection to hosts which are

configured.

Advantech IAG Training Center (Internal Use Only)


127

Figure 4-112 TCP Client Mode

TCP Client Multi-Hosts: This is a powerful feature of Advantech Device Server

when it acts as a TCP Client. The user can add up to 16 IP addresses and TCP ports

into the Peer to Receiving Data block, then, the data from the serial device will be

sent to all of these 16 hosts simultaneously.

Advantech IAG Training Center (Internal Use Only)


128

Figure 4-113 TCP Client Multi-Hosts Structure

4.2.4 Control mode

In control mode, the serial device server presents a modem interface to the

attached serial device: it accepts AT-style modem commands to connect / disconnect

to other networking device. If you want serial device running application program to

connect/disconnect to different devices by request, you can use control mode. The

control mode provides three kinds of modem AT-style commands. The serial devices

can use these commands to control EKI-1521/1522/1524 connecting or disconnecting

to remote networking devices. Thus intelligent serial devices such as stand-alone PLC

Advantech IAG Training Center (Internal Use Only)


129

will send /receive data to/from devices one by one via Ethernet.

Figure 4-114 Control Mode

4.3 Modbus Data Gateway

Networks have become increasingly vital for industrial automation applications.

Many control devices today do not have a network port and can only communicate

with a dedicated local PC or control panel. Advantechs revolutionary network-

enabling technology is now allowing control devices with serial ports to connect to

the Ethernet and share networks quickly and cost-effectively. The EKI-

1221/1222/1224 is network-based Modbus data gateway for integrating new and

Advantech IAG Training Center (Internal Use Only)


130

existing Modbus/RTU and Modbus/ASCII serial devices to newer TCP/IP networked-

based devices. Manufacturers, system integrators, and end users can now take

advantage of the EKI-1221/1222/1224 to create networked applications for remote

managing and accessing data for their control devices that wasnt possible before.

There are two operations modes when using Modbus Data Gateway, Modbus Slave

Mode and Modbus Master Mode.

4.3.1 Modbus Slave Mode

The Modbus Slave Mode means that the Serial device acts as a slave device

that will be polled by Ethernet Master Device for the data. The old ADAM-4572

supports this mode as well. The following figure is the example application of

Modbus Slave Mode.

Advantech IAG Training Center (Internal Use Only)


131

Figure 4-115 The application of Modbus Slave Mode

4.3.2 Modbus Master Mode

This is the new function that EKI-122x has but ADAM-4572 doesnt. The

Modbus Master Mode means that the Serial device acts as a master that will send

command to poll Ethernet slave devices. The following figure is an example

application of Modbus Master Mode.

Advantech IAG Training Center (Internal Use Only)


132

Figure 4-116 The application of Modbus Master Mode

4.4 Wireless Device Server

Advantech is not only providing the wired device server, but also provide the

wireless device server. The EKI-1351/1352 provides one or two serial ports,

802.11b/g wireless LAN interface to connect any RS-232/422/485 devices to wireless

LAN. These wireless serial device servers provide serial-to-wireless network

connectivity as an alternative to wired Ethernet connectivity and enable virtually any

serial device or equipment to be remotely accessed, controlled, monitored, or shared

on an 802.11b/g wireless network.

Basically, the function of wireless device server is the same with wired device

server. However, there are few differences between wireless and wired device server,

Advantech IAG Training Center (Internal Use Only)


133

the following is the comparison table:

Figure 4-117 Wired vs. Wireless Device Server

There are two kinds of standard wireless connection modes used by Advantech

wireless device server, Infrastructure Mode and Ad-Hoc Mode.

4.4.1 Infrastructure Mode

The wireless device server builds up a connection to host PC or other wireless

device servers via an access point (AP).

Advantech IAG Training Center (Internal Use Only)


134

Figure 4-118 Infrastructure Mode

4.4.2 Ad-Hoc Mode

The wireless device server builds up a connection to the host PC or other wireless

device servers directly without any access point (AP).

Advantech IAG Training Center (Internal Use Only)


135

Figure 4-119 Ad-Hoc Mode

4.5 Utility & Driver

There are several utilities for Advantech device server, such as EDG

Configuration Utility, COM Port Mapping utility, and so on. These are all used for old

ADAM and EDG series device server modules. After the release of new Serial Device

Server Configuration Utility, the functionality of all other utilities has been combined

into it. Therefore, in this text book, we will focus on the introduction to the new utility

and only have a brief introduction to other old utilities.

Advantech IAG Training Center (Internal Use Only)


136

4.5.1 EDG Configuration Utility

EDG Configuration Utility is provided for the configuration of old ADAM-457x

and EDG-4504. It will automatically search all the EDG devices on the network and

show them on the left side of the utility. From here you can easily configure various

parameters, such as IP address, the parameters of the serial ports of the module, etc,

for TCP/IP configuration.

After the release of new Serial Device Server Configuration Utility, the EDG

configuration utility is gradually replaced by it because the new utility supports all

ADAM and EDG series as well.

Figure 4-120 EDG Configuration Utility

Advantech IAG Training Center (Internal Use Only)


137

4.5.2 EDG II Configuration Utility

The function of it is the same with EDG Configuration Utility. It is a utility only

for EDG-4508+-BE and EDG-4516+-BE modules and can be replaced by Serial

Device Server Configuration Utility as well.

Figure 4-121 EDG II Configuration Utility

4.5.3 COM Port Mapping Utility

This utility is used for mapping virtual COM ports for the device servers on PC.

Advantech IAG Training Center (Internal Use Only)


138

There is a virtual COM driver inside the utility. Therefore, in past, the users need to

install two utilities, EDG (II) configuration utility and COM Port Mapping Utility.

One is for configuration and the other one is for mapping virtual COM ports.

Figure 4-122 COM Port Mapping Utility

4.5.4 Download and Test Utility

The purpose of testing utility is to help you diagnose the communication between

devices and download firmware remotely.

Advantech IAG Training Center (Internal Use Only)


139

Figure 4-123 Download and Test Utility

Regarding the procedure of using this utility, you can refer to the manual of ADAM-

4579.

4.5.5 Serial Device Server Configuration Utility

Advantech Serial Device Server Configuration Utility integrates device server

management and virtual COM port mapping utility. After installation, this utility not

only configures the EKI-1521/1522/1524, but also connects and configures the

ADAM series and EDG series device servers. Virtual COM port configuration and

management was also integrated in this utility. The best improvement, you dont

Advantech IAG Training Center (Internal Use Only)


140

restart the host computer while you setup new virtual COM ports. When you map the

virtual COM port, the COM port will enable immediately and show in Windows

Device Manager.

The new utility has plenty of built-in user-friendly functionalities for users. The

following is the introduction of some of them.

1. The new utility supports all Advantech Device Server Modules.

Figure 4-124 The Compatibility of New Utility

2. The users can configure and map virtual COM ports in the same utility.

Advantech IAG Training Center (Internal Use Only)


141

Figure 4-125 One Utility Needed Only

3. The user can monitor the status of each ports of the device server.

Advantech IAG Training Center (Internal Use Only)


142

Figure 4-126 Port Monitor Ability

4. It is able to search the device that is in different Network groups.

Advantech IAG Training Center (Internal Use Only)


143

Figure 4-127 Powerful Search Ability

5. There is a built-in Virtual COM Test Tool inside the utility. After mapping a

virtual COM ports, the user can use this tool to confirm whether he has mapped

the virtual COM port successfully.

Advantech IAG Training Center (Internal Use Only)


144

Figure 4-128 Built-in Virtual COM Test Tool

6. The Response Timeout and Frame Break options:

These two options can be utilized in both virtual COM mode and USDG mode.

Figure 4-129 Built-in Virtual COM Test Tool

Advantech IAG Training Center (Internal Use Only)


145

Response Timeout:

Disabling the Response Timeout: The Multi-Access function will operate in Normal

Mode (For detailed introduction, please refer to Sec 4.1).

Enabling the Response Timeout: The Multi-Access function will operate in Round-

Robin Mode (For detailed introduction, please refer to Sec 4.1). After enabling the

response timeout, the user needs to set an interval (ms) further. When there are multi

commands coming from multi hosts to the same serial port of EKI device server, EKI

will send the first coming command out, and others will queue up in the memory for

being sent in order. After receiving the first coming command, the EKI will start

counting for the interval that the user keys in the Response Timeout, for example,

1000ms. The response from the serial slave device must be within 1000ms, otherwise

it will be abandoned and then EKI will continue to send the second coming command

out.

However, if the EKI receives the response of the first coming command from the

serial slave device within 1000ms, for example, 50ms, it will still wait until 1000ms is

up and then second the second coming command out. This scenario will waste a lot of

time if the number of response timeout is unsuitable for the application.

Advantech IAG Training Center (Internal Use Only)


146

Figure 4-130 The Example of Enabling Response Timeout

Frame Break:

To prevent the time-wasting situation, the user can utilize Frame Break with

Response Timeout. Lets refer to the example below:

Response Timeout: 1000ms

Frame Break: 100ms

Advantech IAG Training Center (Internal Use Only)


147

Figure 4-131 The Example of Enabling Frame Break

After enabling the Frame Break, if the EKI has received the response from the

serial slave device, the EKI will not wait until the response timeout is up and then

send the second coming command out. Instead, EKI will only wait until the Frame

Break is up. That is too say, the number of Frame Break must be smaller than the

number of Response Timeout.

4.6 Practice

A. Mapping a Virtual COM port by using Serial Device Server Configuration

Utility for EKI-152x.

1. Open the software and it will search the module automatically.

Advantech IAG Training Center (Internal Use Only)


148

Figure 4-132 Search for the Module

2. You can modify the parameters.

Advantech IAG Training Center (Internal Use Only)


149

Figure 4-133 Modify the Module

3. Choose Virtual Com Mode for the port.

Figure 4-134 Choose Operation Mode

4. Click the right button on EDG icon.

Advantech IAG Training Center (Internal Use Only)


150

Figure 4-135 Choose the Function

5. You can choose manual or auto mapping. The picture below is manual mapping.

Advantech IAG Training Center (Internal Use Only)


151

Figure 4-136 Mapping Virtual COM

7. Key in the IP and choose the comport number you want and then click Map it.

Then the virtual COM port will show up under EDG Serial Ports.

Advantech IAG Training Center (Internal Use Only)


152

Figure 4-137 Check the Virtual COM

B. How to set up a Peer-to-Peer structure by using EKI-152x modules.

The following is the demo of the procedure of setting up Peer-to-Peer (Serial

Tunneling) by EKI-152x. The example structure is like below:

Figure 4-138 Peer-to-Peer Structure

Advantech IAG Training Center (Internal Use Only)


153

1. Use the EKI Serial Device Server Configuration Utility to search the EKI

modules.

Figure 4-139 Search for the Module

2. Set up the valid IP addresses and other parameters for both modules. All of the

changes will be saved until you click Apply button. Then, the module will be

rebooted.

Advantech IAG Training Center (Internal Use Only)


154

Figure 4-140 Configuration

Figure 4-141 Configuration

Advantech IAG Training Center (Internal Use Only)


155

3. Go to the Operation section and set the operation mode to USDG Mode

Figure 4-142 Choose USDG Mode

4. In this demo, I have set the IP addresses of two EKI-1524 as below:

Advantech IAG Training Center (Internal Use Only)


156

Figure 4-143 IP Configuration

5. Next, key in the IP address and TCP port of the destination EKI in the Peer to

Receiving Data. You can key in up to 16 IP addresses and TCP ports

Advantech IAG Training Center (Internal Use Only)


157

Figure 4-144 Peer Configuration

Figure 4-145 Peer Configuration

Advantech IAG Training Center (Internal Use Only)


158

6. Now, connect the COM1 of PC1 to the Port1 of EKI 1, and connect COM1 of PC2

to the Port2 of EKI 2 like this:

Figure 4-146 Hardware Structure

7. Open Hyper Terminal in each PC, and connect to COM1. Key in some numbers in

each Hyper Terminal screen and see whether these numbers will appear in the other

screen. If so, you have done the Peer-to-Peer setting successfully.

Advantech IAG Training Center (Internal Use Only)


159

Figure 4-147 Hyper Terminal Test

C. Use ModScans Modbus/TCP mode to communicate with serial ADAM-4000

I/O module via EKI-122x Modbus Gateway.

1. Open EKI Serial Device Server Configuration Utility and detect the EKI-122x.

Advantech IAG Training Center (Internal Use Only)


160

Figure 4-148 Detection of EKI-122x

2. Set the serial parameters of the port1 of EKI-122x to RS-485, 9600, None, 8, 1.

Figure 4-149 Configure the Serial Parameters

Advantech IAG Training Center (Internal Use Only)


161

3. Set the operating mode to Modbus Slave Mode, and add the ADAM-4000s ID

into the Manual Slave ID Control block.

Figure 4-150 Choose the Operating Mode and Add Slave ID

4. Click Apply to save all configuration.

5. Set up the HW environment.

PC(Running ModScan)-----(LAN)-----EKI-122x -----(RS-485)-----ADAM-4000

6. Use Modscans TCP/IP connection to connect to EKI-122xs IP address, and the

used TCP port of EKI-122x is 502 (Fixed).

7. Then, the Modscan is able to get the value of ADAM-4000 via EKI-122x.

Advantech IAG Training Center (Internal Use Only)


162

4.7 Hands-On

A. The application of Multi-Access (Virtual COM)

Scenario:

Use more than 2 applications or host PCs to access the same port of one EKI-

152x. One of the application or host PC sends command to the serial port and the

command will go through Loopback and will be sent back to the application or host

PC as the response. Lets check whether other application or host PCs would receive

the response simultaneously. Besides, what will happen after enabling the Response

Timeout option in the utility?

Structure:

Advantech IAG Training Center (Internal Use Only)


163

Figure 4-151 Hyper Terminal Test

Material:

1. EKI-152x *1

2. PC *1 (More than two host PCs would be better; however, this hands-on is able to

progress with only one host PC).

3. Loopback *1

Procedure:

1. You can choose either map virtual COM port on each PC (up to 5) or map two

virtual COM ports on one PC but these two are pointed to the same port of EKI-

152x. In the following example, I will map two virtual COM ports for the same

port of EKI-1524 in one PC (Please refer to the figures below).

Advantech IAG Training Center (Internal Use Only)


164

Figure 4-152 Mapping Virtual COM Ports

2. Use Hyper Terminal to connect to each virtual COM.

Advantech IAG Training Center (Internal Use Only)


165

Figure 4-153 Hyper Terminal

3. Send data into one of the Hyper Terminals and see whether both terminals can

receive data or only the terminal, which sent data, will receive data.

Figure 4-154 Hyper Terminal

Advantech IAG Training Center (Internal Use Only)


166

Chapter 5 Functionality of Ethernet

Switch and Media Converter

The Advantech EKI-2000 and EKI-7000 series of Industrial Ethernet solutions

offer a wide range of transmission media options, including: copper, fiber optic and

wireless. Data transmission rates can range from 10 Mbps, 100 Mbps to 1000Mbps,

making the process of manufacturing data not just available at the field level, but also

seamlessly integrated into higher-level data acquisition systems. Advantechs EKI-

7000 series X-Ring technology offers the fastest redundant ring recovery time (<

10ms) to secure data communication and reliability. Furthermore, the robust design,

DIN-rail mounting and +12~48 VDC redundant power inputs make EKI-2000/7000

suitable for rugged industrial applications.

5.1 Unmanagement Switch

Advantech's Unmanaged Industrial Ethernet Switches are designed for use in

Advantech IAG Training Center (Internal Use Only)


167

demanding industrial environments, offering unmatched performance, reliability, and

value. With no setup required, they are truly plug-and-play. Models are available in

standard 10/100Mbps and gigabit 10/100/1000Mbps speeds, with both copper wire

and fiber optic connections.

The unmanaged switch doesnt have much special functionality, but the rugged HW

and power redundant design. Of course, it supports din-rail and wall mounting. In

addition, there is a special module, EKI-2525P, which provides the POE (Power-

Over-Ethernet) solution for certain application, such as Video Surveillance.

The below is the hardware overview of EKI-2000 unmanaged switch.

Figure 5-155 EKI-2000 Hardware Overview

Advantech IAG Training Center (Internal Use Only)


168

5.2 Management Switch

Advantech's EKI-7000 Managed Redundant Industrial Ethernet Switches allow

users to expand their industrial network fast and cost-effectively, while the rugged

industrial-grade design assures reliability and stability. Moreover, Advantech's X-Ring

technology offers the fastest recovery time (< 10 ms) to increase the reliability and

speed of network infrastructures. EKI-7000 series are an ideal solution for easily

managing applications at the central office or local site.

The following figure is the hardware overview of EKI-7000 switch.

Figure 5-156 EKI-2000 Hardware Overview

Advantech EKI Managed Switch provides plenty of management function for

various applications. These functions are categorized into 4 groups, System Tool Box,

Advantech IAG Training Center (Internal Use Only)


169

Port Tool Box, Network Protocol, and Security Tool. We will have the introduction to

each function in the following sections.

Besides, EKI managed switch provides various methods to let the users configure

it, such as Web Browser, Telnet, Serial Console, SNMP, X-Ring Utility, etc.

5.2.1 System Tool Box

Figure 5-157 System Tool Box

5.2.1.1 System Information

Assign the system name, location and view the system information

Advantech IAG Training Center (Internal Use Only)


170

Figure 5-158 System Information

5.2.1.2 IP Configuration

User can configure the IP address and enable the DHCP client function here.

Figure 5-159 IP Configuration

Advantech IAG Training Center (Internal Use Only)


171

5.2.1.3 DHCP Server

The system provides the DHCP server function. After enabling the DHCP server

function, the EKI switch system will be a DHCP server.

Figure 5-160 DHCP Server

Advantech IAG Training Center (Internal Use Only)


172

Figure 5-161 DHCP Server

DHCP Server System Configuration

When the DHCP server function is active, the system will collect the DHCP

client information and displays it here.

Figure 5-162 DHCP Server Client Entries

DHCP Server - Port and IP Bindings

You can assign the specific IP address that is the IP in dynamic IP assign range to

the specific port. When the device is connecting to the port and asks for dynamic IP

assigning, the system will assign the IP address that has been assigned before to the

connected device.

Advantech IAG Training Center (Internal Use Only)


173

Figure 5-163 DHCP Server Port and IP Binding

5.2.1.4 TFTP Transaction

TFTP - Update Firmware

It provides the functions to allow a user to update the switch firmware. Before

updating, make sure you have your TFTP server ready and the firmware image is on

the TFTP server.

Advantech IAG Training Center (Internal Use Only)


174

Figure 5-164 TFTP Update Firmware

TFTP Restore Configuration

You can restore EEPROM value from TFTP server, but you must put the image

file on TFTP server first, switch will download back flash image.

Figure 5-165 TFTP Restore Configuration

TFTP - Backup Configuration

You can save current EEPROM value from the switch to TFTP server, then go to

the TFTP restore configuration page to restore the EEPROM value.

Advantech IAG Training Center (Internal Use Only)


175

Figure 5-166 TFTP Restore Configuration

5.2.1.5 System Event Log

The EKI switch can not only record certain events in its memory, but also can

send these events to a syslog server.

Figure 5-167 System Event Log

Advantech IAG Training Center (Internal Use Only)


176

Figure 5-168 System Event Log Syslog Configuration

System Event Log - SMTP Configuration

You can set up the mail server IP, mail account, account password, and

forwarded email account for receiving the event alert.

Advantech IAG Training Center (Internal Use Only)


177

Figure 5-169 System Event Log SMTP Configuration

System Event Log - Event Configuration

You can select the system log events and SMTP events. Whenever the selected

events occur, the EKI will send out the log information. Also, per port log and SMTP

events can be selected.

Advantech IAG Training Center (Internal Use Only)


178

Figure 5-170 System Event Log Event Configuration

5.2.1.6 Fault Relay Alarm

There is a built-in Relay inside every EKI module. When one of the power input is

broken or a certain port is link down, the Relay will be turned on automatically. The

customer can connect a boozer or an indicator to this relay to have a real-time monitor

ability.

Advantech IAG Training Center (Internal Use Only)


179

Figure 5-171 Fault Relay Alarm

5.2.1.7 SNTP

You can configure the SNTP (Simple Network Time Protocol) settings. The

SNTP allows you to synchronize switchs clock with the SNTP server on the Internet.

Figure 5-172 SNTP Configuration

Advantech IAG Training Center (Internal Use Only)


180

5.2.1.8 IP Security

Before enabling this IP security function, every PC is able to configure the EKI

switch as long as this PC is in the same Network group with the EKI switch.

However, after enabling the IP security function, you can assign 10 specific IP

addresses that have permission to access and configure the switch via web browser or

telnet for the securing switch management.

Figure 5-173 IP Security

5.2.1.9 User Authentication

You can change the web management login user name and password of the EKI

Advantech IAG Training Center (Internal Use Only)


181

switch for the management security issue.

Figure 5-174 User Authentication

5.2.2 Port Tool Box

Figure 5-175 Port Tool Box

Advantech IAG Training Center (Internal Use Only)


182

5.2.2.1 Port Statistics

The user can monitor the condition and status of each LAN port of EKI switch.

Figure 5-176 Port Statistics

5.2.2.2 Port Control

In Port control, you can view every ports status that depends on user setting and

the negotiation result. The user can disable the unused LAN port for security issue

here as well.

Advantech IAG Training Center (Internal Use Only)


183

Figure 5-177 Port Control

Port Security:

Figure 5-178 Port Control- Port Security

The Port Security function needs to work with Static MAC Address function.

(Please refer to Sec 5.2.4.2) After the user enable the port security for Port1, the

authority of send/receive package of the device that the MAC address has been listed

in the Static MAC address table will be limited in Port1 only.

Advantech IAG Training Center (Internal Use Only)


184

Figure 5-179 Port Control- Port Security

5.2.2.3 Port Trunk

Port Trunk (Link Aggregation) or IEEE 802.3ad, is a computer networking term

which describes using multiple Ethernet network cables/ports in parallel to increase

Advantech IAG Training Center (Internal Use Only)


185

the link speed beyond the limits of any one single cable or port, and to increase the

redundancy for higher availability.

Figure 5-180 Port Trunk

The Link Aggregation Control Protocol (LACP) is a computer networking term

and is part of IEEE specification 802.3ad that can control the bundling of several

physical ports together to form a single logical channel. LACP allows a network

device to negotiate an automatic bundling of links by sending LACP packets to the

peer (directly connected device that also implements LACP).

LACP works by sending frames (LACPDUs) down all links that have the protocol

enabled. If a device is present on the other end of the link that also has LACP enabled,

it will also independently send frames along the same links enabling the two units to

detect multiple links between themselves and then combine them into a single logical

link. LACP can be configured in one of two modes: Active or Passive. In Active mode

it will always send frames along the configured links. In passive mode however, it

Advantech IAG Training Center (Internal Use Only)


186

acts as "speak when spoken to", and therefore can be used as a way of controlling

accidental loops (as long as the other device is in active mode).

Figure 5-181 Port Trunk

Aggregator Information:

When you have setup the aggregator setting with LACP disabled, you will see the

local static trunk group information here.

Advantech IAG Training Center (Internal Use Only)


187

Figure 5-182 Port Trunk- Aggregator Information

State Activity

When you had setup the LACP aggregator, you can configure port state activity.

You can mark or un-mark the port. When you mark the port and click Apply button

the port state activity will change to Active. Opposite is Passive.

Active: The port automatically sends LACP protocol packets.

Passive: The port does not automatically send LACP protocol packets, and

responds only if it receives LACP protocol packets from the opposite device.

Figure 5-183 Port Trunk- State Activity

Advantech IAG Training Center (Internal Use Only)


188

Note: IGMP Function is not compatible to Port Trunk. Therefore, please turn off the

Port Trunk function when you would like to use IGMP.

5.2.2.4 Port Mirroring

The Port mirroring is a method for monitor traffic in switched networks. Traffic

through ports can be monitored by one specific port. That means traffic goes in/out

the monitored (source) ports will be duplicated into the mirror (destination) port. This

function is generally used for troubleshooting.

Figure 5-184 Port Mirroring

Advantech IAG Training Center (Internal Use Only)


189

Figure 5-185 Port Mirroring

5.2.2.5 Rate Limiting

You can adjust each ports bandwidth rate and frame limitation type. There are

four kinds of frame types can be chosen, All, Broadcast/Multicast/Flooded Unicast,

Broadcast/Multicast, and Broadcast only. The user can limit the ingress/egress rate of

each port respectively.

Advantech IAG Training Center (Internal Use Only)


190

Figure 5-186 Rate Limiting

5.2.3 Network Protocol

Advantech IAG Training Center (Internal Use Only)


191

Figure 5-187 Network Protocol

5.2.3.1 VLAN

Virtual LAN, commonly known as a VLAN, is a method of creating independent

logical networks within a physical network. It helps in reducing the broadcast domain

and aids in network administration by separating logical segments of a LAN. Every

client can exchange data when they are in the same VLAN group even though they

are connected to different switches, and cannot exchange data when they are in

different VLAN groups even though they are connected to the same switch.

Figure 5-188 VLAN

VLAN configuration - Port-based VLAN

Advantech IAG Training Center (Internal Use Only)


192

There are two ways to set up the VLAN structure. The first one is port-based, the

users use the number of each LAN port to set up different VLAN groups. In this way,

the user can only set up VLAN groups in ONE switch. Packages can go among only

members of the same VLAN group. Note all unselected ports are treated as belonging

to another single VLAN If the port-based VLAN enabled.

Figure 5-189 Port-Based VLAN

Figure 5-190 Port-Based VLAN

Advantech IAG Training Center (Internal Use Only)


193

VLAN configuration - Tag-based VLAN(802.1Q)

The VLAN information is written into the Ethernet packet itself. Each packet

carries a VLAN ID (called Tag) as it traveled across the network. The switch uses

these tags to distinguish the data that belongs to which VLAN group. In this way, the

VLAN groups can be extended to many switches. For example, two LAN ports in two

different Switches can be in the same VLAN group.

Figure 5-191 Port-Based VLAN

The following figure is a sample of Tag-Based VLAN (802.1Q) in one of the

switches:

Advantech IAG Training Center (Internal Use Only)


194

Figure 5-192 Tag-Based VLAN

There are three types of link for each LAN port:

Access Link: Once the LAN port has been being chosen as an Access Link, it needs

to connected to other Network devices, such as PC. The incoming package from the

Network Device will not contain VLAN Tag. Once the package arrives this LAN port,

it will be added a VLAN Tag in front of it and then sent to other LAN port depending

on its destination address. For example, by referring to the above figure, the receiving

package of LAN Port1~3 will be added a Tag that the value is 200, and the receving

package of LAN Port 4~6 will be added a Tag that the value is 300.

When this package has been sent to other LAN port internally, this LAN port

Advantech IAG Training Center (Internal Use Only)


195

will inspect whether the VLAN tag of the package is the same with itself. If so, the

package is accepted and can be output from this LAN port; if not, this package will be

dropped.

Trunk Link: If the user would like to set up the VLAN group cross several managed

switches, the LAN ports link each switches should be set as Trunk Link ports. A

Trunk Link Port acts as a tagged package gateway, so that is able to receive packages

containing VLAN tags, and forward them to other switches, but it cannot add VLAN

tag to the receiving packages actively.

For example, by referring to the above figure, Port9 and Port10 are able to

forward the packages, which contain 100, 200, 300 tags, to the conneted switches. Of

cource, the adjacent LAN port of other switch should be set as a Trunk Link Port as

well.

Hybrid Link: It can be either a Trunk Link or a Access Link. Depends on what type

of Network Device is connected and which value is added (Tagged Vid/ Untagged

Vid).

GVRP: Group VLAN Registration Protocol allows automatic VLAN configuration

between the switch and nodes. If the switch is connected to a device with GVRP

Advantech IAG Training Center (Internal Use Only)


196

enabled, you can send a GVRP request using the VID of a VLAN defined on the

switch; the switch will automatically add that device to the existing VLAN.

Management VLAN ID: This is a security feature. Only the LAN Ports belong to a

certain VLAN group are allowed to configure this EKI managed switch. For example,

if the administrator adds 100 into the Management VLAN ID section, the user can

only use Port1~3 to configure the switch.

5.2.3.2 RSTP

The Spanning Tree Protocol is an OSI layer-2 protocol that ensures a loop-free

topology for any bridged LAN and is implemented in many applications that require

Ethernet redundancy. It is based on an algorithm invented by Radia Perlman while

working for Digital Equipment Corporation. Spanning tree allows a network design to

include spare (redundant) links to provide automatic backup paths if an active link

fails, without the danger of bridge loops, or the need for manual enabling/disabling of

these backup links. Bridge loops must be avoided because they result in flooding the

network.

In 1998, the IEEE with document 802.1w introduced an evolution of the Spanning

Advantech IAG Training Center (Internal Use Only)


197

Tree Protocol: Rapid Spanning Tree Protocol (RSTP), which provides for faster

spanning tree convergence after a topology change. Standard IEEE 802.1D-2004 now

incorporates RSTP and obsoletes STP. While STP can take 30 to 50 seconds to

respond to a topology change, RSTP is typically able to respond to changes within a

second.

Please check the users manual of EKI managed switches for details.

Figure 5-193 RSTP- System Configuration

Advantech IAG Training Center (Internal Use Only)


198

Figure 5-194 RSTP- Port Configuration

5.2.3.3 SNMP

Simple Network Management Protocol (SNMP) is the protocol developed to

manage nodes (servers, workstations, routers, switches and hubs etc.) on an IP

network. SNMP enables network administrators to manage network performance, find

and solve network problems, and plan for network growth. Network management

systems learn of problems by receiving traps or change notices from network devices

implementing SNMP.

Advantech IAG Training Center (Internal Use Only)


199

Advantech provides MIB files for each EKI managed switch to let the

administrators upload these files into SNMP software, and then they are able to

configure the EKI managed switches by using SNMP software.

Figure 5-195 SNMP

SNMP Trap

It is similar to the system event log function. The switch will send SNMP trap to

the SNMP server whenever a certain event happens.

Figure 5-196 SNMP Trap

Advantech IAG Training Center (Internal Use Only)


200

Figure 5-197 SNMP Trap

5.2.3.4 QoS

Quality of service is an ability to provide different priorities to different

applications, users, or data flows, or to guarantee a certain level of performance to a

data flow. For example, a required bit rate, delay, jitter, packet dropping probability

and/or bit error rate may be guaranteed.

Figure 5-198 QoS

Advantech IAG Training Center (Internal Use Only)


201

The EKI switch provides two types of transmission scenario to transmit packages for

different priority data.

1. Using the 8,4,2,1 weight fair queue scheme:

The switch will follow 8:4:2:1 rate to process priority queue from High to lowest

queue. For example: the system will process 80 % high queue traffic, 40 % middle

queue traffic, 20 % low queue traffic, and 10 % lowest queue traffic at the same time.

And the traffic in the Low Priority queue are not transmitted until all High, Medium,

and Normal traffic are serviced.

Figure 5-199 QoS - Using the 8,4,2,1 weight fair queue scheme

2. Strict priority scheme of Diagram:

The switch will process the package from the highest priority source first until

the package is end up. Then, switch will start transmit the packages from the second

priority source.

Advantech IAG Training Center (Internal Use Only)


202

There are three different ways to assign the priority:

1. Port-based:

The users can assign the priority for each LAN port, and the switch will handle the

data by referring to the priority of each LAN port.

Figure 5-200 Port-Based QoS

2. CoS:

Class of Service (CoS) is a layer two Ethernet frame header when using IEEE

802.1Q. It specifies a priority value of between 0 (signifying best-effort) and 7

(signifying priority real-time data) that can be used by Quality of Service disciplines

to differentiate traffic.

Advantech IAG Training Center (Internal Use Only)


203

Figure 5-201 QoS- CoS

3. ToS:

Figure 5-202 QoS- ToS

The system will refer to the ToS (Type of Service) byte of the IP header to assign

the priority for the packages. The modern definition of the TOS byte is a six-bit

Differentiated Services Code Point(DSCP) and a two-bit Explicit Congestion

Notification field (ECN). Differentiated Services Code Point (DSCP) is a field in the

Advantech IAG Training Center (Internal Use Only)


204

header of IP packets for packet classification purposes. (For more information, please

search it on the website)

Figure 5-203 ToS Framework

The EKI switch provides 0~63 TOS priority level. Each level has 4 types of

priority high, middle, low, and lowest. The default value is Lowest priority for

each level. When the IP packet is received, the EKI system will check the TOS level

value in the IP packet that has received. For example, user set the TOS level 25 to

high priority. The port 1 is following the TOS priority policy only. When the port1

packet received, the system will check the TOS value of the received IP packet. If the

TOS value of received IP packet is 25(priority = high), then the packet priority will

have highest priority.

Advantech IAG Training Center (Internal Use Only)


205

Figure 5-204 QoS- ToS

5.2.3.5 IGMP

The Internet Group Management Protocol (IGMP) is a communications protocol

used to manage the membership of Internet Protocol multicast groups. IGMP is used

by IP hosts and adjacent multicast routers to establish multicast group memberships. It

is an integral part of the IP multicast specification, operating above the network layer,

though it doesn't actually act as a transport protocol. It is analogous to ICMP for

unicast connections. IGMP can be used for online streaming video and gaming, and

allows more efficient use of resources when supporting these types of applications.

IGMP does allow some attacks and firewalls commonly allow the user to disable it if

Advantech IAG Training Center (Internal Use Only)


206

not needed.

Figure 5-205 IGMP

The switch support IP multicast, you can enable IGMP protocol on web

managements switch setting advanced page, then displays the IGMP snooping

information. IP multicast addresses range are from 224.0.0.0 through

239.255.255.255.

Advantech IAG Training Center (Internal Use Only)


207

Figure 5-206 IGMP Setting

5.2.3.6 X-Ring

X-Ring provides a faster redundant recovery than Spanning Tree topology. The

action is similar to STP or RSTP, but the algorithm is not the same.

In the X-Ring topology, every switch should enable X-Ring function and assign

two member ports in the ring. Only one switch in the X-Ring group would be set as a

backup switch that would be blocked, called backup port, and another port is called

working port. Other switches are called working switches and their two member ports

are called working ports. When the failure of network connection occurs, the backup

port will automatically become a working port to recovery the failure.

Advantech IAG Training Center (Internal Use Only)


208

Figure 5-207 The Most Basic X-Ring Topology

The switch supports the function and interface for setting the switch as the ring

master or slave mode. The ring master can negotiate and place command to other

switches in the X-Ring group. If there are 2 or more switches in master mode, then

software will select the switch with lowest MAC address number as the ring master.

The X-Ring master ring mode will be enabled by the X-Ring configuration interface.

Also, user can identify the switch as the ring master from the R.M. LED panel of the

LED panel on the switch.

Advantech IAG Training Center (Internal Use Only)


209

Figure 5-208 X-Ring Setting

The followings are other X-Ring topologies that EKI supports:

Couple-Ring:

Using the coupling ring function can connect each X-Ring for the redundant

backup. It can ensure the transmissions between two ring groups will no failure.

Figure 5-209 Couple-Ring

Advantech IAG Training Center (Internal Use Only)


210

Dual-Homing:

Dual Homing function is to prevent the connection lose between X-Ring group

and upper level/core switch. Dual Homing application provides an advanced

redundancy network solution by connecting switches running in different redundant

protocols

Figure 5-210 Dual-Homing

Dual-Ring:

In a Dual Ring topology, one EKI managed switch can be the ring master of two

basic X-Rings.

Advantech IAG Training Center (Internal Use Only)


211

Figure 5-211 Dual-Homing

Central-Ring:

One EKI Managed Switch can be the ring master of four basic X-Rings.

Figure 5-212 Central-Ring

Key-Ring:

Key-Ring is a special ring topology that only being supported by special FW of

EKI managed switch. The ring Master of the Smart Ring on the top circle can also be

Advantech IAG Training Center (Internal Use Only)


212

the Ring Master of the three smart rings in the second layer.

Figure 5-213 Key-Ring

Each X-Ring is not supported by all EKI managed switches. The following is X-

Ring the supporting list:

Figure 5-214 X-Ring Support List

There is one important information about X-Ring the reader needs to note.

When using either 1G Fiber Optic ports or 100M Copper ports to set up a X-Ring, the

Advantech IAG Training Center (Internal Use Only)


213

recovery time will be under 10ms. However, this number will extend to 150ms when

using 1G Copper ports to set up the X-Ring.

The reason is the limitation or feature of PHY Chip inside EKI Switch. There

has one registry inside the PHY chip is utilized to represent the status of the Ethernet

connection (Connected or disconnected). When we plug off the Ethernet cable (FO or

Copper), the condition of this registry should turn to Disconnected immediately.

This is the feature of the 100M PHY chip, but not for the 1G speed PHY chip.

The registry inside 1G speed PHY chip will turn to Disconnected about 100ms

after we plug off the Ethernet cable. That is why the recovery time cannot be under

10ms when using 1G copper port.

You may wonder why 1G Fiber Optic port is able to commit that since it uses the

same PHY chip with 1G copper port. It is because there is an I/O pin inside the Fiber

Optic module that represents the status of the Ethernet connection as well, and it can

represent the condition in time. Thus, when using 1G Fiber Optic port, the switch will

not refer to the registry of PHY chip, but the I/O ping of the Fiber Optic module.

5.2.4 Security Tool

Advantech IAG Training Center (Internal Use Only)


214

Figure 5-215 Security Tool

5.2.4.1 802.1x/RADIUS

802.1x is an IEEE authentication specification that allows a client to connect to a

wireless access point or wired switch but prevents the client from gaining access to

the Internet until it provides authority, like a user name and password that are verified

by a separate server.

Advantech IAG Training Center (Internal Use Only)


215

Figure 5-216 RADIUS Server

After enabling the IEEE 802.1X function, you can configure the parameters of this

function.

Figure 5-217 802.1x/Radius System Configuration

You can configure 802.1x authentication state for each port. The State provides

Disable, Accept, Reject and Authorize. Use Space key change the state value.

Advantech IAG Training Center (Internal Use Only)


216

Figure 5-218 802.1x/Radius Port Configuration

There are many advanced Settings about 802.1x/Radius function in Misc

Configuration, please refer to the user manual for details.

Figure 5-219 802.1x/Radius Misc Configuration

Advantech IAG Training Center (Internal Use Only)


217

5.2.4.2 MAC Address Table

Use the MAC address table to ensure the port security. You can add a static MAC

address; it remains in the switch's address table, regardless of whether the device is

physically connected to the switch. This saves the switch from having to re-learn a

device's MAC address when the disconnected or powered-off device is active on the

network again. You can add / modify / delete a static MAC address.

When you key in one MAC address (For example, 01 02 03 04 05 06) into the

static MAC address table of a certain port on the EKI switch, all packages that are

going to be delivered to 01 02 03 04 05 06(Destination MAC address) will be

delivered to port1, no matter this device is connected to any other port of the same

EKI switch. That is to say, this device is only allowed to receive any package in port1.

However, this device is allowed to send data from any other port.

Advantech IAG Training Center (Internal Use Only)


218

Figure 5-220 MAC Address Table Static MAC Addresses

Figure 5-221 MAC Address Table Static MAC Addresses

If you would like to limit both receive and transmission authority of a certain

MAC address in one specific port, you need to add that MAC address into the Static

MAC address table and enable Port Security function for that LAN port. (Please

refer to Sec 5.2.2.2 Port Control) That is to say, from now on, the device has this

MAC address can only plug in this specific LAN port of EKI switch, otherwise it

Advantech IAG Training Center (Internal Use Only)


219

cannot send/receive package anymore.

MAC Filtering:

By filtering MAC address, the switch can easily filter pre-configure MAC

address and reduce the un-safety. You can add and delete filtering MAC address. For

example, if my PCs MAC address, 00FF3837465F, has been added into the MAC

Filtering Table, I am no longer able to use this EKI switch.

Figure 5-222 MAC Address Table MAC Filtering

You can view the port that connected devices MAC address and related devices

MAC address.

Advantech IAG Training Center (Internal Use Only)


220

Figure 5-223 MAC Address Table All MAC Addresses

5.2.5 Hands-On

A. Managing the EKI Switchs IP address in Console Mode

Scenario: There are five ways to configure and monitor EKI managed switch, Web,

Telnet, SNMP, Utility, and Console. In this hands-on, we will teach you have to

manage the IP address of the EKI switch.

Structure:

Advantech IAG Training Center (Internal Use Only)


221

Figure 5-224 Managing Switchs IP address in Console Mode

Material:

1. EKI Managed Switch *1

Procedure:

1. Connect the Console port (9-pin, DB9) of the EKI Switch to the RS-232 serial

port of your laptop (COM1). (The serial parameters are 9600, None, 8, 1)

2. Launch Hyper Terminal on your laptop.

3.

Figure 5-225 Launch Hyper Terminal

Advantech IAG Training Center (Internal Use Only)


222

4. At the Connect To dialog, select Connect using COM1.

5. At the COM1 Properties dialog, make the following selections and click OK.

6.

Figure 5-226 Serial Parameters

7. Now, click Enter button on your keyboard, and see if there are some information

appear on your screen. At User Name: Type admin, hit enter. At Password: Type

admin, hit enter.

Advantech IAG Training Center (Internal Use Only)


223

Figure 5-227 Managing IP address of EKI Switch

8. For a list of commands: Type ?, hit enter. Enter Privileged EXEC mode: Type

enable, hit enter.

Figure 5-228 Managing IP address of EKI Switch

9. For a list of commands: Type ?, hit enter.

10. We will use Show function: Type show? to display a list of functions that can be

shown.

11. We will use Show system IP information: Type show ip, hit enter. This displays

current IP configuration information.

Advantech IAG Training Center (Internal Use Only)


224

Figure 5-229 Managing IP address of EKI Switch

12. Enter Global Configuration Mode: Type configure, hit enter.

13. Use IP address: Type ip address ?, hit enter.

Figure 5-230 Managing IP address of EKI Switch

14. Use IP address 192.168.1.10x: Type ip address 192.168.1.10x 255.255.255.0

192.168.1.1.

Advantech IAG Training Center (Internal Use Only)


225

Figure 5-231 Managing IP address of EKI Switch

15. Leave configure mode: Type exit, hit enter.

Figure 5-232 Managing IP address of EKI Switch

16. Save the configuration: Type write memory, hit enter.

Figure 5-233 Managing IP address of EKI Switch

Advantech IAG Training Center (Internal Use Only)


226

B. Set Up a Basic X-Ring

Scenario: Use three EKI Management Switches to set up a basic X-Ring. Then,

connect two PC to two difference EKI switches. Use Ping command on one of the

PCs to ping the other one continueously. Then, disconnect any one of the LAN cable

and see if the Ping command would face error.

Structure:

Figure 5-234 X-Ring

Material:

1. EKI Managed Switch *3

Procedure:

Advantech IAG Training Center (Internal Use Only)


227

1. Connect these three EKI switches as a line structure.

Figure 5-235 X-Ring

2. Enable the X-Ring and Ring Master for three EKI switches. Then, select Port9

and Port10 for the 1st and 2nd Ring Ports.

Figure 5-236 X-Ring

3. The EKI switch that has the smallest MAC address will be selected to be the Ring

Master, and others will be the back up Ring Master.

4. Circle the three EKI switches to a loop and connect another PC to the EKI switch.

Advantech IAG Training Center (Internal Use Only)


228

5. Use ping on one PC to see if it can get the ack from the other PC.

Figure 5-237 Ping Command

6. Disconnect one of the cable and see whether the ping program faces error.

5.3 Media Converter

Advantech's Industrial Ethernet Media Converters are compact and robust devices

designed to convert and transmit Gigabit Ethernet or Fast Ethernet networks into

Advantech IAG Training Center (Internal Use Only)


229

Gigabit or Ethernet fiber optic networks by transparently converting digital electric

Ethernet signals to optical signals.

Based on different types of EKI media converter (EKI-2541 series and EKI-2741

series), there are two and four dip switch on the front panel of the module

respectively.

Figure 5-238 Dip Switch on EKI Module

The Following is the description of the dip switch on EKI-2541 series modules.

Advantech IAG Training Center (Internal Use Only)


230

Figure 5-239 Dip Switch on EKI-2541 Series Module

The Following is the description of the dip switch on EKI-2741 series modules.

Figure 5-240 Dip Switch on EKI-2741 Series Module

Enables Port/Power Alarm:

There is a built-in Relay on each EKI series module. The user can connect an

indicator, boozer, or other device to this Relay to monitor the status of the EKI

module. LFP (Link Fault Pass-Through): When LFP is enabled; it allows UTP link

failures to be reported to the fiber side and also allows Fiber link failures to be

reported to the UTP side. Therefore, an LFP feature is provided in both UTP and Fiber

side.

Advantech IAG Training Center (Internal Use Only)


231

Enables LFP (Link Fault Pass-Through):

Link Fault Pass Through is usually used to solve the problem encountered when

operating traditional media converters. The problem is that when one side of the link

fails, the other side still continues to transmit packets, and waits for a response that

will never arrive. When the user enable the LFP function, it allows UTP link failures

to be reported to the fiber side and also allows Fiber link failures to be reported to the

UTP side. Therefore, an LFP feature is provided in both UTP and Fiber side.

100Base-FX Half-mode/ Full-mode:

Let user to switch the operation mode of Fiber Optic port manually to adapt to

different connected Network Device.

Pure Converter mode (100TX to 100FX)/ Switch Converter mode:

When pure converter mode is enabled (on), it operates with the minimum latency.

The transmission flow does not wait until entire frame is ready, but instead it forwards

the received data immediately after the data being received. UTP port should be

forced at 100M in this application. When DIP Switch is in Switch Converter mode

(off), the converter function is same as a Switch.

Advantech IAG Training Center (Internal Use Only)


232

Note: Please dont change the DIP-switch setting when UTP or fiber port is

transmitting or receiving data. It may cause some data error. Besides, if you change

the DIP-switch setting, please power off the converter and power on again to make

the setting effective.

Chapter 6 Conclusion

As the leading supplier of Industrial Automation products worldwide,

Advantech has the experience and know-how to offer world-class

industrial communication products for PC-based automation. Advantechs

products not only have the ability to connect sensors and I/O devices

from field sites and factories, but also provide an Ethernet backbone to

integrate these products with enterprise systems in real time.

Advantech IAG Training Center (Internal Use Only)

You might also like