Sei sulla pagina 1di 31

UNIVERSITI TEKNOLOGI MARA

FACULTY OF MECHANICAL ENGINEERING

Computer Integrated Manufacturing: Control


Networks & Field-Bus Systems

CHAPTER 3:
3.1 Topology, media access control and choice of physical medium
3.2 Comparison of distributed I/O systems and distributed processing with
more convenient centralized approaches to automation.
3.3 Distributed real time control and device integration.
3.4 Importance of interoperability between manufacturing devices.
3.5 Advantage of modularity and the importance of standards in control system
hardware and software design.
RJ, CIM JULY 2009

Communications Networks in
Manufacturing

The emphasis on CIM is on the


communication linkage made by the
computer between the various software
subsystems that drive the manufacturing
operations & support functions.
CIM requires an information processing
that ties all of these needs together on-line.

Manufacturing Computerization

Design engineering function has


NC machining function has
Production & inventory control function
has
Process planning function has

Interfacing

Different standards, vendors and users of machines must


be compatible to link together in order to be
interconnected in CIM system.
Information passed between microprocessors &
automation equipment is by using serial or parallel I/O
devices.
Use serial or parallel communications (basically an
interconnector device from one device to another).
RS232C the most popular serial interface to connect
computer peripherals.
RJ, CIM JULY 2009

Interfacing

For faster data transfer rate, a parallel


interface is required that is able to manage
transfer of information between several
devices. The standard is IEEE488.

LOCAL AREA NETWORKS

LAN is the primary means of interconnecting devices in


an automated system to achieve CIM.
What is a network? A network consists of two or more
computers that are linked in order to share resources (such
as printers and CD-ROMs), exchange files, or allow
electronic communications.
The computers on a network may be linked through
cables, telephone lines, radio waves, satellites, or infrared
light beams.

RJ, CIM JULY 2009

LOCAL AREA NETWORKS

The three basic types of networks include:

Local Area Network (LAN) look at basic


types of topology.
Wide Area Network (WAN)
Wireless Local Area Networks allows
equipment such as data collection devices
such as bar code readers to have network
connections. Slower than hard wired
networks.
RJ, CIM JULY 2009

TOPOLOGY
What is a Topology?
The physical topology of a network refers to the
configuration of cables, computers, and other peripherals.
Types of topologies:
Linear Bus
Star
Star-Wired Ring
Tree

RJ, CIM JULY 2009

STAR NETWORKS/TOPOLOGY

The central control/station is called a server because its


network role is to make the interconnection between the
various robots, NC machines & automation devices that
need to communicate.
Suitable for situations that are not subject to frequent
configuration changes. All message pass through a central
station.
This is not a popular type of LAN for CIM. Telephone
systems in office buildings usually have this type of
topology.
RJ, CIM JULY 2009

Star layout for a LAN. All messages must be routed


through a central server.

RJ, CIM JULY 2009

10

TOPOLOGY
Star

A star topology is designed with each node (file server, workstations,


and peripherals) connected directly to a central network hub or
concentrator.

Data on a star network passes through the hub or concentrator before


continuing to its destination. The hub or concentrator manages and
controls all functions of the network. It also acts as a repeater for the
data flow. This configuration is common with twisted pair cable;
however, it can also be used with coaxial cable or fiber optic cable.
Advantages of a Star Topology

Easy to install and wire.

No disruptions to the network then connecting or removing devices.

Easy to detect faults and to remove parts.


RJ, CIM JULY 2009

11

TOPOLOGY
Disadvantages of a Star Topology

Requires more cable length than a linear topology.

If the hub or concentrator fails, nodes attached are disabled.

More expensive than linear bus topologies because of the cost of the
concentrators.

RJ, CIM JULY 2009

12

RING TOPOLOGY
All individual user stations
are connected in a continuous
ring. This message is
forwarded from one station to
the next until it reaches its
assigned destination. If any
station fails, the entire
network will shut down.

RJ, CIM JULY 2009

13

BUS TOPOLOGY

All stations have independent access. This


system is reliable and easier than the other
two to service.

RJ, CIM JULY 2009

14

TOPOLOGY
Linear Bus
A linear bus topology consists of a main run of
cable with a terminator at each end. All nodes
(file server, workstations, and peripherals) are
connected to the linear cable.
Advantages of a Linear Bus Topology
Easy to connect a computer or peripheral to a
linear bus.
Requires less cable length than a star topology.
Disadvantages of a Linear Bus Topology
Entire network shuts down if there is a break in
the main cable.
Terminators are required at both ends of the
backbone cable.
Difficult to identify the problem if the entire
network shuts down.
Not meant to be used as a stand-alone solution
in a large building
RJ, CIM JULY 2009

15

(1) ETHERNET

The most popular type of LAN. Uses a simple coaxial cable as


a bus. How can control of messages be managed when the only
interconnector is a simple two-wire cable? The answer is
through software. Each device on the network has a
transceiver responsible for encoding each message the device
is sending and for decoding each message it receives.
Each batch of information is called a packet represent
packages of data to be put on the network for delivery to one or
more devices that contains all source and destination
information to enable it to be properly received by only the
device for which it is intended.

RJ, CIM JULY 2009

16

ETHERNET

One of the many protocols. A protocol is a


set of rules that governs the
communications between computers on a
network. These rules include guidelines
that regulate the following characteristics
of a network: access method, allowed
physical topologies, types of cabling, and
speed of data transfer.
RJ, CIM JULY 2009

17

ETHERNET

Suppose two devices want to put a message on the


Ethernet at the same time. The answer is that the
messages will actually collide. A protocol called
CSMA/CD (carrier sense multiple access with collision
detection) handles this problem.
Other access-control methods are the token ring &
token bus. Only the device that has the token is allowed
to transmit, while all of the other devices only receive.

RJ, CIM JULY 2009

18

ETHERNET

When message collide, both of the sending


devices are notified by the CSMA/CD, which
jams the entire network so that all devices will
stop transmitting. After waiting an appropriate
time, device transceivers can again attempt to
transmit messages.

RJ, CIM JULY 2009

19

Ethernet LAN network. Two networks are joined by


a repeater to form one Ethernet.

RJ, CIM JULY 2009

20

(2) TOKEN RINGS

Another strategy for constructing a LAN avoids the problem of


message collisions by providing a message carrier that travels
around to all devices connected to the network token ring.
A single electronic token moves around the ring from one
computer to the next. If a computer does not have information
to transmit, it simply passes the token on to the next
workstation. If a computer wishes to transmit and receives an
empty token, it attaches data to the token. The token then
proceeds around the ring until it comes to the computer for
which the data is meant. At this point, the data is captured by
the receiving computer.
RJ, CIM JULY 2009

21

TOKEN RINGS

The Token Ring protocol requires a star-wired


ring using twisted pair or fiber optic cable. It can
operate at transmission speeds of 4 Mbps or 16
Mbps.
Disadvantage: Each device must have a repeater,
slower than Ethernet because messages can be
sent only by the device that has the token, and
only if the token in free at that time.

Token ring LAN. The token follows a fixed path and


makes a complete loop.

RJ, CIM JULY 2009

23

(3) TOKEN BUSES

This is a combination of the concepts of


token rings and the Ethernet bus.
There are 2 routing modes for the token.
When carrying a message, the token goes
directly from source to destination. When
the token is empty, it makes the complete
loop, following the chain, while looking for
new messages to send.

NETWORK CABLE

Cable is the medium through which information usually


moves from one network device to another. The type of
cable chosen for a network is related to the networks
topology, protocol and size.
Types of cable:
Unshielded Twisted Pair (UTP) Cable
Shielded Twisted Pair (STP) Cable
Coaxial Cable
Fiber Optic Cable

RJ, CIM JULY 2009

25

NETWORK CABLE
Unshielded Twisted Pair (UTP) Cable

Twisted pair cabling comes in two varieties: shielded and unshielded.


Unshielded twisted pair (UTP) is the most popular and is generally
the best option for school networks.

The quality of UTP may vary from telephone-grade wire to extremely


high-speed cable. The cable has four pairs of wires inside the jacket.
Each pair is twisted with a different number of twists per inch to help
eliminate interference from adjacent pairs and other electrical devices.
The tighter the twisting, the higher the supported transmission rate
and the greater the cost per foot.

RJ, CIM JULY 2009

26

NETWORK CABLE
Coaxial Cable
Coaxial cabling has a single copper conductor at its
center. A plastic layer provides insulation between the
center conductor and a braided metal shield (See fig. 3).
The metal shield helps to block any outside interference
from fluorescent lights, motors, and other computers.

RJ, CIM JULY 2009

27

Protocol Summary

PROTOCOL

CABLE

SPEEED

TOPOLOGY

ETHERNET

TWISTED PAIR,
COAXIAL ,
FIBER

10Mbps
(data transmission
on rate)

STAR

Next chapter:
Communication standards - MAP

RJ, CIM JULY 2009

28

Networking Hardware

Networking Hardware

Switch: A concentrator is a device that provides a central


connection point for cables from workstations, servers,
and peripherals
Repeaters: Since a signal loses strength as it passes along
a cable, it is often necessary to boost the signal with a
device called a repeater. The repeater electrically
amplifies the signal it receives and rebroadcasts it.
Repeaters can be separate devices or they can be
incorporated into a concentrator. They are used when the
total length of your network cable exceeds the standards
set for the type of cable being used.

Networking Hardware

Bridges: A bridge is a device that allows you to segment


a large network into two smaller, more efficient networks.
If you are adding to an older wiring scheme and want the
new network to be up-to-date, a bridge can connect the
two.
Routers: A router translates information from one
network to another; it is similar to a super intelligent
bridge. Routers select the best path to route a message,
based on the destination address and origin. The router
can direct traffic to prevent head-on collisions, and is
smart enough to know when to direct traffic along back
roads and shortcuts.

Potrebbero piacerti anche