Professional Documents
Culture Documents
COMPUTER NETWORKING
Communication is the nervous system of CIM and thus is an integral part of CIM.
The developments in communication engineering have made implementation of CIM easier
than before.
INTRODUCTION
Data is defined as the raw, unorganized information that is available on each
component of a CIM system like a PC, Robot, and Workstation or CNC machine. Normally,
each component wants access to all the necessary data to make decisions. This means each
component in a CIM system, can take advantage of all the available information to achieve
higher reliability, more optimal processing or manufacturing and higher throughput.
Networks allow channels of communications to exist among various sections of a
manufacturing system. Real-time modifications to business plans can be effected via
communications through the network. Networks are essential to move information faster
across various users or various segments of CIM. For example, while the design is being
completed, if the manufacturing engineer has access to the design data of the component, the
engineer can plan fixture design and start creating the program for manufacture. The process-
planning engineer can select a suitable machine tool to machine the component. These are
typical cases where time can be saved.
Networks are today integral parts of CIM systems, which have made data sharing
easy, peripheral changing or interfacing easy and information sharing possible.
PRINCIPLES OF NETWORKING
Advances in technology have been adding more processing power into smaller
computers. The trend has been to move away from massive, centralized computers, which
handle every task to networks of smaller desktop computers, each closely tailored to a
particular application.
From the manufacturing standpoint, this eliminates the possibility of shutting down
the entire plant if a large central computer fails. It is easier to replace a defective PC. More
desktop computers can be added to the network depending on the need. Thus, the network is
scalable. Networking also allows incremental growth of the overall system with minimal
investment and disruption.
Networking of computers was initially adopted successfully by service sectors like
banking, airline and train reservation etc. and later was introduced in manufacturing
industries. Today, many designs involve collaborative efforts of hundreds of engineers.
Networked systems facilitate quick information exchange and effectively cut down
development lead-time. Some examples are:
(i) Design and development of VLSI and UVLSI chips like microprocessors.
(ii) Design and manufacture of aircrafts and automobiles. Communication
networks can be classified into four categories depending upon the physical
separation of the communicating devices:
(iii) Miniature (< 50 m): Such networks are concerned with the interconnection of
multiple computational elements.
(iv) Small (< 500 m): These are concerned with the interconnection of multiple
computational units.
(v) Medium (< 1 km usually): These networks are concerned with the
interconnection of multiple computational units (office workstations, CAD
systems, shop floor computers and data collection terminals, CNC systems,
Robots etc.). These are connected through a Local Area Network (LAN), or
Intranet. LAN may cover distances more than one 1 km too.
(vi) Large (> 1 km): Large networks involve connection of remote mainframes,
networking of a minicomputer system to a remote mainframe or terminals etc.
It can be citywide (Metropolitan Area Network-MAN) or countrywide or
Worldwide-WAN). With Internet becoming more and more popular, the
intranet internet-extranet technologies have found favour with manufacturing
companies.
PRIVATE COMPUTER COMMUNICATION NETWORKS
A manufacturing industry may have a number of plants situated at different locations
in a country or in different continents. There is need for them to communicate each other to
share resources and exchange information. An autonomous data communication network for
this purpose is called a private computer communication network. The technology involved
in such a network is discussed in detail later in this chapter. However Intranets and Extranets
provide powerful, convenient and cost effective alternatives.
Virtual Private Network (VPN)
The desire to use the Internet for business and industry and the risk factors associated
with doing so have given rise to a new technology paradigm called Virtual Private Networks
(VPN). A VPN typically is Internet Protocol (IP) based network (usually the public Internet)
that uses encryption and tunneling to achieve one or more of the following goals:
• Connect users securely to their own corporate network (remote access)
• Link branch offices to an enterprise network (Intranet)
• Extend organizations’ existing computing infrastructure to include partners,
suppliers and customers (Extranet)
Security of data is a major concern for manufacturing industries also. Every VPN solution
provides some sort of encryption. The two primary cryptographic systems in use today are
secret key cryptography and public key cryptography.
Secret (or private) key cryptography uses a shared key, which is used to encrypt and
decrypt messages. The major problem with private key cryptography is key exchange.
Sending secret keys across the Internet unencrypted is not an option for obvious reasons
Public key cryptography eliminates this problem. Public key cryptography uses a
mathematically linked key pair for each communicating party. This means that data
encrypted with one key can be decrypted with the other key in the pair. A sender can encrypt
a message with the recipient’s public key, which as the name implies is publicly available (on
a server, for example). The recipient can then decrypt the message using his or her own
private key. An important issue is integrity of data. Integrity ensures that information being
transmitted over the public internet is not altered in any way during transit. A VPN may use
one of three technologies mentioned below to ensure integrity:
• One way hash functions
• Message authentication codes
• Digital signatures
Dr Krishna Murthy K, Professor, EiT-Mekelle Page 2
Computer Integrated Manufacturing Unit 6
Leased lines provide faster communication capability than dial-up lines. Common
resources of the network include a bank of printers and plotters and facilities for disc irroring
and disc duplexing.
PC’s attached to a LAN can use the processing capabilities of other intelligent devices
in the network as in a host-to-terminal network.
COMPONENTS OF A SMALL LOCAL AREA NETWORK
A LAN in a CIM setup is a system comprising the following basic components:
(i)Computers: (PC’s, Design Workstations, CNC Systems, robots, PLC’s etc.)
(ii)Network Cable: A transmission cable is attached to each device (computer/ peripheral) to
enable the transmission of messages from one device to another.
The details of cables commonly used are given in Table 6.1.
Data Transmission
Type Distance Remarks
Rate
Least Expensive
Twisted pair 1 M bit/sec Short distance100 m base band,
single channel
Coaxial Cable
5 M bit/sec up to 4 km Multi Channel
-Base band
10 M bit/sec up to 50 km Capability
-Broad band
Multi Channel
Fibre Optics 100 M bits or more Large Capacity
Expensive
The simplest form of Ethernet uses a passive bus operated at 10 Mbps. The bus is
formed from a 50-Ohm co-axial cable, which connects all the computers in the LAN. A
single LAN may have up to a maximum of 1024 attached systems, although in practice most
LANs have far fewer. One or more pieces of coaxial cable are joined end to end to create the
bus, known as an “Ethernet Cable Segment”. Each segment is terminated at both ends by 50-
Ohm resistors (to prevent reflections from the discontinuity at the end of the cable) and is
also normally earthed at one end (for electrical safety). The computers are attached to the
cable using transceivers or network interface cards.
The two major means of electrically carrying data on a LAN are as follows:
BASE BAND allows devices to send digital data at a set speed. All nodes in the LAN
are exposed to data, but a node will ignore a message if it is intended for another node.
BROAD BAND is similar to cable television. A number of very high frequency
signals are placed in line and data is sent using these signals as “carriers,” in the same way as
television uses several channels. Several “networks” can, in essence, share the same cable,
because it is possible to filter out all but desired “carriers”.
(iii)Network Interface Card. This is communication hardware in the form of an add-
on card for sending and receiving messages. This is also called network adapter. NIC is
plugged into one of the slots of the PC expansion slots and the transmission cable is attached
to the connector provided on the card.
Network Server: Network Server is the computer used to manage shared resources. Server is
a combination of hardware and software. The file server performs the following tasks:
• Manages the shared hard disc
• Makes sure that multiple requests do not conflict each other
• Protects data
Central Mass Storage: The hard disc of the file server should have sufficient capacity
(usually in term of several Gigabytes) to meet the storage requirements of the users of the
network.
NETWORK WIRING METHODS
There are two basic ways by which three or more nodes can be incorporated in a
network. These are point-to-point and multi-drop. (Refer Fig. 6.2)
(i)Star Network: This means running a separate cable or line between server and each
node. This is useful when a master slave relationship exists between the server and the nodes.
For sending data and files from one node to another a request should be made to the server,
which establishes a dedicated path between the nodes. The data can be transmitted through
this path.
(ii)Ring Network: This involves connecting all nodes in series. The cable will
normally loop back to form a full circle. This is sometimes used when nodes are widely
separated, as each node can act as a repeater (amplifier) for message destined for downstream
nodes. The data will have to pass through other nodes before reaching the server. The data is
sent in the form of a packet which contains both source and destination addresses of the data.
As the packet circulates through the ring the destination station copies the data into its buffer
and the packet continues to circulate until it goes back to source workstation as an
acknowledgement.
(iii)Bus Networks: This type on interconnection allows all nodes to share the same
cable. Any message that travels on the cable is “seen” by every node on the cable. This
topology uses both base band and broadband transmission.
(iv)Hybrid Networks: This includes features of more than one topology to achieve the
optimal trade-off of reliability, performance, flexibility and cost.
NETWORK ARCHITECTURE
IBM’s System Network Architecture (SNA) is a network management scheme used
primarily for peer-to-peer communications between computers. It has become a de-facto
standard for interconnection of large mainframes, due to popularity of IBM and IBM
compatible hardware. Gateway devices are available from several manufacturers to interface
between SNA and various LANs. SNA to non-IBM computer interfaces are also available.
Several other vendors also supply SNA interfaces.
MANUFACTURING AUTOMATION PROTOCOL (MAP)
MAP is a hardware/software protocol developed jointly by a group of industries and
vendors of computers and PLCs. It follows the ISO OSI model. MAP was developed as a
result of the plans of General Motors to automate its factories.
MAP uses a broad band LAN, with a token ring protocol for traffic control. Since it is
broadband, all devices in the LAN like computers, CNC machines, robots, and PLC’s etc.
share the same cable, but different groups of devices can be placed on separate “channels” on
the line. Additionally, closed circuit TV (video) channel can also be accommodated on same
cable. MAP physical level is based on the IEEE 802.4 token-bus standard. At the 537
Fundamentals of Networking data link level, it uses the IEEE 802.2 logical control standard.
MAP also uses 8473 network layer protocol for connectionless-mode network service.
TECHNICAL OFFICE PROTOCOL (TOP)
TOP is another widely used protocol, developed by Boeing Computer Services. It is
similar to MAP in several respects. TOP is the initiative of a group of computer system
purchasers. The members of TOP group include Boeing, General Motors, Du Pont,
McDonnel Douglas, Ford Motors, Procter and Gamble and Eastman Kodak.
ETHERNET
A currently available example of standardization of level 1 is the Ethernet network,
which is a joint work of Xerox, Digital Equipment Corporation and Intel. The Ethernet
network is shown in Fig. 6.4. Ethernet network is base band network, utilizing CSMA/ CD
and operating at 10-100 million bits per second. Up to 1,024 nodes may be connected within
a network. It uses linear bus topology.
4 DISTRIBUTED DATABASE
An input/output driver can also be designed to read or write individual records within
a file across the network. In the case of a structured file system like a relational, hierarchical
or network database remote access requires many issues to be dealt with.
The design of database structure is affected by network topology. Specifically, this
means that you can place a given type of data on the individual computer that uses it most.
For example, consider a distributed database of a manufacturing company, which includes
production statistics from its foundry department. The data can reside directly on the
foundry’s computer and nowhere else.
Later, when a program running on the plant computer is doing a summary of total
factory production and needs the data on the foundry computer, the plant computer accesses
these records directly. The plant computer may also write some records into the foundry’s
production plan database indicating new production requirements.
NETWORK OPERATING SYSTEMS
A network operating system (NOS) includes special features for connecting computers and
devices into a LAN. Some operating systems like UNIX and MAC OS have networking
functions built in. Generally, the term NOS is applied to software that enhances the
capabilities of a basic operating system by adding networking features. Examples are Novell
Netware, LANtastic, Microsoft Windows Server and Windows NT.
The network operating system supports applications on network. The functionality,
ease of use, performance, management and data security depend upon the network operating
system. A network has to support a number of utilities, which include:
(i) File server management utilities to manipulate file server resources such as
mass storage devices.
(ii) Print server management utilities to enable the user to print using a shared
printer.
(iii) Login utility to implement the procedure to enter a network.
(iv) Directory specification utility similar to password privileges.
(v) Locking utility.
(vi) Electronic mail.
(vii) Transaction tracking.
(viii) Disc duplexing
connected in a LAN for effective operation. Fig. 6.5 shows a typical Factory LAN and the
various equipment connected to the LAN.
COMPUTING ENVIRONMENTS
The traditional timesharing and network environment is shown in Fig. 6.6. The major
problem with this environment is competition for CPU cycles. The workstation environment
solves that problem, but requires more disc drives.
The goal of the NFS design was to make all discs available as needed. Individual
workstations have access to all information residing anywhere on the network. Printers,
plotters etc. may also be available somewhere on the network.