Lecture 4 - Student Version
Lecture 4 - Student Version
Communications
and Control Protocols
Part I
Objectives:
• To gain understanding about what communications and control protocols
do.
• To explain how protocols interrelate with networks and the internet.
• To describe some commonly used protocols and their uses.
What is a Communications Protocol?
technical standard.
digital data is a Bit, or binary digit, and it has just two states: Off,
that are either off or on. And a voltage associated with the transistor is
either low (0) or high (1). A bit’s value is represented using base 2, and can
by electronic equipment.
Networks, Nodes, and Topologies
transceivers.
• Bus
• Star
• Ring
The Bus topology is the simplest. Figure 1A shows a simple bus network.
Note the presence of resistors at the ends of the bus. Each node is exposed
to data traffic on the bus, but it will only respond if data is directed to it.
Otherwise the data is ignored. A bus topology has the disadvantage that
failure of the bus cable will stop communications. End resistors with identical
single printer.
In a Star topology (Figure 1B), individual nodes are connected to a central
node. Very often the central node is a Switch. Switches allow temporary
pathways to be made so any node on the network can communicate with any
other node. In a star topology, an individual node can be disconnected without
affecting communications on the rest of the network. It’s more reliable than a
bus topology.
All data traffic stops if the central node fails. However, switches are built for
high reliability, and often, Uninterruptible Power Supplies are connected to
provide temporary backup power in event of loss of line power. Sometimes
redundant switches are used for improved reliability. In that case, each node
has two ports, with separate cables attached to each distributed node.
Figure 1C illustrates the Ring topology. The ring doesn’t have a
master device. Each node can both send and transmit data.
Data sent from one node to another is forwarded around the ring
networks. In a properly set-up network, data can get from one node to
readers have seen or worked with networks much more complex than
those shown in this course. Most networks have a central computer known
desktop computers.
Typically they also have far larger data storage capacity.
Servers are frequently set up in redundant pairs. Computers in a
network which act only as "dumb terminals" - which operators can
use for monitoring and control, but don’t directly interact with
controllers or perform processing tasks – are referred to as Clients.
A server processes requests from its clients and interacts with
controllers. Servers are often referred to as Thick Clients, and client
PCs are sometimes called Thin Clients. Such networks are usually
called Client-Server Networks.
Many plants and facilities have multiple client PCs and controllers in
for 4 reasons: first, to centralize key databases used to monitor the site in one
PLC, DCS, or PAC - can execute control over systems in a specific area of a
site, and report the status of its inputs and outputs to the server.
And client operator terminals that are networked with a
server can access the server's database(s) for several
purposes:
components.
Some communication cables have one group of conductors or
used only when the sending device does not require a response
from the receiving device. Security systems and fire alarms that
from the sending device to the receiving device, and back -- but
duplex transmission.
Example: Telephone
The OSI Model and its importance
The OSI, or Open Systems Interconnect model, is the next topic. The OSI
7 layers. It’s helpful to refer to the OSI model to explain features of protocols,
Layer 1 (Physical): This layer considers only the physical aspects of a network; the
Layer 2 (Data-link): This layer concerns itself with how Layers 1 and 3 work
together.
Layer 3 (Network): This layer provides an addressing scheme for routing of
Layer 4 (Transport): This layer makes sure that messages get to their correct
destination.
Layer 5 (Session): This layer handles the actual connections between systems.
Layer 6 (Presentation): This layer deals with the way different systems represent
data.
Layer 7 (Application): This layer concerns itself chiefly with the software
Communication and control protocols operating on a network need hardware devices and
connecting cables to work. Some common hardware devices are built into computers and
controllers - or attach directly to them. Many do not.
RS232 Serial Port
SFP Transceivers
Coaxial Cable
Fiber Optic Cable
Communication methods
to one or more slaves, and the slave(s) respond. For example, a PLC
Every 40 milliseconds, the PLC's processor first checks for any altered inputs
in the local rack (the rack where the processor is located); then it sends a
query to the 1st external rack to see if any inputs have changed, or
networks. "A special message, called the token, is passed from one
machine to another around the ring, and each machine can transmit
a ring network for use – it can be, and is, used on networks of other
topologies.
So, some protocols rely on token-passing but don’t use a ring network.
Since the Internet became widespread in the 1990s, the term Ethernet
communicate with any other node. It works like this: first, before a
computer or controller sends data to another (or more than one) device,
it listens to see if the network is busy. If the network is active, it will wait and
try to send data later. If it senses the network is available, it will transmit the
data.
However, due to network time delays, a node may start sending data
transmit data. Afterwards, each device will wait a random amount of time
before attempting data transfer again. Ethernet works better than any
other method for large networks. That’s why the Internet uses Ethernet.
And use of the Ethernet method has become common among industrial
controllers check and see if any inputs from field devices have changed
many times per second. If any have, the controller responds rapidly.
for serial data transmission. RS-232 is used only for data transmission from
one device to another. RS-232 interfaces were built into many legacy
computers, and devices like controllers and printers. RS-232 ports most
often have D-shell 9-pin, 15-pin, or 25-pin receptacles. Most RS-232 cables
higher data transmission speeds than RS-232 - up to 1 megabit per second (1 Mbps)
on a 100 meter cable. Data communications speed varies inversely with the total
length of an RS-485 cable; the shorter the total length, the faster the maximum
speed and vice versa. At RS-485 terminals and on conductors, a small negative
voltage represents an off bit, and a small positive voltage represents an on bit.
The technically correct term for this standard is TIA-485. But it is still referred to as
RS485 because the standard has existed for decades and has usually been called
RS-485.
Most often RS-485 networks consist of point-to-point connections to nodes from
a bus cable. Twisted-pair wiring is used for the bus cable. It offers high immunity to
network to supply and install into controllers. This makes it an attractive option for
physical layer of the 7-layer of the OSI model. It allows use of only 1 master node,
are used. More than one protocol can operate on RS-485 networks.
3.) RJ-45
RJ-45 ports and cable connectors have 8 conductors, and RJ-45 connectors are
ports are built into Network Interface Cards (NICs) in computers, controllers, Ethernet
switches, media converters and other devices. Communication speeds of 100 Mbps
4.) Converters
Many different protocols are used for data communications, but most that have
found widespread acceptance share some features.
Data transmissions are usually done in consecutive clusters of many bytes. Each
cluster consists of parts that have either fixed or variable length, depending on the
protocol and particular situation. Many protocols have specific ways to mark the
start and end of each transmission.
• Analog inputs
• Analog outputs
• Discrete inputs
• Discrete outputs
Sometimes other types of data, like character data, are also transmitted. Log-
on names, passwords, text messages, and product barcodes are examples of
character data.
“Don’t wait until you’ve reached your goal to be proud of yourself. Be
proud of every step you take toward reaching that goal.”
- unknown
- end -