Ethernet Design Considerations
Ethernet Design Considerations
Ethernet Design Considerations
Allen-Bradley, Rockwell Software, Rockwell Automation, ArmorBlock, CompactLogix, ControlLogix, FactoryTalk View, PanelView, RSLinx, RSLogix, Logix5000, Kinetix, FLEX, POINT I/O, PowerFlex, RSNetWorx, RSView, SoftLogix, Stratix 6000, Stratix 8000, Stratix 8300, ArmorPOINT, POINT Guard I/O, Guard I/O, GuardLogix, Integrated Architecture, ControlFLASH, and TechConnect are trademarks of Rockwell Automation, Inc. Trademarks not belonging to Rockwell Automation are property of their respective companies.
Summary of Changes
This manual contains new and updated information. Changes throughout this revision are marked by change bars, as shown to the right of this paragraph.
Summary of Changes
Notes:
Table of Contents
Preface
Additional Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Table of Contents
Flex Links Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Resilient Ethernet Protocol (REP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Device-level Ring (DLR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Internet Group Management Protocol (IGMP) . . . . . . . . . . . . . . . . . . . . . Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Dynamic Secure MAC Address (MAC ID) . . . . . . . . . . . . . . . . . . . . . Static Secure MAC Address (MAC ID) . . . . . . . . . . . . . . . . . . . . . . . . Security Violations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Device Commissioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
44 45 47 49 50 50 50 51 52
74 75 76 77 77 78 79 80 82 83
Table of Contents
Example: Predict System Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Determine If System Has Sufficient Bandwidth to Meet Application Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . Explicit Messaging. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . EtherNet/IP Module Serving as a Scanner . . . . . . . . . . . . . . . . . . . . . . EtherNet/IP Modules Functioning as Adapters . . . . . . . . . . . . . . . . . EtherNet/IP Modules 2 and 3 with Consumed Tags . . . . . . . . . . . . Recommendations to Achieve More Throughput in an Existing Control System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Estimate the Maximum Input or Output Times for CIP Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Refine Estimates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
84 85 86 87 89 90 91 92 93
Index
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Table of Contents
Notes:
Preface
Rockwell Automation follows a strategy of using open network technology for seamless, top-floor to shop-floor integration. These open networks speak a common language and share a universal set of communication services. As a result, information can be communicated seamlessly throughout the plant, from shop floor to top floor, and to and from the Internet for e-business applications. Each Rockwell Automation network is ideal for a wide range of applications, operates with devices manufactured by various vendors, and shares data with industry-standard information networks.
Comparison Function EtherNet/IP Network Plant management system tie-in (material handling); configuration, data collection, and control on a single high-speed network Mainframe computers Programmable controllers Robots HMI I/O Drives Process instruments ControlNet Network Supports transmission of time critical data between PLC processors and I/O devices Programmable controllers I/O chassis HMIs Personal computers Drives Robots DeviceNet Network Connects low-level devices directly to plant-floor controllerswithout interfacing them through I/O modules Sensors Motor starters Drives Personal computers Push buttons Low-end HMIs Bar code readers PLC processors Valve manifolds
Data repetition
Medium-size packets; data transmissions are deterministic and repeatable 99 nodes 5 Mbps Redundant applications Scheduled communication
64 total nodes 500, 250, or 125 Kbps Supply power and connectivity to low-level devices
Preface
Additional Resources
Table 1 - ODVA Resources
Resource http://www.odva.org/ http://www.odva.org/default.aspx?tabid=54
These documents and websites contain additional information concerning related products from Rockwell Automation.
Description Accesses the Open DeviceNet Vendors Association (ODVA) website. Accesses the CIP Advantage website that offers the following: CIP features and benefits How to get started Describes the required media components and how to plan for, install, verify, troubleshoot, and certify an Ethernet network.
Ethernet Media Planning and Installation Manual, ODVA publication http://www.odva.org/Portals/0/Library/Publications_Numbered/ PUB00148R0_EtherNetIP_Media_Planning_and_Installation_Manual.pdf
Network Infrastructure for EtherNet/IP: Introduction and Considerations, ODVA publication Provides an overview of the technologies used in EtherNet/IP networks and provides guidelines for deploying infrastructure devices in EtherNet/IP networks. http://www.odva.org/Portals/0/Library/Publications_Numbered/ PUB00035R0_Infrastructure_Guide.pdf
You can view or download Rockwell Automation publications at http:/www.rockwellautomation.com/literature/. To order paper copies of technical documentation, contact your local Allen-Bradley distributor or Rockwell Automation sales representative.
10
Chapter
EtherNet/IP Overview
The EtherNet/IP protocol is a multi-discipline, control and information platform for use in industrial environments and time-critical applications. The EtherNet/IP network uses standard Ethernet and TCP/IP technologies and an open, application-layer protocol called the Common Industrial Protocol (CIP). The open, application-layer protocol makes interoperability and interchangeability of industrial automation and control devices on the EtherNet/IP network a reality for automation and real-time, control applications.
Application CIP Control and Information Protocol EN50170 Control International and IF C 61158 Standard
Presentation
Session
Transport
UDP IP-Multicast
TCP
OPEN
Network
IP
Llink
Physical
Topic Network Protocols Configuration Requirements EtherNet/IP Modules in a Control System Bridge Across Networks
Page 12 13 17 18
The EtherNet/IP protocol follows these standards: IEEE 802.3 - standard Ethernet, Precision Time Protocol (IEEE-1588) IETF - Internet Engineering Task Force, standard Internet Protocol (IP) IEC - International Electrotechnical Commission ODVA - Common Industrial Protocol (CIP)
11
Chapter 1
EtherNet/IP Overview
Network Protocols
On the most basic level, Ethernet is a wire or cable that connects computers and peripheral modules so that they can communicate. The actual wire used for the network is referred to as the network medium. Beyond the physical medium, all Ethernet networks support protocols that provide data transfer and network management capability.
Description CIP applies a common application layer over an Ethernet network by encapsulating messages in TCP/UDP/IP. This common application layer is the Common Industrial Protocol (CIP), which provides interoperability and interchangeability of industrial automation and control modules on an Ethernet network. The EtherNet/IP network supports both real-time I/O (implicit messaging) and explicit messaging. TCP/IP is a transport-layer protocol (TCP) and a network-layer protocol (IP) commonly used in business environments for communication within networks and across internetworks. The EtherNet/IP communication modules use TCP/IP for explicit messaging, that is, messages in which time is not a critical factor, such as uploading or downloading programs. UDP is a much simpler transport protocol. It is connectionless and provides a simple means of sending datagrams between two modules. UDP is used by applications that implement their own handshaking between modules and only require minimal transport service. UDP is smaller, simpler, and faster than TCP and can operate in unicast, multicast, or broadcast mode. The EtherNet/IP communication modules use UDP/IP for real time I/O messaging.
Protocol CIP
Transmission Control Protocol/internet Protocol (TCP/IP) User Datagram Protocol/internet Protocol (UDP/IP)
12
EtherNet/IP Overview
Chapter 1
Configuration Requirements
All devices on Ethernet communicate by using the Ethernet address for the device. This address is sometimes referred to as the hardware address or Media Access Controller (MAC) address. The hardware address is a unique (in the world), six-byte address that is embedded in the circuitry of every device that sits on an Ethernet network. Every vendor of Ethernet products obtains their own unique address range. For a device to communicate on an Ethernet network, you must configure its IP address, gateway address, and subnet mask.
IP Address
The IP address identifies each node on the IP network or system of connected networks. Each TCP/IP node on a network must have a unique IP address. The IP address is 32 bits long and has a network ID part and a host ID part. Because networks vary in size, there are four types of networks.
Network Type Class A Class B Class C Class D For Large networks with many devices Medium-sized networks Small networks (fewer than 256 devices) Most common for private, industrial networks Multicast addresses
Class C
0 1 1 0 1 1
16
31
Class D
13
Chapter 1
EtherNet/IP Overview
Each node on the same physical network must have an IP address of the same class and must have the same network ID. Each node on the same network must have a different local address (host ID), thus giving it a unique IP address. IP addresses are written as four-decimal integers (0...255) separated by periods where each integer gives the value of one byte of the IP address. For example, the 32-bit IP address: 10000010 00000000 00000000 00000001 is written as 130.0.0.1.
Class A B C D Leftmost Bits 0xxx 10xx 110x 1110 Start Address 0.0.0. 128.0.0.0 192.0.0.0 224.0.0.0 Finish Address 127.255.255.255 191.255.255.255 223.255.255.255 239.255.255.255
Public IP addresses are for computers and devices connected to the Internet. Devices on industrial networks are not connected to the Internet, but they communicate with each other over an EtherNet/IP network. These devices use private IP addresses that are not routed on the Internet. Private IP addresses typically start with 10, 172, or 192 as the first part of the address. Private IP addresses are typically connected to the Internet through a Network Address Translation (NAT) device. For more NAT information, see page 36.
14
EtherNet/IP Overview
Chapter 1
Gateway Address
A gateway connects individual physical networks into a system of networks. When a node needs to communicate with a node on another network, a gateway transfers the data between the two networks. The following figure shows gateway G connecting Network 1 with Network 2.
A
128.1.0.1
Network 1 G B
128.2.0.1
128.1.0.2
C
128.2.0.2
128.2.0.3
Network 2
When host B with IP address 128.2.0.1 communicates with host C, it knows from Cs IP address that C is on the same network. In an Ethernet environment, B can then resolve Cs IP address to a MAC address and communicate with C directly. When host B communicates with host A, it knows from As IP address that A is on another network because the network IDs differ. To send data to A, B must have the IP address of the gateway connecting the two networks. In this example, the gateways IP address on Network 2 is 128.2.0.3. The gateway has two IP addresses (128.1.0.2 and 128.2.0.3). Network 1 hosts must use the first IP address, and Network 2 hosts must use the second IP address. To be usable, a hosts gateway IP address must match its own net ID. Devices with IP address switches use the default gateway address of either 192.168.1.1 or 0.0.0.0. Check your product information to determine which gateway address applies for your device.
15
Chapter 1
EtherNet/IP Overview
Subnet Mask
Subnet addressing is an extension of the IP address scheme that enables a site to use a single net ID for multiple physical networks. Routing outside of the site continues by dividing the IP address into a net ID and a host ID via the IP class. Inside a site, the subnet mask is used to redivide the IP address into a custom net ID portion and host ID portion. A subnet mask determines which of the 32 bits in the IP address are part of the network ID and which are part of the unique node identification. This also determines the size of the network or subnetwork. Take Network 2 (a Class B network) in the previous example and add another physical network. Selecting this subnet mask would add two additional net ID bits allowing for four physical networks. 11111111 11111111 11111111 00000000 = 255.255.255.0 Two bits of the Class B host ID have been used to extend the net ID. Each unique combination of bits in the part of the host ID where subnet mask bits are 1 specifies a different physical network.
A
128.1.0.1 128.1.0.1
Network 1 G B
128.2.64.1 128.2.64.1
128.1.0.2 128.1.0.2
C
128.2.64.2 128.2.64.2
128.2.64.3 128.2.64.3
Network 2.1 G2 D
128.2.128.1 128.2.128.1
128.2.64.4
E
128.2.128.2 128.2.128.2
128.2.128.3 128.2.128.3
Network 2.2
A second network with Hosts D and E has been added. Gateway G2 connects Network 2.1 with Network 2.2. Hosts D and E will use Gateway G2 to communicate with hosts not on Network 2.2. Hosts B and C will use Gateway G to communicate with hosts not on Network 2.1. When B is communicating with D, G (the configured Gateway for B) will route the data from B to D through G2.
16
EtherNet/IP Overview
Chapter 1
The following diagram shows how EtherNet/IP communication modules can fit into a control system.
1769-L18ERM-BB1B Control System 1769-L33ERM Control System 1756-EN2T 1756 I/O Modules 1794-AENT 1794 I/O Modules
Switch
PowerFlex Drive
In this example, the following actions can occur: Controllers produce and consume tags with each other. Controllers initiate MSG instructions that send/receive data or configure devices. Controllers control I/O and drives. Workstations can upload/download projects to the controllers. Workstations can configure devices on the EtherNet/IP network.
17
Chapter 1
EtherNet/IP Overview
Some EtherNet/IP communication modules support the ability to bridge or route communication through devices, depending on the capabilities of the platform and communication devices. You have a bridge when you have a connection between communication devices on two networks. For example, the bridge device has both EtherNet/IP and DeviceNet connections, enabling Device 1 on the EtherNet/IP network to communicate with Device 2 on a DeviceNet network through the bridge. The bridge device can be an EtherNet/IP-to-DeviceNet bridging device or a Logix5000 system with an EtherNet/IP communication module and a DeviceNet communication module.
Can bridge to this network EtherNet/IP ControlNet Yes Yes Yes DeviceNet Yes Yes Yes RS-232 Serial Yes Yes Yes
In the following example graphic, a workstation configures a drive on a DeviceNet network and bridges EtherNet/IP networks to reach the drive.
PanelView Plus Terminal EtherNet/IP Switch Bridge DeviceNet
Drive
IMPORTANT
You can bridge between devices on different networks for messaging only. You cannot bridge from one network to another for I/O control or produced and consumed tags. This restriction applies regardless of whether the two networks are either of the following: Same type, for example, an EtherNet/IP network to EtherNet/IP network Different types, for example EtherNet/IP network to ControlNet network
18
Chapter
The topology and cable layout of the Ethernet network is part of the physical layer. Ethernet systems require various infrastructure components to connect individual network segments.
Topic Topologies Media Hubs Repeaters Media Converters Bridges Routers and Gateways Switches Page 19 22 23 23 24 24 25 26
Topologies
Ethernet networks are laid out in point-to-point configurations with one cable for each device. Ethernet networks have active infrastructures that rely on switches. You can design a network with individual switch devices and devices that have embedded switch technology.
19
Chapter 2
Switch D D Switch D Linear - switch based Switch D D Switch D D Switch D D D Switch Switch D D
A linear network is a collection of devices that are daisy-chained together. A linear topology works best for a limited number of nodes. Advantages Easy to design, configure, and implement Least amount of cabling Minimal amount of cable needed Ability to cover long distances with 100 m allowed between each link Disadvantages Loss of network service in case of connection failure (no resiliency) Creates the potential for bottlenecks Variable number of hops can make performance difficult to predict Powering down a device or the failure of a device in the center of the network affects connectivity between any of the devices on either side Each link in the chain represents network delay
A redundant star topology is essentially where every Layer 2 access switch has dual connections to a Layer 3 distribution switch. Devices are connected to the Layer 2 switches. Advantages Resiliency from multiple connection failures Faster convergence to connection loss Consistent number of hops provide predictable and consistent performance Fewer bottlenecks Disadvantages Additional wiring and ports required Additional configuration complexity
Layer 2 D D
Layer 2 D D
20
Chapter 2
The EtherNet/IP embedded switch technology offers alternative network topologies by embedding switches into the end devices themselves.
Table 5 - Topologies with Embedded Switch Technology
Topology Device-level ring (DLR) - embedded switch
D D D D D D D D
Description
Description
A DLR network is a single-fault tolerant ring network intended for the interconnection of automation devices. This topology is also implemented at the device level. No additional switches are required. Advantages Ability to survive a single point of failure or a device being powered down on the ring. Simplified cabling Ability to cover long distances with 100 m allowed between each copper segment Very fast network convergence Disadvantages Supervisor-node configuration required Additional configuration complexity Variable number of hops can make performance difficult to predict
A linear network is a collection of devices that are daisy-chained together. The EtherNet/IP embedded switch technology allows this topology to be implemented at the device level. No additional switches are required. A linear topology works best for a limited number of nodes. Advantages Easy to design, configure, and implement Least amount of cabling Minimal amount of cable needed Ability to cover long distances with 100 m allowed between each link Disadvantages Loss of network service in case of connection failure (no resiliency) Creates the potential for bottlenecks Variable number of hops can make performance difficult to predict Powering down a device or the failure of a device in the center of the network affects connectivity between any of the devices on either side Each link in the chain represents network delay
21
Chapter 2
Media
The actual wire used for the network is referred to as the physical media. Generally, shorter cable runs are less susceptible to EMI (electromagnetic interference) and RFI (radio-frequency interference) from electrical circuits, motors, and other machinery. Use this flowchart to select Ethernet media.
Do you have any of these: Long distances? High Magnetic fields? High noise?
Yes
Fiber Media Recommendations: Multi-mode for general purposes, cost less Single-node yields higher distance, but costs more
No
Do you have excess amounts of any of these: Radiated noise? Conducted noise? Metal conduit?
Yes
Copper STP (shielded twisted pair) Recommendations: Requires proper grounding Category 5e, 6, and 6a cables and connectors
No Copper UTP (unshielded twisted pair) Recommendations: Requires proper grounding Category 5e, 6, and 6a cables and comectors
For more information about the media options, see the Ethernet section of the Network Media Catalog, publication M116-CA552.
22
Chapter 2
Hubs
Hubs are multiport repeaters. They are based on older technology that has been largely replaced by network switches at layer 2, but that are still used as network diagnostic tools to analyze network traffic: A hub is at the center of a star topology. Hubs can be connected together using a variety of media as a backbone between hubs. A hub broadcasts everything it receives on any channel out all other channels.
Hub Personal computer
HMI
Repeaters
A repeater recreates the incoming signal and re-transmits it without noise or distortion that may have effected the signal as it was transmitted down the cable. Repeaters are generally only on older networks to increase the network length. More modern networks use fiber media or switches to increase network length.
Repeater
23
Chapter 2
Media Converters
Media converters let you mix fiber and copper (twisted-pair) cables in the same system. Use a switch to mix media: Physical layer devices offer no buffering or advanced diagnostic features. Physical layer devices are easily overrun by an EtherNet/IP system (no buffering = lost data). Layer 2 devices have buffering, QoS, and other management features.
Fiber Link
Bridges
A bridge is a device that isolates traffic between segments by selectively forwarding frames to their proper destination. It is transparent to the network and protocol independent. Similar to the repeater, the bridge isnt used much any more, but more advanced devices which perform the bridging function are commonly used.
Bridge Ethernet Ethernet
24
Chapter 2
Routers and gateways use the network portion of IP addresses to identify where networks are. They keep a routing table that tells the device which port a message should be transmitted out in order to get the message to the proper network. If the particular network is not directly attached to that device, it will forward the message to the next gateway or router in the path for further routing.
Routing Table Network 10.17.10.0 10.10.10.0 Port 1 2 Default Gateway 10.10.10.1 10.17.10.1
10.17.10.56 VLAN 17 Subnet 10.17.10.0 Subnet Mask 255.255.255.0 VLAN 10 Subnet 10.10.10.0 Subnet Mask 255.255.255.0
10.10.10.56
25
Chapter 2
Switches
Switches are key components that provide determinism and throughput required for control applications. Industrial-rated switches are recommended for connecting the computers and other devices to each other and to higher-level networks in the network reference architecture. Ethernet switches perform the following: Operate in full-duplex mode to eliminate collisions Include managed switch features for advanced network functionality
For more information, see the Stratix Switch Reference Chart, publication ENET-QR001.
26
Chapter 2
Unmanaged switch
Autonegotiation
Autonegotiation lets devices select the most optimal way to communicate without you having to configure the devices. However, if you connect a manuallyconfigured device to an autonegotiation device, there can be problems which result in a high rate of data transmission errors. All 100 Mbps devices are required to support autonegotiation, but most existing 10 Mbps devices do not. Select a switch that supports both speeds so you can connect to existing devices that support only the slower rate.
27
Chapter 2
Full-duplex Mode
Ethernet is based on Carrier Sense Multiple Access/Collision Detect (CSMA/ CD) technology. This technology places all nodes on a common circuit so they can all talk as needed. The nodes have to handle collisions (multiple devices talking at the same time) and monitor their own transmissions so that other nodes have transmission time. The data transmission mode you configure determines how devices transmit and receive data.
Transmission Mode Full-duplex Features Deterministic Transmit and receive at the same time Transmit on the transmit pair and receive on the receive pairs No collision detection, backoff, or retry Collision free Nondeterministic One station transmits and the others listen While transmitting, you do not receive, as no one else is transmitting If someone else transmits while you are transmitting, then a collision occurs Any Receive-while-Transmit condition is considered a collision
Half- duplex
Full-duplex mode eliminates collisions. Combined with the speed of the switches available today, you can eliminate the delays related to collisions or traffic in the switch. The end result is that the EtherNet/IP network becomes a highly deterministic network that works well for I/O control: If you are autonegotiating, make sure you are verifying the connection. If you are forcing speed and duplex on any given link, make sure you are forcing at both ends of the link. If you only force on one side of the link the autonegotiating side will always go to half duplex.
28
Chapter
When using the EtherNet/IP network for time-critical control, there are several features available in switches that are required or recommended.
Topic Transmission Packets Transmission Protocols Virtual LANs and Segmentation Quality of Service (QoS) Resiliency Internet Group Management Protocol (IGMP) Port Security Device Commissioning Page 30 33 37 40 41 49 50 52
29
Chapter 3
Transmission Packets
Packet Type Unicast Destination A single node
Data is transmitted over the EtherNet/IP network in packets. There are transmission methods for transporting data on the network.
Description Unicast connections are point-to-point transmissions between a source node and destination node on the network. A Frame is sent to a single destination.
Multicast
Multicast connections deliver information from one sender to multiple receivers simultaneously. Copies of a single frame are passed to a selected subset of possible destinations.
Broadcast
All nodes
Broadcast connections transmit information to every device on the network. A frame is delivered to all hosts on the network.
Limit the amount of broadcast and multicast traffic on the supervisory control network: Eliminating unwanted traffic reduces the load on devices, switches, and the network. Eliminating unnecessary incoming broadcast traffic also minimizes network load.
30
Chapter 3
It is important to prevent network traffic from coming into the supervisory control (level 2) and manufacturing operations (level 3) network from other levels. Likewise, it is equally important to ensure that traffic on the control system network does not get propagated into the plant enterprise network
31
Chapter 3
Frames
Use multicast frames in these situations: Redundancy applications Communication with more than one destination (Multicast is more efficient than sending multiple, unicast streams to multiple nodes.) Video streaming
To Plant Network
Switch or Router
Layer 2 Switch
Layer 2 Switch
Controller (Consumer)
I/O (Producer)
You must use unicast communication if the transmission routes through a Layer 3 device. I/O devices generally produce at very fast rates (such as 10 ms), so it is easy to flood the network with multicast traffic and force each end device to spend time deciding whether to discard numerous multicast frames. If there are a lot of I/O devices, they can easily use up a significant part of a routers CPU time. You must consider control network traffic propagating onto the plant information network, as well as, plant information network traffic propagating onto the control network. Some best practices include the following: Minimize device load due to unwanted IP multicast traffic Minimize switch load due to unwanted IP multicast traffic Minimize network load due to unwanted incoming IP multicast or broadcast traffic Block IP multicast traffic generated within the EtherNet/IP subnet from propagating onto the plant network Implement standard network troubleshooting tools For more information, see Virtual LANs and Segmentation on page 37 and Internet Group Management Protocol (IGMP) on page 49.
32
Chapter 3
Transmission Protocols
The Network layer (Layer 3) provides switching and routing that create logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, and internetworking.
1756 Controller
130.151.3.4 PowerFlex
33
Chapter 3
If you replace a Rockwell Automation EtherNet/IP communication module with a new module, the new module will have a different MAC ID. The ARP cache entries in other devices are now invalid because the MAC ID corresponding to the module's IP address has changed. This could cause a delay in reestablishing communication with the replacement module. The delay varies depending on the module and the network configuration in use. When a Rockwell Automation EtherNet/IP device starts up, it issues a gratuitous ARP that causes other devices to update their ARP caches. This generally results in a quick recovery of communication with the replacement module (less than a minute). However, some switches will not forward the gratuitous ARP message onto the network, in particular, if the Spanning Tree Protocol is enabled on that port. We recommend that you disable the Spanning Tree Protocol on those ports to which EtherNet/IP communication modules are directly connected (but not on ports which are linked to other switches). In the worst case, if the gratuitous ARP is not seen, an originating device could wait as long as 10 minutes for the ARP cache entry to age out and be deleted.
130.151.3.4
PowerFlex
34
Chapter 3
The DNS server refers to its table and sends back an IP address for the requested name. Once the client device receives the IP address for a name, it stores it in its own table so it does not have to ask for the IP address every time. The device may still have to do an ARP request, since it must decode the IP address into a hardware address.
1756 Controller
DNS Server
1734 POINT I/O DNS Table Name Controller PowerFlex Point IP Address 130.151.3.5 130.151.3.4 130.151.3.5 130.151.3.5 PowerFlex
35
Chapter 3
In the illustration, the NAT gateway address allows the (public) end-users workstation to communicate with the process control network even though the devices have separate IP addresses. IMPORTANT If you are not using IP address switches to assign network address information, you can use RSLinx and RSLogix 5000 software to set a gateway address. The software will not allow any address parameters to be changed when the switches are set to 1254. Products with IP address switches use a default gateway of either 192.168.1.1 or 0.0.0.0. See your product literature for which default gateway address applies for your device.
36
Chapter 3
A virtual LAN (VLAN) is a switched network segmented on a functional, application, or organizational basis, as opposed to a physical or geographical basis. Switches filter destination MAC addresses and forward VLAN frames only to ports that serve the VLAN to which the traffic belongs. A VLAN consists of several end systems, either hosts or network equipment (such as switches and routers), all of which are members of a single logical broadcast domain. A VLAN does not have physical proximity constraints for the broadcast domain. With VLANs, you can configure a switch to share two isolated networks without the traffic from one network burdening the other. IP multicast traffic from VLAN 1 will not reach VLAN 2. A VLAN blocks broadcast traffic and adds a measure of security between networks. A VLAN also gives you the ability to control access and security to a group of devices that is independent of physical location.
Controller 1 PC Controller 2
Switch
VLAN 1
VLAN 2
I/O
I/O
Security
Segmentation is the process of outlining which endpoints need to be in the same LAN. Segmentation is a key consideration for a cell/area network. Segmentation is important to help manage the real-time communication properties of the network, and yet support the requirements as defined by the network traffic flows. Security is also an important consideration in making segmentation decisions.
Rockwell Automation Publication ENET-RM002B-EN-P - April 2012 37
Chapter 3
A security policy may call for limiting access of factory floor personnel (such as a vendor or contractor) to certain areas of the production floor (such as a functional area). Segmenting these areas into distinct VLANs greatly assists in the application of these types of security considerations.
VLAN 10
VLAN 102
VLAN 42
In fact, there are competing objectives. On one hand, all level 02 devices that need to communicate multicast I/O between each other must be in the same LAN. On the other hand, the smaller the VLAN, the easier it is to manage and maintain real-time communication. Real-time communication is harder to maintain as the number of switches, devices, and the amount of network traffic increase in a LAN. Typically control networks are segmented from business networks. You can also segment networks based on function, logical layout, and traffic types. Choose from these options to segment control.
Segmentation Option Physical isolation Description Physically isolate networks Each network is a separate subnet creating clusters of control No IT involvement A separate ControlLogix EtherNet/IP bridge module is dedicated to each subnet The chassis backplane provides isolation of Ethernet traffic Only CIP traffic can be shared between subnets No IT involvement
ControlLogix gateway
VLANs
Ports on a managed switch are assigned to a specific VLAN Data is only forwarded to ports within the same VLAN Maybe IT involvement
38
Chapter 3
VLAN Trunking
Trunking lets a VLAN span multiple switches.
VLAN 102 VLAN 42 VLAN 20 802.1 Q Trunk VLAN 102 VLAN 42 VLAN 20
39
Chapter 3
Quality of service determines how packets are marked, classified, and treated based on traffic type. Rockwell Automation EtherNet/IP devices prioritize traffic internally. Implementing QoS at the switch level adds another level of prioritization. QoS does not increase bandwidthQoS gives preferential treatment to some network traffic at the expense of others. Not all network traffic is created equal, nor should users treat it equally. To minimize application latency and jitter, control data should have priority within the Cell/Area Zone. Quality of Service (QoS) gives preferential treatment to some network traffic at the expense of others. Control data is more sensitive to latency and jitter than information data. To explain how QoS works, think about the last time you boarded a plane at the airport. As boarding time gets close everyone starts to crowd around the gate. It is impossible for everyone to go down the jetway to the plane at once, so the airline establishes a boarding procedure to avoid chaos. This can be compared to the use of QoS on an Ethernet network. The network could have motion traffic, voice traffic, and email traffic all being transmitted at the same time over the network. In the airline example, first class passengers board first, followed by families with small children, followed by frequent flyers, and followed by the coach cabin starting at the back of the plane. Similarly, QoS lets you set up priority queues in the managed switches on the network. In the automation example, equate motion traffic to the first class passengers and give it the highest priority for network usage. Voice traffic can go second (it also has low tolerance for delay) and email traffic has the lowest priority queue. This ensures the least amount of delay possible on the motion control.
Ingress Actions Egress Actions Queue/Schedule Classification Policing/Metering Marking Congestion Control
Distinguish traffic by examining Layer 2/3/4 labels and QoS fields. QoS changed depending on trust state at port.
QoS Guidelines
Manage the output queues based on application needs. Schedule precision and motion control packets in the highest priority queue. QoS gives preferential treatment to Industrial Automation and Control System Network traffic at the expense of other network traffic. QoS is integrated into the Stratix 8000 and Stratix 8300 switch configurations. Deploy QoS consistently throughout Industrial Automation and Control System Network.
40 Rockwell Automation Publication ENET-RM002B-EN-P - April 2012
Chapter 3
Resiliency
A resiliency protocol maintains parallel links for redundancy while avoiding loops. Network convergence time is a measure of how long it takes to detect a fault, find an alternate path, and recover from the fault: During the network convergence time, some portion of the traffic is dropped by the network because interconnectivity does not exist. Communication will drop if the convergence time is longer than the Logix connection timeout.
Resiliency Protocols
Spanning Tree Protocol (STP), Rapid STP (RSTP), Multiple instance STP (MSTP) Stratix 8000 and Stratix 8300MSTP default Rapid Per VLAN Spanning Tree Plus (rPVST+); Cisco Technology Resilient Ethernet Protocol (REP); Cisco Technology EtherChannel Link Aggregation Control Protocol (LACP); IEEE Flex Links; Cisco Technology Device-level ring; topology option
Resiliency Protocol Mixed Vendor Ring Redundant Star Network Convergence > 250 ms Network Convergence > 70 ms Network Convergence > 1ms
X X X
X X X X X
X X X X X X X X X X X X
X X X X
41
Chapter 3
F = Forwarding B= Blocking
42
Chapter 3
EtherChannel Protocol
The EtherChannel protocol combines multiple physical switch ports into one logical connection to increase bandwidth through load balancing, as well as physical connection redundancy. This protocol groups several physical Ethernet links to create one logical Ethernet link for the purpose of providing fault-tolerance and high-speed links between switches, routers, and servers. An EtherChannel can combine 28 active Fast Ethernet or Gigabit Ethernet ports: Link Aggregation Control Protocol (LACP) port aggregationIEEE 802.3ad Built into Stratix 8000 and Stratix 8300 switches Requires a redundant star topology Provides resiliency between connected switches if a connection is broken Fault-tolerance is a key aspect of EtherChannel. Should a link fail, the EtherChannel technology automatically redistributes traffic across the remaining links. This automatic recovery takes less than one second and is transparent to network applications and the end user. This makes it very resilient.
Distribution Switches Catalyst 3750 Switch Stack
F = Forwarding
STP can be used with an EtherChannel. STP treats all the links as a single connection. Without the use of an EtherChannel, STP would effectively shutdown any redundant links between switches until one connection goes down. This is where an EtherChannel is most desirable, it allows full use of all available links between two devices.
43
Chapter 3
A = Active S = Standby
44
Chapter 3
g1/1
g1/2
g1/1
g1/2
g1/1
g1/2
g1/1
g1/2
g1/1
g1/2
Interface g1/1 Interface f1 segment 10 repREP segment 10 Interface g1/2 Interface f2 segment 10 repREP segment 10
When all links are operational, a unique port blocks the traffic on the segment. If any failure occurs within the segment, the blocked port goes forwarding.
Edge Port g1/2 Block Traffic Edge Port
g1/1
g1/2
g1/1
g1/2
g1/1
g1/2
g1/1
g1/1
g1/2
g1/2 Unblock
g1/1
g1/2
g1/1
g1/2
g1/1
g1/2
g1/1
g1/2
g1/1
g1/2
45
Chapter 3
Segments can be wrapped into a ring. Identification of edge ports requires additional configuration.
CC Blocking Blocking
46
Chapter 3
47
Chapter 3
Physical layer failure includes the following: All faults that are detectable at physical layer Physical layer failure detected by protocol-aware node Status message sent by ring node and received by ring supervisor
ControlLogix Controller Active Ring Supervisor ETAP Link Failure Link Status Link Status
Network convergence includes the following: After failure detection, ring supervisor unblocks blocked port Network configuration is now a linear topology Fault location is readily available via diagnostics
ControlLogix Controller Active Ring Supervisor
Forwarding
Forwarding
1783-ETAP
Link Failure
48
Chapter 3
Once ring is restored, the supervisor hears the beacon on both ports and transitions to normal ring mode by blocking one port.
ControlLogix Controller Stratix 8000 IE Switch
Forwarding
Beacon Announce ETAP
Beacon Announce
Blocking
The IGMP is a communication protocol used to manage the membership of IP multicast groups. Much of EtherNet/IP implicit (I/O) messaging uses IP multicast to distribute I/O control data, which is consistent with the CIP produced/consumer model. Without IGMP, switches treat multicast packets the same as broadcast packets. That is, multicast packets are re-transmitted to all ports. The behavior of an unmanaged switch is to flood multicast packets to all ports within the same VLAN. This behavior is not typically desirable. To resolve this the following occurs: Querier functionality manages a table that lists the devices that are participating in multicast groups. Snooping functionality inspects packets from devices and only forwards multicast data to devices that request the data. IGMP snooping constrains the flooding of multicast traffic by dynamically configuring switch ports so that multicast traffic is forwarded only to ports associated with a particular IP multicast group. If you have a router (Layer 3 device) on the network, make it the querier. IGMP protocol has versions 1, 2, and 3. Rockwell Automation products support versions 1 or 2. IGMP protocol version 2 negotiates the active querier automatically and that task is assigned to the IGMP capable device with the lowest IP address on a given VLAN. Therefore, assign the first available IP address on a given VLAN to the router (Layer 3 device). If you do not have a router, the querier function should be placed on a centrally located IGMP capable device on the network by configuring it to the first available IP address on a given VLAN.
Rockwell Automation Publication ENET-RM002B-EN-P - April 2012 49
Chapter 3
Port Security
The switch has dynamic and static methods for limiting the MAC addresses (MAC IDs) that can access a given port.
50
Chapter 3
Security Violations
In the event of a security violation with a Stratix 8000 or Stratix 8300 switch, one of these situations occurs: The maximum number of secure MAC addresses that have been configured for a port have been added to the address table, and a station whose MAC address is not in the address table attempts to access the interface. An address learned or configured on one secure interface is seen on another secure interface in the same VLAN. When a violation occurs, the port goes into the Restrict mode. In this mode, packets with unknown source addresses are dropped and you are notified that a security violation has occurred. An SNMP trap is sent, a syslog message is logged, and the violation counter increments. In the event of a security violation with a Stratix 6000 switch, the switch notifies the controller of the event (via an input bit) and the controller program decides how to proceed (such as shut that switch port down, send an alarm to the HMI, or shut the machine down). The switch does not make a decision on how to handle the security violation.
51
Chapter 3
Device Commissioning
There are multiple methods for assigning IP addresses. Switches on the product (such as thumbwheels, push buttons, or HIM modules) provide a static address that survive power cycles. Stratix switches support DHCP port allocation that is a hybrid solution for IP addressing as it allows for easy device replacement but is topology dependant.
Option Static
Description Devices hard-coded with an IP address Advantages: Simple to commission and replace Disadvantages: In large environments, can be burdensome to maintain Server assigns devices IP address Precursor to DHCP Advantages: Supported by every device Disadvantages: Requires technician to configure IP address/MAC address when a device is replaced Requires a PC for commissioning and replacement (unless there are switches to set the address offline) Adds complexity and point of failure Server assigns IP addresses from a pool (not recommended) Advantages: Efficient use of IP address range Can reduce administration work load Disadvantages: More complex to implement and adds a point of failure Devices get different IP addresses when they reboot Server assigns consistent IP addresses from a pool (not recommended) Advantages: Efficient use of IP address range Can reduce administration work load Disadvantages: More complex to implement and adds a point of failure Mixed environments may not work Automatically assign IP address per physical switch port Advantages: Efficient use of IP address range Eases maintenance and replacement in large environments Disadvantages: Requires some maintenance and upkeep on a per switch basis
DHCP
DHCP option 82
52
Chapter
EtherNet/IP Protocol
The EtherNet/IP protocol is standard Ethernet and standard IP technologies with standard CIP technology at the application layer.
Topic Connections EtherNet/IP Network Specifications Packets Rate Capacity Requested Packet Interval (RPI) Messaging CIP Safety CIP Sync Integrated Motion on an EtherNet/IP Network Connectivity to IT Page 53 60 63 64 65 67 68 70 71
Connections
EtherNet/IP communication modules must consider connections and EtherNet nodes to communicate on the EtherNet/IP network. The number of supported nodes applies only to CompactLogix 5370 controllers; see page 59. A connection is a point-to-point communication mechanism used to transfer data between a transmitter and a receiver. Connections can be logical or physical. Two connection types--TCP connections and CIP connections--are layered over each other each time data is transferred. The TCP connection is the first connection established. It is used for all EtherNet/IP communication and is required for all CIP connection use. A single TCP connection supports multiple CIP connections and remains open. Established over TCP connections, EtherNet/IP CIP connections transfer data from an application running on one end-node (transmitter) to an application running on another end-node (receiver). CIP connections are configured to use explicit or implicit message types. The message types support connected and unconnected connection types. Typically, connected CIP messages are used to transfer data. Unconnected CIP are used but are only temporary.
53
Chapter 4
EtherNet/IP Protocol
This graphic shows how connections are layered on each other when data is transferred over the EtherNet/IP network.
CIP Connection Types Your decisions when configuring your application determine the parameters of these connections. Connected Unconnected Connected
CIP Connection
TCP Connection
Remember these points when configuring your EtherNet/IP network application: All of the connections are used each time data is transferred on the EtherNet/IP network. You specify CIP connection message types and CIP connection types when configuring your application. For example, when a Logix5000 controller sends a MSG instruction to another Logix5000 controller, the transmitter sends the instruction to the receiver over a connection. That connection includes the following: a. A TCP connection is established. b. A CIP connection is layered on the TCP connection. c. An explicit or implicit CIP connection message is delivered via the CIP connection. d. If an explicit message type is used, it can be connected or unconnected. If an implicit message type is used, it is connected. Each EtherNet/IP communication module has TCP and CIP connection limits that you must account for when configuring your application. For more information on connection limits, see Table 8 on page 60. Refer to Nodes on an EtherNet/IP Network on page 59 for node count limitations for CompactLogix 5370 controllers.
54
EtherNet/IP Protocol
Chapter 4
These example applications describe how connections are used. EXAMPLE I/O Connections A Logix5000 controller has five CIP I/O connections to modules in a remote chassis and all of these connections are through the same local 1756-EN2T module and the same remote 1756-EN2T module. The following connections exist: One TCP connection Five CIP connections
EXAMPLE
RSLinx OPC Test Client The following connections exist: One TCP connection Four CIP connections (four is the default)
Terminology
The terms in this table help you understand connections.
Table 6 - EtherNet/IP Connection Terminology
Term Producer and consumer Definition Producer/consumer refers to implicit connections. With implicit connections, messages are sent cyclically (every RPI). Example: Assume a ControlLogix controller is controlling a single rack of FLEX I/O using a rack connection. Both the ENBT module that is local to the controller and the FLEX AENT module are consumers and producers of data. The AENT consumes outputs and produces inputs. Client/server refers to explicit connections. A client creates a connection and initiates messages. A server provides a service or data. Clients can send messages continuously or intermittently. Example: A ControlLogix controller can send a MSG instruction to another controller.
55
Chapter 4
EtherNet/IP Protocol
UCMM
TCP Connections
TCP connections are used for all EtherNet/IP communication and are established before one device on the network transmits data to one or more devices on the network. EtherNet/IP communication modules use one TCP connection for each IP address to which the module is connected. TCP connections are automatically established before CIP connections are established because you can only establish CIP connections over a TCP connection. A single TCP connection supports multiple CIP connections. IMPORTANT EtherNet/IP communication modules also have web servers that use TCP connections for non-CIP traffic, such as HTTP. However, TCP connections used for non-CIP traffic do not count against the limits listed above.
56
EtherNet/IP Protocol
Chapter 4
CIP Connections
CIP connections are automatically established over a TCP connection and transfer data from one device on the EtherNet/IP network to another. The following are examples of CIP connections: Logix5000 controller message transfer to Logix5000 controller I/O or produced tag Program upload RSLinx DDE/OPC client PanelView polling of a Logix5000 controller There are different CIP connections.
CIP Connection Bridged Description A bridged connection is a connection that passes through the EtherNet/IP communication module. The end point of the connection is a module other than the EtherNet/IP communication module. Example: An explicit connection from a controller through a 1756-EN2T module to another controller. An end-node connection is a connection whose end point is the EtherNet/IP communication module itself. Example: An explicit connection from RSLinx software to the EtherNet/IP communication module to set the module's IP address. A rack-optimized connections is an implicit message connection to a rack or assembly object in the EtherNet/IP communication module. Data from selected I/O modules is collected and produced on one connection (the rack-optimized connection) rather than on a separate direct connection for each module. This CIP connection is only available with digital I/O modules. An implicit message connection from a controller to an specific I/O module (as opposed to a rack-optimized connection). This CIP connection is available with analog and digital I/O modules.
End-node
Rack-optimized
Direct
IMPORTANT
CIP connections are further defined by these additional connection parameters: CIP Connection Message Types CIP Connection Types
57
Chapter 4
EtherNet/IP Protocol
Explicit connections are non-time critical and are request/reply in nature. Executing a MSG instruction or executing a program upload are examples of explicit connections. Explicit refers to basic information (such as source address, data type, or destination address) that is included in every message.
Unconnected
N/A
58
EtherNet/IP Protocol
Chapter 4
CompactLogix 5370 controllers use the number of Ethernet nodes to stay within their capacity for the number of connections. These controllers have limits on the number of nodes they support in the I/O configuration section of your RSLogix 5000 software project. Any devices you add directly to the local Ethernet node in the I/O configuration are counted toward the controllers node limitation. The following are example devices that are added to the I/O configuration and must be counted: Remote communication adapters I/O modules directly connected to the EtherNet/IP network, for example the 1732E-IB16M12R ArmorBlock EtherNet/IP module Motion devices, such as drives You do not count Ethernet devices that exist on the EtherNet/IP network but are not added to the I/O configuration. These devices include the following: Computer HMI that are not added to the I/O configuration section, for example, PanelView Plus terminals MSG instructions that do not use an RPI and are not time-critical Devices like the CompactLogix 5370 controllers that communicate with by using a socket interface
Table 7 - CompactLogix 5370 Controller Ethernet Node Guidelines
Cat. No. 1769-L16ER-BB1B 1769-L18ER-BB1B 1769-L18ERM-BB1B 1769-L24ER-QB1B 1769-L24ER-QBFC1B 1769-L27ERM-QBFC1B 1769-L30ER 1769-L30ERM 1769-L30ER-NSE 1769-L33ER 1769-L33ERM 1769-L36ERM 32 48 16 8 Ethernet Nodes Supported 4
For more information, see the CompactLogix 5370 Controllers User Manual, publication 1769-UM021.
59
Chapter 4
EtherNet/IP Protocol
N/A
900 960
(1) The 1768-ENBT communication module supports 32 TCP connections when using firmware revision 1.x. (2) The 1768-ENBT communication module supports 64 TCP connections when using firmware revision 2.x or later. (3) CIP connections for this device can be used for all explicit or all implicit applications. For example, a 1756-ENBT module has a total of 128 CIP connections that can be used for any combination of connections. (4) Total packet rate capacity = I/O Produced Tag, max + HMI/MSG, max. Packet rates will vary depending on packet size. For more detailed specifications, see the EDS file for a specific catalog number.
60
EtherNet/IP Protocol
Chapter 4
No
Revision 2.x - 1734-AENT Revision 3.x - 1734-AENTR Revision 2.x - 1738-AENT Revision 3.x - 1738-AENTR Revision 3.3 Revision 1.x
1756-EN3TR 1756-EWEB 1768-ENBT 1768-EWEB 1769-L23Ex 1769-L3xE 1769-L16ER-BB1B 1769-L18ER-BB1B 1769-L18ERM-BB1B 1769-L24ER-QB1B 1769-L24ER-QBFC1B 1769-L27ERM-QBFC1B 1769-L30ER 1769-L30ERM 1769-L30ER-NSE 1769-L33ER 1769-L33ERM 1769-L36ERM 1783-ETAP 1783-ETAP1F, 1783-ETAP2F 1794-AENT 2x-COMM-E Yes No N/A
Up to 2 axes N/A
Up to 8 axes Up to 16 axes N/A No N/A Revision 1.x Revision 2.x Revision 3.x Revision 1.1
(1) Most modules listed, with the exception of three fiber modules, support a speed duplex of 10/100. The 1756-EN2F, 1783-ETAP1F, and 1783-ETAP2F modules have a speed duplex of 100 only. (2) Module has two ports instead of one. With the second port, you can wire the module directly into a linear or device-level ring topology instead of connecting the network devices with an external managed switch. For more information on Embedded Switch Technology, see the EtherNet/IP Embedded Switch Technology Application Guide, publication ENET-AP005. (3) Each controller can send a maximum of 32 produced tags to one single consuming controller. If these same tags are sent to multiple consumers, the maximum number is 31.
61
Chapter 4
EtherNet/IP Protocol
This table lists additional specifications for some ControlLogix EtherNet/IP communication modules.
Table 10 - Additional ControlLogix EtherNet/IP Communication Module Specifications
Cat. No. Series Firmware Revision Any 2.x 3.6 or later B 1756-EN2T A 2.x or earlier 3.6 or later B 2.x 3.6 or later C 1756-ENT2TR A 2.x 3.6 or later B 1756-EN2TXT B 2.x 3.6 or later C 1756-EN3TR A 2.56 or later No 15.00 or later 18.00 or later
(1)
RSLogix 5000 Software Version 8.02 or later 15.00 or later 18.00 or later
(1)
Packet Rate Capacity (packets/ Support for second)(2) Extended Environment(4) I/O HMI/MSG 5000 10,000 25,000
(3)
Integrated Motion on EtherNet/IP Axes N/A N/A Up to 4 axes supported(5) Up to 8 axes supported(5)
1756-ENBT 1756-EN2F
Any A
900 3200
No
10,000 25,000(3)
2.51 or later
10,000 25,000(3)
Yes
(1) This version of RSLogix 5000 software is required to use CIP Sync technology, integrated motion on EtherNet/IP features, or Exact Match keying. (2) For more information on Packet Rate Capacity, see Packets Rate Capacity on page 63. (3) The packets rate capacity may change slightly depending on the specific firmware revision your EtherNet/IP communication module is using. For more information, see Packets Rate Capacity on page 63. (4) Module operates in a broad temperature spectrum, -2070 C (-4158 F), and meets ANSI/ISA-S71.04-1985 Class G1, G2 and G3, as well as cULus, Class 1 Div 2, C-Tick, CE, ATEX Zone 2 and SIL 2 requirements for increased protection against salts, corrosives, moisture/condensation, humidity, and fungal growth. (5) This value assumes the use of a 1756-L7x ControlLogix controller. If you are using a 1756-L6x ControlLogix controller, see ControlLogix Controllers User Manual, publication 1756-UM001.
62
EtherNet/IP Protocol
Chapter 4
Beginning with firmware revision 3.x for ControlLogix EtherNet/IP communication modules, packet rate capacity is increased. IMPORTANT Connection size impacts a modules increased packet rate capacity gained with firmware revision 3.x or later. Smaller connections are processed faster than larger connections. Larger connections can affect the increased packet rate capacity obtained with firmware revision 3.x or later. These example applications use larger connections: Applications using rack-optimized connections Applications using integrated motion on EtherNet/IP (only available with modules using firmware revision 3.x or later) Applications containing large produce/consume tag arrays Keep in mind that modules using firmware revision 3.x or later always have greater packet rate capacity than modules using firmware revision 2.x or earlier in the same application. Larger connections only impact how much greater the packet rate capacity is when using firmware revision 3.x or later.
63
Chapter 4
EtherNet/IP Protocol
The RPI is the update rate specified for a particular piece of data on the network. The RPI can be specified for an entire rack (using a rack-optimized connection) or for a particular module (using a direct connection). When adding a module to the I/O configuration of a controller, you must configure the RPI. This value specifies how often to produce the data for that module. For example, if you specify an RPI of 50 ms, every 50 ms the I/O module sends its data to the controller or that the controller sends its data to the I/O module. RPIs are used only for implicit connections, such as produced/consumed tags and I/O. For example, a local EtherNet/IP communication module does not require an RPI because it does not produce data for the system but acts only as a bridge to remote modules. Set the RPI only as fast as needed by the application. The CompactLogix 5370 controllers always attempt to scan an I/O module at the configured RPI rate. For guidelines on setting the RPI for the CompactLogix 5370 controllers, see the CompactLogix 5370 Controllers User Manual, publication 1769-UM021. The RPI also determines the number of packets per second that the module will produce on a connection. Each module has a limit on the total number of implicit packets per second. The total includes the sum of sent and received implicit packets. The packet rate capacity for implicit messages is for implicit only, and neither matches nor includes the explicit packet rate capacity.
64
EtherNet/IP Protocol
Chapter 4
Messaging
The EtherNet/IP network supports both time-critical (implicit) and non timecritical (explicit) message transfer services of CIP. Exchange of time-critical messages is based on the producer/consumer model where a transmitting device produces data on the network and many receiving devices can consume this data simultaneously.
Implicit Messages
Implicit messages are time critical in nature. This includes I/O and produced/ consumed tags. Implicit refers to information (source address, data type, and destination address) which is implied in the message but not contained in the message. Examples of implicit applications include the following: Real-time I/O data Functional safety data Motion control data Implicit messages use the User Datagram Protocol (UDP) and can be unicast or multicast. Implicit messages transport data by using transport class 0/1 (Class 1): The data source/destination is an application object (Assembly object). There is no protocol in the message dataits all I/O data. Data transfer is more efficient because the meaning of the data is known ahead of time. Transfer is initiated on a time basis (cyclic trigger) or requested packet interval (RPI). Connection timing mechanism to alert application that the other side has stopped communicatingno heartbeat. Only connectedthere is no unconnected implicit messaging. An implicit message times out in: controller_multiplier x RPI. The multiplier is selected by the controller firmware so that the timeout is greater than or equal to 100 ms. The minimum multiplier is 4. These are examples: RPI = 2 ms; controller multiplier = 64. The timeout is 128 ms. RPI = 10 ms; controller multiplier = 16. The timeout is 160 ms.
65
Chapter 4
EtherNet/IP Protocol
Explicit Messages
Explicit connections are non-time critical and are request/reply in nature. Executing a MSG instruction or executing a program upload are examples of explicit connections. Explicit refers to basic information (such as source address, data type, or destination address) that is included in every message. Each request is typically directed at a different data item. Examples of explicit applications include the following: HMI RSLinx connections Message (MSG) instructions Program upload/download Explicit messages use the Transmission Control Protocol (TCP). Explicit messages are used for point-to-point, client-server type transactions by using transport class 3 (Class 3): The Server side is bound to the Message Router object (has access to all internal resources) The Client side is bound to a client application object (has a need to generate requests to the Server) Uses an explicit messaging protocol in the data portion of the message packet Can be connected or unconnected
Device #1 Request Application Object Response Explicit Messaging Connection Explicit Messaging Connection Device #2 Request Response Application Object
An explicit message times out in 30 seconds. This is user-changeable in the Message (MSG) instruction structure.
66
EtherNet/IP Protocol
Chapter 4
CIP Safety
CIP Safety is an extension to the application layer that provides a set of highly integrated safety services that leverage the underlying communication stacks of the standard CIP networks to transport data from a source to a destination. CIP Safety is certified to be compliant with the functional safety standard IEC 61508 up to safety integrity level (SIL) 3. The CIP Safety end-to-end protocol gives responsibility to ensuring safety to the end nodesrather than the bridges, routers, or intermediate nodes. CIP Safety cannot prevent communication errors from occurring, but if an error does occur in the transmission of data or in the intermediate router, the end device will detect the failure and take the appropriate action. Since the safety coding and not the underlying communication layers ensure the integrity of the data, the underlying communication layers can be interchanged and intermixed even across subnets. CIP Safety lets you mix standard and safety devices on the same open network.
Stratix
1783-ETAP Camera POINT Guard I/O POINT Guard I/O 1783ETAP Stratix 1738 ArmorPOINT I/O Stratix 1734 POINT I/O 1756 GuardLogix 1794 FLEX I/O 1768 CompactLogix PowerFlex 1783ETAP HMI
67
Chapter 4
EtherNet/IP Protocol
CIP Sync
CIP Sync defines time synchronization services for CIP. Time synchronization on the EtherNet/IP network is a method to synchronize clocks across devices on the network. In a synchronized application, there is a single time master and multiple time slaves. For example, a ControlLogix controller can be configured to act as the time master and other ControlLogix modules, connected via EtherNet/IP communication modules, serve as the time slaves.
You can synchronize the clocks within the following applications: Multiple ControlLogix controllers ControlLogix redundancy systems Real world clocks Personal computer-based events
Time Master
Time Slave
Time Slave
Time Slave
68
EtherNet/IP Protocol
Chapter 4
Typical time synchronized applications include the following: Input time stamping Events and alarms Sequence of Events recording First fault detection Time scheduled outputs Integrated motion on EtherNet/IP drive synchronization Distributed motion control CIP Sync a time synchronization extension to the application layer can help solve these application requirements. CIP Sync is based on the IEEE 1588 (IEC 61588) standardPrecision Clock Synchronization Protocol for Networked Measurement and Control Systems, commonly referred to as the Precision Time Protocol (PTP). The protocol provides a standard mechanism to distribute Coordinated Universal Time (UTC) across a standard Ethernet network of distributed devices. By time stamping in UTC events can easily be compared across time zones without having to be adjusted for the geography in which they were generated. CIP Sync lets users base control on true time synchronization rather than the more limited event synchronization model used historically. Using a 100 Mbps switched Ethernet system, advanced testing shows CIP Sync can deliver time synchronization accuracy of less than 500 ns between devices, meeting the requirements of some of the most demanding real-time applications.
69
Chapter 4
EtherNet/IP Protocol
Integrated motion on an EtherNet/IP network sets the EtherNet/IP networking technology apart from the other industrial Ethernet networks. EtherNet/IP modules with integrated motion on the EtherNet/IP network combine the requirements of deterministic real-time motion control applications with standard unmodified Ethernet that provides full compliance with the Ethernet standards IEEE 802.3 and TCP/IP. This allows the use of standard Ethernet components and infrastructure without the use of special switches or gateways.
Stratix
Camera
Kinetix
Integrated motion on the EtherNet/IP network accomplishes this by encompassing a set of application profiles designed to allow position, speed and torque loops to be set in the drive. With the addition of the CIP Sync technology multiple axes can be coordinated for precise, coordinated motion control applications. Integrated motion on the EtherNet/IP network uses time-stamped data along with its simple timing model to eliminate hard synchronization constraints between the drive and the controller. Real-time data values are adjusted at the end device at the time the data is applied; no need to hard schedule the network traffic. In addition, integrated motion on the EtherNet/IP network has the flexibility to handle different types of drives and time synchronization requirements. The same network connection can be used for both a high performance servo drive with precise synchronization requirements, and a low performance Volts/Hertz drive with no time synchronization capability.
70
EtherNet/IP Protocol
Chapter 4
Connectivity to IT
While IT and controls engineers are often managed separately and given separate job performance goals, those goals are beginning to align because the availability of information is crucially important in both roles. Some companies are beginning to form hybrid groups and hire individuals with experience in both areas to form policies, guidelines, and procedures for design and maintenance of a common network architecture.
IT Network Protect intellectual property and company assets 1. Confidentiality 2. Integrity 3. Availability Converged network of data, voice, and video Strict network authentication and access policies Continues to operate Shut down access to detected threat As soon as possible During uptime Controls Network 24/7 operations High overall equipment effectiveness 1. Availability 2. Integrity 3. Confidentiality Converged network of data, control, information, safety, and motion Strict physical access Simple network device access Could stop operation Potentially keep operating with a detected threat Scheduled During downtime
Types of data traffic Access control Implications of a device failure Threat protection Upgrades
IT Network Industrial Network Level 3 - Site Operations FactoryTalk Application Servers FactoryTalk Services Platform Data Servers
DIO Stratix 8000 Layer 2 Switch HMI DIO Controller Filling Cell/Area Zone Levels 0-2 Ring Topology Device Level Ring Camera Controller Processing Cell/Area Zone Levels 0-2 Ring Topology Resilient Ethernet Protocol (REP)
HMI Controller
HMI
Drive
Drive DIO Material Handling Cell/Area Zone Levels 0-2 Bus/Star Topology
Drive
71
Chapter 4
EtherNet/IP Protocol
Notes:
72
Chapter
This chapter describes how to predict the performance of your EtherNet/IP network-based control system and how to enhance that performance
Topic System Prediction Goals Performance Calculations Example: Predict System Performance Page 74 77 84
IMPORTANT
This chapter explains how to calculate system performance by using data from your system in specific equations. However, you can also use the EtherNet/IP Capacity Tool, an online tool, to predict system performance. The EtherNet/IP Capacity Tool and the IAB Tool are intended to help you in the initial layout of your EtherNet/IP network by calculating resources, for example, connections, packet rate capacity, used by a proposed network. Download the EtherNet/IP Capacity Tool at the Integrated Architecture Tools website: http://www.rockwellautomation.com/solutions/ integratedarchitecture/resources3.html#enetpredict. The EtherNet/IP Capacity Tool calculates a rough estimate of the packet rate capacity. Packet rate capacity varies depending on the specific conditions of each application. For a more detailed analysis of a proposed network, use RSNetWorx for EtherNet/IP software.
73
Chapter 5
You allocate the bandwidth of your EtherNet/IP communication module between two types of messaging.
Messaging Type Explicit messaging Description Explicit messages are connections that do not use an RPI. Some examples of explicit messaging includes: MSG instructions HMI communication RSLogix 5000 software uploads and downloads Implicit messages are connections that use an RPI. Implicit messaging is used for I/O data exchanges, including: Rack-optimized connections(1) Direct connections Produced/consumed tags
Implicit messaging
The performance predictions have two major goals: Determine if the system as a whole has sufficient bandwidth and connections to meet application requirements. Estimate the maximum input or output times for rack-optimized connections, direct connections, and produced/consumed tags.
74
Chapter 5
Part One: Determine If System Has Sufficient Bandwidth to Meet Application Requirements
Part One
Start Step 1: Draw Your System
To determine if your system has sufficient bandwidth to fulfill the requirements of the application, complete the following steps. 1. Draw an overall sketch of your system that includes all of the following: Logix5000 controllers EtherNet/IP communication modules I/O modules All connections to the network Include a description of what the controllers are doing, for example, messaging using produced tags, and any known RPI requirements. 2. Identify and count each type of implicit connection for the system and each EtherNet/IP communication module. 3. Use the formulas provided later in this chapter to calculate the packet rate capacity loading on each EtherNet/IP communication module and the available bandwidth for any unspecified RPIs. 4. Based on the results of these calculations, decide if your system will work. 5. If necessary, modify your system by doing one or more of the following: For ControlLogix EtherNet/IP communication modules, upgrade to newer series and/or firmware revision. For example, the 1756-EN2T/A module, firmware revision 2.x or earlier module supports 10,000 pps. However, the 1756-EN2T/A module, firmware revision 3.6 or later module supports 25,000 pps. Increase some RPIs to allow other RPIs in the system to decrease. Change connection types, for example, direct to rack-optimized. Change I/O module configurations, such as filter times, trigger types. Add EtherNet/IP communication modules. Add Logix controllers. Verify that the network infrastructure can handle the system traffic. TIP We recommend your applications EtherNet/IP links are no more than 60% utilized and QoS is implemented. Typically, these conditions support most EtherNet/IP applications.
Step 3: Calculate
No Step 5
Yes
Part Two
Step 7: Estimate Max Times
Yes
No
Done
Verify that the switches support full-duplex operation and IGMP snooping. Port-mirroring is also important for switch and system diagnostic functions. 6. If you have to make modifications, verify that the modified system will work by recounting the connections and recalculating the packet rate capacity loading.
75
Chapter 5
Part Two: Predict Maximum input or Output Times for CIP Connections
A CIP connection is an efficient communication path used for high performance. The following are basic types of CIP connections: Rack-optimized Data - input or output Produced tag A CIP connection is bi-directional. During every RPI, each end of a connection initiates a packet of information. A packet of information represents a connection. The type of data packet produced by each end of the connection depends on the connection type as described below.
Connection Type Rack-optimized Input data Output data Produced tag Scanner Output data Heartbeat Output data N/A Adapter Input data Input data Output data echo N/A Producer Controller N/A N/A N/A Tag data Consumer Controller N/A N/A N/A Heartbeat
To predict the maximum input (I/O to controller) or output (controller to I/O) times for CIP connections, complete the following steps. 1. Estimate the maximum time intervals for each CIP connection types used in the control system. 2. If necessary, modify your system to get more throughput by performing one or more of the adjustments described under step 5 on page 75. 3. If you have made modifications, verify that the modified system will work by re-counting the connections and re-calculating the packet rate capacity loading.
76
Chapter 5
Performance Calculations
Logix5000 controllers are similar by using packets/second and the number of connections for predicting system performance. However, CompactLogix 5370 controllers use the number of Ethernet nodes to stay within their capacity for the number of connections.
45908
The devices you add directly to the local Ethernet node in the I/O configuration section of your RSLogix 5000 software project are counted toward the 1769-L16ER-BB1B controllers node limitation.
77
Chapter 5
While you can use the EtherNet/IP node count to select a CompactLogix 5370 controller for your network requirements, most applications use three sets of calculations to determine performance: Identify and Count Connections Calculate Packets/Second Estimate Maximum Input or Output Times for CIP Connections
1756-L73
1756-EN2T
1756-L73
1756-EN2T
You also can use the EtherNet/IP Capacity Tool described on page 63 to make performance predictions.
78 Rockwell Automation Publication ENET-RM002B-EN-P - April 2012
Chapter 5
IMPORTANT
The table above is used to calculate connections used by an EtherNet/IP communication module. To calculate connections used on a Logix5000 controller, see Logix5000 Controllers Produced and Consumed Tags Programming Manual, publication 1756-PM011.
Use this table to count the connections for the EtherNet/IP communication module in the example system shown on page 78.
Communication Module Local 1756-EN2T communication module Connection Type Produced tag between controllers Total 1 (Number of consumers) Rack-optimized connections to digital I/O modules Direct connections to analog I/O modules 1x1=1 (Number of chassis to which a rack-optimized connection is made x Number of rackoptimized connections made to the chassis) 2x1=2 (Number of remote analog modules to which a direction connection is made x Number of connections per remote analog module) 1 (Number of tags consumed) 1x1=1 (Number of chassis to which a rack-optimized connection is made x Number of rackoptimized connections made to the chassis) 2 x 1= 2 (Number of remote analog modules to which a direction connection is made x Number of connections per remote analog module)
Consumed tag between controllers Rack-optimized connections to digital I/O modules Direct connections to analog I/O modules
Each 1756-EN2T communication module in the example system uses four connections.
79
Chapter 5
Calculate Packets/Second
All EtherNet/IP communication modules have a packet rate capacity, that is, maximum number of packets/second it can send. You must calculate the number of packets/second that each EtherNet/IP communication module in the control system is sending when predicting system performance. The number of packets/second an EtherNet/IP communication module sends in a control system depends on the number of each CIP connection type being sent and the RPI for that connection.
CIP Connection Type(1) Produced/consumed tags(2) Packets/Second Calculation Method At producer: (1 + number of connections)/RPI for each produced tag At consumer: 2/RPI for each consumed tag Rack-optimized connection Direct connection (2 x number of connections)/RPI (2 x number of connections)/RPI
(1) This method applies when application conditions are configured such that the heartbeat connection RPI equals the produced tag RPI. With RSLogix 5000 software, version 16 and later, the heartbeat RPI can be configured to a value different from the produced tag RPI. This option decreases the bandwidth utilization on resources, such as the EtherNet/IP communication module or controller. For more information see Knowledge For more information, see Rockwell Automation Knowledgebase article # 38535. You can access the Knowledgebase at http://www.rockwellautomation.com/knowledgebase/. (2) Producer and all consumers are in different chassis and operate at a uniform RPI.
For each EtherNet/IP communication module, the total is the sum of the above calculations. This total should not exceed the recommended 90% limit. We recommend you allocate bandwidth as follows: Reserve 10% of each EtherNet/IP communication modules packet rate capacity to allow for processing of explicit messages. IMPORTANT If you do not reserve at least 10% of each EtherNet/IP communication modules bandwidth, you might not be able to go online with RSLogix 5000 software or be able to access the EtherNet/IP communication modules embedded web server. To remedy this situation, remove the EtherNet/IP communication modules from one or more chassis to reduce the EtherNet/IP network traffic in the overloaded EtherNet/IP communication modules. Then go online with RSLogix 5000 software to reconfigure the RPIs to a less frequent (slower) rate.
The total for implicit messaging should not exceed 90% of capacity for each EtherNet/IP communication module.
80
Chapter 5
Use this table to count the total packets/second sent for each EtherNet/IP communication module in the example system shown on page 78.
Communication Module Local 1756-EN2T communication module Connection Type Produced tag between controllers Rack-optimized connections Direct connections Packets/Second (1 + 1)/20ms = 100 (2 x 1)/20ms = 100 (2 x 2)/50ms = 80 Module total packets/second = 280(1) Remote 1756-EN2T communication module Consumed tag between controllers Rack-optimized connections Direct connections 2/20ms = 100 (2 x 1)/20ms = 100 (2 x 2)/50ms = 80 Module total packets/second = 280(1)
(1) A 1756-EN2T/ A module, firmware revision 2.003 has a packet rate capacity = 10000 packets/second. When sending 280 packets/second, the module in the example system uses approximately 3% of its packet rate capacity, well below the recommended maximum of 90% of the modules packet rate capacity.
In addition to the configurable RPI parameter, you control system includes the Actual Packet Interval (API). The API is the actual time that requested data is delivered. The relationship between the RPI and API in your system depends on the controller initiating the communication. In general, these controller types calculate the API as follows: ControlLogix: API = RPI 1768 CompactLogix: API = RPI CompactLogix 5370 controllers, SoftLogix: API = RPI 1769-L23Ex, 1769-L3xE: API = 2n (where 2n is a value that is a power of 2, for example, 2, 4, or 8, that is equal to or faster than the RPI you configured) IMPORTANT In most cases, you can get data faster than the RPI you configured. This increased data transmission rate can increase the number of packets to be more than you expected based on the RPI. Therefore, the percentage of the EtherNet/IP communication modules packet rate capacity used may be slightly higher than expected.
81
Chapter 5
Example One
A 1756-EN2T module, firmware revision 3.6 or later, supports 25,000 pps. If there are only 40 connections that are all at the same RPI, the fastest RPI is the following: RPI(Fastest) = (2 x 40)/25,000 = 3.2 ms
Example Two
Assume there are 23 connections already running at an RPI of 2 ms on a 1756EN2T module, firmware revision 3.6 or later, that supports 25,000 pps. These connections are already using some of the communication packets: pps = (2 x 23)/0.002 = 23,000 pps The fastest RPI possible for a fourth connection is the following: RPI(Fastest) for 4th connection = (2 x 1)/(25,000-23,000) = 1 ms The same concept can be used for produced tags and consumed tags by replacing the (2 x connections) with (1 + connections) for produced tags or (2/RPI) for consumed tags.
82
Chapter 5
83
Chapter 5
This example ControlLogix system has the following components: IMPORTANT The information in the remainder of this section shows how to compute system performance by using ControlLogix controllers.
1756-L73 controller in chassis 1 that executes these tasks: Produces a tag that 1756-L73 controllers, in chassis 2 and 3 respectively, consume at an RPI = 20 ms Controls remote I/O in chassis 48 1756-L73 controllers in chassis 2 and 3 consuming a tag from the controller in chassis 1 Eight 1756-EN2T/A communication modules, firmware revision 2.003, one module in each chassis 15 digital I/O modules using rack-optimized connections at RPI = 20 ms, 3 modules in each chassis 48 Fifteen analog I/O modules, across five remote chassis, using direct connections at an RPI = 50 ms, three modules in each chassis 48 PanelView Plus terminal with a direct connection to an array of 40 tags at an RPI = 100 ms and an explicit connection to an array of 100 tags sent every 300 ms Workstation running FactoryTalk View SE software, requiring explicit messaging of an array of 1500 tags every 100 ms. This workstation also connects to the company Intranet
84
Chapter 5
Chassis 4 1756-EN2T Module 4 Three Analog I/O Modules Three Digital I/O Modules
Chassis 5 1756-EN2T Module 5 Three Analog I/O Modules Three Digital I/O Modules
Chassis 6 1756-EN2T Module 6 Three Analog I/O Modules Three Digital I/O Modules
Chassis 7 1756-EN2T Module 7 Three Analog I/O Modules Three Digital I/O Modules
Chassis 8 1756-EN2T Module 8 Three Analog I/O Modules Three Digital I/O Modules
IMPORTANT: Each chassis with three analog and three digital I/O modules, that is, chassis 48, uses these connections: Three direct connections (one for each analog I/O module in the chassis) One rack connection (one for all digital I/O modules in the chassis)
85
Chapter 5
Explicit Messaging
The RSView and PanelView Plus messages are explicit messages. Reserve 10% of the bandwidth of the EtherNet/IP communication module for explicit messaging.
EtherNet/IP Interface 1756-ENBT 1756-EN2F 1756-EN2T 1756-EN2TR 1756-EN2TXT 1756-EN3TR Total Bandwidth 5000 pps The pps for these modules depends on the modules series and firmware revision. The modules support this pps: Series A, firmware revision 2.x or earlier = 10,000 pps Series A or later, firmware revision 3.6 or later= 25,000 pps For more information on the pps supported by these modules, see Table 8 on page 60. 5000 pps 2000 pps 4000 pps 6000 pps 10% Reserve for Explicit Messaging 500 pps One of the following: Series A, firmware revision 2.x or earlier = 1000 pps Series A or later, firmware revision 3.6 or later= 2500 pps
1768-ENBT 1769-L23Ex 1769-L32E 1769-L35E 1769-L30ER 1769-L30ERM 1769-L30ER-NSE 1769-L33ER 1769-L33ERM 1769-L36ERM 1769-L24ER-QB1B 1769-L24ER-QBFC1B 1769-L27ERM-QBFC1B 1769-L16ER-BB1B 1769-L18ER-BB1B 1769-L18ERM-BB1B 1788-ENBT 1734-AENT 1794-AENT
Explicit messaging throughput is also dependent upon network availability and target availability. Therefore, reserving 10% of the total bandwidth does not guarantee throughput. Next determine if each EtherNet/IP communication module has enough bandwidth to handle the implicit messaging.
86
Chapter 5
EtherNet/IP module 1, in the chassis with the main controller, must perform these tasks: Communicate with five remote I/O chassis. The EtherNet/IP module connects to the I/O modules in each chassis this way: One rack-optimized connection to digital I/O modules at an RPI = 20 ms Three direct connections to three analog I/O modules at an RPI = 50 ms Communicate with the PanelView Plus terminal via direct connections at an RPI = 100 ms Communicate with the two other controllers by using a produced tag at an RPI = 20 ms Perform explicit messaging
87
Chapter 5
Fill in the worksheet for this module as follows. EtherNet/IP Module ID: 1 Rack-optimized Connections 5 @ 20 ms (for digital I/O modules) = (2 x connections)/RPI = (2 x 5)/ 20 ms = Direct Connections 15 @ 50 ms (for analog I/O modules) = (2 x connections)/RPI = (2 x 15)/ 50 ms = Produced Tag Connections 2 @ 20 ms = (1 + connections)/RPI for each produced tag = (1 + 2)/ 20 ms = Consumed Tags 0 = 2/RPI for each consumed tag = Total Packets Per Second N/A 1250 150 600 500
The total of 1250 is well within the 1756-EN2T/A modules, firmware revision 2.003, remaining bandwidth of 9000 pps. The total of 22 CIP connections is well within the 1756-EN2T/ A modules, firmware revision 2.003, capacity of 256 CIP connections.
88
Chapter 5
1756-EN2T Module 4
1756-EN2T Module 5
1756-EN2T Module 6
1756-EN2T Module 7
1756-EN2T Module 8
Each EtherNet/IP module functioning as an adapter in an I/O chassis, that is, 1756-EN2T EtherNet/IP communication modules 48 in the example on page 85, has these connections: One rack-optimized connection for digital I/O modules in its chassis. The digital I/O has a required RPI = 20 ms Three direct connections for analog I/O modules in its chassis. The analog I/O has a required RPI of 50 ms.
89
Chapter 5
For example, use the worksheet in Appendix A for each of the five EtherNet/IP modules as follows. EtherNet/IP Module ID: 4 - 8 Rack-optimized Connections 1 @ 20 ms = (2 x connections)/RPI = (2 x 1)/ 20 ms = Direct Connections 3 @ 50 ms = (2 x connections)/RPI = (2 x 3)/ 50 ms = Produced Tag Connections 0 = (1 + connections)/RPI for each produced tag = Consumed Tags 0 = 2/RPI for each consumed tag = Total Packets Per Second N/A 220 N/A 120 100
The total pps of 220 is well within the 1756-EN2T/A modules, firmware revision 2.003, remaining bandwidth of 9000 pps.
90
Chapter 5
Each of these controllers consumes one produced tag at an RPI = 20 ms. Either of these EtherNet/IP modules uses these connections. EtherNet/IP Module ID: 2 or 3 Produced Tag Connections 0 = (1 + connections)/RPI for each produced tag = Consumed Tags 1 tag @ 20 ms = 2/RPI for each consumed tag = 2/20 ms = Total Packets Per Second 100 100 N/A
The total of 100 pps is well within the 1756-EN2T/A modules, firmware revision 2.003, remaining bandwidth of 9000 pps.
91
Chapter 5
92
Chapter 5
Refine Estimates
To further increase the accuracy of these times, include considerations for system delays. For a Rack-optimized Connection, to the RPI, add these delays: TMAX (Rack-optimized) = input filter + RPI + transmission + switch + queue See the table for descriptions of delay types with a rack-optimized connection.
Type of Delay Input Filter Description Discrete input modules have filters. The default for a 1756 discrete I/O module is 1 ms. For The default for a FLEX discrete I/O module is 0.25 ms. input delay = 1 ms There are no filters for outputs, so there is no additional delay for outputs. Outputs are always sent using an RPI timer. The transmission delay is the interval of time that it takes a packet to be transmitted at a specific bit rate, for example, 100 Mbps. For example, in a 7-slot ControlLogix chassis, the size of the entire packet is approximately 122 bytes (including header, all protocols, all data, and CRC). At 100 Mbps, this packet takes approximately 10 microseconds. (0.01 ms) on the wire. transmission delay = 0.01 ms x (number of CIP connections) Switch latency is the delay between reception of the first bit and transmission of the first bit. This delay depends on the type of switch. It is typically 0.1 ms. switch delay = 0.1 ms Input data is sent from the remote rack (adapter), through a switch, through a communication module in the controller rack, and finally to a controller (scanner). If two or more input CIP connections are simultaneously ready to be transmitted, they must be transmitted sequentially. It takes 0.2 ms for a 1756-ENBT to process 1 implicit packet. Note that 0.2 ms is equal to the reciprocal of 5000 (pps). The total queue delay is 0.2ms times the number of CIP connections through the module. queue delay = 0.2 ms X (number of CIP connections)
Transmissions
Switch
Queue
For the Direct Connect Analog Modules, you add the same transmission, switch, and queue delays as for rack-optimized data: TMAX (Analog Non-Isolated)= 2RTS + transmission + switch + queue For a Produced or Consumed Tag , you add the same transmission, switch, and queue delays as for rack-optimized data: TMAX (Produced/Consumed Tag)= 1RPI + transmission + switch + queue
93
Chapter 5
Notes:
94
Index
A
address dynamic secure MAC 50 gateway 15 gateway default 15 resolution protocol (ARP) 33 static secure MAC 50 application bandwidth 75, 84 ARP definition 33 autonegotiation 27 connections 53 calculate CIP delays 93 calculate CIP times 92 CIP 57 direct 57 predict CIP times 76, 83 rack-optimized 57 TCP 56 connectivity 71 consumed tags 90 consumer 55 converters media 24 count connections 79 EtherNet/IP nodes 59
B
bandwidth 75, 84 determination 75 explicit message 86 bridge media 24 network communication 18 broadcast 30
D
default gateway address 15 definition CIP 12 delay times 93 determining bandwidth 75 device commissioning 52 -level ring definition 47 topology 21 direct connections 57 DLR definition 47 topology 21 DNS definition 34 domain name system (DNS) 34 dynamic secure MAC address 50
C
calculate packets per second 80 packets/second 80 system performance 77 capacity packet rate 63 tool 63 CIP connections 57 calculate delays 93 calculate times 92 maximum 76 predict times 76, 83 types 58 definition 12 safety 67 sync 68 client and server 55 commissioning device 52 communication module specifications 62 network bridge 18 components Ethernet infrastructure 19 switches 26 configuration requirements 13
E
equations 77 estimate RPI 82 times for CIP connections 83 EtherChannel protocol 43 Ethernet infrastructure 19 media 22 topologies 19
95
Index
EtherNet/IP network adapters 89 capacity tool 63 communication modules 17 definition 11 integrated motion 70 module features 60 node count 59 overview 11 protocol 53 scanners 87 specifications 60 example achieve more throughput 91 calculate times for CIP connections 92 consumed tags 90 delay times for CIP connections 93 determine bandwidth 85 RSLinx communication software bridging 18 system performance 84 explicit connections 58 messages 66 messaging 74, 86 messaging bandwidth 86
infrastructure Ethernet 19 features 29 integrated motion 70 internet group management protocol 49 IP address format 13 node 13 overview 13
L
linear -embedded switch topology 21 -switch topology 20
M
MAC ID 50 managed switches 27 mask subnet 16 media bridge 24 converters 24 Ethernet 22 hubs 23 repeaters 23 routers 25 switches 26 messages explicit 66, 74, 86 implicit 65, 74 types 57 mode full-duplex 28 half-duplex 28 motion integrated 70 multicast 30 address limit 33
F
firmware revision upgrade 64 flex links protocol 44 format IP address 13 frames 32 full-duplex mode 28
G
gateway 15 address 15 default address 15 guidelines 39 VLANs, segmentation 39
H
half-duplex mode 28 hubs multiport repeaters 23 NAT
N
definition 36 network address translation (NAT) 36 bridge 18 convergence 41 protocols 12 specifications 60 node count guidelines 59 EtherNet/IP network 59 IP addess 13
I
IGMP 49 implicit connections 57 messages 65 messaging 74
96
Index
O
overview EtherNet/IP network 11
S
safety CIP 67 security port 50 violations 51 segmentation 37 service quality 40 spanning tree protocol 42 specifications EtherNet/IP network 60 star topology 19 static secure MAC address 50 subnet mask 16 switches managed 27 media 26 unmanaged 27 sync CIP 68 system performance 73 achieve more throughput 91 calculate delays for CIP connections 93 calculate packets/second 80 calculate times for CIP connections 92 calculations 77 determine bandwidth 75 example 84 fastest RPI 82 predict times for CIP connections 76, 83
P
packets calculation 80 rate capacity 63 transmission 30 performance calculations 77 system 73 port security 50 produce and consume 55 tags number of multicast 61 producer 55 protocols network 12 transmission 33
Q
Qos 40 quality of service (Qos) 40
R
rack-optimized connections 57 rapid STP 42 redundant star topology 20 REP 45 repeaters media 23 requested packet interval 64 requirements configuration 13 reserve explicit messaging 86 resiliency 41 Ethernet protocol 45 protocols 41 ring-switch based topology 20 routers media 25 RPI calculation 82 RPI times 82 RSLinx communication software bridging 18
T
tags produced and consumed 61 TCP connections 56 terminology 55 throughput switches 26 topologies device-level ring 21 Ethernet 19 linear-embedded switch 21 linear-switch 20 redundant star 20 ring-switch based 20 star 19 transmission packets 30 protocols 33 transports 56 trunking VLAN 39
97
Index
U
UCMM 56 messages 56 unicast 30 default settings 31 unmanaged switches 27
V
violations security 51 virtual LAN 37 VLAN 38, 39 trunking 39
98
Installation Assistance
If you experience a problem within the first 24 hours of installation, review the information that is contained in this manual. You can contact Customer Support for initial help in getting your product up and running.
United States or Canada Outside United States or Canada 1.440.646.3434 Use the Worldwide Locator at http://www.rockwellautomation.com/support/americas/phone_en.html, or contact your local Rockwell Automation representative.
Documentation Feedback
Your comments will help us serve your documentation needs better. If you have any suggestions on how to improve this document, complete this form, publication RA-DU002, available at http://www.rockwellautomation.com/literature/.
Rockwell Otomasyon Ticaret A .., Kar Plaza Merkezi E Blok Kat:6 34752 erenky, stanbul, Tel: +90 (216) 5698400