Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Version: 1
2004, TAC
All Rights Reserved
No part of this publication may be reproduced, read or stored in a retrieval system, or transmitted, in
any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without
prior written permission of TAC.
Produced in the United States of America.
Infinity is a trademark of TAC. All other trademarks are the property of their respective owners.
Continuum Networking Essentials
January, 2004
TAC Part Number: 31-3001-763 Version: 1
The information in this document is furnished for informational purposes only, is subject to change
without notice, and should not be construed as a commitment by TAC. TAC assumes no liability for
any errors or inaccuracies that may appear in this document.
TAC
1 High Street
N. Andover, MA 01845
(978) 470-0555
fax: (978) 975-9797
www.tac.com
Content
Ch 01: Introduction to Networking
Ch 02: BACnet Basics
Ch 03: Ethernet
Ch 04: TCP/IP
Ch 05: Continuum IP
Ch 06: BACnet IP
Ch 07: RS-485
Ch 08: Infinet
Ch 09: Continuum IO Bus
Ch 10: MS/TP
TAC
Networking Essentials
Ch 1
Introduction to
Networking
Contents
Introduction
Data Communications
LANs
Hardware
Cables & Connectors
Full / Half Duplex
Drivers / Receivers / Transceiver
Base / Broad Band
Repeaters / Hubs
Topologies
Propagation Delay
OSI Model
Seven Layers
1-2
Introduction to Networking
Introduction
Data Communications
The need for data communications is important to any technology that utilizes
distributed computer systems that need to share information.
Data is stored within a computer as a series of electrical signals that represent one of
two possible states, referred to as binary digits or bits.
A conversion between how the computer represents the data and how the data needs
to be represented for successful transmission is always needed. This is due to the fact
that the characteristics and requirements of a computer's internal data representation
and communications differ from that required for computer-to-computer
communications.
There are two methods in which data can be transmitted:
Parallel
Serial
Parallel:
Parallel communications is when data is distributed via multi-conductor paths. It is
used internal to computers and also within short distances such as to a local printer
through a computers parallel port.
The number of wires in the path are usually equal to at least the number of bits that
the computer can manipulate at one time (often called word size).
For example, bit one is communicated via conductor one, bit two via conductor two,
etc.
TAC
1-3
Introduction
Data Communications
Serial:
Serial communications is when data is distributed over longer distances such as a
LAN and is placed on the media one bit at a time.
The physical cabling over which data is transferred is called the communications
media.
Typical communications media types are:
Coaxial cable
Wire pairs are inherently noise immune if twisted or in a coaxial form. Parallel Word
Bits are placed on the medium one at a time in a serial fashion. The device that
performs this task is called a serial interface.
A serial interface also needs to perform some other important tasks:
1. Convert the rate at which the computer internally transmits bits to that
compatible with the medium.
2. Convert the bits into signals compatible with the medium.
3. Signal the receiving computer so that it is prepared to receive the data.
1-4
Introduction to Networking
Introduction
Data Communications
Serial:
The effective operation of an Energy Management and Control System (EMCS)
depends on the ability of the various system components to communicate with one
another rapidly and reliably.
As the number of sensors and control points increases:
TAC
1-5
Introduction
Data Communications
Serial:
The types of tasks usually involved in the layers of a communication's architecture
include:
Segmentation - Breaking blocks of data into pieces that can be handled by the
communications system
The specific approaches chosen to perform the above tasks, along with the physical
media used and the application services provided, defines the system's
communications protocol.
These tasks have the goal of reliably encoding application data and services to bits
that can be communicated over the media and decoded so that the receiver gets the
message intended.
The more thoroughly the above tasks are handled, the more of the system's bandwidth
is taken up in the form of overhead with a commensurate reduction in the throughput
of data. Therefore no one communications protocol can meet all communications
needs.
The layered architecture approach to a protocol can provide choices at each layer to
allow the protocol to meet different needs.
1-6
Introduction to Networking
Introduction
LANs
A local area network (LAN) is a group of computers and associated devices that share
a common communications line or wireless link and typically share the resources of a
single processor or server within a small geographic area (for example, within an
office building).
Usually, the server has applications and data storage that are shared in common by
multiple computer users. A local area network may serve as few as two or three users
(for example, in a home network) or as many as thousands of users (for example, in
an FDDI network).
The main local area network technologies are:
Ethernet
Token Ring
ARCNET
FDDI (Fiber Distributed Data Interface)
Security System
All devices on a LAN share the transmission path, meaning that only one device can
be transmitting information at a time. If two or more devices transmit
simultaneously, the electrical signals will collide and destroy the data contents.
TAC
1-7
Hardware
Cables & Connectors
There are three basic cable types used in Ethernet networking:
1. Twisted Pair
- Shielded
- Unsheilded
2. Coaxial
- Thinnet
- Thicknet
3. Fiber Optic
Twisted Pair
Twisted Pair cable use pairs of wires that are twisted around one another. Each pair
consists of two insulated copper wires twisted together. The wire pairs are twisted
because it helps reduce cross-talk and noise susceptibility.
High quality twisted pair cables have about 1 to 3 twists per inch. For best results,
the twist rate should vary significantly between pairs in a cable.
1-8
Introduction to Networking
Hardware
Cables & Connectors
Shielded Twisted Pair (STP)
Twisted pair cable that contains a foil shield along with a shield (drain) wire.
The shielded wire (drain wire) must be grounded on one end only.
The shielding is designed to minimize EMI radiation and susceptibility to crosstalk.
Foil Shield
Drain Wire
TAC
1-9
Hardware
Cables & Connectors
RJ-45 Connector
An RJ-45 connector has 8-pins, and may also be referred to as an "8-pin Modular
Connector".
A male RJ-45 plug is mounted on each end of Twisted Pair cable.
A female RJ-45 jack or "receptacle" is integrated into an Ethernet Hub or
Network Interface Card (NIC).
Twisted Pair cable
RJ-45
plug
RJ-45 Connector
D Style Connectors
These connectors are available in different sizes and pin-outs, which can be used
with Unshielded Twisted Pair cable.
1-10
Introduction to Networking
Hardware
Cables & Connectors
Proprietary Connectors
A plug-in screw terminal type connector used with Shielded Twisted Pair cable.
They are available in different sizes.
TAC
1-11
Hardware
Cables & Connectors
Coaxial Cable
Coaxial cable is a type of cable in which a solid center conductor is surrounded by
an insulating spacer, which in turn is surrounded by a tubular outer conductor
(usually a braid, foil or both). The entire assembly is then covered with an
insulating and protective outer layer.
Coaxial cables have a wide bandwidth and are capable of carrying many data,
voice, and video conversations simultaneously.
The characteristics of a coaxial cable are:
BNC Connector
A British Naval Connectors (BNC), used with Thinnet cabling.
1-12
Introduction to Networking
Hardware
Cables & Connectors
Fiber Optic Cable
Fiber optic cabling is a technology where electrical signals are converted into
optical signals, transmitted through a thin glass fiber, and re-converted into
electrical signals.
Fiber optic cable is constructed of 3 concentric layers:
1. The core is the central region of an optical fiber through which light is
transmitted.
2. The cladding is the material in the middle layer. It has a lower index of
refraction than the core, which serves to confine the light to the core.
3. An outer "protective layer", or buffer, serves to protect the core and
cladding from damage.
TAC
1-13
Hardware
Cables & Connectors
Fiber Optic Cable cont
Multi-mode Fiber
Multi-mode fiber optic cable allows many "modes", or paths, of light to propagate
down the fiber optic path.
The relatively large core of a multi-mode fiber allows good coupling from
inexpensive LEDs light sources, and the use of inexpensive couplers and
connector.
Two types of multi-mode fiber exist with a refractive index that may be graded or
stepped:
With graded index fiber the index of refraction of the core is lower
toward the outside of the core and progressively increases toward the
center of the core, thereby reducing modal dispersion of the signal.
With stepped index fiber the core is of uniform refractive index with a
sharp decrease in the index of refraction at the core-cladding interface.
Stepped index multi-mode fibers generally have lower bandwidths than
graded index multi-mode fibers.
1-14
Introduction to Networking
Hardware
Cables & Connectors
Fiber Optic Cable cont
Multi-mode Fiber cont
You can use three types of fiber optic cable for data communications. The
diameter of the core and the diameter of the cladding define each type:
62.5/125 microns
50/125 microns
100/140 microns
62.5/125 Fiber:
The basis of all specified distance limits that are published for Infinity
fiber optic networks
ST Style
TAC
SMA Style
1-15
Hardware
Cables & Connectors
Fiber Optic Budget
Every fiber optic communications device has an associated fiber budget.
A fiber budget is the total amount of signal loss (light) that can occur between the
transmitter and the receiver.
Fiber Optic signal loss (light) is measured in decibels (dB).
Note:
The recommended 62.5/125 fiber optic cable functions properly with up to 10 dB
of signal loss. If this limit is exceeded, Andover Controls cannot guarantee
proper operation.
In general, fiber budgets for Fiber Optic Communication Devices range between
10-12 dB of signal loss.
Each subsequent connection increases the amount of light loss.
1-16
Introduction to Networking
Hardware
Half & Full Duplex
The term Duplex means that communications can travel in two directions (to and
from).
Simplex means that communications can travel in only one direction. A TV
transmission is considered as simplex communications, where the signal is traveling
in only one direction.
Half Duplex
Half Duplex is communications in both directions, but only one direction at a time.
A conversation between two people is considered to be Half Duplex communications,
where person 1 would talk and person 2 would listen and then person 2 talks while
person 1 listens.
Full Duplex
Full Duplex is communications in both directions and both directions can happen at
the same time.
Note: Some communication types support Full Duplex, others support Half
Duplex and some can utilize both types.
TAC
1-17
Hardware
Drivers / Receivers / Transceivers
The driver puts the signal on the wire and the receiver takes the signal off of the wire.
Both are doing a conversion from whatever signaling method is used on the wire to a
digital logic level that can be interoperated by the microprocessor.
Some communication systems use Drivers and Receivers and others use Transceivers,
one placed at each end.
Drivers, Receivers and Transceivers are hardware level devices (layer 1 of the OSI
model) independent of what type of protocol is being used.
Driver
A Driver is an electronic device that converts Transmitting Data Signals from a
digital level to whatever type of signal is used to transmit the information across the
wire. A driver can be perceived as the talking device.
Receiver
A Receiver is an electronic device that receives data that was sent by the driver and
converts that data back to a standard digital signal level. A receiver can be perceived
as the listening device.
Transceiver
A Transceiver is a single device that acts as both a driver and a receiver. Depending
on the network type, the transceiver may be able to communicate in both directions at
the same time or only one direction at a time.
1-18
Introduction to Networking
Hardware
Drivers / Receivers / Transceivers
Receiver
Receiver
RD
RD
Driver
TD
Transceiver
Transceiver
TD
TD
RD
TAC
T
The supported signal
traveling on the network
RD
1-19
Hardware
Baseband / Broadband Networks
Baseband - A transmission method in which the entire bandwidth of the
transmission medium is used to transmit a single digital signal. The signal is driven
directly onto the transmission medium without modulation of any kind
The transmission of either analog or digital signals over the medium without
modulating a carrier.
Digital signaling
Original signal is transmitted, no modulation is involved
Transmission distances of a few kilometers
Passive media coax or twisted pair
Bus connections easily made
Simplified maintenance
Lower cost
Broadband - A transmission method where signals are modulated into noninterfering frequencies before being sent over the cables so that many signals can be
sent at once.
1-20
Introduction to Networking
Hardware
Repeaters / Hubs
Repeater
A repeater is a device that amplifies an electronic signal so it can travel further down
the cabling. This allows for longer cable runs, extending the specified limitation
required.
Hub
A hub is a device that has two functions on the Ethernet:
TAC
Isolates network nodes so that a fault on a node or cable does not effect the
rest of the network (each node connects to a single port on an active hub)
1-21
Hardware
Topologies
A Topology is the physical layout of the network hardware.
The topology governs how nodes are arranged and connected.
There are two topologies that Andover Controls supports:
Bus
Star
* Ring
Bus (Point-to-Point)
All devices are connected to a single common coax cable (communications link)
using Tee connectors.
Any computer on the network can talk as long as no other computer is talking.
The more computers that are talking on a bus, slows down the overall performance of
that network.
A bus sends each message to all nodes at once. This system of transmission is called a
broadcasting system.
If one node powers down, the rest of the network is un-effected.
A bus network can be extended beyond its limitations with the use of repeaters.
Vulnerability Failure of the bus will bring down the entire network. Failure of a
single workstation will not usually affect the entire network.
1-22
Introduction to Networking
Hardware
Topologies cont
Star
All computers on the network connect to a central hub.
If the central hub goes down, all nodes attached to that hub stop communicating.
The failure of one node does not usually affect the rest of the network.
In a star topology contention rules dictate that only one station can talk at any given
time and any station may talk providing the network is quiet. This access method
eliminates the need for pooling and vastly improves throughput and performance.
Hubs can be expanded to handle hundreds of devices without performance
degradation. Expansion is easily accomplished by simply plugging in a connection at
the concentrator.
Vulnerability Failure of the hub can bring that section of the network down. Some
manufacturers allow for redundant backup of the hub and multiple loads sharing
power supplies to eliminate a single point of failure. The failure of a node will not
normally affect network operation.
TAC
1-23
Hardware
Topologies cont
Hybrid
A Hybrid network is a combination of topologies.
Hybrid networks may use a combination of point-to-point and multi-point connection
techniques.
* Ring
Very few network types support Ring Topologies
Ring Topology
1-24
Introduction to Networking
Hardware
Propagation Delay
Propagation Delay is the amount of time it takes a signal to get from point A to point
B.
The following contribute to Propagation Delay:
The longer the cable segments and the more devices on the network, the longer it
takes for a signal to propagate from one end of the network to the other.
The time it takes a signal to travel between the two stations that are furthest apart in
the network is known as the maximum "propagation delay" of the network.
Delays vary depending on the installed hardware. Delays associated with wire differ
from delays associated with fiber optic:
TAC
1-25
Calculates the CRC as its sending the data out and places the result at the end
of the packet
1-26
Performs the same calculation, and compares its result with the result that was
placed on the end from the sender.
Introduction to Networking
TAC
1-27
1-28
Introduction to Networking
TCP/IP uses a logical address. The IP address is not burned into the Ethernet card but
rather assigned to a computer making it a logical address.
When sending a message from a computer, it is going out with a physical address
(from the network card physically located on the computer) and a logical address
(from the IP address assigned to the computer).
Logical Addressing is handled at the Protocol Layer
TAC
1-29
TCP/IP: The most widely used protocol suite because of Internet support
Without a common shared protocol between two devices, these devices would not be
able to communicate with one another.
1-30
Introduction to Networking
OSI Model
In recognition of both the need for communications standards and the need for a
layered architecture, the ISO (International Organization for Standardization)
developed a standard in 1984 defining a model for a general purpose data
communications architecture.
The model is called the Open Systems Interconnection Basic Reference Model [ISO
7498] or OSI Model and contains seven layers that represent the categories of logical
functions involved in data communications.
TAC
1-31
OSI Model
The OSI Model consists of seven layers (working from the bottom up):
Types of cable or other networking media that the physical part of the network
uses
In a sense, this is the only part of the OSI model you can actually see and touch.
For outbound messages, the Data Link layer enables the conversion of the bits
that computers use to represent data into equivalent signals needed to move
data across the network.
The Data Link layer is also where low-level hardware addresses for individual
network interface cards (NICs) and other devices are handled.
1-32
Introduction to Networking
OSI Model
Transport Layer (4):
This layer chops up large messages into so called Protocol Data Units (PDUs), or
packets, and sends them across a network. It also puts PDUs back together to
reconstitute messages upon receipt. The Transport layer can also include data
integrity checks by adding a bit pattern to each message based on a mathematical
calculation before sending. This same calculation is repeated by the sender, and the
result is compared to the value calculated beforehand. If both values agree, the
Transport layer assumes the transmission was accurate and correct; if they dont
agree, the Transport layer requests the PDU be re-sent. This integrity function is
optional; therefore, some Transport layer protocols include an integrity check,
whereas other such protocols dont.
TAC
1-33
OSI Model
Each layer functions more or less independently of the others.
The job of any given layer is to provide services for the layer above it and to deliver
data to the layer below. (the lowest level of the OSI model, the Physical layer, simply
sends data on to a receiver or to the Data Link layer, depending on whether the
communication is coming or going.)
The encoding that a layer does on the sending side is decoded by the same layer on
the receiving side. Therefore, the layered OSI model helps emphasize that protocols
on the sending end accept data from application, convert that data into generic form,
manage conversations, prepare data to be sent across the network, address and route
data, and then convert that data into signal for transmission across the network.
On the receiving end, the process is reversed: The protocols convert signals into data,
figure out where that data is to be delivered, reconstitute incoming messages into their
original containers, manage conversations, prepare the data for the client computer,
and deliver that data to an application.
1-34
Introduction to Networking
Ch 2
BACnet Basics
Contents
What is BACnet
History of BACnet
Andover Controls & BACnet
BACnet Objects
BACnet Properties
BACnet Protocol Architecture
Services
Basic Services
Application Layer Model
Client Server Model
- Confirmed Services
- Unconfirmed Services
BACnet Message Size
Transmission of BACnet APDUs
Network Layer
Service Specifications
Network Numbering
Transport Options
2-2
BACnet Basics
What is BACnet?
BACnet is a Data Communications Protocol designed to enhance interoperability.
BACnet stands for Building Automation and Control network.
BACnet was developed by the American Society of Heating, Refrigerating and AirConditioning Engineers, Inc. (ASHRAE) that allows products made by different
manufacturers to be integrated into a single building automated control system. This
means that different manufacturers products can seamlessly communicate data to
each other over a network.
The types of products include controllers, workstations, actuators and sensors.
Within the BACnet world, each of these products is referred to as a device.
In order for communications to occur between two different systems, a common
network technology is required. BACnet supports five different types of networks:
Ethernet (Supported with Continuum version 1.6)
MS/TP (Supported with Continuum version 1.6)
ARCNET
Point-to-Point
LonTalk
With Continuum Version 1.6, Andover selected MS/TP, a twisted-pair cabling
arrangement based on the RS-485 standard, for its BACnet networking requirements
and Ethernet IP.
BACnet is an Application Language made up of:
Objects
Services
BACnet
TAC
BACnet
2-3
History of BACnet
BACnet is the result of nearly eight and a half years of toil, on the part of a dedicated
group of about twenty ASHRAE volunteers, who had been assembled into a Standard
Project Committee known as SPC 135P.
Volunteers came from all segments of the building controls industry including:
Universities
Control Manufacturers
Government Agencies
Consulting Firms
Their task was to adopt or develop a standard method by which all computers used in
building automation and control could exchange information.
2-4
BACnet Basics
TAC
2-5
NetController
CyberStation 1.6
I2 Devices
B4920
Delta DSC
MS/TP B385x
2-6
BACnet Basics
BACnet Objects
The BACnet protocol is based on:
Objects
Services
Transport
Objects are the logical representation of system data.
Objects may represent single physical points or logical groupings / collections of
points that perform a specific function.
Standard Objects
The data structures used in a device to store information are a local matter. In
order to exchange that information with another device using this protocol, there
must be a "network-visible" representation of the information that is standardized.
An object-oriented approach has been adopted to provide this network-visible
representation.
This clause defines a set of standard object types. These object types define an
abstract data structure that provides a framework for building the application layer
services. The application layer services are designed, in part, to access and
manipulate the properties of these standard object types.
TAC
Multi-State Input
Multi-State Output
Multi-State Value
Loop
Calendar
Notification Class
Command
LifeSafetyPoint
File
Program
Schedule
Trend Log
Group
Event Enrollment
Device
2-7
BACnet Objects
Standard Objects
The BACnet Standard Objects that Continuum 1.6 supports are:
Binary Input
Binary Output
Binary Value
Analog Input
Analog Output
Analog Value
Device
Event Enrollment
Multi-State Input
Multi-State Output
Multi-State Value
Notification Class
Subsequent versions of Continuum (1.62 and beyond) will support BACnet Calendar
and BACnet Schedule objects.
Non-Standard Objects
Not all object types defined in this standard need to be supported in order to conform
to the standard. Some properties of particular object types are optional.
It is intended that the collection of object types and their properties defined in this
standard be comprehensive, but implementors are free to define additional
nonstandard object types or additional nonstandard properties of standard object
types. This is the principal means for extending the standard as control technology
develops. Innovative changes can be accommodated without waiting for changes in
the standard. This extensibility could also be used to adapt this standard to other types
of building services.
All objects are referenced by their Object_Identifier property.
Each object within a single BACnet Device shall have a unique value for the
Object_Identifier property. When combined with the system-wide unique
Object_Identifier of the BACnet device, this provides a mechanism for referencing
every object in the control system network.
Nonstandard object types are required to support the following properties:
Object_Identifier
Object_Name
Object_Type
BACnetObjectIdentifier
CharacterString
BACnetObjectType
2-8
BACnet Basics
BACnet Objects
Object Properties
A BACnet standard object shall support all required properties specified in the
standard. It may support any optional properties specified in the standard or
properties not defined in the standard.
Required Properties
A required property shall function as specified in the standard for each object of that
type. If properties that are defined as optional in the standard are supported, then they
shall function as specified in the standard.
A required property shall be present in all objects of that type.
Optional Properties
An optional property, if present in one object of a given type, need not be present in
all objects of that type.
Supported Properties
A supported property, whether required or optional, shall return the data-type
specified in the standard.
A supported property, whether required or optional, is not required to be able to
return the entire range of values for a data-type unless otherwise specified in the
property description.
TAC
2-9
BACnet Properties
Objects are examined and controlled by a set of Properties that belong to each object.
BACnet properties are equivalent to attributes in Continuum.
Examples of object properties are: Name, Type, Present Value, Status Flags, High
Limit, Low Limit, and so forth. The most commonly used property for
interoperability is Present Value.
Each BACnet device also has a device object containing properties that can be used
to verify communications, identify the vendor, identify software and firmware
revision and other characteristics of the device. The device objects properties
represent the externally visible characteristics of a BACnet device.
Mandatory BACnet Properties are:
Object Identifier
Name
Type
Property Identifiers (0-511) ASHRAE, (512-4194303) Proprietary
0 acked-transitions
1 ack-required
2 action
3 action-text
4 active-text
5 active-vt-sessions
6 alarm-value
7 alarm-values
8 all
9 all-writes-successful
10 apdu-segment-timeout
11 apdu-timeout
12 application-software-versio
13 archive
14 bias
15 change-of-state-count
16 change-of-state-time
17 -18 -19 controlled-variable-reference
20 controlled-variable-units
2-10
21 controlled-variable-value
22 cov-increment
23 datelist
24 daylight-savings-status
25 deadband
26 derivative-constant
27 derivative-constant-units
28 description
29 description-of-halt
30 device-address-binding
31 device-type
32 effective-period
33 elapsed-active-time
34 error-limit
35 event-enable
36 event-state
37 event-type
38 exception-schedule
39 fault-values
40 feedback-value
41 file-access-method
42 file-size
43 file-type
44 firmware-revision
45 high-limit
46 inactive-text
47 in-process
48 instance-of
49 integral-constant
50 integral-constant-units
51 issue-confirmed-notification
52 limit-enable
53 list-of-group-members
54 list-of-object-property-references
55 list-of-session-keys
56 local-date
57 local-time
58 location
59 low-limit
60 manipulated-variable-references
61 maximum-output
BACnet Basics
Equivalent
OSI Layers
Transport
Network
ARCNet
MS/TP
Data Link
PTP
LonTalk
EIA-485 EIA-232
Physical
BACnet provides five options that correspond to the OSI Data Link and Physical
Layers:
Option 1 is the logical link control (LLC) protocol defined by ISO 8802-2 Type 1,
combined with the ISO 8802-3 medium access control (MAC) and physical layer
protocol. ISO 8802-2 Type 1 provides unacknowledged connectionless service only.
ISO 8802-3 is the international standard version of the well-known "Ethernet"
protocol.
Option 2 is the ISO 8802-2 Type 1 protocol combined with ARCNET (ANSI/ATA
878.1).
Option 3 is a Master-Slave/Token-Passing (MS/TP) protocol designed specifically
for building automation and control devices as part of the BACnet standard. The
MS/TP protocol provides an interface to the network layer that looks like the ISO
8802-2 Type 1 protocol and controls access to an EIA-485 physical layer.
Option 4, the Point-To-Point protocol, provides mechanisms for hardwired or dialup serial, asynchronous communication.
Option 5 is the LonTalk protocol. Collectively these options provide a master/slave
MAC, deterministic token-passing MAC, high-speed contention MAC, dial-up
access, star and bus topologies, and a choice of twisted-pair, coax, or fiber optic
media.
TAC
2-11
BACnet is designed so that there is only one logical path between devices,
thus eliminating the need for optimal path routing algorithms.
For some BACnet systems, the network layer is a necessity. This is the case
when two or more networks in a BACnet Internet use different MAC layer
options. When this occurs, there is a need to recognize the difference between
local and global addresses and to route messages to the appropriate networks.
2-12
BACnet Basics
TAC
2-13
BACnet Topology
In the interest of application flexibility, BACnet does not prescribe a rigid network
topology.
BACnet devices are physically connected to one of four types of Local Area
Networks (LANs) or via dedicated or dial-up serial, asynchronous lines.
These networks may then be further interconnected by the use of BACnet routers.
In terms of LAN topology, each BACnet device is attached to an electrical medium or
physical segment.
A BACnet segment consists of one or more physical segments connected at the
physical layer by repeaters.
A BACnet network consists of one or more segments interconnected by bridges that
connect the segments at the physical and data link layers and may perform message
filtering based upon MAC addresses.
Multiple networks, possibly employing different LAN technologies, may be interconnected by BACnet routers to form a BACnet inter-network.
2-14
BACnet Basics
TAC
- Bridges
B = Bridge
- Repeaters
R = Repeater
- Routers
RT = Router
- Half Routers
RT = Half Router
2-15
Services
In order for two different devices to interoperate, a common set of services is
required. BACnet services provide messages for accessing and manipulating
properties of device objects.
For example, the devices need to identify themselves (I Am, Who Is), read and write
data (Read Property, Write Property), and so forth.
BACnet defines 35 basic services that are grouped into 5 categories:
1) Object Access
AddListElement
RemoveListElement
CreateObject
DeleteObject
ReadProperty
ReadPropertyConditional
ReadPropertyMultiple
WriteProperty
WritePropertyMultiple
2) Alarm and Event
AcknowledgeAlarm
ConfirmedCOVNotification
ConfirmedEventNotification
GetAlarmSummary
GetEnrollmentSummary
SubscribeCOV
UnconfirmedCOVNotification
UnconfirmedEventNotification
2-16
BACnet Basics
Services
3) Remote Device Management
DeviceCommunicationControl
ConfirmedPrivateTransfer
UnconfirmedPrivateTransfer
ReinitializeDevice
ConfirmedTextMessage
UnconfirmedTextMessage
TimeSynchronization
Who-Has and I-Have
Who-Is and I-Am
4) File Transfer
AtomicReadFile
AtomicWriteFile
5) Virtual Terminal
VT-Open
VT-Close
VT-Data
TAC
2-17
Services
Application Layer Model
The purpose of the Application Layer Model is to describe and illustrate the
interaction between the application layer and application programs, the relationship
between the application layer and lower layers in the protocol stack, and the peer-topeer interactions with a remote application layer.
An Application Process is that functionality within a system that performs the
information processing required for a particular application. All parts of the
Application Process outside the Application Layer, (i.e., those that do not concern the
communication function) are outside the scope of BACnet. The part of the
Application Process that is within the Application Layer is called the Application
Entity. In other words, an Application Entity is that part of the Application Process
related to the BACnet communication function. An application program interacts
with the Application Entity through the Application Program Interface (API). This
interface is not defined in BACnet, but it would probably be a function, procedure, or
subroutine call in an actual implementation.
Application
Program
Application
Process
Application Layer
Application Program
Interface
BACnet
User Element
Application
Entity
BACnet
ASE
NSAP
2-18
BACnet Basics
Services
Application Layer Model
The Application Entity is itself made up of two parts:
TAC
It is responsible for maintaining the time-out counters that are required for the
retrying of a transmission
It also presides over the mapping of a device's activities into BACnet objects
2-19
Services
Client / Server Model (Confirmed Application Services)
BACnet defines Confirmed Application Services based on a client and server
communication model.
A client requests service from a server via a particular service request instance.
The server provides service to a client and responds to the request.
server
client
ReadProperty(msg#123
objectid=AnalogInput 29
propertyid=Present_Value)
ReadProperty(msg#123
objectid=AnalogInput 29
propertyid=Present_Valuevalue=72.0)
or
Error(msg#123 class=object
code=NoSuchObject)
2-20
BACnet Basics
Services
Client / Server Model
Confirmed Services
The BACnet-user that assumes the role of a client is called the "requesting
BACnet-user" and the BACnet-user that assumes the role of the server is called
the "responding BACnet-user."
Client
Server
Requesting
Responding
Sending
Request
PDU
Receiving
Receiving
Respond
PDU
Sending
TAC
2-21
Services
Client / Server Model
Unconfirmed Services
The client and server model, and the terms "requesting BACnet-user" and
"responding BACnet-user," do not apply to Unconfirmed Services.
The terms "sending BACnet-user" and "receiving BACnet-user" do apply and
are used to define the service procedure for unconfirmed services.
2-22
BACnet Basics
Services
The client-server model supports such services as AcknowledgeAlarm and
ConfirmedCOVNotifications and UnconfirmedCOVNotifications. Both confirmed
and unconfirmed alarms and COV's are local subnet broadcasts and will require the
use of a BACnet Broadcast Management Device to transmit beyond the local subnet.
For the Alarm and COVNotification Services, with the delivery of the first alarm or
COVNotification, the b4920 or b3xx builds an internal device binding table (similar
to an address book) as the result of an initial Who is/I am. This table gets updated
based on changes in alarm delivery or COVnotifications. Subsequent
Alarms/COVnotifications use this table for additional deliveries. Each time the
controller is powered down or reloaded, however, the table must rebuild beginning
with the first Alarm/COVnotification delivery.
If a BACnet device attempts to deliver an alarm or a COVnotification and does not
get a response it sets that device to an offline status and continues to try and send
WHO IS messages until the device returns to an online status.
The only difference between confirmed and unconfirmed services is that the
confirmed results in an ACK response primitive being sent to the client device.
TAC
2-23
Services
BACnet Messages - Packet Size
To provide for messages that are longer than the maximum length supported by a
communications network, or by the sending or receiving device, BACnet provides a
method to perform application layer segmentation. In BACnet, only ConfirmedRequest and Complex-ACK messages may be segmented. Segmentation is an
optional feature of BACnet.
Message Segmentation - This sub-clause prescribes rules for dividing a message
into segments.
Segmenting APDU Data Streams - Each BACnet message is encoded into a
sequence of tags and values.
Maximum APDU Length - The maximum length of a BACnet APDU shall be the
smallest of:
2-24
The maximum APDU size accepted by the remote peer device, which must be
at least 50 octets.
BACnet Basics
Services
BACnet Messages - Packet Size
If the sending device is the requesting BACnet-user, i.e., the message to be sent is a
Confirmed-Request; then the maximum number of segments accepted by the remote
peer device is specified in the Max_Segments_Accepted property of the remote peer's
Device object.
If the sending device is not the requesting BACnet-user, i.e., the message to be sent is
a Complex-ACK; then the maximum number of segments accepted by the remote
peer device is specified in the 'Max Segments Accepted' parameter of the BACnetConfirmed-Request-PDU for which this is a response.
The value determined by the above constraints will be designated the maximumtransmittable-length. Note that maximum-transmittable-length will not be a constant
unless minimum values are used for each constraint.
TAC
2-25
Services
Transmission of BACnet APDUs
Upon transmitting a complete un-segmented Confirmed-Request message or upon
receiving the SegmentACK, acknowledging the final segment of a segmented
Confirmed-Request message, a client device shall start a timer that indicates the
length of time the message has been outstanding.
The timer shall be canceled upon the receipt of an Error, Reject, Abort, SimpleACK
or ComplexACK APDU for the outstanding Confirmed-Request message and the
client application shall be notified.
If the timer exceeds the value of the APDU_Timeout property in the client's Device
object, then the complete Confirmed-Request message shall be retransmitted and the
timer shall be reset to zero.
All retransmitted Confirmed-Request messages shall follow this same procedure until
the message has been retransmitted the number of times indicated in the
Number_Of_APDU_Retries property of the client's Device object.
If, after the Confirmed-Request message is retransmitted the appropriate number of
times and a response is still not received, the message shall be discarded and the
client application shall be notified.
2-26
BACnet Basics
Network Layer
The purpose of the BACnet network layer is to provide the means by which messages
can be relayed from one BACnet network to another, regardless of the BACnet data
link technology in use on that network.
Whereas the data link layer provides the capability to address messages to a single
device or broadcast them to all devices on the local network, the network layer allows
messages to be directed to a single remote device, broadcast on a remote network, or
broadcast globally to all devices on all networks. A BACnet Device is uniquely
located by a network number and a MAC address.
BACnet Routers - Devices that interconnect two disparate BACnet LANs, e.g.,
ISO 8802-3 and ARCNET, and provide the relay function described in this clause are
called "BACnet routers." Devices that interconnect two disparate BACnet networks
through a point-to-point (PTP) connection are also BACnet routers.
BACnet Routers build and maintain their routing tables automatically using the
network layer protocol messages. Network layer protocol messages facilitate both the
auto-configuration of routers and the flow of messages to, and between, routers.
BACnet routing capability may be implemented in stand-alone devices or,
alternatively, in devices that carry out other building automation and control
functions.
TAC
2-27
Network Layer
A list of the maximum Network Protocol Data Units (NPDU) lengths for BACnet
Data Link Technologies:
2-28
BACnet Basics
Network Layer
Service Specification
Conceptually, the BACnet network layer provides an unacknowledged connectionless
form of data unit transfer service to the application layer. The primitives associated
with the interaction are the N-UNITDATA request and indication. These primitives
provide parameters as follows:
N-UNITDATA.request (
destination_address,
data,
network_priority,
data_expecting_reply
)
N-UNITDATA.indication (
source_address,
destination_address,
data,
network_priority,
data_expecting_reply
)
TAC
2-29
Network Layer
Service Specification
The 'destination_address' and 'source_address' parameters provide the logical
concatenation of:
Send the NSDU to the next BACnet router en route to its destination
If the destination address matches that of one of its own application entities, issue an
N-UNITDATA indication primitive to the appropriate entity in its own application
layer to signal the arrival of the NSDU
2-30
BACnet Basics
Network Layer
Unique Network Number
Each BACnet Network must have a unique Network Identification number.
Andover uses an algorithm to assign a unique Network number to each of its BACnet
Networks. The algorithm uses the hexadecimal version of ACC (2764) and the
ACCNet ID of the b4920 to create a unique number. Because of this unique
algorithm, the likelihood of conflict with third party BACnet networks is minimized.
This only works if the Administrator does not set the MS/TP Net Id and accepts the
default value assigned through this algorithm.
The Algorithm formula: (2764) + (b4s Acc Net Id #)
Acc in Hexadecimal
In the unlikely event of duplication of Network Ids, the administrator is given the
opportunity to change the Network ID in the editor of the b4920. If the Administrator
configures the MS/TP Net Id, the formula is over-ridden by the new value.
b4920 Editor View
TAC
2-31
Transport Options
Supported Protocols showing Cost Vs Speed
Ethernet
Cost
ARCNET
LonTalk
MS/TP
Speed
2-32
BACnet Basics
A token Passing network that also supports slave devices that will only
respond to a poll
TAC
Allows for connecting the control system to the standard corporate network
2-33
Transport Options
Transport Options not supported by Continuum 1.6 or requires an Xdriver:
2-34
BACnet Basics
Ch 3
Ethernet
Contents
Ethernet Intro / Overview
What is Ethernet
History of Ethernet
IEEE Project 802.xx
Layer 1
Cables & Specifications
-
10Base-T
10Base-2
10Base-5
10Base-FL
100Base-TX
100Base-FX
1000Base-T
1000Base-FX
Layer 2
CSMA/CD
Ethernet / MAC Addressing
Ethernet Binary Signal
IEEE 802.3 Data Packet
Extending Ethernet Beyond Cable Specs (Repeater)
Propagation Delay
Collision to Jam
Bridges & Switches
3-2
Ethernet
History of Ethernet?
Ethernet was invented at Xerox Corporation's Palo Alto Research Center in the early
1970s. Digital Equipment Corporation, Intel Corporation and Xerox later cooperated
to devise a production standard that was informally called DIX Ethernet. The last
version of the DIX standard was released in 1982.
The Institute of Electrical and Electronic Engineers (IEEE, referred to as I-triple-E)
is a standards organization that establishes standards for Ethernet. In 1983, the
Institute of Electrical and Electronic Engineers (IEEE) released their first version for
Ethernet technology. IEEE now controls Ethernet standards.
TAC
3-3
3-4
Ethernet
Layer 1
Cables & Specifications
10BaseT
Topology: Bus / Star
Cable Type: Category 3, 4 or 5 Unshielded Twisted Pair (UTP)
Terminator Resistance: 100 Ohm (internal to the transceiver)
Maximum Segment Length: 327 ft. (100 meters)
Maximum Stations Per Cable Segment: 2
Connector Type: RJ-45
Repeater
/
Hub
RJ-45
NIC
Card
TAC
UTP Cable
328 ft. max.
3-5
Layer 1
Cable Specifications cont
10Base2
Topology: Bus
Cable Type: RG-58 Thinnet coaxial
Terminator Resistance: 50 Ohm (required at each end of segment)
Maximum Segment Length: 606 ft. (185 meter)
Minimum Segment Length: 20 inch. (0.5 meters)
Maximum Total Network Length: 3,035 ft. (925 meters)
Maximum Connected Segments: 5 (using 4 repeaters) only 3 segments can
contain computers
Maximum Stations Per Cable Segment: 30
Connector Type: BNC-T
NIC
Card
BNC-T
50 ohm Termination
@ Both Ends
RG-58 Thinnet
Coaxial Cable
3-6
Ethernet
Layer 1
Cable Specifications cont
10Base5
Topology: Bus
Cable Type: Thicknet - 3/8 Shielded Transceiver
Terminator Resistance: 50 Ohm (required at each end of segment)
Maximum Segment Length: 1,640 ft. (500 meter)
Minimum Segment Length: 8.2 ft. (2.5 meters)
Maximum Total Network Length: 8,000 ft. (2,460 meters)
Maximum Connected Segments: 5 (using 4 repeaters) only 3 segments can
contain computers
Maximum Stations Per Cable Segment: 100
Connector Type: DIX / AUI / N-series
10BaseFL
Topology: Bus / Star
Cable Type: 62.5/125 Micron Multi-Mode Fiber Optic Cable
Maximum Segment Length: 6,561 ft (2,000 meters)
Maximum Stations Per Cable Segment: 2
Connector Type: ST / SMA
TAC
3-7
Layer 1
Cable Specifications cont
100BaseFX
Topology: Bus / Star
Cable Type: 62.5/125 Micron Multi-Mode Fiber Optic Cable
Maximum Segment Length: Full Duplex = 6,561 ft. (2,000 meters)
Half Duplex = 1,351 ft. (412 meters)
Maximum Stations Per Cable Segment: 2
Connector Type: ST / SMA
100BaseTX
Topology: Bus / Star
Cable Type: Unshielded Twisted Pair (CAT 5) 2 Pairs
Terminator Resistance: 100 ohm
Maximum Segment Length: 328 ft. (100 meters)
Maximum Stations Per Cable Segment: 2
Connector Type: RJ-45 (CAT 5)
3-8
Ethernet
Layer 1
Cable Specifications cont
1000BaseT
Topology: Bus / Star
Cable Type: Unshielded Twisted Pair (CAT 5)
Terminator Resistance: 100 ohm
Maximum Segment Length: 328 ft. (100 meters)
Maximum Stations Per Cable Segment: 2
Connector Type: RJ-45
1000BaseFX
Topology: Bus / Star
Cable Type: Multi-Mode / Single-Mode Fiber Optic cable
Maximum Segment Length: Mulit-mode = 1,351 ft. (220meters)
Single-mode = 16,404 ft. (5,000 meters)
Minimum Segment Length: Mulit-mode = 6.5 ft. (2 meters)
Single-mode = 6.5 ft. (2 meters)
Maximum Stations Per Cable Segment: 2
Connector Type: ST / SMA
TAC
3-9
Layer 2
CSMA/CD (Carrier Sense Multiple Access)
An Ethernet network does not have a centralized controller that tells each computer
how to take turns using the shared cable. Instead, all computers attached to the
Ethernet participate in a distributed coordination scheme called Carrier Sense
Multiple Access (CSMA).
The scheme uses electrical activity on the cable to determine status. When no
computer is sending a frame, the Ethernet does not contain electrical signals. During
frame transmission, a sender transmits electrical signals used to encode bits.
Although the signals differ slightly from the modulation high frequency carrier
waves, they are also referred to as a carrier. To determine whether the Ethernet
cable is currently being used, a computer can check for a carrier. If no carrier is
present, the computer can transmit a frame. If a carrier is present, the computer must
wait for the sender to finish before proceeding.
Checking for a carrier wave is called carrier sense, and the idea of using the
presence of a carrier signal to determine when to transmit is called Carrier Sense
Multiple Access, or CSMA.
3-10
Ethernet
Layer 2
CSMA/CD (Collision Detection)
CSMA cannot prevent all possible conflicts on the cable.
As an example, if two computers at opposite ends of an idle cable both have a frame
ready to send at the same time and both check for a carrier and find none, they begin
transmitting simultaneously. The signals reach the same point on the cable and
interfere with each other.
The interference between two signals on an Ethernet cable is called a collision. It
produces a garbled transmission that prevents either of the two frames from being
received correctly. Each sending computer monitors the signals on the cable. If the
signal on the cable differs from the signal that the sending computer transmitted, it
means that a collision has occurred. The sending computer immediately stops
transmitting.
This technique of monitoring the cable during transmission is called Collision Detect
(CD).
The combined Ethernet mechanism of Carrier Sensing and Collision Detection is
referred to as Carrier Sense Multiple Access with Collision Detect (CMSA/CD).
Recovering from a Collision:
When a signal collision occurs, the sending computers must wait for the cable to
become idle again before retransmitting their frames. However if they begin to
transmit as soon as the Ethernet becomes idle, it possible that another collision will
occur. To avoid this situation, the Ethernet standard requires each computer to delay
after a collision before attempting to retransmit. The standard specifies a maximum
delay d, and forces each computer to choose a random delay less than the d.
In most cases, when a computer chooses a delay at random, it will select a value that
differs from any of the values chosen by the other computers. The computer that
chooses the smallest delay will proceed to send a frame and the network will return to
normal operation.
The above explanation is a simplistic explanation of how collision recovery (referred
to as exponential back-off) occurs on an Ethernet network. Exponential back-off
means that the Ethernet network can recover quickly after a collision because each
computer agrees to wait longer times between attempts when the cable becomes busy.
TAC
3-11
Layer 2
Ethernet / MAC Addressing
The Ethernet/ MAC Address consists of two parts:
The second set of octets - define the Serial Number of the Network
Interface Card (NIC)
Specific Addressing:
IEEE specifies that each addressable network device will have a unique hardware
address that is made up of 6 bytes of information. The address is hard-coded into
every network interface controller card during manufacturing. IEEE strictly controls
the availability of addresses.
IEEE assigns each network hardware manufacturer a unique manufacturer identifier
and a block of numbers that the manufacturer usually assigns sequentially to each
piece of hardware. The combination of the Manufacturer ID and the serial number of
the NIC make up the common 48-bit (6-byte) Ethernet / MAC address.
The first 3 bytes of the address contain the manufacturer identifier and the last 3 bytes
contain the NIC serial number. The numbering scheme is given in hexadecimal
format (0-9 hex and A-F hex).
Andover Controls
Manufacturers ID
00:40:11:0C:8D:2C
Unique Ethernet / MAC Address
When a specific Ethernet address is used as the destination address in a packet, only
the station with that specific address will decode that packet.
3-12
Ethernet
Layer 2
Ethernet / MAC Addressing
Multicast Addressing:
At times it is necessary to communicate with many devices on a network
simultaneously. A network management station might poll or query a group of
devices to determine their status. Instead of keeping a list or table of unique
addresses, a group address can be used. This type of group addressing is
accomplished using a Multicast address. The first byte of the destination ID is always
an odd number.
Broadcast Addressing:
A broadcast address is an address thats meant to be heard by all stations on the
network. Certain protocols running on workstations will occasionally send out
broadcast messages to servers on the network to let the servers know that the node is
on line. A broadcast address contains F hex characters in both the manufacturer ID
and sequential number area of the address.
TAC
3-13
Layer 2
IEEE 802.3 Data Packet
The IEEE 802.3 Ethernet Standard provides a very definitive packet description.
Destination
Address
Preamble
7
1
SFD
Field
Length
6
Source
Address
CRC
46 - 1500
Data Field
Preamble:
The preamble indicates the beginning of packet transmission. The preamble allows
for packet timing at the receiving station (s). The signal pattern is
1010101010binary for a total of 56 bits (7 bytes).
Start Frame Delimiter (SFD):
The SFD signal pattern is 10101011 for a total of 8 bits (1 byte). It follows the
preamble and indicates the start of information by the last two bits, 11.
Destination Address:
The address of the station, or stations, that the data packet is intended. It follows the
SFD and is 48 bits (6 bytes) 1.
Source Address:
Follows the destination address and indicates the address of the station initiating the
transmission. The source address is 48 bits (6 bytes) in length1.
Length Field:
Then length field follows the source address and indicates length of data field. The
length field is 16 bits (2 bytes) in length. In Ethernet version 1.0 or version 2.0, this
field is called a Type field. The Type field will usually indicate the packet protocol
(e.g., TCP/IP, XNS, DECNet, Novell IPX, etc.)
Data Field:
The data field follows the length field. It is 46 bytes minimum to a maximum of 1500
bytes in length. This field contains the actual data being sent across the network
along with some control information. If the data to be sent is less than 46 bytes, a
special bit pattern called PAD is used to fill in up to the 46 byte minimum.
Cyclic Redundancy Check (CRC):
The CRC follows the data field and is 32 bits (4 bytes) in length. Also known as the
Frame Check Sequence (FCS), this field insures that the transmitted data that is
received is the same as the data that was originally sent.
3-14
Ethernet
Layer 2
IEEE 802.3 Data Packet cont
Packet Size
IEEE defines both a minimum and maximum packet size:
Minimum - 64 bytes (12 address bytes, 2 length bytes, 46 data bytes and 4
CRC bytes).
TAC
3-15
Layer 2
Inter-Frame Gaps
In order to distinguish one Ethernet packet from another, a quiet period called the
Inter-frame Gap, occurs at the end of each packet.
The Inter-frame gap:
Ensures that a definite quiet period of 9.6 ms occurs between packets to allow
for identification of the next packet.
Provides the time needed for the transit station to apply a Signal Quality Error
(SQE) test to the transceivers collision detection circuitry at every node.
Frame
Frame
Packet
Packet
Inter-frame Gaps
9.6s
3-16
Ethernet
Layer 2
Extending Ethernet Beyond Cable Specs (Repeater)
Distance limitations in LANs arise because the electrical signal becomes weaker as it
travels along a wire. To overcome such limitations, some LAN technologies allow
two cables to be joined together with a device known as a Repeater.
A repeater is usually an analog electronic device that continuously monitors electrical
signals on a cable. When it senses a signal on one cable, the repeater transmits an
amplified copy to the other cable.
Maximum
Ethernet Section 1
Maximum
Ethernet Section 2
TAC
When using 4 repeaters, the fourth must be an Inter-Repeater Link (IRL) that
connects two repeaters but has no controllers or workstations on it
IRLs can be of any supported cable type, but cannot exceed the maximum
segment length for that cable
3-17
Layer 2
Propagation Delay
The signals transmitted by Ethernet stations encounter delays as they travel through
the network. These delays consist of the time required for signals to travel across the
cable segments, and the logic delays encountered when the signals pass through
electronic components in Network Interface Cards (NICs) and repeating hubs.
The longer the cable segments and the more hubs in the network, the longer it takes
for a signal to propagate from one end of the network to the other. The time it takes a
signal to travel between the two stations that are furthest apart in the network is
known as the maximum "propagation delay" of the network.
Collision to Jam delay is the worst possible delay generated by the equipment
and should always calculate with this possibility in mind.
When looking up the delay time for repeaters, be sure to find the Collision to
Jam Delay rather than the Device Delay.
Note: If an entire network exceeds the maximum delay allowed (25.6 s), it can be
broken into two (or more) networks using a device called a Bridge. When using a
Bridge, you start a new count of cable length, signal loss and signal delay, as if the
two network segments were entirely separate.
3-18
Ethernet
Layer 2
Bridges & Switches
Bridges and Switches segment packets according to the destination address on
individual ports.
Bridge
A bridge is an electronic device that connects two LAN segments. A bridge handles
complete frames and uses the same network interface as a conventional computer.
The bridge listens to traffic on each segment. When it receives a frame from one
segment, the bridge verifies that the frame arrived intact and then forwards a copy of
the frame to the other segment, if necessary. Two LAN segments connected by a
bridge behave like a single LAN.
A computer connected to either segment can send a frame to any of the other
computers connected to the two LAN segments without knowing that they are
connected to a bridged LAN network.
LAN Segment 1
LAN Segment 2
A fiber optic cable and a pair of fiber modems are used to extend LAN segments that
need to be located in two separate building.
Building 1
Converter 1
Building 2
Converter 2
TAC
3-19
Layer 2
Bridges & Switches
Bridge cont
Bridges vs. Repeaters:
Bridges have become more popular than repeaters because they help isolate problems.
If two segments are connected by a repeater and lightning causes electrical
interference on one, the repeater will propagate the interference to the other segment.
In contrast, if interference occurs on one of two segments connected by a bridge, the
bridge will receive an incorrectly formed frame, which the bridge discards. Similarly,
a bridge will not forward a collision from one segment to another.
3-20
Ethernet
Layer 2
Bridges & Switches cont
Switches
In modern networks, computers need to establish a switched connection when
they need to communicate. Each computer maintains a physical connection to the
network at all times.
However, the computer can electronically request the network to establish a
logical connection to another computer, use the connection temporarily, and then
request the network to terminate the connection.
Advantages of Switches
TAC
3-21
3-22
Ethernet
Ch 4
TCP/IP
Contents
TCP/IP
What is TCP/IP
History of TCP/IP
TC/IP Layering Model
IP
TCP
4-2
Host Computers
Internet Protocol Address
IP Address Hierarchy
IP Address
Subnet
Default Router
Dotted Decimal Notation
Classes of IP Addresses
Divisions of the Address Space
Address Assignment
IP Addressing for Routers
Host Suffixes
Using Ping
DHCP (Dynamic Host Configuration Protocol)
The IPCONFIG Command
TCP/IP
TCP/IP
What is TCP/IP:
TCP/IP (Transport/Transmission Control Protocol / Internet Protocol) is a suite of
protocols allowing computers to communicate with one another through the Internet.
TCP is responsible for verifying the correct delivery of data from client to
server. TCP supports the detection of errors that can occur through the
medium and will retransmit data until correctly received.
TCP/IP design allows the construction of very large networks with less central
management. It was initially successful because it delivered a few basic services that
everyone needs (file transfer, electronic mail, remote logon) across a very large
number of client and server systems. Several computers in a small department can use
TCP/IP (along with other protocols) on a single LAN.
History:
Work on TCP/IP began in the 1970s, approximately the same time that Local Area
Networks were being developed. The U.S. military funded much of the research on
TCP/IP and internetworking through the Advanced Research Projects Agency
(ARPA). By the mid-1980s, the National Science Foundation and other U.S.
government agencies were funding development of TCI/IP and a large internet that
was used to test the protocols.
TAC
4-3
Four of the layers in the TCP/IP reference model correspond to one or more layers in
the ISO reference model
Physical (layer1)
Corresponds to basic network hardware
Network Interface (layer2)
Specifies how to organize data into frames and how a computer transmits frames over
a network
Internet (layer3)
Specifies the format of packets sent across an internet as well as the mechanisms used
to forward packets from a computer through one or more routers to a final
destination.
Transport (layer4)
Specifies how to ensure reliable transfer.
4-4
TCP/IP
IP
Host Computers
TCP/IP defines the term host computer as any computer system that connects to the
internet and runs applications. A host can be as small as a personal computer or as
large as a mainframe. Each host attaches to one of the physical networks in an
internet.
TCP/IP protocols make it possible for any pair of hosts to communicate, despite
hardware differences. Both hosts and routers need TCP/IP protocol software. In the
TCP/IP protocol stack, addressing is specified by the Internet Protocol (IP).
IP Address Hierarchy
Each 32-bit IP address is divided into two parts:
TAC
4-5
IP
IP Address
A 32 bit logical network address for the Network Interface Card (NIC). It is used to
identify separate physical networks that are interconnected through a router. The
logical IP Address identifies the destination network, along with the host address on
the network, to which the data is sent.
W X
192.9.200.34
4-6
TCP/IP
IP
Subnet
A Large network can be broken up into smaller logical networks called subnets and
all routed together. Multiple computers sharing the same medium with different
subnet addresses would not see one another. If the computers shared the same subnet
address, they would be able to see each other. It is easier to manage a large network
that is grouped into multiple subnets.
Subnets are necessary when working with TCP/IP. Every TCP/IP network uses a
subnet to organize its addresses.
Subnet Mask
Subnet Masks are used to define Subnets, which are just smaller logical divisions or
groups of the network.
The subnet mask is a number used to differentiate the Host ID from the Network ID.
The subnet mask indicates how much of the IP address to reserve for subdividing the
network into subnets and their hosts.
A TCP/IP node uses the subnet mask number when sending a message to another
device to determine if the device is on the local network or on a remote network.
Local / Remote Delivery of Data
The subnet mask identifies the receiving device's network as local or
remote by:
TAC
4-7
IP
Subnet Mask
The Subnet Mask is represented by the IP 32-bit address, divided into four 8-bit
decimal fields. The significance of each field is determined by its Network Class.
Network
Class
Network Address
Host Address
Example
xxx
xxx.xxx.xxx
255.0.0.0
xxx.xxx
xxx.xxx
255.255.0.0
xxx.xxx.xxx
xxx
255.255.255.0
If you set the subnet mask to 255.255.255.0 for a Class C network, then;
The first two numbers in the IP address determine the Network Number
(xxx.xxx)
The third number in the address determines the Subnet Number
The fourth number determines the Host
Network #
Subnet #
Host
255.255.255.0
Subnet Mask Address
4-8
TCP/IP
IP
How Subnet Masks Works
The network operating system uses the Subnet to extract the Network ID from an IP
address. This helps deliver the data to the correct Subnet.
Once the data is delivered, the Subnet Mask is used to extract the Host ID. This
procedure enables the data to go directly to the intended recipient after the data
reaches the correct Subnet.
Example:
Network 1 IP Address
Subnet Mask (Class B)
129.10.53.11
255.255.0.0
129.10.0.0
Network 2 IP Address
Subnet Mask (Class B)
129.11.53.11
255.255.0.0
129.11.0.0
129.10.0.0 = 129.11.0.0
The IP Address for network 1 does not match the IP Address of network 2 so
the packet is sent to a router.
TAC
512
1024
2048
4096
8192
16384
32768
Number of Hosts
4-9
IP
Default Router
The route within a network consists of network addresses and paths. Network
Addresses contains encoded routing information. The default router is able to look at
this embedded information and make intelligent decisions to path the information.
Equivalent Dotted
Decimal
129. 52 . 6 . 0
128 . 128 . 255 . 0
The smallest possible value, 0, occurs when all bits of an octet are zero
The largest possible value, 255, occurs when all bits of an octet are one
4-10
Class
Range of Values
0 through 127
TCP/IP
IP
Division of the Address Space
The IP class scheme does not divide the 32-bit address space into equal size classes,
and the classes do not contain the same number of networks. The first bit of the
binary octet for Class A must be a zero allowing only seven remaining bits for
numbering Class A networks. (The binary equivalent would be 01111111)
Class A can only contain 128 networks.
The following table summarizes the maximum number of networks available in each
class and the maximum number of hosts per network.
Bits in
Prefix
7
Max. No. of
Networks
128
Bits in
Suffix
24
14
16,384
16
65,536
21
2,097,152
256
Address Class
Address Assignment
Throughout an Internet, each network prefix must be unique. For networks connected
to the global Internet, an organization obtains network numbers from the
communication company that supplies Internet connections. Such companies are
called Internet Service Providers (ISPs). They, in turn coordinate their efforts with a
central organization, the Internet Assigned Number Authority, to ensure that each
network prefix is unique throughout the entire Internet.
When assigning a network prefix, a number must be chosen from Class A, B, or C;
the choice depends on the size of the physical network. Usually, networks are
assigned Class C addresses (maximum of 256 hosts) unless a Class B is required.
Class A is seldom justified because few networks contain more than 65,536 hosts.
TAC
4-11
IP
Address Assignment
Proxy Servers
There are many risks derived when Internet users can access an Intranet and vice
versa. Proxy Servers are used to control and manage who can come in from the
outside (internet) and who can go out from the inside (intranet). Basically, proxy
servers are used to keep intruders out, preventing them from damaging a corporate
Intranet. When an Intranet user goes out to the Internet, they dont actually contact
the Internet directly. They contact the proxy server and its the proxy server that
contacts the Internet.
Can be configured many of ways on how to manage and control user activity
Logs all traffic between the Internet and Intranet so administrators can check
and track attacks
Cache Internet web pages in memory for optimum network performance due
to the fact that Intranet speeds exceed that of the Internet
o This would not be acceptable for time sensitive (constant changing)
items (cached pages are not current versions)
Note:
For a private Intranet, the choice of network prefix is be made by the
organization.
4-12
When using a proxy server, computers on the Intranet do not have true
Internet IP addresses
TCP/IP
IP
Address Assignment
IP Addressing for Routers
In addition to assigning an internet address to each host, the Internet Protocol
specifies that routers should be assigned IP addresses as well. In fact, each router is
assigned two or more IP addresses. To understand why, recall two facts:
A computer (in this case, a router) with multiple network connections must be
assigned one IP address for each connection.
TAC
4-13
IP
Address Assignment
Example
An example will help to clarify IP Addressing and explain how addresses are
assigned in practice. Consider an organization that decides to form a private TCP/IP
Internet consisting of four physical networks. The organization must purchase routers
to interconnect the four networks and then must assign IP Addresses.
To begin, the organization must choose a unique prefix for each network. This is
usually done by the network administrator to ensure that numbers are not duplicated.
The administrator estimates the ultimate size of each physical network, and uses that
size to choose a prefix.
In this example, the organization expects one small network, two medium size
networks, and one extremely large network. With this information, the administrator
might choose to assign a Class C prefix to the small network, two Class B prefixes to
the two medium size networks, and a Class A prefix to the large network.
Host Suffixes
The IP address assigned to a host always begins with the prefix that has been assigned
to the hosts physical network.
The suffixes assigned to the hosts themselves, can be arbitrary numbers.
The two hosts attached to the 128.10 Class B network, have been assigned suffixes 1
and 2. They do not need to be assigned sequentially as indicated in the Class A
network where the hosts are identified as 37 and 49.
4-14
TCP/IP
IP
Ping (Packet Internet Grouper)
Ping is a command line utility used to test the connectivity between two devices and
most commonly used for troubleshooting purposes.
Limitations
TAC
A positive response from a pinged node does not mean that the all software or
hardware at the node is operating correctly.
4-15
IP
Ping Examples
Ping by IP address:
C:\>ping 207.76.105.9
Pinging 207.76.105.9 with 32 bytes of data:
Reply from 207.76.105.9: bytes=32 time=766ms TTL=105
Reply from 207.76.105.9: bytes=32 time=281ms TTL=105
Reply from 207.76.105.9: bytes=32 time=297ms TTL=105
Reply from 207.76.105.9: bytes=32 time=281ms TTL=105
4-16
TCP/IP
IP
Using Ping
Ping Command Line Switch Options
The Ping command provides the following switch options:
ping [-t] [-a] [-n count] [-l length] [-f] [-i ttl] [-v tos] [-r count] [-s count]
[[-j computer-list] | [-k computer-list]]
[-w timeout]
destination-list
Each of these switches is described below.
-t This tells Ping to continue pinging until it is interrupted by the user. This is useful
if you suspect cable problems because you can jiggle the wires without having to
keep typing the command.
-a This tells Ping to resolve the address to a computer name and display this as well.
-n count This is the number of echo requests that the command should send. As you
have seen, the default is four.
-l length By default, Ping sends 32 bytes of data. Using this option, you can increase
the size of the echo packet that is sent. This enables you to test packets up to 8192
bytes in size, which normally causes your packets to fragment.
-f This sets the do not fragment control bit in the IP header. Using this, you can
determine the maximum size of the packet that can be sent to a remote host. This
information can be used to optimize TCP/IP.
-i ttl This sets the Time to Live in the IP header, enabling you to control how long
the packet stays on the wire. You can use this to see whether your packets are
occasionally being sent through alternate routes that are causing them to time out.
-v tos This enables you to set the Type of Service field in the IP header. This can
be used to figure out what types of service are available on remote routers and hosts.
-r count This records the route that the packet took in the record route field. This can
record from 19 computers as specified by the value given as count.
TAC
4-17
IP
Using Ping
Ping Command Line Switch Options
-s count Tells the system to keep the timestamp information for the number of hops
given.
-j computer-list These are the systems (routers) that you want to send the packet
through. They enable you to set the route that the packet takes. The maximum number
you can enter is 9. The systems listed do not have to be joined directly to each other
(there can be other hops between them).
-k computer-list This is similar to the -j option. There cannot be other hops,
however, between the computers listed with this switch.
-w timeout This specifies the period Ping waits for the reply before deciding that the
host is not responding.
Destination-list This tells Ping which computer you want it to send echo requests
to.
4-18
TCP/IP
IP
DHCP (Dynamic Host Configuration Protocol)
DHCP is a protocol that dynamically assigns IP addresses to hosts in a network.
TAC
DHCP allows for each host to extract an IP address, subnet mask and
default router from the server
Requires:
-
DHCP server
4-19
IP
IPconfig
IPconfig is a command line utility used to display the IP configuration settings of a
computer.
It is used to check that all the appropriate configuration parameters are set up in the
PC operating system (Windows).
If you just enter IPconfig without any parameters, it will return the basic TCP/IP
configuration to the screen.
You can get additional information by entering IPconfig/all
Most of the other switches (which arent described here) are useful for DHCP and
multi NIC applications.
4-20
TCP/IP
TCP
TCP Message Types
TCP (Transport / Transmission Protocol)
TCP is a protocol developed for the Internet to get data from one network device to
another. TCP retransmission strategy is to ensure that data will not be lost in
transmission.
It is TCPs job to ensure that data is received reliably between source and
destination
TAC
Allows the computer the capability of sending information with out an actual
connection to another machine
All error processing and re-transmission must be taken care of from the
application program.
4-21
4-22
TCP/IP
Ch 5
Continuum IP
Contents
Continuum IDs
ACCNetID / Energy Net Id
CX / NetController Settings
Cyberstation
CX 9702
Layer 5 Addressing
TCP/IP Settings
IP Address
Subnet Mask
Teach
CommStatus / MaximumResponseTime
Probe Time
CX Error log
Data Exchange in Continuum
Point-to-Point
Import / Export
5-2
Continuum IP
Continuum IDs
ACCNetID / Energy Net Id
Each Network device in a Continuum system (workstations and
CX/NetControllers) has an assigned ACCNetID number.
This ACCNetID is also referred to as Energy Net Id through the Dumb Terminal
Interface.
The ACCNetID / Energy Net Id is assigned by the Continuum Administrator.
This ACCNetID attribute is used as a Network Address in the Continuum
system. All nodes use the ACCNetID attribute in addition to the IP Address when
sending messages.
The Valid Range for the ACCNetID / EnergynetId setting:
The same NetController seen through the eyes of the Dumb Terminal (left)
and the Workstation (right)
Dumb Terminal View
(Energy Net Id)
Workstation View
(ACCNetID)
TAC
5-3
Cyberstation Setting
ACCNetID attribute
of the workstation
5-4
Continuum IP
To
From
Continuum Continuum
Layer 5 Destination
Source
DATA
Continuum
World
DATA
Software
IP Addresses
DATA
NIC
Card
To
IP
Layer 3 Destination
IP
Source
From
Layer 2
MAC
Destination
To
TAC
MAC
Source
From
5-5
TCP/IP Settings
Enter the IP Address, Subnet Mask and Default Router assigned by the Network
Administrator.
After setting and saving the controllers TCP/IP settings, a reset must occur for the
controller to use these new settings.
Dumb Terminal View
5-6
Workstation View
Continuum IP
Teach
Teach is the application, which updates or "teaches" all Infinity controllers, including
the b4 controllers, about the Cyberstation device and teaches all Infinity controllers
about each other.
Performing a Teach on the network allows you to select from three different modes:
InfinityController Teach
Network Teach
Global Teach
When you install a workstation with an ACCNetID of 0, then it is not taught to the
CX Controllers.
Alarms and Events sent to the workstation with an ACCNetID of 0 will be forwarded
with an ACCNetID greater than 0 (191-254).
TAC
5-7
CommStatus / MaximumResponseTime
CommStatus
The CommStatus is an attribute that indicates whether a device is online or offline.
Each device on a Continuum network will maintain its own CommStatus list
of the other nodes.
PPP IP Address: If this is to be a dial-up network, you need to enter the Point-toPoint Protocol Address for the NetControllers commport3s RS-232 connection.
5-8
Continuum IP
ProbeTime
The Probe message is an are you on-line message that each node will send out
on a periodic basis.
The ProbeTime (60 sec. default) attribute of the Controller and Workstation
determines how often this takes place.
Each Controller on the Continuum Network will probe all nodes that it has been
taught that it has not heard from during that current probe cycle.
Increasing the probe time on all nodes will reduce the background
communications on the network. It will also increase the time it takes to discover
that a node is off-line.
Increasing the Probe Time of a single node will result in that node responding to
rather than initiating probes.
Workstation
Probe Time Attribute Setting
TAC
CX/NetController
Probe Time Attribute Setting
5-9
CX Error Log
CX controllers maintain an error log in memory. This may be requested by tech
support when assisting with site related problems
Accessed for reading only (you can not edit this error log)
5-10
Continuum IP
Point-to-Point
Import / Export
Point-to-Point
Used when:
-
TAC
(Point-to-Point)
Value is the
attribute of OAT
5-11
Probe
The CX / NetController can neither look at or set the value of objects in the
Cyberstation
Import / Export
(Point-to-Point)
5-12
Continuum IP
Benefits
o Data is retrieved only when you need it
o Retrieves any attribute of an object
Drawbacks
o Significant impact on the scan time (step 4)
Precautions
o Always check the CommStatus of the other controller before
retrieving data
TAC
5-13
Benefits
o Data is transmitted on change of value only
o Off-line controllers do not cause a program to disable or go to
line E
Drawbacks
o Can lead to significant network messages on analog values
o Freshness of data is unknown
Precautions
o Use threshold on analog inputs to reduce traffic
5-14
Continuum IP
Ch 6
BACnet IP
Contents
BACnet IP Network Definition
BACnet IP Concept
Addressing Within BACnet IP Networks
BACnet IP Broadcast Management
Single IP Subnet
Multiple IP Subnet
BACnet Broadcast Management Device Concept (BBMD)
Broadcast Distribution
Router Operations
Routing Between BACnet IP & Non-BACnet IP Networks
Routing Between Two BACnet IP Networks
BACnet IP Inter-network Design Conciderations
BACnet Over Ethernet Vs BACnet IP
Commissioning the b4920 Controller
b4920 Device Object Configuration
BACnet Device Editor
Address Resolution Protocol (ARP)
6-2
BACnet IP
B/IP Concept
A BACnet/IP network shall function in concept identically to the other non-IP
network types with respect to directed messages and broadcast messages, including
local, remote, and global broadcasts.
TAC
6-3
6-4
BACnet IP
BBMD Concept
BBMD's listen for all BACnet Broadcasts which are local subnet broadcasts. Their
job is to resend these broadcasts to devices on their subnets and to pass them to other
BBMD's on other subnets for further distribution. Since BACnet messages are Local
subnet IP broadcasts, services such as WHO IS/I Am, Alarm and COVNotifications
will not work beyond the local subnet without the use of a BBMD.
There are two methods for implementing the necessary functionality of the BACnet
Broadcast Management Device (BBMD).
Add BACnet device register with the BBMD. This is known as Foreign
device registration
TAC
All BACnet devices have their own view of the world and use the BBMD to
transmit to other devices beyond their limited view.
Only one BBMD per Subnet in accordance with the BACnet standard.
6-5
Broadcast Distribution
B/IP Network
BBMD
BACnet
Device
BACnet
Device
BACnet
Device
BACnet
Device
BACnet
Device
IP Router
Internet
IP Router
BBMD
BACnet
Device
6-6
BACnet IP
Router Operation
There are two possible differences:
1) On the B/IP side, the B/IP address is used in place of the MAC layer address.
2) If B/IP and non-B/IP BACnet devices reside on the same physical LAN, then all
traffic is typically sent and received through a single physical port. The collection
of B/IP devices would, in such a case, have a network number distinct from the
network number of the non-B/IP devices. Such a scenario could easily occur on an
Ethernet network where some devices are IP-capable while others are not.
Although the foreign registration process provides the ability for remote devices to
participate in a particular B/IP network, there may be occasions when it is desirable
for two collections of B/IP devices to interoperate more closely. This type of
interoperation can only produce results consistent with the assumptions and intent
contained in the original BACnet standard if the configuration of the two B/IP
networks has been coordinated.
For example, it is assumed that Device object identifiers are unique "internetwork
wide." If this is not the case, the Who-Is service will produce ambiguous results.
Similarly, the Who-Has service may be useless for dynamic configuration
applications if multiple instances of objects with identical object identifiers exist.
The BACnet standard also assumes that only a single path exists between devices on
different BACnet networks and that this path passes through a BACnet router. The
internet's web topology violates this assumption in that, apart from security
constraints such as "firewalls", any IP device can communicate directly with any
other IP device if it knows the device's IP address.
TAC
6-7
B/IP Routers
BACnet Routers are devices that interconnect two or more BACnet networks to form
a BACnet internetwork. BACnet routers make use of BACnet network layer protocol
messages to maintain their routing tables.
B/IP routers adhere to the requirements of BACnet routers with the following
differences:
1) The physical ports of standard BACnet routers are replaced by logical ports. Each
logical port is identified by the unique B/IP address of the port's connection to the
B/IP network served by the router.
2) The term "directly connected network" in BACnet implies a physical LAN
connection between a LAN segment and a physical router port. In the case of B/IP
"directly connected network" is extended to mean any B/IP network from which a
router can receive local broadcast or IP multicast messages. Such networks are:
3) Networks that are not directly connected are called "remote networks." Remote
networks, whether B/IP or non-B/IP, may be reachable by communicating using B/IP
with a router serving the remote network.
6-8
BACnet IP
Router Operation
Routing Between BACnet IP & Non-BACnet IP Networks
A BACnet router can be used to convey messages between devices on a B/IP
network and non-B/IP network.
BACnet
Field 1
Panel
Ethernet to
ARCNET
Router
Ethernet to
MS/TP
Router
BACnet
Field
Panels
TAC
6-9
Router Operation
Routing Between Two BACnet IP Networks
B/IP Network 1
BBMD
BACnet
Device
BACnet
Device
BACnet
Device
BACnet
Device
BACnet
Device
IP Router
Internet
IP Router
BBMD
BACnet
Device
B/IP Network 2
BACnet devices speak using IP directly
6-10
BACnet IP
TAC
6-11
WS
IP Network
Tunneling Router
BACnet Network
BACnet Device
BACnet Device
BACnet/IP
- BACnet devices are IP capable
(Do not require BTR)
WS
BACnet Device
6-12
BACnet Device
BACnet IP
TAC
6-13
6-14
BACnet IP
TAC
6-15
6-16
BACnet IP
TAC
6-17
4. From the BACnet Devices, perform a Send to Database from the controller that
was just created
Once a BACnet device has been saved to the Continuum SQL database, you can
open its device editor.
6-18
BACnet IP
Description
BACnet Network
Number
Model Name
Device Node ID
TAC
6-19
Device Status
Comm Status
Primary Access
Server
Secondary
Access Server
BACnet MAC
Address
Auto Download
Probe Time
Out of Service
6-20
BACnet IP
BACnet
Workstation
Location
Container Type
Default Folder
Reinitialize Device
Teach
Cold Start - When the controller comes up from a reset and recalls a backup copy
of the controllers original RAM database
Warm Start - When the controller comes up from a reset and recalls a copy of the
controllers database at the time the reset or power failure
occurred.
TAC
6-21
1) Click the Reinitialize Device button to bring up the Reinitialize Device dialog:
2) Click the State fields down-arrow button to open the dropdown menu and select
the desired reinitialize state (Coldstart or Warmstart).
3) Enter your password in the Password field. (Enter a password on third-party
BACnet devices only. Andover b3 and b4 controllers do not require a password.)
4) Click the OK button.
Teach
The Teach feature is implemented on Andover CyberStation devices only. It
is not implemented on BACnet devices.
6-22
BACnet IP
Supported
Services
Supported Object
Types
Vendor Name
Vendor ID
Software Revision
Firmware
Revision
Protocol Version
TAC
6-23
APDU Timeout
Segmentation
Support
Segmentation
Timeout
6-24
BACnet IP
TAC
6-25
Local Time
UTC Offset
Local Date
Daylight Savings
Synchronize to
Use the BACnetDevice window to locate the new
Local Time and
BACnet device. (See below.)
Date
Note: ACC represents EST as UTC 300, but BACnet is the opposite. The mapping
between ACC and BACnet UTC occurs automatically.
6-26
BACnet IP
Note: To remove a BACnet devices local time and date from the system, perform
steps 1 and 2 (above), and the click the Delete button.
TAC
6-27
IP Address: 169.254.1.1
Gateway: 0.0.0.0
Webserver Port: 80
EnergyNet ID: 1
BacNetMstpNetId: 2764
BacNetUDPNetId: 2765
During controller startup, there is a 2 minute window in which the controller will
be restored to factory defaults based on the following:
1. Seconds since startup is < 120
2. A Ping packet is received by the controller with a matching Ethernet
address but unmatched IP address.
3. Ping payload size of 255 bytes.
Prior to running the procedure, the controller must be on the same network as the
PC that that is used to issue commands.
Prior to running the procedure, you will need to have on hand (1) IP address that
is both valid and NOT in use on the network that the PC and Controller are
connected to.
6-28
BACnet IP
TAC
arp -s %1 %2
ping -l %3 %1
arp -d %1
6-29
6-30
BACnet IP
Ch 7
RS-485
Contents
What is RS-485
EIA (Electronics Industry Association)
Differential Data Transmission / Balanced Differential Signal
Shielded Twisted Pair RS-485 Network Schematic
RS-485 Transceiver
Voltage Differences
RS-485 Termination
UART (Universal Synchronous Receiver Transmitter)
Data Frames
- Start & Stop bits
- Frame Errors
7-2
RS-485
What is RS-485 ?
RS485 is an EIA (Electronics Industry Association) serial line standard that specifies
2-wire, half-duplex, differential line, multi-point communications.
Maximum cable length is 1200m.
Maximum data rates are 10Mbps at 1.2m or 100Kbps at 1200m.
EIA-485 can implement a truly multi-point communications network, and specifies
up to 32 drivers and 32 receivers on a single (2-wire) bus.
Multi-Drop Network
Balanced Line
Low cost
RS-485 type networks are used in Andover Controls Continuum IO and Infinet
networks.
The BACNet-MS/TP Field Buss is an RS-485 network.
RS-485 defines the 2 wire balanced line differential signaling method.
The RS-485 standard is an OSI layer 1 implementation.
TAC
7-3
7-4
Protocols
Repeaters
Media Conversion
RS-485
R1
120
R2
120
TAC
-7V to +12V
12K ohm
60 ohm
<250mA to 7V / +12V
7-5
RS-485 Transceiver
Line drivers and receivers more frequently called transceivers, are used to
exchange data between two or more points (nodes) on a network. Reliable data
communications can be difficult in the presence of induced noise and ground level
differences.
RS-485 (differential) was designed for long distances and higher Baud rates.
Data rates of up to 128K bits / second and distances up to 4000 Ft. can be
accommodated with RS485.
A multi-drop "type" application has many desirable advantages. A true multidrop network consists of multiple transceivers connected on a single bus, where
any node can transmit or receive data.
RS-485 meets the requirements for a truly multi-point communications network,
and the standard specifies up to 32 drivers and 32 receivers on a single (2-wire)
bus. With the introduction of "automatic" repeaters and high-impedance drivers /
receivers this "limitation" can be extended to many of nodes on a network.
RS-485 extends the common mode range for both drivers and receivers in the "tristate" mode and with power off.
RS-485 drivers are able to withstand "data collisions" (bus contention) problems
and bus fault conditions.
Transceivers are in a high impedance state when in receiver mode, having very
little effect on network signals. The transceiver switches to a low impedance state
when in driver mode. Only one transceiver can be in driver mode at a time. This
must be managed in the network protocol and is not a part of the RS-485
specification.
7-6
RS-485
Voltage Differences
RS-485 uses a principle where each signal uses one line of a twisted pair (TP) cable.
For RS-485, the cable can be up to 4000 feet (1200 meters) long.
Label one of the TP wires as Plus '+' and the other as Minus '-'.
The signal is inactive when the voltage at Plus is negative and the voltage at Minus is
positive. Otherwise, the signal is active with Plus being positive and Minus being
negative. It is the difference between the wires A and B that matters.
RS-485 is used for multipoint communications: more devices may be connected to a
single signal cable.
Many RS-485 systems use Master/Slave architecture, where each slave unit has its
unique address and responds only to packets addressed to this unit. These packets are
generated by the Master, which periodically polls all connected slave units.
Communication goes over the single line in both directions. It is important to prevent
more devices from transmitting at once.
In this RS-485 network, all devices are connected to a single Twisted Pair cable.
Thus, all of them must have drivers with tri-state outputs.
For a basic RS-485 system, we need an I/O driver with differential outputs and an I/O
receiver with differential inputs.
Noise and interference is introduced into the line; however, since the signal is
transferred via twisted pair cable, the voltage difference (between Plus and Minus) of
this interference is almost zero. Due to the differential function of the RS-485 input
amplifier of the receiver, this interference is eliminated. The same is true for crosstalk from neighboring lines, as well as for any other source of interference, as long as
the absolute maximum voltage ratings of the receiver circuits are not exceeded.
Differential inputs ignore different earth potentials of the transmitter and the receiver.
Twisted Pair cables used with the correct terminations, allow data transfer over large
multi node networks.
RS-485 circuits are more complex and more expensive. Higher data transfer speeds
require correctly connected and matched terminations, which can be a problem in
systems where the number of connected devices changes.
TAC
7-7
Voltage Differences
In a balanced differential system, the transmitter generates a voltage between 2 to 7V
(approx.) between the Plus and Minus outputs. Although the transmitter and the
receiver are connected with a ground wire (GND) as well, it is never used to
determine logic levels at the Plus & Minus wires.
This implies already mentioned tolerance of different ground potentials of the
transmitter and the receiver. RS-485 transmitters have an Enable input, allowing to
set the outputs to high impedance state, allowing several devices to share a single TP
cable.
RS-485 receivers react to voltage difference between the Plus & Minus inputs. If
VPlus/Minus is greater than 200mV, a logic level is defined on the receiver output.
For VPlus/Minus less than 200mV, the logic level is opposite.
Single Ended
5 Volts
0 Volts
Differential
+ 5 Volts
0 Volts
0 Volts
7-8
5 Volts
RS-485
RS-485 Termination
For correct operation of the transmitter and the receiver, a return signal path between
the grounding of individual devices is required. The ground is usually made by a third
wire, or by grounding each device.
All Andover Controls Controllers CX Controllers & Infinet Controllers and IOU
modules must be grounded.
For RS 485, the termination is somewhat more complex. Since each device
communicates bi-directionally, we are unable to determine where the transmitter and
where the receiver is. This changes constantly, according to which device transmits
at any given point in time.
Both ends of the line have to be terminated. However, it is not that easy. Since all
device have tri-state outputs, situations occur (very often every time the transmitting
device or data direction changes), when all transmitters are in high impedance state,
and the line, due to termination resistors, is in undefined state
In the practical application it is quite simple:
TAC
7-9
7-10
RS-485
TAC
7-11
7-12
RS-485
The UART will trigger on the leading edge of the start bit
This is how it makes its determination, not only for the start and stop bit, but each
individual data bit in between of what the value of each bit is.
TAC
7-13
7-14
RS-485
Because the data sampling is at dead center, we still receive a very accurate
representation of the data, even though the data signals are not that clean. This is
what allows RS-485 to be very tolerant of long wire runs and large number of
nodes on the network.
TAC
7-15
7-16
RS-485
Ch 8
Infinet
Contents
What is Infinet
Hardware Design Limitations (3 Basic Rules)
Cable Length
Maximum Nodes
Cable Specifications
Extending the Infinet
Infilink 200
Infilink 210
Signal Loss over Fiber Optic cable
Understanding / Calculating Propagation Delay
Infinet Protocol
Token Passing
Infinet ID
- Regular vs. Priority Nodes
Token Round Time
Reconfigure
Invitation
Learn
Replacing an Infinet Controller
Troubleshooting
Methodology (4 Steps)
Troubleshooting Tools and Techniques
Segmenting
InfiLink 200 LEDs
InfiLink 210 LEDs
Ringing out an Infinet Cable
Measuring Ground Potential
Evaluating Oscilloscope Signals
Testing Infinet Transceivers
Checking CX/CMX Port Configuration
8-2
Infinet
What is Infinet?
The Infinet is Andover Controls proprietary network that delivers data through a
Token Passing process.
The Infinet consists of;
Infinet Controllers
Communications Software
CX / NetControllers
The Infinet transmits data at a rate of up to 19.2 Kbps through twisted pair cable or a
combination of twisted pair and fiber optic cable.
The Infinet uses a Token-Passing data transmission protocol
TAC
8-3
GAUGE/
COND
WIRE
JACKET COLOR
24/2c
Stranded
Orange, Blue
24/2Pr
Stranded
Orange
WA241P-2000S
(12.5 pf/ft Low Cap)
WA242P-2108
(12.5pf/ft LowCap. Ind Shld)
Shield Grounding:
The Shield is Grounded at the:
CX/NetController
Infilink
8-4
Infinet
Bus Topology
To extend the Infinet beyond this limitation, the use of Infilink/s (Repeater/s) is
required.
TAC
8-5
Infilink 200
InfiLink 200 is both an electronic repeater and a central active hub in one device.
When acting as a central hub, the InfiLink 200 has five RS-485 ports available for
connecting several nodes.
Note: As a general rule, you should not exceed the maximum of 10 InfiLink
200s in an entire Infinet.
8-6
Infinet
Infilink
200
Infinet Controllers
Using InfiLink 200 to Extend Infinet
Star Configuration
Port 1 on the InfiLink 200 must connect to an incoming signal from the
CX/NetController. Ports 2-5 are for extending the Infinet.
You can have up to 31 controllers on each of the other four ports. This means that
using one InfiLink 200 as an active hub, you can connect 127 Infinet controllers in
a star to a 9000 controller.
Infilink
200
TAC
8-7
Infilink 210
Fiber Optic
Use fiber optic cable on that part of the Infinet that you run between buildings or
through a noisy environment.
You can extend each fiber optic cable segment up to 6,561 ft (2,000 m)
The InfiLink 210 serves as a central (active) hub, with one RS-485 port where you
wire the cable from the Infinet you are extending, and two other ports designed to
connect fiber optic cable with ST connectors.
Shield Grounding
+
Shield (Floating)
GND
Note: As a general rule, you should not exceed the maximum of 10 InfiLink
210s in an entire Infinet.
8-8
Infinet
Infilink
210s
Fiber Optic
Cable
Network
Segment
Fiber Optic Cable
Infinet Controllers
Infilink
210s
Infinet Controllers
Daisy-chaining Infilink 210s to extend the Infinet
TAC
8-9
NetController
Infilink
210
Fiber Optic
Cable
Infinet Controllers
8-10
Infinet
TAC
8-11
Delays vary depending on the hardware you install. For example, delays
associated with wire differ from delays associated with fiber optic cable.
8-12
Infinet
InfiLinks
Seg-5
Seg-6
Seg-4
i2-Series
Seg-7
Seg-3
Line Driver
Seg-8
Line Driver
Seg-2
SCX
Seg-9
Seg-1
63.71
8
12
-----------83.71 s Total Propagation Delay
TAC
8-13
Infinet Protocol
Token Passing
Token Passing is a system governing network data transmission.
The token is an electronic signal.
1. The token passing protocol sends a single token (an electronic signal) to
each controller sequentially.
2. Token Passing is managed by the CX / NetController.
3. When an Infinet controller receives the token, it immediately transmits all
of its new exports, alarms, and access events.
4. The export data broadcasts over the network and is heard by all other
controllers.
5. The token then passes back to the CX / NetController, where the process
repeats. If an Infinet controller has no data to transmit, it passes the token
back to the CX / NetController.
6. An Infinet controller can issue a response to a request from a CX /
NetController without having the token.
Infinet ID#
The Infinet ID number is a unique number assigned to Infinet controllers (nodes)
during the Learn process that is performed through Continuum Software.
Infinet Controllers (nodes) fall under two categories; Regular & Priority.
The range of the Infinet ID number assigned is different depending on which
category the node fall under.
8-14
Infinet
Infinet Protocol
Infinet ID#
Regular Nodes
Most Infinet Controllers are regular nodes
Infinet ID numbers assigned to regular nodes fall between 1 and 127
(The number 0 is reserved for controllers not yet assigned an ID)
TCX 800
ID#
1
2
TCX 850
CX/NetController
ID#
2
3
4
ID#
255
TCX 870
ID#
3
6
7
8
TCX 810
ID#
4
TAC
8-15
Infinet Protocol
Infinet ID#
Priority Nodes
Priority nodes are Infinet controllers that require quicker access to the Infinet than
other nodes.
Infinet token passing gives priority controllers more frequent access to the token
than regular controllers have.
The following are Priority Nodes:
CX / NetController
(255 is reserved for the 220/240 series or 9000 series controllers)
Infinet ID numbers assigned to priority controllers fall between 224 and 254
8-16
Infinet
Infinet Protocol
Infinet ID#
Regular & Priority Nodes
Token Passing sequence on a network that contains both Regular and Priority Nodes.
Regular
Nodes
TCX 800
ID#
1
1
Priority
Nodes
CX/NetController
TCX 850
ID#
255
ID#
2
5
TCX 870
3
ID#
3
ACX 781
ID#
224
TCX 810
7
TAC
ID#
4
8-17
Infinet Protocol
Token Round Time
The time for a token to go through all of the controllers on an Infinet at 19.2 Kbps is
the Token Round Time. Token round time is a function of:
How many point requests are coming from the CX (due to activity on a
Graphic, updating of a List View or a Group Member list).
For a CX controller with 127 regular Infinet controllers attached, the Token Round
Time can range from 6 to 15 seconds, depending on the amount of network traffic.
If an Infinet controller cant respond to the token, then the CX/NetController cant
receive the alarm, which in turn will not be delivered to the workstation for time
stamp and database logging.
Reconfigure / Polling
Infinet reconfigure is the polling process that determines which nodes will participate
in token passing. Anytime the token passing process is interrupted, a reconfigure will
occur. The following will lead to a reconfigure:
8-18
Infinet
Infinet Protocol
Reconfigure / Polling
Any nodes with a non-zero id will respond to the poll and be passed the token when
token passing resumes. The CX/NetController will update the CommStatus attribute
to online or offline for all Infinet controllers on that Infinet, based on whether or not
there was a response to the poll. Those that are online will participate in the token
passing.
If an Id number does not exist on the network, that particular Id will be polled for
twice before continuing on to the next Id number. Non-existing Id numbers are stored
within the CX / NetController for comm status and potential issue to new Infinet
controllers joining the Infinet.
At the completion of the polling process, the CX/NetController will broadcast the
current Date & Time and then initiate token passing.
If there is no CX/NetController on the Infinet, the lowest ID Infinet controller will
initiate the polling process and upon completion the token passing will resume.
Import/Export will continue to occur between those Infinet controllers. However,
alarms that occur can not reach the CX / NetController and will not be delivered to
the Workstation
Each time there is a reconfigure, the reconfiguration attribute of the commport will
increment by one. The reconfiguration attribute will max out at 255 and will need to
be reset before it will again increment.
TAC
8-19
Infinet Protocol
Invitation
At the end of each token round, the CX/NetController will send out an Invitation
message. This allows any Infinet controller not currently token passing (just
powered up) to respond. Any response to the invitation (including a framing
error) will lead to the CX/NetController initiating a reconfigure.
Learn
The learn process is a method of automatically assigning Infinet Ids to newly
added Infinet Controllers whose Ids are currently zero.
The CX/NetController performs a binary search by serial number for all Infinet
controllers attached to that comport. As the CX/NetController identifies each
Infinet controller, it follows this sequence:
Request of Infinet ID
o Is ID 0?
The Learn process Ids new Infinet Controllers and does not affect existing
controller Ids. Ids will be assigned in order of Serial number, from lowest to
highest, of those new controllers.
Learn is only for adding new controllers, not for replacement.
8-20
Infinet
TAC
8-21
Infinet Troubleshooting
Methodology (4 Steps)
The troubleshooting methodology shows you how to efficiently identify problems
and their causes throughout the network.
The first two steps in troubleshooting require the most time, but are the most
crucial. The more thoroughly and accurately you complete steps 1 and 2, the
sooner you can isolate, correct the problem and minimize the amount of time that
the impaired network leg is disabled.
A list of all symptoms. Run tests to make sure the symptoms list is as
complete as possible. This list and the network documentation
combined enable you to define the problem and focus your
troubleshooting.
8-22
Infinet
Infinet Troubleshooting
Methodology (4 Steps) cont
3. Fix the Problem
Once you know the wire segment or device (controller or InfiLink, for
example) that is causing the problem, you can fix the problem by repairing or
replacing the malfunctioning device or defective cable.
4. Verify the Solution
Now is the time to verify that your solution has really fixed the problem.
To verify the solution, you need to:
If your tests and symptoms list identify no symptoms, then the problem has
been fixed.
If symptoms persist, repeat the troubleshooting process from the beginning.
TAC
8-23
Infinet Troubleshooting
Defining the Problem on Infinet
Defining any communications problem within Infinet requires preparing a
network asbuilt map, compiling a list of symptoms and comparing the two
documents.
Preparing an Asbuilt Map
An asbuilt map documents every network component and presents the
network as it is actually constructed, identifying:
Approximate distances of all twisted pair and fiber optic cable runs
throughout the network.
An asbuilt map differs from the network map that usually reflects the
networks configuration guide. Preparing and thoroughly documenting an
asbuilt map can save you time when troubleshooting and becomes particularly
useful when you need to:
8-24
Infinet
Infinet Troubleshooting
Defining the Problem on Infinet cont
Recognizing Symptoms Common to Infinet Problems
The most common symptoms pointing to a problem with Infinet
communications are:
TAC
8-25
Infinet Troubleshooting
Defining the Problem on Infinet cont
Compiling a Symptoms List
A symptoms list helps you:
Determine the actions you need to take or tools you need to apply to
isolate the problem.
8-26
InfinetError
InfinetErrCount
InfinetErrTime
Infinet
Infinet Troubleshooting
Defining the Problem on Infinet cont
Point-to-Point Communication
Programs that utilize point-to-point communications may disable in response
to unsuccessful attempts at retrieving information.
Unsuccessful attempts at retrieving information can include, for example,
trying to retrieve information that the controller cannot have or attempting to
perform an illegal function such as dividing by zero.
When unsuccessful, the program sets its own state to Disable.
TAC
8-27
Infinet Troubleshooting
Identifying the Cause of an Infinet Problem
Once you have your symptoms list, you can try to identify the cause of the
problem.
Single node
Network segment
Global network
8-28
Infinet
Infinet Troubleshooting
Troubleshooting Tools and Techniques
Use the following tools and techniques to help identify the causes of Infinet
communications problems:
Verify the integrity of the wire run (also called ringing out cable runs)
with a meter.
Note: The order in which you apply troubleshooting tools and techniques
depends on the symptoms that you identify.
For example, if a controller does not come on line, you might first look at LEDs
on that controller. However, if you know that the wiring preceding the controller
is not defective, then you might choose to segment the network beyond the
controller as a first step.
TAC
8-29
Infinet Troubleshooting
Segmenting the Infinet
Segmenting the network is a technique that helps you identify the location and
cause of the problem. The easiest method to follow when segmenting is to
disconnect one leg of the InfiLink at a time. With each disconnect, determine if
the symptoms disappear. Continue segmenting until you can isolate the problem.
8-30
Infinet
Infinet Troubleshooting
Segmenting the Infinet cont
4. When you identify the offending leg, further segment that leg (segments #3
and #4 in the example shown) continuing the process until you can isolate the
problem to:
TAC
8-31
Infinet Troubleshooting
Troubleshooting From the InfiLink 200 LEDs
Understanding the functionality of the LEDs on the Infilink 200 will help when
troubleshooting the Infinet.
8-32
Infinet
Infinet Troubleshooting
Troubleshooting From the InfiLink 200 LEDs cont
Baud Rate
The baud rate set on the InfiLink 200 should match the rate set for Infinet in
the software.
Check the comm port Baud attribute setting using PRINT on the
Command line
or
Open the comm port window using FileOpen from the menu bar.
Fuses
If AC power to the InfiLink 200 fails but power is actually available, check the
3A, 250V, 3AG, slow blow fuse.
You can use the 3A slow blow fuse on 115 V links as well as on 230 V links.
TAC
8-33
Infinet Troubleshooting
Troubleshooting From the InfiLink 210 LEDs
Understanding the functionality of the LEDs on the Infilink 210 will help when
troubleshooting the Infinet.
Three pairs of green and yellow LEDs appear on the front of the 210 enclosure:
The top pair of (green and yellow) LEDs indicates the status of fiber optic
Port 1.
TD LED
Each yellow light, labeled TD, flashes to indicate that data is being
transmitted over the fiber optic cable or through the Infinet port.
RD LED
Each green light, labeled RD, flashes to indicate data is being received over
the fiber optic cable or through the Infinet port.
Power
The single red light labeled POWER indicates the InfiLink 210 is receiving
power.
8-34
Infinet
Infinet Troubleshooting
Troubleshooting From the InfiLink 210 LEDs
Baud Rate Setting
The baud rate set on the InfiLink 210 should match the rate set for Infinet in
the software.
Check the comm port Baud attribute setting using the PRINT
Command
or
Open the comm port window using FileOpen from the menu bar.
TAC
8-35
Infinet Troubleshooting
Ringing Out an Infinet Cable
Method 1:
A common practice for verifying that a length of cable works is to twist the two
conductors together at one end, go to the other end of the cable, and Ohm out the
run to see a short (0 ).
Method 2:
Place one resistor (250), between plus (+) and minus () at one end of the cable
Place the second resistor (500), between the plus (+) and shield of the cable
Go to the other end of the cable and ohm out plus to minus (+ to ) and plus (+) to
Shield.
STP Cable
+
Shield
250
500
8-36
Infinet
Infinet Troubleshooting
Measuring Ground Potential
Signal Potential refers to the horizontal plane along which signals are sent and
received with respect to ground.
RS-485 requires that all devices communicating with each other be at a
reasonable ground potential.
TAC
8-37
Infinet Troubleshooting
Evaluating Infinet Signal Levels with an Oscilloscope
An oscilloscope is a valuable tool for troubleshooting Infinet, and can also improve
your efficiency in solving intermittent wiring problems.
When using the oscilloscope, be sure you begin testing at the CX/NetController or at
an InfiLink port.
Infinet Signal Basics
8-38
Infinet
Infinet Troubleshooting
Evaluating Infinet Signal Levels with an Oscilloscope
The Ideal Signal
5V
0V
2V/Div
5V
0V
.1 ms/Div
Ideally, RS-485 signal levels are approximately .5 to 4.5V, with the negative
connection appearing as a true representation of data (data 0 = low; data 1 = high)
and the positive connection being the opposite (inverted) of the negative
connection.
On long cable runs with many Infinet devices attached, signal levels often
attenuate (weaken). This situation does not present any problems as long as the
positive (low) signal has lower amplitude than the negative (high) signal.
You can use a protocol analyzer to check the RS-485 signal level (rather than an
oscilloscope), since you are only concerned with the effects of attenuation on the
signal levels at this time.
TAC
8-39
Infinet Troubleshooting
Evaluating Infinet Signal Levels with an Oscilloscope
Short on the Minus (-) to Ground
5V
+
0V
2V/Div
5V
0V
.1 ms/Div
The signal trace shown indicates a short from ground or a short to ground exists
on the leg of the Infinet.
8-40
Infinet
Infinet Troubleshooting
Evaluating Infinet Signal Levels with an Oscilloscope
Shorted Transceiver on an Infinet Device
5V
0V
2V/Div
5V
0V
.1 ms/Div
The signal trace shown indicates that at least one Infinet controller has a shorted
transceiver (+).
TAC
8-41
Infinet Troubleshooting
Evaluating Infinet Signal Levels with an Oscilloscope
Infinet Device at a Different Ground Level
5V
2V
0V
2V/ Div
5V
2V
0V
.1 ms/Div
Signal potential refers to the horizontal plane along which signals are sent and
received with respect to ground.
Signal transmission and receipt must occur within the same range of potential.
8-42
Infinet
Infinet Troubleshooting
Evaluating Infinet Signal Levels with an Oscilloscope
Open on the Plus (+) Signal
5V
0V
2V/Div
5V
0V
.1 ms/Div
A signal with an open on the positive (+) connection (or an open 27 resistor)
displays a disintegrating signal trace.
TAC
8-43
Infinet Troubleshooting
Testing Infinet Transceivers
Voltage spikes appearing on the Infinet can damage Infinet transceivers. You can
use a voltmeter to easily test transceivers for damage, as follows:
1. Disconnect the controller from Infinet.
2. Connect an input to the plus (+) connection.
3. Record a DC voltage reading between plus (+) and ground and between minus
() and ground.
Either reading occurring outside a range of 1.5 to 3.5 volts DC indicates a
damaged transceiver.
Note: To achieve a valid reading, you must measure within ten seconds of reset.
You can take the measurement while holding down the RESET button.
8-44
Infinet
Infinet Troubleshooting
Checking CX/CMX Port Configuration
Checking Port Connection with a CyberStation
1. From the object tree, double left click the CommPort object class to open
the list of the controllers comm ports.
2. Look for Autoset comm ports.
3. Double left click the desired port to open the Object Configuration window.
4. Click Details to open the Communication Configuration window.
5. Check the Baud Rate.
Make sure that Track CXD is not selected and that Flow Control is set for
NoFlowControl.
6. If it is not possible to check the controllers comm ports through a
CyberStation, check the controllers Installation Guide for port defaults.
TAC
8-45
8-46
Infinet
Ch 9
Continuum
IO Bus
Contents
Introduction:
Cable Specs
Cable Termination
- Free Vs Doubly
IO Protocol
Adding / Replacing IO Modules
I/O Module Configuration / Commissioning:
New IO Module
Replacement IO Module
Defining Program ID
9-2
Introduction
IO Bus System Description
The Continuum IO Bus is Andover Controls proprietary network that allows
communications to the NetController (CPU).
Network Interfaces
There are 2 networking interfaces available for Continuum IO modules:
TAC
9-3
Note:
For IO Bus power specifications, refer to the Continuum Hardware manual.
9-4
Termination must be connected at both ends of the bus for proper operation
The 120 termination resistors are placed across the communication lines
pins 1&2
Local IO modules do not require termination
NetController
Local
IO
Local
IO
Local
IO
Local
IO
Local
IO
Local
IO
(CPU)
NetController
(CPU)
5
4
3
2
1
5
Local
4
IO
Modules 3
2
1
120
Resistor
Remote
IO
Modules
5
4
3
2
1
Remote
IO
Modules
120
Resistor
Note:
If no local Modules exist, termination will occur across pins 1&2 at the
NetConroller (CPU).
TAC
9-5
LON FTT-10A
The FTT-10A transceiver option for the IO Bus allows for flexible wiring
configurations.
9-6
R1
52.3 1%
R1
TAC
105 1%
9-7
Power Supply
CPU
I/O
I/O
Doubly Terminated
I/O
I/O
I/O
52.3
Power Supply
CPU
105
1
I/O
Power Supply
CPU
I/O
I/O
I/O
I/O
I/O
I/O
I/O
I/O
2
3
I/O
105
1
52.3
Free Topology
Doubly Terminated
I/O
I/O
3
2
I/O
52.3
I/O
105
4
3
105
1
Power Supply
CPU
Power Supply
I/O
9-8
CPU
I/O
I/O
I/O
I/O
I/O
I/O
I/O
I/O
Doubly Terminated
I/O
I/O
I/O
I/O
I/O
Power Supply
I/O
I/O
I/O
I/O
I/O
I/O
CPU
I/O
Power Supply
CPU
52.3
1
I/O
I/O
I/O
I/O
I/O
I/O
I/O
I/O
I/O
I/O
Free Topology
I/O
Doubly Terminated
I/O
I/O
I/O
I/O
I/O
I/O
I/O
I/O
I/O
I/O
I/O
I/O
I/O
1
I/O
1
105
I/O
Power Supply
CPU
I/O
105
I/O
I/O
I/O
105
I/O
I/O
2
I/O
105
I/O
52.3
Power Supply
CPU
I/O
I/O
I/O
1
I/O
I/O
I/O
I/O
I/O
I/O
I/O
I/O
I/O
I/O
I/O
I/O
TAC
I/O
I/O
9-9
IO Protocol
The I/O utilizes a polling protocol in which information is retrieved from I/O
modules. The poll is asynchronous to the NetController scan. A poll is different
from Infinet token passing in that information is pulled from the I/O modules. They
are not given the opportunity to talk on the bus.
The NetController polls each I/O module on the bus by ModuleID number and
retrieves sensed input values and selected output status such as override conditions.
The polling interval is predictable based on the number of modules the NetController
must poll.
I/O modules are polled at a 50ms rate. If less than four modules are involved the
polling rate is 200ms.
The actual setting of the outputs is synchronized with the NetController scan. On
step 5 of the scan, the NetController sends out a message to each of the outputs on the
I/O bus, setting their values in accordance with schedule or program updates.
The Access Controls series module is treated differently in that it gains immediate
communications access to send unsolicited messages on the I/O bus to request card
validation information from the NetController. Its access to the Network is collision
based (like the Ethernet) and occurs between polls.
9-10
TAC
9-11
If the module is in a remote location, the person configuring the module has
written down the Module Id # that located on the inside cover of the module
4. In the Object Name text box, enter a name for the IOU module and then select
the Create button.
9-12
TAC
9-13
Wink
The Wink button is used to confirm that your system recognizes the IO module.
Note:
This procedure is used for all modules except when replacing an AC-1 with an AC-1
Plus.
1. Re-open the IOUModule editor.
2. Click the Wink button.
The Status light on the IOU module should flash which indicates that the IOU
module was successfully configured
9-14
Note:
For the AC-1 Access module, reload the door.
TAC
9-15
Defining Program ID
The Program ID Displays the number that Andover Controls has assigned this
particular module.
Continuum will fill this number in for you. The only time you will need this number
is when speaking to an Andover Support Representative.
Program Id can define the IO modules software revision.
Program_id example: bb:Aa:qq:Mm:NI:NO:NR:NK
Each field depicted is a 2-digit hex value and defined as:
9-16
bb
Aa
Mm
NI
NO
NR
NK
Ch 10 MS/TP
Contents
MS/TP Overview
Physical Layer
Media & Characteristics
Connections & Terminations
Repeaters
Andover & MS/TP
Polling Issues
Assigning / Duplicate Ids on the MS/TP Network
Adding Andover Devices
MS/TP Enhanced Mode
Identifying BACnet IP & MS/TP Network Numbers
BacMaxMaster
10-2
MS/TP
TAC
10-3
Physical Layer
Media & Characteristics of an MS/TP Network
Because MS/TP uses NRZ encoding, the polarity of the connection to the
cable is important. The non-inverting input of the EIA-485 transceiver is
designated in this specification as plus "+" and the inverting input as minus "".
It is recommended, but not required, that the black or red insulated wire of the
twisted pair be designated as the "plus" and the white, clear, or green insulated
wire be designated as the "minus."
Termination:
-
10-4
MS/TP
Physical Layer
Connections & Terminations
RS-485 MS/TP Network
For any physical segment that runs between buildings there shall be at least 1500 V of
electrical isolation between the EIA-485 signal conductors and the digital ground of
any node on that physical segment.
The shield shall be grounded at one end only to prevent ground currents from being
created.
TAC
10-5
Repeaters
To exceed MS/TP segment limitations, one or more repeaters are required.
An MS/TP EIA-485 Repeater is defined as an active device that provides selective
interconnection between two or more segments of MS/TP cable. The repeater
contains a logic that detects and passes signals received from one segment onto all
other segments.
The segment from which signals are received is determined according to a priority
algorithm.
B4920
System Controller / Router
MS/TP
RS-485
10-6
B-Link
MS/TP
A periodic poll for masters that take place every 40 Token rounds.
Any device that is not passing the token to an ID of one above its own, will
poll for all IDs between its own and the one it is next to pass to.
- This can be problematic on a small MS/TP network where the highest ID
will periodically poll for all IDs up to 127
- You can set a MAX ID for the MS/TP network to reduce this unnecessary
polling
TAC
10-7
Note: It is a wise idea to write down all the type of devices that reside on the
MS/TP network along with their assigned Id numbers.
b3s require a b4 -920 as the router ( they cannot be assigned to an MS/TP
network under a third party router)
10-8
MS/TP
TAC
10-9
By default each device will be assigned the same UDP (User Datagram
Protocol) port number.
Each MS/TP bus is to have a unique BACnet Network Number. This will
put all the BACnet IP devices on the same network.
All BACnet IP devices should have the same BACnet Network Number
on that sub-net.
10-10
MS/TP
TAC
10-11
10-12
MS/TP
TAC
1 High Street North Andover, Massachusetts 01845 USA
Tel: 978 470 0555 Fax: 978 470 0946
http://www.tac.com
TAC Ltd.
Smisby Road Ashby-de-la-Zouch Leicestershire LE65 2UG, England
Tel: 01530 417733 Fax: 01530 415436
TAC GmbH
Am Seerhein 8 D-78467 Konstanz, Germany
Tel: 07531 99370 Fax: 07531 993710
TAC S.A.
93 Avenue de Fontainebleau 94270 Le Kremlin-Bicetre, France
Tel: 49 60 63 63 Fax: 49 60 62 71
TAC
707 Chinachem Golden Plaza 77 Mody Road, Tsimshatsui East
Kowloon, Hong Kong
Tel: 2739 5497 Fax: 2739 7350
Copyright 2006, TAC
Data subject to change without notice.
All brand names, trademarks and registered trademarks are the property
of their respective holders.
Document Number: 31-3001-763 Version: 1