Vous êtes sur la page 1sur 94

TRUBA INSTITUTE OF ENGINEERING AND IT BHOPAL (M.P.

Training Report
Submitted In Partial Fulfillment Of The Requirement For The Award Of Degree Of

BACHELOR OF ENGINEERING
(Computer Science & Engineering)

OF
Rajiv Gandhi Proudyogiki Vishwavidyalaya Bhopal [M.P.] (Session : 2010-2011) Submitted to:

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

Prepared & Submitted By: Rimjhim Virani 0114cs071096

CERTIFICATE

This is to certify that Ms. Rimjhim Virani has completed her training successfully and timely at Siemens Ltd., Gurgaon from July 12, 2010 to Aug 06, 2010. During this period she has learnt about networking and has worked as an active participant with the testing team for the complete testing of a module of Siemens ongoing project in the partial fulfillment of the course of Bachelor of Engineering submitted to Truba Institute of Engineering and Information Technology as prescribed by Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal.

During the period I found her sincere and hard working. Her work has been remarkable and I wish her success in future endeavors.

Mr.Sanjay Satpute Chief Manager Head- EFIE Development

SIEMENS LTD

Acknowledgement

It is a great pleasure to have an opportunity to extend heartfelt thanks to everyone who has helped me throughout the successful completion of training. I convey my gratitude to all those who have helped me reach a stage where I have immense confidence to set to launch my career in the competitive world of Information Technology.

I express my sincere gratitude towards Mr.Sanjay Satpute, Chief Manager, Siemens Ltd. for providing me the opportunity to undertake this industrial training at Siemens Ltd. I am grateful to the entire department, Siemens who were always there to guide me when needed. I would also like to thank Mr. Abhishek Bhatia, Executive and Ms. Divya Gandotra, Executive of EFIE-Department for providing me valuable guidance & helping me to understand various aspects. I acknowledge the role of my institute, my respected Lecturers, who have played a significant role in shaping my career. I express my profound gratitude to all the teachers for gently guiding and paving my way towards a bright career, throughout my course.

Rimjhim Virani 0114CS071096 (7th Sem CSE)

OBJECTIVE

To gain a first hand Industry experience for self-evaluation and also to understand the needs and requirements of the Industries at present time and also in the near future. To get a value addition for self and also to figure out which direction to move and which path to tread. The followings tasks were to be accomplished during the summer training:  Basics of networking which included all networking protocols along with system configuration management networks, addressing schemes, routing and switching processes along with subnetting and basics of network programming.  Learned testing basics and the business procedures of developing software.  Done the study of gateways which is an ongoing project in Siemens and had been trained on testing involved in this module.  Developed integration test specification and integration test reports on the gateways module.

TABLE OF CONTENTS

PAGES

1. INTRODUCTION OF THE COMPANY


 PROFILE OF THE COMPANY  POLICY OF THE COMPANY  ORGANIZATIONAL CHART OF COMPANY  BUSINESS SEGMENTS  BUSINESS PROCEDURES OF THE DEPARTMENT 1 4 5

11

2. NETWORKING
            INTRODUCTION INTERNETWORKING DEVICES CREATING A LAN NETWORK ROUTING PROCESS IP ADDRESSING NETWORK ADDRESSING SUBNETTING ROUTING PROTOCOLS LAN SWITCHING BASIC NET COMMANDS TCP/IP TESTING NETWORK CONNECTIVITY AND TROUBLESHOOTING NETWORK CONNECTIONS  GATEWAYS 16 17 21 22 25 26 30 36 38 42 49 50 53

3. TESTING OF LIVE PROJECT- GATEWAYS


     INTRODUCTION TO MODULE-GATEWAYS GATEWAYS ENGINEERING OBSERVATIONS SNAPSHOTS INTEGRATION TEST SPECIFICATION AND REPORT 61 63 66 68 76

4.

CONCLUSION

90

COMPANY PROFILE Siemens is Europe's largest engineering conglomerate. Siemens' international headquarters are located in Berlin, Munich and Erlangen, Germany. The company has three main business sectors: Industry, Energy and Healthcare; with a total of 15 divisions. Worldwide Siemens and its subsidiaries employ approximately 420,800 people in nearly 190 countries and reported global revenue of 76.651 billion Euros for the year of 2009. Siemens is listed on the Frankfurt Stock Exchange, and has been listed on the New York Stock Exchange since March 12, 2001.

Siemens in India comprises 10 separate legal entities and is active in the business areas of Information and Communications, Automation and Control, Power, Transportation, Medical and Lighting. History Siemens began business operations in India in 1922 and became a public limited company in 1961. The group has 10 manufacturing plants, a wide network of sales and service as well as more than 500 channel partners Siemens in India The Siemens Group in India is a unique player in the field of electrical and electronics engineering. We have the capability to integrate diverse products, systems and services into turnkey solutions across the life- cycle of a project. Innovation is our strength. But it s not the only one. Our customers also know that they can rely on us to execute quality projects, while delivering value. In all areas of our operation, we provide the complete range of offerings. In the Energy sector, our expertise ranges from power plants to meters and in the Industry sector we build airports, as well as produce contactors. In Transportation, we deliver complete high-speed trains, right down to safety
6

relays, whereas in Lighting, we illuminate large stadiums and also manufacture small light bulbs. In Healthcare, we execute complete solutions for hospitals, as also provide in- the canal hearing aids. We are a strong player in the Communication segment, offering a complete spectrum of products from large public networks to mobile phones. And, the thread that connects all our businesses is Information technology. We have a wide presence across the country, where our operations include 10 manufacturing plants and 19 sales offices. We are also part of a vast global network of 450, 000 people, operating in 190 countries, which also serves to enhance our standing.

Industry Founded Founder(s)

Conglomerate 1847 in Berlin, Prussia Werner von Siemens

Headquarters Berlin, Munich and Erlangen, Germany Area served Worldwide Peter Lscher(President & CEO) Wolfgang Dehen(CEO Energy Sector) Heinrich Hiesinger(CEO Industry Sector) Hermann Requardt(CEO Healthcare Sector) Communication systems Power Generation Automation Lighting Medical technology Transportation and Automotive Railway vehicles Water Technologies Building technologies Home appliances Fire Alarms IT Services Siemens PLM Software Business Services, Financing, Construction

Key people

Products

Services

POLICIES OF THE COMPANY Siemens considers Safety, Health & Environment Protection as a fundamental management concern. Economic considerations will not have priority over implementation of Safety & Environment Protection measures. They are committed to have continual improvement in Safety, Health & Environment (SHE) Management and SHE performance. Safety, Health & Environmental aspects will be integrated with planning, design, purchase (plant, equipment, machinery and material), construction, installation & commissioning of facilities, manufacturing processes and their products, Services and also during Selection and Placement of Personnel. The customer is always right Do not harm the environment Staff must wear uniform To achieve this objective management will:Ensure compliance with applicable legal & other requirements, and strive to go beyond it. Apply realistic efforts to prevent injuries, occupational diseases, fire, explosions, pollution, and damage to equipment, property & environment. Conserve natural resources like water, compressed air, energy, and raw materials. Wherever possible, reduce the use of hazardous substances, or use safer alternatives. Try to minimize hazardous waste generation and ensure its proper treatment & disposal. Provide training on Safety, Health & Environment at all levels including Contractors to cultivate safe behaviour. Set and review Safety, Health & Environmental objectives and targets on points mentioned above.

SIEMENS ORGANIZATION CHART

Industry Segments

y y y y y y

Agriculture Airports Automotive Bank, Insurance, Financial Services Building and Construction Cement

y Chemical & Fertilizer industry y y y y y y Consumer world Education Food and Beverage Healthcare Hotel, Travel and Tourism Information Technology

y y y y y y y y y y y y y y y y y

y Manufacture of Machinery y Manufacturing Industry y Marine Engineering y Media

Metal and Mining Oil and Gas Other services Pharmaceutical Industry Port & Yard Power Public Sector, Authorities, Govt. Pulp and Paper Rail Systems Retail, Wholesale Road Traffic Security and Defense Sugar Telecommunication for Carrier Telecommunication for Enterprise Textiles Utilities

10

Business Segments y Energy This business area's activities cover the entire array of energy solutions. Power Generation Power Transmission and Distribution We provide products of the state of the art technology and technoeconomically efficient solutions for all energy projects, which directly or indirectly support the infrastructural development. We supply technology, equipment and expertise to private and public sector power projects / producers and industrial consumers, covering all the areas of power generation, power transmission and distribution and plant and energy management. Our environment friendly power plants are designed to provide affordable power and make energy transport and management both economical and safe. Our portfolio also includes low voltage switchboards. y Power Generation

We are involved in all areas of power generation such as coal and gas-based power plants, highly efficient combined cycle plants, hydroelectric power plants, co-generation, captive power plants and power plants based on renewable energy sources. Siemens also offer the high technology solutions for control and automation of all types of power plants. In addition to planning and designing fossil fuel power plants, we also service and retrofit
11

gas/ steam turbines and hydro stations. The renovation and modernization of old fossil fuel powered plants is undertaken by us by offering customer specific solutions for life extension and upgrade. The various components are: y y y y y y y Fossil Power Generation Power Plants Fossil Power Generation Instrumentation and Control Power Plants Products and Systems Services

Power Transmission & Distribution Systems y y y Energy Automation High Voltage High Voltage Transmission
12

y y y y y y y y y

IT and Communications Low Voltage Medium Voltage Medium Voltage Transmission Power Quality Power Systems Control and Energy Management Protection Devices Services Substation Control Systems y Healthcare

The Medical business area offers a broad spectrum of products, solutions and services for integrated health care ranging from innovative technologies for accurate diagnoses and therapies to services that optimize processes and increase efficiency. Medical Solutions Hearing Instruments

y Automation and Control Siemens is the world's largest supplier of products, systems, solutions and services for industrial automation and building technology Automation and Drives Industrial Solutions and Services Siemens Dematic Siemens Building Technologies AG

13

We provide end-to-end solutions covering the whole life cycle of a plant. These turnkey solutions cover project management, engineering & software, installation, commissioning, after-sales service, plant maintenance and training. These solutions cater to the building, electrical and automation industry.

Automation & Drives We offer the latest, innovative products and solutions from standard products to tailor-made equipment and systems that include engineering, supply, and commissioning. The products are made to suit and meet the specific needs of the customer requirements and specifications with adaptation of products to local conditions.

y Information & Communication This business area combines products, services and solutions for the information and communications area. Information and Communication Mobile Information and Communication Networks Siemens Business Services

y Lighting With lamps, electronic control gear and opto-semiconductors, our Lighting Group (Osram) has captured a leading position in the world lighting market. Osram GmbH

14

y Automative Systems We are one of the leading suppliers of integrated automotive information systems on par with International standards. We have the expertise in the electronic information, control and fuel systems. We are a QS9000 certified company. Our product offerings are: y Clusters y Standalone Instruments y Sensors y Flexible Drive Shafts (Cables) y Fleet management products

ABOUT THE DEPARTMENT

Name : Energy Fossil- Intrumentation, control and Electricals (EFIE) Department is divided into four groups: 1. 2. 3. 4. Project Management and Execution Engineering And Commissioning Software Development Commercial

15

BUSINESS PROCEDURES OF THE DEPARTMENT

16

START
1. PREPARATION OF

PROJECT DESCRIPTION/ CONTRACT REVIEW

2. PREPARATION OF USER

REQUIREMENT SPECIFICATION

3. PREPARATION

OF PROJECT PLAN

4. PREPARATION

OF QUALITY PLAN

5. PREPARATION OF DETAILED FUNCTIONAL SPECIFICATION 6. PREPARATION OF DETAILED DESIGN SPECIFICATION

17

7. IMPLEMENTATION 8. UNIT TESTING

NO

TEST CRITERIA MET YES

9. UPDATION OF SYSTEM INTEGRATION TEST SPECIFICATION 10. SYSTEM INTEGRATION TESTING


NO
TEST CRITERIA MET

YES 11. UPDATION OF SYSTEM

VALIDATION TEST SPECIFICATION


12. SYSTEM VALIDATION

TESTING

NO

TEST CRITERIA MET

YES C D
18

D
C

13. UPDATION OF ACCEPTANCE TEST SPECIFICATION 14. ACCEPTANCE TESTING NO


TEST CRITERI A MET

YES 15.CONFIGURATION MANAGEMENT

16. PRODUCT 16 A)MAINTENANCE PHASE NO


CFR

NO

GENERATE D YES YES

PROJECT SP. NEW REQ YES ENTRY IN RFND 6.PREPARATION OF DETAIL DESIGN

INTERNAL OBSERVATI ON

NEW REQUIREM ENT NO

ENTRY IN LOP

YES

A BUG FIX/IMPROVEMENT

REVIEW OF ACCEPTANC E OF POINTS

NO 17 CREATE CR UPDATE THE LIST WITH REMARKS

19

7.IMPLEMENTATION

8.UNIT TESTING

YES

VALIDATION REQUIRED AT SITE NO

9. UPDATION OF SYSTEM INTEGRATION TEST SPECIFICATION

10.SYSTEM INTEGRATION TESTING YES NO TEST CRITERIA MET

YES

15.CONFIGURATION MANAGEMENT

18. IDENTIFICATION OF CORRECTIVE AND PREVENTIVE ACTION (PROJECT METRICS ANALYSIS)

19. CFR IN IMPLEMENTATION


20.UPDATE LEARNING LOG

20

INTRODUCTION TO NETWORKING In the world of computers, networking is the practice of linking two or more computing devices together for the purpose of sharing data. Networks are built with a mix of computer hardware and computer software. Area Networks Networks can be categorized in several different ways. One approach defines the type of network according to the geographic area it spans. Local area networks (LANs), for example, typically reach across a single home, whereas wide area networks (WANs), reach across cities, states, or even across the world. The Internet is the world's largest public WAN. Network Design Computer networks also differ in their design. The two types of high-level network design are called client-server and peer-to-peer. Client-server networks feature centralized server computers that store email, Web pages, files and or applications. On a peer-to-peer network, conversely, all computers tend to support the same functions. Client-server networks are much more common in business and peer-to-peer networks much more common in homes. A network topology represents its layout or structure from the point of view of data flow. In so-called bus networks, for example, all of the computers share and communicate across one common conduit, whereas in a star network, all data flows through one centralized device. Common types of network topologies include bus, star, ring and mesh. Network Protocols In networking, the communication language used by computer devices is called the protocol. Yet another way to classify computer networks is by the set of protocols they support. Networks often implement multiple protocols to support specific applications. Popular

21

protocols include TCP/IP, the most common protocol found on the Internet and in home networks. FIGURE: INTERNETWORKING DEVICES

Network Adapters The first piece of hardware that I want to discuss is a network adapter. There are many different names for network adapters, including network cards, Network Interface Cards, NICs. NIC sThese are all generic terms for the same piece of hardware. A network card s job is to physically attach a computer to a network, so that the computer can participate in network communications.
22

The first thing that you need to know about network cards is that the network card has to match the network medium. The network medium refers to the type of cabling that is being used on the network. Wireless networks are a science all their own, and I will talk about them in a separate article. At one time making sure that a network card matched the network medium was a really big deal, because there were a large number of competing standards in existence. For example, before you built a network and started buying network cards and cabling, you had to decide if you were going to use Ethernet, coaxal Ethernet, Token Ring, Arcnet, or one of the other networking standards of the time. Each networking technology had its strengths and weaknesses, and it was important to figure out which one was the most appropriate for your organization.

Today, most of the networking technologies that I mentioned above are quickly becoming extinct. Pretty much the only type of wired network used by small and medium sized businesses is Ethernet. You can see an example of an Ethernet network card, shown in Figure. Hubs and Switches As you can see, computers use network cards to send and receive data. The data is transmitted over Ethernet cables. However, you normally can t just run an Ethernet cable between two PCs and call it a network. In this day and age of high speed Internet access being almost universally available, you tend to hear the term broadband thrown around a lot. Broadband is a type of network in which data is sent and received across the same wire. In contrast, Ethernet uses Baseband communications. Baseband uses separate wires for sending and receiving data. What this means is that if one PC is sending data across a particular wire within the Ethernet cable, then the PC that is receiving the data needs to have the wire redirected to its receiving port.
23

You can actually network two PCs together in this way. You can create what is known as a cross over cable. A cross over cable is simply a network cable that has the sending and receiving wires reversed at one end, so that two PCs can be linked directly together. The problem with using a cross over cable to build a network is that the network will be limited to using no more and no less than two PCs. Rather than using a cross over cable, most networks use normal Ethernet cables that do not have the sending and receiving wires reversed at one end. Of course the sending and receiving wires have to be reversed at some point in order for communications to succeed. This is the job of a hub or a switch. Hubs are starting to become extinct, but I want to talk about them any way because it will make it easier to explain switches later on.

There are different types of hubs, but generally speaking a hub is nothing more than a box with a bunch of RJ45 ports. Each computer on a network would be connected to a hub via an Ethernet cable. You can see a picture of a hub, shown in Figure C. Figure : HUB

A hub has two different jobs. Its first job is to provide a central point of connection for all of the computers on the network. Every computer plugs into the hub (multiple hubs can be daisy chained together if necessary in order to accommodate more computers). The hub s other job is to arrange the ports in such a way so that if a PC transmits data, the data is sent over the other computer s receive wires.

24

A switch, such as the one shown in figure , performs all of the same basic tasks as a hub. The difference is that when a PC on the network needs to communicate with another PC, the switch uses a set of internal logic circuits to establish a dedicated, logical path between the two PCs. What this means is that the two PCs are free to communicate with each other, without having to worry about collisions. Figure D: A switch looks a lot like a hub, but performs very differently Switches greatly improve a network s efficiency. Yes, they eliminate collisions, but there is more to it than that. Because of the way that switches work, they can establish parallel communications paths. For example, just because computer A is communicating with computer B, there is no reason why computer C can t simultaneously communicate with computer D. In a collision domain, these types of parallel communications would be impossible because they would result in collisions. CREATING A LAN THROUGH A SWITCH

25

ROUTERS Broadband Internet connections, such as those utilizing a cable modem or a DSL modem, almost always require a router. A router's job isn't to provide Internet connectivity though. A router's job is to move packets of data from one network to another. There are actually many different types of routers ranging from simple, inexpensive routers used for home Internet connectivity to the insanely expensive routers used by giant corporations. Regardless of a router s cost or complexity, routers all work on the same basic principles.

Figure A: This is the front view of a 3COM broadband router Figure B: A broadband Internet router contains a set of RJ-45 ports just like a hub or switch

The Routing Process Every device connected to a TCP/IP network has a unique IP address bound to its network interface. The IP address consists of a series of four numbers separated by periods. For example, a typical IP address looks something like this: 192.168.0.1 The address is broken into the network number and a device number. If you were to compare an IP address to a Street address, then think of the network number as being like a street name, and at the device
26

number as being like a house number. The network number identifies which network the device is on, and the device number gives the device an identity on that network. So how do you know where the network number ends and the device number begins? This is the job of the subnet mask. A subnet mask tells the computer where the network number portion of an IP address stops, and where the device number starts. Subnetting can be complicated, and I will cover in detail in a separate article. For now, let's keep it simple and look at a very basic subnet mask. A subnet mask looks a lot like an IP address in that it follows the format of having four numbers separated by periods. A typical subnet mask looks like this: 255.255.255.0 . Imagine that you had a PC with an IP address of 192.168.1.1 and a subnet mask of 255.255.255.0. In this particular case, the first three octets of the subnet mask are all 255. This means that the first three octets of the IP address all belong to the network number. Therefore, the network number portion of this IP address is 192.168.1.x. The reason why this is important to know is because a router s job is to move packets of data from one network to another. All of the devices on a network (or on a network segment to be more precise) share a common network number. For example, if 192.168.1.x was the network number associated with computers attached to the router shown in Figure B, then the IP addresses for four individual computers might be:
y y y y

192.168.1.1 192.168.1.2 192.168.1.3 192.168.1.4

As you can see, each computer on the local network shares the same network number, but has a different device number. As you may know, whenever a computer needs to communicate with another computer on a network, it does so by referring to the other computer s IP address. For example, in this particular case the computer with the address of 192.168.1.1 could easily send a packet of data to the computer with the
27

address of 192.168.1.3, because both computers are a part of the same physical network. Things work a bit differently if a computer needs to access a computer on another network. Since I am focusing this particular discussion on small broadband routers that are designed to provide Internet connectivity, let s pretend that one of the users on the local network wanted to visit the www.brienposey.com Web site. A Web site is hosted by a server. Like any other computer, a Web server has a unique IP address. The IP address for this particular Web site is 24.235.10.4. The default gateway is a part of a computer s TCP/IP configuration. It is basically a way of telling a computer that if it does not know where to send a packet, then send it to the specified default gateway address. The default gateway s address would be the router s IP address. In this case, the router s IP address would probably be 192.168.1.0.

DOMAIN NAME SERVERS The Domain Name System (DNS) is a standard technology for managing the names of Web sites and other Internet domains. DNS technology allows you to type names into your Web browser like compnetworking.about.com and your computer to automatically find that address on the Internet. A key element of the DNS is a worldwide collection of DNS servers. What, then, is a DNS server? A DNS server is any computer registered to join the Domain Name System. A DNS server runs special-purpose networking software, features a public IP address, and contains a database of network names and addresses for other Internet hosts.

28

Figure A: The Preferred DNS Server is defined as a part of a computer s TCP/IP configuration IP Addressing One of the most important topics in any discussion of TCP/IP is IP addressing. An IP address is a numeric identifier assigned to each machine on an IP network. It designates the specific location of a device on the network. An IP address is a software address, not a hardware address the latter is hard-coded on a Network Interface Card (NIC) and used for finding hosts on a local network. IP addressing was designed to allow a host on one network to communicate with a host on a different network, regardless of the type of LANs the hosts are participating in. Before we get into the more complicated aspects of IP addressing, you need to understand some of the basics. First I m going to explain some of the fundamentals of IP addressing and its terminology. Then you ll learn about the hierarchical IP addressing scheme and private IP addresses.

29

IP Terminology Throughout this chapter you ll learn several important terms vital to your understanding of the Internet Protocol. Here are a few to get you started: Bit A bit is one digit, either a 1 or a 0. Byte A byte is 7 or 8 bits, depending on whether parity is used. For the rest of this chapter, always assume a byte is 8 bits. Octet An octet, made up of 8 bits, is just an ordinary 8-bit binary number. In this chapter, the terms byte and octet are completely interchangeable. Network address This is the designation used in routing to send packets to a remote network for example, 10.0.0.0, 172.16.0.0, and 192.168.10.0.

Network Addressing The network address (which can also be called the network number) uniquely identifies each network. Every machine on the same network shares that network address as part of its IP address. In the IP address 172.16.30.56, for example, 172.16 is the network address. The node address is assigned to, and uniquely identifies, each machine on a network. This part of the address must be unique because it identifies a particular machine an individual as opposed to a network, which is a group. This number can also be referred to as a host address. In the sample IP address 172.16.30.56, the 30.56 is the node address. The designers of the Internet decided to create classes of networks based on network size. For the small number of networks possessing a very large number of nodes, they created the rank Class A network. At the other extreme is the Class C network, which is reserved for the numerous networks with a small number of nodes. The class distinction for networks between very large and very small is predictably called the Class B network. Subdividing an IP address into a network and node address is determined by the class designation of one s network. Figure 2.10 summarizes the three classes of networks. Class A network address always starts with a 0, the router might be able to speed a packet on its way after reading only the first bit of its address. This

30

is where the address schemes define the difference between a Class A, a Class B, and a Class C address. Network Address Range: Class A The designers of the IP address scheme said that the first bit of the first byte in a Class A network address must always be off, or 0. This means a Class A address must be between 0 and 127, inclusive. FIGURE Summary of the three classes of networks

Consider the following network address: 0xxxxxxx If we turn the other 7 bits all off and then turn them all on, we ll find the Class A range of network addresses: 00000000 = 0 01111111 = 127 So, a Class A network is defined in the first octet between 0 and 127, and it can t be less or more.

Network Address Range: Class B In a Class B network, the RFCs state that the first bit of the first byte must always be turned on, but the second bit must always be turned off. If you turn the other 6 bits all off and then all on, you will find the range for a Class B network:

31

10000000 = 128 10111111 = 191 As you can see, a Class B network is defined when the first byte is configured from 128 to 191. Network Address Range: Class C For Class C networks, the RFCs define the first 2 bits of the first octet as always turned on, but the third bit can never be on. Following the same process as the previous classes, convert from binary to decimal to find the range. Here s the range for a Class C network: 11000000 = 192 11011111 = 223 So, if you see an IP address that starts at 192 and goes to 223, you ll know it is a Class C IP address. Network Address Ranges: Classes D and E The addresses between 224 and 255 are reserved for Class D and E networks. Class D (224 239) is used for multicast addresses and Class E (240 255) for scientific purposes, but I m not going into these types of addresses in this book (and you don t need to know them).

Broadcast Address An IP address is a unique 32-bit binary code assigned for each computer. The IP address contains network and host parts. The network prefix describes a network while the host bits define a particular computer within this network. The subnet mask is a configuration parameter that helps to discriminate the network and host bits by assigning them "1" and "0" respectively. A broadcast address is a special IP address that allows to send a signal to all computers in a subnet. Example: Calculate the broadcast IP address if a computer in a network has the IP address of 192.35.128.93 and the network mask is 255.255.255.224. Broadcast IP Address Calculation 1. Step 1
32

Convert the computer IP address to the binary form by completing Section In our example, the binary form of 192.35.128.93 is 11000000.00100011.10000000.01011101. 2. Step 2 Convert the subnet mask to the binary form by completing Section 2. In our example, the binary form of 255.255.255.224 is 11111111.11111111.11111111.11100000. 3. Step 3 Determine host bits in the computer IP address that are represented as zeros in the network mask. In our example, the last 5 bits in the network mask are zeros, hence the last 5 digits are the host bits. 4. Step 4 Substitute all host bits in the computer IP by "1" to obtain the broadcast address in the binary form. In our example, the broadcast address is 11000000.00100011.10000000.01011111. 5. Step 5 Convert the binary broadcast IP address to the decimal-dot form by completing Section 3. In our example, the binary address 11000000.00100011.10000000.01011111 translates into 192.35.128.95 broadcast IP address

Subnetting Subnetting allows you to create multiple logical networks that exist within a single Class A, B, or C network. If you do not subnet, you are only able to use one network from your Class A, B, or C network, which is unrealistic.

33

Each data link on a network must have a unique network ID, with every node on that link being a member of the same network. If you break a major network (Class A, B, or C) into smaller subnetworks, it allows you to create a network of interconnecting subnetworks. Each data link on this network would then have a unique network/subnetwork ID. Any device, or gateway, connecting n networks/subnetworks has n distinct IP addresses, one for each network / subnetwork that it interconnects. In order to subnet a network, extend the natural mask using some of the bits from the host ID portion of the address to create a subnetwork ID. For example, given a Class C network of 204.17.5.0 which has a natural mask of 255.255.255.0, you can create subnets in this manner: 204.17.5.0 - 11001100.00010001.00000101.00000000 255.255.255.224 - 11111111.11111111.11111111.11100000 --------------------------|sub|---By extending the mask to be 255.255.255.224, you have taken three bits (indicated by "sub") from the original host portion of the address and used them to make subnets. With these three bits, it is possible to create eight subnets. With the remaining five host ID bits, each subnet can have up to 32 host addresses, 30 of which can actually be assigned to a device since host ids of all zeros or all ones are not allowed (it is very important to remember this). So, with this in mind, these subnets have been created. 204.17.5.0 255.255.255.224 host address range 1 to 30 204.17.5.32 255.255.255.224 host address range 33 to 62 204.17.5.64 255.255.255.224 host address range 65 to 94 204.17.5.96 255.255.255.224 host address range 97 to 126 204.17.5.128 255.255.255.224 host address range 129 to 158 204.17.5.160 255.255.255.224 host address range 161 to 190 204.17.5.192 255.255.255.224 host address range 193 to 222 204.17.5.224 255.255.255.224 host address range 225 to 254 Note: There are two ways to denote these masks. First, since you are using three bits more than the "natural" Class C mask, you can denote these addresses as having a 3-bit subnet mask. Or, secondly, the mask of 255.255.255.224 can also be denoted as /27 as there are 27 bits that are

34

set in the mask. This second method is used with CIDR. Using this method, one of these networks can be described with the notation prefix/length. For example, 204.17.5.32/27 denotes the network 204.17.5.32 255.255.255.224. When appropriate the prefix/length notation is used to denote the mask throughout the rest of this document. The network subnetting scheme in this section allows for eight subnets, and the network might appear as:

You are using five bits from the original host bits for subnets. This allows you to have 32 subnets (25). After using the five bits for subnetting, you are left with 11 bits for host addresses. This allows each subnet so have 2048 host addresses (211), 2046 of which could be assigned to devices. Note: In the past, there were limitations to the use of a subnet 0 (all subnet bits are set to zero) and all ones subnet (all subnet bits set to one). Some devices would not allow the use of these subnets. Cisco Systems devices allow the use of these subnets when theip subnet zero command is configured. Subnetting a Class C network 1. 2. 3. The subnet the host is located in The broadcast address of the subnet The valid host range of the subnet used to configure hosts

If we use the default subnet mask with a Class C network address, then we already know that three bytes are used to define the network and only one byte is used to define the hosts on each network. The default Class C mask is: 255.255.255.0. To make smaller networks, called subnetworks, we will borrow bits from the host portion of the mask. Since the Class C mask only uses the last octet for host addressing, we only have 8 bits at our disposal. Therefore, only the following masks can be used with Class C networks (Table A).

35

Subset zero Take note that in the table below I do not assume subnet zero. Cisco does teach a subnet zero assumption but they do not test that way. I have chosen to follow the exam.

Table A Mask Binary # Subnet bits # Host bits Subnets Hosts 7 6 5 4 3 2 2 2 6 14 30 62 126 62 30 14 6 2

255.255.255.128 10000000 1 255.255.255.192 11000000 2 255.255.255.224 11100000 3 255.255.255.240 11110000 4 255.255.255.248 11111000 5 255.255.255.252 11111100 6 Class C masks

As can be seen in Table A that the bits that are turned on (1s) are used for subnetting, while the bits that are turned off (0s) are used for addressing of hosts. You can use some easy math to determine the number of subnets and hosts per subnet for each different mask.

36

To determine the number of subnets, use the 2x-2, where the x exponent is the number of subnet bits in the mask. To determine the number of hosts, use the 2x-2, where the x exponent is the number of host bits in the mask. To determine the mask you need for your network, you must first determine your business requirements. Count the number of networks and the number of hosts per network that you need. Then determine the mask by using the equations shown above and don t forget to factor for growth. For example, if you have eight networks and each requires 10 hosts, you would use the Class C mask of 255.255.255.240. Why? Because 240 in binary is 11110000, which means you have four subnet bits and four host bits. Using our math, we d get the following: 24-2=14 subnets 24-2=14 hosts Many people find it easy to memorize the Class C information because Class C networks have few bits to manipulate. However, there is an easier way to subnet. Subnet Masks For the subnet address scheme to work, every machine on the network must know which part of the host address will be used as the subnet address. This is accomplished by assigning a subnet mask to each machine. A subnet mask is a 32-bit value that allows the recipient of IP packets to distinguish the network ID portion of the IP address from the host ID portion of the IP address. The network administrator creates a 32-bit subnet mask composed of 1s and 0s. The 1s in the subnet mask represent the positions that refer to the network or subnet addresses. Not all networks need subnets, meaning they use the default subnet mask. This is basically the same as saying that a network doesn t have a subnet address. Table 3.1 shows the default subnet masks for Classes A, B, and C. These default masks cannot change255.255.255.255, as this is all 1s a

37

broadcast address. A Class B address must start with 255.255.0.0, and a Class C has to start with 255.255.255.0.

FIGURE Typical Classful Network

Troubleshooting IP Addressing 1. Open a DOS window and ping 127.0.0.1. This is the diagnostic or loopback address, and if you get a successful ping, your IP stack is then considered to be initialized. If it fails, then you have an IP stack failure and need to reinstall TCP/IP on the host. 2. From the DOS window, ping the IP address of the local host. If that s successful, then your Network Interface Card (NIC) card is functioning. If it fails, then there is a problem with the NIC card. This doesn t mean that a

38

cable is plugged into the NIC, only that the IP protocol stack on the host can communicate to the NIC. 3. From the DOS window, ping the default gateway (router). If the ping works, it means that the NIC is plugged into the network and can communicate on the local network. If it fails, then you have a local physical network problem that could be happening anywhere from the NIC to the router. 4. If steps 1 through 3 were successful, try to ping the remote server. If that works, then you know that you have IP communication between the local host and the remote server. You also know that the remote physical network is working. If the user still can t communicate with the server after steps 1 through 4 are successful, then you probably have some type of name resolution problem, and need to check your Domain Name Server (DNS) settings. But if the ping to the remote server fails, then you know you have some type of remote physical network problem, and need to go to the server and work through steps 1 through 3 until you find the snag.

ROUTING PROTOCOLS A routing protocol is a protocol that specifies how routers communicate with each other, disseminating information that enables them to select routes then any two nodes on a computer network, the choice of the route being done by routing algorithms. Each router has a priori knowledge only of networks attached to it directly. A routing protocol shares this information first among immediate neighbors, and then throughout the network. This way, routers gain knowledge of the topology of the network. The term routing protocol may refer specifically to one operating at layer three of the OSI model, which similarly disseminates topology information between routers. Although there are many types of routing protocols, three major classes are in widespread use on IP networks:

39

Interior gateway routing via link-state routing protocols, such as OSPF and IS-IS Interior gateway routing via path vector or distance vector protocols, such as RIP, IGRP and EIGRP Exterior gateway routing. BGP v4 is the routing protocol used by the public Internet.

Interior routing protocols Interior Gateway Protocols (IGPs) exchange routing information within a single routing domain. A given autonomous system [5] can contain multiple routing domains, or a set of routing domains can be coordinated without being an Internet-participating autonomous system. Common examples include:
y y y y y

IGRP (Interior Gateway Routing Protocol) EIGRP (Enhanced Interior Gateway Routing Protocol) OSPF (Open Shortest Path First) RIP (Routing Information Protocol) IS-IS (Intermediate System to Intermediate System)

For Exterior Gateway Protocols there are;


y y

EGP: Exterior Gateway Protocol BGP: Border Gateway Protocol

40

Figure: routing/switching

LAN switching LAN switching is a form of packet switching used in local area networks. Switching technologies are crucial to network design, as they allow traffic to be sent only where it is needed in most cases, using fast, hardwarebased methods.

FIGURE The first switched LAN

41

LAYER 2 SWITCHING Layer 2 switching is hardware based, which means it uses the media access control address (MAC address) from the host's network interface cards (NICs) to decide where to forward frames. Switches use application-specific integrated circuits (ASICs) to build and maintain filter tables (also known as MAC address tables). One way to think of a layer 2 switch is as a multiport bridge.

Layer 2 switching provides the following


y y y y

Hardware-based bridging (MAC) Wire speed High speed Low latency


42

Low cost

Layer 2 switching is highly efficient because there is no modification to the data packet, only to the frame encapsulation of the packet, and only when the data packet is passing through dissimilar media (such as from Ethernet to FDDI). Layer 2 switching is used for workgroup connectivity and network segmentation (breaking up collision domains). This allows a flatter network design with more network segments than traditional 10BaseT shared networks. Layer 2 switching has helped develop new components in the network infrastructure
y

Server farms Servers are no longer distributed to physical locations because virtual LANs can be created to create broadcast domains in a switched internetwork. This means that all servers can be placed in a central location, yet a certain server can still be part of a workgroup in a remote branch, for example. Intranets Allows organization-wide client/server communications based on a Web technology.

These new technologies allow more data to flow off from local subnets and onto a routed network, where a router's performance can become the bottleneck.

43

Figure: layer 2 switching

Basic Net Commands 1.Net user- create and modify user accounts on computers. When you use this command without command-line switches, the user accounts for the computer are listed. net user /add (username) (password) /full name :( persons name) /comment:(comments) /expires: never y /active :{ yes | no} Activates or deactivates the account. y /expires :{ date | never} Causes the account to expire if date is set. The never option sets no time limit on the account.

44

y /passwordchg :{ yes | no} Specifies whether users can change their own password. The default is yes. y /passwordreq :{ yes | no} Specifies whether a user account must have a password. The default is yes.

2.net accounts- can be used to display the user accounts database and modify password and logon requirements for all accounts. Syntax: net accounts[/force logoff:{minutes | no}] [/minpwlen:length] [/maxpwage:{days | unlimited}] [/minpwage:days] [/uniquepw:number] [/domain]. Examples: 1) To display the current settings, the password requirements, and the server role for a server, : net accounts. 2) to force users to log off after the logon time expires with a fiveminute warning, net accounts /forcelogoff:5.

3. Net config- Displays configuration info for workstation or server services. Syntax: net config [{server workstation}]. /forcelogoff: {minutes | no}: Sets the number of minutes to wait before ending a user's session with a server when the user account or valid logon time expires. The default value, no, prevents users from being forced to log off.

45

/minpwlen: length : Sets the minimum number of characters for a user account password. The range is from 0 through 127 characters and the default is six characters.

/maxpwage: {days | unlimited}: Sets the maximum number of days that a user account's password is valid. The unlimited value sets no maximum time.

/domain : Performs the operation on the primary domain controller of the current domain. Otherwise, the operation is performed on the local computer.

46

4. Net file displays the names of all open shared files on a server and the number of file locks and closes individual shared files and removes file locks. Syntax: net file [ID [/close]]. To display the names and IDs of the open shared files, do net file without parameters. Example--To close a file that has ID 5, net file 5 /close.

5. Net send Sends messages to other users, computers, or messaging names on the network. Syntax: net send {name | * | /domain[:name] | /users} message. Example To send "This server will shut down in 15 minutes" message to all users connected to the DOMAIN, net send /domain: users This server will shut down in 15 minutes. 6. Net share displays information about all of the resources that are shared on the local computer. Syntax: net share [ShareName] 7. Net start/stop starts/stop a service. Syntax: net start/stop [service]. ExampleTo displays a list of services that are currently operating, use net start without parameters.

47

ExampleTo stop the Event Log service, type: net stop eventlog.

8. Net time display and synchronizes the computer's clock with that of another computer or domain. Syntax: net time [{\\ComputerName | /domain[:DomainName] | /rtsdomain[:DomainName]}] [/set]. Example To synchronizes the computer's clock with the time on the specified computer or domain, : net time \\computername /set.

9. Net use can be used to connect a computer to or disconnect a computer from a shared resource, or display information about computer connections. The command also controls persistent net connections. Syntax: net [\\ComputerName\ShareName[\volume]] [{Password | *}]] [/user:[DomainName\]Username][/smartcard] [{/delete | /persistent:{yes | no}}] ExampleTo list network connections, type: net use. To connect to the resource accounting shared on the \\Financial data server, : net use k: "\\financial data" \accounting.

48

10. Net user adds or modifies user accounts or displays user account information such as user name, last logon, logon script, user profile, home directory and group memberships. Syntax: net user [UserName [Password | *] [options]] [/Domain]. ExampleTo view information about the user account jsmith in a domain, : net user jsmith /domain. To specify logon hours of 4 A.M. until 5 P.M. on Monday, 1 P.M. until 3 P.M. on Tuesday, and 8 A.M. until 5 P.M. Wednesday through Friday for jsmith, : net user jsmith /time:M,4am-5pm;T,1pm-3pm;W-F,8:00-17:00.

11. Netstat (network statistics) is a command-line tool that displays network connections (both incoming and outgoing), routing tables, and a number of network interface statistics.

-a : Displays all active TCP connections and the TCP and UDP ports on which the computer is listening. -b : Displays the binary (executable) program's name involved in creating each connection or listening port. -e : Displays ethernet statistics, such as the number of bytes and packets sent and received. This parameter can be combined with -s. -n : Displays active TCP connections, however, addresses and port numbers are expressed numerically and no attempt is made to determine names. -o : Displays active TCP connections and includes the process ID (PID) for each connection.

49

-p proto : Shows connections for the protocol specified by Protocol. In this case, the Protocol can be tcp, udp, tcpv6, or udpv6. If this parameter is used with -s to display statistics by protocol, Protocol can be tcp, udp, icmp, ip, tcpv6, udpv6, icmpv6, or ipv6. -p Linux: Process : Show which processes are using which sockets -r : Displays the contents of the IP routing table. -s : Displays statistics by protocol. By default, statistics are shown for the TCP, UDP, ICMP, and IP protocols. If the IPv6 protocol for Windows XP is installed, statistics are shown for the TCP over IPv6, UDP over IPv6, ICMPv6, and IPv6 protocols. The -p parameter can be used to specify a set of protocols. -v : When used in conjunction with -b it will display the sequence of components involved in creating the connection or listening port for all executables.

SUMMARY-net accounts net computer net config net continue net file net group net helpmsg net localgroup Updates user accounts and modifies password and logon requirements. Adds or deletes computers from a domain. Displays configuration info for workstation or server services. Reactivates a service that has been suspended by NET PAUSE. Closes a shared file and removes file locks. Adds, displays, or modifies global groups on servers. Displays info about network messages such as error, warning, and alert messages. Modifies local groups on computers.

50

net name

Adds or deletes an alias name for a computer. Suspends a service or resource. Pausing a service puts it on net pause hold. Displays print jobs and shared queues. For each queue, the display lists jobs, showing the size and status of each job, and net print the status of the queue. Sends messages to other users or computers. The Messenger net send service must be running to receive messages. Lists or disconnects sessions between the computer and other net session computers on the network. Makes resources available to network users. When used net share without options, it lists information about all resources being shared on the computer. net start Lists running services. net Displays the statistics log for the local Workstation or Server statistics service. net stop Stops services. net time Synchronizes the computer's clock with the domain. Connects a computer to a shared resource or disconnects a net use computer from a shared resource. Creates and modifies user accounts on computers. When used net user without switches, it lists the user accounts for the computer. Displays a list of resources being shared on a computer. When net view used without options, it displays a list of computers in the current domain or network. Transmission Control Protocol The Transmission Control Protocol (TCP) is one of the core protocols of the Internet Protocol Suite. TCP is one of the two original components of the suite, complementing the Internet Protocol (IP) and therefore the entire suite is commonly referred to as TCP/IP. TCP provides the service of exchanging data reliably directly between two network hosts, whereas IP handles addressing and routing message across one or more networks. In particular, TCP provides reliable, ordered delivery of a stream of bytes from

51

a program on one computer to another program on another computer. TCP is the protocol that major Internet applications rely on, such as the World Wide Web, e-mail, and file transfer. Other applications, that do not require reliable data stream service, use a sister protocol, the User Datagram Protocol (UDP) which provides a datagram service, which emphasizes reduced latency over reliability. Tcp states 1. LISTEN : In case of a server, waiting for a connection request from any remote client. 2. SYN-SENT : waiting for the remote peer to send back a TCP segment with the SYN and ACK flags set. (usually set by TCP clients) 3. SYN-RECEIVED : waiting for the remote peer to send back an acknowledgment after having sent back a connection acknowledgment to the remote peer. (usually set by TCP servers) 4. ESTABLISHED : the port is ready to receive/send data from/to the remote peer. 5. FIN-WAIT-1 : indicates activate close 6. FIN-WAIT-2 Client just received acknowledgment of its first FIN from the server. 7. CLOSE-WAIT Indicates passive close. Server just received first FIN from a client. 8. CLOSING LAST-ACK Server is in this state when it sends its own FIN. 9. TIME-WAIT : represents waiting for enough time to pass to be sure the remote peer received the acknowledgment of its connection termination request. 10.CLOSED Server received ACK from client and connection is closed. TESTING NETWORK CONNECTIVITY AND TROUBLESHOOTING NETWORK CONNECTIONS

52

Open the command prompt and type:ipconfig:-

53

To check the connectivity, just issue the command "ping 132.186.198.238 or whatever the IP address is of your particular gateway. Or you can issue the command "ping -132.186.198.238 -t which just keeps pinging the gateway until you interrupt it by using CTL-C. Obviously, you should get "replies" from your gateway, and they should be pretty speedy and consistent, like a few msec. On Linux, a simple ping command will just run until you interrupt it, the opposite of Windows. So you know your connection to your NAT/router is working - your home network seems OK, at least from this PC.

Ping Options y -w timeout Timeout in milliseconds to wait for each reply. y -i TTL Time To Live. y -v TOS Type Of Service.
54

y y y y y y y y y

-a Resolve addresses to hostnames. -n count Number of echo requests to send. -t Ping the destination host until interrupted. -l size Send buffer size. -f Set Don't Fragment flag in packet. -r count Record route for count hops. -s count Timestamp for count hops. -j host_list Loose source route along host_list. -k host_list strict source route along host_list.

Using ping:-

55

GATEWAYS In telecommunications, the term gateway has the following meaning:


y

In a communications network, a network node equipped for interfacing with another network that uses different protocols. o A gateway may contain devices such as protocol translators, impedance matching devices, rate converters, fault isolators, or signal translators as necessary to provide system interoperability. It also requires the establishment of mutually acceptable administrative procedures between both networks. o A protocol translation/mapping gateway interconnects networks with different network protocol technologies by performing the required protocol conversions.

Loosely, a computer configured to perform the tasks of a gateway. For a specific case, see default gateway.

Routers exemplify special cases of gateways.


56

Gateways, also called protocol converters, can operate at any layer of the OSI model. The job of a gateway is much more complex than that of a router or switch. Typically, a gateway must convert one protocol stack into another. Details A gateway is a network point that acts as an entrance to another network. On the Internet, a node or stopping point can be either a gateway node or a host (end-point) node. Both the computers of Internet users and the computers that serve pages to users are host nodes, while the nodes that connect the networks in between are gateways. On an IP network, clients should automatically send IP packets with a destination outside a given subnet mask to a network gateway. A subnet mask defines the IP range of a network. For example, if a network has a base IP address of 192.168.0.0 and has a subnet mask of 255.255.255.0, then any data going to an IP address outside of 192.168.0.X will be sent to that network's gateway. While forwarding an IP packet to another network, the gateway might or might not perform Network Address Translation. A gateway is an essential feature of most routers, although other devices (such as any PC or server) can function as a gateway.

57

LIVE PROJECT

Project -DCS

SPPA-T1000

AS

OM

Worked on

Module - GATEWAYS

TESTING

DCS SoftAS SoftOM

Distributed control system Automation System Operation & Monitoring System

SPPA-T1000 SIEMENS POWER PLANT AUTOMATIONTELEPERM1000)

58

DISTRIBUTED CONTROL SYSTEM INTRODUCTION DCS is enhanced with the latest technologies & many extra features to fulfill the needs of the computer- age user. To provide completely open, universally accepted platforms, high operational Comforts and an extremely easy engineering process, it has been specially designed to control power plants of all kinds i.e. of all types and sizes. Advantages Of DCS y Flexibility and easy to plan redundancy at all levels y Universal hardware being the basis Industrial grade server technology is used. y Unlimited ability to expand. y High reliability, good speed and accuracy in software control Blocks. y One can enjoy the Freedom of connecting of both central and remote I/O stations. y Freedom to Choose operating system(windows, LINUX or UNIX)for Operation & Monitoring system. y Software platforms and Completely open hardware. SPPA-T1000 is an advanced Distributed Control System enriched with the latest concepts and features to fulfill the growing requirements of the market. It has been specifically designed for control of all types and sizes of power plants. It is based upon the proven features of Teleperm XP innovated with latest technological enhancements to offer open, universal and web-enabled platforms, excellent availability, high operational comforts and an extremely easy engineering process.

59

60

SoftAS Automation System The SoftAS uses the latest Siemens hardware with very fast processors. The Central Controllers (CCs) are based on 32 bit high performance processors, upgradable to 64 bit. The smallest processing unit in the CC is called PLU (Process Logic Unit), which handles the control, data transfer and protection routines. Multiple PLUs run parallel and synchronously in the CC distributing the control tasks amongst themselves, resulting in fast processing cycles (typically 50ms). Faster cycle times are available for specific applications. For even faster cycle times, intelligent and dedicated front-end processing units are available which can be directly connected to the PROFIBUS. Each CC has inbuilt fault detection, which performs regular self-check routines, and annunciates problems on the diagnostic tool. Also a complete history of the problems, prior to any fault or failure, is logged in a file. Each CC is equipped with fast access memory for storing system and simulation events. The Engineering and configuration files are also available here in addition to their being stored in the engineering station. SoftOM - Operation & Monitoring System The SoftOM is an intelligent, open and decentralized system. It is based on universal workstations and provides the user the choice of Windows, LINUX or UNIX operating systems. It uses latest industry software and standards such as Ethernet, TCP/IP, OSF Motif, OPC connectivity, web-enabling and multiple gateways. SoftOM enables both client server architecture as well as direct HMI connectivity to the system bus.

61

62

63

Introduction to the module- GATEWAYS Basic Design Concept: This system uses MODBUS protocol to fetch data from a Third party system. MODBUS is an application layer messaging protocol for client/server communication between devices connected on different types of buses or networks. It is currently implemented using: o TCP/IP over Ethernet. o Asynchronous serial transmission over a variety of media (wire : EIA/TIA-232-E, EIA-422, EIA/TIA-485-A; fiber, radio etc.) o The MODBUS protocol allows an easy communication within all types of network architectures. RS-485 (The True Multidrop Network)- RS-485 is an upgraded version of the RS-422 protocol that was specially designed to address the problem of communication between multiple devices an a single data line. It has the ability to allow up to 32 devices to communicate using the same data line. RS-232 (The First Protocol)- RS-232 was introduced in 1960, and is currently the most widely used communication protocol. It is simple, inexpensive to implement, and though relatively slow, it is more than adequate for most simple serial communication devices such as keyboards and mice. RS-232 is a single-ended data transmission system, which means that it uses a single wire for data transmission.

64

Communication between HMI s through serial servers and comport.

query
A

response

HMI (slave)

ports(links)

Lan switch

Slave 1

Serial server

master

Slave 2

Slave 3
softOM(HMI s e Connected through a LAN network)

65

GATEWAY S ENGINEERING. Function code 01 - Binary (HCW) Function code 02 Binary (HCR) Function code 03 Analog (HRW) Function code 04 Analog (HRR) Function code 05 Binary (FCW) Function code 06 Analog (FRW) Function code 15 Binary (FMCW) Function code 16 Analog (FMRW) For Gateway master engineering i.e. filling of Mdb file, the following tables in database must be filled.

TABLE: tables should be created for following and database should be maintained y LINK ENGINEERING y MASTER ANALOG y MASTER ANALOG WRITE y MASTER BINARY y MASTER BINARY WRITE y SLAVE ANALOG There are 4 modules of gateways:-

66

1. 2. 3. 4.

Serial send master(connection to serial server) Partner receive(peer updation) Health monitor(check connection) X communication(updation of values)

TESTING OF GATEWAYS Siemens Gateways Slave is based on Modbus - RTU specification. Gateways Slave can communicate through serial server to third party in the following two ways1 Third party System is on Comport and Siemens Gateways Slave is on LAN to Serial Server. 2. Third party System(s) are on the LAN to serial server and Siemens Gateways Slave is on Comport. For Gateways Slave engineering, following tables of Modbs.mdb need to be filled :1. SlaveAnalog 2. SlaveBinary

67

START WITH THE TESTING

OBSERVATION OF GATEWAYS 1. While simulating a particular Signal from analog Simulator it accepts more then 100 digits after decimal and on SoftOM it displays uptill two digits number after decimal .

68

2. When a Signal is manually defined then the value is not updated in the Slave machines. In XCommunication shows the previous values in the console. In SoftOM for manually defined Signals, the value is updated from one Slave machine to another, but viceversa is not possible . Moreover the value is not updated in the master in all the cases. (Not from any of the Slaves and when manually defined any Signal in master the change is not reflected in of the Salve machine.) 3. In Slave the updated values can not be seen from System Information display :: Displays :: Analog Signal Data. To check the values Do Telemetered Yes from Engineering :: Analog Signal Data. OBSERVATION OF GATEWAYS ON 4. For Master Analog write, the value given will be displayed in the Slave. But when a particular Signal is switched off /out of Range/Manually Defined , then change in the master is not updated in the Slave . The change can only be observed when that particular Signal is Selectively simulated. 5. When the value of a particular Signal in the master is more then the range of the mapped Signal in the slave then, ### (out of range) is displayed in the Slave. 6. To see the change in the mimic of the Slave, do telemetered Yes of the mapped Signals. Otherwise the change is not displayed. 7. In Master for Selective Simulation of the particular Signal, it dosenot accept the boundary values of that Signal. It accepts one value less or greater then the boundary value. But master will accept the boundary value of the mapped Signal in the slave. bUt sometimes it accepts the boundary values as well. 8. To check the change in the From Master To Slave all the Exes of the master should be running(GW Diagonistic, Health Monitor, Parter Recv, Serial Send Master and XCommunication), other wise the change will not be reflected.

69

9. For Selective Simulation, Analog Simulator Accepts .-67, but when checked this Signal in the same then it displays the value as 0. 10. After Decimal Analog Simulator Always take a round off values. 11. The time taken to see the changed value from Master on Slave is around 15-25 secs. For master HMI Below is the window showing the gateways analog simulator along with the signal data window in order to check the bugs. As can be seen the value given is 0.1250 but in signal data it is showing 0.13.hence there is an error and needs to be corrected.

70

Now the signal number-740 is checked and the value taken is-.9900

71

Signal 742, lan bus number -8, partcipant-32, telegram-99 The graph shows the signal and its limits. Here if 999999.0 is taken which is also the upper limit, then graph is constant.

72

Sometimes # is appeared in place of signals.. this is also a bug and needs to be checked.

73

74

Figure showsAnalog signal data table

75

For SLAVE The signal data window shows all the information of the signal as can be seen in the snap below.

76

Analog signal data table for slave HMI

77

INTEGRATION TEST REPORT

78

INTEGRATION TEST REPORT

Name of the document Prepared by Release Date

: CR 37 Gateways(W) Master : DIVYA / RIMJHIM : 30.07.2010

79

Test Case Id

: SYS_ GWXCM_01

Primary Test Case : Check for the value updation from master on Slave for both Binary and analog values. Secondary test Case : Test Steps : For Analog : Select a signal from Analog database in Master and simulate the value by Selective simulation/ from Analog Simulator in master and check the value updation in both Slave for the mapped Signal. For Binary : Select a signal from Binary database in Slave and simulate the value by Man Defn in master and check the value updation in all the Slave for the mapped Signal. Expected Result : The value should be updated in the Master of the Selected Signal as well as on the mapped Signals of Slave.
Actual result observed : The value gets updated in the master as well as Slave.

Any other comments : For Binary value make sure the Signal in Slave is not Manually Define when checking for the mapped Signal, otherwise the value will not be updated. Actual result observed : The value gets updated in Slave from Master for both Analog and Binary.

Modification Required: Bugs to be rectified: System Performance Monitor Result: Test Case Fail: Yes / No If Yes: Proceed Yes/No Negative Test Cases: Comments: Test Performed By: On:

80

Test Case Id

: SYS_ GWXCM_02

Primary Test Case : Check for the value updation in master from Slave for both Binary and analog values. Secondary test Case : Test Steps : For Analog : Select a signal from Analog database in Slave and simulate the value by Selective simulation/ from Analog Simulator in Slave and check the value updation in Master. For Binary : Select a signal from Binary database in Slave and simulate the value by Man Defn in Slave and check the value updation in both master for the mapped Signal. Expected Result Master from slave.
Actual result observed

: The value should be updated in the mapped Signal of


: The value gets updated in the Master from the Slave.

Any other comments : The value gets updated in Master from only that Slave from which the value is been checked.

For Binary value make sure the Signal is not Man Defn when checking for the mapped Signal in master, otherwise the value will not be updated.

Modification Required: Bugs to be rectified: System Performance Monitor Result: Test Case Fail: Yes / No If Yes: Proceed Yes/No Negative Test Cases: Test Performed By: On:

81

Test Case Id

: SYS_ GWXCM_03

Primary Test Case : a) Simulate the value from master and check the values in Slave. b) Simulate the value from Slave and check the value in Master. Case 1: Check for the boundary values. Case 2: Check for the negative values. Case 3 : Check for the decimal values. Secondary test Case : Test Steps : Select a signal from the database and simulate the value by Selective simulation from Analog Simulator or Do manual Definition for the Binary values from both master to Slave and Slave to master. Check the value of that Signal from SoftOM.(Master and Slave) Check for the boundary, negative, decimal Values. Expected Result : The value should be updated in the SoftOM (Master)of the Selected Signal and in the Slave of the mapped Signals./ The value should also get updated from Slave to Master of the mapped Signal as mentioned below. Test Steps Value Boundary values Expected Result Analog Write Analog Read The value gets updated The value gets from master to Slave. updated from The value gets updated in Slave on Master. the Signal data but on mimic the value has to be when in the range of the Signal, otherwise it will not be shown properly in mimic. The value gets updated in From Slave the master as well as Slave. value gets updated in Master. It accepted the decimal value and updated the round off value in both master and Slave. From Slave the value gets updated in Master.

Negative Values

Decimal Values

Actual result observed :


82

Test Steps Value Boundary values

Expected Result Analog Write Analog Read The value gets updated The value gets from master to Slave. updated from The value gets updated Slave on Master. in the Signal data but on mimic the value has to be when in the range of the Signal, otherwise it will not be shown properly in mimic. The value gets updated in master as well as Slave. It accepted the decimal value and updated the round off value in both master and Slave. From Slave the value gets updated in Master. From Slave the value gets updated in Master.

Actual Result As Expected.

Negative Values

As Expected.

Decimal Values

As Expected.

Any other comments: Modification Required: Bugs to be rectified: System Performance Monitor Result: Test Case Fail: Yes / No If Yes: Proceed Yes/No Negative Test Cases: Comments: Test Performed By:

On:

83

Test Case Id

: SYS_ GWXCM_04

Primary Test Case : Add a new entry in database in both Master and Slave. Genearte the Engg Files and check whether the value is updated from Master to slave when the Value is simulated from the Master.

Secondary test Case : Test Steps : Enter the new entry in the database of both master and Slave , make sure while defining the database the Value of the Fields should match each other. The OS Location in the database should be unique. Generate the Files and now check the Status of Signal In Slave for the defined Signal in Master. Expected Result : The value from Master should be updated in the mapped Signals of the Slave
Actual result observed : As Expected.

Any other comments: : When ever the cursor is on the Added field in the database, change the cursor location and then generate the files only then the field added will be generated

Modification Required: Bugs to be rectified: System Performance Monitor Result: Test Case Fail: Yes / No If Yes: Proceed Yes/No Negative Test Cases: GWXCM_040_N001: If the fields (Link Location) of the database are not matching . Comments: The value in Slave will not be up dated from master.

GWXCM_040_N002: When the cursor is on the last added field Check whether the last added field is generated or not.

84

Comments: The last added field will not be generated because of Microsoft Access. .It can be cross checked by opening the database.

Test Performed By:

On:

85

INTEGRATION TEST REPORT

Name of the document Prepared by Release Date

: CR 38 Gateways(W) Slave : DVY / RIMJHIM : 30.07.10

86

Test Case Id : SYS_ GWSLV_01 Primary Test Case : Check for the value updation from master on Slave for both Binary and analog values.
Secondary test Case :

Test Steps : For Analog : Select a signal from Analog database in Master and simulate the value by Selective simulation from Analog Simulator in master and check the value updation in Slave for the mapped Signal. For Binary : Select a signal from Binary database in Slave and simulate the value by Man Defn in master and check the value updation in all the Slave for the mapped Signal. Expected Result : The value should be updated in the Master.

Actual result observed : The value gets updated in the master.

Any other comments: For Binary value make sure the Signal in Master is not Man Defn when checking for the mapped Signal, otherwise the value will not be updated. Modification Required: Bugs to be rectified: System Performance Monitor Result: Test Case Fail: Yes / No If Yes: Proceed Yes/No Negative Test Cases: Comments:
Test Performed By: On:

87

Test Case Id : SYS_ GWSLV_02 Primary Test Case : Check for the value updation in master from Slave for both Binary and analog values.
Secondary test Case :

Test Steps : For Analog : Select a signal from Analog database in Slave and simulate the value by Selective simulation from Analog Simulator in Slave and check the value updation in Master. For Binary : Select a signal from Binary database in Slave and simulate the value by Man Defn in Slave and check the value updation in master . Expected Result slave. : The value should be updated in the mapped Signal of Master from

Actual Result Observed: As Expected.

Any other comments: The value gets updated in Master from only that Slave from which the value is been checked. For Binary value make sure the Signal is not Man Defn when checking for the mapped Signal in master, otherwise the value will not be updated. Modification Required : Bugs to be rectified: System Performance Monitor Result: Test Case Fail: Yes / No If Yes: Proceed Yes/No Negative Test Cases: Comments:
Test Performed By: On:

88

Test Case Id

: SYS_ GWSLV_03

Primary Test Case : a) Simulate the value from master and check the values in Slave. b) Simulate the value from Slave and check the value in Master. Case 1: Check for the boundary values. Case 2: Check for the negative values. Case 3 : Check for the decimal values. Secondary test Case : Test Steps : Select a signal from the database and simulate the value by Selective simulation from Analog Simulator or Do manual Definition for the Binary values from both master to Slave and Slave to master. Check the value of that Signal from SoftOM.(Master and Slave) Check for the boundary, negative, decimal Values. Expected Result : The value should be updated in the SoftOM (Master)of the Selected Signal as mentioned below . Case no 1 Test Steps Value Boundary values Expected Result Analog Write The value gets updated from master to Slave. The value gets updated in the Signal data but on mimic the value has to be when in the range of the Signal, otherwise it will not be shown properly in mimic. The value gets updated in master as well as Slave. It accepted the decimal value and updated the round off value in both master and Slave. Analog Read The value gets updated from Slave on Master.

Negative Values

Decimal Values

From Slave the value gets updated in Master. From Slave the value gets updated in Master.

Actual result observed :

89

Case no 1

Test Steps Value Boundary values

Expected Result Analog Write The value gets updated from master to Slave. The value gets updated in the Signal data but on mimic the value has to be when in the range of the Signal, otherwise it will not be shown properly in mimic. The value gets updated in master as well as Slave. Analog Read The value gets updated from Slave on Master.

Actual Result As Expected.

Negative Values

From Slave the value gets updated in Master. From Slave the value gets updated in Master.

As Expected.

Decimal Values

It accepted the decimal value and updated the round off value in both master and Slave.

As Expected.

Any other comments: Modification Required: Any other comments: Modification Required : Bugs to be rectified: System Performance Monitor Result: Test Case Fail: Yes / No If Yes: Proceed Yes/No Negative Test Cases:
Test Performed By: On:

90

Test Case Id : SYS_ GWSLV_04 Primary Test Case : Check for the time taken to observe the change in Master when the Signal is defined in Slave Secondary test Case : Test Steps : Simulate any defined Signal from the database of Salve and check the time to get it displayed on the mapped Signals of the Master. Expected Result : It should take 0-10 secs. Actual result observed : It took around 0-15 secs.

Any other comments: Time taken depends upon the size of the query, the more the size of the query, the more time it will take to show the change. Modification Required: Bugs to be rectified: System Performance Monitor Result: Test Case Fail: Yes / No If Yes: Proceed Yes/No Negative Test Cases: Comments:
Test Performed By: On:

91

Test Case Id

: SYS_ GWSLV_05

Primary Test Case : Add a new entry in database in both Slave and Master .Generate the Engg Files and check whether the value is updated from Slave to Master when the Value is simulated from the Slave.
Secondary test Case :

Test Steps : Enter the new entry in the database of both master and Slave , make sure while defining the database the Value of the fields should match each other. The OS Location in the database should be unique. Generate the Engg Files and now check the Status of Signal in Master from slave.. Expected Result : The value from Slave should be updated in the mapped Signals of the Master. Actual result observed : As Expected.

Any other comments : When ever the cursor is on the Added field in the database, change the cursor location and then generate the files only then the field added will be generated Modification Required: Bugs to be rectified: System Performance Monitor Result: Test Case Fail: Yes / No If Yes: Proceed Yes/No Negative Test Cases: GWSLV_027_N001: If the fields (Link Location) of the database are not matching . Comments: The value in Master will not be up dated from Slave due to Engg mismatch GWSLV_027_N002: When the cursor is on the last added field Check whether the last added field is generated or not. Comments: The last added field will not be generated because of Microsoft Access. .It can be cross checked by opening the database
Test Performed By: On:

92

CONCLUSION

It was a wonderful experience working with SIEMENS, as no other organization could have been better, but for SIEMENS. I worked under EFIE department for Networking and Testing . I had set my goals in the very beginning as to understand the needs and requirements of Industry today, and in near future too. I also wanted to analyze my standing, and also wished to figure out the direction I had to move in. With utmost pleasure, I would like to say that I have successfully accomplished my goals, as I have learnt a lot in this Organization. I now know all my weak points, to work on, and also my strong points, so that I can improve upon them. I have also gained a clear vision of the use of programming from the point of view of Industrial usage. I know where I have to put in efforts to evolve myself into a thorough professional. Once again I thank one and all for their valuable contributions.

93

94

Vous aimerez peut-être aussi