OPCF FLC Technical Paper C2C
OPCF FLC Technical Paper C2C
OPC UA forOPC
Extending Field
UALevel Communication
to the field: –
A Theory
OPC of Field
UA for Operations
eXchange (FX)
Version 1 // November 2020
Version 2 // November 2021
Technical Paper
Technical
2
Executive Summary
Digitalization of products and systems opens the op- On a technical level, this approach requires stan-
portunity to deliver new and enhanced software so- dardization to take place on multiple levels: seman-
lutions and enables new digital services and busi- tics, information modeling, communication proto-
ness models. The implementation of concepts is cols, data link layer and physical layer – all embraced
made more difficult because of the heterogeneity of by a common cyber-security framework. An impor-
communication protocols at the field level. Although tant aspect is the convergence of information tech-
most of today’s fieldbus systems and Real-Time Eth- nology (IT) and operational technology (OT) allowing
ernet protocols are standardized by IEC in the a common network infrastructure to be shared by IT
61784/61158 series, automation devices supporting and OT traffic while guaranteeing different levels of
different protocols are not interoperable with each quality of service (QoS) demanded by diverse IT and
other and often cannot coexist in a common network OT applications. Technologies of particular impor-
infrastructure. In addition, device information is tance are the Ethernet Advanced Physical Layer
structured using different information models, which (APL) and Ethernet Time-Sensitive Networking
makes data analysis a labor-intensive and time-con- (TSN). APL facilitates seamless Ethernet connectivity
suming task that is also vulnerable to errors, espe- down to the field level, including long cable lengths
cially in multi-vendor and multi-protocol environ- and explosion protection via intrinsic safety with
ments. power and communication over two wires. TSN en-
However, the trend of moving to seamless interoper- ables deterministic communication on standard Eth-
ability accelerated by the dawn of the Industry 4.0 ernet, allowing IT and OT protocols to coexist in a
and Industrial Internet of Things (IIoT) era requires common network infrastructure.
industrial system integration to become vendor-inde- The OPC Foundation’s Field Level Communications
pendent and to support end-to-end interoperability Initiative was established in November 2018 to spec-
from sensor to cloud, including field level devices for ify extensions to the OPC UA framework in
all relevant industrial automation use-cases, includ- order to standardize the semantics and behaviors of
ing real-time, motion, and functional safety. controllers and field devices from different manufac-
Standardized communication from sensor to cloud turers. The main use cases covered by the Initiative
will support the digital transformation across all in- are controller-to-controller, controller-to-device, and
dustries, including factory automation and process device-to-device including support for IIoT connec-
automation. End users, machine/skid builders and tivity for both controllers and devices (controller-to-
system integrators will benefit from easier system in- compute and device-to-compute). The technical
tegration and cross-vendor interoperability. Seam- work is being performed in OPC Foundation multi-
less access to production data and process condi- vendor working groups that define the technical con-
tions will facilitate availability and optimization of cepts and specify the different mechanisms to
production processes. achieve these goals. The specifications to extend
OPC UA for field-level communications are named
OPC UA FX (Field eXchange), abbreviated UAFX.
3
Contents
Introduction
Cloud
Satellite
Industrial
Interoperability:
From Sensor
Relay
into Cloud ERP Broker
MES
SCADA
Pump
Oil Refinery
Field
device
Field
device
Field
device
Field
device
Field
device
Field
device
Field
device
Field
device
Field
device Initiative for Field
Level Communications
Figure 1: OPC UA use cases and scope of OPC Foundation’s Field Level Communications Initiative
5
transfer. In both cases, the OPC Unified Architecture Field Level Communications Initiative
(OPC UA) standard from the OPC Foundation pro- At the SPS IPC Drives Fair 2018 in Nuremberg,
vides a secure, reliable, and robust foundation to fa- Germany, the OPC Foundation officially launched
cilitate standards-based data connectivity and in- the Field Level Communications Initiative. This Initia-
teroperability. For years, many companies and tive aims at extending OPC UA to field level to
partner organizations have openly worked together achieve an open, unified, standards-based IIoT com-
under the umbrella of the OPC Foundation to make munication solution between sensors, actuators,
this a reality and will keep doing so as it continues to controllers and cloud addressing all requirements of
expand its collaboration activities. factory automation and process automation (see
A key aspect of improving horizontal and vertical data Figure 1). Consequently, the OPC Foundation’s vi-
connectivity is network convergence supporting a sion of becoming the worldwide industrial interoper-
common network for IT- and OT-related communica- ability standard is advanced by extending OPC UA to
tion. Ethernet Time-Sensitive Networking (TSN) ac- the field level. Vendor independent end-to-end in-
cording to IEEE 802.1 supports communication with teroperability between field level devices is provided
bounded latency and jitter. In addition, various data for all relevant industrial automation use cases, in-
streams, and traffic types can be transmitted over a cluding real-time, functional safety and motion, all
common network infrastructure, while at the same requiring secured information exchange.
time guaranteeing the various bandwidth, latency,
jitter and reliability requirements of the different ap-
plications. Therefore, TSN plays a key role in sup-
porting the convergence of IT and OT. The Ethernet
Advanced Physical Layer (APL) is another key tech-
nology to drive network convergence as APL deliv-
ers seamless Ethernet connectivity to sensors and
actuators in process automation – including hazard-
ous areas.
The IT and OT worlds are converging. The Field Level Communications Initiative aims to
achieve the following four types of convergence:
1. UAFX application convergence where multiple UAFX automation devices from multiple vendors
share one network.
2. OT convergence where multiple systems and devices from multiple vendors using different
OT protocols share one network.
3. IT/OT convergence where multiple controllers, devices, applications, and systems from different
vendors using a combination of IT and OT protocols share one network.
4. IT/OT organizational convergence where the boundary between organizations blurs and
management of IT and OT groups operate to common strategies and processes.
6
4. In the Safety and Security sections (pages 25 6. The last section Summary and Outlook (page
– 28) it is explained how data for functional safety 38) gives an overview of the key achievements
applications is exchanged between Functional and future work of the Field Level Communica-
Entities principle in combination with standard tions Initiative in order to support all relevant use
UAFX connections. SafetyProviders and Safety- cases and application scenarios in factory auto-
Consumers exchange safe data using OPC UA mation and process automation. Furthermore, it
Safety, a safety transmission protocol which fa- is explained what measures are taken to ensure
cilitates the use of OPC UA in safety-critical ap- an easy implementation of the technology as well
plications. This is followed by an explanation of as cross-vendor interoperability.
how UAFX connections are secured during con-
nection establishment and data exchange against
malicious attacks.
System Architecture The technical work within the Field Level Communi-
OPC UA is the data exchange standard for secure, cations Initiative includes the following topics:
reliable, manufacturer and platform-independent in-
dustrial communication. It is based on specifications ➞ definition of a base model for Automation Compo-
that were developed in close cooperation between nents that are common to all UAFX-conformant
manufacturers, users, research institutes and con- controllers and devices
sortia, in order to enable secure and reliable informa- ➞ definition of system behaviors and sequences for
tion exchange in heterogeneous systems. Neverthe- common functionalities e.g. bootstrapping, con-
less, the additional mechanisms needed to satisfy nection establishment, etc.
the specific OT-related requirements – such as func- ➞ harmonization and standardization of application
tional safety, determinism, and redundancy – for profiles such as IO, motion control, functional
information exchange between devices and con- safety, system redundancy
trollers in manufacturing factories and process auto- ➞ standardization of OPC UA information models for
mation plants were lacking (see Figure 2). field-level devices in online and offline scenarios
e.g. device description, diagnostics, etc.
Companion Models
Automation Component
OPC UA Core Specifications
Built-In Security
OPC UA OPC UA
Client/Server PubSub
Services & Protocols Models & Protocols
Figure 2: Extending OPC UA for the field: OPC UA for Field eXchange (FX) System Architecture
9
➞ integration of OPC UA companion models The technical work results in specifications that ex-
➞ support of Ethernet TSN for deterministic com- tend the OPC UA framework. These specifications
munication and IT/OT convergence are identified with OPC UA FX (Field eXchange).
➞ mapping of application profiles related to real-time
operations on Ethernet networks including TSN In the first OPC UA FX specification release (Ver-
➞ definition of facets, profiles and conformance sion 1), the focus is on the Controller-to-Controller
units that can be tested to guarantee interopera- (C2C) use case which includes exchanging both
bility across vendors standard and safety real-time data using OPC UA
➞ definition of certification procedures Client/Server and OPC UA PubSub in combination
with a peer-to-peer application relationship and ba-
sic diagnostics. The target network architecture is
shown in Figure 3.
Non-UAFX, Network
non UA App Monitoring
(e.g. Video and Mgmt
Monitoring) Application
L3 Switch
Non-UAFX
TSN Device L2 Switch L2 Switch
(e.g. Camera)
Compute
OPC UA
Object
Controller Device
Figure 4: Interaction Model for OPC UA including field level communications (UAFX)
11
Vendor 1 Vendor 2
Homogenizer Blending skid
OPC UA FX supports two new enhanced approach- changed in both directions, but the controller
es that make use of OPC UA PubSub without pre- does not initiate any communication.
venting the currently available Client/Server mecha- ➞ Machine 2 controller initiates all communications,
nisms to exchange data between these machines: but its designer must ensure that it is both trans-
mitting and receiving information in a form usable
➞ Unidirectional by Machine 1’s application code.
The name unidirectional derives from the flow of ap-
plication data. Each machine’s designer creates a In this case, Machine 1’s behavior is very similar to that
configuration descriptor of output information avail- of an I/O module.
able and supported configurations (update rates,
security, etc.) in their controller for the other control- Communication Configuration
ler’s use. Other machine designers can then import Standardized configuration descriptors are used to
the descriptor to enable communications and to exchange communication configurations between
customize their code to correctly use the data made the engineering tools of the controllers. An engineer-
available by other controllers as inputs to their own ing tool and a controller together can automate the
machines. creation of all necessary information model entries,
automate the establishment of a connection to the
➞ Bidirectional other controller and automate fault handling. Some
This model extends the unidirectional model and flexibility may be needed in post-installation commu-
inherits all attributes of that model. nications configuration, especially in cases where
In this model, designer 1 fixes the data and format multiple identical machines or skids are delivered to
that their controller both transmits (outputs) and re- a single application (see Figure 6). The level of allow-
ceives (inputs). It is the responsibility of the other able configuration must be controlled by the machine
controller (and its designer) to initiate communica- designer and the actual configuration may be set us-
tions to designer 1’s controller and to provide/con- ing by any generic OPC UA Client. In this example,
sume information in the format demanded by de- two identical machines have been purchased from
signer 1. Vendor 1 and two identical machines from Vendor 2.
In the unidirectional model, responsibility is symmet- None of the machines change function or operation
rical with both the designer of Machine 1 and Ma- post-installation, but there is no planning in advance
chine 2 performing exactly the same functions in or- of which machine is connected to which, and poten-
der to establish communications in both directions tially, no pre-planning of the network identification of
between the two controllers. In the bidirectional each machine once installed. At the time of commis-
model, one party defines both inputs and outputs sioning, each machine (or more specifically, the con-
from their equipment and the other party establishes troller in each machine) must be given its network
a bidirectional connection – the two machine control- identity (e.g. hostname or IP address) and must have
lers perform different functions in the communication the target network identity of the controller in the
relationship: other vendor’s machine using a general- purpose
➞ Machine
1 designer defines the data to be ex- OPC UA client.
13
Vendor 1 Vendor 2
Machine Machine
Vendor 1 Vendor 2
Machine Machine
In the following example, two identical blending skids has two unique connections for ‘a’ Vendor 2 skid
are integrated into a homogenizer of Vendor 1 (see which function in the same way but carry different
Figure 7). As in the previous example, the network data. The two Vendor 2 skid controllers must be told
identity of each Vendor 2 skid controller must be ap- by both the network identity of the Vendor 1 control-
plied to the relevant connection in Vendor 1 control- ler, and the internal identity of the connection to
ler. However, further information must be given to which they must be associated.
both of the Vendor 2 skids, as Vendor 1 controller
Vendor 2
Blending skid
Vendor 1
Homogenizer
Vendor 2
Blending skid
Figure 7: C2C Example with two identical skids in the same line (Case 2)
14
Automation Component
Bridge
Ethernet Interface Model
Port Port
reference assets that they are associated with or UAFX connections are the logical constructs used to
execute on, and allow applications to confirm that exchange a defined set of process data and process
any hardware requirements that the applications data quality information. Inside a UAFX connection
have are met. For example, a two-axes drive may be one or more PubSub DataSetWriter and DataSe-
based on one asset including two Functional Enti- tReader are responsible for exchanging the data with
ties. the other Functional Entity.
For exchanging process data using PubSub, the fol-
From Functional Entity to the lowing connection types are supported:
Communication Relationships
A Functional Entity is an element of an AC that repre- 1. Unidirectional
sents a functional capability of the AC (see Figure 9). 2. Unidirectional with heartbeat
Examples of Functional Entities include application 3. Bidirectional
execution engine, motion axis control, a sensor, a
relay, I/O control, and variable frequency drive con-
trol. There can be multiple FEs in an AC.
Diagnostics Diagnostics
Input Event Input Event
data data
The Role of the Connection Manager The Connection Configuration Data consists of the
The Connection Manager (CM) is a service respon- following parameters:
sible for establishing connections between FEs. It ➞ Description of the endpoints to be connected
uses Connection Configuration Data such as partner – Local Address, consisting of the address of
communication address, update rate and QoS set- the OPC UA server located on the AC, and
tings, to set up communication with one or more the browse path to the Functional Entity to
communication partners (see Figure 10). connect
The CM is modeled as a distinct entity. This entity – Remote Address
resides typically in an AC which initiates the connec- ➞ Choice of unicast or multicast
tion establishment via an internal mechanism, but ➞ QoS option and their pparameters (including TSN)
may optionally be realized as an external entity. ➞ For process data
– PublishingInterval (for the data publisher)
– MessageReceiveTimeout
(for the data subscriber)
➞ For heartbeat
– PublishingInterval (for the heartbeat publisher)
– MessageReceiveTimeout
(for the heartbeat subscriber)
➞ Connection timeout (for the cleanup)
➞ Compatibility verification parameters
Integrated CM External CM
AC_1 X AC_3
Functional Functional
CM Entity CM Entity
Connection Connection
Establishment Establishment
UAFX connection state machine machine, which only addresses the single state of a
The Connection Manager (CM) must establish a PubSub Connection, but not how to reach this sta-
UAFX connection on two endpoints in parallel. For tus.
each of the endpoints a separate connection state A UAFX connection is initially set-up using Client/
machine is needed (see Figure 11). Server mechanisms, where information to establish a
For joint operation of the two endpoints, it is pro- bidirectional PubSub Connection, such as compati-
posed that the CM executes the state machine for bility verification, ownership and parameterization, is
the two endpoints in parallel, meaning step by step exchanged. Thereafter the PubSub Connection is
on the one and the other endpoint. This will later prepared and operational.
ease the startup of the communication. The UAFX Connection State Machine for each UAFX
This UAFX Connection State Machine extends the connection is defined in the information model of a
OPC 10000-14, chapter 6.2.1 defined PubSub state Functional Entity.
Initial
Not operational
Implicit
Ready
AutoCleanup
Timeout Implicit Enable
Preoperational
Internal Error
Reception of input data
Reception of
input data
Error Operational
Role
Change Control
Product Get Product Create
Selection Descriptor CTRL project Configura- engineer
tion (module)
Descriptor
(CD)
Apply Create CTRL Pub Create
constraints & create data sets CTRL database
Export Configuration
descriptor
Role PD
Change Control
Download to Finalize configura- Import configuration
CTRL tion with runtime descriptor into the engineer
information CTRL Engineering Tool (plant)
CD
Role
Change
Online Online
configuration Engineering
changes
Descriptor
jpg
Part_2
Attachments Part_2
Information Model
of Automation
Component(s)
DWG PDF
Signatures Part_1
Attachments Part_1
- Signature Part_1
- Signature Part_2 Information Model
... of Automation
Component(s)
- Signature Part_N
- Overall Signature
Firmware
Descriptor
Manual Firmware
Configuration Descriptor
The Configuration Descriptor shown in Figure 15 is a
descriptor with one product part (Part_1) and one or
more configuration parts (Part_2). The Configuration
Descriptor is created in the engineering process,
usually with the intention to share engineering infor-
mation of an AC with another engineering tool.
The configuration part of the Configuration Descrip-
tor defines the Functional Entities, the communica-
tion DataSets, the required Quality of Service (QoS)
and the data necessary for connection establish-
ment (like unicast or multicast addresses for OPC UA
PubSub). In addition, for a field or I/O device, the
configuration part may also contain parametrization
data.
Descriptor
Attachments
Manual Firmware
Workflow examples
This section will show how the descriptors are used in ➞ LC CDP for C_1 to be imported into the engineer-
an offline engineering environment and how the de- ing tool of C_1
scriptors will represent one or more ACs. In the two ➞L C CDP for C_2 to be imported into the engineer-
examples below, a Line Controller (LC) will set up and ing tool of C_2
provide the overall control to 3 subordinate controllers ➞L C CDP for C_3 to be imported into the engineer-
(PLC/DCS) in an UAFX automation system. In the first ing tool of C_3
example, standard Ethernet communications without
TSN is used. The system in the second example sup- Each CDP contains the information necessary to
ports TSN communications. configure the communication relationships between
Below is the workflow for the use case including enu- LC and C_X (X=1, 2, 3) (see Figure 16). In addition to
meration for the workflow states (noted in square the configuration information the CDP contains an
brackets, e.g. [1]): index that helps to navigate through the stored infor-
mation and a digital signature from the author (in this
System with a Line Controller and case the development engineer of the system inte-
3 subordinate controllers without TSN grator).
In the offline engineering phase, the engineering tool When the CDP is imported [2] into the engineering
for the LC has been used to create [1] Configuration tool of one of the controllers, the control engineer
Descriptors or Configuration Descriptor Packages checks the validity of the signature and uses the
(CDP): CDP index to browse and find the publication infor-
download download
3 3
Line PLC_LC
Controller PLC_LC
Controller
_3
1, 2, 3
Figure 16: Example: A system with a Line Controller and 3 subordinate controllers without TSN
23
mation. This enables the control engineer to set up Each CDP contains the information necessary to
the corresponding Subscription and Connection ob- configure the communication relationships between
jects in the controller. Once the control engineer has LC and C_X (X=1, 2, 3) (see Figure 17). In addition to
completed the C_X project and the hardware (PLC/ the configuration information, the CDP contains an
DCS) is connected, the configuration can be de- index that helps to navigate through the stored infor-
ployed [3] from the C_X engineering tool. mation and a digital signature from the author (in this
case the development engineer of the System Inte-
System with a Line Controller and grator).
3 subordinate controllers with TSN The CDP for each controller – in addition to the infor-
In the offline engineering phase, the engineering tool mation in the first example – includes the QoS capa-
for the LC has been used to create [1] Configuration bilities and requirements provided by the TSN mech-
Descriptors or Configuration Descriptor Packages anisms for each controller (C_1, C_2 and C_3). The
(CDP): QoS capability is part of the Product Descriptor of
the controller (contained also in the CDP), while the
➞ LC CDP for C_1 to be imported into the engineer- QoS requirements are part of the Configuration De-
ing tool of C_1 scriptor.
➞ LC CDP for C_2 to be imported into the engineer-
ing tool of C_2
➞ LC CDP for C_3 to be imported into the engineer-
ing tool of C_3
1 3 PLC_A
Line CDP
C_3 CDP
Control-
download ler download
CDP QoS QoS
6 5 caps&reqs caps&reqs
5 6
1, 2, 3
4
Line CDP with
LC QoS PLC_LC
Controller Offline CDP with PLC_LC
parame- CNC Controller Controller
ters _3 QoS _3
parame-
ters
1, 2, 3
C: Controller (e.g. PLC, DCS), caps&reqs: Capabilities & Requirements, LC: Line Controller
Figure 17: Example: A system with a line controller configuring 3 subordinate controllers
24
When the CDP is imported [2] into the engineering The output of the calculation is entered into QoS pa-
tool of one of the controllers, the control engineer rameters/TSN Stream Settings descriptors – one for
checks the validity of the signature and uses the each controller C_X. These descriptors are imported
CDP index to browse and find the publication infor- again [5] in the C_X and LC engineering tools.
mation. This enables the control engineer to set up Once the control engineers have completed the C_X
the corresponding Subscription and Connection ob- project and the hardware (PLC/DCS) is connected,
jects in the controller. the configuration can be deployed [6] from the C_X
The QoS capabilities and requirements of all control- engineering tool.
lers (LC, C_1, C_2 and C_3) are imported from the
CDPs into the offline Central Network Configuration
(CNC) [3] to calculate [4] the information needed for
the TSN configuration (e.g. QoS parameters/TSN
Stream Settings data).
FE LineInterface
CG Global
PP LineStatus
CG Global
PP LineStatus
Description for C_1 Engineer Description for C_2 Engineer
(C_Standard (C_Standard
object representations) object representations)
CG Global
PP LineStatus FE LineInterface FE LineInterface
CG Global CG Global
PP LineStatus PP LineStatus
CG Global
PP LineStatus
CG C_2 Interface CG C_1 Interface
PP C_1 CMD PP C_2 CMD
CG Global
PP LineStatus CG C_Status Example CG C_Status Example
PP C_X STS PP C_X STS
Safety Communication
The specification OPC UA Safety (OPC 10000-15 - network layers. In case an error is detected, this in-
Part 15: Safety) describes the services and protocols formation is shared with the safety layer which can
for the exchange of safety-relevant data using OPC then act appropriately, e.g. by switching to a safe
UA mechanisms. It extends OPC UA to fulfill the re- state. OPC UA Safety is application-independent
quirements of functional safety as defined in the IEC and does not pose requirements on the structure
61508 and IEC 61784-3 series of standards. and length of the application data.
Implementing this part allows for detecting all types
of communication errors encountered in the lower
UAFX connection 1
Request SPDU
Response SPDU
Safety
Functional
Entity
Automation Component C
UAFX connection 2
Request SPDU
Response SPDU
Safety for field-level communications The most basic type of safety communication is bi-
OPC UA Safety is using standard UAFX connections directional communication, where a safety applica-
and an additional safety transmission protocol on top tion on one AC (A) sends data to a safety application
of these connections. It is developed to extend the on another AC (B). The SafetyConsumer initiates the
standard data exchange between Functional Entities communication with the Request SPDU. The Safety-
via UAFX connections with safety data (see Figure Provider mirrors the received ID and counters, adds
19). the requested safety data and secures all data via a
This principle delimits the assessment effort to the checksum before responding with the Response
safe transmission functions, such that the underlying SPDU.
UAFX connections do not need any additional func- One AC can be SafetyConsumer and SafetyProvider
tional safety assessment. at the same time. The connection between Safety-
Safety Functional Entities may include standard and Provider and SafetyConsumer can be established
safe input and output variables. The safety applica- and terminated during runtime, allowing different
tion inside the functional entity has to be developed consumers to connect to the same SafetyProvider at
in a safe workflow as well. different times.
The Safety Application is connected directly with the
SafetyProvider / SafetyConsumer, which exchange
data by means of the safety protocol. The OPC UA
Mapper is used to interface the safety layer and the
underlying communication and supports the channel
between SafetyProvider and SafetyConsumer.
27
Wait for
Request
Initialize
Prepare
SPDU
Time-
out1
Wait for
Wait for SPDU
Request t SPDU
Reques
Proceed
Safety Data Request
Respon
To avoid running into safety
1
se SPD
U
timeout, SPDUs may also
Error
be protected by end-to-end
Check
latency guarantee.
Provide
S-Data
Safety Data
Security
Security for UAFX connections ure 21). In this phase the mutual authentication and
Every UAFX connection is authenticated and option- the symmetric key exchange for the connection es-
ally encrypted by standard OPC UA security mecha- tablishment is done. Thereafter the Connection Man-
nisms specified for the Client/Server and PubSub ager (CM) maintains the connection via this secure
communication. The connection establishment is session up to the operational state of the connec-
entered after a OPC UA Secure Session establish- tion.
ment is completed with the use of asymmetric cryp-
tography with certificates and private keys (see Fig-
Protected by
asymmetric
cryptography
Transport
Communications Profiles Facet and the UDP UADP Transport Facet. Any two
The current system architecture of a field level com- Profile A components installed in an IP network are
munications device allows for two communications interoperable, provided IP routes can be established.
profiles to be used with PubSub communications, ACs implementing Profile A may optionally imple-
constructed from at least four communications fac- ment the TSN Network Access facet in order to en-
ets (see Figure 22). able operation in a TSN Domain (see Page 35 et
All OPC UA ACs implemented using the Field Level seq.).
Communications will be capable of supporting one Profile A and Profile B connections are not interoper-
or more of the communication profiles and any or all able due to incompatible UADP Transport Facets
of its optional facets. Each profile can be used on a and so an AC must implement both to support in-
per-connection basis. Thus, if a controller conforms teroperability in all cases.
to multiple profiles, a control system engineer can
make the optimum selection for each connection. ➞ Profile B
Profile B is optimized for the layer 2 networks typi-
➞ Profile A cally seen within a single skid, cell or machine; con-
Profile A is optimized for layer 3 networks typically nections using the Profile B deliver the most efficient
deployed across an entire plant made of many ma- network bandwidth usage and performance but
chines, skids, and cells. Connections using Profile A cannot operate through a layer 3 switch or router.
deliver the most flexible network architecture but
consume more network bandwidth and processing
resources than those using Profile B. Profile A re-
quires the use of both the Direct Network Access
Profile A Profile B
UDP Ethernet
UADP UADP
Transport Transport
Facet Facet
Profile B requires support of the TSN Network Ac- ➞ TSN Network Access Facet
cess Facet, the Direct Network Access Facet, and The TSN Network Access Facet is a superset of the
the Ethernet UADP Transport Facet. Any two Profile Direct Network Access Facet and uses TSN Ether-
B components installed in the same TSN Domain are net point-to-point or multicast techniques using TSN
interoperable. streams. Any two end stations using this facet with
In order to support operation in non-TSN enabled TSN bridges along their path can guarantee zero
Ethernet networks, a Profile B connection also sup- congestion packet loss and bounded network la-
ports the Direct Network Access Facet. tency and jitter. Even in heavily loaded TSN networks,
high priority streams suffer no effects of this loading.
Transport and Network Access Facets
➞ Transport Facets ➞ TSN Bridge Facet
Ethernet UADP and UDP UADP transport facets are Network interfaces implementing a TSN bridge are
defined in the OPC UA Specifications Part 14 Pub- characterized by the TSN Bridge Facet. The Field
Sub (OPC 10000-14) and Part 7 Profiles (OPC Level Communications Initiative is committed to sup-
10000-7), and are used as-is. porting the IEC/IEEE 60802 TSN Profile for Industrial
Automation. It is expected that all Industrial Ethernet
➞ Direct Network Access Facet variants and IT devices operating in an industrial net-
Communications using non-TSN Ethernet point-to- work using TSN will align with this specification, al-
point or multicast techniques, using the PCP or lowing them to fairly share network resources.
DSCP prioritization mechanisms are defined in the TSN Domains require all bridges (either embedded in
Direct Network Access Facet. This means that a an AC or in an infrastructure switch) to comply with
connection using this facet is infrastructure agnostic, IEC/IEEE 60802. If an AC implements the TSN Net-
supporting managed and unmanaged switches in all work Asset Facet and it implements an embedded
their varieties including TSN switches. In heavily switch, then it must implement the TSN Bridge Facet
loaded networks, switch buffers may be filled and and that switch must be an IEC/IEEE 60802-compli-
packets dropped, or latency and jitter may be creat- ant bridge. The mechanisms to connect multiple
ed resulting in packets being delivered too late to be TSN Domains in a single network and to extend TSN
used by the control application. Domains through network routers have yet to be
standardized.
1 2 3 4 5 6 Router 7 8
Interoperability Matrix full profile, that may impact its ability to meet applica-
Figure 23 shows a potential configuration of UAFX tion requirements. For instance, if devices 2 and 6
ACs that illustrates all possible network profile in- are motion devices, interoperability does not imply
teroperability use cases (allowing for both required that the system will achieve the update rates, latency
and optional facet implementations). and jitter required to successfully control a specific
Table 1 shows which of the ACs are interoperable, application.
and indicates likely constraints of that interoperabili- If devices 1 and 7 have implemented support for
ty. both, Profile A and Profile B, device 1 would be in-
Interoperability only applies to the ability for two teroperable with all devices (see Figure 24) and
components to exchange process data. There are therefore its row would be as shown in Table 2.
other attributes, typically associated with a device’s
1
Different communication Device 1 Yes No 1
Yes 2
No1
Yes 3
No 4
No1
Table 2: Interoperability matrix (Devices 1 and 7 supporting both, Profile A and Profile B)
1 2 3 4 5 6 Router 7 8
The OPC UA framework is transport-agnostic and Ethernet-APL defines two general types of seg-
therefore can be used with different underlying pro- ments:
tocols (e.g. TCP, UDP, MQTT, ...) and physical lay-
ers. To bring OPC UA down to the field level in pro- ➞ The “Trunk” provides high power and signal lev-
cess industry applications, OPC UA is combined els for long cable lengths of up to 1000 m.
with the Ethernet Advanced Physical Layer (APL) ➞ The “Spur” carries lower power with optional in-
which will be addressed in a later specification ver- trinsic safety for lengths of up to 200 m (2-WISE).
sion in the context of the controller-to-device use
case. 2-WISE stands for 2-Wire Intrinsically Safe Ether-
net. This IEC technical specification, IEC TS 60079-
Ethernet – Advanced Physical Layer 1 47 (2-WISE), defines intrinsic safety protection for
Ethernet-APL is an enhanced physical layer for sin- all hazardous Zones and Divisions. For users, this
gle-pair Ethernet (SPE) based on 10BASE-T1L as includes simple steps for verification of intrinsic
shown in Figure 25. It communicates via a cable safety without calculations.
length of up to 1000 m at 10 MBit/s, full-duplex. It Ethernet-APL combines the best attributes of Eth-
is the logical extension for Ethernet and provides ernet communication with two-wire installation
the attributes required for reliable operation in the techniques. This makes Ethernet-APL easy to de-
field of a process plant. Ethernet-APL is a physical ploy as a standard for field applications, from pro-
layer that will be able to support OPC UA or any cess plants with hazardous areas up to Zone 0 / Di-
other higher-level protocol. vision 1 to hybrid plants, employing technologies
Ethernet-APL is designed to support various instal- from factory automation and process automation.
lation topologies, with optional redundancy or resil- Consequently, the use of Ethernet-APL as a physi-
iency concepts and trunk-and-spur. Ethernet-APL cal layer for OPC UA field devices is a key driver for
explicitly specifies point-to-point connections only successfully bringing OPC UA down to the field
with each connection between communications level in process automation applications.
partners constituting a “segment”. Thus, Ethernet-
APL switches isolate communications between
segments. This eliminates disturbances such as
cross talk and natively protects communications
from device faults on a different segment.
33
Cloud
Figure 25: Example topology for long cable reach Facility Ethernet
Ethernet-APL with
Increased Safety
Ethernet-APL with
Intrinsic Safety
1
Extract from “ethernet-apl advanced physical layer. Ethernet to the field”
https://opcfoundation.org/wp-content/uploads/2020/06/Ethernet-APL_Ethernet-To-The-Field_EN.pdf
34
Types of UAFX traffic and their A system-wide implementation of these traffic types
QoS requirements allows for convergence of factory automation, pro-
To allow for the coexistence of different applications cess control, IT traffic and best-effort traffic on the
on the same network, the infrastructure components same network.
have to provide the means to transport different
types of traffic with appropriate QoS. The traffic TSN Domains and examples for
types defined by the Field Level Communications communication relations
Initiative allow for convergence of different types of Today, many network architectures for industrial au-
OT traffic (e.g. process control, factory automation, tomation systems follow a certain physical and logi-
and fast motion and I/O control) and IT traffic using cal separation into domains or zones. This separa-
the same infrastructure. tion is often the result of organizational or technical
The following traffic types are defined for UAFX requirements, e.g., interconnection of individual
systems: components or entire machines from different ven-
dors, each with their own validated communication
➞ Network Control network and configuration, or the implementation of
➞ Cyclic Control zones for security best practice, or to support net-
➞ Event-based Control work redundancy and to further enhance network
➞ Configuration and Diagnostics QoS guarantees. These requirements also may ne-
➞ User-defined and cessitate a logical separation when using TSN.
➞ Best Effort
TSN Domain
E
Intra-domain Intra-domain
Communication stream
Bridge
Bridge
E E E E
E: end station
Moreover, separation into different TSN Domains is Figure 27 shows such inter-domain communication
intended to allow for the centralized and distributed for a C2C scenario traversing TSN Domains 1, 2,
TSN stream reservation approaches to operate side- and 3.
by-side. As an alternative for inter-domain stream reservations
TSN intra-domain and inter-domain communication and as a state-of-the-art approach to interconnecting
are distinguished. The selected stream reservation different domains, e.g., representing machines in to-
mechanism enables an industrial control application day’s systems, the exchange of process data be-
to reserve network resources for the selected TSN tween two domains (e.g., Domain 1 and Domain 2 in
QoS mechanisms within the given TSN Domain. This Figure 28) may also logically be decoupled from on-
allows leveraging TSN-provided bandwidth and tim- the-wire communication and corresponding TSN
ing guarantees in converged network scenarios, as stream reservation via application-level gateways.
shown in Figure 26. Intra-domain communication Table 3 lists examples of communication relationships
can be utilized to realize C2C, C2D, and D2D com- utilizing either intra- or inter-domain communication.
munication relations. Inter-domain communications with TSN represent
Inter-domain communication occurs in communica- future work in IEC, IEEE, and IETF and so will not be
tions scenarios for data exchanges of industrial con- addressed in early releases of OPC UA FX specifica-
trol applications across (multiple) domains. It can be tions. Where inter-domain communications are re-
utilized to realize C2C, C2D, and D2D communica- quired by an application, Profile A will ensure interop-
tion relations. erable communications between ACs.
TSN Domain 3
Bridge Bridge
E E
Bridge Bridge
Bridge Bridge
E E E E E E E E
Network Management
UAFX Network Management will be based on open will be utilized. The actual configuration parameters
standards. For distribution of a successful network will be modelled in IEEE-conformant data models.
configuration standardized management protocols
E E
Gateway/ Gateway/
Router Router
Intra-domain Intra-domain
stream stream
Bridge Bridge
Bridge Bridge
E E E E E E E E
Figure 28: Connection of Domains using application level gateways or DetNet routers
C2D Intra-domain communication This is probably the most common relationship, when a controller communicates
with its peripheral (I/Os, drives, valves, …)
C2C Intra-domain communication Communication between multiple controllers in the same TSN Domain
D2D Intra-domain communication To improve reaction times the devices (I/Os, drives, …) sometimes need to estab-
lish direct communication
C2D Inter-domain communication controller synchronizes on encoder signal from a different TSN Domain
C2C Inter-domain communication Interconnection of machines/skids without dedicated gateways (without controller)
D2D Inter-domain communication synchronization between motions drives in different TSN Domains
This technical paper described how the Field Level In parallel to the creation of specifications, open
Communications Initiative extends the OPC UA source stack software and code samples are being
framework to facilitate cross-vendor interoperability generated so that an easy adoption of OPC UA for
between controllers by enabling the exchange of field level communications is facilitated. Furthermore,
data relevant for different use cases including the ex- test specifications and test tools are being devel-
change of real-time and safety-relevant data in a se- oped to provide high-grade cross-vendor interoper-
cure way. ability between Automation Components.
After the first OPC UA FX release with the focus on With the extensions specified by the Field Level
the controller-to-controller use case, the specifica- Communications Initiative, OPC UA in combination
tions will be extended to also support controller-to- with APL, TSN, and 5G offers a complete, open,
device (C2D) and device-to-device (D2D) use cases standardized, and interoperable solution that fulfils
including additional features and device-specific industrial communication requirements and at the
models, e.g. for motion, instrument, I/O, and safety same time provides semantic interoperability from
devices. field to cloud (see Figure 29).
External World
Management Level L4
Planning Level L3
Source: VDI (2013), MDPI (2019)
Supervisory Level L2
Control Level L1
Field Level L0
Smart Automation Device
Acronyms
V2 www.opcfoundation.org