您好,欢迎光临本网站![请登录][注册会员]  
文件名称: SEMI E5.pdf
  所属分类: 制造
  开发工具:
  文件大小: 1mb
  下载次数: 0
  上传时间: 2019-07-27
  提 供 者: lwc***
 详细说明:SEIM E4 E5 半导体数据采集资料 通讯协议资料 设备联网 智能制造基础资料sem‖" I The seMi equipment Communications Standard Part 2(SECS-In defines the details of the interpretation of messages exchanged between intelligent equipment and a host. This specificalion has been developed in cooperation with the Japan Electronic Industry Development Association Committee 12 on Equipment Communications the message trans fer protocol requirements are contained in po E v 1. 1. 1 It is the intent of this standard to be fully compatible with SEMI E4- Equipment Communications Standard (SECS-I). It is also the intent to allow for compatibility with alt rnative message transfer protocols. The details of 1. 1. 2 It is the intent of this standard to define messages to such a level of detail that some consistent host software may be constructed with only minimal knowledge of individual equipment. The equipment, in turn, may b constructed with only minimal knowledge of the host 1.1.3 The messages defined in the standard support the most typical activities required for IC manufacturing. The standard also provides for the definition of equipment-specific messages to support those activities not covered by the standard messages. While certain activities can be handled by common software in the host, it is expected that equipment-specific host software may be required to support the full capabilities of the equipment 2. 1 SECS-II gives form and meaning to messages exchanged between equipment and host using a message transfer protocol, such as SECS-T 2.1.1 SECS-iI defines the method of conveying information between equipment and host in the form of messages These messages are organized into categories of activities, called streams, which contain specific messages, called functions. A request for information and the corresponding data transmission is an example of such an activity 2.1.2 SECS-il defines the structure of messages into entities called items and lists of items. This structure allows for a self-describing data format to guarantee proper interpretation of the message 2. 1. 3 The interchange of messages is governed by a set of rules for handling messages called the transaction protocol. The transaction protocol places some minimum requirements on any SECS-ll implementation This standard does not purport to address safety issues, if any, associated with its use. It is the responsibility of the users of this standard to establish appropriate safety and health practices and determine the applicability of regulatory or other limitations prior to use I SECS-II applies to equipment and hosts used in the manufacturing of semiconductor devices. Examples of the activities supported by the standard are: transfer of control programs, material movement information, measurement data summarized test data, and alarms 3. 1. 1 The minimum compliance to this standard involves meeting the few constraints outlined in$ 8. It is expected that a given piece of equipment will require only a subset of the functions described in this standard. The number of functions and the selection of functions will depend upon the equipment capabilities and requirements. For each piece of equipment, the exact format for each function provided must be documented according to the form outlined n§10. 3. 1.2 It is assumed that the equipment will define the messages used in a particular implementation of sECs-I. It is assumed the host will support equipment implementation 4.1 SEMI E4- SEMI Equipment Communications Standard 1 Message Transfer(SECS-I) SEMI E6 uide for Semiconductor equipment Installation Documentation SEMI E148- Specification for Time Sychronization and Definition of the TS-Clock Object sem‖" 4.2 ANSI X3.4-1977-Code for Information Interchange(ASCID 4.3 ieEE 754- Standard for binary Floating Point Arithmetic 4. 4 The Japan Electronic Industry Development Association (JEIDA) has requested that the sECs-ll standard incorporate support for the Jis-8 codes for data exchange. This code would allow support for katakana characters in Japanese implementations of SECS-II JIS-6226-JIS 8-bit Coded Character Set for Information Interchange, Japanese Industrial Standards. 3 Unless otherwise indicated, all documents cited shall be the latest published versions 5.1.1 The following brief definitions refer to sections providing further information 5.1.2 -a physical division of a message used by the message transfer protocol(see 86.3) 5.1.3 a sequence of related messages(see884 5.1.4 an indication that a conversation has not completed properly(see$8.4.1) a number between 0 and 32767 used in identifying the particular piece of equipment communicating with a host(see$6.4.1) 5.1.6 the intelligent system which communicates with a host. 5.1.7 a specific message for a specific activity within a stream(see 87.2) 5.1.8 the intelligent system which communicates with the equipment 5.1.9 -the system that interprets a primary message and generates a reply when requested(see$ 6.2) 5.1.10 -a data element within a message(see$9.2) 5.1.11 a code used to identify the data type of an item(see$9.2) 5.1.12 a group of items(see$9.3 5.1.13 -a complete unit of communication(see 86.2) 5.1.14 information about the message passed by the message transfer protocol (see$ 6. 4) 5.1.15 a message sent in more than one block by the message transfer protocol(see $ 6.3.2) - the creator of a primary message(see $6.2) 5.1.17 -a physical division of a message used by the message transfer protocol (see $ 6.3) 5.1.18 an odd numbered message. A lso, the first message of a transaction(see $6.2 and 7.2) the particular secondary message corresponding to a primary message(see 86.2 and$ 7.2 5.1.20 an even-numbered message. Also the second message of a transaction(see$ 6.2 and §7.2) American National Standards Institute, Headquarters: 1819 1, Street, NW, Washington, DC 20036, USA. Telephone: 202.293.8020; Fax 202 293 9287, New York Office: 1 1 West 42nd Street, New York, NY 10036. USA. Telephone: 212.. 4900: Fax: 212.398.0023 httpi/www.ansl.org 2 Institule of Electrical and Electronics Engineers, IEEE Operalions Center, 445 Hoes Lane, P.O. Box 1331, Piscataway, New Jersey 08855 1331,usa.Telephone:732.981.0060;Fax:732.981.1721;http:/www.icee.org 3 Japanese Industrial Standards. Available through the Japanese Standards Associalion, 1-24, Akasaka 4-Choine, Minato-ku, Tokyo 107-8440 Japan.Telephone:81.3.3583.8005;Fax:81.3.3586.2014:http:/www.jsa.or.ip sem‖" 5.1.21 -a message sent in one block by the message transfer protocol(see $6.3.1) 5.1.22 a category of messages(see$7.1) 5.1.23 a primary message and its associated secondary message, if any(see 88.2) 5.1.24 an indication from the message transfer protocol that a transaction has not completed properly (see $6.5) 6.1 SECS-II is fully compatible with the message transfer protocol defined by secs-I. It is the intent of this standard to allow for compatibility with alternative message transfer protocols. The purpose of this section is to define the requirements of the interaction between an application using SECS-II and the message transfer protocol The methods used to implement these requirements are not covered as a part of this standard. The terms used in this standard are those used by SECs-I. Equivalent terms may be different for other message transfer protocols The message transfer protocol is used to send messages between equipment and host The message transfer protocol must be capable of sending a primary message, indicating whether a reply is requested; and, if a reply is requested, it must be capable of associating the corresponding secondary message or reply message with the original primary message. The term originator will refer to the creator of the original primary message. The term interpreter will refer to the entity that interprets the primary message at its destination and generates a reply when requested The message transfer protocol must support the follow ing SECS-II message blocking requirements. 6.3.1 SECS-II requires that certain messages be sent in a single block or single packet by the message transfer protocol. Those messages defined in this standard as single-block SECS-II messages must be sent in a single- block or packet. The method used by the application software to tell the message transfer protocol that a particular message must be sent as a single block is not covered as part of this standard. For compatibility with SECS-I, the maximum length allowed for a single-block SECS-II message is 244 bytes. The minimum requirement for the message transfer protocol is to be able to send single-block SECS-lI messages 6.3.2 For compatibility with SECS-I, SECS-II messages that are longer than 244 bytes are referred to as multi-block messages. Also, certain SECS-II messages are allowed to be multi-block messages even if they otherwise meet the single-block length requirements. Certain older implementations may impose application- specific requirements on block sizes for certain incoming messages. beginning with the 1988 revision of the standard, new applications may not impose application-specific requirements on incoming block sizes. Applications implemented before 1988 may impose such requirements 6.4 The message transfer protocol must provide the following information called the message header, with every message. Only the content of the message header is defined by this standard. The exact format of the message header passed between the application and the message transfer protocol is not covered as part of this standard NOTE 1: In SECS-I, this information is contained in the 10 byte header of each block of a message 6.4. The message transfer protocol must be capable of identifying the device id(0-32767) which indicates the source or destination of a message 6.4.2 The message transfer protocol must be capable of identifying to SECS-II a minimum15 bit message identification code. In SECS-II, messages are identified by a stream code(0-127, 7 bits) and a function code(0-255, 8 bits). Each combination of stream and function represents a distinct message dentification 64.3 The message transfer protocol must be capable of identifying whether a reply is requested to a primary message 6.5 It is presumed that the message transfer protocol will notify SECs-ll in the event of failure to receive an expected reply message within a specified transaction timeout period NOTE 2: In SECS-L, a transaction timeout occurs if either the reply timeout (t3)is exceeded before the first block of a reply message is received or if the interblock timeout (T4)is exceeded before an expected block of a multi-block message is received sem‖" 6.6 This standard allows, but does not require, the support of more than one concurrent open transaction 7.1 -A stream is a category of messages intended to support similar or related activities a function is a specific message for a specific activity within a stream. all the functions used in SECS-II will follow a numbering convention corresponding to primary and secondary message pairs. All primary messages will be given an odd-numbered function code. The reply message function code is delermined by adding one to the primary message function code. The even-numbered function following a primary message which requests no reply is reserved and is not to be used. Function code 0 is reserved in all streams for aborting transactions as described in$ 10.4 7.3 Some of the stream and function code combinations are reserved for this standard. while others are available for user definition the stream and function codes reserved for this standard are as follows In stream 0. functions 0-255 In streams 1-63. functions 0-63 In Streams 64-127 Function O 7.3.1 The stream and function codes available for user definition are as follows In Streams 1 63. Functions 64 255 In Streams 64127 Functions 1-255 7.3.2 The stream and function code assignment can also be represented by the diagram shown in Figure 1 7.3.3 The reserved codes assigned by this standard are listed in810. It is recognized that there will be user needs definition should be used subject to the guidelines for minimum compliance outlined n e nctions reserved for user beyond the specific definitions given in this standard. In these situations, the streams and fu sem‖" 8.1 For an implementation to be in compliance with secs-il. it must meet the minimum transaction requirements outlined in this section. The conversation protocols serve to further define the use and interaction between transactions A transaction forms the basis for all information exchanges in SECS-I. a transaction consists of either a primary message for which no reply is requested, or a primary message which requests a reply together with its corresponding secondary message. Secondary messages cannot request a reply 8.3 The following are the requirements to comply with the SECS-ll protocol at the transaction level 1. Respond to Sl, Fl with S1, F2 as described in8 10.5 Stream 9. As described in S 10.13, S9, F1, F3, F5, F7, or F1l are posse Send the appropriate error message on 2. For any received Imessage that cannot be processed by the equipment, 3. Format any other supported messages according to$ 10 4. Upon detection of a transaction timeout at the equipment, send $9F9 to the host 5. Upon receipt of function 0 as a reply to a primary message, terminate the related transaction. No error message should be sent to the host by the equipment 8.4 A conversation is a series of one or more related transactions used to complete a specific task. A conversation should include all transactions necessary to accomplish the task and leave both the originator and interpreter free of resource commitments at its conclusion 8.4.1 A conversation timeout is used to indicate that a conversation has not completed properly. A conversation timeout is application-dependent, and the methods used for detecting conversation timeouts are not covered as part of this standard. a conversation timeout will terminate further action on the conversation, and will allow for the clearing of any committed resources. Upon detection of a conversation timeout It the equipment, S9, F13 should be sent to the host 84.2 There are seven types of conversations which characterize all information exchanges in SECS-II 1. A primary message with no reply is the simplest conversation. This message must be a single-block SECS-II message. The originator must assume that the interpreter responds to the message This conversation is used where the originator can do nothing if the message is rejected 2. If the interpreter has data that the originator wants, the data are requested with a primary message and the data returned to the originator as a reply message. It is assumed that the originator requesting the data is prepared to receive the amount of data returned this is the request/ data conversation 3. If the originator wishes to send data in a single-block SECS-II message to the interpreter, then the originator sends the data and expects an acknow ledgment from the interpreter this is the send/acknowledge conversation 4. If the originator has a multi-block SECS-II message to send for a particular exchange, then the originator must receive permission from the interpreter prior to sending the data. The first transaction requests permission to send, and the interpreter either grants or denies permission. If permission is granted, the originator sends the data and the interpreter replies appropriately. This is the inquire/grant/send/acknowledge conversation. Between the inquire and the send, the interpreter may commit some resources in preparation for the data. Consequently, a conversation timeout may be set by the interpreter at a time dependent upon the application, at which time the interpreter will free its resources and send an $ 9, F13 error message to the originator note that under the definition of $9, F13 in this standard, only the equipment should generate an error message to the host under these conditions 5. There is a conversation related to the transfer of unformatted data sets between equipment and host. This conversation is described in detail in Stream 13(see$ 10.17 6. There is a conversation related to the handling of material between equipment. This conversation is described in detail in Stream 4(see$ 10.8) 7. The originator may request information from the interpreter which requires some time to obtain(e. g, operator input is required). The first transaction requests the information and the interpreter responds in one of three sem‖" ways:()the information is returned,(2) the interpreter indicates that the information cannot or will not be obtained, or(3)the interpreter indicates that the information will be obtained and returned in a subsequent transaction, as specified for this conversation. For case number 3, the interpreter will initiate the subsequent transaction when the information is available 8.4.2. 1 Case 3 is the request/acknow ledge/ send/acknowledge transaction 8.4.2.2 The originator of the request/acknowledge/send/acknowledge conversation may commit some resources in anticipation of the send/acknowledge transaction. Consequently, a conversation timeout may be set by the originator at a time dependent on the application On timeout, the originator will free its resources and restart the conversation with the request, or send an $9, F13 error message. Note that under the definition of s9, F13 in this standard, only the equipment should generate an error message to the host under these conditions 8.4.3 The key words, request, data, send, acknowledge, inquire, and grant are used in the function names as an aid to understanding the relationship between the messages and the conversation Single message transactions do not use these words 9.1 All information transmitted according to this standard will be formatted using two data structures, items and lists. These data structures define the logical divisions of the message, as distinct from the physical divisions of the message transfer protocol. They are intended to provide a self-describing internal structure to messages passed between equipment and host An item is an information packet which has a length and format defined by the first 2, 3, or 4 bytes of the item. These first bytes are called the item header (IH). The item header consists of the format byte and the length byte(s) as shown in Figure 2. Bits one and two of the item header tell how many of the following bytes refer to the length of the item. This feature allows for long items without requiring the byte overhead for shorter items. The item length refers to the number of bytes following the item header, called the item body (IB), which is the actual data of the item. The item length refers only to the item body not including the item header, so the actual number of bytes in the message for one item is the item length plus 2, 3, or 4 bytes for the item header. All bytes in the item body are in the format specified in the format byte 9. 2. 1 A zero-length in the format byte is illegal and produces an error. a zero-length in the item length bytes has a special meaning as delined in the detailed message definitions 9.2.2 Bits 3-8 of the format byte of the item header define the format of the data which follows. Of the 64 possible Formats, 16 are defined as shown in Table 1. Format code o is called a list and is defined in$9.3. Format code 22 (octal) is called a localized string and is defined in$9. 4. The remaining 14 item formats define unspecified binary code 10 (octal); Boolean, code ll(octal); ASCll character strings, code 20(octal); JIS-8 character strings, code 2 octal) signed integer, codes 30, 31, 32, 34(octal); floating point, codes 40, 44(octal); and unsigned integer, codes 50, 51, 52, 54(octal). These formats are used for groups of data which have the same representation in order to save sem‖" repeated item headers In signed integers, negative values will be twos complement values. Floating point numbers will conform to the ieeE standard 754. Boolean values will be byte quantities, with zero being equivalent to false and non-zero being equivalent to true A list is an ordered set of elements, where an element can be either an item($9.2 )or a list. The list header(lh) has the same form as an item header with format type 0. However, the length bytes refer to the number of elements in the list rather than to the number of bytes. The list structure allows grouping items of related information which may have different formats into a useful structure 9.3. 1 A zero-length in the format byte is illegal and produces an error. A zero-length in the list length bytes has a special meaning, which is defined in the detailed message definitions 000000 LIST (length in clements) 001000 10 Binary 001001 Boolean 010000 20 ASCII O1000l JIS-8 010010 22 2 byte character 2, #4 011000 8 byte integer(signed) 0l1001 I byte integer(signed) 0l1010 2 byte integer(signed) 0l1100 34 4 byte integer(signed) 100000 40 8 byte floating point 100100 4 byte floating poim'3 101000 50 8 byte integer(unsigned 101001 I byte integer(unsigned) 101010 2 byte integer(unsigned)2 101100 4 byte integer(unsigned) #1 Non-printing characters are equipment-specific #2 Most significant b #3 IEEE 754. The byte containing the sign bit is sent first #4 The code for multi-byte character must be specified in the data in the first 2 bytes of the teXt item #5 Changes in integer format codes may conflict with earlier implementations A localized character string is an ilen which is used for representing a string of multi-byte characters. Because there are many different encoding schemes and the information could be in any one of a number of languages, these characteristics must also be included in the item. Thus for localized character strings which use item format code 22(octal), there is an additional localized string header (lsh) 9.4.1 This localized string header follows the item header and precedes the string. The localized string header is part of the item data, thus the length of the header(2 bytes) is included in the length in the item header The length of the localized string itself is the number of bytes that it occupies, regardless of the number of characters that represents the string. The localized string header followed by the string together comprise the localized string item. For example, a 2 byte localized string (which may represent a single character), because of the 2 byte length of the localized string header, will have a 4 byte length in the item header sem‖" 9.4.2 The LSH is a 16 bit number which specifies the encoding method used for the string. Defined values for the coding are as none reserved 11010646cs2 Unicode 2.0 UTF-8 Transformation of Iso 10646UCS-2 ISO646-1991 ASCIL. 7-bit ISO8859-1 ISo Latin-1. Western ISo 8859-11(proposed) Thai TIS 620 Thai(will be supported by ISO8859-11) Is13194(19) ISCII Shift jis apanese EUC-JP 10 Korean EUC-KR Simplified Chinese GB 12 Simplified Chinese euc-CN Traditional Chinese Big5 14 Traditional Chinese EUC-TV 9.4.3 Encoding Codes from 15-32767 are reserved for future expansion. Encoding codes from 32768-65535 are available for custom purposes The data structures for different types of items are illustrated in the following examples An item contains one binary code 10101010 87654321 00100001 Item binary, 1 length byte 1 byte long 10101010 data byte An item contains three ascii characters abc 01000001 Item ASCII, 1 length byte 00000011 Three bytes long 01000001 ASCII A 01000010 AsCI工B 01000011 AsC工工c An item contains three binary numbers in 2-byte signed integer form C1101001 Item 2-byte integers C000110 6 bytes total (6/2=3 integers) MSByte number x XXXXXXXX LSByte number x yyyYYYYY MSByte number y YYYYYYY¥ LSByte number y ZZZZZZZZ MSByte number z ZZZZZZZZ LSByte number z
(系统自动生成,下载前可以参看下载内容)

下载文件列表

相关说明

  • 本站资源为会员上传分享交流与学习,如有侵犯您的权益,请联系我们删除.
  • 本站是交换下载平台,提供交流渠道,下载内容来自于网络,除下载问题外,其它问题请自行百度
  • 本站已设置防盗链,请勿用迅雷、QQ旋风等多线程下载软件下载资源,下载后用WinRAR最新版进行解压.
  • 如果您发现内容无法下载,请稍后再次尝试;或者到消费记录里找到下载记录反馈给我们.
  • 下载后发现下载的内容跟说明不相乎,请到消费记录里找到下载记录反馈给我们,经确认后退回积分.
  • 如下载前有疑问,可以通过点击"提供者"的名字,查看对方的联系方式,联系对方咨询.
 相关搜索: SEMIE5.pdf
 输入关键字,在本站1000多万海量源码库中尽情搜索: