Industrial Automation Communication
Industrial Automation Communication
Industrial Automation Communication
8P8C: 8P8C ports and cable connectors have 8 conductors, and 8P8C connectors
are attached to twisted-pair copper Ethernet cables, e.g., Category 6 cables. 8P8C
ports are built into Network Interface Cards (NICs) in computers, Ethernet switches,
media converters, and other devices. Various sizes and shapes of connectors,
including RJ-11 and RJ-45 phone cable connectors, are part of the 8P8C group.
What is OPC?
In the past, OPC was a collection of software interfaces for data exchange between
PC applications and process devices. These software interfaces were defined
according to the rules of Microsoft COM (Component Object Model) and were
therefore easy to integrate on Microsoft operating systems. COM or DCOM
(Distributed COM) provides the functionality of inter process communication and
organizes the exchange of information between applications, even by means of
computer boundaries (DCOM). Therefore, an OPC client (COM client) can exchange
information with an OPC server (COM server) using mechanisms of the Microsoft
operating system.
The OPC server provides process information of a device available at its interface. The OPC
client connects with the server and can access the offered data.
Key Features:
Platform Independence: OPC UA is designed to work across
different operating systems, hardware platforms, and
communication networks, including Ethernet, TCP/IP, and more.
Security: OPC UA incorporates advanced security features such
as authentication, encryption, and access control to protect data
integrity and confidentiality.
Scalability: OPC UA supports scalable architectures, allowing for
efficient communication in both small-scale and large-scale
industrial systems.
Information Modelling: OPC UA introduces the concept of
information modelling, enabling the representation of complex
data structures and relationships in a standardized and
semantically meaningful way.
Integration: OPC UA provides built-in features for integrating
with other industrial protocols and standards, facilitating
interoperability and seamless communication between
heterogeneous systems.
Communication methods
Three common methods for communications between
networks are Master-Slave, Token-Ring, and Ethernet.
Master-slave communications is quite simple. It's also used often in industrial
controllers. In this technique, a master device issues commands to one or more
slaves, and the slave(s) respond. For example, a PLC which is connected to 3
external (or remote) racks may be the master. Every 40 milliseconds, the PLC's
processor first checks for any altered inputs in the local rack (the rack where the
processor is located); then it sends a query to the 1st external rack to see if any
inputs have changed, or hardware failures have occurred. Any changes are reported
back to the processor. The process is repeated for the 2nd external rack after
querying of the 1st rack is done; and the 3rd rack after the 2nd rack has been
checked. Then the processor runs its program, changes any outputs if necessary,
then it sends, or "writes" new data to the output registers of modules in the local rack
and 3 external racks. Usually, the slave devices are not controllers – but sometimes
they are. In the latter case, a master controller might send a set point to a slave
controller.
Token-Ring networks rely on token passing for data communications. As the name
suggests, token-ring communications is used on ring networks. "A special message,
called the token, is passed from one machine to another around the ring, and each
machine can transmit only while it is holding the token."1 Token-ring networks never
became prevalent in business and industry. However, token-passing doesn’t require
a ring network for use – it can be, and is, used on networks of other topologies.
So, some protocols rely on token-passing but don’t use a ring network.
Ethernet: Ethernet is essentially a method for communications between computers
and other devices on a network. Ethernet makes use of Carrier Sense - Multiple
Access with Collision Detection, or CSMA/CD. On an Ethernet network, any node
can communicate with any other node. It works like this: first, before a computer or
controller sends data to another (or more than one) device, it listens to see if the
network is busy. If the network is active, it will wait and try to send data later. If it
senses the network is available, it will transmit the data. However, due to network
time delays, a node may start sending data before it senses data release by another
network node. In that case, a data collision occurs, and neither node will be able to
successfully transmit data. Afterwards, each device will wait a random amount of
time before attempting data transfer again. Ethernet works better than any other
method for large networks. That’s why the Internet uses Ethernet. And use of the
Ethernet method has become common among industrial controllers. Furthermore,
communication speeds on Ethernet networks are fast – typically 100 megabits per
second (Mbps) or higher.
Peer-to-peer communications
When any network can transmit data to any other node on the network, the network
is called a peer-to-peer network. Peer-to-peer capability is only possible if the
application layer protocol supports it. Peer-to-peer networks can be implemented on
networks with many different topologies. A master-slave network is not a peer-to-
peer network.
Deterministic communications
Communications that occur within predictable and repeated time intervals are
referred to as deterministic. In controllers, deterministic communications capability
is vitally important. Most programmable controllers check and see if any inputs from
field devices have changed many times per second. If any have, the controller
responds rapidly. Deterministic communications is also referred to as cyclic
communications. Ethernet is "nondeterministic" - communications occur on an as-
needed basis. But some industrial communications protocols use deterministic
adaptations of Ethernet. (For example, EtherNet/IP.) Use of managed switches
effectively also makes most networks deterministic.