Day 01 Session:
Explain and demonstrate how to establish communication network with PLC systems using industry standard
communication protocols for data transfer
• Serial Communications
• ASCII Functions
• Parallel Communications
Day 02 Session:
Explain and demonstrate different types of networking architecture
Explain OSI model of networking
Networking hardware
Demonstrate TCP/IP Protocol, Introduction to IP Address, Subnet Mask,
Networking Devices, Network topology
Day 03 Session:
Industrial Automation Communication Protocols - RS232-422-485 standards
Network standards, Modbus, CAN bus, ControlNet, Ethernet, Profibus, FIP I/O, Static and Dynamic Routing
principle
Day 04 Session:
Concepts of Wireless Networking
Latest trends in PLC communication protocols.
Fundamental Parts and Characteristics of PLC communication Protocol
Demonstrate Peer to Peer (PLC to PLC) & PLC to PC Communication protocols
Automation and Robotics Week 04 Theory Notes 20ME51I.pdfTHANMAY JS
Working with HMI software Tool
• Configure PLC with HMI
• Animation with graphical objects
• Animate objects on an HMI screen to
monitor motor status
• Trend the data of a process parameter
using a trend tool.
• Create user groups and monitor
screens with proper authentication.
• Use security features to do tag logging
and command execution
Automation and Robotics Week 08 Theory Notes 20ME51I.pdfTHANMAY JS
Day 01 Session:
Concepts of Industrial Robots, Applications of Robotics, Types of robots,
Configurations of robots – Articulated Robot, Polar configuration, SCARA,
Cartesian Co-ordinate Robot, Delta Robot, Key Components of Robot.
Day 02 Session:
Wrist configuration, Work Volume Degree of Freedom- Forward and Back, Up and Down, Left and Right,
Pitch, Yaw, Roll, Joint Notation & Type of joints in robot- Linear Joint (L Joint), Orthogonal Joint (O Joint),
Rotational Joint (R Joint), Twisting Joint (T Joint), Revolving Joint (V Joint)
End Effectors- Grippers, Tools, Types of grippers, Factors to be considered for Selecting a Gripper,
Robotic Drives- Electric Drive, Pneumatic Drive, Hydraulic Drive
Day 03 Session:
Robot Control systems-
• Point- to Point control Systems
• Continuous Path Control
• Intelligent control
• Controller Components
• System Control
Robotic Coordinate system using a robot
• Joint co-ordinate system
• Rectangular co-ordinate system
• User or object coordinate system
• Tool coordinate system.
Steps to define user co-ordinate system.
• Defining X, Y, Z co-ordinate system
• Verifying co-ordinate system by multiple motion movements.
Automation and Robotics Week 01 Theory Notes 20ME51I.pdfTHANMAY JS
Identify the possibilities of automation in a production system Discuss Hierarchy of Industrial Automation,
Industrial Automation pyramid. Present an Overview on the Levels of Automation-
• Device level
• Machine Level
• Cell Level
• Plant Level
• Enterprise Level
Automation and Robotics Week 02 Theory Notes 20ME51I.pdfTHANMAY JS
WEEK 02
Day 01 Session:
Recap and Practice PLC Ladder Diagram for Logic Gates, Timers, Counters
Day 02 Session:
Explain and Practice PLC Ladder Diagram for Compare, Jump and Subroutines
Explain and Practice PLC Ladder Diagram for Math Instructions and Shift Registers
Day 03 Session:
Explain and Practice PLC Program using Functional Block Diagram
Day 04 Session:
Explain and Practice PLC Program using Structural Text language
Automation and Robotics Lab Manual 20ME51I.pdfTHANMAY JS
Automation and Robotics 20ME51I DTE C 20 Syllabus Programme Specialization Pathway
DTE 5th semester; DTE Karnataka C 20; 5th Semester Mechanical Engineering [General]
PLC Circuits; PLC Ladder Diagram; RSLogix 500; Identify the possibilities of automation in a production system; Select the Hardware components required for Automation and establish communication network by using industry standard protocol; Develop, simulate, interface and Execute an Automation system for a given Application; Develop, simulate, interface and Execute Robot Program for a specified process in an Automation system; Integrate HMI, SCADA and IIOT in an automation system
Automation and Robotics Week 04 Theory Notes 20ME51I.pdfTHANMAY JS
Working with HMI software Tool
• Configure PLC with HMI
• Animation with graphical objects
• Animate objects on an HMI screen to
monitor motor status
• Trend the data of a process parameter
using a trend tool.
• Create user groups and monitor
screens with proper authentication.
• Use security features to do tag logging
and command execution
Automation and Robotics Week 08 Theory Notes 20ME51I.pdfTHANMAY JS
Day 01 Session:
Concepts of Industrial Robots, Applications of Robotics, Types of robots,
Configurations of robots – Articulated Robot, Polar configuration, SCARA,
Cartesian Co-ordinate Robot, Delta Robot, Key Components of Robot.
Day 02 Session:
Wrist configuration, Work Volume Degree of Freedom- Forward and Back, Up and Down, Left and Right,
Pitch, Yaw, Roll, Joint Notation & Type of joints in robot- Linear Joint (L Joint), Orthogonal Joint (O Joint),
Rotational Joint (R Joint), Twisting Joint (T Joint), Revolving Joint (V Joint)
End Effectors- Grippers, Tools, Types of grippers, Factors to be considered for Selecting a Gripper,
Robotic Drives- Electric Drive, Pneumatic Drive, Hydraulic Drive
Day 03 Session:
Robot Control systems-
• Point- to Point control Systems
• Continuous Path Control
• Intelligent control
• Controller Components
• System Control
Robotic Coordinate system using a robot
• Joint co-ordinate system
• Rectangular co-ordinate system
• User or object coordinate system
• Tool coordinate system.
Steps to define user co-ordinate system.
• Defining X, Y, Z co-ordinate system
• Verifying co-ordinate system by multiple motion movements.
Automation and Robotics Week 01 Theory Notes 20ME51I.pdfTHANMAY JS
Identify the possibilities of automation in a production system Discuss Hierarchy of Industrial Automation,
Industrial Automation pyramid. Present an Overview on the Levels of Automation-
• Device level
• Machine Level
• Cell Level
• Plant Level
• Enterprise Level
Automation and Robotics Week 02 Theory Notes 20ME51I.pdfTHANMAY JS
WEEK 02
Day 01 Session:
Recap and Practice PLC Ladder Diagram for Logic Gates, Timers, Counters
Day 02 Session:
Explain and Practice PLC Ladder Diagram for Compare, Jump and Subroutines
Explain and Practice PLC Ladder Diagram for Math Instructions and Shift Registers
Day 03 Session:
Explain and Practice PLC Program using Functional Block Diagram
Day 04 Session:
Explain and Practice PLC Program using Structural Text language
Automation and Robotics Lab Manual 20ME51I.pdfTHANMAY JS
Automation and Robotics 20ME51I DTE C 20 Syllabus Programme Specialization Pathway
DTE 5th semester; DTE Karnataka C 20; 5th Semester Mechanical Engineering [General]
PLC Circuits; PLC Ladder Diagram; RSLogix 500; Identify the possibilities of automation in a production system; Select the Hardware components required for Automation and establish communication network by using industry standard protocol; Develop, simulate, interface and Execute an Automation system for a given Application; Develop, simulate, interface and Execute Robot Program for a specified process in an Automation system; Integrate HMI, SCADA and IIOT in an automation system
The use of mechanized and automated devices to perform the various assembly tasks in an assembly line or cell
Most automated assembly systems are designed to perform a fixed sequence of assembly steps on a specific product that is produced in very large quantities.
This document provides an overview of industrial robotics, including robot anatomy, control systems, end effectors, applications, and programming. It describes the typical components of a robot like links, joints, drives, and sensors. Common robot configurations and their joint notation are shown. The document also discusses robot programming methods including leadthrough and textual languages, as well as simulation for offline programming.
This document provides information on automated guided vehicles (AGVs), automated storage and retrieval systems (AS/RS), and tool management. It discusses the main parts of AGVs and lists six types of AGVs, describing unmanned AGV trains, AGV pallet trucks, AGV fork lift trucks, AGV unit load vehicles, AGV light load vehicles, and AGV assembly line vehicles. It also discusses the components, types, and analysis of AS/RS, including unit load, mini load, deep-lane, man-on-board, and automated item retrieval systems. The document is intended to provide information on these material handling topics for a class on computer aided manufacturing.
LCA is useful in activity releated to discrete manufacturing.Wide range of activity such as
Loading,Feeding,Clamping,Machining,Welding,Forming,Gauging,Assembly and Packing can be subjected to LCA system adoption.
Useful in processing industries for manufacturing chemicals, oils, or pharmaceuticals.
The use of mechanized and automated devices to perform the various assembly tasks in an assembly line or cell
Most automated assembly systems are designed to perform a fixed sequence of assembly steps on a specific product that is produced in very large quantities
Indian Railways is the 7th largest employer in the world with over 1.4 million employees carrying over 25 million passengers daily. It has 16 zones across India with over 63,000 kilometers of track. Signalling uses color light signals for better visibility at night and day with no moving parts. Axle counters count the number of axles passed to prevent accidents from human error. The Ajmer railway exchange has three exchanges with the largest having 1200 lines using OKI technology connected across India through an underground railnet of optical and copper cables.
This document discusses various industrial applications of robots including material handling, processing operations, and assembly. Material handling applications involve moving parts from one location to another, such as part placement, palletizing, and machine loading/unloading. Processing operations use robots to perform tasks like welding, painting, and machining. Assembly applications involve robots building products by manipulating tools to insert components. The document provides examples and considerations for different robot applications in manufacturing.
This document provides an overview of industrial robot technology, including its basic components and functions. It discusses the definition of industrial robots, as well as their typical applications in welding, painting, and pick and place operations. The six basic components of industrial robots are described as the manipulator, end effector, actuators, sensors, controller, and teach pendant. Common actuator types include electric motors, pneumatic cylinders, and hydraulic cylinders. Sensors are used to provide feedback and increase a robot's capabilities. The controller coordinates the robot's motions based on programmed instructions and sensor input. A teach pendant is used to teach locations to the robot controller during programming.
The document is a presentation on automated material handling. It discusses material handling and different types of material handling equipment such as conveyors and automated guided vehicles (AGVs). It describes AGVs in detail, including their components, guidance technologies, and types. It provides an example of calculating the number of AGVs needed based on delivery rate, cycle time, and vehicle availability. The presentation also discusses using simulation to model AGV systems and limitations of automated material handling systems.
The document discusses automated guided vehicles (AGVs) and automated storage and retrieval systems (AS/RS). It defines an AGV as a material handling system that uses self-propelled vehicles guided along defined pathways. It describes different types of AGVs including driverless trains, pallet trucks, and unit load carriers. It also explains various AGV navigation systems and functions. The document then defines an AS/RS as an automated storage system that stores and retrieves loads under computer control. It outlines the objectives and components of an AS/RS system and describes applications in warehousing, distribution and manufacturing.
This document summarizes an presentation on industrial automation. It defines industrial automation as delegating human control functions to equipment to increase productivity, quality and safety while reducing costs. Benefits include simplified operation, improved working conditions and production of better quality products at lower costs. Potential disadvantages are worker redundancy leading to unemployment, security threats, and high initial costs. The presentation outlines common industrial automation tools and hierarchy levels, and concludes with an example of lights-out manufacturing facilities that operate entirely using robots.
1) The document discusses various topics related to robotics including definitions, degrees of freedom, robot arm and wrist configurations, joint classifications, robot safety, components and control systems.
2) It provides details on common robot arm configurations including rectangular, cylindrical, spherical and revolute coordinated systems.
3) The document also describes robot control systems including limited sequence control, playback with point-to-point control and continuous path control as well as intelligent control.
This document presents information about automation and its various applications. It defines automation as delegating human control functions to technical equipment to increase productivity, quality and safety while reducing costs. It describes different types of automation including building, office, scientific and industrial automation. It provides details about control systems, programmable logic controllers (PLCs), PLC programming languages and ladder logic. It also discusses supervisory control and data acquisition (SCADA) systems, their features and leading software. Finally, it outlines advantages and disadvantages of automation as well as examples of its applications.
1. Automated assembly systems use mechanized devices to perform assembly tasks and are designed for large production quantities of a specific product.
2. They are well-suited for high demand, stable designs, and limited component assembly. Advantages include high production rates, quality, and low costs.
3. Common configurations include in-line machines, dial indexing machines, carousels, and single-station cells. Parts delivery systems rely on feeders, tracks, and placement devices to orient and position components.
The adaptive control is basically a feedback system that treats the CNC as an internal unit and in which the machining variables automatically adapt themselves to the actual conditions of the machining process.
This document provides an overview of automated production lines. It discusses the components and configurations of automated lines, including distributed workstations connected by a mechanized transport system. Common transfer mechanisms include conveyors and rotary indexing tables. Storage buffers can be included to temporarily store parts as they move through the line. The document also examines factors that determine the suitability of automated lines, such as high production volumes, stable designs, and multiple processing steps.
1. The document discusses automated assembly systems, which use mechanized devices to perform assembly tasks in an assembly line or cell.
2. Automated assembly systems are examples of fixed automation and are designed for assembling a specific product through a fixed sequence of steps.
3. Key components of automated assembly systems include workstations for assembly steps, parts feeding devices, and a work handling system to move assembled products. Control systems ensure proper sequencing, safety monitoring, and quality control.
Numerical control (NC) refers to the automation of machine tools through programmed commands encoded in a storage medium. The first NC machines were built in the 1940s-1950s. These early systems were augmented with analog and digital computers, creating modern computer numerical control (CNC) machine tools. A key component of an NC system is the program of instructions, which is a detailed step-by-step set of directions that tells the machine tool what to do. NC has been widely applied to metal cutting industries like milling, drilling, boring, and turning, as well as other industries like cloth cutting and welding.
The document provides a history of robotics, describing how robots were first depicted in fiction in the 1920s play R.U.R. and Isaac Asimov devised robot laws of behavior in 1950. It discusses the first successful programmable robot developed by George Devol in 1954. The document also summarizes the main types of industrial robots including manipulators, loading devices, and freely programmable robots. It provides examples of early industrial robots like Unimate and describes key components and processes of industrial robot systems.
The document provides information about computer networks and networking concepts. It discusses what a network is and examples like the Internet. It then covers topics such as the uses of networks for communication, accessing resources, centralizing data, transferring files, and more. The document also discusses different types of networks categorized by size, connectivity, and design. Additionally, it covers networking protocols, data transmission methods, network architectures, and models like OSI and TCP/IP.
The use of mechanized and automated devices to perform the various assembly tasks in an assembly line or cell
Most automated assembly systems are designed to perform a fixed sequence of assembly steps on a specific product that is produced in very large quantities.
This document provides an overview of industrial robotics, including robot anatomy, control systems, end effectors, applications, and programming. It describes the typical components of a robot like links, joints, drives, and sensors. Common robot configurations and their joint notation are shown. The document also discusses robot programming methods including leadthrough and textual languages, as well as simulation for offline programming.
This document provides information on automated guided vehicles (AGVs), automated storage and retrieval systems (AS/RS), and tool management. It discusses the main parts of AGVs and lists six types of AGVs, describing unmanned AGV trains, AGV pallet trucks, AGV fork lift trucks, AGV unit load vehicles, AGV light load vehicles, and AGV assembly line vehicles. It also discusses the components, types, and analysis of AS/RS, including unit load, mini load, deep-lane, man-on-board, and automated item retrieval systems. The document is intended to provide information on these material handling topics for a class on computer aided manufacturing.
LCA is useful in activity releated to discrete manufacturing.Wide range of activity such as
Loading,Feeding,Clamping,Machining,Welding,Forming,Gauging,Assembly and Packing can be subjected to LCA system adoption.
Useful in processing industries for manufacturing chemicals, oils, or pharmaceuticals.
The use of mechanized and automated devices to perform the various assembly tasks in an assembly line or cell
Most automated assembly systems are designed to perform a fixed sequence of assembly steps on a specific product that is produced in very large quantities
Indian Railways is the 7th largest employer in the world with over 1.4 million employees carrying over 25 million passengers daily. It has 16 zones across India with over 63,000 kilometers of track. Signalling uses color light signals for better visibility at night and day with no moving parts. Axle counters count the number of axles passed to prevent accidents from human error. The Ajmer railway exchange has three exchanges with the largest having 1200 lines using OKI technology connected across India through an underground railnet of optical and copper cables.
This document discusses various industrial applications of robots including material handling, processing operations, and assembly. Material handling applications involve moving parts from one location to another, such as part placement, palletizing, and machine loading/unloading. Processing operations use robots to perform tasks like welding, painting, and machining. Assembly applications involve robots building products by manipulating tools to insert components. The document provides examples and considerations for different robot applications in manufacturing.
This document provides an overview of industrial robot technology, including its basic components and functions. It discusses the definition of industrial robots, as well as their typical applications in welding, painting, and pick and place operations. The six basic components of industrial robots are described as the manipulator, end effector, actuators, sensors, controller, and teach pendant. Common actuator types include electric motors, pneumatic cylinders, and hydraulic cylinders. Sensors are used to provide feedback and increase a robot's capabilities. The controller coordinates the robot's motions based on programmed instructions and sensor input. A teach pendant is used to teach locations to the robot controller during programming.
The document is a presentation on automated material handling. It discusses material handling and different types of material handling equipment such as conveyors and automated guided vehicles (AGVs). It describes AGVs in detail, including their components, guidance technologies, and types. It provides an example of calculating the number of AGVs needed based on delivery rate, cycle time, and vehicle availability. The presentation also discusses using simulation to model AGV systems and limitations of automated material handling systems.
The document discusses automated guided vehicles (AGVs) and automated storage and retrieval systems (AS/RS). It defines an AGV as a material handling system that uses self-propelled vehicles guided along defined pathways. It describes different types of AGVs including driverless trains, pallet trucks, and unit load carriers. It also explains various AGV navigation systems and functions. The document then defines an AS/RS as an automated storage system that stores and retrieves loads under computer control. It outlines the objectives and components of an AS/RS system and describes applications in warehousing, distribution and manufacturing.
This document summarizes an presentation on industrial automation. It defines industrial automation as delegating human control functions to equipment to increase productivity, quality and safety while reducing costs. Benefits include simplified operation, improved working conditions and production of better quality products at lower costs. Potential disadvantages are worker redundancy leading to unemployment, security threats, and high initial costs. The presentation outlines common industrial automation tools and hierarchy levels, and concludes with an example of lights-out manufacturing facilities that operate entirely using robots.
1) The document discusses various topics related to robotics including definitions, degrees of freedom, robot arm and wrist configurations, joint classifications, robot safety, components and control systems.
2) It provides details on common robot arm configurations including rectangular, cylindrical, spherical and revolute coordinated systems.
3) The document also describes robot control systems including limited sequence control, playback with point-to-point control and continuous path control as well as intelligent control.
This document presents information about automation and its various applications. It defines automation as delegating human control functions to technical equipment to increase productivity, quality and safety while reducing costs. It describes different types of automation including building, office, scientific and industrial automation. It provides details about control systems, programmable logic controllers (PLCs), PLC programming languages and ladder logic. It also discusses supervisory control and data acquisition (SCADA) systems, their features and leading software. Finally, it outlines advantages and disadvantages of automation as well as examples of its applications.
1. Automated assembly systems use mechanized devices to perform assembly tasks and are designed for large production quantities of a specific product.
2. They are well-suited for high demand, stable designs, and limited component assembly. Advantages include high production rates, quality, and low costs.
3. Common configurations include in-line machines, dial indexing machines, carousels, and single-station cells. Parts delivery systems rely on feeders, tracks, and placement devices to orient and position components.
The adaptive control is basically a feedback system that treats the CNC as an internal unit and in which the machining variables automatically adapt themselves to the actual conditions of the machining process.
This document provides an overview of automated production lines. It discusses the components and configurations of automated lines, including distributed workstations connected by a mechanized transport system. Common transfer mechanisms include conveyors and rotary indexing tables. Storage buffers can be included to temporarily store parts as they move through the line. The document also examines factors that determine the suitability of automated lines, such as high production volumes, stable designs, and multiple processing steps.
1. The document discusses automated assembly systems, which use mechanized devices to perform assembly tasks in an assembly line or cell.
2. Automated assembly systems are examples of fixed automation and are designed for assembling a specific product through a fixed sequence of steps.
3. Key components of automated assembly systems include workstations for assembly steps, parts feeding devices, and a work handling system to move assembled products. Control systems ensure proper sequencing, safety monitoring, and quality control.
Numerical control (NC) refers to the automation of machine tools through programmed commands encoded in a storage medium. The first NC machines were built in the 1940s-1950s. These early systems were augmented with analog and digital computers, creating modern computer numerical control (CNC) machine tools. A key component of an NC system is the program of instructions, which is a detailed step-by-step set of directions that tells the machine tool what to do. NC has been widely applied to metal cutting industries like milling, drilling, boring, and turning, as well as other industries like cloth cutting and welding.
The document provides a history of robotics, describing how robots were first depicted in fiction in the 1920s play R.U.R. and Isaac Asimov devised robot laws of behavior in 1950. It discusses the first successful programmable robot developed by George Devol in 1954. The document also summarizes the main types of industrial robots including manipulators, loading devices, and freely programmable robots. It provides examples of early industrial robots like Unimate and describes key components and processes of industrial robot systems.
The document provides information about computer networks and networking concepts. It discusses what a network is and examples like the Internet. It then covers topics such as the uses of networks for communication, accessing resources, centralizing data, transferring files, and more. The document also discusses different types of networks categorized by size, connectivity, and design. Additionally, it covers networking protocols, data transmission methods, network architectures, and models like OSI and TCP/IP.
Automation and Robotics 20ME51I_Week_3_Practicals.pdfGandhibabu8
1. The document discusses various methods of communication used in industrial automation systems, including serial communication, parallel communication, and common network protocols.
2. Serial communication transmits data one bit at a time over a single line, while parallel communication transmits multiple bits simultaneously over multiple lines, allowing for faster transfer rates.
3. Common industrial network protocols mentioned include Modbus, CAN bus, ControlNet, Ethernet/IP, and PROFIBUS, each having different characteristics regarding speed, topology, and application.
Energy Minimization in Wireless Sensor Networks Using Multi Hop TransmissionIOSR Journals
This document discusses energy minimization in wireless sensor networks using multi-hop transmissions. It provides background on wireless sensor networks and their components. It then discusses challenges like limited energy and the need for multi-hop transmissions due to limited transmission range. The document outlines the problem of determining the optimal number of cooperating nodes per hop to minimize total energy consumption while meeting an outage probability requirement at each hop. It discusses using cooperative transmissions to increase transmission range through diversity gain while keeping transmit power fixed.
Location convenience is an important factor for customers when choosing a financial institution, as customers prefer banks that have branches or ATMs located near their home or work within 2 km. To increase convenience and competitiveness, banks aim to expand their branch and ATM networks, which can be done organically by building new locations or inorganically by acquiring existing networks from competitors or partners, though acquired networks may not complement existing networks perfectly due to coverage overlap.
UART project report by Tarun Khaneja ( 09034406598 )Tarun Khaneja
This document provides information about asynchronous serial communication and UARTs. It discusses how UARTs convert parallel data from a computer to serial data for transmission and vice versa. Key points include:
- UARTs add start and stop bits and optionally parity bits, and handle interrupts from serial devices.
- Asynchronous serial transmission uses start and stop bits to delineate each byte or character, while synchronous transmission requires a shared clock.
- Serial communication can transmit data over longer distances than parallel and requires fewer wires. However, it is more complex to interface with serial devices.
- For asynchronous transmission to work, the transmitting and receiving devices must agree on parameters like bit rate, number of data bits,
Serial Communication Interface with Error Detectioniosrjce
UART is used for serial data communication. UART is a piece of computer hardware that translates
between parallel bits of data and serial bits. UART is usually an integrated circuit used for serial
communications over a computer or peripheral device serial port. Bits have to be moved from one place to
another using wires or some other medium. Over many miles, the expense of the wires becomes large. To reduce
the expense of long communication links carrying several bits in parallel, data bits are sent sequentially. Errors
may occur either internally or externally while we transmit information from source to destination. The errors
generated during the transmission would affect the performance of the overall system. In order to reduce the
errors we should incorporate any error detecting schemes like hamming decoder, check parity systems etc.
Different serial communication devices are available.
This document discusses serial communication interfaces and error detection techniques. It begins with an introduction to serial communication interfaces and some common interfaces like RS-232, I2C, and SPI. It then discusses the differences between synchronous and asynchronous serial communication. The bulk of the document focuses on using Hamming codes for error detection and correction in serial transmission. It provides an example of how Hamming codes can be used to detect and correct single bit errors in transmitted data. The document concludes by stating that error correction can improve the reliability and fault tolerance of integrated circuits.
This document summarizes an academic research study on autonomous arbitration systems in single car communication buses. It begins with an abstract that outlines increased demands for efficiency in electronic systems and the need for digital control systems and networking. It then discusses how today's vehicles have around 70-80 electronic control units that require organized digital bus communication between controllers. The document examines requirements for an efficient vehicle communication system, including reliability, flexibility, security and determinism. It proceeds to provide details on FireWire protocols and their use as a model for digital bus communication standards.
This document summarizes a study comparing the performance of the AODV and MAODV routing protocols in a mobile ad hoc network (MANET) using the Network Simulator 2 (NS-2). The study introduces a malicious node to simulate a hacker attack and analyzes the impact on packet delivery ratio, end-to-end delay, and throughput under different node densities and pause times. The results show that MAODV has lower performance than AODV, and the difference increases as the number of nodes increases due to the greater impact of the malicious node. Future work could extend the study to include more malicious nodes and design a new protocol to detect and mitigate malicious nodes.
Change is the only thing which is constant in this
today’s era. Constant technology updates demand building up
and falling down of infrastructure along with cost involvement.
Today there is a need of adaptive infrastructure called Ad hoc
network.
Ad hoc network is a collection of two or more nodes with
wireless communication having network capability that they can
communicate without centralized manner. So, at any time host
devices may act as a router or as a node. Ad hoc networks can be
erected as wireless technology, comprising of Radio Frequency
(RF) and infrared frequency.
Wireless Ad hoc network is Temporary, Infrastructure less,
Decentralized, self-organized packet switched network. In this
network topology changes dynamically which can results change
in link failure or broken. In this paper we evaluate the
performance parameters like Throughput, End-to-End Delay and
Packet Delivery Ratio of AODV (ad hoc on Demand Vector) and
DSDV (Destination Sequential Distance Vector) protocol. The
simulation tool used is Network Simulator 2 -2.35
Computer Networking – CSE290 is a course that covers basic concepts of networks including LANs, WANs, the internet, and common network devices. It discusses how networks allow sharing of resources and backups. The document defines what a computer network is and its basic components. It provides details on network media like wired and wireless technologies. Common networking devices like switches, routers, and firewalls are explained. Finally, it discusses different types of networks including LANs, WANs, SANs, and others.
Network system on Ahsanullah University of Science & TechnologyManas Saha
This document provides an overview of the network system at Ahsanullah University of Science & Technology (AUST) in Bangladesh. It describes the types of networks, topologies, hardware, and media used. The university uses both wired and wireless networks to connect computers. The wired network uses UTP and fiber optic cables in a star topology. Routers, switches, and servers connect the departments and buildings. The wireless network provides internet access across campus. In total, the network system at AUST effectively connects computers to share resources while managing bandwidth usage.
This document describes interfacing a Controller Area Network (CAN) bus with a PIC32 microcontroller. It provides an overview of CAN bus, including its data format, signaling format, and features like message-based communication, arbitration, and error detection. The document then details the hardware design of the CAN bus system using a PIC32MX795F512L microcontroller and other components like transceivers, power supplies, and programming hardware.
The document summarizes the key components of computer networks including hardware, software, protocols, networking models like client-server and peer-to-peer, local area networks (LANs), wide area networks (WANs), and the Ethernet standard for LANs. It discusses Ethernet frames, media access control (MAC) addressing, cabling, and transmission types.
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEMEditor IJCATR
This paper proposed a design of optical switching controller using FPGA for OCDMA encoder system. The encoder is one
of the new technologies that use to transmit the coded data in the optical communication system by using FPGA and optical switches.
It is providing a high security for data transmission due to all data will be transmitting in binary code form. The output signals from
FPGA are coded with a binary code that given to an optical switch before it signal modulate with the carrier and transmit to the
receiver. In this paper, AA and 55 data were used for source 1 and source 2. It is generated sample data and sent packet data to the
FPGA and stored it into RAM. The simulation results have done by using software Verilog Spartan 2 programming to simulate. After
that the output will produces at waveform to display the output. The main function of FPGA controlling unit is producing single pulse
and configuring optical switching system.
This document discusses various local area network (LAN) technologies. It begins by defining LANs and explaining that they can connect devices within a single building or across multiple buildings. Common LAN technologies discussed include Ethernet, Token Ring, fiber, and wireless networks. Ethernet is currently the most widely used standard. Fast Ethernet and Gigabit Ethernet are also covered as higher-speed successors to standard Ethernet. The document also examines protocols, the OSI model, Ethernet coding standards, and different types of media like twisted pair and fiber optic cables.
The document discusses ISDN (Integrated Services Digital Network), broadband ISDN, narrowband ISDN, local area networks, and computer communication protocols. It provides details on:
- ISDN being intended as a worldwide telecommunications network to replace existing networks and support a variety of services through digital switches and paths.
- Narrowband ISDN using 64-kbps channels as the basic switching unit and contributing frame relay. Broadband ISDN supporting very high data rates of 100s of Mbps with a packet-switching orientation and contributing asynchronous transfer mode (ATM).
- Key distinctions between local area networks (LANs) and wide area networks (WANs) relating to scope, data rates
In recent years, rapid growth in the field of electronics and computer technology which makes the life simpler and faster. This development hits the automobile sector, which makes increases the systems in vehicle like infotainment system, safety system and security system. These systems are integrated to know the status of the vehicle for each and every second, this is done by means of different networking protocols. In this paper, the different network architecture and protocols are discussed and which is best suited for automobile in the current scenario.
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Alexander Decker
This document discusses migrating packet dropping in mobile ad-hoc networks using a modified ACK-based authentication scheme. It begins by introducing mobile ad-hoc networks and some of the security challenges they face, such as packet dropping attacks. It then discusses existing ACK-based authentication schemes and their limitations, such as generating a large overhead and having ambiguity when nodes refuse acknowledgments. The document proposes a modified ACK-based scheme that uses a secure channel to overcome these limitations and minimize packet dropping. It evaluates the proposed scheme through simulation experiments and finds it improves performance metrics like packet delivery ratio and throughput compared to not using a secure channel. In conclusion, the modified scheme is presented as a way to enhance node authentication and reduce packet dropping in mobile
Similar to Automation and Robotics Week 03 Theory Notes 20ME51I.pdf (20)
Fundamentals of Automation Technology 20EE43P Portfolio.pdfTHANMAY JS
Course Outcome:
CO01 Select a suitable sensor and actuator for a given automation application and demonstrate its use.
CO02 Install, test & control the pneumatic actuators using various pneumatic valves.
CO03 Develop ladder diagrams for a given application and explain its implementation using PLC.
CO04 Describe the concept of SCADA and DCS systems and list their various applications
Multimedia and Animation 20CS21P Portfolio.pdfTHANMAY JS
This document outlines the details of a course on Multimedia and Animation at Vidya Vikas Polytechnic. It includes the course code, title, credits, outcomes, assessments, activities and a portfolio index. The portfolio index lists experiments on image processing and animation that students will complete. Details are provided for the first experiment on importing images, changing resolution and scale, compression, and saving file formats.
Elements of Industrial Automation Portfolio.pdfTHANMAY JS
This document appears to be a laboratory portfolio for a course on elements of industrial automation. It includes an introduction to the course, outlines of experiments to be completed, assessment methods, and various appendices. The portfolio provides students with instructions and templates for 14 experiments involving studying automation systems, simulating PLC programs for various applications, and being exposed to SCADA systems. It aims to provide both theoretical and practical knowledge of automation technologies.
Fundamentals of Computer 20CS11T Chapter 5.pdfTHANMAY JS
Chapter 05: INTRODUCTION TO COMPUTER PROGRAMMING
5.1 Basics of programming
• Algorithms and Flowcharts
• Basics
• Decision making
• Iterative
(With sufficient examples)
5.2 Programming Languages
• Generation of languages
• General concepts of variables and constants
Fundamentals of Computer 20CS11T Chapter 4.pdfTHANMAY JS
The document provides an introduction to computer organization and operating systems. It discusses key concepts in computer organization such as the central processing unit, memory hierarchy, input/output systems, and assembly language. It also covers important concepts in operating systems like process management, memory management, file systems, and security. The document then describes the functional units of a computer including the CPU, memory, input/output units, buses, and control units. It explains concepts like the stored program concept, Flynn's classification of computer architectures, and introduces BIOS/UEFI firmware.
This document contains theory notes for the subject "Fundamentals of Computers" being taught in the 1st semester at Vidya Vikas Polytechnic. It includes details of the course code, credits, teaching scheme, course outcomes and assessment. The content covers topics such as number systems, logic gates, Boolean algebra, logic circuits, computer concepts, computer organization, operating systems and computer programming. Sample problems are provided for converting between different number systems like binary, decimal, octal and hexadecimal.
Elements of Industrial Automation Week 09 Notes.pdfTHANMAY JS
Select a suitable Sensor / Switch for a given Process Variable and activate
• Selection of Sensor/Transducer – 10 Marks
• Activation and Result –20Marks
OR
Select a suitable motor for the given case and energize
• Selection of the Motor – 10 Marks
• Energize and Result – 20 Marks
Device and Simulate a ladder diagram for the given Case Study
• Writing Ladder Program –30 Marks
• Simulate and Troubleshoot –20 Marks
Elements of Industrial Automation Week 08 Notes.pdfTHANMAY JS
Select a suitable Sensor / Switch for a given Process Variable and activate
• Selection of Sensor/Transducer – 10 Marks
• Activation and Result –20Marks
OR
Select a suitable motor for the given case and energize
• Selection of the Motor – 10 Marks
• Energize and Result – 20 Marks
Device and Simulate a ladder diagram for the given Case Study
• Writing Ladder Program –30 Marks
• Simulate and Troubleshoot –20 Marks
Elements of Industrial Automation Week 07 Notes.pdfTHANMAY JS
Select a suitable Sensor / Switch for a given Process Variable and activate
• Selection of Sensor/Transducer – 10 Marks
• Activation and Result –20Marks
OR
Select a suitable motor for the given case and energize
• Selection of the Motor – 10 Marks
• Energize and Result – 20 Marks
Device and Simulate a ladder diagram for the given Case Study
• Writing Ladder Program –30 Marks
• Simulate and Troubleshoot –20 Marks
Elements of Industrial Automation Week 06 Notes.pdfTHANMAY JS
Select a suitable Sensor / Switch for a given Process Variable and activate
• Selection of Sensor/Transducer – 10 Marks
• Activation and Result –20Marks
OR
Select a suitable motor for the given case and energize
• Selection of the Motor – 10 Marks
• Energize and Result – 20 Marks
Device and Simulate a ladder diagram for the given Case Study
• Writing Ladder Program –30 Marks
• Simulate and Troubleshoot –20 Marks
Elements of Industrial Automation Week 05 Notes.pdfTHANMAY JS
Select a suitable Sensor / Switch for a given Process Variable and activate
• Selection of Sensor/Transducer – 10 Marks
• Activation and Result –20Marks
OR
Select a suitable motor for the given case and energize
• Selection of the Motor – 10 Marks
• Energize and Result – 20 Marks
Device and Simulate a ladder diagram for the given Case Study
• Writing Ladder Program –30 Marks
• Simulate and Troubleshoot –20 Marks
Elements of Industrial Automation Week 04 Notes.pdfTHANMAY JS
Select a suitable Sensor / Switch for a given Process Variable and activate
• Selection of Sensor/Transducer – 10 Marks
• Activation and Result –20Marks
OR
Select a suitable motor for the given case and energize
• Selection of the Motor – 10 Marks
• Energize and Result – 20 Marks
Device and Simulate a ladder diagram for the given Case Study
• Writing Ladder Program –30 Marks
• Simulate and Troubleshoot –20 Marks
Elements of Industrial Automation Week 03 Notes.pdfTHANMAY JS
Select a suitable Sensor / Switch for a given Process Variable and activate
• Selection of Sensor/Transducer – 10 Marks
• Activation and Result –20Marks
OR
Select a suitable motor for the given case and energize
• Selection of the Motor – 10 Marks
• Energize and Result – 20 Marks
Device and Simulate a ladder diagram for the given Case Study
• Writing Ladder Program –30 Marks
• Simulate and Troubleshoot –20 Marks
Elements of Industrial Automation Week 02 Notes.pdfTHANMAY JS
Select a suitable Sensor / Switch for a given Process Variable and activate
• Selection of Sensor/Transducer – 10 Marks
• Activation and Result –20Marks
OR
Select a suitable motor for the given case and energize
• Selection of the Motor – 10 Marks
• Energize and Result – 20 Marks
Device and Simulate a ladder diagram for the given Case Study
• Writing Ladder Program –30 Marks
• Simulate and Troubleshoot –20 Marks
Elements of Industrial Automation Week 01 Notes.pdfTHANMAY JS
This document provides information on elements of industrial automation taught in a course at Vidya Vikas Polytechnic. It includes:
1. An overview of the need for industrial automation, benefits, and basic components.
2. Details on the automation hierarchy, from device to enterprise levels, and descriptions of common components like sensors, motors, and PLCs.
3. The course content which involves tutorials, practical sessions, and programming covering topics like PLC programming, embedded systems, distributed control systems, and SCADA.
Fundamentals of Automation Technology 20EE43P C-20 Lab Manual SCADA.pdfTHANMAY JS
1.Meaning of SCADA
-Functions of each component of SCADA system,
-Describe SCADA Hardware and software
-Applications of SCADA.
Experiment 01: Moving of Object from one Place to Another
Experiment 02: Filling up of Tank
Experiment 03: Lighting a Bulb
Experiment 04: Starting of Fan
Elements of Industrial Automation 20ME43P C-20 Lab Manual.pdfTHANMAY JS
Experiment 01: Activation of Various Output Indicator Elements using Push buttons
Experiment 02: Activation of Indicator Light by series and Parallel switches
Experiment 03: Activation of Indicator Light by Coil activated Contact Switch
Experiment 04: Activating Indicator light using Circuit with Coil latch and Coil Unlatch
Experiment 05: Activation of Indicator light by Delay timer circuit
Experiment A: Control of double acting cylinder using Proximity sensors and Proximity Switch
Experiment B: Control of double acting cylinder using delay on and off timer and counter
Experiment C: Execute energized motor using Switches in Series or Parallel Circuit
Experiment D: Execute energized motor using Switches in Latching Circuit
Experiment E: Execute energized motor using Switches in Sequential O/P
Experiment F: Delay Control of Motors using Timer function
Experiment G: Control of Motors using Relay contact
Experiment H: Indirect Control of Forward and Reverse motion in Motor
Experiment I: Direct Control of Forward and Reverse motion in Motor
Fundamentals of Automation Technology 20EE43P C-20 Lab Manual.pdfTHANMAY JS
For a given automation application select suitable pneumatic components and sensors.
Experiment 01: Electro pneumatics circuits for Direct Control of single acting cylinder
Experiment 02: Electro pneumatics circuits for In-Direct Control of single acting cylinder
Experiment 03: Electro pneumatics circuits for Direct Control of Double acting cylinder
Experiment 04: Electro pneumatics circuits for In-Direct Control of Double acting cylinder
Experiment 05: Electro pneumatics circuits for Control of Actuator using OR logic (Parallel circuit)
Experiment 06: Electro pneumatics circuits for Control of Actuator using AND logic (Series circuit)
Experiment 07: Electro pneumatics circuits for Automatic return of a Single acting cylinder
Experiment 08: Oscillation of double acting cylinder using proximity switches and Double Solenoid Sensors
Experiment 09: Control of double acting cylinder using pressure switch
Experiment 10: Control of double acting cylinder using delay timer
Section B
Demonstrate & control the Pneumatic actuators using pneumatic valves.
Experiment A: Conveyor belt with Oscillation motion
Experiment B: Latching circuit with a limit switch and Mechanical Position sensor
Experiment C: Simultaneous Transfer station Simulation Circuit
Experiment D: Multiple actuator circuit with direct control circuit
Experiment E: Stamping Circuit using Delay timer switch
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
Automation and Robotics Week 03 Theory Notes 20ME51I.pdf
1. Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore
WEEK 03
Day 01 Session:
Communication network with PLC systems and standard communication protocols for data transfer
Communication is an important role player in PLC. Apart from traditional hardware IO’s,
communication protocols provide more diversity and flexibility to exchange data with various means. The
various communication methods used in a PLC are as follows:
1) Ethernet/IP: It is a protocol that works under Common Industrial Protocol (CIP), which is an open
application layer protocol. It is an advanced version of standard Ethernet, which is useful only for in-home
and commercial purposes; but not for industrial applications. It defines all the devices on a network as a
series of objects and binds all of them to work on the same standard. This protocol was developed by
Rockwell Automation.
2) Modbus: Modbus is a protocol that is used for transmitting information over a serial lines or Ethernet, based
on master-slave technology. Here we have two types of devices in this communication. The devices which
request information are called Modbus Master and the devices which provide the information are
called Modbus Slaves.
3) Profibus: It is similar to Modbus RTU, which also works on serial line communication. The only difference
is that it is owned by Siemens Automation.
4) Optomux: It is a serial network protocol that works on RS-232/RS-485 and works on ASCII standard. It
was developed by Opto22.
5) Interbus: It is a serial network protocol which works on RS-232/RS-485 and works on RTU standard. It
was developed by Phoenix Contact.
6) HostLink: It is a serial network protocol that works on RS-232/RS-485 and works on RTU standard. It
works only on Omron PLCs. It was developed by Omron.
7) Data Highway (DH+): It is a protocol developed by Rockwell Automation and uses transformer-coupled
differential signals; meaning that the transmitter and receiver stations need not be at the same ground
potential. It works with the differential signaling concept. It uses two wires for data transfer and the data is
represented with voltage differences in the two wires. Here the data is carried with differential voltages, the
noise will be easily removed in the two wires.
8) Point to Point (PP): As the name suggests, it is a communication protocol which is used to communicate
between only two connected devices. It is byte-oriented and is full duplex.
9) Actual Sensor Interface (ASI): It is a protocol that is used to connect all the sensors and actuators in a field
with a single two-conductor cable. It reduces the wiring and manpower done to connect the field equipment
to the PLC. It works in master-slave technology.
10) Open Smart Grid Protocol: This protocol has been developed to connect all the electrical devices in a
power grid through communication and make it a smart grid system. The devices are meters, direct load
control modules, solar panels, gateways, and other smart grid devices.
11) CAN (Controller Area Network): This protocol is an application layer protocol that communicates with
various devices using peer messaging. It is a multi-master slave communication system and has an object
dictionary that contains all the functions of a device. This is an actual communication mean and has standard
communication objects for real-time data (PDO’s), configuration data (SDO’s), timestamp, sync message,
emergency message, boot-up message, NMT message, and error control message, and other data.
12) HART (Highway Addressable Remote Transducer): HART is a protocol in which digital data is
superimposed on the traditional analog signal of 4-20 mA; so that the user gets both the analog information
as well as digital information. HART-enabled field transmitters and actuators are of great use in industrial
automation; as the user gets all the information and calibration settings sitting at one corner in the office.
2. Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore
Serial Communications
A serial transmission transfers data one bit at a time, consecutively, via a communication channel or computer
bus in telecommunication and data transmission. On the other hand, parallel communication delivers multiple
bits as a single unit through a network with many similar channels.
• 8-bits are conveyed at a time in serial transmission, with a start bit and a stop bit.
• All long-distance communication and most computer networks employ serial communication.
• Serial computer buses are becoming more common, even across shorter distances, since newer serial
technologies' greater signal integrity and transmission speeds have begun to outperform the parallel
bus's simplicity advantage.
• The majority of communication systems use serial mode. Serial networks may be extended over vast
distances for far less money since fewer physical wires are required.
Parallel Communications
Parallel communication is a means of transmitting multiple binary digits (bits) simultaneously in data
transmission. It differs from serial communication, which sends only one bit at a time; this distinction is one
method to classify a communication channel.
• A parallel interface comprises parallel wires that individually contain data and other cables that allow
the transmitter and receiver to communicate. Therefore, the wires for a similar transmission system are
put in a single physical thread to simplify installation and troubleshooting.
• A large amount of data must be delivered across connection lines at high speeds that match the
underlying hardware.
• The data stream must be transmitted through "n" communication lines, which necessitates using many
wires. This is an expensive mode of transportation; hence it is usually limited to shorter distances.
Difference between Serial and Parallel Transmission
The following table highlights the major differences between Serial and Parallel Transmission −
Key Serial Transmission Parallel Transmission
Definition
Serial Transmission is the type of
transmission in which a single
communication link is used to transfer the
data from one end to another.
Parallel Transmission is the mode of
transmission in which multiple parallel
links are used that transmit each bit of data
simultaneously.
Bit
transmission
In case of Serial Transmission, only one bit
is transferred at one clock pulse.
In case of Parallel Transmission, 8-bits
transferred at one clock pulse.
Cost
Efficiency
it can be implemented easily without having
to spend a huge amount. It is cost efficient.
Multiple links need to be implemented in
case of Parallel Transmission; hence it is
not cost efficient.
Performance
Performance is comparatively lower as
compared to Parallel Transmission.
8-bits get transferred per clock in case of
Parallel transmission is more efficient.
Preference
Serial Transmission is preferred for long
distance transmission.
Parallel Transmission is preferred only for
short distance.
Complexity
Serial Transmission is less complex as
compared to that of Parallel Transmission.
Parallel Transmission is more complex as
compared to that of Serial Transmission.
3. Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore
ASCII Functions
ASCII (American Standard Code for Information Interchange) is the most common character encoding format
for text data in computers and on the internet. In standard ASCII-encoded data, there are unique values for
128 alphabetic, numeric or special additional characters and control codes.
ASCII encoding is based on character encoding used for telegraph data. The American National Standards
Institute first published it as a standard for computing in 1963.
Characters in ASCII encoding include upper- and lowercase letters A through Z, numerals 0 through 9 and
basic punctuation symbols. It also uses some non-printing control characters that were originally intended for
use with teletype printing terminals.
ASCII characters may be represented in the following ways:
• as pairs of hexadecimal digits -- base-16 numbers, represented as 0 through 9 and A through F for
the decimal values of 10-15;
• as three-digit octal (base 8) numbers;
• as decimal numbers from 0 to 127; or
• as 7-bit or 8-bit binary
For example, the ASCII encoding for the lowercase letter "m" is represented in the following ways:
Character Hexadecimal Octal Decimal Binary (7 bit) Binary (8 bit)
m 0x6D /155 109 110 1101 0110 1101
ASCII characters were initially encoded into 7 bits and stored as 8-bit characters with the most significant bit -
- usually, the left-most bit -- set to 0.
4. Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore
Week 03
Day 02 Session
Computer network
A computer network is an interconnected system of devices, represented as network nodes, that share
information, data and resources among each other. Depending on the network type, devices can be as simple
as computers or smartphones that connect into a network. Larger networks use devices like routers and
switches to create the underlying network infrastructure. There are several types of networks, each existing to
support the devices, size and location of the system. Networks also have differing levels of access and forms
of connectivity. Below are seven common types of networks, along with their benefits and use cases.
1. Personal area network: A personal area network (PAN) is the smallest and simplest type of network.
PANs connect devices within the range of an individual and are no larger than about 10 meters (m). Because
PANs operate in such limited areas of space, most are wireless and provide short-range connectivity with
infrared technology. An example of a wireless PAN is when users connect Bluetooth devices, like wireless
headsets, to a smartphone or laptop. Although most PANs are wireless, wired PAN options exist, including
USB.
2. Local area network: A local area network (LAN) is a system where computers and other devices connect
to each other in one location. While PANs connect devices around an individual, the scope of a LAN can
range from a few meters in a home to hundreds of meters in a large company office. The network
topology determines how devices in
3. Metropolitan area network: A metropolitan area network (MAN) is an interconnection of several LANs
throughout a city, town or municipality. Like LANs, a MAN can use various wired or wireless connectivity
options, including fiber optics, Ethernet cables, Wi-Fi or cellular.
4. Campus network: A campus network, sometimes referred to as a campus area network or CAN, is a
network of interconnected, dispersed LANs. Like MANs, campus networks extend coverage to buildings close
in proximity. The difference between the two configurations is that campus networks connect LANs within a
limited geographical area, while MANs connect LANs within a larger metro area. The geographical range of
a campus network varies from 1 kilometer to 5 km, while MANs can extend to 50 km.
5. Wide area network: A wide area network (WAN) is the most expansive type of computer network
configuration. Like a MAN, a WAN is a connection of multiple LANs belonging to the same network. Unlike
MANs, however, WANs aren't restricted to the confines of city limits. A WAN can extend to any area of the
globe. For example, an organization with a corporate office in New York can connect a branch location in
London in the same WAN. Users in both locations obtain access to the same data, files and applications, and
can communicate with each other.
6. Content delivery network: A content delivery network (CDN) is a network of globally distributed servers
that deliver dynamic multimedia content -- such as interactive ads or video content -- to web-based internet
users. CDNs use specialized servers that deliver bandwidth-heavy rich media content by caching it and
speeding up delivery time. CDN providers deploy these digitized servers globally at a network edge, creating
geographically distributed points of presence.
7. Virtual private network: A virtual private network (VPN) creates a private network overlay across an
existing public network. VPNs use tunneling protocols that create encrypted connections between the network
and client devices. Network traffic travels over the VPN service's secure, encrypted tunnels instead of a public
network, effectively hiding a user's IP address and data from ISPs and cybersecurity hackers. The user's
location appears to be wherever the VPN server exists.
5. Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore
Networking architecture
Network architecture is the logical and structural layout of the network, consisting of transmission equipment,
software and communication protocols, and infrastructure (i.e., wired or wireless) transmission of data and
connectivity between components. The two types of widely used network architectures are
a) peer-to-peer aka P2P and
b) client/server aka tiered.
I. Peer-to-Peer Architecture
In a peer-to-peer network, tasks are allocated to every device
on the network. Furthermore, there is no real hierarchy in this
network, all computers are considered equal and all have the
same abilities to use the resources available on this network.
Instead of having a central server which would act as the
shared drive, each computer that is connected to this network
would act as the server for the files stored on it.
Advantages of a peer-to-peer network
• Does not require a dedicated server which means its
less costly.
• If one computer stops working, the other computers connected to the network will continue working.
• Installation and setup are quite painless because of the built-in support in modern operating systems.
Disadvantages of a peer-to-peer network
• Security and data backups are to be done to each individual computer.
• As the numbers of computers increases on a P2P network… performance, security, and access become
a major headache.
6. Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore
II. Client/Server Architecture
Client-server architecture, architecture of a computer network in
which many clients (remote processors) request and receive
service from a centralized server (host computer). In a
client/server network, a centralized, really powerful
computer(server) act as a hub in which other computers or
workstations(clients) can connect to. This server is the heart of the
system, which manages and provides resources to any client that
requests them.
Advantages of a client/server network
• Resources and data security are controlled through the server.
• Not restricted to a small number of computers.
• Server can be accessed anywhere and across multiple platforms.
Disadvantages of a client/server network
• Can become very costly due to the need of a server as well as networking devices such as hubs, routers,
and switches.
• If and when the server goes down, the entire network will be affected.
• Technical staff needed to maintain and ensure network functions efficiently.
Explain OSI model of networking
The Open Systems Interconnection (OSI) model describes seven layers that computer systems use to
communicate over a network. It was the first standard model for network communications, adopted by all
major computer and telecommunication companies in the early 1980s
The modern Internet is not based on OSI, but on the simpler
TCP/IP model. However, the OSI 7-layer model is still
widely used, as it helps visualize and communicate how
networks operate, and helps isolate and troubleshoot
networking problems. OSI Model Explained: The OSI 7
Layers
1) Application Layer: The application layer is used by
end-user software such as web browsers and email
clients. It provides protocols that allow software to send
and receive information and present meaningful data to
users. A few examples of application layer protocols are
the Hypertext Transfer Protocol (HTTP), File Transfer
Protocol (FTP), Post Office Protocol (POP), Simple Mail Transfer Protocol (SMTP), and Domain Name
System (DNS).
2) Presentation Layer: The presentation layer prepares data for the application layer. It defines how two
devices should encode, encrypt, and compress data so it is received correctly on the other end. The
presentation layer takes any data transmitted by the application layer and prepares it for transmission over
the session layer.
3) Session Layer: The session layer creates communication channels, called sessions, between devices. It
is responsible for opening sessions, ensuring they remain open and functional while data is being
7. Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore
transferred, and closing them when communication ends. The session layer can also set checkpoints
during a data transfer—if the session is interrupted, devices can resume data transfer from the last
checkpoint.
4) Transport Layer: The transport layer takes data transferred in the session layer and breaks it into
“segments” on the transmitting end. It is responsible for reassembling the segments on the receiving end,
turning it back into data that can be used by the session layer. The transport layer carries out flow control,
sending data at a rate that matches the connection speed of the receiving device, and error control,
checking if data was received incorrectly and if not, requesting it again.
5) Network Layer: The network layer has two main functions. One is breaking up segments into network
packets, and reassembling the packets on the receiving end. The other is routing packets by discovering
the best path across a physical network. The network layer uses network addresses (typically Internet
Protocol addresses) to route packets to a destination node.
6) Data Link Layer: The data link layer establishes and terminates a connection between two physically-
connected nodes on a network. It breaks up packets into frames and sends them from source to destination.
This layer is composed of two parts—Logical Link Control (LLC), which identifies network protocols,
performs error checking and synchronizes frames, and Media Access Control (MAC) which uses MAC
addresses to connect devices and define permissions to transmit and receive data.
7) Physical Layer: The physical layer is responsible for the physical cable or wireless connection between
network nodes. It defines the connector, the electrical cable or wireless technology connecting the devices,
and is responsible for transmission of the raw data, which is simply a series of 0s and 1s, while taking
care of bit rate control.
Advantages of OSI Model
The OSI model helps users and operators of computer networks:
• Determine the required hardware and software to build their network.
• Understand and communicate the process followed by components communicating across a network.
• Perform troubleshooting, by identifying which network layer is causing an issue and focusing efforts
on that layer.
The OSI model helps network device manufacturers and networking software vendors:
• Create devices and software that can communicate with products from any other vendor, allowing
open interoperability
• Define which parts of the network their products should work with.
• Communicate to users at which network layers their product operates – for example, only at the
application layer, or across the stack.
Networking hardware
Network hardware is a set of physical or network devices that are essential for interaction and communication
between hardware units operational on a computer network. These are dedicated hardware components that
connect to each other and enable a network to function effectively and efficiently.
Network equipment is part of advancements of the Ethernet network protocol and utilizes a twisted pair or
fiber cable as a connection medium. Routers, hubs, switches, and bridges are some examples of network
hardware. The fundamental devices of a computer network.
a) Modems: A modem enables a computer to connect to the internet via a telephone line. The modem at one
end converts the computer’s digital signals into analog signals and sends them through a telephone line.
8. Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore
At the other end, it converts the analog signals to digital signals that are understandable for another
computer.
b) Routers: A router connects two or more networks. One common use of the router is to connect a home
or office network (LAN) to the internet (WAN). It generally has a plugged-in internet cable along with
cables that connect computers on the LAN. Alternatively, a LAN connection can also be wireless (Wi-
Fi-enabled), making the network device wireless. These are also referred to as wireless access points
(WAPs).
c) Hubs, bridges, and switches: Hubs, bridges, and switches are connecting units that allow multiple
devices to connect to the router and enable data transfer to all devices on a network. A router is a complex
device with the capabilities of hubs, bridges, and even switches.
• Hubs: A hub broadcasts data to all devices on a network. As a result, it consumes a lot of bandwidth as
many computers might not need to receive the broadcasted data. The hub could be useful in linking a few
gaming consoles in a local multiplayer game via a wired or wireless LAN.
• Bridges: A bridge connects two separate LAN networks. It scans for the receiving device before sending
a message. This implies that it avoids unnecessary data transfers if the receiving device is not there.
Moreover, it also checks to see whether the receiving device has already received the message. These
practices improve the overall performance of the network.
• Switches: A switch is more powerful than a hub or a bridge but performs a similar role. It stores the MAC
addresses of network devices and transfers data packets only to those devices that have requested Thus,
when the demand is high, a switch becomes more efficient as it reduces the amount of latency.
d) Network interface cards: A network interface card (NIC) is a hardware unit installed on a computer,
which allows it to connect to a network. It is typically in the form of a circuit board or chip. In most
modern machines, NICs are built into the motherboards, while in some computers, an extra expansion
card in the form of a small circuit board is added externally.
e) Network cables: Cables connect different devices on a network. Today, most networks have cables over
a wireless connection as they are more secure, i.e., less prone to attacks, and at the same time carry larger
volumes of data per second.
f) Firewall: A firewall is a hardware or software device between a computer and the rest of the network
open to attackers or hackers. Thus, a LAN can be protected from hackers by placing a firewall between
the LAN and the internet connection. A firewall allows authorized connections and data-like emails or
web pages to pass through but blocks unauthorized connections made to a computer or LAN.
Network Architecture: Key Components
Network architecture defines the structural and
logical design of a network. It constitutes hardware
devices, physical connections, software, wireless
networks, protocols, and transmission media. It gives
a detailed overview of the whole network, which
organizations use to create LAN, WAN, and other
specific communication tunnels.
Network architecture design is more about
optimizing its fundamental building blocks. These
include four key components:
9. Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore
1. Hardware: Hardware refers to network devices that form the core of any network. These include user
devices (laptops, PDAs, mobile phones), routers, servers, and gateways. The basic objective of any network
architecture is to establish an efficient mechanism to transfer data from one hardware device to another.
2. Transmission media: Transmission media encompasses all physical connections between network
(hardware) devices. The properties of different transmission media determine the speed of data transfer from
one endpoint to another. These can be wired and wireless. Wired media include physical wires or cables used
for connections within a network, such as coaxial or fibre optics. On the other hand, wireless media operates
on properties of microwave or radio signals, such as Wi-Fi or cellular.
3. Protocols: Protocols refer to the rules that govern data movement between network devices. Various
machines on a network communicate with each other using this common protocol language. Without these
protocols in place, it would be difficult for your iPhone to access a web page that is essentially stored on
a Linux server.
The nature of data decides the type of network protocol it needs to adopt. For example, transmission control
protocol/internet protocol (TCP/IP) is used to connect to the internet, while file transfer protocol (FTP) is used
for sending and receiving files to and from a server. Similarly, Ethernet protocol is used for connecting one
computing device to another.
4. Topology: Network topology defines how the network is wired together and highlights the network’s
structure. This is important because variables such as distance between communicating devices can impact its
data transfer speed, thereby affecting overall network performance.
What is TCP/IP Protocol, how it works:
TCP/IP Reference Model is a four-layered suite of communication protocols. It was developed by the DoD
(Department of Defence) in the 1960s.
It is named after the two main protocols that are used in the model, namely, TCP and IP. TCP stands for
Transmission Control Protocol and IP stands for Internet Protocol.
The four layers in the TCP/IP protocol suite are:
• Host-to- Network Layer −It is the lowest layer that is concerned with the physical transmission of
data. TCP/IP does not specifically define any protocol here but supports all the standard protocols.
• Internet Layer −It defines the protocols for
logical transmission of data over the network.
The main protocol in this layer is Internet
Protocol (IP) and it is supported by the protocols
ICMP, IGMP, RARP, and ARP.
• Transport Layer − It is responsible for error-
free end-to-end delivery of data. The protocols
defined here are Transmission Control Protocol
(TCP) and User Datagram Protocol (UDP).
• Application Layer − This is the topmost layer
and defines the interface of host programs with
the transport layer services. This layer includes
all high-level protocols like Telnet, DNS, HTTP, FTP, SMTP, etc.
10. Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore
a) The Network Interface Layer: Network Interface Layer is this layer of the four-layer TCP/IP model. This
layer is also called a network access layer. It helps you to defines details of how data should be sent using
the network. It also includes how bits should optically be signalled by hardware devices which directly
interfaces with a network medium, like coaxial, optical, coaxial, fibre, or twisted-pair cables. This layer
defines how the data should be sent physically through the network. This layer is responsible for the
transmission of the data between two devices on the same network.
b) Internet Layer: An internet layer is a second layer of TCP/IP layers of the TCP/IP model. It is also known
as a network layer. The main work of this layer is to send the packets from any network, and any computer
still they reach the destination irrespective of the route they take. The Internet layer offers the functional
and procedural method for transferring variable length data sequences from one node to another with the
help of various networks.
Layer-management protocols that belong to the network layer are:
• Routing protocols
• Multicast group management
• Network-layer address assignment.
c) Transport Layer: Transport layer builds on the network layer in order to provide data transport from a
process on a source system machine to a process on a destination system. It is hosted using single or
multiple networks, and also maintains the quality-of-service functions.
It determines how much data should be sent where and at what rate. This layer builds on the message which
are received from the application layer. It helps ensure that data units are delivered error-free and in sequence.
Transport layer helps you to control the reliability of a link through flow control, error control, and
segmentation or de-segmentation.
The transport layer also offers an acknowledgment of the successful data transmission and sends the next data
in case no errors occurred. TCP is the best-known example of the transport layer.
Important functions of Transport Layers:
• It divides the message received from the session layer into segments and numbers them to make a
sequence.
• Transport layer makes sure that the message is delivered to the correct process on the destination machine.
• It also makes sure that the entire message arrives without any error else it should be retransmitted.
d) Application Layer: Application layer interacts with an application program, which is the highest level of
OSI model. The application layer is the OSI layer, which is closest to the end-user. It means the OSI
application layer allows users to interact with other software application.
Application layer interacts with software applications to implement a communicating component. The
interpretation of data by the application program is always outside the scope of the OSI model.
Example of the application layer is an application such as file transfer, email, remote login, etc.
The function of the Application Layers are:
• Application-layer helps you to identify communication partners, determining resource availability, and
synchronizing communication.
• It allows users to log on to a remote host
• This layer provides various e-mail services
• This application offers distributed database sources and access for global information about various
objects and services.
11. Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore
Differences between OSI and TCP/IP models
Introduction to IP Address
The IP address stands for Internet Protocol address is also called IP number or internet address. It helps you
to specify the technical format of the addressing and packets scheme. An IP address is a numerical label
assigned to the devices connected to a computer network that uses the IP for communication. IP address act
as an identifier for a specific machine on a particular network. It also helps you to develop a virtual connection
between a destination and a source. Most networks combine TCP with IP.
A. There are mainly four types of IP addresses:
• Public,
• Private,
• Static
• Dynamic.
Among them, public and private addresses are based on their location of the network private, which should be
used inside a network while the public IP is used outside of a network. Let us see all these types of IP address
in detail.
a) Public IP Addresses: A public IP address is an address where one primary address is associated with your
whole network. In this type of IP address, each of the connected devices has the same IP address.
b) Private IP Addresses: A private IP address is a unique IP number assigned to every device that connects
to your home internet network, which includes devices like computers, tablets, smartphones, which is used
in your household. It also likely includes all types of Bluetooth devices you use, like printers or printers,
smart devices like TV, etc. With a rising industry of internet of things (IoT) products, the number of private
IP addresses you are likely to have in your own home is growing.
c) Dynamic IP address: Dynamic IP addresses always keep changing. It is temporary and are allocated to a
device every time it connects to the web. Dynamic IPs can trace their origin to a collection of IP addresses
that are shared across many computers. Dynamic IP addresses are another important type of internet
protocol addresses. It is active for a specific amount of time; after that, it will expire.
d) Static IP Addresses: A static IP address is an IP address that cannot be changed. In contrast, a dynamic IP
address will be assigned by a Dynamic Host Configuration Protocol (DHCP) server, which is subject to
change. Static IP address never changes, but it can be altered as part of routine network administration.
Static IP addresses are consistent, which is assigned once, that stays the same over the years. This type of
IP also helps you procure a lot of information about a device.
12. Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore
B. Types of Website IP Addresses
Two types of website IP Addresses are 1) Share IP Address 2) Dedicated IP Address
a) Shared IP Addresses: Shared IP address is used by small business websites that do not yet get many
visitors or have many files or pages on their site. The IP address is not unique and it is shared with
other websites.
b) Dedicated IP Addresses: Dedicated IP address is assigned uniquely to each website. Dedicated IP
addresses helps you avoid any potential backlists because of bad behavior from others on your server.
The dedicated IP address also gives you the option of pulling up your website using the IP address alone,
instead of your domain name. It also helps you to access your website when you are waiting on a domain
transfer.
C. Version of IP address
Two types of IP addresses are 1) IPV4 and 2) IPV6.
a) IPV4: IPv4 was the first version of IP. It was deployed for production in the ARPANET in 1983. Today
it is the most widely used IP version. It is used to identify devices on a network using an addressing
system. The IPv4 uses a 32-bit address scheme allowing to store 2^32 addresses, which is more than 4
billion addresses. To date, it is considered the primary Internet Protocol and carries 94% of Internet traffic.
b) IPV6: It is the most recent version of the Internet Protocol. Internet Engineer Taskforce initiated it in
early 1994. The design and development of that suite is now called IPv6. This new IP address version is
being deployed to fulfill the need for more Internet addresses. It was aimed to resolve issues which are
associated with IPv4. With 128-bit address space, it allows 340 undecillion unique address space.
D. IP Address Classification Based on Operational Characteristics
a) Unicast addressing: Unicast addressing is the most common concept of an IP address in the Unicast
addressing method. It is available in both IPv4 and IPv6. This IP address method refers to a single
sender/receiver. It can be used for both sending and receiving the data. In most cases, a Unicast address
is associated with a single device or host, but a device or host that may have more than one unicast address.
b) Broadcast addressing: Broadcasting addressing is another addressing method available in IPv4. It allows
you to manage data to all destinations on a network with a single transmission operation. The IP address
255.255.255.255 is mostly used for network broadcast. Moreover, limited directed-broadcast uses the all-
ones host address with the network prefix. IPv6 does not provide any implementation and any broadcast
addressing. It replaces it with multicast to the specially defined all-nodes of the multicast address.
c) Multicast IP addresses: Multicast IP addresses are used mainly for one-to-many communication.
Multicast messages are mostly sent to the IP multicast group address. In this, routers forward copies of
the packet out to every interface with hosts subscribed to that specific group address. Only the hosts that
require receiving the message will process the packets. All other hosts on that LAN will discard them.
d) Anycast addressing: In anycast addressing the data, the stream is not transmitted to all receivers.
However, just the one that the router decides is closest to the network. This IP addressing comes as a
built-in feature of IPv6. In IPv4, it is implemented by using the Border Gateway Protocol by using the
shortest-path metric. This method is widely used for global load balancing and is also used in distributed
DNS systems.
13. Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore
Subnet Mask:
Subnetting is the practice of dividing a network into two or smaller networks. It increases routing
efficiency, which helps to enhance the security of the network and reduces the size of the broadcast domain.
IP Subnetting designates high-order bits from the host as part of the network prefix. This method divides a
network into smaller subnets.
It also helps you to reduce the size of the routing tables, which is stored in routers. This method also helps you
to extend the existing IP address base & restructures the IP address.
• It helps you to maximise IP addressing efficiency.
• Extend the life of IPV4.
• Public IPV4 Addresses are scarce.
• IPV4 Subnetting reduces network traffic by eliminating collision and broadcast traffic and thus
improves overall performance.
• This method allows you to apply network security policies at the interconnection between subnets.
• Optimized IP network performance.
• Facilitates spanning of large geographical distances.
• Subnetting process helps to allocate IP addresses that prevent large numbers of IP network addresses
from remaining unused.
A subnet mask is a 32 bits address used to distinguish between a network address and a host address in IP
address. A subnet mask identifies which part of an IP address is the network address and the host address.
They are not shown inside the data packets traversing the Internet. They carry the destination IP address,
which a router will match with a subnet.
Two types of subnet masks are:
• The default Subnet Mask is the number of bits which is reserved by the address class. Using this default
mask will accommodate a single network subnet in the relative class.
• A Custom Subnet Mask can be defined by an administrator to accommodate many Network
The subnet mask is used by the router to cover up the network address. It shows which bits are used to
identify the subnet.
Every network has its own unique address, like here, class B network has network address 172.20.0.0, which
has all zeroes in the host portion of the address.
Example IP address: 11000001. Here 1st
and 2nd
bits are 1, and the 3rd
bit is 0; hence, it is class C.
14. Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore
Above example shows how IP addresses should be deconstructed, which makes it simple for Internet routers
to find the right Network to route data into. However, in a Class A network there could be millions of
connected devices, and it could take some time for the router to find the right device.
Methods of Subnet Masking
We can subnet the masking process in two ways: Straight or Short-cut.
1) Straight
You should use the binary notation method for both the address and the mask and then apply the AND
operation to get the block address.
2) Short-Cut Method
• In case the byte in the mask is 255, you need to copy the byte in the destination address.
• When the byte in the mask is 0, then you need to replace the byte in the address with 0.
• When the byte in the mask is neither 255 nor 0, then you should write the mask and the address in
binary and use the AND operation.
• In case if the extracted network address matches the local network ID, and the destination is located
on the local Network. However, if they do not match, the message must be routed outside the local
Network.
Class Default subnet mask No. of networks No. of host per network
A 255.0.0.0 256 16,777,214
B 255.255.0.0 65,536 65,534
C 255.255.255.0 16,77,216 126
15. Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore
Week 03
Day 03 Session
Industrial Automation Communication Protocols
Communication protocols is what we call the digital message formats and rules required to exchange messages
in or between computers and instruments. This is required in process automation.
The following are the few examples of communication protocols, its uses and its makers in the field of process
automation:
1) Modbus PEMEX: a serial communications protocol for use with its Modicons programmable logic
controllers (PLCs). Simple and robust, it has since become a de facto standard communication protocol, and
it is now a commonly available means of connecting industrial electronic devices – –Modicon/Schneider
Electric
2) Controller Area Network or CAN bus: a vehicle bus standard designed to allow microcontrollers and
devices to communicate with each other in applications without a host computer. Utilised in many network
implementations, including CANopen and DeviceNet – Bosch
3) ControlNet: an open industrial network protocol for industrial automation applications, also known as a
fieldbus – Allen-Bradley
4) DeviceNet: a network system used in the automation industry to interconnect control devices for data
exchange. - Allen-Bradley
5) DF-1 protocol: an asynchronous byte-oriented protocol that is used to communicate with most Allen
Bradley RS232 interface modules. DF1 protocol consists of link layer and application layer formats. – Allen
Bradley
6) DirectNet: used by DirectLOGIC PLCs and is used in APS vacuum controls since 1999. It is a
master/slave protocol making use of RS-232 or RS-422 physical layers with a baud rate from 300 to 38,400.
It is designed to drive a maximum of 90 PLCs on a serial line. – Automation Direct
7) Ethernet Global Data (EGD): a protocol that enables producer (server) to share a portion of its memory
to all the consumers (clients) at a scheduled periodic rate. – GE Fanuc PLCs
8) EtherNet/IP: IP stands for “Internet Protocol”. An implementation of CIP, originally. – Rockwell
Automation
9) Ethernet Powerlink: a deterministic real-time protocol for standard Ethernet. - Ethernet POWERLINK
Standardization Group (EPSG).
10) HART Protocol: (Highway Addressable Remote Transducer) – an early implementation of Fieldbus, a
digital industrial automation protocol. Its most notable advantage is that it can communicate over legacy 4-
20 mA analog instrumentation wiring, sharing the pair of wires used by the older system. – Rosemount
11) CC-Link Industrial Networks: An open industrial network that enables devices from numerous
manufacturers to communicate. It is predominantly used in machine, cell or process control applications in
manufacturing and production industries, but can also be used in facilities management, process control and
building automation. – CLPA Europe
12) FINS: provides a consistent way for PLCs and computers on various networks to communicate.
Compatible network types include Ethernet, Host Link, Controller Link, SYSMAC LINK, SYSMAC WAY,
and Toolbus. – OMRON
13) Profibus: A standard for fieldbus communication in automation technology used by Siemens. –
PROFIBUS International.
14) PROFINET IO: The basic idea of CBA is that an entire automation system can be divided into
autonomously operating subsystems.
16. Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore
RS232-422-485 standards
The RS-232, RS-422 and RS-485 designations refer to interfaces for digital data transmission. The RS-232
standard is better known as a normal computer COM port or serial port (although Ethernet, FireWire and USB
can also be considered as a serial port). The RS-422 and RS-485 interfaces are widely used in the industry for
connecting various equipment.
The table shows the main differences between RS-232, RS-422 and RS-485 interfaces.
Port name RS-232 RS-422 RS-485
Transfer type Full duplex Full duplex
Half duplex (2 wires),
full duplex (4 wires)
Maximum distance 15 meters at 9600 bps
1200 meters at
9600 bps
1200 meters at 9600 bps
Contacts in use
TxD, RxD, RTS, CTS,
DTR, DSR, DCD, GND*
TxA, TxB, RxA,
RxB, GND
DataA, DataB, GND
Topology Point-to-Point Point-to-Point Multi-point
Max. Number of
connected devices
1
1 (10 devices in
receive mode)
32 (with repeaters larger,
usually up to 256)
Network standards
Networking standards define the rules for data communications that are needed for interoperability of
networking technologies and processes. Standards help in creating and maintaining open markets and allow
different vendors to compete on the basis of the quality of their products while being compatible with existing
market products.
During data communication, a number of standards may be used simultaneously at the different layers. The
commonly used standards at each layer are −
• Application layer − HTTP, HTML, POP, H.323, IMAP
• Transport layer − TCP, SPX
• Network layer −IP, IPX
• Data link layer − Ethernet IEEE 802.3, X.25, Frame Relay
• Physical layer −RS-232C (cable), V.92 (modem)
Types of Standards
Standards are of two types
• De facto − The meaning of the work” De Facto” is” By Fact” or “By Convention”. These are the standards
that are followed without any formal plan or approval by any organization. They have come into existence
due to traditions or facts. For example, the HTTP had started as a de facto standard.
• De jure − The meaning of the word “De Jure” is “By Law” or “By Regulations”. These standards are
the ones which have been adopted through legislation by any officially recognized standards organization.
Most of the communication standards that are used today are de jure standards.
Standards Organizations
Some of the noted standard’s organizations are
• International Standards Organization (ISO)
• International Telecommunication Union (ITU)
• Institute of Electronics and Electrical Engineers (IEEE)
• American National Standards Institute (ANSI)
• Internet Research Task Force (IETF)
• Electronic Industries Association (EIA)
17. Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore
Static and Dynamic Routing principle
A router uses information contained in the internet protocol header to make various decisions; these decisions
include:
• Path determination
• Routing decision
• Load balancing
Path determination: When a router receives an IP packet through any of its interfaces, the router examines
the packet’s destination IP address, the optimal path to reach this destination is added to the routing table.
Metrics are used to determine the optimal path to reach a destination IP address through static and dynamic
routing protocols. These metrics are standard measurements or vectors that give a quantitative value measure
for the distance to a given network.
Routing decision: The primary function of a router is to forward a packet to its destination. The router
achieves this by encapsulating the IP packet with the appropriate data link frame type of the egress port. This
encapsulation happens after the router has determined the exit interface associated with the best path to
forward that packet.
Load balancing: A router can have two or more paths with equal metric and administrative distance to a
destination sub-network. When this happens, the router will forward the packet using both paths. The method
of sending data to a destination sub-network using two or more paths is called Load balancing.
Static Routing
In static routing, the routes show the path between two
routers that cannot be updated automatically. The path is
manually updated. If the changes occur on the network
side, we need to update the routing table’s changing path.
Routing tables are the tables that contain the routing
information. Static routing is easy to design and
implement, as there is not a complex path. Static routing
is the best choice when the number of routers is less as it requires manual updates. Static routing is also known
for non-adaptive routing as it does not adopt the routing path automatically.
Dynamic Routing
In dynamic routing, the routers show the path
between two routers that can be updated
automatically. Paths are automatically updated. If
the changes occur on the network side, there is no
need to update the routing path manually; routing
paths will automatically be updated. Paths between
routers are known as routing paths. When changes
occur at the network, it sends messages to a router to inform about changes. The router updates the changes
and using routing algorithm routes, i.e. routing paths are calculated and updated in the table. Dynamic routing
also is known for adaptive routing as it adopts the routing path automatically.
18. Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore
Comparison between Static Routing vs Dynamic Routing.
Basis of Comparison Static Routing Dynamic Routing
Configuration
Technique
In static routing, routing tables are
manually updated.
In dynamic routing, routing tables are
dynamically updated.
Bandwidth
It requires less bandwidth than
dynamic routing.
It requires more bandwidth than static
routing.
Paths/Routes
Paths are defined by administrative. Paths are updated according to the
changes in the network.
Application Area
Static Routing is implemented in a
small network.
Dynamic Routing is implemented in a
large network.
Routing Protocols
It does not use any protocol. It uses protocols like eigrp, arp, etc., to
calculate the routing operation.
Routing Algorithms
It does not use any complex routing
algorithms.
It uses complex routing algorithms.
Security Highly secure than dynamic routing Less secure than static routing.
Link Affect
If any link between routers fails, it
disturbs other routing paths.
Failure of any link between routers
does not affect other routing paths.
Network
Infrastructure
Network infrastructure is small. The network infrastructure is large.
Failure of Link
Link failure disturbs routing is in
process.
Link failure does not disturb routing is
in process.
19. Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore
Week 03
Day 04 Session
Concepts of Wireless Networking
Wireless networks are computer networks that are not connected by cables of any kind. The use of a wireless
network enables enterprises to avoid the costly process of introducing cables into buildings or as a connection
between different equipment locations. The basis of wireless systems are radio waves, an implementation that
takes place at the physical level of network structure.
Wireless networks operate using Radio Frequency (RF) technology, a frequency associated with radio wave
propagation within the electromagnetic spectrum. An electromagnetic field is generated when an RF current
is supplied to an antenna that can then spread through space.
A system recognized as an access point (AP) is the core of a wireless network. An access point’s primary role
is to broadcast a wireless signal sensed and tuned into by computers. Since wireless networks are typically
linked to wired networks, access points often act as a gateway to a wired network’s resources, such as an
Internet connection.
Computers need to be fitted with wireless network adapters to connect to an access point and join a wireless
network. These are mostly built right into the device, but if not, by using an add-on adapter attached to an
empty expansion slot, USB port, or, in the case of notebooks, a PC card slot, just about any computer or
notebook can be made wireless-capable.
There are four main types of wireless networks:
• Wireless Local Area Network (LAN): Links two or more devices using a wireless distribution
method, providing a connection through access points to the wider Internet.
• Wireless Metropolitan Area Networks (MAN): Connects several wireless LANs.
• Wireless Wide Area Network (WAN): Covers large areas such as neighboring towns and cities.
• Wireless Personal Area Network (PAN): Interconnects devices in a short span, generally within a
person’s reach.
Wireless networking standards
Wireless technology has evolved over a long period so has the technology associated with it. It’s always
advisable to do your own research before purchasing any of these technologies.
The most common wireless technologies in use today include:
• IEEE 802.11b-1999 (802.11b) - This technology provides transmission of up to 11Mbps and is
backward compatible.
• IEEE 802.11g-2003(IEEE 802.11g) - This is a popular technology that provides up to 54Mbps and
covers a distance of 150 feet.
• IEEE 802.11n-2009(IEEE 802.11n) - This technology aims at improving the throughput of the
frequency range between 2.4GHz and 5GHz. It uses several antennae, which in turn increases the data
rates.
20. Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore
Latest trends in PLC communication protocols.
Many PLC suppliers still support these older physical,
wired connections—most often based on RS-232C, RS-
422 and RS-485 connectivity—and the related proprietary
communication protocols.
When the control system requires venturing outside a
single supplier, communication standards come to the
forefront, starting at the physical layer.
The physical layer defines how to connect the upper data
link layer in the Open Systems Interconnection (OSI)
communications model within a computer to physical
devices. It is basically the hardware requirements with
schematics and specifications for successful bit-level
communication to different devices. The physical layer not
only defines items such as bit rates, transmission electrical,
light or radio signals, and flow control in asynchronous serial communication, it also defines types of cables
and the shape of connectors.
Physical layers include:
• Proprietary protocol for a barcode reader using an RS-232 point-to-point connection
• Motor drives protocol connecting multiple devices on an RS-422/485 multi-drop connection
• Printer protocol over a parallel interface
• Ethernet for connection to a plant or control network
• Universal Serial Bus (USB) for connection to keyboard
• Bluetooth for connection to a wireless microphone
A protocol is a set of rules for communication among networked devices. Some common protocols used in
the industrial arena include:
• Modbus RTU
• EtherNet/IP
• Ethernet TCP/IP
• Modbus TCP/IP
• Profinet
Using Ethernet, it’s not too difficult to interconnect several devices such as PLCs, HMIs, field I/O and valve
banks. Plus, the communication remains fast while talking to several dissimilar devices on the same cable,
due to the very high speed of Ethernet as compared to older serial networks.
Today’s physical, wired layer is moving to Ethernet for most control system communications. Wiring,
connectors and managed or unmanaged switches are now standard—with a wide variety of devices capable
of connecting to the Ethernet hardware and industry-standard networking technologies.
Most users just need to interact with the physical Ethernet layer, plugging in the cables and letting the protocols
worry about error-free communication.
Popular industrial Ethernet protocols like EtherNet/IP and a common network infrastructure allow consistent
data and communication from the HMI and desktop PCs at the information level—through the PLCs, HMIs,
servo controllers and drives at the control level—to the device level distributed I/O and field components.
And, of course, Ethernet is the portal to the Internet which allows a PLC to communicate worldwide. Some
PLCs have built-in web server capability, allowing access to it from any web browser
21. Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore
Fundamental Elements and Characteristics of PLC communication Protocol
Network communication protocol requires following elements:
1. Message encoding:
A source message from sender is encoded into signals or waves then transmitted through a medium wired /
wireless then received and decoded and message is passed to destination. Encoding is the process of
transforming set of Unicode characters into a sequence of bytes.
Message Source –> Encoder –> Transmitter –> Transmitter Medium –>
Receiver –>Decoder –> Message destination
2. Message formatting and encapsulation:
There is an agreed format between sender and receiver. It encapsulates information to identify sender and
receiver rightly.
A message format will depend on the type of message and the medium through which the message is
delivered. Message encapsulation is a process that is used to place one message inside another message for
transfer from the source to the destination.
3. Message size:
Here long messages must break into small pieces to travel across a network or the process of breaking up a
long message into individual pieces before being sent over the network.
Example; In mobile phone SMS limits message size to 160 normal alphabet characters. For non-alphabet
character, It needs 16 bit of data to represent them limiting size to 70 characters only.
4. Message timing:
It manages flow control. Acknowledgments response time out. This requires certain timing control
information. It checks for any delays in data passing. It includes rules like Access method, flow control,
response timeout.
5. Message delivery options:
There are different delivery options like Unicast, Multicast, Broadcast. Sending information to a single
person is referred to as a one-to-one delivery and is called unicast which implies that there is only one
destination (single destination).
Characteristics of PLC Communication Protocols
The standard protocols are used once PLC modules are connected over the network. The different types these
protocols mainly support different speed, distance & the number of connecting devices.
• Ethernet protocol baud rate is 100 Mb/s, length is Few Km and 255 nodes.
• RS-485 baud rate is 10 Kb/s, the length is 1.2 Km, and 32 nodes
• Profibus protocol baud rate is 5-12 Mb/s, the length is 15 Km and 127 nodes.
• RS-232 baud rate is 19.2 Kb/s, the length is 10m and 1 node
• MPI protocol baud rate is 19.2- 38.4 Kb/s, the length is 50 m and 32 nodes.
• PC Adapter baud rate is 9600 Kb/s, length is 15 m, and 1 node
• PPI protocol baud rate is 187.5 Kb/s, the length is 500 m, and 1 node.
• USB Adapter baud rate is 57.6 Kb/s, the length is 10 m and 1sec
• DH protocol baud rate is 230.4 Kb/s, the length is 3.048 Km, and 64 nodes
• Device Net protocol braud rate is 500 Kb/s, the length is 0.487, and 64 nodes
• Control Net protocol baud rate is5 Mb/s, the length is 30 Km
22. Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore
Demonstrate Peer to Peer (PLC to PLC) & PLC to PC Communication protocols
To understand the PLC's communications versatility let us first define the terms used in describing the
various systems:
ASCII: This stands for "American Standard Code for Information Interchange." As shown in Fig. 1, when the
letter "A" is transmitted, for instance, it's automatically coded as "65" by the sending equipment. The receiving
equipment translates the "65" back to the letter "A." Thus, different devices can communicate with each other
as long as both use ASCII code.
Bus topology: This is a linear local area network (LAN) arrangement, as shown in Fig. 2A, in which individual
nodes are tapped into a main communications cable at a single point and broadcast messages. These messages
travel in both directions on the bus from the point of connection until they are dissipated by terminators at
each end of the bus.
CPU: This stands for "central processing unit," which actually is that part of a computer, PLC, or other
intelligent device where arithmetic and logical operations are performed and instructions are decoded and
executed.
Daisy chain: This is a description of the connection of individual devices in a PLC network, where, as shown
in Fig. 3, each device is connected to the next and communications signals pass from one unit to the next in a
sequential fashion.
Distributed control: This is an automation concept in which portions of an automated system are controlled
by separate controllers, which are located in close proximity to their area of direct control (control is
decentralized and spread out over the system).
Host computer: This is a computer that's used to transfer data to, or receive data from, a PLC in a
PLC/computer network.
Intelligent device: This term describes any device equipped with its own CPU.
I/O: This stands for "inputs and outputs," which are modules that handle data to the PLC (inputs) or signals
from the PLC (outputs) to an external device.
Kbps: This stands for "thousand bits per second," which is a rate of measure for electronic data transfer.
Mbps: This stands for "million bits per second."
Node: This term is applied to any one of the positions or stations in a network. Each node incorporates a
device that can communicate with all other devices on the network.
Protocol: The definition of how data is arranged and coded for transmission on a network.
Ring topology: This is a LAN arrangement, as shown in Fig. 2C, in which each node is connected to two other
nodes, resulting in a continuous, closed, circular path or loop for messages to circulate, usually in one
direction. Some ring topologies have a special "loop back" feature that allows them to continue functioning
even if the main cable is severed.
RS232: This is an IEEE standard for serial communications that describes specific wiring connections, voltage
levels, and other operating parameters for electronic data communications. There also are several other RS
standards defined.
Serial: This is an electronic data transfer scheme in which information is transmitted one bit at a time.
Serial port: This the communications access point on a device that is set up for serial communications.
Star topology: This is a LAN arrangement in which, nodes are connected to one another through a central
hub, which can be active or passive. An active hub performs network duties such as message routing and
maintenance. A passive central hub simply passes the message along to all the nodes connected to it.
Topology: This relates to a specific arrangement of nodes in a LAN in relation to one another.
Transparent: This term describes automatic events or processes built into a system that require no special
programming or prompting from an operator.
23. Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore
PLC network options.
a) Peer-to-peer networks
Peer-to-peer networks, enhance reliability by decentralizing the control functions without sacrificing
coordinated control. In this type of network, numerous PLCs are connected to one another in a daisy-chain
fashion, and a common memory table is duplicated in the memory of each. In this way, when any PLC writes
data to this memory area, the information is automatically transferred to all other PLCs in the network. They
then can use this information in their own operating programs. With peer-to-peer networks, each PLC in the
network is responsible for its own control site and only needs to be programmed for its own area of
responsibility. This aspect of the network significantly reduces programming and debugging complexity;
because all communications occur transparently to the user, communications programming is reduced to
simple read-and-write statements.
In a peer-to-peer system, there's no master PLC. However, it's possible to designate one of the PLCs
as a master for use as a type of group controller. This PLC then can be used to accept input information from
an operator input terminal, for example, sending all the necessary parameters to other PLCs and coordinating
the sequencing of various events.
b) Host computer links
PLCs also can be connected with computers or other intelligent devices. In fact, most PLCs, from the small to
the very large, can be directly connected to a computer or part of a multi drop host computer network via
RS232C or RS422 ports. This combination of computer and controller maximizes the capabilities of the PLC,
for control and data acquisition, as well as the computer, for data processing, documentation, and operator
interface. This computer individually addresses each of its networked PLCs and asks for specific information.
The addressed PLC then sends this information to the computer for storage and further analysis. This cycle
occurs hundreds of times per second.
Host computers also can aid in programming PLCs; powerful programming and documentation software is
available for program development. Programs then can be written on the computer in relay ladder logic and
downloaded into the PLC. In this way, you can create, modify, debug, and monitor PLC programs via a
computer terminal.
In addition to host computers, PLCs often must interface with other devices, such as operator interface
terminals for large security and building management systems. Although many intelligent devices can
communicate directly with PLCs via conventional RS232C ports and serial ASCII code, some don't have the
software ability to interface with individual PLC models. Instead, they typically send and receive data in fixed
formats. It's the PLC programmer's responsibility to provide the necessary software interface.
The easiest way to provide such an interface to fixed-format intelligent devices is to use an ASCII/BASIC
module on the PLC. This module is essentially a small computer that plugs into the bus of the PLC. Equipped
with RS232 ports and programmed in BASIC, the module easily can handle ASCII communications with
peripheral devices, data acquisition functions, programming sequences, "number crunching," report and
display generation, and other requirements.
Day 05 Session:
CIE 1– Written and practice test + Assessment Review and corrective action + Industry Assignment
Day 06 Session:
Industry Class on Communication Protocol practiced in industry + Industry Assignment