Control Technology CTI 2572 Technical Overview Download Page 27

CTI 2572 Technical Overview Manual

17

CHAPTER 4.  NETWORK PROTOCOLS

4.1  Connectionless vs. Connection Oriented Protocols

In most networking discussions you will find references to connectionless and connection-
oriented services.  The following analogy may help you understand the features and advantages
of each.

Connectionless Protocols

Connectionless services may be compared to the standard U.S. mail.  You place a letter in an
envelope and mail it.  There is no need to notify the recipient that you are mailing the letter and
no requirement that the post office confirm that the letter was delivered (although they may
notify you eventually if the letter could not be delivered).  You may ask the recipient to respond.
 If they do not respond within a period of time, you can take some followup action (like sending
another letter).  If you mail several letters to the same recipient, there is no guarantee by the post
office that they will be delivered in the same sequence that they were mailed or that all of the
group will be delivered.

Connectionless network protocols work the same way.  The user software sends a packet
(datagram) to another node on the network.  There is no requirement to establish
communications with the recipient prior to sending the packet nor does the network protocol
confirm delivery (although the protocol may notify the user if the datagram could not be
delivered).  The application software may expect or request a reply from the recipient.  If no
reply is received within a specified period of time (timeout), the application software may re-try.
 If several datagrams are sent, there is no guarantee by the network that they will arrive in the
same sequence that they were sent or that all will be delivered.

Connectionless protocols are frequently described in network terminology as unreliable.  Despite
the emotional baggage that this term carries, it simply means that the protocol used at this level
will not guarantee that packets will be delivered or that notification will be given if a packet
cannot be delivered.  A higher level protocol or the application program itself may perform this
function.

Connectionless protocols provide several advantages: they make efficient uses of network
resources, are much simpler to implement, and require less processor overhead.  A
connectionless protocol would typically be used to send a command to a PLC to read data from
memory.

Summary of Contents for CTI 2572

Page 1: ...CTI 2572 ETHERNET TCP IP ADAPTER MODULE TECHNICAL OVERVIEW Version 1 1 CTI Part 062 00156 2572 Technical Overview Manual 032698 25...

Page 2: ......

Page 3: ...their respective holders DOCUMENT DISCLAIMER STATEMENT Every effort has been made to ensure the accuracy of this document however errors do occasionally occur CTI provides this document on an as is b...

Page 4: ......

Page 5: ...media and data link formats Chapter 4 provides an overview of higher level local area network protocols Chapter 5 discusses TCP IP and related protocols Chapter 6 covers SIMATIC TI505 command protoco...

Page 6: ......

Page 7: ...ologies and Media Physical Layer 10 3 3 Ethernet Protocol Data Link Layer 13 3 4 Ethernet Addresses 15 3 5 Requirement for Higher Level Protocols 15 CHAPTER 4 NETWORK PROTOCOLS 17 4 1 Connectionless v...

Page 8: ......

Page 9: ...ogy 10 Figure 5 10Base2 Thin Coax Topology 10 Figure 6 10BaseT Unshielded Twisted Pair Topology 11 Figure 7 Fiber Optic Hub 12 Figure 8 Ethernet Bridge 12 Figure 9 Mixed Ethernet Media 13 Figure 10 80...

Page 10: ......

Page 11: ...5 connector Other media may be attached via the appropriate transceiver attached to the AUI Attachment Unit Interface port The AUI port may be powered from the backplane or with an external power supp...

Page 12: ...t directly support TCP IP but several companies offer DOS TCP IP drivers Client Mode In Client Mode the 2572 can initiate a TCP IP message PLC logic is used to tell the 2572 what to send where to send...

Page 13: ...twork bandwidth must be devoted to the overhead of polling This overhead limits throughput and lengthens response time especially since most master slave networks operate at a data rate of 115 K bits...

Page 14: ...ptic cable may be used for interconnecting hubs Token Ring 802 5 uses a token which is passed among the stations on the network When a station has a token it can transmit When it is through transmitti...

Page 15: ...arrangement all stations share a common connection When a message is transmitted on the network all attached devices receive it The Ethernet standard supports a variety of media including coaxial cab...

Page 16: ...us topology which some consider to be a better plant floor topology and it offered the consistent deterministic response time inherent in token passing schemes RF technology was selected for noise imm...

Page 17: ...hernet have the significant market share Token Bus because of the cost and complexity has never become a major contender for the factory LAN market In general Ethernet offers the most cost effective a...

Page 18: ......

Page 19: ...in data representation between the communicating applications Layer 5 Session Synchronizes communications between applications Layer 4 Transport Provides reliable data transfer from end node to end no...

Page 20: ...attached to the 10Base5 cable in a tap fashion The transceivers are mounted on the cable and a cable is run from the transceiver to the AUI port on the adapter Although there are numerous installatio...

Page 21: ...igning packets and retransmitting signals Network attachments are made via 10baseT transceivers attached to the AUI port or directly via a RJ 45 jack on the adapter The 10BaseT standard allows each UT...

Page 22: ...tions increases a point is finally reached where collisions occur frequently and response time begins to suffer usually around 50 utilization Bridges are commonly used to alleviate this problem The ne...

Page 23: ...ne station will attempt to transmit at the same time when this occurs the signals will collide When transmitting Ethernet stations detect a collision each waits a random amount of time then re transmi...

Page 24: ...sends and receives only Ethernet II packets cannot communicate with a node which sends and receives only 802 3 packets Since IEEE 802 3 does not contain any information which identifies the upper lev...

Page 25: ...ernet by itself is sufficient for local area network communications It would seem that application software could simply insert the destination address and the application data in the Ethernet packet...

Page 26: ......

Page 27: ...ftware sends a packet datagram to another node on the network There is no requirement to establish communications with the recipient prior to sending the packet nor does the network protocol confirm d...

Page 28: ...data will be delivered in sequence or that the sender will be notified if the protocol was unable to do so A connection oriented protocol would typically be used download a program to a PLC 4 2 Common...

Page 29: ...they will support the TCP IP as a native Netware protocol TCP IP Of all the popular LAN protocols only TCP IP can be considered to be open i e non proprietary TCP IP Transmission Control Protocol Inte...

Page 30: ......

Page 31: ...ol Protocol or UDP User Datagram Protocol services TCP is used if connection oriented communications is desired UDP is used for connectionless communications The TCP segment or UDP datagram is placed...

Page 32: ...ld be generated and the conditions under which a packet will be discarded The datagram consists of an IP header and the data from the upper layer protocol Fields in the datagram header contain control...

Page 33: ...ganization Organizations with networks connected to the Internet with a capital I must obtain the network portion of the IP addresses from a central authority the Network Information Center The Host I...

Page 34: ...n an Ethernet frame addressed to the physical address of the Network Interface Card Thus the gateway must be able to translate the host portion of the IP address into a physical Ethernet address Fortu...

Page 35: ...Control Protocol TCP Like UDP TCP uses the concept of a port number to identify a process within a host computer Unlike UDP TCP provides a reliable connection oriented service TCP is usually used whe...

Page 36: ...kets If no acknowledgement is returned after a designated time then TCP re sends the packets To improve throughput and to reduce network loading TCP allows multiple packets to be sent before an acknow...

Page 37: ...t widely used conventions is called Berkeley Sockets The Berkeley Sockets interface is named for the development at the University of California at Berkeley where TCP IP was originally distributed Sin...

Page 38: ......

Page 39: ...Although this is less efficient than a straight binary protocol use of ASCII Hex frees the programmer from having to understand how data is physically represented in the PLC Using NITP protocol up to...

Page 40: ...ITP and Task Codes are the most common way of communicating with SIMATIC TI505 PLCs the CTI 2572 TCP IP implementation supports this interface Thus to communicate with the PLC via the 2572 all the app...

Reviews: