SlideShare a Scribd company logo
1 of 15
Name: Tony-Chen, 陳禹同
Student ID: B10502034
 EtherCAT embeds its payload/frame into
standard Ethernet frame. The frame is
identified with the Identifier(0x88A4) in the
EtherType field. Since the EtherCAT protocol
is optimized for short cyclic process data, the
use of protocol stacks, such as TCP/IP or
UDP/IP, can be eliminated.
 EtherCAT has its header and telegram.
 Master creates oringinal frame and sends it to
each slaver.
 Each slaver will take out or provide packet
when frame go through it.
Datagram header indicates what type of
access the master device would like to
execute:
• Read, write, read-write
• Access to a specific slave device through direct
addressing, or access to multiple slave devices
through logical addressing (implicit addressing).
EtherCAT’s telegram contains many sub-
frames.
Safety over EtherCAT frame is important to
EtherCAT to protect data, device, or other
essentials.
 Purposes:
• A single communication system for both control and
safety data.
• The ability to flexibly modify and expand the safety
system architecture.
• Pre-certified solutions to simplify safety applications.
• Powerful diagnostic capabilities for safety functions.
• Seamless integration of the safety design in the
machine design.
• The ability to use the same development tools for both
standard and safety applications.
FSoE is part of SCL (Safety
Communication Layer)
It is based on application layer, part of OSI.
And it also developed according to IEC
61508, is TÜV certified, and is
standardized in IEC 61784-3. The protocol
is suitable for safety applications with a
safety integrity level up to SIL 3.
EtherCAT generally has two safety
protocol controllers for redundant.
Safety protocol controller generates the
FSoE frame.
EtherCAT uses a single channel to transfer
both standard(non-safe) and safety-
critical(safe) data. This communication
system is part of a “Black Channel”.
Black channel is not considered to be
safety-relevant.
 IEC 61508-2:2010 clause 7.4.11 offers white channel and a black
channel approaches and refers the user to IEC 61784-3 or the IEC
62280 series.
 White channel approach means the entire network including the
communication devices at both ends are developed to the relevant
functional safety standards. This would be a lot of work and limit the
use of standard networking components.
 Black channel is the more common approach, where no
assumptions are made about the channel and safety is taken care of
with an additional SCL (Safety Communication Layer) in the
application software. This SCL is developed to the safety standards
but everything else in the communication system is just a standard
component. The picture below is taken from the IEC 61784-3
standard.
FSoE frames, known as safety containers,
contain safety-critical process data and
additional information used to secure this
data. The safety containers are transported
as part of the communication’s process
data.
 CMD: The type of the command.
 Safe Data: The safety-critical(safe) data.
 Cyclic Redundancy Check(CRC): An error-detecting code.
.
.
.
Whether data transfer is safe does not
depend on the underlying communication
technology, Black Channel, and isn’t
restricted to EtherCAT.
• [1]
http://ethercat.org/forms/france2016/download/09_Eth
erCAT_and_Industrie40_IoT_1609.pdf
• [2] https://www.ethercat.org/en/technology.html
• [3] https://www.slideshare.net/elmomc2012/multi-
axispositioncontrolbyether-catrealtimenetworking
• [4] https://www.pc-
control.net/pdf/032018/technology/pcc_0318_real-
time-communication_e.pdf
• [5]
http://52.28.55.137/download/document/io/infrastructur
e-components/CU2508en.pdf

More Related Content

Similar to Proposal for final project

Bhabha atomic research Centre (BARC)
Bhabha atomic research Centre (BARC)Bhabha atomic research Centre (BARC)
Bhabha atomic research Centre (BARC)
Utkarsh Tiwari
 
enet-wp002_-en-p
enet-wp002_-en-penet-wp002_-en-p
enet-wp002_-en-p
Shuo Zhang
 

Similar to Proposal for final project (20)

Pub00138 r2 cip_adv_tech_series_ethernetip
Pub00138 r2 cip_adv_tech_series_ethernetipPub00138 r2 cip_adv_tech_series_ethernetip
Pub00138 r2 cip_adv_tech_series_ethernetip
 
Pub00138 r2 cip_adv_tech_series_ethernetip
Pub00138 r2 cip_adv_tech_series_ethernetipPub00138 r2 cip_adv_tech_series_ethernetip
Pub00138 r2 cip_adv_tech_series_ethernetip
 
Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5
 
Authentication and Key Agreement in 3GPP Networks
Authentication and Key Agreement in 3GPP Networks Authentication and Key Agreement in 3GPP Networks
Authentication and Key Agreement in 3GPP Networks
 
Hy3313681373
Hy3313681373Hy3313681373
Hy3313681373
 
Ethernet - Networking presentation
Ethernet - Networking presentationEthernet - Networking presentation
Ethernet - Networking presentation
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5
 
Bm36382385
Bm36382385Bm36382385
Bm36382385
 
Wsn Wireless Hart Architecture,Mechanism,Components
Wsn Wireless Hart Architecture,Mechanism,ComponentsWsn Wireless Hart Architecture,Mechanism,Components
Wsn Wireless Hart Architecture,Mechanism,Components
 
CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5
 
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
 
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
 
CCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetCCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - Ethernet
 
Chapter 05 - Ethernet
Chapter 05 - EthernetChapter 05 - Ethernet
Chapter 05 - Ethernet
 
Chapter 5 : Ethernet
Chapter 5 : EthernetChapter 5 : Ethernet
Chapter 5 : Ethernet
 
Bhabha atomic research Centre (BARC)
Bhabha atomic research Centre (BARC)Bhabha atomic research Centre (BARC)
Bhabha atomic research Centre (BARC)
 
Project ACRN EtherCAT 101
Project ACRN EtherCAT 101Project ACRN EtherCAT 101
Project ACRN EtherCAT 101
 
IP Security
IP SecurityIP Security
IP Security
 
enet-wp002_-en-p
enet-wp002_-en-penet-wp002_-en-p
enet-wp002_-en-p
 
Ens
EnsEns
Ens
 

More from ssuser37e1ef (13)

Training course O-RAN scheduler
Training course   O-RAN schedulerTraining course   O-RAN scheduler
Training course O-RAN scheduler
 
Industrial wired network
Industrial wired networkIndustrial wired network
Industrial wired network
 
Proposal for final project
Proposal for final projectProposal for final project
Proposal for final project
 
Proposal for final project
Proposal for final projectProposal for final project
Proposal for final project
 
Proposal for final project
Proposal for final projectProposal for final project
Proposal for final project
 
Proposal for final project
Proposal for final projectProposal for final project
Proposal for final project
 
Proposal for final project
Proposal for final projectProposal for final project
Proposal for final project
 
Proposal for final project
Proposal for final projectProposal for final project
Proposal for final project
 
Proposal for final project
Proposal for final projectProposal for final project
Proposal for final project
 
Proposal for final project
Proposal for final projectProposal for final project
Proposal for final project
 
Proposal for final project
Proposal for final projectProposal for final project
Proposal for final project
 
How to read paper
How to read paperHow to read paper
How to read paper
 
Mastering the art of the 5 minute presentation
Mastering the art of the 5 minute presentationMastering the art of the 5 minute presentation
Mastering the art of the 5 minute presentation
 

Recently uploaded

Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
ZurliaSoop
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
amilabibi1
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Hung Le
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
David Celestin
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 

Recently uploaded (17)

Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait Cityin kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
 
Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
Zone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptxZone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptx
 

Proposal for final project

  • 2.  EtherCAT embeds its payload/frame into standard Ethernet frame. The frame is identified with the Identifier(0x88A4) in the EtherType field. Since the EtherCAT protocol is optimized for short cyclic process data, the use of protocol stacks, such as TCP/IP or UDP/IP, can be eliminated.
  • 3.  EtherCAT has its header and telegram.  Master creates oringinal frame and sends it to each slaver.  Each slaver will take out or provide packet when frame go through it.
  • 4. Datagram header indicates what type of access the master device would like to execute: • Read, write, read-write • Access to a specific slave device through direct addressing, or access to multiple slave devices through logical addressing (implicit addressing).
  • 5. EtherCAT’s telegram contains many sub- frames. Safety over EtherCAT frame is important to EtherCAT to protect data, device, or other essentials.
  • 6.  Purposes: • A single communication system for both control and safety data. • The ability to flexibly modify and expand the safety system architecture. • Pre-certified solutions to simplify safety applications. • Powerful diagnostic capabilities for safety functions. • Seamless integration of the safety design in the machine design. • The ability to use the same development tools for both standard and safety applications.
  • 7. FSoE is part of SCL (Safety Communication Layer) It is based on application layer, part of OSI. And it also developed according to IEC 61508, is TÜV certified, and is standardized in IEC 61784-3. The protocol is suitable for safety applications with a safety integrity level up to SIL 3.
  • 8. EtherCAT generally has two safety protocol controllers for redundant. Safety protocol controller generates the FSoE frame.
  • 9. EtherCAT uses a single channel to transfer both standard(non-safe) and safety- critical(safe) data. This communication system is part of a “Black Channel”. Black channel is not considered to be safety-relevant.
  • 10.
  • 11.  IEC 61508-2:2010 clause 7.4.11 offers white channel and a black channel approaches and refers the user to IEC 61784-3 or the IEC 62280 series.  White channel approach means the entire network including the communication devices at both ends are developed to the relevant functional safety standards. This would be a lot of work and limit the use of standard networking components.  Black channel is the more common approach, where no assumptions are made about the channel and safety is taken care of with an additional SCL (Safety Communication Layer) in the application software. This SCL is developed to the safety standards but everything else in the communication system is just a standard component. The picture below is taken from the IEC 61784-3 standard.
  • 12. FSoE frames, known as safety containers, contain safety-critical process data and additional information used to secure this data. The safety containers are transported as part of the communication’s process data.
  • 13.  CMD: The type of the command.  Safe Data: The safety-critical(safe) data.  Cyclic Redundancy Check(CRC): An error-detecting code. . . .
  • 14. Whether data transfer is safe does not depend on the underlying communication technology, Black Channel, and isn’t restricted to EtherCAT.
  • 15. • [1] http://ethercat.org/forms/france2016/download/09_Eth erCAT_and_Industrie40_IoT_1609.pdf • [2] https://www.ethercat.org/en/technology.html • [3] https://www.slideshare.net/elmomc2012/multi- axispositioncontrolbyether-catrealtimenetworking • [4] https://www.pc- control.net/pdf/032018/technology/pcc_0318_real- time-communication_e.pdf • [5] http://52.28.55.137/download/document/io/infrastructur e-components/CU2508en.pdf