SlideShare a Scribd company logo
Textmasterformat bearbeiten
▪ Second Level
▪ Third Level
▪ Fourth Level
Fifth Level
November 23, 2017
4 Things to Know about…
Real-Time Ethernet Communication of
Safe Train Control System menTCS
2
RT Ethernet Communication of menTCS
Especially in safety-critical applications real-time (RT) communication is a must.
Ethernet networks come into the game when price is an issue and high-
performance standardized protocols are needed. Fieldbusses used today are
partly based on industrial real-time Ethernet variants with standardized safety
protocols like Profinet, EtherCAT, Ethernet Powerlink, and others.
The safe train control system family also uses a real-time Ethernet
communication within the network. This piece gives answers to the following
questions:
1: How is Communication within menTCS Organized?
2: Which RT Ethernet Standard is Used for menTCS?
3: Why EtherCAT for menTCS?
4: What are the Extension Possibilities for menTCS?
How is Communication within menTCS Organized?
The menTCS software distinguishes
between the safe and the non-vital
domain. In order to guarantee
appropriate communication between
the safe controller and the safe I/O
functions via real-time Ethernet, the
“black channel” approach is applied
and ensures end-to-end protection of
transmission.
In addition, up to 63 modular menTCS
I/O boxes are available to connect
remote I/Os to the central menTCS
controller.
> See data sheet of control unit MH50C
Which RT Ethernet Standard is Used for menTCS?
The complete menTCS I/O – no matter whether it is part of the menTCS controller
unit or located in the remote I/O boxes – are connected via real-time Ethernet
”EtherCAT“. All remote I/O boxes are connected to the controller in a ring topology,
which tolerates single failures. For example, in case of a broken cable, the system is
still fully operational, as all I/O boxes can still be reached from the other end of the
ring. The communication is protected via Safety over EtherCAT (FSOE) protocol.
> See data sheet of
remote I/O box KT8
Why EtherCAT for menTCS?
EtherCAT is a real-time Ethernet standard based on open Ethernet that fulfills the
conditions to make communication between menTCS components safe:
▪ EtherCAT is deterministic, with cycle times ≤ 5 ms.
▪ EtherCAT is able to operate without switches.
▪ EtherCAT supports a ring topology.
▪ The safety communication layer of EtherCAT (FSoE) establishes an end-to-end
protection to the safe I/O board.
▪ Any packet that leaves the safe domain is encapsulated in an envelope that is checked
by the receiver of the packet (the safe I/O board). With this method, failures like packet
duplication, loss, wrong sequence, corruption, wrong addressing etc. are covered.
▪ FSoE covers the requirements of EN 50159.
> Get more detailed answers to menTCS in
the Frequently asked Questions
What are the Extension Possibilities for menTCS?
Theoretically you can attach e.g. a standard (non-safe) EtherCAT device to
menTCS. However, with the current status of the EtherCAT software on the CPU,
there is no way to access the non-safe EtherCAT data on the IO Processor or on
the Control Processor. With a modified version of the EtherCAT master and/or the
PACY software (included in menTCS package), it is possible to support non-safe
EtherCAT devices.
You can also attach a safety EtherCAT device with FSoE from a third party to
menTCS, but it needs software support on the Control Processor, in form of a
PACY device driver.
> Get the press release for more
information about PACY
If you use a copper-to-fiber-optic converter from
a third party (e.g. Beckhoff’s CU1521 “EtherCAT
media converter fibre optic”) also fiber optic can
be used to connect to EtherCAT devices.
www.men.de/tcs/
www.menmicro.com/tcs/
www.men-france.fr/tcs/

More Related Content

Similar to 4 Things to Know about Real-Time Ethernet Communication of Safe Train Control System menTCS

Project ACRN EtherCAT 101
Project ACRN EtherCAT 101Project ACRN EtherCAT 101
Project ACRN EtherCAT 101
Project ACRN
 
Proposal for final project
Proposal for final projectProposal for final project
Proposal for final project
ssuser37e1ef
 
enet-wp002_-en-p
enet-wp002_-en-penet-wp002_-en-p
enet-wp002_-en-pShuo Zhang
 
Proposal for final project
Proposal for final projectProposal for final project
Proposal for final project
ssuser37e1ef
 
Proposal for final project
Proposal for final projectProposal for final project
Proposal for final project
ssuser37e1ef
 
LE-240XTCS LE-280XTS - Ethernet module for the LET-36 chassis
LE-240XTCS LE-280XTS - Ethernet module for the LET-36 chassisLE-240XTCS LE-280XTS - Ethernet module for the LET-36 chassis
LE-240XTCS LE-280XTS - Ethernet module for the LET-36 chassis
Ronald Bartels
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
IAEME Publication
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
IAEME Publication
 
Proposal for final project
Proposal for final projectProposal for final project
Proposal for final project
ssuser37e1ef
 
Allied Telesis IE510-28GSX
Allied Telesis IE510-28GSXAllied Telesis IE510-28GSX
Allied Telesis IE510-28GSX
alliedtelesisnetwork
 
Stable Ethernet TCP/IP Real Time Communication In Industrial Embedded Applica...
Stable Ethernet TCP/IP Real Time Communication In Industrial Embedded Applica...Stable Ethernet TCP/IP Real Time Communication In Industrial Embedded Applica...
Stable Ethernet TCP/IP Real Time Communication In Industrial Embedded Applica...
IJRES Journal
 
JVL Industrial Ethernet Expansion Modules for MAC Motors
JVL Industrial Ethernet Expansion Modules for MAC MotorsJVL Industrial Ethernet Expansion Modules for MAC Motors
JVL Industrial Ethernet Expansion Modules for MAC Motors
Electromate
 
Megaplex nerc-cip-compliance
Megaplex nerc-cip-complianceMegaplex nerc-cip-compliance
Megaplex nerc-cip-compliance
Nir Cohen
 
Ethercat.org industrial ethernet technologies
Ethercat.org industrial ethernet technologiesEthercat.org industrial ethernet technologies
Ethercat.org industrial ethernet technologies
Ken Ott
 
Industrial_Ethernet_Technologies_220529_031813 (1).pdf
Industrial_Ethernet_Technologies_220529_031813 (1).pdfIndustrial_Ethernet_Technologies_220529_031813 (1).pdf
Industrial_Ethernet_Technologies_220529_031813 (1).pdf
Tobey Houston
 
Wsn Wireless Hart Architecture,Mechanism,Components
Wsn Wireless Hart Architecture,Mechanism,ComponentsWsn Wireless Hart Architecture,Mechanism,Components
Wsn Wireless Hart Architecture,Mechanism,Components
aroosa khan
 
Ethernet - Networking presentation
Ethernet - Networking presentationEthernet - Networking presentation
Ethernet - Networking presentation
Viet Nguyen
 
Iec104 gateway datasheet
Iec104 gateway datasheetIec104 gateway datasheet
Iec104 gateway datasheet
vanquanglong
 
Software-Defined Networking Changes for the Paradigm for Mission-Critical Ope...
Software-Defined Networking Changes for the Paradigm for Mission-Critical Ope...Software-Defined Networking Changes for the Paradigm for Mission-Critical Ope...
Software-Defined Networking Changes for the Paradigm for Mission-Critical Ope...
Wheeler Flemming
 

Similar to 4 Things to Know about Real-Time Ethernet Communication of Safe Train Control System menTCS (20)

Project ACRN EtherCAT 101
Project ACRN EtherCAT 101Project ACRN EtherCAT 101
Project ACRN EtherCAT 101
 
Proposal for final project
Proposal for final projectProposal for final project
Proposal for final project
 
enet-wp002_-en-p
enet-wp002_-en-penet-wp002_-en-p
enet-wp002_-en-p
 
Proposal for final project
Proposal for final projectProposal for final project
Proposal for final project
 
Proposal for final project
Proposal for final projectProposal for final project
Proposal for final project
 
LE-240XTCS LE-280XTS - Ethernet module for the LET-36 chassis
LE-240XTCS LE-280XTS - Ethernet module for the LET-36 chassisLE-240XTCS LE-280XTS - Ethernet module for the LET-36 chassis
LE-240XTCS LE-280XTS - Ethernet module for the LET-36 chassis
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
Proposal for final project
Proposal for final projectProposal for final project
Proposal for final project
 
Ethernet
EthernetEthernet
Ethernet
 
Allied Telesis IE510-28GSX
Allied Telesis IE510-28GSXAllied Telesis IE510-28GSX
Allied Telesis IE510-28GSX
 
Stable Ethernet TCP/IP Real Time Communication In Industrial Embedded Applica...
Stable Ethernet TCP/IP Real Time Communication In Industrial Embedded Applica...Stable Ethernet TCP/IP Real Time Communication In Industrial Embedded Applica...
Stable Ethernet TCP/IP Real Time Communication In Industrial Embedded Applica...
 
JVL Industrial Ethernet Expansion Modules for MAC Motors
JVL Industrial Ethernet Expansion Modules for MAC MotorsJVL Industrial Ethernet Expansion Modules for MAC Motors
JVL Industrial Ethernet Expansion Modules for MAC Motors
 
Megaplex nerc-cip-compliance
Megaplex nerc-cip-complianceMegaplex nerc-cip-compliance
Megaplex nerc-cip-compliance
 
Ethercat.org industrial ethernet technologies
Ethercat.org industrial ethernet technologiesEthercat.org industrial ethernet technologies
Ethercat.org industrial ethernet technologies
 
Industrial_Ethernet_Technologies_220529_031813 (1).pdf
Industrial_Ethernet_Technologies_220529_031813 (1).pdfIndustrial_Ethernet_Technologies_220529_031813 (1).pdf
Industrial_Ethernet_Technologies_220529_031813 (1).pdf
 
Wsn Wireless Hart Architecture,Mechanism,Components
Wsn Wireless Hart Architecture,Mechanism,ComponentsWsn Wireless Hart Architecture,Mechanism,Components
Wsn Wireless Hart Architecture,Mechanism,Components
 
Ethernet - Networking presentation
Ethernet - Networking presentationEthernet - Networking presentation
Ethernet - Networking presentation
 
Iec104 gateway datasheet
Iec104 gateway datasheetIec104 gateway datasheet
Iec104 gateway datasheet
 
Software-Defined Networking Changes for the Paradigm for Mission-Critical Ope...
Software-Defined Networking Changes for the Paradigm for Mission-Critical Ope...Software-Defined Networking Changes for the Paradigm for Mission-Critical Ope...
Software-Defined Networking Changes for the Paradigm for Mission-Critical Ope...
 

More from MEN Micro

5 Things to Know about Conduction Cooling (CCA)
5 Things to Know about Conduction Cooling (CCA)5 Things to Know about Conduction Cooling (CCA)
5 Things to Know about Conduction Cooling (CCA)
MEN Micro
 
5 Things to Know about FPGAs in Safety-Critical Environments
5 Things to Know about FPGAs in Safety-Critical Environments5 Things to Know about FPGAs in Safety-Critical Environments
5 Things to Know about FPGAs in Safety-Critical Environments
MEN Micro
 
5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...
5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...
5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...
MEN Micro
 
5 Things about IP Classes in Rugged Embedded Computing
5 Things about IP Classes in Rugged Embedded Computing5 Things about IP Classes in Rugged Embedded Computing
5 Things about IP Classes in Rugged Embedded Computing
MEN Micro
 
5 Things to Know About Conduction Cooling (CCA)
5 Things to Know About Conduction Cooling (CCA)5 Things to Know About Conduction Cooling (CCA)
5 Things to Know About Conduction Cooling (CCA)
MEN Micro
 
Rugged Connectivity - Networking Devices for IoT-Applications
Rugged Connectivity - Networking Devices for IoT-ApplicationsRugged Connectivity - Networking Devices for IoT-Applications
Rugged Connectivity - Networking Devices for IoT-Applications
MEN Micro
 
5 Things to Know about Safety-Critical Applications in Aerospace
5 Things to Know about Safety-Critical Applications in Aerospace5 Things to Know about Safety-Critical Applications in Aerospace
5 Things to Know about Safety-Critical Applications in Aerospace
MEN Micro
 
Modular Train Control System menTCS
Modular Train Control System menTCSModular Train Control System menTCS
Modular Train Control System menTCS
MEN Micro
 
A25 – High-Performance VMEbus SBC with Intel Xeon D
A25 – High-Performance VMEbus SBC with Intel Xeon DA25 – High-Performance VMEbus SBC with Intel Xeon D
A25 – High-Performance VMEbus SBC with Intel Xeon D
MEN Micro
 
5 Application Examples Using Wireless Communication in Harsh IoT Environments
5 Application Examples Using Wireless Communication in Harsh IoT Environments5 Application Examples Using Wireless Communication in Harsh IoT Environments
5 Application Examples Using Wireless Communication in Harsh IoT Environments
MEN Micro
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
MEN Micro
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems
MEN Micro
 
5 Things to Know about Virtualization on Compact PCI Serial
5 Things to Know about Virtualization on Compact PCI Serial5 Things to Know about Virtualization on Compact PCI Serial
5 Things to Know about Virtualization on Compact PCI Serial
MEN Micro
 
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
MEN Micro
 
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile CommunicationBL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
MEN Micro
 
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
MEN Micro
 
5 Things to Know about the CB30 Rugged COM Express Safe Computer
5 Things to Know about the CB30 Rugged COM Express Safe Computer5 Things to Know about the CB30 Rugged COM Express Safe Computer
5 Things to Know about the CB30 Rugged COM Express Safe Computer
MEN Micro
 
5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS
MEN Micro
 
5 Things to Know about the F75P
5 Things to Know about the F75P5 Things to Know about the F75P
5 Things to Know about the F75P
MEN Micro
 
5 Things to Know about the Railway Data Center menRDC
5 Things to Know about the Railway Data Center menRDC5 Things to Know about the Railway Data Center menRDC
5 Things to Know about the Railway Data Center menRDC
MEN Micro
 

More from MEN Micro (20)

5 Things to Know about Conduction Cooling (CCA)
5 Things to Know about Conduction Cooling (CCA)5 Things to Know about Conduction Cooling (CCA)
5 Things to Know about Conduction Cooling (CCA)
 
5 Things to Know about FPGAs in Safety-Critical Environments
5 Things to Know about FPGAs in Safety-Critical Environments5 Things to Know about FPGAs in Safety-Critical Environments
5 Things to Know about FPGAs in Safety-Critical Environments
 
5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...
5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...
5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...
 
5 Things about IP Classes in Rugged Embedded Computing
5 Things about IP Classes in Rugged Embedded Computing5 Things about IP Classes in Rugged Embedded Computing
5 Things about IP Classes in Rugged Embedded Computing
 
5 Things to Know About Conduction Cooling (CCA)
5 Things to Know About Conduction Cooling (CCA)5 Things to Know About Conduction Cooling (CCA)
5 Things to Know About Conduction Cooling (CCA)
 
Rugged Connectivity - Networking Devices for IoT-Applications
Rugged Connectivity - Networking Devices for IoT-ApplicationsRugged Connectivity - Networking Devices for IoT-Applications
Rugged Connectivity - Networking Devices for IoT-Applications
 
5 Things to Know about Safety-Critical Applications in Aerospace
5 Things to Know about Safety-Critical Applications in Aerospace5 Things to Know about Safety-Critical Applications in Aerospace
5 Things to Know about Safety-Critical Applications in Aerospace
 
Modular Train Control System menTCS
Modular Train Control System menTCSModular Train Control System menTCS
Modular Train Control System menTCS
 
A25 – High-Performance VMEbus SBC with Intel Xeon D
A25 – High-Performance VMEbus SBC with Intel Xeon DA25 – High-Performance VMEbus SBC with Intel Xeon D
A25 – High-Performance VMEbus SBC with Intel Xeon D
 
5 Application Examples Using Wireless Communication in Harsh IoT Environments
5 Application Examples Using Wireless Communication in Harsh IoT Environments5 Application Examples Using Wireless Communication in Harsh IoT Environments
5 Application Examples Using Wireless Communication in Harsh IoT Environments
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems
 
5 Things to Know about Virtualization on Compact PCI Serial
5 Things to Know about Virtualization on Compact PCI Serial5 Things to Know about Virtualization on Compact PCI Serial
5 Things to Know about Virtualization on Compact PCI Serial
 
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
 
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile CommunicationBL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
 
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
 
5 Things to Know about the CB30 Rugged COM Express Safe Computer
5 Things to Know about the CB30 Rugged COM Express Safe Computer5 Things to Know about the CB30 Rugged COM Express Safe Computer
5 Things to Know about the CB30 Rugged COM Express Safe Computer
 
5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS
 
5 Things to Know about the F75P
5 Things to Know about the F75P5 Things to Know about the F75P
5 Things to Know about the F75P
 
5 Things to Know about the Railway Data Center menRDC
5 Things to Know about the Railway Data Center menRDC5 Things to Know about the Railway Data Center menRDC
5 Things to Know about the Railway Data Center menRDC
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 

4 Things to Know about Real-Time Ethernet Communication of Safe Train Control System menTCS

  • 1. Textmasterformat bearbeiten ▪ Second Level ▪ Third Level ▪ Fourth Level Fifth Level November 23, 2017 4 Things to Know about… Real-Time Ethernet Communication of Safe Train Control System menTCS
  • 2. 2 RT Ethernet Communication of menTCS Especially in safety-critical applications real-time (RT) communication is a must. Ethernet networks come into the game when price is an issue and high- performance standardized protocols are needed. Fieldbusses used today are partly based on industrial real-time Ethernet variants with standardized safety protocols like Profinet, EtherCAT, Ethernet Powerlink, and others. The safe train control system family also uses a real-time Ethernet communication within the network. This piece gives answers to the following questions: 1: How is Communication within menTCS Organized? 2: Which RT Ethernet Standard is Used for menTCS? 3: Why EtherCAT for menTCS? 4: What are the Extension Possibilities for menTCS?
  • 3. How is Communication within menTCS Organized? The menTCS software distinguishes between the safe and the non-vital domain. In order to guarantee appropriate communication between the safe controller and the safe I/O functions via real-time Ethernet, the “black channel” approach is applied and ensures end-to-end protection of transmission. In addition, up to 63 modular menTCS I/O boxes are available to connect remote I/Os to the central menTCS controller. > See data sheet of control unit MH50C
  • 4. Which RT Ethernet Standard is Used for menTCS? The complete menTCS I/O – no matter whether it is part of the menTCS controller unit or located in the remote I/O boxes – are connected via real-time Ethernet ”EtherCAT“. All remote I/O boxes are connected to the controller in a ring topology, which tolerates single failures. For example, in case of a broken cable, the system is still fully operational, as all I/O boxes can still be reached from the other end of the ring. The communication is protected via Safety over EtherCAT (FSOE) protocol. > See data sheet of remote I/O box KT8
  • 5. Why EtherCAT for menTCS? EtherCAT is a real-time Ethernet standard based on open Ethernet that fulfills the conditions to make communication between menTCS components safe: ▪ EtherCAT is deterministic, with cycle times ≤ 5 ms. ▪ EtherCAT is able to operate without switches. ▪ EtherCAT supports a ring topology. ▪ The safety communication layer of EtherCAT (FSoE) establishes an end-to-end protection to the safe I/O board. ▪ Any packet that leaves the safe domain is encapsulated in an envelope that is checked by the receiver of the packet (the safe I/O board). With this method, failures like packet duplication, loss, wrong sequence, corruption, wrong addressing etc. are covered. ▪ FSoE covers the requirements of EN 50159. > Get more detailed answers to menTCS in the Frequently asked Questions
  • 6. What are the Extension Possibilities for menTCS? Theoretically you can attach e.g. a standard (non-safe) EtherCAT device to menTCS. However, with the current status of the EtherCAT software on the CPU, there is no way to access the non-safe EtherCAT data on the IO Processor or on the Control Processor. With a modified version of the EtherCAT master and/or the PACY software (included in menTCS package), it is possible to support non-safe EtherCAT devices. You can also attach a safety EtherCAT device with FSoE from a third party to menTCS, but it needs software support on the Control Processor, in form of a PACY device driver. > Get the press release for more information about PACY If you use a copper-to-fiber-optic converter from a third party (e.g. Beckhoff’s CU1521 “EtherCAT media converter fibre optic”) also fiber optic can be used to connect to EtherCAT devices.