CN100498607C - Data transfer method and automation system used in said data transfer method - Google Patents

Data transfer method and automation system used in said data transfer method Download PDF

Info

Publication number
CN100498607C
CN100498607C CNB2005800195475A CN200580019547A CN100498607C CN 100498607 C CN100498607 C CN 100498607C CN B2005800195475 A CNB2005800195475 A CN B2005800195475A CN 200580019547 A CN200580019547 A CN 200580019547A CN 100498607 C CN100498607 C CN 100498607C
Authority
CN
China
Prior art keywords
data
packet
communication user
communication
check word
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CNB2005800195475A
Other languages
Chinese (zh)
Other versions
CN1969236A (en
Inventor
H·伯特纳
J·萨克斯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beckhoff Automation GmbH and Co KG
Original Assignee
Beckhoff Automation GmbH and Co KG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beckhoff Automation GmbH and Co KG filed Critical Beckhoff Automation GmbH and Co KG
Publication of CN1969236A publication Critical patent/CN1969236A/en
Application granted granted Critical
Publication of CN100498607C publication Critical patent/CN100498607C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0061Error detection codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0078Avoidance of errors by organising the transmitted data in a format specifically designed to deal with errors, e.g. location
    • H04L1/0083Formatting with frames or packets; Protocol or part of protocol for error control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4604LAN interconnection over a backbone network, e.g. Internet, Frame Relay
    • H04L12/462LAN interconnection over a bridge based backbone
    • H04L12/4625Single bridge functionality, e.g. connection of two networks over a single bridge
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L2001/0092Error control systems characterised by the topology of the transmission link
    • H04L2001/0094Bus
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • H04L2012/4026Bus for use in automation systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention relates to secure transfer of data packets on a data transmission path between two communication users, wherein the data packets respectively contain a check character which is calculated from the other data in a data packet, wherein one communication user uses the check character of the last data packet received by the other communication user as a starting value for calculation of a check character for the next packet to be sent to the other communication user.

Description

Data transmission method and use the automated system of this kind data transmission method
Technical field
The present invention relates to come by data transmission link between a kind of two communication users the method for transmits data packets; And relate to a kind of automated system, it has two communication users that connect by data transmission link, and communication user respectively has an interface unit.
Background technology
In the automation control system that is used for controlling machinery, even must guarantee that automated system breaks down, and can not work the mischief to personnel and environment yet.Therefore, the operation of automated system is usually based on usually said failure to safety principle, and according to this principle, if vitals breaks down, automated system will be transformed into safe condition.When automated system is carried out security-related control function based on failure to safety principle, its basic demand is: carrying out between the security control functional period, still handle process data (process data), and this security process state can be indicated always to the machine actuator from machine sensor with instant form accurately.
Yet in automated system, the quantity of security-related control function is often far below that be used for keeping the automated system operate as normal and the quantity irrelevant control function of safety.The functional control function that is not subjected to have nothing to do with safety in order to ensure control function security-related in the automated system influences, common way is, security-related control function is formed the security procedure of an isolated operation, and it is what to be independent of with the irrelevant control function of safety.
If at independent operating and guarantee the security-related program of operation on the automated computer of parts of machine safety to emergency power off switch, optoelectronic switch and other by private line access, just can realize separating fully of security-related and the control function that has nothing to do with safety.In order to be reduced in the automated system owing to increasing the hardware complexity that automated computer causes, people have known by being called as safe floor the non-safety control program is expanded, and security procedure and non-security control program in the automated system are all realized in same hardware.
Normally a kind of distributing design of Modern Automation System, its peripheral processing unit promptly communicates by LAN (Local Area Network) or by even more ideal field bus system between sensor and actuator and the control computer.For realizing the control to machinery, control computer is read in the input signal that control program needs by the fieldbus from peripheral processing unit, is handled in real time by control computer thereafter, and by fieldbus output signal is outputed to peripheral processing unit.In order in automated system, to use fieldbus synchronously to transmit processing signals from security procedure, adopt known safe floor that field bus system is expanded, this can the possibility of damaging reach minimum so that the data of being transmitted between peripheral processing unit and the control computer make a mistake, thereby the situation that makes damage to discern reaches permissible minimum degree, and then makes fieldbus also can be used for transmitting security-related data.
At the scene in the bus system, the safe floor of above-mentioned increase includes on the fieldbus of increase the address relationship between two communication users usually, so that can have clear and definite association.In addition, between two communication users, have the additional check word that goes out by process of transmitting and address computation in the transmission safety packet, so that can identify the damage of data reliably.For whether the order that can detect the relevant process data of the safety that will be transmitted is correct, and whether in time arrive communication user, the secure data bag is provided continuous serial number usually.In this article, numbering is normally taken from the numbering module of regulation, its fully by after be reset.
The automated system that known a kind of control program and security procedure can both be realized in same hardware is exactly the Simatic system of Siemens company.The fieldbus that uses in this system is the Profibus bus, is called as the Profisafe agreement it is expanded, so that transmit security-related packet.Yet this automated system with security procedure can only be expanded under the situation of configuration of accurately stipulating and data processing circumstance.
Yet in automated system, for the transmission course signal, except known proprietary field bus protocol, Ethernet protocol is also by more and more widely employing.In order to transmit data in the LAN (Local Area Network) high speed, Ethernet protocol is most widely used technology in office communication.Ethernet uses the software and hardware of standard and finishes the data transmission of two-forty with simple network technology, owing to have these benefits, the industry ethernet system equally just more and more is used in the commercial production, to finish the exchanges data between sensor/actuator and the control computer.
Therefore be necessary to make the industry ethernet system also to have safe floor and can on industry ethernet, except carrying out traditional control program, can also carry out security procedure equally.Yet Ethernet is usually designed to use " switch " and (switches) avoids data collision in the network.Switch is the packet exchange node with a plurality of input and output sides, and the packet that arrives input end is exchanged to the output terminal of knowing the receiver station exclusively.Increased time delay but in Ethernet, use switch to carry out packet exchange, because switch is to be cushioned to be switched to the purpose output terminal again after depositing at the packet that input end receives.
The delay that packet sends in the Ethernet of switch is arranged just means that it is dangerous using traditional safe floor (for example Profisafe agreement), can produce incorrect process status.Because the secure data bag is provided to the consecutive order numbering from the numbering module of regulation, so the buffer-stored of packet means that serial number may overflow in the switch, this secure data that can lead to errors is transmitted.With regard to the Profisafe agreement; for example; have 8 serial numbers during the transmission of secure data bag; be that per 255 circulations of packet that process does not change during the data transmission in the automated system repeat once; because this moment, serial number was overflowed, 0 is unallowed sequence number, the result; the emergency shutdown switch can not in time be discerned or machine upkeep can not be cut off rapidly, will guarantee in automated system that like this security process state of machine is impossible.
WO 99/49373 has disclosed a kind of method of operating of automated system, failure safe information and the security protocol exchange that circulates in the method.Thereby make the data that remain unchanged repeatedly being transmitted once in the transmission, packet is divided into static part and dynamic part, the static data packet portion only transmits between two communication users on the bus system at the scene at initial phase.In this case, form the initial value that check word calculates by the static data packet portion for the dynamic data packet portion.In this case, in the permission time of regulation, lack new packet and can be considered to error situation.When using this loop-around data bag transmission safety layer in the Ethernet that switch is being arranged, because the danger that the packet delayed delivery that switch causes can produce incorrect treatment state equally.In addition, the restriction that guarantees accurately to be on time is necessary.
Summary of the invention
An object of the present invention is to provide between a kind of two communication users in the method for data transmission link transmitting data bag and associated automated system, this data transmission link can guarantee to be used for to carry out security-related control function processing signals can with immediately accurately form handle, and the security process state can be indicated to the actuator in the automated system always.
According to the present invention, in automated system, on data transmission link, transmit data as follows between two communication users: for each packet provides a check word, this check word is come out by other data computation in the packet, is used for the check word of the last packet received from the other side's communication user for the initial value of the packet calculation check word that will send to the other side's communication user.
The invention provides a kind of method that increases safe floor for control program, even what the data transmission of automated system was used is the Ethernet fieldbus, and using switch as the packet exchange node, it still can guarantee the transmission of security-related data.This be because adopt be included in packet calculation check word that a check word in the packet of receiving will transmits for the next one as initial value can prevent in the sequence of data packet packet as the Profisafe agreement by same repetition.Therefore, packet is not having the danger that makes the mistake and discern owing to displacement when the Ethernet switch buffering is deposited during the data transmission.The present invention continues dynamically to generate check word, this means that not having identical packet in a data packet sequence occurs.
According to first preferred embodiment of the present invention, the verifying correctness of the packet that communication user is received is to compare by the check word that comprises in check word that calculates the packet of receiving and the packet received itself and this, uses the check word of a packet that is sent out as initial value during the calculation check word.Adopt the safe floor of this kind scheme, just may in the secure data bag, just need not to use in the Profisafe agreement for discerning the sequence numbering that correct sequence of data packet adopts.This is because correct sequence of data packet can directly be obtained by the check word that transmits by the initial value of determining check word by communication user of the present invention, and this initial value is available for the received communication user.
According to another preferred embodiment, data communication in the safe floor of the present invention is performed such: when transmitting the beginning of data between two communication users, send identification data packet for the another one communication user as the originating end of data transmission a communication user, the value that the initial value of the check word of identification data packet is preferably fixing or the identifier of the other side's communication user.This can reliably guarantee the exchange of security-related data after the communication disruption in the automated system.Preferably, a data item that is used for discerning the other side's communication user can be used as identifier in the identification data packet that here is sent out, so just be made the initialization of communication link simple and reliable.
According to a preferred embodiment again, between communication user, carry out data transmission when beginning, another data item is transferred to the other side's communication user in another packet, and this data item is preferably sent and is followed after identification data packet from the initiating terminal communication user.This another data item refers to Session ID or algorithm and the Session ID that changes according to the rules at random.Even Session ID can guarantee in interrupted communication link and after restarting, the also packet that can not duplicate.
According to a preferred embodiment again, when between two communication users, beginning to carry out data transmission, preferably, the initiating terminal communication user of data transmission comes the transmission parameter data with the supplemental characteristic bag, and the transmission of this supplemental characteristic bag is after identification data packet that sends and session data bag.This can guarantee that the operating parameter that relates to device functionality can transmit equally safely under safe floor of the present invention.Be that with another advantage of upper type packet all is that mode with the grouped data item provides, the data that it transmits in can the recognition data bag.
According to a preferred embodiment again, sequence number is considered in the calculating of check word in the automated system, and sequence number is used for identifying the message sequence separately of data transmission between two communication users.Here, being preferably sequence number is to be generated respectively by two communication users scheme according to the rules.Comprise sequence number in the calculating and can guarantee reliably that check word always can change when when a message sequence moves to another message sequence thereupon.In the time of can preventing that so continuous data-message from comprising same data, issuable same check word, thus produce false alarm.In this case, sequence number does not need to transmit in packet between two communication users simultaneously, because communication user can produce sequence number independently of each other based on the scheme of regulation.For instance, the communication user sequence number can produce by increasing or remove the numbering module of the regulation all known from communicating pair.Transmission sequence number can produce unnecessary long data bag between two communication users, particularly if use long sequence number to prevent that the generation sequence number overflows between transmission period.
According to a preferred embodiment again, data packets for transmission includes a connection identifier (CID between communication user.Can guarantee like this if the communication user communication user different with other transmits security-related packet, even if, the displacement of packet can not take place also because two packets receiving from different communication users have same check word by chance.
Description of drawings
Below in conjunction with accompanying drawing invention is described in more detail.Wherein
Fig. 1 is based on the basic structure synoptic diagram of the automated system of Ethernet;
Fig. 2 is the master data flow process and the execution graph of the safe floor of the present invention with first kind of data packet form;
Fig. 3 A to Fig. 3 C is the growth data flow process and the execution graph of the safe floor of the present invention with second kind of data packet form.Wherein, Fig. 3 A is an initialize data transfer, and Fig. 3 B is the supplemental characteristic transmission, and Fig. 3 C is the process data transmission; And
Fig. 4 is the master data flow process and the execution graph of the safe floor of the present invention with the third data packet form.
Embodiment
Communication network provides the plain mode of exchange and shared data and/or resource between a kind of workstation (back is also referred to as communication user).Here, the notion of Ethernet is by the communication standard of extensive employing in LAN (Local Area Network).Ethernet is linked a plurality of communication users together by the transmission medium of sharing, and the data that transmit are packaged in the so-called packet (data packet) according to predetermined form, hereinafter are also referred to as message (message).Here, Ethernet comprises three parts: hardware, the i.e. transmission medium of communication user and network interface; Assembly of protocols by transmission medium control access; And Ethernet data packet form.Can use any type of network topology structure to connect communication user here.
See also shown in Figure 1ly, be network topology structure preferable in a kind of Ethernet.Communication user 1 is connected on the core switch 3 (central exchange) that is called as switch (switch), forms hub-and-spoke configuration by point-to-point line 2.Switch 3 guarantees that the data-message of importing is exchanged to output terminal uniquely, and this output terminal is connected with the communication user of preparing by this output terminal reception message.The message that makes communication user want to receive is continuous.For data-message can be output to correct output terminal, data-message is temporarily cushioned to be stored in the switch.
As shown in Figure 1, each communication user 1 all has a network interface unit 11.Network interface unit 11 is to the digital coding that will send with to the data decode that has received.In addition, be operational network, network interface unit 11 also is used for managing the needed control measure of all operational network, and promptly network interface unit 11 is carried out management function and packet formation.
As shown in Figure 1, when using Ethernet as automated system a part of, communication user is exactly control computer and sensor/actuator system in this system, except requirement to real-time capacity, that is because the process signal that captures of sensor, control computer must predetermined process in the time to actuator output procedure signal, even will guarantee that also automated system or vitals break down, also can not threaten to personnel and environment.Therefore, control computer in the automated system not only needs to carry out common control function also will carry out security function, to guarantee that if vitals breaks down in the automated system, it will be transformed into automatically based on the safe condition that is called as failure to safety principle, promptly, for example, in emergency circumstances the machine that connects is turn-offed.
The quantity that operates in the security function of control program in the automated system is usually less than the quantity of non-emergent control function.And when carrying out security function, the essential accurate execution that guarantees data transmission.Must guarantee particularly that during data transmission security-related between automated system two communication users the possibility of damaging the mistake of data in transmission reaches minimum, thereby this damage no longer is identified.
In automated computer, be not subjected to and the irrelevant function effect of security control in order to ensure the functional of security-related control function, an additional safe floor need be provided for the procotol of using on the data transmission link, and it is used for the exchange of the secure data between two communication users in the control automation system.In the automated system, safe transmission for the packet of data on transmission link between two communication users of guaranteeing to have safe floor, the present invention provides a check word for each packet, it is to be come out by other data computation in the packet, and the check word of the last packet that the interface unit 11 of communication user 1 is received the other side's communication user comes packet calculation check word for next transmitting as initial value.
In the present invention, always be used to check word in the preceding message of once receiving as initial value, form dynamic initial value, and utilize check word in this dynamic initial value computational data bag, so just can guarantee can not occur causing in the transmission cycle the identical packet of data damage.Identical packet is dangerous, particularly use when having the Ethernet topological structure of switch, as shown in Figure 1, deposit, and just be sent to address after a period of time because the data-message that exchanges between communication user in this case is cushioned possibly.
In data transmission method according to the present invention, receiving the packet that the communication user of packet can be easily receives by calculating check word and with its with the packet that receives in the check word that comprises compare the check data bag whether correct, in this calculates, adopt check word in the packet that once sends as initial value.This work is preferably finished by the interface unit 11 of communication user 1.If the check word that comprises in the check word that calculates and the packet that receives is consistent, can determine that so this packet that receives is correct.
See also shown in Figure 2ly, be the data flow and the execution graph of data transmission method between two communication users of the present invention.In a data transfer, communication user (being exactly to accuse the system computing machine with regard to automated system) is as the originating end of current transmission.In data transmission of the present invention, the machine that comprises actuator/sensing system in the automated system is held in response.Be illustrated in figure 2 as two message sequences during the exchanges data between originating end and the responder, two message sequences are used to respectively from originating end to the responder transfer data packets, and return packet from the responder to the originating end.Here, packet is made up of useful data area and control data scope, comprises secure data in the useful data area, i.e. the desired process signal of security control; Here the control data scope is made of sequence number (optional) and indispensable check word.
Sequence number indicates when carrying out security procedure, and which message sequence is arranged in the data transmission.The originating end utilization comes the regulation sequence number by its packet that is dealt into responder, and responder is also also beamed back simultaneously sequence number in the packet of beaming back thereupon.Next time in the message sequence, the sequence of data packet that originating end will send number adds one.
And in based on data transmission procedure of the present invention, in fact can save transmission sequence number.This be because, be not have the data transmission of damage for what determine to have taken place, all check the check word of receiving packet at originating end and responder, this is enough.Check word is block protection word CRC (cyclic redundancy check (CRC)) preferably, and it can be used to the mistake that identifies packet highly definitely.Like this, crc value can be gone out by useful data computation, also may be calculated by the sequence number of packet, and utilization of the present invention is that the crc value of a last packet of receiving carries out CRC calculating as initial value.
As shown in Figure 2, just send to regard to the packet of responder from originating end among the message SN i, the crc value of the packet that transmit is to be calculated by the last crc value CRC_Ai-1 that responder is received.Crc value in the sent data packet is CRC_Ai.This crc value is carried out being turned back to again by responder the CRC calculating of the packet of originating end by responder as initial value more then, and the crc value that obtains is CRC_Bi.This crc value is used for calculating for next packet that will be sent to responder carries out CRC as initial value by originating end in next message SN i+1 then.The crc value CRC_Ai+1 CRC that is used as the packet that responder returns once more calculates then, and the crc value that obtains is CRC_Bi+1.Compare by the crc value in the packet that will receive with according to the crc value that calculates of initial value of storage, the received communication user just can set up the correct reception of packet easily.
Next,,, have no progeny when security procedure is restarted or in the communication process and can carry out an initial phase when recovering, see also shown in Fig. 3 A in order to guarantee in the network enabling of security procedure between communication user according to the present invention.Like this, packet as shown in Figure 3A comprises an order data field, and it indicates the meaning of useful data in the packet, and for example, this useful data is identification data or process data.Perhaps, the meaning of the useful data in the packet of the sequence of data packet of execution security procedure also can depend on the order of packet.Give an example, can stipulate that preceding two data item from the originating end to the responder always comprise initialization data, other packet comprises secure data then.Simultaneously, also can only give originating end transmission course data by the prescribed response end.In principle, length of data package can be fixed length or elongated.Except the order data field, packet also can comprise other data fields, for example, and control/mode field, as shown in Figure 3A.
Fig. 3 A shows that also when control program was restarted, originating end is set up secure data communication will carry out initialization, and initialization is to use first message sequence to send to have order data field identification and secure data to allow the packet of sign to responder.Crc value is protected identification data packet as check word, and its initial value is a solid and reliable setting, for example, is the device identifier of responder.Identification data also can be that the address date of outer setting is discerned two communication users or only discerned responder being used for.They also can be the sequence numbers of device identifier and/or originating end or responder.
Responder has been known the initial value that the CRC of transfer data packets first that receives calculates, and this crc value CRC_A1 from the packet of originating end that receives is tested to determine whether to have carried out correct data transmission.Next, responder from taking out the transfer data packets first, carries out crc value CRC_A1 CRC as initial value to the packet that will be sent back to originating end with it and calculates the CRC_B1 that is used for this packet.This packet of beaming back preferably utilizes the identical identifier that comprises in the order data part of identification data packet of originating end transmission as order, to show the packet of this packet for beaming back from first message sequence.For realizing the correct data transmission of originating end, that next wants verification first data sequence is sent back to the packet of originating end from responder, this verification be by the CRC check of the expection that calculates by known initial value CRC_A1 and and with its be included in checksum CRC _ B1 in the packet of receiving and compare and finish.
In second message sequence, originating end also sends an initialization package to responder, and this initialization package comprises the session number as order session and secure data.The crc value CRC_A2 of the second segment data bag is that the crc value CRC_B1 of the packet beamed back by responder calculates.Transmission session number can produce at random, also can produce based on the algorithm of regulation, and it should guarantee that communication link has no progeny in occurring, and not have to continue to be transmitted and to discern at the packet of biography before more.
Responder has known that being used for that originating end sends carry out the initial value CRC_B1 that CRC calculates for this packet, and this responder is tested to the session data bag that receives by the crc value of the expection that calculates according to known initial value, and then the initial value of crc value CRC_A2 as second packet that will send to originating end, alternatively, this packet can be used for transfer of security data.Should second packet of beaming back, the order session (command Session) that the order of use preferably receives from the packet of originating end.
After secure communications links was set up, alternatively, originating end can be handled the necessary security parameter data of responder to the responder transmission.Be depicted as message sequence in the of two as Fig. 3 B, promptly message sequence 3, and it follows at the session data bag and after having the transmission of the message sequence of once carrying out on the supplemental characteristic.
For transmission has the packet of supplemental characteristic, the crc value CRC_B2 that originating end receives the last time as initial value for this first time the transmission parameters packet carry out CRC calculating.This, transmission parameters packet also provided command parameter data and secure data parameter 1 first time.The responder verification is from the crc value CRC_A3 in the packet that receives, and the initial value that this crc value is calculated as the CRC of the responder packet that is dealt into originating end.Adopt this mode just can transmit the security parameter data of any amount to responder.In the example shown in Fig. 3 B, the message sequence that has the security parameter data is transferred to responder from originating end.Alternatively, responder utilizes response data packet transfer of security data always, and the order of using in response data packet is exactly a supplemental characteristic.
After the parameter end of transmission (EOT), originating end begins to carry out the process data transmission, shown in Fig. 3 C.For this reason; this packet has order (process data) and the secure data (process data) that originating end provides; and this packet uses the checksum CRC _ An+3 that is calculated as initial value by crc value CRC_Bn+2 to protect, and CRC_Bn+2 transmits the last supplemental characteristic that once is dealt into originating end from responder responds.Responder utilizes process of transmitting data in the response data packet of CRC check and CRC_Bn+3 protection at it then, and wherein CRC_Bn+3 is that checksum CRC _ An+3 by the originating end transmission calculates as initial value.
As shown in Figure 4, be the another kind of data flow and the execution graph of data transmission method between two communication users according to the present invention.This data flow and execution graph and data flow and execution graph shown in Figure 2 are corresponding in essence.Yet different with Fig. 2 is that packet is used to transmit a connection identifier (CID again simultaneously, and in Fig. 3 A, is transmitted in the initial phase of this packet order data part in identification data packet.Like this, adopt the mode similar to identification data, connection identifier (CID can be the external setting-up address that is used for discerning two communication users or only discerns responder, as shown in Figure 3.Connection identifier (CID also can be the sequence number of device identifier and/or originating end or responder.Transmit reliably that connection identifier (CID can be guaranteed if originating end simultaneously and a plurality of responder carry out the transmission of security-related data, can not cause obscuring of packet even the packet in the different responder by chance comprises identical check word yet.
In addition, in data flow as shown in Figure 4, always include the sequence number of while from the check word calculating of each communication user.But these sequence numbers are transmission simultaneously not, but uses same scheme independently to produce by communication user.Here, sequence number can increase progressively automatically, for example increases progressively automatically after initialization, perhaps takes from the numbering module of hard and fast rule.Transmission sequence number does not mean that length of data package also needn't increase simultaneously.Simultaneously, can select random length, overflow effectively to prevent data by the sequence number that communication user produces.Can guarantee that packet does not change from a message sequence to next message sequence even in the calculating of check word, comprise sequence number, but check word can change still, so just guarantee can not cause unnecessary false alarm.
In the present invention, during data packet transmission, provide check word for packet, and this check word is to utilize the check word of the last packet that the other side's communication user receives to calculate as initial value, the chance that realizes secure data transmission in simple mode reliably so just is provided, and this safe floor in automated system is desired just.Particularly just can use Ethernet protocol as procotol like this, and can use and have the network structure that has switch that is used for cushioning the store data bag, this is to repeat because the present invention can prevent the packet in the security procedure implementation.
According to the present invention, data transmission is also carried out as follows: at first carry out all initial work of identification number transmission and the transmission of session number, any packet that occurs when this can prevent to restart repeats.In addition, data transmission of the present invention can also relate to the transmission of the desired operating parameter of functions of the equipments of responder in the automated system.

Claims (26)

  1. Between two communication users in the method for data transmission link transmitting data bag, packet wherein includes a check word separately, this check word is to be come out by other data computation in this packet, and
    One of them communication user calculates the check word of last time from the packet that the other side's communication user is received the check word of the packet that will send to the other side's communication user as initial value.
  2. 2. method according to claim 1, the correctness of the packet that one of them communication user is received is the check word of the packet that receives by calculating and it is compared and confirm with being included in check word in this packet that receives, will go up the check word of the packet that once sends to the other side's communication user as initial value in calculating.
  3. 3. method according to claim 1 and 2, wherein said packet include the classification of Data data item of identification with data packet transmission.
  4. 4. method according to claim 1 and 2, with the originating end of one of them communication user as data transmission, and when beginning to transmit data between two communication users, this communication user is to identification data packet that comprises identifier of another communication user transmission.
  5. 5. method according to claim 4, wherein the communication user as the data transmission originating end uses the identifier of a fixed value or the other side's communication user to be used as the initial value of the check word of described identification data packet.
  6. 6. method according to claim 4 wherein includes the data item that is used for discerning the other side's communication user as identifier in the identification data packet that sends as the communication user of data transmission originating end.
  7. 7. method according to claim 4, wherein, between two communication users during the beginning of transmission data, with a Session ID or the Session ID that changes according to the regulation algorithm transmits as another data item at random.
  8. 8. method according to claim 7, wherein the communication user as the data transmission originating end transfers to the other side's communication user with the session identifier with the session data bag, and this session data bag is followed after this identification data packet.
  9. 9. method according to claim 4, wherein, transmission data also transmission parameter data when beginning between two communication users.
  10. 10. method according to claim 9 is wherein used at least one supplemental characteristic bag as the communication user of data transmission originating end and is come the transmission parameter data to the other side's communication user, and this supplemental characteristic bag is to follow after identification data packet and session data bag.
  11. 11. method according to claim 4, use therein data transmission link is based on the fieldbus of Ethernet.
  12. 12. method according to claim 1 and 2, sequence number is considered in the calculating of wherein said check word, and this sequence number is used for discerning between two communication users data transmission message sequence separately.
  13. 13. method according to claim 12, wherein said two communication users produce sequence number from the other side respectively message sequence are discerned.
  14. 14. method according to claim 1 and 2 wherein respectively includes a connection identifier (CID in the data packets for transmission between two communication users.
  15. 15. automated system with two communication users (1), described communication user is to connect by a data transmission link (2), and described communication user has an interface unit (11) separately, be used for data transmission link transmitting data bag between these two communication users, described interface unit is designed to be used for forming the packet that has check word, described check word is to be come out by other data computation in this packet, and the initial value that is used for calculating the packet check word that will send to the other side's communication user is the check word of the last packet of receiving from the other side's communication user.
  16. 16. automated system according to claim 15, wherein whether the interface unit (11) of communication user (1) to be designed to be used for the packet that the identification communication user receives correct, its be by calculate check word in the packet that receives and with its with and the check word that is included in the packet of receiving compare, calculating wherein is that the last time is sent to the check word of digital packets of the other side's communication user as initial value.
  17. 17. according to claim 15 or 16 described automated systems, wherein the interface unit (11) of communication user (1) is designed to provide packet, this packet has the classification of Data data item of this data packet transmission of identification.
  18. 18. according to claim 15 or 16 described automated systems, one of them communication user is as the originating end of data transmission, and its interface unit (11) is designed to be used for to produce an identification data packet that comprises identifier, and this identification data wraps in two data transmission between communication user as first packet that is transmitted.
  19. 19. automated system according to claim 18, wherein the interface unit (11) as the communication user of data transmission originating end uses the identifier of a fixed value or the other side's communication user to be used as the initial value of the check word of identification data packet.
  20. 20. automated system according to claim 18 wherein includes the data item that is used for discerning the other side's communication user as identifier in the identification data packet that sends as the communication user of data transmission originating end.
  21. 21. automated system according to claim 18, wherein the interface unit (11) as the communication user of data transmission originating end is designed to be used for produce the session data bag after producing identification data packet, and this session data bag includes Session ID at random.
  22. 22. automated system according to claim 21, the interface unit (11) of wherein said communication user as the data transmission originating end is designed to be used for produce at least one supplemental characteristic bag after producing identification data packet and session data bag, and it includes the supplemental characteristic of the other side's communication user.
  23. 23. according to claim 15 or 16 described automated systems, wherein said data transmission link is based on the fieldbus of Ethernet.
  24. 24. according to claim 15 or 16 described automated systems, the interface unit (11) of wherein said communication user (1) is designed to use a sequence number to discern the message sequence separately of data transmission between two communication users for considering when the calculation check word.
  25. 25. automated system according to claim 24, the interface unit (11) of wherein said communication user (1) are designed to be used for producing the sequence number with the identification message sequence.
  26. 26. according to claim 15 or 16 described automated systems, the interface unit (11) of wherein said communication user (1) is designed to be used to provide the packet with a connection identifier (CID.
CNB2005800195475A 2004-09-16 2005-09-16 Data transfer method and automation system used in said data transfer method Active CN100498607C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE102004044764.0 2004-09-16
DE102004044764A DE102004044764B4 (en) 2004-09-16 2004-09-16 Data transmission method and automation system for using such a data transmission method
DE102005009224.1 2005-03-01

Publications (2)

Publication Number Publication Date
CN1969236A CN1969236A (en) 2007-05-23
CN100498607C true CN100498607C (en) 2009-06-10

Family

ID=36011463

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005800195475A Active CN100498607C (en) 2004-09-16 2005-09-16 Data transfer method and automation system used in said data transfer method

Country Status (2)

Country Link
CN (1) CN100498607C (en)
DE (1) DE102004044764B4 (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102007016917B4 (en) * 2007-04-05 2009-12-17 Phoenix Contact Gmbh & Co. Kg Method and system for the secure transmission of cyclic process data to be transmitted
FR2930392B1 (en) * 2008-04-22 2022-01-28 Trustseed METHOD AND DEVICE FOR SECURING DATA TRANSFERS
DE102008031621A1 (en) 2008-07-07 2010-01-21 Deutsche Bahn Ag Method for secure addressing of local process elements, involves obtaining secure communication by initiating multiple dialogs by central processing unit
CN101841388B (en) * 2009-03-18 2012-07-04 中国科学院沈阳计算技术研究所有限公司 Information security transmission method for numerical control bus
DE102010028485B4 (en) * 2010-05-03 2024-05-29 Robert Bosch Gmbh Method and device for securing data packets to be transmitted via an interface
CN102340368B (en) * 2010-07-19 2014-07-02 中兴通讯股份有限公司 Method, system and device for monitoring error codes in CPRI (Common Public Radio Interface) link
KR20180039102A (en) * 2015-08-25 2018-04-17 후아웨이 테크놀러지 컴퍼니 리미티드 Method of transmitting data packets, apparatuses, systems, and node devices
DE102016121019A1 (en) 2016-11-03 2018-05-03 Beckhoff Automation Gmbh Method for transmitting data packets on a data transmission link between two communication participants, automation system and computer program

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5251215A (en) * 1992-01-13 1993-10-05 At&T Bell Laboratories Modifying check codes in data packet transmission
DE19736434C3 (en) * 1997-08-21 2002-08-22 Nokia Mobile Phones Ltd Methods and devices for recognizing the position of data packets lying in a serial data reception stream
TW436671B (en) * 1998-03-25 2001-05-28 Siemens Ag Automation system
US6609226B1 (en) * 2000-04-10 2003-08-19 Nortel Networks Limited Networking device and method for making cyclic redundancy check (CRC) immune to scrambler error duplication

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
CAN总线中循环冗余校验码的原理及其电路实现. 李书瑞,李明,石龙海.电子技术应用,第2003年第10期. 2003
CAN总线中循环冗余校验码的原理及其电路实现. 李书瑞,李明,石龙海.电子技术应用,第2003年第10期. 2003 *
循环冗余校验方法研究. 王彩荣,李晓毅,黄玉基.微处理机,第2002年第2期. 2002
循环冗余校验方法研究. 王彩荣,李晓毅,黄玉基.微处理机,第2002年第2期. 2002 *

Also Published As

Publication number Publication date
DE102004044764B4 (en) 2009-01-08
CN1969236A (en) 2007-05-23
DE102004044764A1 (en) 2006-03-30

Similar Documents

Publication Publication Date Title
CN100498607C (en) Data transfer method and automation system used in said data transfer method
US7697538B2 (en) Data transfer method and automation system used in said data transfer method
US7020711B2 (en) Method for adjusting the data transmission rate in a fieldbus system
CN101707954B (en) Communication method and device for efficient and secure transmission of tt Ethernet messages
US8180940B2 (en) Method and system for transmission of cyclic and acyclic data over a transmission channel that takes into account real-time capability
US10193705B2 (en) Method, communication network, and control unit for the cyclical transmission of data
RU2665890C2 (en) Data management and transmission system, gateway module, input/output module and process control method
US8335573B2 (en) Safety-oriented control system
CN101167341A (en) Address assignment for safe users of a field bus
KR20150100790A (en) Data transmission using a protocol exception state
JP6121563B2 (en) Data transmission protocol using protocol exception state
EP2889772B1 (en) Serial link fault detection system and method
CN105900360B (en) For monitoring the method and monitoring system of the first node in communication network
US11758024B2 (en) Distributor node, automation network and method for transmitting telegrams
US7076715B2 (en) Safety network using phantom address information
CA2277560A1 (en) Method of determining a uniform global view of the system status of a distributed computer network
US11927950B2 (en) System and method of communicating safety data over high availability industrial control systems
CN102598593A (en) Addressing method and communication network with such an addressing method
JP2019097088A (en) Serial communication system
JP3850841B2 (en) Method and apparatus for monitoring safe transmission of data packet
JP4247791B2 (en) Ensuring maximum reaction time for complex or distributed safety and / or non-safety systems
US11258637B2 (en) Method for operating TSN-enabled network coupling elements
Elia et al. Analysis of Ethernet-based safe automation networks according to IEC 61508
CN202856779U (en) Network equipment used for automation network, safe module and automation network
JP3777809B2 (en) Method for detecting line abnormality in duplex communication system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant