Semiconductor Equipment Communication: SECS/GEM Implementation
Guide to implementing SEMI SECS/GEM communication standards for semiconductor manufacturing equipment integration with factory host systems.
Published on November 15, 2025
Semiconductor Equipment Communication
This guide explains implementation of the SEMI SECS/GEM family of standards for equipment-to-host communications in semiconductor manufacturing and related industries (flat panels, photovoltaics, displays). SECS/GEM enables a consistent, vendor-agnostic interface that lets factory host systems (e.g., MES, factory automation servers) control, monitor, and collect data from equipment using a defined set of messages, state models, and scenarios. The family includes SEMI E30 (GEM) for behavioral and functional requirements, SEMI E5 (SECS-II) for message structure and data types, SEMI E37 (HSMS) for TCP/IP transport, and SEMI E4 (SECS-I) for legacy serial links (RS-232) (see References) [1][3][4].
Key Concepts
Successful SECS/GEM implementations rest on a small set of technical concepts and requirements defined by SEMI. An automation engineer must be fluent in the message model, transport options, GEM control state model, and the GEM minimum functional subset required for factory interoperability.
Message Model and Layers
SECS/GEM uses a layered model:
- SECS-II (SEMI E5) — defines message structures, data types and the SxFy message library used by GEM. Messages are built from structured data items and follow a standard SxFy convention (see SEMI E5) [1][3].
- Transport — SECS messages can travel over two main transports:
- SECS-I (SEMI E4) — serial (RS-232) legacy transport for point-to-point connections; commonly retained for legacy equipment or short, low-bandwidth links [1][3].
- HSMS (SEMI E37) — High-Speed Message Service, a binary protocol that carries SECS-II messages over TCP/IP for modern networks and high throughput requirements [1][3].
- GEM (SEMI E30) — defines the minimum set of SECS-II messages and the equipment behavior required by hosts for essential functions: remote control, status/events/alarms, recipe/program management, data collection, spooling, and optional functions such as limits monitoring and trace sampling [1][2].
GEM Control State Model
GEM defines a control state model to manage host and operator authority on equipment. The three principal states are:
- Remote — host has authority to issue commands and control processing.
- Local — local operator controls the tool; the host may be restricted from taking control.
- Offline — equipment is not available to the host (for maintenance, configuration, or when disconnected).
Explicit state transitions and handoff mechanisms prevent conflicting commands and ensure predictable behavior during automation sequences (SEMI E30) [3].
GEM Minimum and Optional Features
SEMI E30 establishes a minimum functional subset that equipment must support to be considered GEM-compliant. Key minimums include:
- Remote control — the host can start/stop processes and place equipment into host-controlled modes.
- Alarms — the equipment publishes alarm conditions and supports alarm enable/disable and clear functions.
- Events and Data Collection — event report mechanisms and data variables (durations, counts, numeric values) for process monitoring.
- Recipe/Program management — upload, download, select, and verify process programs (recipes) remotely.
Optional features include spooling (store-and-forward of messages when the host is unavailable), limits monitoring (basic SPC functionality), trace sampling, and enhanced status reporting. Many fabs require spooling to ensure data integrity during host outages (SEMI E30) [2][3].
Protocols and Standards Overview
The SECS/GEM family is governed by SEMI standards. The primary documents you will reference for design and implementation are:
- SEMI E30 (GEM) — behavioral and functional definitions (core of GEM features and state model) [1][2].
- SEMI E5 (SECS-II) — message formats, data types, and the standard message library used by GEM [1][3].
- SEMI E37 (HSMS) — specification for transporting SECS-II messages over TCP/IP, recommended for modern high-throughput applications [1][3].
- SEMI E4 (SECS-I) — RS-232 serial transport for legacy connections [1][3].
- GEM300 — an application profile/extension for 300 mm wafer manufacturing (SEMI E30-based behaviors targeted at 300 mm tools) that is widely adopted in 300 mm fabs and applicable to other industries; vendors often provide GEM300-specific configuration options [1][4].
SEMI standards are the authoritative source; they do not rely on other standards bodies (IEC, ISA, IEEE) for SECS/GEM behavior and message semantics — governance and revisions are maintained by SEMI [1][2][3][4].
Transport Comparison
| Protocol | Transport Layer | Typical Use | Performance / Notes |
|---|---|---|---|
| SECS-I (SEMI E4) | RS-232 Serial | Legacy equipment and simple point-to-point connections | Lower throughput; limited by serial baud rate; reliable for older tools |
| HSMS (SEMI E37) | TCP/IP (Ethernet) | Modern high-speed communications in production networks | High throughput, scalable, preferred for new installations |
| SECS-II (SEMI E5) | Message Layer (runs on SECS-I or HSMS) | Defines message structures (SxFy) used by GEM and hosts | Transport-agnostic; required for standardized message semantics |
Implementation Guide
Implementing SECS/GEM successfully requires deliberate planning, correct tool and protocol selection, and rigorous testing. Below is a practical, phase-based approach engineers use in production projects.
1. Initial Assessment and Requirements
- Inventory equipment capabilities: Determine whether the tool already supports GEM, HSMS, SECS-I, and which SECS message subsets are implemented (consult vendor manuals) [4].
- Define factory requirements: Does the host require GEM minimums only, or advanced features such as spooling, limits monitoring, or GEM300 behaviors? Many fabs mandate recipe management and event reporting as minimal requirements [2][3].
- Network and security policy: Decide on network segmentation, VLANs, firewall rules, and host placement for HSMS. Note that SEMI standards themselves do not define security; factories must apply network and operational security controls externally [1][2].
2. Protocol and Tooling Selection
- Prefer HSMS (SEMI E37) over SECS-I for new installations to maximize throughput and scalability; keep SECS-I as fallback for legacy host or tool constraints [1][3].
- Select SECS/GEM stacks and libraries that match the host and equipment languages (C/C++, .NET, Java) and support required message sets (SECS-II SxFy) and spooling features.
- For equipment with pre-installed SECS/GEM software (for example, certain Mitsubishi C Controller models), review vendor manuals for GEM300 configuration options, offset data mapping, and controller-specific behaviors (see Mitsubishi documentation) [4].
3. Design and Implementation
- Implement the GEM minimum functional subset first: remote control, event/alarm publication, and recipe management. Confirm the SECS-II mappings for each capability using the SEMI E5 message library (SxFy) and the GEM-required behaviors in E30 [1][2].
- Design data and event schemas: define collection variables, event reports, and trace samples. Ensure unique identifiers for variables and consistent data types to simplify host parsing.
- Implement the GEM Control State Machine: handle Remote/Local/Offline transitions cleanly, and ensure the equipment blocks conflicting local operations when in Remote state [3].
- Implement spooling (optional but recommended): the equipment must store messages and events when the host is unavailable and forward them after recovery to prevent data loss; test spooling persistence across power cycles if required by the facility [2].
- Recipe handling: implement safe upload/download with verification, checksum or versioning, and operator confirmation where required. Ensure recipes stored on equipment match host expectations and include metadata required by MES systems.
4. Test Plan and Interoperability
Testing confirms functional behavior and interoperability with multiple hosts:
- Connectivity tests: verify HSMS handshake, session establishment, heartbeats, and recovery from dropped TCP connections.
- Control state tests: exercise transitions Remote <–> Local <–> Offline under controlled conditions and observe correct behavior for start/stop, abort, and pause commands.
- Message flow tests: validate event reports, alarms, recipe transfers, and data collection formats against the host parser.
- Spooling and recovery: simulate host outage and recovery to verify the equipment spools messages and replays them in correct order without duplication.
- Interoperability: test with multiple GEM hosts and third-party test tools to confirm vendor-agnostic behavior; use standardized test suites where available from SEMI or tool vendors.
5. Deployment and Validation
- Perform staged rollout (installation, pilot production, ramp) with tight monitoring of message rates, network utilization, and error rates.
- Collect operational metrics from both host and equipment to tune event frequencies and sampling rates to avoid network congestion.
- Document SECS/GEM mapping and change management: maintain a living data dictionary of SECS variables, event IDs, and recipe identifiers for traceability.
Best Practices
Field experience and SEMI guidance indicate several patterns that improve reliability, maintainability, and interoperability of SECS/GEM implementations:
- Negotiate the channel before control: Always establish the SECS channel and confirm session stability before switching to Remote control and issuing process commands; this avoids interrupted operations and partial transactions (SEMI E30) [2][3].
- Prefer HSMS for production: HSMS over TCP/IP provides scalable, high-throughput communications; use SECS-I only when host or equipment constraints demand serial links [1][3].
- Implement spooling and persistent queues: Spooling prevents data loss during host outages. Test spool capacity