Technical information CANopen 1 in machines and installations
|
|
- Valerie Barnett
- 3 years ago
- Views:
Transcription
1 CANopen is an application layer protocol based on the controller area network (CAN). Bosch designed CAN for automotive applications in the early 1980s. Its use in the automotive industry has proved its suitability in difficult environments. CAN is a serial bus system based on a publisher subscriber model. In the publisher subscriber model the publisher sends a message to the subscribers. In CAN this has been implemented using a broadcast architecture. The sender (publisher) broadcasts the message together with an identifier on the bus. The receivers monitor all traffic on the bus. If the identifier matches the filtering criteria of the subscription the client reads and processes the complete message. This turns the receiver into a subscriber. Producer Consumer(s) request payload: 0 to 8 octets indication This is the push mode of the publisher subscriber model. CAN also supports a pull mode of the publisher subscriber model. A consumer may trigger the transmission of a message with a remote transmission request. The remote transmission request (RTR) is a CAN frame with the RTR flag set. When the producer receives such a request is transmits the associated message. Producer Consumer(s) request payload: 0 octets indication response payload: 0 to 8 octets confirmation(s) A problem that normally arises with a broadcast architecture is that different network nodes may send at the same time. CAN solves this problem with two mechanisms. Firstly, a sender monitors the medium to check whether another node is already sending. If the medium is free the node starts sending. Several nodes may start sending never the less at the same time. CAN solves this with a priority scheme. Idle SOF identifier RTR IDE r0 DLC Data FCS ACK EOF IFS Idle A CAN frame starts with a start of frame (SOF) bit. Eleven identifier bits follow from the most significant bit to the least significant bit. The next bit is the remote transmission request (RTR) bit followed by five control bits and up to eight bytes payload. The control bits are the extended ID (IDE), a reserve bit, and three bits encoding the length of the payload in the data part (DLC) in bytes. A frame check sequence (FCS) follows after the payload of up to eight bytes. The sender transmits a recessive ACK bit, which will be overwritten with a dominant bit by the receivers that have received the frame without error at this point of time. The end of frame (EOF) bit signals the end of the message. 62
2 The bus must remain in recessive state for intermission frame space (IFS) bit lengths before the next frame starts. If no node is ready to send the bus will remain idle. The bit encoding on the medium has a dominant and a recessive value. If two nodes send at the same time, a listener will only see the dominant value. In the binary encoding the value '0' is dominant and the value '1' is recessive. When a node is sending it is always listening on the bus. If it is sending a recessive value and is receiving a dominant bit it stops sending and continues listening only. This simple mechanism avoids collisions on the CAN bus. The message with the lower identifier wins the bus arbitration. SOF Identifier Controlfield RTR Data (0...8 octets) Node Node Node 1 is listening only Node Node 2 is listening only CAN bus Node 1 looses arbitration Node 2 looses arbitration Arbitration phase Time CAN is a carrier sense multiple access, with collision detection and arbitration on message priority, (CSMA/CD+AMP) bus system. As the collision in true sense does not occur in CAN it is often described as CMSA/CA (carrier sense multiple access with collision avoidance). The CAN message frame described above is a basic message frame. For applications, which need a larger set of identifiers, the extended CAN message frame has been defined. The extended frame has 18 additional ID bits in the header after the control bits. This extends the range from 2 11 to 2 29 different identifiers. Both frame types can coexist on one bus. CAN has three different mechanisms to detect erroneous messages: b The frame check sequence (FCS) contains the cyclic redundancy check (CRC) of the frame. The receiver also computes the CRC of the frame and compares its own result with the FCS. If they are not equal the frame has a CRC error. b The receiver detects errors in the structure of the frame. If the frame has a faulty structure, the frame has a format error. b The receiver of a frame issues a dominant acknowledge (ACK) bit if it has received a frame without error. If the sender does not receive a dominant ACK bit, it generates an acknowledgement error. b The sender also monitors the bits on the bus. If a bit is sent and the received counterpart differs, the sender recognizes an error. b CAN uses no return to zero (NRZ) coding with bit stuffing. If the sender should transmit five equal bits in a row it introduces an additional inverted bit. This bit stuffing enables the receiver to synchronize on the bit stream. The receivers remove the stuffed bits from the transmitted frame. If more than five bits have the same value, the receiver recognizes a bit stuffing error. There are several application level protocols on top of CAN available, such as DeviceNet and CANopen, as CAN does not define an application level protocol by itself. 63
3 CANopen defines an application layer and communication profile based on CAN. CANopen defines the following communication objects (messages): b Process data object (PDO) b Service data object (SDO) b Network management object (NMT) b Special function object (SYNC, EMCY, TIME) Properties b Serial data transmission based on CAN b Up to 1 Mbps b Efficiency approx. 57 % b Up to 127 nodes (devices) b Multi master capable b Interoperability of devices from different vendors Object dictionary The object dictionary is the interface between the application program and the communication interface. Communication interface Object dictionary Application process Process data object (PDO) Process data objects are used for fast transmission of process data. A PDO can carry a payload of 8 bytes, which is the maximum payload of a CAN frame. The transmission of a PDO uses the consumer producer model of CAN extended by synchronous transfers. The synchronous transfer of PDOs relies on the transfer of SYNC messages on the CAN bus. A PDO is sent in cyclical mode after a configurable number (1 to 240) of received SYNC messages. It is also possible to wait for the availability of data from the application process and send a PDO after the next received SYNC message. This is called acyclical synchronous transfer. Service data object (SDO) Service data objects are intended for transmission of parameters. SDOs provide access to the object dictionary of remote devices. An SDO has no length restriction. If the payload does not fit into the CAN frame, it will be split over several CAN frames. Each SDO is acknowledged. SDO communication uses a peer-to-peer communication with one peer acting as server and the other acting a client. 64
4 CANopen 1 Initialization Pre-operational node id: boot-up Network management objects (NMT) The network management objects (NMT) change the state, or monitor the status, of a CANopen device. A NMT message is a message with CAN identifier 0. This gives the NMT messages the highest possible priority. The NMT message always consists of two bytes payload in the CAN frame. The second byte contains the node ID of the addressed node. It is possible to address all devices with one NMT message with the reserved node ID 0. The first byte encodes the NMT command. Operational Stopped A CANopen device starts in the Initialization state after switching the power on. Then the device performs its initialization. When the device has completed its initialization it issues a boot-up NMT object to notify the master. The heartbeat protocol for monitoring the device status is implemented with NMT objects. Special function objects (SYNC, EMCY, TIME) CANopen may have a SYNC producer to synchronize the actions of the CANopen nodes. A SYNC producer issues (periodically) the SYNC object. The SYNC object has the CAN identifier 128. This may introduce some jitter due to the priority of this message. A device internal error may trigger an emergency (EMCY) object. The reaction of the EMCY consumers depends on the application. The CANopen standard defines several emergency codes. The EMCY object is transmitted in a single CAN frame with eight bytes. A CAN frame with the CAN ID 256 with six bytes payload can be used to transmit the time of day to several CANopen nodes. This time stamp (TIME) object contains the daytime value in the Time-Of-Day data type. Watchdog mechanisms CANopen supports two methods of monitoring the status of devices. A network manager may poll each device regularly in configurable time intervals. This is called node guarding. Node guarding is, however, bandwidth consuming. Another mechanism is that each device regularly sends a heartbeat message. This saves bandwidth compared to the node guarding protocol. Network length and bit rate The length is restricted by the bit rate due to the bit arbitration process. Bit rate (kbps) Max length (m) In documents about CANopen, you will find often 40 m as a maximum length at 1Mbit/s. This length is calculated without electrical isolation as used in the Schneider Electric CANopen devices. With the electrical isolation, the minimum network length calculated is 4 m at 1 Mbps. However, the experience shows that 20 m are the pratical length that could be shorten by stubs or other influences. Length limitations concerning stubs Length limitations concerning stubs have to be taken into account and are fixed by the following parameters. Baud rate (kbps) Lmax.(m) (1) 0, ΣL max.(m) local star (2) 0, Interval min. (m) 3, ,6 x ΣL local(3) ΣL max.(m) on all bus (4) 1, (1) L max.: Maximum length for one stub. (2) ΣL max. local star: Maximum cumulative length of stubsin the same point when using a multi-port TAP creating a local star. (3) Interval min.: minimun distance between two TAPs. Value for a maximum length of derivation in the same point. Could be computed case by case for each derivation: Interval min. between two derivation is 60 % of the cumulative length of derivations at the same point. (4) ΣL max. on all bus: Maximum cumulative length of stubs on the all bus. 65
5 Conformance classes Schneider Electric has defined conformance classes for slave and master devices. The conformance classes define, which features a device supports. Characteristics Conformance classes M10 M20 M30 Layer settings Slave ID Data rate kbps 125, 250, 500 M , 1000 M20 +10, 20, 800 LSS Master Devices supported NMT (Network Management object) NMT Master NMT Master, according to DS301 CANopen Manager NMT master, according to DS301. Configuration Manager according to DSP302. Boot-up procedure according to DSP302 Time stamp Producer Auto configuration support SDO (Service Data Object) SDO Client SDO Server 1 1 SDO Manager 1 SDO data transfer Expedited, segment transfer Expedited, segment block transfer PDO (Process Data Object) COB-ID ReadOnly Read/Write Read/Write PDO TT 254, 255 M10 +0, PDO Inhibit Time TPDO s (Read/Write) PDO Event Timer TPDO s (Read/Write) RPDO s & TPDO s (Read/Write) SYNC SYNC producer producer/consumer TRIGGER producer EMCY consumer producer/consumer HEALTH Heartbeat 16 consumers 63 consumers Node guarding no yes yes Parameters Store parameters no yes yes 126 consumers Conformance classes S10 S20 S30 Layer settings Slave ID Data rate kbps 125, 250, 500 S , 1000 S20 +10, 20, 800 LSS Slave Diagnostic devices Diagnostic local LED or display NMT (Network Management object) NMT slave b Start remote node b Stop remote node b Enter pre-operational b Reset node b Reset communication Time stamp consumer SDO (Service Data Object) SDO Client 1 SDO Server 1 2 SDO data transfert Expedited, segment transfer Expedited, segment, block transfer PDO (Process Data Object) COB-ID ReadOnly Read/Write Read/Write PDO TT 254, 255 S10 +0, PDO mapping parameters FIX (Read) Connection set Predefined connection set Free PDO Inhibit Time TPDO s (Read/Write) PDO Event Timer TPDO s (Read/Write) RPDO s & TPDO s (Read/Write) SYNC SYNC consumer producer/consumer TRIGGER consumer EMCY producer producer consumer/producer HEALTH Heartbeat 1 consumer Node guarding no yes yes Parameters Store parameters no no no Nota : S00 and M00 are for products not 100% compliant to the conformance class. 66
TD-03011E. Identifier Usage in CANopen Networks
Identifier Usage in CANopen Networks Author : U. Koppe Published : January 2003 This document describes the usage of identifiers in CANopen networks. The paper is intended for CANopen newcomers and system
More informationPositioning Controller
Edition May 2008 Positioning Controller Application Note "CANopen Basic Information" Edition May 2008 EPOS 24/1, EPOS 24/5, EPOS 70/10, MCD EPOS 60W, EPOS2 50/5 Firmware version 2000h or higher Introduction
More informationGetting Started with CANopen Version 1.1 2008-05-29 Application Note AN-AON-1-1102
Version 1.1 2008-05-29 Restrictions Abstract Public Document This application note explains items which need to be considered when creating a CANopen device or system. The Manager, Systems Engineer, and
More informationWelcome to the Introduction to Controller Area Network web seminar My name is William Stuart, and I am a Applications Engineer for the Automotive
Welcome to the Introduction to Controller Area Network web seminar My name is William Stuart, and I am a Applications Engineer for the Automotive Products Group within Microchip. This web seminar today
More informationDistributed Real-Time Systems (TI-DRTS) Track 2. CAN-BUS Introduction. Version 9.11.2009 Ref. VECTOR application note & Motorola note
Distributed Real-Time Systems (TI-DRTS) Track 2 CAN-BUS Introduction Version 9.11.2009 Ref. VECTOR application note & Motorola note What is CAN? Controller Area Network (CAN) is a common, small area network
More informationPositioning Controllers. Communication Guide. Document ID: rel4054
Communication Guide EPOS2 Positioning Controllers Edition April 2013 Positioning Controllers Communication Guide Document ID: rel4054 maxon motor ag Brünigstrasse 220 P.O.Box 263 CH-6072 Sachseln Phone
More informationTutorial. www.ccontrols.com
Tutorial 1 Tutorial CONTROLLER AREA NETWORK CAN was designed by Bosch and is currently described by ISO 11898 1. In terms of the Open Systems Interconnection model (OSI), CAN partially defines the services
More informationLIN (Local Interconnect Network):
LIN (Local Interconnect Network): History: LIN (Local Interconnect Network) was developed as cost-effective alternate to CAN protocol. In 1998 a group of companies including Volvo, Motorola, Audi, BMW,
More informationRPDO 1 TPDO 1 TPDO 5 TPDO 6 TPDO 7 TPDO 8
EN ZC - 6DI8DO CANopen I/O Module 6 Digital Input 8 Digital Output Or 8 Counters (3 bit) 8 Digital input 8 Digital output User Manual Contents: Features PDOs PDO Type Emergency Message Functional Diagrams
More informationUnderstanding SAE J1939. by Simma Software, Inc.
Understanding SAE J1939 by Simma Software, Inc. Contact E-mail: jrsimma at simmasoftware dot com Phone: 888-256-3828 For J1939 source code, see J1939 Software Starting Notes Ask questions anytime. This
More informationLENORD. +BAUER... automates motion. Fieldbus connection absolute encoders CANopen. Reference. Communication profile DS-301 Device profile DS-406
Fieldbus connection absolute encoders CANopen Communication profile DS-30 Device profile DS-406 LENORD +BAUER... automates motion. Reference D-0R-xCO (.) Right to technical changes and errors reserved.
More informationComparison of FlexRay and CAN-bus for Real-Time Communication
Comparison of FlexRay and CAN-bus for Real-Time Communication Andreas Forsberg Mälardalen University Högskoleplan 1 721 23 Västerås +46 768011236 afg05001@student.mdh.se Johan Hedberg Mälardalen University
More information9chapter. Indutrial networks. Presentation: Needs and available components. Technologies. Schneider Electric policy
9chapter Indutrial networks Technologies Presentation: Needs and available components Schneider Electric policy 198 Summary 1 2 9.1 Introduction 200 9.2 History 200 9.3 Market requirements and solutions
More informationCONTROL MICROSYSTEMS DNP3. User and Reference Manual
DNP3 User and Reference Manual CONTROL MICROSYSTEMS SCADA products... for the distance 48 Steacie Drive Telephone: 613-591-1943 Kanata, Ontario Facsimile: 613-591-1022 K2K 2A9 Technical Support: 888-226-6876
More informationCIA405.lib. Contents. WAGO-I/O-PRO 32 Library
Appendix A Additional Libraries WAGO-I/O-PRO 32 Library CIA405.lib Contents CIA405_GET_KERNEL_STATUS...3 CIA405_GET_LOCAL_NODE_ID...4 CIA405_RECV_EMY...5 CIA405_RECV_EMY_DEV...6 CIA405_GET_STATE...7 CIA405_SDO_READ21...8
More informationSection 34. Controller Area Network (CAN)
Section 34. Controller Area Network (CAN) HIGHLIGHT This section of the manual contains the following topics: 34.1 Introduction...34-2 34.2 CAN Message Formats... 34-4 34.3 CAN Registers...34-9 34.4 Enabling
More informationIntroduction To The CANopen Protocol Version 1.1 Application Note AN-ION-1-1100
Version 1.1 Application Note AN-ION-1-1100 Restrictions Abstract Public Document This application note is a brief introduction to the Higher-Layer CAN Protocol called CANopen. Table of Contents 1 Overview...1
More informationJena er Antriebstechnik. GmbH. 1. Introduction. 2. Properties. 3. Hardware. 4. Baud Rates. Brief Instructions - CANopen Interface
Project : ECOSTEP 100/200 Application Note No. 23 Page 1 of 10 Prepared by: Henrik Bräutigam Operation of ECOSTEP at CANopen Bus Date: 05-01-05 Brief Instructions - CANopen Interface 1. Introduction The
More informationWAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
More informationCANopen communication protocol
CANopen communication protocol 1/43 Document revisions version date description A 10/08 - creation B 07/09 - addition of OIML R76 settings description 2/43 1 INSTALLATION... 5 1.1 Switching to CANopen
More informationEthernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
More informationCSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
More informationWritten examination in Computer Networks
Written examination in Computer Networks February 14th 2014 Last name: First name: Student number: Provide on all sheets (including the cover sheet) your last name, rst name and student number. Use the
More informationLocal Interconnect Network Training. Local Interconnect Network Training. Overview
Overview Local Interconnect Network Training History and introduction Technical features The ISO/OSI reference model and LIN Frames Message Frames Communication concept of LIN Command Frames and Extended
More informationCAN Specification 2.0, Part B page 1 PART B. CAN in Automation, Am Weichselgarten 26, D-91058 Erlangen
CAN Specification 2.0, Part B page 1 PART B CAN Specification 2.0, Part B page 2 1 INTRODUCTION...3 2 BASIC CONCEPTS...5 3 MESSAGE TRANSFER...11 3.1 Frame Formats...11 3.2 Frame Types...11 3.2.1 DATA FRAME...11
More informationCANopen Communication Protocol
Users' Manual for SM 137 - SM 140 motors H5834D0009ING 02 05/15/2007 CANopen Communication Protocol S.r.l. Publication information Update List Revision Added Deleted Changed 00 Unreleased 01 Sect. 9.1
More informationElettronica dei Sistemi Digitali Costantino Giaconia SERIAL I/O COMMON PROTOCOLS
SERIAL I/O COMMON PROTOCOLS RS-232 Fundamentals What is RS-232 RS-232 is a popular communications interface for connecting modems and data acquisition devices (i.e. GPS receivers, electronic balances,
More informationBCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS
BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry
More informationDeviceNet Communication Manual
DeviceNet Communication Manual Soft-Starter Series: SSW-07/SSW-08 Language: English Document: 10000046963 / 00 03/2008 Summary ABOUT THIS MANUAL... 5 ABBREVIATIONS AND DEFINITIONS... 5 NUMERICAL REPRESENTATION...
More informationIn-Vehicular Communication Networking Protocol
In-Vehicular Communication Networking Protocol ABSTRACT Renu Sharma Indiana University, Purdue University Indianapolis, IN rensharm@iupui.edu Today s modern vehicles contain a complex symbiosis of intelligent
More informationMBP_MSTR: Modbus Plus Master 12
Unity Pro MBP_MSTR 33002527 07/2011 MBP_MSTR: Modbus Plus Master 12 Introduction This chapter describes the MBP_MSTR block. What s in this Chapter? This chapter contains the following topics: Topic Page
More informationECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1
ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled
More information2.0 System Description
2.0 System Description The wireless alarm system consists of two or more alarm units within a specified range of one another. Each alarm unit employs a radio transceiver, allowing it to communicate with
More informationIn-Vehicle Networking
In-Vehicle Networking SAE Network classification Class A networks Low Speed (
More informationLAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs
LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when
More informationCCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
More informationQuectel Cellular Engine
Cellular Engine GSM Multiplexer Application Notes GSM_MUX_AN_V1.00 Document Title GSM Multiplexer Application Notes Version 1.00 Date 2009-06-27 Status Document Control ID Release GSM_MUX_AN_V1.00 General
More informationCANopen high-level protocol for CAN-bus
CANopen high-level protocol for CAN-bus H. Boterenbrood NIKHEF, Amsterdam March 20, 2000 Contents 1 INTRODUCTION... 2 2 CAL... 2 3 CANOPEN... 3 3.1 CANOPEN OBJECT DICTIONARY... 3 3.2 CANOPEN COMMUNICATION...
More informationChapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse
Chapter 4 Medium Access Control 1 Introduction Objectives To manage the access to the medium or channel To take into account the time constraints To schedule the traffics Different solutions History Different
More informationQuestion: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
More informationEnOcean Radio Protocol 2. September 26, 2013 SPECIFICATION V1.0. Subject to modifications EnOcean Radio Protocol 2 V1.0 Page 1/19
SPECIFICATION V1.0 EnOcean Radio Protocol 2 September 26, 2013 EnOcean GmbH Kolpingring 18a 82041 Oberhaching Germany Phone +49.89.67 34 689-0 Fax +49.89.67 34 689-50 info@enocean.com www.enocean.com Subject
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationLocal Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
More informationAN141 SMBUS COMMUNICATION FOR SMALL FORM FACTOR DEVICE FAMILIES. 1. Introduction. 2. Overview of the SMBus Specification. 2.1.
SMBUS COMMUNICATION FOR SMALL FORM FACTOR DEVICE FAMILIES 1. Introduction C8051F3xx and C8051F41x devices are equipped with an SMBus serial I/O peripheral that is compliant with both the System Management
More information2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above
1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It
More informationCANopen Fieldbus Documentation
CANopen Fieldbus Documentation 5th generation of inverter FUNDAMENTALS COMMUNICATION PARAMETERS V 5.3 04/2007 GB MI BCI AM Fieldbus Applications POSI Switch CANopen 5th Generation of Inverters Table of
More informationVorlesung Kommunikationsnetze Fieldbus Systems
Vorlesung Kommunikationsnetze Fieldbus Systems Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen
More informationLIN (Local Interconnected Network)
Slide 1 LIN (Local Interconnected Network) Fundamentals of the LIN Protocol Ralf Schwering,, Software Development Engineer Vector Informatik GmbH www.lin-subbus.org -1- Slide 2 Agenda Communication Principle
More information52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller
52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller Payoff The Remote Monitoring (RMON) Management Information Base (MIB) is a set of object definitions that extend the capabilities
More informationCSE 123: Computer Networks Fall Quarter, 2014 MIDTERM EXAM
CSE 123: Computer Networks Fall Quarter, 2014 MIDTERM EXAM Instructor: Alex C. Snoeren Name SOLUTIONS Student ID Question Score Points 1 15 15 2 35 35 3 25 25 4 15 15 5 10 10 Total 100 100 This exam is
More informationBased on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
More informationFlexRay A Communications Network for Automotive Control Systems
FlexRay A Communications Network for Automotive Control Systems WFCS 2006 Rainer Makowitz Automotive Systems Engineering, EMEA Freescale and the Freescale logo are trademarks of Freescale Semiconductor,
More informationHow to Hack Your Mini Cooper: Reverse Engineering CAN Messages on Passenger Automobiles
How to Hack Your Mini Cooper: Reverse Engineering CAN Messages on Passenger Automobiles Jason Staggs Who is this guy? Jason Staggs Graduate Research Assistant Institute for Information Security (isec)
More informationThe I2C Bus. NXP Semiconductors: UM10204 I2C-bus specification and user manual. 14.10.2010 HAW - Arduino 1
The I2C Bus Introduction The I2C-bus is a de facto world standard that is now implemented in over 1000 different ICs manufactured by more than 50 companies. Additionally, the versatile I2C-bus is used
More informationConfiguring PCAN-Explorer to Monitor Data Traffic on a CANopen Network
Data Bulletin 8000DB1008 09/2010 Raleigh, NC, USA Configuring PCAN-Explorer to Monitor Data Traffic on a CANopen Network Retain for future use. Overview Presumption Requirements This data bulletin details
More informationDirect Link Networks. Introduction. Physical Properties. Lecture - Ethernet 1. Areas for Discussion. Ethernet (Section 2.6)
reas for Discussion Direct Link Networks Joseph Spring School of Computer Science Sc - Computer Network Protocols & rch s ased on Chapter 2, Peterson & Davie, Computer Networks: Systems pproach, 5 th Ed
More informationNilar High voltage energy storage solutions
Specifications Nilar High voltage energy storage solutions Nilar offers high power battery solutions that are easy to use, robust, resource efficient and have a low lifetime cost. High voltage energy storage
More information11.1. Performance Monitoring
11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts
More information802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to
More informationData Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine
Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions
More informationSANMOTION AC SERVO SYSTEMS
SANMOTION AC SERVO SYSTEMS WITH R SD2-071126-01-KM INTERFACE Instruction Manual SANYO DENKI About This Manual Overview This document is part of SANMOTION R-series servo amplifier manual, provided by SANYO
More informationModbus and ION Technology
70072-0104-14 TECHNICAL 06/2009 Modbus and ION Technology Modicon Modbus is a communications protocol widely used in process control industries such as manufacturing. PowerLogic ION meters are compatible
More informationNetworking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
More informationKeyStone Architecture Gigabit Ethernet (GbE) Switch Subsystem. User Guide
KeyStone Architecture Gigabit Ethernet (GbE) Switch Subsystem User Guide Literature Number: SPRUGV9D June 2013 Release History www.ti.com Release Date Description/Comments SPRUGV9D June 2013 Added KeyStone
More informationIndustrial Communication Whitepaper. Principles of EtherNet/IP Communication
Industrial Communication Whitepaper Principles of EtherNet/IP Communication 1 Contents Introduction...3 Producer/Consumer Model...4 EtherNet/IP Messaging Types...7 Real Time Data Exchanges...9 Typical
More informationData Link Layer Overview
Data Link Layer Overview Date link layer deals with two basic issues: Part I How data frames can be reliably transmitted, and Part II How a shared communication medium can be accessed In many networks,
More informationThe Answer to the 14 Most Frequently Asked Modbus Questions
Modbus Frequently Asked Questions WP-34-REV0-0609-1/7 The Answer to the 14 Most Frequently Asked Modbus Questions Exactly what is Modbus? Modbus is an open serial communications protocol widely used in
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More informationLOCAL INTERCONNECT NETWORK (LIN)
54B-1 GROUP 54B LOCAL INTERCONNECT NETWORK (LIN) CONTENTS GENERAL INFORMATION........ 54B-2............ 54B-3 STRUCTURE................... 54B-2 54B-2 LIN refers to "Local Interconnect Network," which
More informationDeviceNet Bus Software Help for Programming an Allen Bradley Control System
FBP FieldBusPlug V7 DeviceNet Bus Software Help for Programming an Allen Bradley Control System DeviceNet Software Help for Programming an Allen Bradley Control System Contents Page General Purpose...
More informationESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
More informationVoice over IP. Demonstration 1: VoIP Protocols. Network Environment
Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed
More informationPacket-over-SONET Interface Commands on the Cisco IOS XR Software
Packet-over-SONET Interface Commands on the Cisco IOS XR Software This module provides command line interface (CLI) commands for configuring Packet-over-SONET/SDH (POS) on the Cisco CRS Router. This module
More informationThe OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL
The OSI Model and the TCP/IP Protocol Suite - the OSI model was never fully implemented. - The TCP/IP protocol suite became the dominant commercial architecture because it was used and tested extensively
More informationProgramming Flash Microcontrollers through the Controller Area Network (CAN) Interface
Programming Flash Microcontrollers through the Controller Area Network (CAN) Interface Application te Programming Flash Microcontrollers through the Controller Area Network (CAN) Interface Abstract This
More information1. Overview. 2. F-bit Utilization
1. Overview... 1 2. F-bit Utilization... 1 3. T1 Line Signal... 2 4. T1 Alarm Conditions... 3 5. 64 kbps Channel Characteristics... 3 6. Timeslot Handling... 3 7. Unframed Mode... 4 1. Overview The T1
More informationIP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
More informationSRX 210 Services Gateway T1/E1 Mini-Physical Interface Module
SRX 210 Services Gateway T1/E1 Mini-Physical Interface Module The T1/E1 Mini-PIM provides the physical connection to T1 or E1 network media types and also performs T1 or E1 framing and line-speed signaling.
More informationDCP COMMAND. bringing two-way communications to your DCPs
DCP COMMAND bringing two-way communications to your DCPs DCP COMMAND Project Goals Bring affordable, reliable two way communications to DCPs Facilitate remote management of the DCP including setup and
More informationUsing the AnyBus -X Gateway to Communicate between a DVT camera and a Profibus Master
Using the AnyBus -X Gateway to Communicate between a DVT camera and a Profibus Master Page 1 of 13 Table of Contents 1 OVERVIEW... 3 2 INSTALLING AND CONFIGURING THE ANYBUS -X GENERIC GATEWAY AND ETHERNET
More informationICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A
More informationToken-ring local area network management
Token-ring local area network management by BARBARA J. DON CARLOS IBM Corporation Research Triangle Park, North Carolina ABSTRACT This paper describes an architecture for managing a token-ring local area
More informationZarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)
QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than
More informationRS-485 Protocol Manual
RS-485 Protocol Manual Revision: 1.0 January 11, 2000 RS-485 Protocol Guidelines and Description Page i Table of Contents 1.0 COMMUNICATIONS BUS OVERVIEW... 1 2.0 DESIGN GUIDELINES... 1 2.1 Hardware Design
More informationSS7 Protocol Stack. SS7 Level 1: Physical Connection. SS7 Level 2: Data Link CHAPTER
CHATER 3 This chapter describes the components of the SS7 protocol stack. A stack is a set of data storage locations that are accessed in a fixed sequence. The SS7 stack is compared against the Open Systems
More informationPART OF THE PICTURE: The TCP/IP Communications Architecture
PART OF THE PICTURE: The / Communications Architecture 1 PART OF THE PICTURE: The / Communications Architecture BY WILLIAM STALLINGS The key to the success of distributed applications is that all the terminals
More informationGuide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
More informationGuide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
More informationProcess Control and Automation using Modbus Protocol
Process Control and Automation using Modbus Protocol Modbus is the fundamental network protocol used in most industrial applications today. It is universal, open and an easy to use protocol. Modbus has
More informationDATA COMMUNICATION AND NETWORKS
DATA COMMUNICATION AND NETWORKS 1. Define the term Computer Networks. A Computer network is a number if computers interconnected by one or more transmission paths. The transmission path often is the telephone
More informationTOP Server DNP 3.0 Suite. Background & Best Practices
TOP Server DNP 3.0 Suite Background & Best Practices Page 2 of 31 Table of Contents OVERVIEW 4 BACKGROUND 5 TECHNICAL DNP PROTOCOL INFORMATION 6 Master and Outstation Databases 6 Layering 7 Device Addressing
More information82557 10 100 Mbps PCI LAN Controller A Guide to 82596 Compatibility
APPLICATION NOTE 82557 10 100 Mbps PCI LAN Controller A Guide to 82596 Compatibility Technical Marketing Network Products Division November 1995 Order Number 644126-001 Information in this document is
More informationChapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
More informationVoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1
VoIP in 802.11 Mika Nupponen S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 Contents Introduction VoIP & WLAN Admission Control for VoIP Traffic in WLAN Voice services in IEEE 802.11
More informationHigh-Level Data Link Control
High-Level Data Link Control This class of data link layer protocols includes High-level Data Link Control (HDLC), Link Access Procedure Balanced (LAPB) for X.25, Link Access Procedure for D-channel (LAPD)
More informationIntroduction VOIP in an 802.11 Network VOIP 3
Solutions to Performance Problems in VOIP over 802.11 Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi 1 Outline Introduction VOIP background Problems faced in 802.11 Low VOIP capacity in 802.11
More informationManchester Encoder-Decoder for Xilinx CPLDs
Application Note: CoolRunner CPLDs R XAPP339 (v.3) October, 22 Manchester Encoder-Decoder for Xilinx CPLDs Summary This application note provides a functional description of VHDL and Verilog source code
More informationIt explains the differences between the Plesiochronous Digital Hierarchy and the Synchronous Digital Hierarchy.
TECHNICAL TUTORIAL Subject: SDH Date: October, 00 Prepared by: John Rumsey SDH Synchronous Digital Hierarchy. Introduction. The Plesiochronous Digital Hierarchy (PDH). The Synchronous Digital Hierarchy
More informationFURTHER READING: As a preview for further reading, the following reference has been provided from the pages of the book below:
FURTHER READING: As a preview for further reading, the following reference has been provided from the pages of the book below: Title: Broadband Telecommunications Handbook Author: Regis J. Bud Bates Publisher:
More informationRing Local Area Network. Ring LANs
Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving
More information