EtherNet/IP Design and
Configuration
Designing an EtherNet/IP Cable
System
Pinging a Modules EtherNet/IP
Address
Configuring and Modifying
EtherNet/IP Addresses Using
BOOTP-DHCP Server Software
Configuring and Modifying
EtherNet/IP Addresses Using
RSLinx Software
Producing and Consuming Data
over an EtherNet/IP Network
EtherNet/IP Network Overview
CIP (Common Industrial Protocol):
Enables I/O control over an EtherNet/IP network
Bridges EtherNet/IP devices with devices on
networks such as ControlNet and DeviceNet that
also use CIP at the application layer
Tip: Standard EtherNet/IP and Ethernet CIP safety modules can communicate on the same
network.
EtherNet/IP Network Overview
OSI (Open System Interconnection) Model:
Consists of seven layers
Each layer uses services of layer below it and supplies
higher level services to layer above it to communicate
EtherNet/IP Network Overview
Correlating the seven layers with common protocols:
Layer
Protocol
Application
Presentation
CIP, CSP, HTTP
FTP,TELNET
Session
Transport
TCP, UDP
Network
IP
Data Link
Ethernet
Physical
10/100baseT,
Transceiver, etc.
4
EtherNet/IP Network Hardware Components
Switch:
Incoming messages
are only transmitted
to desired node.
Switches selectively
route packets of
information to specific
devices.
Switch Selection
Benefits of a managed switch:
Monitor the performance of the network
Set up broadcast domains
Run single computers on managed switch ports
Switch Selection
VLAN (Virtual (or logical) Local Area Network):
Can change or add workstations
Can manage load balancing and bandwidth allocation more easily than with a physical
picture of the LAN:
Accounting
Engineering
Production
Human Resources
Switch Selection
With VLANs, a switch can be configured to share two isolated networks without the traffic
from one network burdening the other.
Controller 1
1
PC
Controller 2
VLAN 1
4
I/O
5
I/O
VLAN 2
I/O
I/O
I/O
8
Copper Cabling
Two types of copper cabling:
Shielded, balanced twisted-pair (STP/ScTP)
Shielded cables should not be used in
environments that are likely to have
ground offsets due to electrical storms or
poorly grounded buildings/installations.
Unshielded twisted pair (UTP)
EtherNet/IP Network Topologies
Bus Topology:
Are used when coax media is desired
Tip: This topology is used with many existing Ethernet network architectures but it is
seldom used in new architectures.
10
EtherNet/IP Network Topologies
Star Topology:
Best suited for environments using twisted pair and/or fiber optic wire
Tip: This is the most common topology used in EtherNet/IP network architectures.
11
EtherNet/IP Network Topologies
Tree (Combination) Topology:
Tip: The tree topology should also be given careful consideration when designing an
EtherNet/IP network as it effectively blends the advantages of a star and bus topology.
12
Overview of IP Addresses
IP (Internet Protocol) Address:
User-defined software address assigned to a device
Identifies network and node
32-bit address normally grouped into 4 bytes (e.g., 10.88.244.130).
13
Overview of IP Addresses
Sample view of an IP address
(131.107.16.200)
14
Overview of IP Addresses
MAC (Media Access Control) Address:
MAC Address (also referred to as a
module's Ethernet address)
15
Classes of IP Addresses
Four different classes of IP addresses:
IP address used determines number of possible networks and end devices.
Classes are determined by first few bits of each IP address:
0
Class A
16
Net ID
Class B
Class C
Class D
31
Host ID
Net ID
24
Host ID
Net ID
Host ID
Used for Multicast Messages
16
Classes of IP Addresses
Class
Initial Byte Values
Typical Users/Uses
1 - 127
Very large networks
128 - 191
Medium-sized networks
192 - 223
Small to mid-size businesses
224 - 239
Multicast messaging
17
Private IP Addresses
Finite number of IP addresses have been designated as private IP
addresses.
Private IP addresses prohibit message traffic from being routed to Internet
thereby avoiding conflicts that would otherwise arise whenever two or more
enterprises used same IP address.
Class
Private IP Addresses
10.0.0.0 - 10.255.255.255
172.16.0.0 - 172.31.255.255
192.168.0.0 - 192.168.255.255
18
How a Subnet Mask Operates
A subnet mask, like an IP address, is a 32-bit address that is normally
grouped into 4 bytes for ease of communication and understanding:
Typical Subnet Mask
Binary
Equivalent
Consecutive 1's Represent Network Portion of IP Address
19
How a Subnet Mask Operates
A subnet mask uses "1's" to do bit-by-bit comparison of two IP addresses to
see if devices associated with IP address are on same subnet:
As long as IP address bits match each other (independent of the subnet
mask value) whenever there is a corresponding 1 in the subnet mask,
devices are on same subnet.
If network portions:
Match up, devices communicate directly with each other
Don't match up, they are on separate networks and then communicate through a
router (commonly referred to as a gateway).
20
Example
Compare addresses of 2 devices and determine if they are on same subnet:
EtherNet/IP Address: 165.88.73.129
EtherNet/IP Address: 165.88.74.187
Subnet Mask: 255.255.240.0
Converting these decimal values to their binary equivalent yields:
EtherNet/IP Address:
EtherNet/IP Address:
Subnet Mask:
Corresponding bits match each other; therefore,
these two devices are on the same subnet.
21
Example
Compare same 2 addresses of 2 devices using different subnet mask and
determine if they are on same subnet:
EtherNet/IP Address: 165.88.73.129
EtherNet/IP Address: 165.88.74.187
Subnet Mask: 255.255.255.0
Converting these decimal values to their binary equivalent yields:
EtherNet/IP Address:
EtherNet/IP Address:
Subnet Mask:
Corresponding bits do not match each other; therefore, these two
devices are not on the same subnet.
22
Ping
Ping Command
Device Is Active
on the Network
Device Is Not
Active on the
Network
23
Ping
Successful (ping) returns are an indication that:
A device is active on the network with the IP address used by the ping
command.
A successful ping command does not
guarantee that a particular device is active.
A successful ping identifies that a device
with the identified IP address is active on the
network.
Error is not caused by a faulty cable
Error is not the result of a problem with the router or switch
24
ARP (Address Resolution Protocol)
The arp (arp -a) command is a protocol for mapping an Internet Protocol
address (IP address) to a MAC address that is recognized in the local network.
To be most effective in mapping the two different addresses together, it should
be executed after the ping command has been executed on one or more IP
addresses.
IP and MAC address
pairing list
25
BOOTP-DHCP Server Software
BOOTP (Bootstrap Protocol)
BOOTP Server
BOOTP-DHCP (Bootstrap Protocol-Dynamic Host
Configuration Protocol) Server Software
26
BOOTP-DHCP Server Software
Relation List:
Entering corresponding MAC and IP addresses into BOOTP table allows
simultaneous assignment of IP addresses to multiple modules.
Address assignments do not take
effect unless the device is
configured for BOOTP operation
and a power-cycle occurs on the
device.
27
BOOTP-DHCP Server Software
BOOTP-DHCP Server software main window:
Request
History
Pane
Request Type
Relation
List
Relation List
Pane
28
BOOTP-DHCP Server Software
Tip: BOOTP-DHCP Server can only change a device's IP address if its
setting for Network Configuration Type is dynamic (obtain IP address from
BOOTP Server). This setting can be restored using one of the following
methods:
in BOOTP Server by right-clicking an entry in the Relation List and
selecting Reset Module's Network Settings to Factory Defaults
in the RSWho window of RSLinx software via the Module Configuration
dialog box
29
BOOTP-DHCP Server Software
BOOTP-DHCP Server software configuration screens:
Network and Host
Part Identification
Address of
Gateway (or
Router)
Capable of
Routing
Messages to
Remote
Network
Copyright
2008 Rockwell
Automation,
Relationship between a Device's
MAC
Address
and its IP Address
Inc. All rights reserved.
30
RSLinx Software
From within the RSLinx RSWho window, a
modules EtherNet/IP address or subnet mask
can be modified.
31
RSLinx Software
RSLinx software configuration screen:
Address of the
Device You Are
Configuring or
Modifying
Network and Host Part
Identification
Address of the Gateway
(or Router) Capable of
Routing Messages to
Remote Networks
32
Produce/Consume Model
Communication model based on content of data rather than source or destination of data:
Devices that need data (consumers) recognize data they need and consume it (at a specified rate).
Data is sent on network in single message, no matter how large the number of nodes to which it
needs to go.
All consumer nodes receive and consume information simultaneously.
Receipt of information is synchronized:
Bandwidth is conserved since information is "produced" once to multiple
consumers.
33
Produce/Consume Model
To limit the number of connections
used, consider grouping data into
an array or a user-defined data type
and producing only that array or
structure.
34
Produced and Consumed Tag Requirements
Data that meets following requirements can be shared by controllers without using ladder logic (i.e.,
message instructions):
Tags must be data type that is:
32 bits or larger (e.g., DINT, REAL, TIMER, COUNTER, etc.)
Array of these data types
User-defined data type.
Data must be less than or equal to 500 bytes.
35
Produced and Consumed Arrays
BOOL, SINT, and INT arrays can be indirectly produced and consumed:
Create user-defined data type containing single member:
Make single member array of desired type
Copy this user-defined data type to both controllers
Produce and consume tags of this data type
If a user-defined structure is
produced, there must be a structure
with the identical size and layout in
the consuming controller. To ensure
accuracy, copy the structures
between projects.
36
Produced and Consumed Arrays
37
Produced and Consumed Arrays
You can consume an array of INTs from a PLC-5C controller over a ControlNet network:
Define a user-defined data type with two members:
Name first member Status and assign it a DINT data type
Make second member an array of INTs
38
Creating a Produced Tag
Tag Name Required to
Configure
Consumed Tag(s)
Produce Option
Maximum
Number of
Consumers
39
Creating a Consumed Tag
Tag Name
Must Be in
Consuming
Controller's I/O
Configuration
Exact Match
Required
Must Be Exact Name
of the Produced Tag
RPI for Consumed Tag
40
Creating a Consumed Tag
A produced tag should be
consumed by only one tag in a
consuming controller. Multiple
consumed tags within a controller
using the same produced tag will
result in unpredictable controller-tocontroller behavior.
If a consumed tag connection
faults, all other tags being
consumed from the producing
controller will also stop receiving
data.
41
Creating a Consumed Tag
The Remote Data (source tag
name) must be exactly the same as
the produced tag name in the
producing controller.
Tip: For accuracy, the source project should be opened and the tag names should be copied.
42