Presentation is loading. Please wait.

Presentation is loading. Please wait.

Industrial Ethernet and Networking

Similar presentations


Presentation on theme: "Industrial Ethernet and Networking"— Presentation transcript:

1 Industrial Ethernet and Networking
Craig LaRose Product Sales Engineer Network Solutions October 24, 2006

2 Industrial Ethernet and Networking
What You Will Learn Basic hardware and addressing TCP/IP protocol Routers, Bridges, & Switches Webservers, & FTP Dial-up networking OPC connectivity software Wireless networking Additional Resources Industrial Ethernet and Networking

3 Industrial Ethernet and Networking
Term Alert: ETHERNET What is Ethernet? It is not the cable you connect to your PC It is group of standards which cover the transmission of data over a medium Industrial Ethernet and Networking

4 Industrial Ethernet and Networking
Standards How can we best describe these standards OSI 7 Layer Model The Open Systems Interconnection (OSI) model is an attempt to standardize the functionality of end to end computer communications. Industrial Ethernet and Networking

5 Industrial Ethernet and Networking
7 Layer OSI Model Open Systems Interconnect (OSI) Model Layer Function Application Presentation Session Transport Network Data Link Physical 7 – Network Application 6 – Formatting of data and encryption 5 – Establishment and maintenance of sessions 4 – Provides reliable end-to-end delivery 3 – Packet delivery, including routing 2 – Framing of information and error checking 1 – Physical Medium requirements Industrial Ethernet and Networking

6 Industrial Ethernet and Networking
OSI Model The path of data through the stack Sender Receiver Application Presentation Session Transport Network Data Link Physical Application Presentation Session Transport Network Data Link Physical Industrial Ethernet and Networking

7 Determine of Data Path in Network Industrial Ethernet and Networking
7 Layer OSI Model How Ethernet Fits in the OSI Model Application Presentation Session Ethernet Standard Error Checking Transport Determine of Data Path in Network Network Logical Link Control Media Access Control Data Link Physical Media specifications Industrial Ethernet and Networking

8 Determine of Data Path in Network Industrial Ethernet and Networking
7 Layer OSI Model Layer 1 Specifications Application Presentation Session Ethernet Standard Error Checking Transport Determine of Data Path in Network Network Logical Link Control Media Access Control Data Link Physical Media specifications Industrial Ethernet and Networking

9 Physical Layer Specifications
Industrial Ethernet and Networking

10 Industrial Ethernet and Networking
Cables and Connectors Speed = 10 Mbps Physical Media (Twisted Pair) 10baseT Cat 5e: voice and data at 100 mbps Cat 6: voice and data at 250 mbps Patch cable: straight thru; used with hubs & routers Cross cable: crossed; used for PC to device direct RJ45: standard 10baseT (twisted pair) connector* Speed = 100 Mbps Physical Media (Fiber Optic) 100baseFL Industrial Ethernet and Networking

11 Physical Layer: More Wires
Backbone Coax Cable 10base5 ThinNet Coax Cable 10BASE-2 Multimode Fiber Optic Cables, ST®-ST 10baseFL, 100baseFL Industrial Ethernet and Networking

12 Determine of Data Path in Network Industrial Ethernet and Networking
7 Layer OSI Model Layer 2 Specifications Application Presentation Session Ethernet Standard Error Checking Transport Determine of Data Path in Network Network Logical Link Control Media Access Control Data Link Physical Media specifications Industrial Ethernet and Networking

13 Industrial Ethernet and Networking
Layer 2 : Data Link Logical Link Control Sub layer Establishes and Controls Logical Links between Local Devices on a Network Makes it Possible for Different Technologies to Work Seamlessly with Higher Layers Logical Link Control (LLC): Logical link control refers to the functions required for the establishment and control of logical links between local devices on a network. As mentioned above, this is usually considered a DLL sub layer; it provides services to the network layer above it and hides the rest of the details of the data link layer to allow different technologies to work seamlessly with the higher layers. Most local area networking technologies use the IEEE LLC protocol. Industrial Ethernet and Networking

14 Industrial Ethernet and Networking
Layer 2 : Data Link Media Access Control Layer Procedures used by devices to control access Responsible for final encapsulation of data frames that are sent over the network Responsible for Final Addressing of Messages on Network. Responsible for Error Detection and Handling.. Media Access Control (MAC): This refers to the procedures used by devices to control access to the network medium. Since many networks use a shared medium (such as a single network cable, or a series of cables that are electrically connected into a single virtual medium) it is necessary to have rules for managing the medium to avoid conflicts. For example. Ethernet uses the CSMA/CD method of media access control, while Token Ring uses token passing. Data Framing: The data link layer is responsible for the final encapsulation of higher-level messages into frames that are sent over the network at the physical layer. Addressing: The data link layer is the lowest layer in the OSI model that is concerned with addressing: labeling information with a particular destination location. Each device on a network has a unique number, usually called a hardware address or MAC address, that is used by the data link layer protocol to ensure that data intended for a specific machine gets to it properly. Error Detection and Handling: The data link layer handles errors that occur at the lower levels of the network stack. For example, a cyclic redundancy check (CRC) field is often employed to allow the station receiving data to detect if it was received correctly. As I mentioned in the topic discussing the physical layer, that layer and the data link layer are very closely related. The requirements for the physical layer of a network are often part of the data link layer definition of a particular technology. Certain physical layer hardware and encoding aspects are specified by the DLL technology being used. The best example of this is the Ethernet standard, IEEE 802.3, which specifies not just how Ethernet works at the data link layer, but also its various physical layers. Since the data link layer and physical layer are so closely related, many types of hardware are associated with the data link layer. Network interface cards (NICs) typically implement a specific data link layer technology, so they are often called “Ethernet cards”, “Token Ring cards”, and so on. There are also a number of network interconnection devices that are said to “operate at layer 2”, in whole or in part, because they make decisions about what to do with data they receive by looking at data link layer frames. These devices include most bridges, switches and barters, though the latter two also encompass functions performed by layer three. Some of the most popular technologies and protocols generally associated with layer 2 are Ethernet, Token Ring, FDDI (plus CDDI), HomePNA, IEEE , ATM, and TCP/IP's Serial Link Interface Protocol (SLIP) and Point-To-Point Protocol (PPP). Key Concept: The second OSI Reference Model layer is the data link layer. This is the place where most LAN and wireless LAN technologies are defined. Layer two is responsible for logical link control, media access control, hardware addressing, error detection and handling, and defining physical layer standards. It is often divided into the logical link control (LLC) and media access control (MAC) sublayers, based on the IEEE 802 Project that uses that architecture. Industrial Ethernet and Networking

15 Industrial Ethernet and Networking
Layer 2 : Data Link MAC Addressing Each device on a Network has a unique number called a MAC Address that is used to ensure that data for an intended machine gets to it properly. Made up of a 48 bit number First 6 bytes assigned by IEEE (Vendor’s ID) Last 6 bytes assigned by Vendor 00-80-a Vendor Device Media Access Control (MAC): This refers to the procedures used by devices to control access to the network medium. Since many networks use a shared medium (such as a single network cable, or a series of cables that are electrically connected into a single virtual medium) it is necessary to have rules for managing the medium to avoid conflicts. For example. Ethernet uses the CSMA/CD method of media access control, while Token Ring uses token passing. Data Framing: The data link layer is responsible for the final encapsulation of higher-level messages into frames that are sent over the network at the physical layer. Addressing: The data link layer is the lowest layer in the OSI model that is concerned with addressing: labeling information with a particular destination location. Each device on a network has a unique number, usually called a hardware address or MAC address, that is used by the data link layer protocol to ensure that data intended for a specific machine gets to it properly. Error Detection and Handling: The data link layer handles errors that occur at the lower levels of the network stack. For example, a cyclic redundancy check (CRC) field is often employed to allow the station receiving data to detect if it was received correctly. As I mentioned in the topic discussing the physical layer, that layer and the data link layer are very closely related. The requirements for the physical layer of a network are often part of the data link layer definition of a particular technology. Certain physical layer hardware and encoding aspects are specified by the DLL technology being used. The best example of this is the Ethernet standard, IEEE 802.3, which specifies not just how Ethernet works at the data link layer, but also its various physical layers. Since the data link layer and physical layer are so closely related, many types of hardware are associated with the data link layer. Network interface cards (NICs) typically implement a specific data link layer technology, so they are often called “Ethernet cards”, “Token Ring cards”, and so on. There are also a number of network interconnection devices that are said to “operate at layer 2”, in whole or in part, because they make decisions about what to do with data they receive by looking at data link layer frames. These devices include most bridges, switches and barters, though the latter two also encompass functions performed by layer three. Some of the most popular technologies and protocols generally associated with layer 2 are Ethernet, Token Ring, FDDI (plus CDDI), HomePNA, IEEE , ATM, and TCP/IP's Serial Link Interface Protocol (SLIP) and Point-To-Point Protocol (PPP). Key Concept: The second OSI Reference Model layer is the data link layer. This is the place where most LAN and wireless LAN technologies are defined. Layer two is responsible for logical link control, media access control, hardware addressing, error detection and handling, and defining physical layer standards. It is often divided into the logical link control (LLC) and media access control (MAC) sublayers, based on the IEEE 802 Project that uses that architecture. is the Yokogawa vendor ID Industrial Ethernet and Networking

16 Industrial Ethernet and Networking
Layer 2 : Data Link MAC Addresses: How do you find yours? Windows NT/2000/2003/XP Open the command prompt from “Run” From the command prompt type "ipconfig /all" Find the network adapter you want to know the MAC address of Locate the number next to Physical Address. This is your MAC address Note: there are 248 = × 1014 available Mac addresses. Don’t worry we wont run out. Industrial Ethernet and Networking

17 Industrial Ethernet and Networking
7 Layer OSI Model Layer 3 Specifications Application Presentation Session Ethernet Standard Error Checking Transport Logical Addressing Routing Network The third-lowest layer of the OSI Reference Model is the network layer. If the data link layer is the one that basically defines the boundaries of what is considered a network, the network layer is the one that defines how internetworks (interconnected networks) function. The network layer is the lowest one in the OSI model that is concerned with actually getting data from one computer to another even if it is on a remote network; in contrast, the data link layer only deals with devices that are local to each other. While all of layers 2 through 6 in the OSI Reference Model serve to act as “fences” between the layers below them and the layers above them, the network layer is particularly important in this regard. It is at this layer that the transition really begins from the more abstract functions of the higher layers—which don't concern themselves as much with data delivery—into the specific tasks required to get data to its destination. The transport layer, which is related to the network layer in a number of ways, continues this “abstraction transition” as you go up the OSI protocol stack. Data Link Logical Link Control Media Access Control Physical Media specifications Industrial Ethernet and Networking

18 Industrial Ethernet and Networking
Layer 3 : Network Layer Network Layer Functions Logical Addressing – every device over a network has a logical address. For example the Internet Protocol (IP) is the network layer protocol and every machine has an unique IP address. Routing – responsible for information to move data across interconnected networks. Datagram Encapsulation Fragment and Reassembly Error Handling and Diagnostics Network Layer Functions Some of the specific jobs normally performed by the network layer include: Logical Addressing: Every device that communicates over a network has associated with it a logical address, sometimes called a layer three address. For example, on the Internet, the Internet Protocol (IP) is the network layer protocol and every machine has an IP address. Note that addressing is done at the data link layer as well, but those addresses refer to local physical devices. In contrast, logical addresses are independent of particular hardware and must be unique across an entire internetwork. Routing: Moving data across a series of interconnected networks is probably the defining function of the network layer. It is the job of the devices and software routines that function at the network layer to handle incoming packets from various sources, determine their final destination, and then figure out where they need to be sent to get them where they are supposed to go. Datagram Encapsulation: The network layer normally encapsulates messages received from higher layers by placing them into datagrams (also called packets) with a network layer header. Fragmentation and Reassembly: The network layer must send messages down to the data link layer for transmission. Some data link layer technologies have limits on the length of any message that can be sent. If the packet that the network layer wants to send is too large, the network layer must split the packet up, send each piece to the data link layer, and then have pieces reassembled once they arrive at the network layer on the destination machine. A good example is how this is done by the Internet Protocol. Error Handling and Diagnostics: Special protocols are used at the network layer to allow devices that are logically connected, or that are trying to route traffic, to exchange information about the status of hosts on the network or the devices themselves. Network Layer Connection-Oriented and Connectionless Services Network layer protocols may offer either connection-oriented or connectionless services for delivering packets across the network. Connectionless ones are by far more common at the network layer. In many protocol suites, the network layer protocol is connectionless, and connection-oriented services are provided by the transport layer. For example, in TCP/IP, the Internet Protocol (IP) is connectionless, while the layer four Transmission Control Protocol (TCP) is connection-oriented. The most common network layer protocol is of course the Internet Protocol (IP), which is why I have already mentioned it a couple of times. IP is the backbone of the Internet, and the foundation of the entire TCP/IP protocol suite. There are also several protocols directly related to IP that work with it at the network layer, such as IPsec, IP NAT and Mobile IP. ICMP is the main error-handling and control protocol that is used along with IP. Another notable network layer protocol outside the TCP/IP world is the Novell IPX protocol. Key Concept: The OSI Reference Model’s third layer is called the network layer. This is one of the most important layers in the model; it is responsible for the tasks that link together individual networks into internetworks. Network layer functions include internetwork-level addressing, routing, datagram encapsulation, fragmentation and reassembly, and certain types of error handling and diagnostics. The network layer and transport layer are closely related to each other. The network interconnection devices that operate at the network layer are usually called routers, which at this point should hopefully come as no surprise to you. They are responsible for the routing functions I have mentioned, by taking packets received as they are sent along each “hop” of a route and sending them on the next leg of their trip. They communicate with each other using routing protocols, to determine the best routes for sending traffic efficiently. So-called “brouters” also reside at least in part at the network layer, as do the rather obviously named “layer three switches”. J Industrial Ethernet and Networking

19 Industrial Ethernet and Networking
Term Alert: TCP/IP The TCP/IP protocol suite is named for two of its most important protocols. Transmission Control Protocol (TCP) Internet Protocol (IP) The design goal of TCP/IP was to build an interconnection of networks that provided universal communication services: an Internet. TCP/IP provides a common interface for user-applications inderpendent of the underlying physical network. IP (Internet protocol) address Known as the logical address What Network is the device on? Industrial Ethernet and Networking

20 The Big 3: IP, Subnet, Gateway
IP Addressing An IP address is a unique identifier for a node or host connection on an IP network Every IP address consists of two parts, one identifying the network and one identifying the node. The Class determines which part belongs to the network address and which part belongs to the node Class A addresses begin with 1 to 126 Class B addresses begin with 128 to 191 Class C addresses begin with 192 to 223 Class D addresses begin with 224 to 239 Class E addresses begin with 240 to 254 An IP (Internet Protocol) address is a unique identifier for a node or host connection on an IP network. An IP address is a 32 bit binary number usually represented as 4 decimal values, each representing 8 bits, in the range 0 to 255 (known as octets) separated by decimal points. This is known as "dotted decimal" notation. Example: It is sometimes useful to view the values in their binary form. Every IP address consists of two parts, one identifying the network and one identifying the node. The Class of the address and the subnet mask determine which part belongs to the network address and which part belongs to the node address. Address Classes There are 5 different address classes. You can determine which class any IP address is in by examining the first 4 bits of the IP address. Class A addresses begin with 0xxx, or 1 to 126 decimal. Class B addresses begin with 10xx, or 128 to 191 decimal. Class C addresses begin with 110x, or 192 to 223 decimal. Class D addresses begin with 1110, or 224 to 239 decimal. Class E addresses begin with 1111, or 240 to 254 decimal. Addresses beginning with , or 127 decimal, are reserved for loopback and for internal testing on a local machine. [You can test this: you should always be able to ping , which points to yourself] Class D addresses are reserved for multicasting. Class E addresses are reserved for future use. They should not be used for host addresses. Now we can see how the Class determines, by default, which part of the IP address belongs to the network (N) and which part belongs to the node (n). Class A -- NNNNNNNN.nnnnnnnn.nnnnnnnn.nnnnnnnn Class B -- NNNNNNNN.NNNNNNNN.nnnnnnnn.nnnnnnnn Class C -- NNNNNNNN.NNNNNNNN.NNNNNNNN.nnnnnnnn In the example, is a Class B address so by default the Network part of the address (also known as the Network Address) is defined by the first two octets ( x.x) and the node part is defined by the last 2 octets (x.x ). In order to specify the network address for a given IP address, the node section is set to all "0"s. In our example, specifies the network address for When the node section is set to all "1"s, it specifies a broadcast that is sent to all hosts on the network specifies the example broadcast address. Note that this is true regardless of the length of the node section. Private Subnets There are three IP network addresses reserved for private networks. The addresses are /8, /12, and /16. They can be used by anyone setting up internal IP networks, such as a lab or home LAN behind a NAT or proxy server or a router. It is always safe to use these because routers on the Internet will never forward packets coming from these addresses. These addresses are defined in RFC 1918 Class C Class A Industrial Ethernet and Networking

21 More About IP Addresses
Internet Assigned Numbers Authority Admiralty Way, Suite Marina del Rey, CA USA (phone) (facsimile) network.host.host.host network.network.host.host network.network.network.host Industrial Ethernet and Networking

22 The Big 3: IP, Subnet, Gateway
Subnetting Can be done for use of different physical media, preservation of address space, security, or more commonly to control network traffic Example 1: Class B IP Address Default Class B Subnet Mask Network Address Default subnet masks Example 2: IP Address Subnet Mask Subnet Address Broadcast Address Total of 49,140 node versus 65,534 using a unsubnetted Class B address Subnetting an IP Network can be done for a variety of reasons, including organization, use of different physical media (such as Ethernet, FDDI, WAN, etc.), preservation of address space, and security. The most common reason is to control network traffic. In an Ethernet network, all nodes on a segment see all the packets transmitted by all the other nodes on that segment. Performance can be adversely affected under heavy traffic loads, due to collisions and the resulting retransmissions. A router is used to connect IP networks to minimize the amount of traffic each segment must receive. Subnet Masking Applying a subnet mask to an IP address allows you to identify the network and node parts of the address. The network bits are represented by the 1s in the mask, and the node bits are represented by the 0s. Performing a bitwise logical AND operation between the IP address and the subnet mask results in the Network Address or Number. For example, using our test IP address and the default Class B subnet mask, we get: Class B IP Address Default Class B Subnet Mask Network Address Default subnet masks: Class A Class B Class C More Restrictive Addressing Additional bits can be added to the default subnet mask for a given Class to further subnet, or break down, a network. When a bitwise logical AND operation is performed between the subnet mask and IP address, the result defines the Subnet Address (also called the Network Address or Network Number). There are some restrictions on the subnet address. Node addresses of all "0"s and all "1"s are reserved for specifying the local network (when a host does not know its network address) and all hosts on the network (broadcast address), respectively. This also applies to subnets. A subnet address cannot be all "0"s or all "1"s. This also implies that a 1 bit subnet mask is not allowed. This restriction is required because older standards enforced this restriction. Recent standards that allow use of these subnets have superceded these standards, but many "legacy" devices do not support the newer standards. If you are operating in a controlled environment, such as a lab, you can safely use these restricted subnets. To calculate the number of subnets or nodes, use the formula (2n-2) where n = number of bits in either field, and 2n represents 2 raised to the nth power. Multiplying the number of subnets by the number of nodes available per subnet gives you the total number of nodes available for your class and subnet mask. Also, note that although subnet masks with non-contiguous mask bits are allowed, they are not recommended. Example: IP Address Subnet Mask Subnet Address Broadcast Address In this example a 3 bit subnet mask was used. There are 6 (23-2) subnets available with this size mask (remember that subnets with all 0's and all 1's are not allowed). Each subnet has 8190 (213-2) nodes. Each subnet can have nodes assigned to any address between the Subnet address and the Broadcast address. This gives a total of 49,140 nodes for the entire class B address subnetted this way. Notice that this is less than the 65,534 nodes an unsubnetted class B address would have. You can calculate the Subnet Address by performing a bitwise logical AND operation between the IP address and the subnet mask, then setting all the host bits to 0s. Similarly, you can calculate the Broadcast Address for a subnet by performing the same logical AND between the IP address and the subnet mask, then setting all the host bits to 1s. That is how these numbers are derived in the example above. Subnetting always reduces the number of possible nodes for a given network. There are complete subnet tables available here for Class A, Class B and Class C. These tables list all the possible subnet masks for each class, along with calculations of the number of networks, nodes and total hosts for each subnet. Industrial Ethernet and Networking

23 The Big 3: IP, Subnet, Gateway
A Default Gateway is a node (Router) on a computer network that serves as an access point to another network. Example: NETWORK ADDRESSES RANGE FROM TO IP Address: Subnet: Default Gateway: Packets addressed outside of this range, for example are instead sent to the default gateway address, in this case to , which is resolved into a MAC address as usual. The destination IP address will stay , it is just the next-hop physical address that is used, in this case it will be the router's interface physical address. IP Address: Subnet: Default Gateway: IP Address: Subnet: Default Gateway: IP Address: IP Address: Default gateway is a node (a router) on a computer network that serves as an access point to another network. In homes, the gateway is the ISP that connects the user to the Internet. In enterprises, however, the gateway is the computer that routes the traffic from a workstation to the outside network that is serving the Web pages. In such a situation, the gateway node often acts as a proxy server and a firewall. The gateway is also associated with both a router, which uses headers and forwarding tables to determine where packets are sent, and a switch, which provides the actual path for the packet in and out of the gateway. In other words, it is an entry point and an exit point in a network Usage A default gateway is used by a host when an IP packet's destination address belongs to someplace outside the local subnet (thus requiring more than one hop of Ethernet communication). The default gateway address is usually an interface belonging to the LAN's border router. IP Address: Subnet: Default Gateway: IP Address: Subnet: Default Gateway: Industrial Ethernet and Networking

24 Recap : IP and MAC Addresses
This is the .3 device This is the network IP Address Subnet Mask Gateway IP 0 means device 255 means network Internet Protocol IP address tells you which network and what device in that network IP addresses must be unique within a network Subnet mask identifies network vs. device Gateway defines a router that moves data to higher level networks MAC Vendor Device Media Access Control MAC address identifies the device at hardware level (physical address) MAC addresses contain unique vendor and device ID’s Industrial Ethernet and Networking

25 Industrial Ethernet and Networking
Network Info on DX2000 Industrial Ethernet and Networking

26 Industrial Ethernet and Networking
IPv4 to IPv6 IPv4 supports 4.3 Billion addresses Will not be enough to support the future IPv6 will support 3.4 x 1038 addresses Will this be enough address to support our needs? Internet Protocol version 6 (IPv6) is a network layer IP standard used by electronic devices to exchange data across a packet-switched internetwork. It follows IPv4 as the second version of the Internet Protocol to be formally adopted for general use. The main improvement brought by IPv6 is the increase in the number of addresses available for networked devices, allowing, for example, each cell phone and mobile electronic device to have its own address. IPv4 supports 4.3×109 (4.3 billion) addresses, which is inadequate for giving even one address to every living person, much less support the burgeoning emerging market for connective devices. IPv6 supports 3.4×1038 addresses, or 5×1028(50 octillion) for each of the roughly 6.5 billion people alive today, or almost 57 billion addresses for each gram of matter in the Earth. (Note: statements that IPv6 provides enough address space to give an address for each atom in the universe or even for each atom on Earth are exaggerated. However, the average person could address each atom in their body.) Invented by Steve Deering and Craig Mudge at Xerox PARC, IPv6 was adopted by the Internet Engineering Task Force in 1994, when it was called "IP Next Generation" (IPng). (Incidentally, IPv5 was not a successor to IPv4, but an experimental flow-oriented streaming protocol intended to support video and audio.) As of December 2005, IPv6 accounts for a tiny percentage of the live addresses in the publicly-accessible Internet, which is still dominated by IPv4. The adoption of IPv6 has been slowed by the introduction of classless inter-domain routing (CIDR) and network address translation (NAT), each of which has partially alleviated the impact of address space exhaustion. Nevertheless, as of August 2006, the primary IANA pool is expected to run out in the 2009 to 2011 timeframe if current trends continue. The U.S. Government has specified that the network backbones of all federal agencies must deploy IPv6 by 2008.[1] Meanwhile China is planning to get a head start implementing IPv6 with their 5 year plan for the China Next Generation Internet. It is expected that IPv4 will be supported alongside IPv6 for the foreseeable future. However, ipv4-only clients/servers will not be able to communicate directly with IPv6 clients/servers, and will require service-specific intermediate servers or NAT-PT protocol-translation servers. There are fewer grains of sands in the Sahara Desert than will be available IP addresses Industrial Ethernet and Networking

27 Industrial Ethernet and Networking
Term Alert: DNS Domain Name Server Software running on a host machine that links an IP address with a name. Allows users to connect to a device by IP address or by name. dx200.yca.com Domain names ending with .biz, .com, .info, .name, .net or .org can be registered through many different companies (known as "registrars"). The domain name system (DNS) stores and associates many types of information with domain names, but most importantly, it translates domain names (computer hostnames) to IP addresses. It also lists mail exchange servers accepting for each domain. In providing a worldwide keyword-based redirection service, DNS is an essential component of contemporary Internet use. Useful for several reasons, the DNS pre-eminently makes it possible to attach easy-to-remember domain names (such as "wikipedia.org") to hard-to-remember IP addresses (such as ). Humans take advantage of this when they recite URLs and addresses. In a subsidiary function, the domain name system makes it possible for people to assign authoritative names without needing to communicate with a central registrar each time. Industrial Ethernet and Networking

28 Industrial Ethernet and Networking
Term Alert: DHCP Dynamic Host Configuration Protocol Process of automatically assigning an IP address when a device is connected to a local area network. Typically used in an office to conserve IP addresses. DX2000 and MW100 can run static or dynamic (DHCP) Industrial Ethernet and Networking

29 Static vs. Dynamic Addressing
Dynamic IP (DHCP) Static IP Industrial Ethernet and Networking

30 Looking at Your Network
winipcfg (W95, W98, ME) ipconfig (NT 4.0, 2000) Industrial Ethernet and Networking

31 Looking at Your Network
“Pinging” to test an IP address Reply from : bytes=32 time<10ms TTL=128 IP Address Round Trip Time Time To Live Maximum Hops Number of bytes transmitted Industrial Ethernet and Networking

32 Industrial Ethernet and Networking
7 Layer OSI Model Layer 4 Specifications Application Presentation Session Ethernet Standard Error Checking Transport Network Logical Addressing Routing The transport layer is layer four of the seven layer OSI model. It responds to service requests from the session layer and issues service requests to the network layer. The transport layer provides transparent transfer of data between hosts. It is usually responsible for end-to-end error recovery and flow control, and ensuring complete data transfer. In the Internet protocol suite this function is most commonly achieved by the connection oriented Transmission Control Protocol (TCP). The datagram-type transport, User Datagram Protocol (UDP), provides neither error recovery, nor flow control, leaving these to the application. The purpose of the Transport layer is to provide transparent transfer of data between end users, thus relieving the upper layers from any concern with providing reliable and cost-effective data transfer. The transport layer usually turns the unreliable and very basic service provided by the Network layer into a more powerful one. There is a long list of services that can be optionally provided at this level. None of them are compulsory, because not all applications want all the services available. Some can be wasted overhead, or even counterproductive in some cases. Connection-Oriented This is normally easier to deal with than connection-less models, so where the Network layer only provides a connection-less service, often a connection-oriented service is built on top of that in the Transport layer. Same Order Delivery The Network layer doesn't generally guarantee that packets of data will arrive in the same order that they were sent, but often this is a desirable feature, so the Transport layer provides it. The simplest way of doing this is to give each packet a number, and allow the receiver to reorder the packets. Reliable Data The underlying network may well be noisy, and the data received may not always be the same as the data sent. The Transport layer can fix this: typically by providing a checksum of the data which detects if there has been a glitch of some kind. Of course, error free is impossible, but it is possible to substantially reduce the numbers of undetected errors. This layer may also retransmit packets which have gone missing en route. Flow Control The amount of memory on a computer is limited, and without flow control a larger computer might flood a computer with so much information that it can't hold it all before dealing with it. Nowadays, this is not a big issue, as memory is cheap while bandwidth is comparatively expensive, but in earlier times it was more important. Flow control allows the receiver to say "Whoa!" before it is overwhelmed. Sometimes this is already provided by the network, but where it is not, the Transport layer may add it on. Byte Orientation Rather than dealing with things on a packet-by-packet basis, the Transport layer may add the ability to view communication just as a stream of bytes. This is nicer to deal with than random packet sizes, however, it rarely matches the communication model which will normally be a sequence of messages of user defined sizes. Ports Ports are essentially ways to address multiple entities in the same location. For example, the first line of a postal address is a kind of port, and distinguishes between different occupants of the same house. Computer applications will each listen for information on their own ports, which is why you can use more than one network-based application at the same time. On the Internet there are a variety of Transport services, but the two most common are TCP and UDP. TCP is the more complicated, providing a connection and byte oriented stream which is almost error free, with flow control, multiple ports, and same order delivery. UDP is a very simple 'datagram' service, which provides limited error reduction and multiple ports. TCP stands for Transmission Control Protocol, while UDP stands for User Datagram Protocol. Other options are the Datagram Congestion Control Protocol (DCCP) and Stream Control Transmission Protocol (SCTP). Some things, such as connection orientation can be implemented at either Transport or Network layer. The idea is that the Network layer implements whatever set of options is easiest: for some underlying networks it is easiest to implement connectionless communication, while for others it is easiest to implement connection oriented communication. The Transport layer uses this simplest set of options to Logical Link Control Media Access Control Data Link Physical Media specifications Industrial Ethernet and Networking

33 Industrial Ethernet and Networking
Layer Four: Transport Provides transparent transfer of data between hosts. It is usually responsible error recovery and flow control, and ensuring complete data transfer. Reliable Data The Transport layer can detect and repair data errors. Flow Control The Transport layer controls the amount of data flow on the network. The amount of memory on a computer is limited, and without flow control a larger computer might flood a computer with so much information that it can't hold it all before dealing with it. Byte Orientation Rather than dealing with things on a packet-by-packet basis, the Transport layer may add the ability to view communication just as a stream of bytes. This is nicer to deal with than random packet sizes, however, it rarely matches the communication model which will normally be a sequence of messages of user defined sizes. Ports Ports are essentially ways to address multiple entities in the same location. Computer applications will each listen for information on their own ports, which is why you can use more than one network-based application at the same time. On the Internet there are a variety of Transport services, but the two most common are TCP and UDP. TCP is the more complicated, providing a connection and byte oriented stream which is almost error free, with flow control, multiple ports, and same order delivery. UDP is a very simple 'datagram' service, which provides limited error reduction and multiple ports. TCP stands for Transmission Control Protocol, while UDP stands for User Datagram Protocol. Other options are the Datagram Congestion Control Protocol (DCCP) and Stream Control Transmission Protocol (SCTP). Industrial Ethernet and Networking

34 Industrial Ethernet and Networking
IEEE Ethernet Carrier Sense Multiple Access/Collision Detection Devices wait until “the wire” is empty Allows two devices to try and talk at the same time Collisions occur (contention based) Has methods to handle collisions 802.3 is a broadcast network Collision Success Industrial Ethernet and Networking

35 Term Alert: Ethernet Ports
Port numbers are divided into three ranges: Well Known Ports Registered Ports Dynamic and/or Private Ports Industrial Ethernet and Networking

36 Industrial Ethernet and Networking
Term Alert: WAN Wide Area Network Wide-area networks (WANs) interconnect LANs with geographically dispersed users to create connectivity. Some of the technologies used for connecting LANs include T1, T3, ATM, ISDN, ADSL, Frame Relay, radio links, and others. New methods of connecting dispersed LANs are appearing everyday. Individual LAN’s (local area networks) that are connected to each other so they appear as a single, coordinated network to the users. A WAN may contain LAN’s in a single building or LAN’s in different countries. Industrial Ethernet and Networking

37 Industrial Ethernet and Networking
WAN PC PC Network: Routeable Corporate Router: InternetServiceProvider Plant A Plant B Router: Router: DX200 DARWIN DC100 Network: Routeable DX200 Network: Non-Routeable Using NAT PC PLC Industrial Ethernet and Networking

38 Industrial Ethernet and Networking
7 Layer OSI Model Layer 5,6,7 Specifications Application Application Layer HTTP, FTP & SMTP Presentation Session Error Checking Transport Network Logical Addressing Routing Logical Link Control Media Access Control Data Link Physical Media specifications Industrial Ethernet and Networking

39 What Can We Do on the Application Layer?
Configure Devices View operations remotely Control operations remotely Transfer data files Transfer graphics Industrial Ethernet and Networking

40 Industrial Ethernet and Networking
Term Alert: Web Server Web Server Application software embedded in a network device that automatically delivers a pre-formatted screen and data views to a PC when a browser (Internet Explorer or Netscape) connects to the device over a network. Uses software technology like html, JAVA, and CGI. Provides access with custom software! Industrial Ethernet and Networking

41 Industrial Ethernet and Networking
What is a Web Server ? PC( ) DX200 /C2 option MB master Industrial Ethernet and Networking

42 Configuration via Network
Industrial Ethernet and Networking

43 PNG Graphic Files via Network
Industrial Ethernet and Networking

44 Industrial Ethernet and Networking
Hardware Industrial Ethernet and Networking

45 Industrial Ethernet and Networking
Term Alert: NIC Network Interface Card A computer card containing and Ethernet controller chip and communications transceivers able to connect to the “wire” and talk using Ethernet rules and format. Laptop PCMCIA Card IEEE802.3 Desktop “NIC” Card IEEE802.3u Desktop “NIC” Card IEEE802.3 Laptop PCMCIA Card Wireless IEEE802.11 Industrial Ethernet and Networking

46 Industrial Ethernet and Networking
Hardware Layer 1 Devices Device Types Repeaters Media converters Hubs Function Signal regeneration Media conversion Isolate network faults by segmenting How they work Operate at the Ethernet physical layer Receive Messages, regenerate and repeat on all ports Application Presentation Session Transport Network Data Link Physical Industrial Ethernet and Networking

47 Industrial Ethernet and Networking
Hub: Good Performance All devices in the same collision domain All devices in the same Broadcast domain Devices share the same bandwith Industrial Ethernet and Networking

48 Data Flow in TCP/IP Networks
Hub LAN LAN Industrial Ethernet and Networking

49 Industrial Ethernet and Networking
Hardware Layer 2 Devices Device Types Bridges Switches Function Segmentation of Networks Speed Transition How they work Processes Ethernet header information Learns a node’s location by examining source address, forwards messages based on the destination address Application Presentation Session Transport Network Data Link Physical Industrial Ethernet and Networking

50 Switch: Better Performance
Each device has a unique collision domain All devices in the same broadcast domain Devices do not share bandwith Industrial Ethernet and Networking

51 Industrial Ethernet and Networking
Hardware Layer 3 Devices Device Types Routers Layer 3 Switch Function Coupling of subnets Network transition (ISDN – Ethernet) Internet Connectivity How they work Processe IP header information Forwards packets between networks based on Network layer information Application Presentation Session Transport Network Data Link Physical Industrial Ethernet and Networking

52 Router: Best Performance
Unique collision domain for each device Unique broadcast domain for each device Devices do not share bandwith Industrial Ethernet and Networking

53 Industrial Ethernet and Networking
Data Flow with a Switch Send Packet Hub Switch Send Reply Industrial Ethernet and Networking

54 Industrial Ethernet and Networking
Demo (Webserver) Industrial Ethernet and Networking

55 Industrial Ethernet and Networking
Term Alert: FTP File Transfer Protocol A format and procedure making it easy to send/receive/view files between devices on a network. DX uses FTP to automatically send files to a network server, eliminating need for manual collection of data files. Industrial Ethernet and Networking

56 DX=FTP Server, PC=FTP Client
PC “pulls” files PC( ) Client Using an FTP client on the PC, files on DX can be copied &deleted. Internet Explorer has an embedded FTP client. Server Industrial Ethernet and Networking

57 DX=FTP Client, PC=FTP Server
Using an FTP server on the PC, DX will automatically send files to the PC. DX “pushes” files Client Industrial Ethernet and Networking

58 Internet Information Services
Setup your PC as an ftp Server Internet Information Services (IIS) is the Windows component that makes it easy to publish information and bring business applications to the Web. IIS makes it easy for you to create a strong platform for network applications and communications. Industrial Ethernet and Networking

59 Industrial Ethernet and Networking
FTP Demo Industrial Ethernet and Networking

60 Industrial Ethernet and Networking
Term Alert: SMTP & POP3 Simple Mail Transfer Protocol Post Office Protocol Version 3 SMTP is a protocol in OSI 7 layer model that defines format and procedure for a network device to send “ ” to another device on the network. POP3 is a protocol that defines how to retrieve on the Internet Industrial Ethernet and Networking

61 Industrial Ethernet and Networking
Server/Client PC( ) Argosoft Mail server SMTP POP DX with SMTP Industrial Ethernet and Networking

62 Industrial Ethernet and Networking
Demo Industrial Ethernet and Networking

63 Terminal/Device Servers
Device Servers enable non-Ethernet ready products to communicate via Ethernet(TCP/IP). Virtual Com Port Redirector COM5 = :3001 Yokogawa Chart Recorder Serial RS422 Interface Device Server IP Address Industrial Ethernet and Networking

64 Industrial Ethernet and Networking
Term Alert: OPC OLE for Process Control A software standard developed by hardware vendors, software vendors and end users that specifies a common client/server interface format between hardware and software. SCADA/HMI vendors create OPC clients. Hardware vendors create OPC servers. Industrial Ethernet and Networking

65 Industrial Ethernet and Networking
The OPC Concept PC Running OPC Server Plant Information Management Software Yokogawa Exaquantum OSI PI Aspentech SCADA/HMI Software Wonderware Intellution Iconics RSView Lookout Ethernet or Serial Interfaces Other Vendor Devices Industrial Ethernet and Networking

66 Industrial Ethernet and Networking
OPC Demo Industrial Ethernet and Networking

67 Industrial Ethernet and Networking
MODBUS Protocol MODBUS, a defacto standard from Modicon Three basic types, RTU, ASCII, TCP MODBUS TCP is over Ethernet MODBUS Plus is an enhanced peer to peer Modbus TCP is Modbus Protocol encapsulated in a TCP Packet. Industrial Ethernet and Networking

68 Industrial Ethernet and Networking
MODBUS: DX to SLC500 A-B PLC with Prosoft MODBUS card Daqstation RS422/485 Modbus provides a common interface between hardware from multiple products. Industrial Ethernet and Networking

69 MODBUS: Extended Inputs
DAQSTATION RS422/RS485 Modbus Master Device DARWIN I/O RS422/485 Modbus Slave Device Ethernet 30 Analog Inputs via Modbus RS422/485 Serial 30 Analog Inputs 30 Analog Inputs Industrial Ethernet and Networking

70 MODBUS: External Controllers
DAQSTATION CX RS422/RS485 Modbus Master Device Ethernet 16 Single Loop Controllers via Modbus RS422/485 Serial 20 Analog Inputs Industrial Ethernet and Networking

71 Foundation Fieldbus World's First FOUNDATIONTM Fieldbus-Compatible Recorder DAQSTATION will support the FOUNDATIONTM Fieldbus that's becoming the bi-directional digital communication standard for instrumentation in the 21st century. The FOUNDATIONTM Fieldbus can: ◆Dramatically increase the amount of data transmitted. ◆Drastically reduce the wiring costs. ◆Support a multivendor environment. ◆Simplify control. DPharp EJA Digital differential pressure transmitter YEWFLO Vortex flowmeter ●Device type: Link master ●Function blocks AI: 8 blocks MAI: 8 channels  1 block MAO: 8 channels  1 block YVP Valve positioner DAQSTATION YTA Temperature transmitter ADMAG-AE Electromagnetic flowmeter Industrial Ethernet and Networking

72 Fieldbus Applications
Industrial Ethernet and Networking

73 Fieldbus Applications
Industrial Ethernet and Networking

74 Fieldbus Applications
Industrial Ethernet and Networking

75 Industrial Ethernet and Networking
Recap VPN Server IP: SN: DG: Hub ?.? INTERNET Remote User VPN Client Typical Office LAN Typical Data Acquisition LAN Ftp Server Primary Secondary LAN Router WAN Router PI Database ISP IP: IP: IP: Industrial Ethernet and Networking

76 Industrial Ethernet and Networking
Additional Resources - Copy of PowerPoint - PDF’s of tutorials and white papers - Links to useful sites Industrial Ethernet and Networking

77 What You Will Learn Today
Introduction to basic network concepts Radio frequency and spread spectrum technology basics Wired and wireless standards Wireless topologies (Ad Hoc vs. Infrastructure) Security in wireless networks Setting up an office grade wireless router Radio Physics Types of wireless radios (industrial and office) Implementation issues (antennaes, site surveys) Typical uses of wireless in industrial settings Industrial Ethernet and Networking

78 Microwaves, RC Cars, Cordless Phones, & Door Openers
These everyday devices use radio frequency technology Microwave (2.5 GHz) RC Toys (27 or 49 MHz) Garage Door Opener ( MHz) Cordless Phones (900MHz, 2.4GHz, 5.8GHz) Industrial Ethernet and Networking

79 A Look At Radio Frequencies
Radio frequency spectrum is assigned by governments CB radio: MHz FM radio: MHz WiFi for PC’s: 2.4 GHZ Licensed vs. Unlicensed bands Licensed provides more power! Two licensed frequency bands 400 MHz 900 MHz 3 unlicensed frequency bands in U.S. ISM bands (Industrial, Scientific, Medical) MHz 2.4 to GHz 5.725 to GHz (U-NII*) . *Unlicensed National Information Infrastructure Industrial Ethernet and Networking

80 Frequencies By Country
North America License-free 900MHz, 2.4 GHZ, and 5.4 GHZ spread spectrum Licensed 400MHz to 500MHz fixed frequency Europe License-free 433 MHz (all countries) UK, Sweden, Finland, Spain, Portugal, Poland, Czech also have special channels in the 400 MHz band 869MHz 500mW 10% duty factor or 5mW 100% duty factor Licensed 450MHz (most countries) South America License-free 900MHz spread spectrum (most countries) Asia License-free 450MHz (Singapore, Hong Kong) License-free 220MHz fixed frequency (China) Licensed 400MHz to 500 MHz fixed frequency (most countries) Middle East Licensed 900MHz spread spectrum (some countries) Africa License-free 433MHz (some countries) Industrial Ethernet and Networking

81 Sending Information by Radio
Start with “data” Modulate the data “over” the fixed frequency carrier Resulting signal has data Industrial Ethernet and Networking

82 Narrow Band vs. Spread Spectrum
Two approaches for signal delivery Spread Spectrum is our interest for Office and Industrial Industrial Ethernet and Networking

83 Industrial Ethernet and Networking
Who is this Woman? Hedwig Eva Maria Kiesler Industrial Ethernet and Networking

84 What is Spread Spectrum?
The signal from the radio transmitter is “spread” across a wider range of radio frequency than is required for standard narrow band applications (like FM radio) Original application of spread spectrum was Military Industrial radios use spread spectrum technology Lower power density (less power at any given frequency) Higher noise immunity and resistance to interference Improved security Two types of spread spectrum Direct Sequence (DSSS) Frequency Hopping (FHSS) Industrial Ethernet and Networking

85 A Bit of History : The Frequency Hopping Patent
In the United States Hedy Lamarr and George Antheil, shunned by the Navy, no longer pursued their invention. But in 1957, the concept was taken up by engineers at the Sylvania Electronic Systems Division, in Buffalo, New York. Their arrangement, using, of course, electronics rather than piano rolls, ultimately became a basic tool for secure military communications. It was installed on ships sent to blockade Cuba in 1962, about three years after the Lamarr-Antheil patent had expired. Subsequent patents in frequency changing, which are generally unrelated to torpedo control, have referred to the Lamarr-Antheil patent as the basis of the field, and the concept lies behind the principal anti-jamming device used today, for example, in the U.S. government's Milstar defense communication satellite system. Heddy Lamarr Industrial Ethernet and Networking

86 FHSS Frequency Hopping DSSS Direct Sequence
Back to Basics The Two Commonly Used Types of Spread Spectrum Technology FHSS Frequency Hopping DSSS Direct Sequence Industrial Ethernet and Networking

87 DSSS (Direct Sequence Spread Spectrum)
DSSS “Spreads” the message across a wide frequency Base transmission is centered at a specific frequency Transmitted with frequency changing many times per data bit Multiple copies of each original data bit are sent at different frequencies Transmission at each frequency is sent at lower power Industrial Ethernet and Networking

88 Industrial Ethernet and Networking
DSSS Encoding Scheme Encoding is done in the data stream before transmission Direct sequence encoding uses psuedo-random noise generator (PN) Each data bit is encoded into a longer data string Resulting longer message is now encrypted, only matching radio can decode 1 = 10110 0 = 01001 THE WIRELESS OPTION FOR INDUSTRIAL ETHERNET Industrial Ethernet and Networking

89 DSSS Signal Advantages
Encoded data looks like noise Transmission is sent at low power so it is harder to detect RFI noise can easily be discriminated from data signal Industrial Ethernet and Networking

90 FHSS (Frequency Hopping Spread Spectrum)
FHSS moves the message between different frequencies A single data packet is transmitted at one frequency The radio then “hops” to a new frequency to transmit the next packet Transmitter and receiver are programmed with the same hop pattern The frequency hops appear random to observers Hopping avoids interference (usually narrow band at one frequency) Redundancy is achieved by re-transmitting at different frequency Industrial Ethernet and Networking

91 Industrial Ethernet and Networking
FHSS Encoding Frequency hopping encoding is done at transmission The hop pattern for the frequency is encoding Data itself is not directly encoded (as in direct sequence) Observed frequencies do not show any obvious pattern THE WIRELESS OPTION FOR INDUSTRIAL ETHERNET Industrial Ethernet and Networking

92 Comparison of DSSS vs. FHSS
DSSS encodes the data FHSS encodes the frequency Data speed: DSSS has higher rates (FHSS has hop latency ) Power: FHSS is lower power (DSSS has complex circuits) Cost: FHSS is generally lower in cost Robustness: FHSS has stronger noise immunity Density: More FHSS in one area than DSSS Data Accuracy: DSSS wins on this one Industrial Ethernet and Networking

93 OFDM: Orthogonal Frequency Division Multiplexing
A Third Type of Spread Spectrum Technology ! Used in g and a home/office radios Provides higher data rates Uses multiple sub-carrier frequencies each centered at different frequencies Breaks the data message into parts Transmits all the parts at the same time using the sub-carriers Fast transmission is sent as many parallel slow transmissions Not used in current generation of industrial radios Industrial Ethernet and Networking

94 Industrial Ethernet and Networking
Quick Quiz #1 Do industrial radios use narrow band or spread spectrum technology? Spread spectrum Name the 2 types of spread spectrum technology used in industrial radios DSSS: Direct Sequence Spread Spectrum FHSS: Frequency Hopping Spread Spectrum Which is capable of higher speeds, DSSS or FHSS? DSSS ISM is an abbreviation for what? Industrial, Scientific, and Medical How many ISM bands exist? Three Are the ISM bands licensed or unlicensed? Unlicensed What are the frequencies of the ISM bands? 900 MHz, 2.4 GHz, 5.8 GHz What is the primary advantage of a licensed band? More power than unlicensed bands (i.e. more power is more distance) Industrial Ethernet and Networking

95 Wired & Wireless Standards
802.3 802.3i 802.5 802.3u 802.3af 10base-T ethernet Token Ring (IBM…) 100base-TX ethernet Powered ethernet 802.3ab 1000base-T gigabit copper Wireless WPAN (wireless personal area network) 802.1x 802.11 802.11a 802.11b 802.11g 802.16 802.15 54 Mbps at 5.4 GHz “Wi-Fi”, 11 Mbps in 2.4 GHz 54 Mbps at 2.4 GHz Bluetooth Zigbee WMAN (wireless metropolitan area network) WLAN (wireless local area network) Industrial Ethernet and Networking

96 Industrial Ethernet and Networking
Wireless Standards 802.11 1 or 2 Mbps transmission in the 2.4 GHz band Frequency hopping spread spectrum (FHSS) Direct sequence spread spectrum (DSSS) 802.11b (2.4 to GHz) Data speeds to 11Mbps DSSS only Wi-Fi is interoperability standard for b (WECA) 802.11g (2.4 to GHz) 54 Mbps speed extension of b with OFDM Backward compatible with b for <11 Mbps 802.11a (5.15 to GHz) Data speeds to 54 Mbps 300 MHz bandwidth indoor, OFDM Orthogonal frequency division multiplexing (OFDM) Industrial Ethernet and Networking

97 Wireless G w/Speedbooster Industrial Ethernet and Networking
Wireless A B G Wireless Standard Wireless B Wireless G ( G) Wireless G w/Speedbooster Wireless A/G Wireless G with SRX Wireless G with SRX200 Wireless G with SRX400                                                            N/A Up to 5 Times Faster Than Wireless B 35% Faster than Wireless G Uncrowded 5GHz Band Up To 8X Faster than Wireless G. Range up to 3X farther Up To 6X Faster than Wireless G. Range up to 2X farther Up To 10X Faster than Wireless G. Range up to 3X farther                                   2.4Ghz 2.4Ghz & 5Ghz Typically Up To 150ft Up to 150 ft Up to 150 ft (Wireless G) Up to 150 ft (Wireless G) Up to 3X farther than Wireless G Up to 2X farther than Wireless G More Popular Standards for hotspots Yes Yes in a Wireless-G Mode Growing use in Wireless-A 802.11b & g 802.11a, b & g 802.11b & g Based on MiMo Technology Legacy Standard Fast Speed Faster Speed Fast Speed with less interferance from other Wireless LANs. Works with all wireless standards Farthest Range & Fastest Speed Superior Range & Superior Speed Premium Range & Speed Wireless-B (802.11b) - Operates on the 2.4GHz frequency band and can transmit data at speeds of up to 11Mbps within a range of up to feet. Wireless range can be affected by reflective or signal-blocking obstacles, such as mirrors, walls, devices and location, whether indoors or outdoors. Learn more about network speeds. Wireless-A (802.11a) - Operates at the frequency of 5GHz, which is less crowded than 2.4GHz where telephones and microwaves may cause interference. Although the speed is up to 54Mbps, the range is only up to 75 feet. Wireless-A is incompatible with both Wireless-B and G because it operates at a different frequency. Wireless-A+G (802.11a + g) - Linksys also offers dual-band products, in which routers and adapters are compatible with both 2.4GHz and 5GHz frequencies. Both radio bands work simultaneously, blanketing your wireless zone and bandwidth. Wireless-G (802.11g) - Features the same benefits as Wireless-B, but offers 5X the speed at up to 54Mbps. Wireless-G currently offers the best combination of performance and value. You can mix Wireless-B with Wireless-G equipment, but you will lose the higher performance speeds of Wireless-G. Wireless-N (802.11n) - The next generation of high-speed wireless networking, capable of delivering the range and capacity to support today's most bandwidth-hungry applications like streaming high definition video, voice, and music. Wireless-N is based on MIMO (Multiple Input, Multiple Output) technology, which uses multiple radios to transmit multiple streams of data over multiple channels. Learn more. Industrial Ethernet and Networking

98 Why are the Standards numbered 802?
IEEE’s development of LAN standards was assigned the project number 802, for February 1980 when the committee convened. Get it? 2/80 or 802 Industrial Ethernet and Networking

99 Industrial Ethernet and Networking
Quick Quiz #2 What is the 802 sub-designation for wireless technologies 802.11 802.11b is known by the common name of ? Wi-Fi The max data rate of b is ??? Mbps 11 Mbps True or False, b supports both FHSS and DSSS? False. FHSS is not available in b. FHSS is too slow to support 11 Mbps True or False, All industrial radios support standards False, many industrial radios use proprietary FHSS or DSSS A microwave oven could interfere with which technologies 802.11b and g because they are 2.4 GHz & a microwave is 2.5 GHz Industrial Ethernet and Networking

100 Wireless Topologies: Ad-Hoc vs. Infrastructure
Ad-Hoc (or point-to-point) 2 or more network devices transfering data directly between themselves. Most efficient network with a minimum of network overhead Infrastructure (or access point) With this network one of the Ethernet radio modems is configured as the "access point ". Access Point is then used as a wireless bridge to the cabled LAN network. All nodes (either wireless cards or other Ethernet radio modems configured as remotes) communicate only with the Access Point that serves the WLAN as a HUB THE WIRELESS OPTION FOR INDUSTRIAL ETHERNET by Eric Marske from Industrial Ethernet and Networking

101 A Little About Channels in 802.11b/g
2.473 GHz 2.462 GHz 2.412 GHz 1 2 3 4 5 6 7 8 9 10 3 MHz 2.401 GHz 22 MHz 11 channels with each channel 22MHz in width. Each channel is centered at 5MHz intervals starting at 2.412GHz and ending at 2.462GHz . 802.11b and g standards have a maximum of three non-overlapping channels carrying 11 Mbps throughput each (33 Mbps total) and 54 Mbps (162 Mbps total) throughput 802.11a has a maximum of eight non-overlapping channels carrying 54 Mbps throughput each, or 432 Mbps total throughput. Industrial Ethernet and Networking

102 Linksys G Wireless Router Industrial Ethernet and Networking
Our Wireless Network 802.11b wireless 802.11g wireless Linksys G Wireless Router Radiolinx CX1000 UT351 MX100 FA-M3 PLC Industrial Ethernet and Networking

103 Hands-On #1: Setting Up an Office 802.11g Router
Use web configuration to setup wireless router IP address Keep SSID at default of linksys Set up channel (1 thru 11) Do not activate WEP encryption Activate DHCP (dynamic host configuration protocol) FA-M3 PLC 802.3 10baseT hardwire (internal wireless) 802.11g wireless Industrial Ethernet and Networking

104 Industrial Ethernet and Networking
Security Industrial Ethernet and Networking

105 Industrial Ethernet and Networking
Security SSID (Service Set IDentifier) - Your wireless network's name. WEP (Wired Equivalent Privacy) - A method of encrypting data transmitted on a wireless network for greater security. WPA (Wi-Fi Protected Access ) -WPA was designed to be a replacement for WEP networks without requiring hardware replacements. Now WPA2 is being offered. WPA and WEP are technologies that "encrypt" the traffic on your network. That is, they scramble it so that an attacker can't make any sense of it. To unscramble it at the other end, all systems using it must know a "key" or password. Note that WPA is now in a second generation, referred to as WPA2. Unless otherwise specified, this document uses "WPA" to refer to both. WPA and WEP provide both access control and privacy. Privacy comes from the encryption. Access control comes from the fact that someone must know the password to use your network. For this reason, for small networks, using WPA is enough to meet the requirements of the Wireless policy. However you will still want to make sure that any services that use a password or other private information use SSL or some other type of end to end encryption. WEP is significantly less secure than WPA, but can be used until your equipment can be upgraded to support WPA. While WEP is widely regarded as insecure, it is still a lot better than nothing. WPA has two modes, personal and enterprise. For small installations you'll want to use personal mode. It just requires a password. Enterprise mode is for larger installations, that have a Radius server that will support WPA. The primary problem with WPA in personal mode is that it has a single password, which you must tell to all users. That becomes impractical for larger installations. WPA in enterprise mode requires each user to login with their own username and password. That simplifies management in large installations, because you don't have to distribute a common password to all your users. However it is a bit more complex to implement: Each user's system must have special software to let the user login to the network. This software is referred to as an "802.1x supplicant". The access point must support WPA enterprise mode. The access point is configured to talk to a RADIUS server, which is a central server that actually checks the password. You must have a RADIUS server that supports WPA enterprise mode. While the RADIUS server may have its own list of usernames and passwords, it would be more common for it to talk to an LDAP or Active Directory server, so that users login to the network with the same password that they use for other services. For this reason, most large implementations at Rutgers do not use enterprise mode. Instead they use separate gateway boxes for access control, and depend upon end to end encryption for privacy. One can argue that this is not as secure as WPA enterprise mode, but it avoids the support implications of requiring users to login to the network with an 802.1x supplicant. Industrial Ethernet and Networking

106 Industrial Ethernet and Networking
A Few Terms VPN – “Virtual Private Network” Creates another layer of networking on top of wireless. This layer is encrypted. Independent of any weakness in the network technology Unfortunately SSL and SSH are not yet sufficiently widespread that we can be sure all activity is covered by one or the other of them. Another approach is to use VPN ("virtual private network") technology. This creates another layer of networking on top of the wireless network. This layer is encrypted. Because VPNs are implemented in software (at least on the user's end), they are independent of any weaknesses in the network technology, and they can be used with any vendor's network cards. Windows and several other operating systems come with the software needed to use a VPN. However you will need to supply something on the other end. There are similarities between SSL/SSH and a VPN: both encrypt your communications. The difference is that SSL and SSH are used for individual connections. E.g. when you are talking to a web server using SSL, the specific connection between you and the web server is encrypted using SSL. With a VPN, all of your traffic goes through a single encrypted connection. If every service you talk to supports SSL or SSH, the result is the same. A typical VPN setup will look like this: The VPN box should be configured so that users must establish a VPN from their laptop to it. In the process of establishing the VPN, they need a username and a password. Thus this approach deals with both access and privacy issues. It deals with access issues, because users must specify a username and password in order to establish the VPN. It deals with privacy issues because all traffic is encrypted. The significant drawbacks to VPNs are All users will need to set up VPN software. This may require significant user support. There are situations where this approach is probably not practical. The primary one involves guests. If you take this approach, you need to think about how you will handle guests. E.g. if you host a conference, and attendees expect to use laptops, it may not be practical to get all of them to set up VPN software. You may also have people from other institutions that need to access their home institutions using a corporate firewall. It is normally not practical to use two VPN's at once. So if someone needs to use VPN software to get into their home network, they probably will not be able to use your wireless VPN. For these reasons people implementing this approach should plan on having the ability for selected users to bypass the VPN. However this bypass needs to be controlled so that normal Rutgers users don't use it. Otherwise their passwords will be compromised. Industrial Ethernet and Networking

107 So What About Security in Wireless?
The first and obvious weakness of wireless is “no wire” Three Popular “hacking” methods 1) MAC Address Spoofing Packets transmitted over a network, either your local network or the Internet, are preceded by a Packet Header. These packet headers contain both the source and destination information for that packet. A hacker can use this information to spoof (or fake) a MAC Address allowed on the network. With this spoofed MAC Address, the hacker can also intercept information meant for another user. 2) Data Sniffing Data "sniffing" is a method used by hackers to obtain network data as it travels through unsecured networks, such as the Internet. Tools for just this kind of activity, such as protocol analyzers and network diagnostic tools, are often built into operating systems and allow the data to be viewed in clear text. 3) Man in the Middle Attacks Once the hacker has either sniffed or spoofed enough information, he can now perform a "man in the middle" attack. This attack is performed, when data is being transmitted from one network to another, by using this information to reroute the data and appear to be the intended destination. This way, the data appears to be going to its intended recipient. From Linksys VPN whitepaper Industrial Ethernet and Networking

108 How to Improve Basic Security in 802.11 Networks
Let’s look at a live example with the Linksys router Change SSID (must know or guess SSID to connect) Turn off SSID broadcast (cannot automatically see network) Activate WEP encryption (data is visible but not readable) Turn off DHCP (Even if you connect, you must guess IP) Activate MAC filtering (Must specify MAC address) Industrial Ethernet and Networking

109 A Quick Comparison: Office vs. Industrial
32 mW 200 feet indoors 0 C to 40 C Plastic Power Distance Operating Temp Construction Mounting 500 mW 20 miles outdoor -30 C to 60 C Aluminum Industrial Ethernet and Networking

110 Hands-On #2: Setting Up an Industrial 802.11b radio
Use web configuration to setup wireless router IP address Set up SSID as Radiolinx Set up channel as 1 Activate WEP encryption to improve security 802.3 10baseT hardwire (internal wireless) UT351E Controller 802.11b wireless Industrial Ethernet and Networking

111 A Few Quick Points on RF Propogation
Higher frequencies have higher data rates (bandwith) There is 1000 times more spectrum between 1-2 GHz as there is between 1-2 MHz. RF waves lose power as they travel in the air Higher frequencies lose power (attenuate) faster RF waves attenuate as they pass through objects Higher frequencies attenuate faster Lower Frequencies (i.e. 900 mHz have greater distance) Industrial Ethernet and Networking

112 Performance of 2.4 GHZ vs. 900 MHz
2.4 GHz has 10-20% of the reliable distances of 900 MHz 900 MHz has 5-10 times the distance of 2.4 GHz inside Typical Outdoors with Line of Sight 2.4GHz, 1W plus 6dB gain antennas 5 – 15 miles 900MHz, 1W plus 6dB gain antennas 15 – 25 miles 2.4GHz, 100mW plus 16dB antennas 10 – 40 miles 900MHz, 100mW plus 16dB antennas 20 – 60 miles 2.4GHz, 1W 100 – 600 feet 900MHz, 1W 500 – 5000 feet Typical Indoors in Congested Environment Industrial Ethernet and Networking

113 Office vs. Industrial Radios
Radio linx FH Radio linx Hotspot MDS iNet900 Industrial Ethernet and Networking

114 The Physics of Radios: Terms and Formulas
What is a decibel (dB)? RF power calculation basics EIRP (Effective Isotropic Radiated Power) Types of propogation losses (attenuation) Free space loss Penetration loss Multipath fading Near/far problem in DSSS radios Interference from other RF sources Collocation Industrial Ethernet and Networking

115 Industrial Ethernet and Networking
What is a decibel? The decibel (abbreviated dB) must be the most misunderstood measurement since the cubit. Although the term decibel always means the same thing, decibels may be calculated in several ways, and there are many confusing explanations of what they are. The decibel is not a unit in the sense that a foot or a dyne is. Dynes and feet are defined quantities of force and distance. A decibel is a RELATIONSHIP between two values of POWER. Decibels are designed for talking about numbers of greatly different magnitude, such as 23 vs. 4,700,000,000,000. With such vast differences between the numbers, the most difficult problem is getting the number of zeros right. We could use scientific notation, but a comparison between 2.3 X 10 and 4.7 X 1012 is still awkward. For convenience, we find the RATIO between the two numbers and convert that into a logarithm. This gives a number like As long as we are going for simplicity, we might as well get rid of the decimal, so we multiply the number times ten. If we measured one value as 23 hp and another as 4.7 trillon hp, we say that one is 113dB greater than the other.                                        The usefulness of all this becomes becomes apparent when we think about how the ear perceives loudness. First of all, the ear is very sensitive. The softest audible sound has a power of about watt/sq. meter and the threshold of pain is around 1 watt/sq. meter, giving a total range of 120dB. In the second place, our judgment of relative levels of loudness is somewhat logarithmic. If a sound has 10 times the power of a reference (10dB) we hear it as twice as loud. If we merely double the power (3dB), the difference will be just noticeable. [The calculations for the dB relationships I just gave go like this; for a 10 to one relationship, the log of 10 is 1, and ten times 1 is 10. For the 2 to one relationship, the log of 2 is 0.3, and 10 times that is 3. Incidentally, if the ratio goes the other way, with the measured value less than the reference, we get a negative dB value, because the log of 1/10 is -1.] Decibels measure the power of a radio system! Industrial Ethernet and Networking

116 Understanding Gain Measurements
Antenna performance is primarily established by its gain. There are three common references used when defining gain in radios: Gain referenced to a dipole antennae: dBd Gain referenced to an isotropic source: dBi Gain referenced to power in milliwatts: dBm Industrial Ethernet and Networking

117 Understanding Power in Radios
RF transmitter and receiver power is expressed in watts. RF power can also be expressed in dBm (decibels relative to milliwatts) dBm for RF power is useful when calculating radio system gains (since other gains and losses from cables & Antennas are in dB’s) The relation between dBm and watts can be expressed as follows: Power(dBm) = 10 x Log10 Power(mW) 1 Watt = 1000 mW; PdBm = 10 x Log10(1000) = 30 dBm 100 mW; PdBm = 10 x Log10 (100) = 20 dBm 1mW: PdBm = 10 x Log10 (1) = 0 dBm Power(mW) = 10(Power(dBm)/10) 15 dBm = 10 (15/10) = 10 (1.5) = 32 mW Industrial Ethernet and Networking

118 Industrial Ethernet and Networking
A Table of mW to dBm Industrial Ethernet and Networking

119 EIRP (Effective Isotropic Radiated Power)
EIRP is the effective power transmitted from the antenna. EIRP = (power at transmitter) - (cable attenuation) + antenna gain EIRP = Pout - Ct - Gt Pout = output power of transmitter in dBm Ct = transmitter cable attenuation in dB Gt = transmitting antenna gain in dBi Take the following example: transmitter power out = Pout = 50mW cable loss (attenuation) = Ct = 4dB transmitting antenna gain = Gt = 6 dBi convert transmitter power from mW to dBm 10 x log (50/10) = 17 dBm EIRP = 17dBm - 4 dBm + 6 dBm = 19 dBm Industrial Ethernet and Networking

120 Industrial Ethernet and Networking
Path Loss Industrial Ethernet and Networking

121 Link Budget Calculation
Industrial Ethernet and Networking

122 Industrial Ethernet and Networking
Antenna Basics Industrial Ethernet and Networking

123 Extra Power: A Gift from the FCC
The FCC had already decided to place a limit of +36 dBm (4 watts) Effective Isotropic Radiated Power (EIRP) on Multi-Point WLAN links, and a maximum power of +30 dBm (1 watt) at the WLAN tranmitter's connector. So they also defined that if any antenna used in point-to- point links has a gain higher than 6 dBi, the transmitter power must be reduced so that the "peak output power of the intentional radiator" is reduced by 1 dB for every 3 dB of antenna gain beyond 6 dBi. This is a gift from the FCC. It allows point-to-point WLANs to achieve an EIRP well in excess of +36 dBm, and the greater range that results from the higher power. Here is a table of some typical values: Industrial Ethernet and Networking

124 Discuss RSSI Sensivitiy Calculations
Look at specs with RSSI -dBm and BEC rate…. Industrial Ethernet and Networking

125 Factors Affecting Performance
Higher frequency signals show bigger losses Multipath fading Near/far problem in DSSS radios Interference from other RF sources Collocation Industrial Ethernet and Networking

126 Industrial Ethernet and Networking
Attenuation Industrial Ethernet and Networking

127 Industrial Ethernet and Networking
Multipath Industrial Ethernet and Networking

128 Industrial Ethernet and Networking
Near/far Industrial Ethernet and Networking

129 Industrial Ethernet and Networking
Interference Industrial Ethernet and Networking

130 Industrial Ethernet and Networking
Collocation Industrial Ethernet and Networking

131 Industrial Ethernet and Networking
Typical Distances MDS iNet900 Elpro Radio linx The End Result (elpro technical article 1.1 “Wireless Solutions for Process Applications) The end result of the effects of RF power, propagation losses, penetration attenuation, defraction and reflection loss is that 2.4GHz has only a very short reliable operating distance in industrial environments - with reliable distances of only around 10-20% of the lower frequency bands. That is, the lower frequency bands reach 5-10 times the distance in plants and factories. In many applications, distances of more than 100 metres (300 feet) cannot be achieved with 2.4GHz over congested obstructed paths. This is an important factor, as for most 100 metre applications, it is still cheaper to install wiring than use wireless. Industrial Ethernet and Networking

132 Industrial Ethernet and Networking
Speed vs. Distance Industrial Ethernet and Networking

133 Transmission Technology Options
Industrial Ethernet and Networking

134 Industrial Ethernet and Networking
Elpro II Industrial Ethernet and Networking

135 Industrial Ethernet and Networking
What is a Mesh Radio? WPAN Bluetooth Zigbee Features Bi-directional Self-forming Self-healing Industrial Ethernet and Networking

136 Industrial Ethernet and Networking
Other Radio Types Mesh Cellular (CDPD) Satellite Industrial Ethernet and Networking

137 Radiolinx Products sold by Yokogawa
RLX-FHE: Frequency Hopping Ethernet ($1,395 per radio) Use with Ethernet DAQ/FA-M3/Controllers Does not use b so it will not link to PC wireless RLX-FHS: Frequency Hopping Serial ($1,250 per radio) Use with serial DAQ/FA-M3/Controllers Supports MODBUS RTU Runs Yokogawa protocol in transparent mode RLX-FHES: Frequency Hopping Ethernet with serial server ($1,495 per radio) Has RS232/RS485 port built-in Use when you need to get serial protocol into Ethernet RLX-IH: b “HotSpot” ($1,549) Use when you need Ethernet with PC wireless connectivity Antennas, connectors and cables are also available from Yokogawa Industrial Ethernet and Networking

138 RLX-FHE Frequency Hopping Ethernet (2.4GHz)
$1,395 per radio Mobile configuration and data logging without wires! Frequency hopping 2.4 GHz unlicensed (ISM band) Not compatible with wireless (Wi-Fi) Designed for industrial environment (-40 to 158 degF) Up to 16 mile range with line of sight with hi gain antennas Proprietary radio frequency protocol (158 hopping patterns) 40 or 128 bit hardware data encryption Industrial Ethernet and Networking

139 RLX-FHE Frequency Hopping Ethernet (2.4 GHz)
Data from Remote DX100’s is Consolidated in PC PC running: DAQStandard (configuration) DAQLogger SCADA/HMI with OPC RLX-FHE DX104 RS232 MODBUS RTU Slave #1 RLX-FHE DX104 10BaseT Ethernet RLX-FHE RS232 MODBUS RTU Slave #2 RLX-FHE DX104 RS232 MODBUS RTU Slave #3 Industrial Ethernet and Networking

140 RLX-FHS Frequency Hopping Serial (2.4GHz)
$1,250 per radio Mobile data logging without wires! Frequency hopping 2.4 GHz unlicensed (ISM band) Modbus RTU, Modbus ASCII, DF1, generic ASCII RS232, RS422, or RS485 Flexible set-up modes Point to point Point to multi-point Peer to peer Designed for industrial environment (-40 to 158 degF) Up to 16 mile range with line of sight with hi gain antennas Proprietary radio frequency protocol (158 hopping patterns) 40 or 128 bit hardware data encryption Industrial Ethernet and Networking

141 RLX-FHS Frequency Hopping Serial (2.4 GHz)
Data from Remote DX100’s is Consolidated in DX200 RLX-FHS DX104 RS232 MODBUS RTU Slave #1 10BaseT Ethernet RLX-FHS DA100 RLX-FHS RS485 MODBUS RTU Slave #2 RS232 MODBUS RTU DX220 RLX-FHS UT450 RS485 MODBUS RTU Slave #3 Industrial Ethernet and Networking

142 RLX-IH 802.11b Industrial Wireless Radio
$1,549 per radio Mobile configuration and data logging without wires! 802.11b direct sequence spread spectrum radios Can be implemented with a single radio! 2.4 GHz unlicensed (ISM band) Compatible with standard PC wireless cards Designed for industrial environment Up to 20 mile range in outdoor settings Industrial Ethernet and Networking

143 UT351 with Radiolinx 802.11b Hotspot
Laptop with b “Wi-Fi” wireless ability Laptop with b “Wi-Fi” wireless ability Industrial Ethernet and Networking

144 Advanced Security Issues for 802.11
Security Enhancements to Encryption & Authentication TKIP – Temporal Key Integrity Protocol – interim solution AES – Advanced Encryption Algorithm – new hardware 802.1x Authentication Framework included in i Authentication protocol (EAP-TTLS, LEAP) Dynamic encryption key distribution method Supported in Windows XP Linksys wants to make wireless networking as safe and easy for you as possible. So, please keep the following points in mind whenever setting up or using your wireless network. 1. Performance. The actual performance of your wireless network depends on a number of factors, including: In an Infrastructure environment, your distance from the access point. As you get farther away, the transmission speed will decrease. Structural interference. The shape of your building or structure, the type of construction, and the building materials used may have an adverse impact on signal quality and speed. The placement and orientation of the wireless devices. 2. Interference. Any device operating in the 2.4 GHz spectrum may cause network interference with a b wireless device. Some devices that may prove troublesome include 2.4 GHz cordless phones, microwave ovens, adjacent public hotspots, and neighboring b wireless LANs. 3. Security. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation. While the following is a complete list, steps A through E should, at least, be followed: Change the default SSID. Disable SSID Broadcasts. Change the default password for the Administrator account. Enable MAC Address Filtering. Change the SSID periodically. Enable WEP 128-bit Encryption. Please note that this will reduce your network performance. Change the WEP encryption keys periodically. For information on implementing these security features, please refer to the User Guide. 4. Security Threats Facing Wireless Networks Wireless networks are easy to find. Hackers know that in order to join a wireless network, wireless networking products first listen for  "beacon messages".   These messages are unencrypted and contain much of the network’s information, such as the network’s SSID (Service Set Identifier) and the IP Address of the network PC or access point. One result of this, seen in many large cities and business districts, is called “Warchalking”. This is one of the terms used for hackers looking to access free bandwidth and free Internet access through your wireless network. Here are the steps you can take: Change the administrator’s password regularly.  With every wireless networking device you use, keep in mind that network settings (SSID, WEP keys, etc.) are stored in its firmware. Your network administrator is the only person who can change network settings. If a hacker gets a hold of the administrator’s password, he, too, can change those settings. So, make it harder for a hacker to get that information. Change the administrator’s password regularly. SSID. There are several things to keep in mind about the SSID: Disable Broadcast Make it unique Change it often Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID. Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use. Change your SSID regularly so that any hackers who have gained access to your wireless network will have start from the beginning in trying to break in. MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address. WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a panacea for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult. There are several ways that WEP can be maximized: Use the highest level of encryption possible Use a “Shared” Key Use multiple WEP keys Change your WEP key regularly Implementing encryption will have a negative impact on your network’s performance. If you are transmitting sensitive data over your network, encryption should be used. These security recommendations should help keep your mind at ease while you are enjoying the most flexible and convenient technology Linksys has to offer. Industrial Ethernet and Networking

145 Security Issues for FHSS and DSSS
Breezecom FHSS DSSS Industrial Ethernet and Networking

146 Example of Security Setup in Linksys
Industrial Ethernet and Networking

147 Industrial Ethernet and Networking
Site Surveys : Indoor Software packages such as Ekahau ESS site survey Determine performance characteristics Help locate access point positions Determine antennae selection and positioning Detect “foreign” connections Industrial Ethernet and Networking

148 Site Surveys : Outdoors
Industrial Ethernet and Networking

149 Site Surveys : Outdoors
Industrial Ethernet and Networking

150 Industrial Radio Types
Radio Modems (Ethernet and Serial data ) I/O (Telemetry) Wireless gateways Combined Data and I/O Wireless Device Servers Cellular Satellite Industrial Ethernet and Networking

151 Product Samples: Ethernet Radio Modems
            Product Samples: Ethernet Radio Modems ELPRO 905U-D MDS iNET900 YLink RadioLinx SCADALINK LANBRIGDE 900 MHz FHSS 900 MHz FHSS 2.4 GHz FHSS 900 MHz FHSS Industrial Ethernet and Networking

152 Product Samples: Serial Radio Modems
            Product Samples: Serial Radio Modems Put serial devices on radio SCADALINK SM900 Prosoft RadioLinx 2.4 GHz FHSS 900 MHz FHSS Industrial Ethernet and Networking

153 Product Samples: (I/O) Telemetry
Think of 4-20 ma radios! SCADALINK IO900 Elpro 905-U Phoenix (Omnex) 900 MHz FHSS 900 MHz FHSS Industrial Ethernet and Networking

154 Product Samples: Wireless Protocol Gateways
105UG Profibus DF1 Modbus Industrial Ethernet and Networking

155 Product Samples: Combined Modem/IO
SCADALINK 900-MB SCADALINK 900-MB 900 MHz FHSS 900 MHz FHSS Industrial Ethernet and Networking

156 Home/Office Radio Types
Wireless routers With and without cable/DSL broadband Wireless access points (bridges) Wireless print servers Industrial Ethernet and Networking

157 Product Samples: Home/Office
Linksys a/g Router Linksys g Access Point Netgear g Wireless Cable/DSL WGR614 Router DLink b Print Server DP-311P 802.11a/g DSSS 802.11g DSSS 802.11g DSSS 802.11b DSSS Industrial Ethernet and Networking

158 Product Samples: Device Servers
                                      Industrial Ethernet and Networking

159 Product Samples: Cellular
SCADALINK UNICON IP SCADALINK MobileGateway Cellular IP Modem/RTU (CDPD or IDEN) CDMA to b/g Industrial Ethernet and Networking

160 Product Samples: Satellite
Industrial Ethernet and Networking

161 MODBUS RTU between DX Video Recorders
Industrial Ethernet and Networking

162 Industrial Ethernet and Networking

163 Industrial Ethernet and Networking
Resources Ethernet University (Contemporary Controls) Industrial Ethernet and Networking

164 Industrial Ethernet and Networking
Glossary Industrial Ethernet and Networking

165 Industrial Ethernet and Networking
Questions Which radios are DS vs FH Is without any letter a standard? What determines actual throughput What happens if you have 10baseT trying to run on 1 meg Does OFDM run under DS and FH or is it a third type? Are all industrial radios compliant or do they run proprietary? Industrial Ethernet and Networking

166 Industrial Ethernet and Networking
SS II BreezeACCESS and BreezeNET: A Robust Wireless Access Solution for Unlicensed Band ISP Services Although both technologies are implemented differently, the rules are focused on providing a set of guidelines that minimized the probability of these systems interfering with other radio systems and to also minimized the probability of these systems being interfered with. To accomplish this, the transmitted signal is spread over a wide bandwidth to reduce the power spectral density. (The power spectral density is the amount of RF power per MHz.) As part of the spreading, redundant information is also spread over the same wide bandwidth. The idea is that in the presence of interference, some information may be lost but is recoverable due to the built in redundancy. The amount of redundancy is measured as the processing gain of the system. Both direct sequence and frequency hopping systems are restricted to 1 watt of transmitter power to the antenna of 6 dBi maximum gain (for multipoint systems, the gain may be increased 1 dB for every dB the power is reduced). Industrial Ethernet and Networking

167 Questions for Kevin Zamzow
Does a FHSS transmit each hop at lower power? Why does DS modulating at a faster bit rate mean more bandwith? DS gets signal gain by encoding with 11 bit barker? I do not get this signal gain issue The faster the carrier is modulated the more bandwith it requires See DSSS notes Industrial Ethernet and Networking

168 Industrial Ethernet and Networking
Comparison II When making a decision on which physical layer to use, consider the following characteristics of frequency hopping: Lower cost. Lowest power consumption Most tolerant to signal interference Lowest potential data rates from individual physical layers. Highest aggregate capacity using multiple physical layers Less range than direct sequence, but greater range than infrared Lowest aggregate capacity using multiple physical layers than frequency hopping. Smallest number of geographically separate radio cells due to a limited number of channels. More range than frequency hopping and infrared physical layers Industrial Ethernet and Networking

169 More about Channels and Collocation
Breezecom FHSS DSSS DSSS technologies (Direct Signal Spread Spectrum)work in 22MHz- wide bands (IEEE b).This provides three non-overlapping 22MHz channels over the band to GHz. Industrial Ethernet and Networking

170 Yokogawa DAQ Systems: Network Security
July 2005

171 Corporate and Plant Network
Industrial Ethernet and Networking

172 Industrial Ethernet and Networking
Plant Network Detail Increasing Plant Floor Security Today Rockwell Automation Industrial Ethernet and Networking

173 Security Problems with PC’s on a Network
Unauthorized access (Invasion) Viruses (via or hackers) Hackers spam “Leakage” of System Information Resulting security problems Unauthorized control of equipment or process Data manipulation File deletion Configuration changes or deletion Corruption of operating system Industrial Ethernet and Networking

174 The Basic Defense at Corporate IT Level
IT Tools Routers Firewalls Proxy servers VPN’s Virus protection Anti-spy software Industrial Ethernet and Networking

175 Corporate IT vs. Plant Floor Network
Industrial Ethernet and Networking

176 Industrial Ethernet and Networking
Ports and TCP Servers Industrial Ethernet and Networking

177 Test Your System Five Ways
1) Open ports 2) Simple network management protocol (SNMP) robustness 3) Malformed packets 4) Broadcast traffic storms 5) Resource starvation Test your System 5 Ways InTech March 2003 Eric Byres Industrial Ethernet and Networking

178 Why is a DAQSTATION Safer than a PC?
No Intel chips No Microsoft software Proprietary OS based on u-Itron realtime OS Does not accept Built-in username/password login Password access Industrial Ethernet and Networking

179 Industrial Ethernet and Networking
Preventive Actions Standard IT security Routers, proxy servers and firewalls Intrusion detection software Turn of ICMP (ping) in routers Consider VPN for remote access Implement a security and risk assessment DAQStation Utilize control logins with username/password Restrict access Change on a periodic basis Use passwords for webserver access Isolate FTP server from primary network Industrial Ethernet and Networking

180 Industrial Ethernet and Networking
ISA 99: Network Security Part 1: Models and Terminology Part 2: Establishing a Manufacturing & Control Systems Security Program Part 3: Operating a Manufacturing and Control Systems Security Program Part 4: Specific Security Requirements for Manufacturing & Control Systems Industrial Ethernet and Networking

181 21 Steps to Improving SCADA Security
Department of Energy Office of Energy Assurance Industrial Ethernet and Networking

182 Industrial Ethernet and Networking
Steps 1-11 Industrial Ethernet and Networking

183 Industrial Ethernet and Networking
Steps 12-21 Industrial Ethernet and Networking


Download ppt "Industrial Ethernet and Networking"

Similar presentations


Ads by Google