Guide To Understanding SECS

User Manual:

Open the PDF directly: View PDF PDF.
Page Count: 28

DownloadGuide To Understanding SECS
Open PDF In BrowserView PDF
A Guide
to
Understanding
GEM - SECS - HSMS

March 24, 2004
Version 1.1

 Copyright Edge Integration 2004

Table of contents

Introduction........................................................................................................................ 3
Overview ............................................................................................................................. 3
SECS ................................................................................................................................... 3
SECS-II Message Protocol ....................................................................................... 4
Streams and Functions ................................................................................................ 4
Message Layout .......................................................................................................... 5
Data Items ................................................................................................................... 7
Layout Encoding ......................................................................................................... 7
Common SECS-II Messages ...................................................................................... 11
SECS-I
Block Transfer Protocol ......................................................................... 12
Handshake Sequence ................................................................................................ 12
Block Data ................................................................................................................ 14
Example of S1F1 / S1F2 .............................................................................................. 17
Typical SECS Protocol Parameters .......................................................................... 18
RS-232

Physical Link ........................................................................................... 19

Protocol Troubleshooting ........................................................................................... 20
T2 Timeout................................................................................................................ 20
T3 Timeout................................................................................................................ 20
Function 0 ................................................................................................................. 21
Stream 9’s ................................................................................................................. 21
Establishing Communications .................................................................................. 22
HSMS ............................................................................................................................... 23
HSMS Procedures ....................................................................................................... 23
Select ......................................................................................................................... 23
Deselect ..................................................................................................................... 24
Link Test ................................................................................................................... 24
Data ........................................................................................................................... 24
HSMS Message Format .............................................................................................. 25
Typical HSMS Protocol Parameters ......................................................................... 26
GEM ................................................................................................................................. 27
What’s it all about....................................................................................................... 27
GEM Compliance........................................................................................................ 27

 Copyright Edge Integration 2004

A Guide to Understanding GEM – SECS – HSMS

Page 3

Introduction
The intent of this guide is to help simplify some of the principles around interfacing with
semiconductor equipment and their communications standards. This is not intended to be a
substitute for the Standards themselves since this guide does not cover all details o
f the Standards . It only serves as general overview to aid in the support of applications
that use or deal with such interfaces.
The information presented in this guide is believed to be correct and accurate. Please send all
comments and questions to john@edgeintegration.com
The information presented within this guide may be used to your benefit, and may be
reproduced and distributed freely providing the copyright notice remains intact. No further
permissions are required.

Overview
This guide discusses some of the SEMI Standards that cover the interfacing to semiconductor
equipment. The reader should have as a minimum, a technical background and some knowledge
about semiconductor fabs and computer science.

SECS
This is a discussion of SECS (Semiconductor Equipment Communication Standard). SECS is
part of the SEMI Standards, E4 and E5, Equipment Automation /Software Volume. It was
developed in 1980 by Hewlett Packard. SECS is a point-to-point protocol via RS-232.
SECS is a layered protocol consisting of 3 levels: Message Protocol, Block Transfer Protocol, and the Physical
Link.
SECS-II Message Protocol
SECS-I

Block Transfer Protocol

RS-232

Physical Link

 Copyright Edge Integration 2004

A Guide to Understanding GEM – SECS – HSMS

SECS-II

Page 4

Message Protocol
SECS-II Message Protocol
SECS-I

Block Transfer Protocol

RS-232

Physical Link

The Message Protocol is used to send SECS-II messages between the Host and Equipment. Each
SECS-II message contains a primary message and an optional secondary reply message. This is
also referred to as a transaction.
HOST

EQUIPMENT

Primary

Secondary

Primary – Is a SECS-II message initially sent by either the Host or Equipment.
Secondary – Is an optional SECS-II message send in response to a primary message.

Streams and Functions
SECS-II messages are referred to as Streams and Functions. Each message has a Stream value
(Sx) and a Function value (Fy). In the case of a Stream 1 Function 1, it is written as S1F1, and
spoken as “S1F1”. Streams are categories of messages while Functions are specific messages
within the category. The function value is always an odd number in a primary message, and one
greater, or even, in the associated secondary reply.

 Copyright Edge Integration 2004

A Guide to Understanding GEM – SECS – HSMS

HOST

Page 5

EQUIPMENT

S1F1 (primary odd)

S1F2 (secondary even)

Stream
1
2
3
4
5
6
7
8
9
10
11
12
13

Catagory
Equipment Status
Equipment Control
Material Status
Material Control
Alarm Handling
Data Collection
Recipe Management
Control Program Transfer
System Errors
Terminal Services
(Not Used)
Wafer Mapping
Unformatted Data
Set Transfers

Some Streams and Functions are reserved while others are user defined.
Stream
Function Availability
0
0 to 255 Reserved
1 to 63
0 to 63 Reserved
64 to 127
0
Reserved
1 to 63 64 to 255 User defined
64 to 127 1 to 255 User defined
All function 0’s have a special meaning. They are sent as a reply to an aborted primary
message.

Message Layout
A SECS-II message contains a structure or layout. The layout defines the all data items
for the SECS-II message. The layout is that part of the message which follows the
Stream and Function notation.
Stream and Function
S2F41


>.

message layout

 Copyright Edge Integration 2004

A Guide to Understanding GEM – SECS – HSMS

Page 6

Message Annotation
Providers of SECS interfaces typically provide an interface manual. This manual details
the applicable SECS messages and their layouts. It may also include a Data Item Dictionary
that defines the message items.
SECS-II messages can be annotated using several conventions. Two of the more
common conventions are show below:
SEMI Standard
S1,F1 Are You There Request
Description: ….
Structure: Header only

S,H<->E,reply

S1,F2 On Line Data
Description: …
Structure:
L,2
1. 
2. 

S,H<->E

S – single block
M – multi block

Defined in the Data Item Dictionary

SML (SECS Message Language) Format
S1F1 – Are You There
S1F1 W.

Message direction
H - Host
E - Equipment

H<->E

S1F2 – On-line Data
S1F2
H<-E


>.

Defined in the Data Item Dictionary

 Copyright Edge Integration 2004

A Guide to Understanding GEM – SECS – HSMS

Page 7

Data Items
From above, SECS-II message layouts contain data items. Data items are defined by format
codes. All possible data items, along with their format codes, are listed in the following table.
The format code is defined by 6 bits only. This will become clearer later.
Note that the List data item is a data item used for grouping more data items. And Lists can
contain Lists.

Data Item Type
List
Binary
Boolean
ASCII
JIS-8
8-byte integer (signed)
1-byte integer (signed)
2-byte integer (signed)
4-byte integer (signed)
8-byte floating point
4-byte floating point
8-byte integer (unsigned)
2-byte integer (unsigned)
2-byte integer (unsigned)
4-byte integer (unsigned)

Format Code
000000
001000
001001
010000
010001
011000
011001
011010
011100
100000
100100
101000
101001
101010
101100

Layout Encoding
Before a SECS-II message can be sent, the layout must be encoded. Each data item in the
message layout is encoded and becomes part of the Data Structure. This is repeated until all the data
items in the layout are encoded. The Data Structure is subsequently sent via the SECS-I protocol.
Encoded Data Item 1 Encoded Data Item 2 Encoded Data Item 3 …

Encoded Data Item N

Data Structure

 Copyright Edge Integration 2004

A Guide to Understanding GEM – SECS – HSMS

Page 8

A data item is encoded as follows:
The first byte of the Encoded Data Item contains the data item’s format code and also defines
how many of the following bytes define the length of the data item. The format code is
contained within bits 2 to 7, and the number of length bytes is defined in bits 0 to 1.
Therefore, the number of length bytes to follow ranges from 0 to 3 bytes.
Byte 1
Bits - 7 6 5 4 3 2
Data Item Type

Bits - 1 0
Number of length bytes

The next 0, 1, 2, or 3 bytes define the length of the data. So for example, if the size of
the data is 1000 bytes, then 2 length bytes would be needed to represent 1000 (03 E8 Hex
or 00000011 11100100 Binary)
The following table shows the max number of data bytes that can be represented by the
number of length bytes.
Number of
length bytes
0
1
2
3

Max data size
Empty item
256 bytes
64 Kbytes
7.99 Mbytes

The next n bytes contain the data for the data item.

0, 1, 2, or 3 Bytes

Encoded Data Item

Byte 1

Data Item Type
(Bits 2 to 7)

Length Byte(s)

N Data bytes …

Number of length bytes
(Bits 0 and 1)

 Copyright Edge Integration 2004

A Guide to Understanding GEM – SECS – HSMS

Page 9

The following shows how an ASCII data item can be encoded. Depending upon how
many data bytes it contains, it may require zero, one, two, or three length bytes to
represent the total number of data bytes.
Format code

Number of length bytes

41 (01000001)

1 Byte

42 (01000010)

2 Bytes

43 (01000011)

3 Bytes

ASCII data

ASCII data (up to 256 bytes)

ASCII data (up to 64K bytes)

ASCII data (up to 7.99 Mbytes)

The following shows how an example SECS-II message layout is encoded. Note that
only the message layout is encoded, the stream and function are not encoded in this
example. All numeric values are in Hex, (ex: 52 = 01010010).
S2F41


>.

01

02

41

05

01 - Item is type List
(with one length byte)
02 - List has 2 elements

53

54

41

52

54

41 – Item is type ASCII
(with one length byte)
05 – Item is 5 bytes (chars) long
53 54 41 52 54 – Spell “START”



>.



>.

01

00

01 – Item is type List
(one length byte)
00 – List has 0 elements


>.

Multi-Block Messages
Due to the data size limitations in the SECS-I protocol, the encoded SECS-II message
(Data Structure) may not fit into one SECS-I transaction. Therefore the encoded SECS-II
message is divided into smaller blocks, and sent one block at a time. This is referred to
as multi-block messaging.

 Copyright Edge Integration 2004

A Guide to Understanding GEM – SECS – HSMS

Page 10

Each SECS-I message block is limited to 244 of encoded SECS-II messages bytes. The
maximum number of message bocks is 32,767, so the maximum SECS-II encoded
message size is 244 x 32,767 bytes long.
SECS-II Parameters - Are used to define some of the bounds while implementing the
Message Protocol. The following table shows the SECS-II parameters:
SECS-II Parameters
T3
T4

Reply Timeout
Inter-Block Timeout

T3 – This is the time period between sending a primary SECS-II message and receiving
the secondary reply.
T4 – This is the time period between receiving subsequent blocks in a multi-block
message.

HOST

EQUIPMENT

Primary (block 1)

Primary (block 2)

T4

T3
T4
Primary (block 3)

Secondary

Interleaving Messages
This is when more than one transaction is being handled at a time. A transaction is the
sending of a primary message and the optional receiving a secondary reply. A
transaction is “opened” when it is waiting for its reply. Interleaving is the ability to have
more than one “opened” transaction. This allows for the sending of multiple primary
messages without first waiting for the secondary reply. Supporting this feature is not a
requirement of SECS-II.

 Copyright Edge Integration 2004

A Guide to Understanding GEM – SECS – HSMS

Page 11

Common SECS-II Messages
Here we list the more commonly used SECS-II messages.
The first set of messages are typically used at initialization when first connecting to the
equipment.
SECS-II
S1F1
S1F13
S2F15
S2F43
S2F33
S2F35
S2F37
S5F3

Description
Say hello to the equipment
Establish communications with the equipment
Set equipment constants
Turn off spooling
Create / Delete reports
Link reports to events
Enable / Disable events
Enable / Disable alarms

These message(s) are used for recipe selection, remote start, wafer selection etc
SECS-II Description
S2F41 Remote equipment control
These message(s) are used for data collection.

SECS-II
S6F3
S6F9
S6F11

Description
Older version of Event Reports
Older version of Event Reports
Event Reports

The S5F1 is used to handle equipment alarms.
And S9’s are sent by the equipment when it detects a previous message error.

 Copyright Edge Integration 2004

A Guide to Understanding GEM – SECS – HSMS

SECS-I

Page 12

Block Transfer Protocol
SECS-II Message Protocol
SECS-I

Block Transfer Protocol

RS-232

Physical Link

The Block Transfer Protocol is used to establish the direction of communication and provide and
environment for passing message blocks. A primary or reply message may require multiple
Block Transfers (multi-block message.)

Handshake Sequence
The handshake sequence is the exchange of bytes between the Host and Equipment.
Handshake Codes – There are four handshake codes. These are used to control data
flow in the block transfer protocol. The following table shows the handshake codes:
Handshake Codes Hex Value
ENQ
05
Ready to Send
EOT
04
Ready to Receive
ACK
06
Correct Reception
NAK
15
Incorrect Reception
SECS-I Parameters – Are used to define some of the bounds while implementing the
block transfer protocol. The following table shows the SECS-I parameters:
SECS-I Parameters
T1
Inter-Character Timeout
T2
Protocol Timeout
RTY
Retry Limit
Master/Slave
Resolve contention
T1 – Is the time between receiving each character (after receiving the first character) in
the BLOCK DATA
T2 – Is the time between sending the ENQ and receiving the EOT

The following diagram shows the handshake codes during the bock transfer protocol. It
also shows the T1 and T2 timeouts and a possible NAK:

HOST
(SLAVE)

EQUIPMENT
(MASTER)

ENQ
T2

 Copyright Edge Integration 2004
EOT

A Guide to Understanding GEM – SECS – HSMS

Page 13

RTY – This defines the number of times to initiate the block transfer (start sending with
the ENQ.) Upon the receipt of a NAK (or other protocol error), the RTY value is adjusted and
the block transfer is again attempted.
Master/Slave – Is used to resolve contention. The host is slave and the equipment is the
master. Contention is when both the host and the equipment attempt to communicate at
the same time. The following shows how contention is resolved
HOST
(SLAVE

EQUIPMENT
(MASTER)

ENQ

ENQ

EOT

BLOCK DATA
ACK

 Copyright Edge Integration 2004

A Guide to Understanding GEM – SECS – HSMS

Page 14

Block Data
The Block Data is the data portion of either a single-block or multi-block message. It contains a
Length Byte, N Data Bytes, and a two byte Checksum.
HOST

EQUIPMENT

ENQ

EOT
BLOCK DATA

ACK

Length Byte
(Len of N Data Bytes)

N Data Bytes
(10 – 254 bytes)

10 Byte Header

Checksum
(2 bytes)

Data Structure
(0 to 244 bytes)

Block Number

1

2

3

4

5

6

7

8

9

10

Encoded SECS-II message layout
(See the SECS-II section for a description)

Message ID

Device ID

System Bytes

Length Byte – Is the first byte sent in the Block Data. It is the number of bytes in the N Date
Bytes (10 Byte Header + Data Structure). The two byte Checksum is not included in this count The
value ranges from 10 to 254 bytes.
N Data Bytes – Is the data portion of the message block. It contains a 10 Byte Header, and
the Message Data. The size ranges from 10 bytes to 254 bytes. The minimum size of N Data
Bytes is 10 (contains only the 10 Byte Header), and the maximum is 254.
Message Data - Is the data portion of the message. It contains all or a portion (if a multiblock message) of the encoded SECS-II.

 Copyright Edge Integration 2004

A Guide to Understanding GEM – SECS – HSMS

Page 15

10 Byte Header
Each message contains a header. The header is used to describe the data contained within the
Block Data. It contains the Device ID, Message ID, Block Number, and System Bytes. Other important
indicators are also included.
Device ID – Bytes 1 and 2 of the header are the device ID. The left byte is the upper device
ID, and the right byte is the lower device ID. The left most bit of the left byte is the reverse bit
(R-bit). The R-bit determines the direction of the message.

lower device ID
R Bit
87654321

87654321

R-Bit Direction
0
Host to Equipment
1
Equipment to Host

upper device ID

Message ID – Bytes 3 and 4 of the header is the message ID. The left byte is the upper
message ID, and the right byte is the lower message ID. The left most bit of the left byte is the
Wait bit (W-bit). The W-Bit is used to indicate that the sender of the primary message is
expecting a reply.
The message ID indicates the SECS-II stream and function. The upper message ID is the
stream, and the lower message ID is the function.

lower message ID
W Bit
87654321

87654321

upper message ID
stream

Function

 Copyright Edge Integration 2004

W-Bit
0
1

Expected reply
No reply is expected
Reply is expected

A Guide to Understanding GEM – SECS – HSMS

Page 16

Block Number – Bytes 5 and 6 of the header is the block number. The left byte is the
upper block number, and the right byte is the lower block number. The left most bit of the left
byte is the end bit (E-bit). The E-bit indicates this is the last block of a message.
A multi-block message is used when the sent message requires more than one block.
Each block is number and sent in order. Since the receiver of the message does not know
how may blocks to expect, the E-bit indicates which block is the last, or if there are more
bocks to follow. The maximum number of blocks in a multi-block message is 32,767.
E-Bit Last block
lower block No
0
More blocks to follow
E Bit
1
This is the last block
87654321
87654321
upper block No

System Bytes – The last four bytes of the header are the system bytes. The left two bytes
are the source ID, and the right two bytes are the transaction ID. The source ID identifies the
sender of the message and is used for message routing. The transaction ID identifies the
message and is unique for each message sent. A primary message at its associated reply
have the same (matching) system bytes.

source ID

87654321

87654321

87654321

87654321

transaction ID

 Copyright Edge Integration 2004

A Guide to Understanding GEM – SECS – HSMS

Page 17

Example of S1F1 / S1F2
The following shows the bytes transferred while a sending primary message, and receiving a
secondary reply. This is not a multi-block message. The Host, send a S1F1 and the Equipment
sends a S1F2 reply.
HOST
(SLAVE)

EQUIPMENT
(MASTER)

EOT

ENQ

S1F1 (Header only)
05
04

06
S1F2


>

ACK
EOT

ENQ

05
04

ACK

06

S1F2

Length Byte

Device ID = 0
0A
00 00
81 01
80 01
40 5D 4A 9F
02 89

Wait bit set, S1F1
Last bock, block 1

System bytes

1C
00 00
01 02
80 01
40 5D 4A 9F
01 02
41 06
4D 61 72 6B 20 49
41 06
56 65 72 31 2E 31
06 4C

2 Element List
6 byte ASCII
“Mark I”
6 Byte ASCII
“Ver1.1”

Checksum
BLOCK DATA
BLOCK DATA

 Copyright Edge Integration 2004

A Guide to Understanding GEM – SECS – HSMS

Page 18

Typical SECS Protocol Parameters
Here is a summary set of the SECS-I / SECS-II Protocol Parameters along with some typical
values.
Parameter
Baud Rate
Device ID
T1
T2
T3
T4
RTY
M/S

Function
Typical value
Serial line speed
9600
Identifier assigned to equipment
0
Inter-Character Timeout
1 (second)
ENT / EOT Timeout
10 (seconds)
Reply Timeout
45 (seconds)
Inter-Block Timeout
45 (seconds)
Retry Limit
3
Master / Slave
Host-Slave
Equip - Master

 Copyright Edge Integration 2004

A Guide to Understanding GEM – SECS – HSMS

RS-232

Page 19

Physical Link
SECS-II Message Protocol
SECS-I

Block Transfer Protocol

RS-232

Physical Link

This is the lowest protocol layer. It defines the physical interface at the equipment. It is based
on the RS-232-C standard. 25-pin type “D” connectors (or other) are used. The following are
the pins used for communication.

Pin RS-232-C Circuit
1
AA
2
BA
3
BB
7
AB
18
25

Description
Shield
Data from Equipment
Data to Equipment
Signal Ground
+12 to +15 volts (opt)
-12 to –15 volts (opt)

The equipment sends data on pin 2, and receives data on pin 3. It is therefore, called “Data
Terminal Equipment” (DTE, or Computer). If the other end (Host side) is “Data Communication
Equipment” (DCE) a straight through cable is used between the two.
Host
(DCE)

Equipment
(DTE)

Pin 1

Pin 1

Pin 2 RD

Pin 2 TD

Pin 3 TD

Pin 3 RD

Pin 7

Pin 7

However, if the other end (Host side) is also a DTE, then a null-modem connector or cable is
required. This effectively swaps pins 2 and 3.
Host
(DTE)

Equipment
(DTE)

Pin 1

Pin 1

Pin 2 TD

Pin 2 TD

Pin 3 RD

Pin 3 RD

Pin 7

Pin 7

 Copyright Edge Integration 2004

A Guide to Understanding GEM – SECS – HSMS

Page 20

Protocol Troubleshooting
This sections covers some of the more common error scenarios encountered when working with
the SECS protocol.

T2 Timeout
The following shows a T2 timeout scenario. The host is attempting to communicate with the
equipment but the equipment is off-line and not responding. This error condition could be
caused by a physical disconnect, or equipment being off-line.

HOST
(SLAVE)

EQUIPMENT
(MASTER)

ENQ
T2
ENQ
T2
ENQ
T2

T3 Timeout
The following shows a T3 timeout scenario. The host sends a primary message to the
equipment. The is done without any errors. However, the equipment fails to send the secondary
reply message. The error condition shows that the host and equipment are communicating, but
the equipment is not responding perhaps because communications have not yet been established.
HOST

EQUIPMENT

Primary (S1F1)
T3
?

 Copyright Edge Integration 2004

A Guide to Understanding GEM – SECS – HSMS

Page 21

Function 0
Function 0 is reserved for all Streams to indicated a failed transaction. This secondary reply is
sent by the receiver, so the sender does not have to wait for a T3 timeout. In any case, it
indicates a failed transaction just like a T3 timeout.
HOST

EQUIPMENT

Primary (S1F1)

Secondary (S1F0)

Stream 9’s
Streams 9’s are sent by the equipment to host to indicating: either a message from the host
cannot be handled, or the equipment detected a timeout on a previously received message.
HOST

EQUIPMENT

Primary (S9Fy)

 Copyright Edge Integration 2004

A Guide to Understanding GEM – SECS – HSMS

Page 22

Establishing Communications
Before SECS-II messages can be sent between host and equipment, communications must first
be “established”. This is done via a S1F13 (Establish Communications Request) message. This
should be the first message sent following an initial startup or after a long period of not
communicating.
Often times, the host and the equipment both initiate a S1F13, and unfortunately, both timeout
waiting for the reply. Doing this is not recommended.
HOST

EQUIPMENT

S1F13

S1F13

T3
T3

It may be best to allow the equipment to send the S1F13 first. Then the host can send a S1F13
after replying to the equipment’s S1F13. Getting the equipment to send the S1F13 may take
some experimenting with the equipment. Sometimes taking the equipment in and out of remote
mode, or taking the equipment off-line then on-line, causes the equipment to send a S1F13.
HOST

EQUIPMENT

S1F13

S1F14

S1F13

S1F14

 Copyright Edge Integration 2004

A Guide to Understanding GEM – SECS – HSMS

Page 23

HSMS
This is a discussion of the HSMS (High-Speed SECS Message Services). HSMS is based on the
SEMI E37 standard. It provides a means for sending SECS-II messages to the equipment at
greater speeds. HSMS is SECS-II over TCP/IP.

HSMS Procedures
HSMS procedures are the different types of messages passed between the host and the
equipment. Here is a summary of the procedures:

Procedure
Select
Deselect
Data
Link-test
Separate

Description
Establish a connection with the equipment
Break the HSMS connection
SECS messages between host and equipment
Determine if the host-equipment link is active
Terminate HSMS connections immediately

Select
The Select procedure is used to by the host to establish a connection with the equipment
HOST
(ACTIVE ENTITY)

EQUIPMENT
(PASSIVE ENTITY)

TCP/IP Connect

TCP/IP Accept

T7
Select.req
T6

Select.rsp

 Copyright Edge Integration 2004

A Guide to Understanding GEM – SECS – HSMS

Page 24

Deselect
The Deselect is used by either the host or equipment to break the connection.

Deselect.req

Deselect.rsp

Link Test
The Link Test procedure can be sent by either the host or equipment to test if the link is active.
Linktest.req

Linktest.rsp

Data
The Data procedure is used to send and receive SECS-II messages between the host and
equipment

Primary Message

Reply Message

 Copyright Edge Integration 2004

A Guide to Understanding GEM – SECS – HSMS

Page 25

HSMS Message Format
This is the format of a HSMS message. Each message is begins with a Message Length, then a
Message Header, followed by the Message Text.

Message Length
(4 Bytes)

Message Header
(10 Bytes)

Message Text
(0 to ~ 8 Mbytes)

Message Length – Is a four byte value that defines the length of the entire HSMS
message (Message Header + Message Text).
Message Header – Describes the HSMS message or procedure.
W-Bit + SECS Stream
SECS System Bytes
SECS Device ID

SType
SECS Function

Procedures
data

Device ID

S

F

00

00

System Bytes

select.req

FFFF

00

SS

00

01

System Bytes

select.rsp

FFFF

00

00

00

02

System Bytes

deselect.req

FFFF

00

00

00

03

System Bytes

deselect.rsp

FFFF

00

00

00

04

System Bytes

linktest.req

FFFF

00

00

00

05

System Bytes

linktest.req

FFFF

00

00

00

06

System Bytes

separate.req

FFFF

00

00

00

09

System Bytes

Bytes

1

3

4

5

6

7 8 9 10

2

Select
Status

Message Text – Is the data portion of the HSMS message. It is only relevant for the Data
procedure. The data in the Message Text is the encoded SECS-II as described in the SECSII Message Protocol section.

 Copyright Edge Integration 2004

A Guide to Understanding GEM – SECS – HSMS

Page 26

Typical HSMS Protocol Parameters
Here is a list of the HSMS Protocol Parameters and some typical values:
Parameter
SECS Device ID
Active or Passive

Function
Device ID
Client or Server

Typical Value
0
Host – Active (client)
Equip – Passive (server)
Passive Entity IP Address IP Address
192.9.200.1
Passive Entity TCP Port Port Number
5000
T3
Reply Timeout
30 (seconds)
T5
Connection Separation Timeout
10 (seconds)
T6
Control Transaction Timeout
10 (seconds)
T7
Not Selected Timeout
10 (seconds)
T8
Network Timeout
10 (seconds)

 Copyright Edge Integration 2004

A Guide to Understanding GEM – SECS – HSMS

Page 27

GEM
This is a discussion of the GEM (Generic Model for Communications and Control of
Manufacturing Equipment) GEM is based on the SEMI E30 standard. It defines a common set
of equipment behavior and communications capabilities.

What’s it all about
Where SECS-II defines the messages and data items sent between the host and equipment, GEM
defines which SECS-II messages should be used and when. The GEM standard does not effect
nor apply to the behavior of the host. When a GEM message is sent or received by the
equipment, the equipment will behave in a predictable manor.
The below shows that GEM messages are a subset of SECS-II messages

SECS II Messages
GEM Messages

GEM Compliance
What is GEM Compliance?
The GEM standard contains two specifications:



Fundamental GEM Requirements
Additional GEM Capabilities

 Copyright Edge Integration 2004

A Guide to Understanding GEM – SECS – HSMS

Page 28

The following table show the Fundamental GEM Requirements:
Requirement
State Models
Equipment Processing States
Host-Initiated S1F13/F14 Scenario
Event Notification
On-line Notification
Error Messages
Control (Operator-Initiated)
Documentation
Variable data items (as they apply)
SECS-II data item restrictions (as they apply)
Collection Events (as they apply)
Additional GEM Capabilities
Capability
Establish Communications
Event Notification
Dynamic Event Report Configuration
Variable Data Collection
Trace Date Collection
Limits Monitoring
Status Data Collection
On-line Identification
Alarm Management
Remote Control
Equipment Constants
Process Program Management
Material Movement
Equipment Terminal Services
Error Messages
Clock

To be GEM compliant, you must:



Meet the Fundamental GEM requirements
Where Additional GEM Capabilities are implemented, you must conform to the
Capability as GEM defines it. For example, you need not implement Remote Control to
be GEM compliant, but if you do, you need to implement it the GEM way.

 Copyright Edge Integration 2004



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.5
Linearized                      : No
Author                          : Work
Create Date                     : 2015:11:27 16:15:34-05:00
Modify Date                     : 2019:02:28 22:35:20-08:00
Producer                        : Microsoft® Word 2013
Language                        : en-US
Tagged PDF                      : Yes
Description                     : 
Title                           : Guide to understanding SECS
Publisher                       : 
Subject                         : 
Creator                         : Work
Metadata Date                   : 2019:02:28 22:35:20.229767-08:00
Page Count                      : 28
EXIF Metadata provided by
EXIF.tools

Navigation menu