Академический Документы
Профессиональный Документы
Культура Документы
Bryan Suitor
Michael Trinca
Improving the understanding of Architectures
Confidential Property of Schneider Electric
Why this workshop?
There is a cost .
• We require a better understanding of the offer
• We need a higher level of network understanding
The intent of this workshop is to explain the underlying communication protocols and Schneider
recommendations to help achieve a better success rate for implementation.
Summary
References
Exercises
Effectively the CPU has been allocated two IP addresses on the same subnet.
• For communications to the CPU target the CPU IP primary address.
• It is possible to use the ERIO / EDIO address to talk to the CPU.
• Both IP addresses are on the same subnet.
These are the one switch not separate ethernet switches.
To support a different subnet use a separate ethernet module.
• When we wish to talk directly to the controlling PLC we use the Primary address.
• To access the standby device we use the Standby address (primary address +1)
• These addresses swap when the primary CPU goes into standby mode.
• The peer device ie. SCADA or PLC uses the one address for the primary PLC.
• To manage the ERIO and maintain the 50ms recovery time we create a CPU A address and a CPU B
address (determined by the switch settings on the CPU).
• These addresses remain with the CPU module irrespective of its controlling status.
• Access to the CPU A & CPU B can be made by these IP addresses, however we are not aware until we
connect and interrogate the HSBY DDDT which is primary.
Summary
References
Exercises
• NOTE. Unity Pro enforces these limitations only at the PLC system level, so the designer needs to manage enforcement globally across
the shared network.
• Shared RIO system will maintain 50 ms recovery time if rules are followed
• Use different device IDs for every CRA across the shared network. DHCP/FDR will not work properly if two PAC systems try to
communicate with the same CRA.
• Use unique IP addresses for all of the devices on the shared network. Some auto-numbering takes place so check addresses across all
the systems to verify that there are no address conflicts
• Set the RSTP–CRP bridge priority to Root on one CPU and to Participant on all others. The redundancy status bit in the CPU DDT is
valid only for the system with its bridge priority designated Root.
These limits still hold on a shared network architecture, but Unity Pro calculates bandwidth only at the individual PAC system level. We need
to know that all the systems on the shared ring comply.
To test the compliance of a potential shared network system, we propose the following:
1. In Unity Pro, configure one Hot Standby system that contains all the drops and all the EDIO used across all PLC systems in a
single Unity Pro project. Place EDIO devices on a BMENOC03x1 device.
2. If Unity Pro builds the system successfully, we can be confident that the shared ring system will be within bandwidth limits.
3. After the HSBY system-build completes successfully, the designer can move the various drops to the other systems on the shared
network.
Summary
References
Considerations:
• the number of PACs to
share the data,
• the volume of data,
• the frequency of the data
transfer,
• the host system standalone
or hot standby
• when are changes to be
made to system – ie.
Online changes
Confidential Property of Schneider Electric | Page 25
Communication Options
Implicit communications
Global Data: Ethernet IP: Modbus TCPIP:
• Suitable for when data exchanges • Suitable for applications with • Suitable for applications with
less than 513 words fewer PACs and larger volumes many PACs and larger volumes
• Suitable for same data is to be of data. of data.
shared by multiple devices (max • Suitable for third party peer to • Suitable for communicating
64) peer communications eg. different data to multiple PACs.
• Cannot be used in hot standby Rockwell PAC where M580 is • Suitable for third party peer to
systems adaptor. peer communications eg.
• Restricted to Unity PLCs, M580, • The data being shared can vary Modbus TCPIP interface.
M340, Quantum, Premium between PACs. • Suitable for single small
• Specific BMXNGD0100 module • Good for when the data sizes exchanges
are fixed. • Good for exchanges where
individual data sizes vary
These options require stopping the PAC to make changes to the data exchange.
• Use specific DTMs for each Adaptor, sizes of assembly must match at both Adaptor and Scanner
• Repetition rate 5 – 65535 ms, nominal period between two successive Adaptor unicasts
• Maximum 505 bytes input assembly & 509 bytes output assembly ENIP Message (size 512 bytes).
• A new connection for each assembly, IGMP filtering is recommended on all network switches
• Once a configuration is implemented by DTM you must read and write the total data structure you
cannot perform a partial data extraction.
• Maximum payload per module
• BMENOC0301, BMENOC0311 3.8 kwords input / 3.8 kw output – 16 adaptor instances
• BMENOC0321 – 1.8 kw input 1.8 kw output - 12 adaptor instances
• BMEP58*020 – 2048 w input 2048 words output – 3 adaptor instances
• BMEP58*040 – 1024 w input 1024 words output – 3 adaptor instances
Confidential Property of Schneider Electric | Page 29
What is Global Data?
Key Points
• Real time publish Subscribe protocol (RTPS)
• Uses IP Multicast technology IP address
group range 224.0.0.0 to 239.255.255.255
• Optimum performance when used with
switches configured with GMRP protocol.
• Group size 64 participants
• Maximum subscription is 2048 words per
participant
• Publish 1 variable maximum size 512 words
• Distribution period 10ms to 15000ms in 10ms
increments
• This offer is more for legacy sites upgrading
to M580
Confidential Property of Schneider Electric | Page 30
What are Explicit communications?
Key Points
• Focus on Modbus
• Each communication function block is queued and sent at the end of the scan. Maximum
execution rate is equal to the scan time of the CPU.
• Read operation (FC 3) 125 words maximum, Write operation (FC 16) 123 words maximum
• Fine details:
1. Client Actions
– Maximum EF blocks active per scan for the CPU is based on the module client connection capacity.
– Maximum number of 20 client unique device (single IP) connections available per scan.
– Several EF blocks (up to client capacity maximum) can be active if they target an IP address which has a
connection.
2. Server Response.
– Must also consider the ability of the server to respond
– %SW90 is used to increase the number of server connections acted upon in one scan
Summary
References
EDIO device #7
10 ERIO Drops
4 Hops to ERIO device #4
…
ERIO device #4
…
What are the limitations for Implicit communications?
Answers
Summary
References
Exercises
Summary
References
Summary
References
Exercises
Exercise 2.5
Wireshark – IO graph details
This tool is used to display the traffic in
graphical form. Selection of the tool and a
typical screen with filters defined are shown
below.
For testing purposes, the settings shown in
Figure 13 are worth noting.
•Apply filters as mentioned in previous
pages.
•Set the display interval to 100ms – longer
time intervals provide an overview of activity
but mask finer spike activity.
•Use the mouse zoom function to investigate
disturbances.
•Use Shift Y / Y to adjust the scale resolution
and up / down or left right arrows to centre
the graph.
● This is the reason to ensure you do not connect EDIO to the ERIO network..
Confidential property of Schneider Electric 54
Exercise 2.7
7. Setting a unique identifier for CRA modules.
When sharing:
● the same ERIO network amongst two or more CPUs, or
● connecting the service port or the CPU to another CPU.
the “network identifier” must be unique for each BM*CRA312*0 module.
●To do this: 1. Open the Ethernet network, 2. Modify the extension number to a unique value in this case 009.
● 1.3 – NOR, NOP support Modbus TCPIP, NGD module does not support Modbus TCP/IP
● 1.5 – You cannot disable the CPU backplane port
● 1.7 – you should be able to ping the NOC module in slot 5 even if it is on a different subnet.
● 2.5 - 62ms mast task process update from CRA to CPU, 10ms update from Safe IO to CPU
● 2.5 - 62ms mast task process update from CPU to CRA, 22ms update from SAFE CPU to CRA
● 2.6 - we will not see any ENIP traffic on the control ports as the traffic is tagged to VLAN1 and the
wireshark is unable to pick this up.