Time Aware Network (TAN) technology that enables industry 4.0

Slides:



Advertisements
Similar presentations
Ethernet Switch Features Important to EtherNet/IP
Advertisements

1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
Kyland-USA Product Introduction, Overview & Comparison KY-3000EM (Multi-Lingual) KY-2000EM Managed Industrial Ethernet Switch Din-Rail Copyright © KUSA,
Multicasting in Mobile Ad-Hoc Networks (MANET)
Hubs & Switches Ethernet Basics -10. There is only so much available bandwidth, in some instances it can be dynamic An overabundance of data on the network,
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
MESH Implementation With AP5131 version R.
Technical Track CIP Safety on SERCOS Global Interoperability between CIP Safety based Networks.
© 2015 Mohamed Samir YouTube channel All rights reserved. Samir CCNP-SWITCHING Mohamed Samir YouTube channel.
Bluesocket vWLAN Overview. Its ALL about n……
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
ﺑﺴﻢﺍﷲﺍﻠﺭﺣﻣﻥﺍﻠﺭﺣﻳﻡ. Group Members Nadia Malik01 Malik Fawad03.
OSI Model. Switches point to point bridges two types store & forward = entire frame received the decision made, and can handle frames with errors cut-through.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
Reconfigurable Optical Mesh and Network Intelligence Nazar Neayem Alcatel-Lucent Internet 2 - Summer 2007 Joint Techs Workshop Fermilab - Batavia, IL July.
1 Version 3.0 Module 7 Spanning Tree Protocol. 2 Version 3.0 Redundancy Redundancy in a network is needed in case there is loss of connectivity in one.
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
Renesas Electronics America Inc. © 2010 Renesas Electronics America Inc. All rights reserved. Overview of Ethernet Networking A Rev /31/2011.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
IEEE-1588 IEEE-1588 – Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems Defines a Precision Time Protocol.
5G Wireless Technology.
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
Chapter 16– Connecting LANs
Wireless Ethernet Programming
Chapter 1: Fundamentals Review
Pedro Moreira CERN BE-CO-HT
Introduction to Networks v6.0
Now you don’t need to take any stress about the Cisco Exam
Redundant network topologies for dependable time transfer
100% Exam Passing Guarantee & Money Back Assurance
Chapter 9 Optimizing Network Performance
Barracuda Web Security Flex
Delay-Tolerant Networks (DTNs)
Integrated Energy and Spectrum Harvesting for 5G Wireless Communications submitted by –SUMITH.MS(1KI12CS089) Guided by – BANUSHRI.S(ASST.PROF,Dept.Of.CSE)
Instructor Materials Chapter 5: Ethernet
software features Highlight
Jack Pokrzywa Director Ground Vehicle Standards, SAE International
A Deterministic End to End Performance Verification Architecture
Reconfigurable Optical Mesh and Network Intelligence
Seminar on…. 5G Wireless Technology By: Niki Upadhyay
Instructor & Todd Lammle
Lecture#10: LAN Redundancy
Advanced Borderless Network Architecture Sales Exam practice-questions.html.
IOS Network Model 2nd semester
Chapter 1: WAN Concepts Connecting Networks
UCSD’s Responsphere Infrastructure
Cisco Real Exam Dumps IT-Dumps
CS 4700 / CS 5700 Network Fundamentals
Communication Networks NETW 501 Tutorial 3
Weak Duplicate Address Detection in Mobile Ad Hoc Networks
Sizing …today. T: Here’s how. .
I. Basic Network Concepts
Vehicle Informatics (Vehicle System Informatics)
November 18 July 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Task Group 4e definitions Date.
Time Sensitive Networking for 5G
Modeling and Simulation of TTEthernet
DETERMINISTIC ETHERNET FOR SCALABLE MODULAR AVIONICS
CS 4700 / CS 5700 Network Fundamentals
Chapter 3 VLANs Chaffee County Academy
Authentication and handoff protocols for wireless mesh networks
Time-Aware shaping (802.1Qbv) support in the MAC
Prioritized MAC Access Mechanism of Routing-related Frame for ESS Mesh
Scaling the Network: The Internet Protocol
ONLINE SECURE DATA SERVICE
Subject Name: Adhoc Networks Subject Code: 10CS841
5-GHz Unified Protocol (5-UP) Proposal OFDM Extensions for a
Prioritized MAC Access Mechanism of Routing-related Frame for ESS Mesh
An Overview of Security Issues in Sensor Network
What’s New In WatchGuard Wi-Fi Cloud v8.6
Presentation transcript:

Time Aware Network (TAN) technology that enables industry 4.0 The Innovative Time Aware Network (TAN) technology that enables industry 4.0 BEIJING NENET TECHNOLOGY CO. LTD NENET proprietory material,distribution without permision is prohibited

What is TAN ? Industry communication requirement Must be Time Sensitive Network? Key 1: Deterministic and nondeterministic Integration Key 2:System synergy What is TAN ? Key 3:Network Robustness Key 4:Network Observability Key5:Network Security

What is TAN(Time Aware Network) Using an example, If you drive a car on a road, the legacy Ethernet tagged car only, but TAN tagged both car and road with synchronized clock. The network achieved by this method is called TAN. TAN where come from TAN(Time Aware Network) is a time-oriented industry communication technology. Time Aware Network is more than time synchronization. TAN born from Ethernet, renovated from Ethernet, and fully compatible with Ethernet. Time Aware Network has three key features: 1. Time aware of network The time of entire network is synchronized 2. Time aware of network device Entire network devices is precisely synchronized 3. Time aware of data All data has precision time attribute . I......................................................................I TAN frame Ethernet frame Destination Switch ID Source Switch ID Channel protocol Channel-based frame ID Timing Protocol Destination MAC Source MAC Ethernet protocol Ethernet Data CRC

TAN deliver network deterministic insensitive transportation & NENET Make Changes with TAN TAN deliver network deterministic insensitive transportation

TAN Deterministic transportation in TAN + TOCAT( Time-Oriented Control Automation Technology) + control instruction target time Random deliver in cycle deliver data by cycle control software operating system controlled device TAN The legacy control system only deliver control instruction to the controlled device. TAN not only deliver the control instruction, but also the target time for the controlled device to take action. Since the clock of TAN is synchronized, the controlled device can take action at any target time. In this regard, TAN is not only a network for data transportation, but also a global timing controller.

It's NOT important that the network is Time Sensitive Network. TAN jitter test result in the lab 800M(Mega) data traffic in the network jitter<500ns It's NOT important that the network is Time Sensitive Network.

Low latency transportation in TAN Source Destination Interfering data 1 3 2 4 5 6 2.1us 0.8us Achievement network delay per hop for real-time channel: 0.8~3µs Multi-channel structure,network determinism is guarteed Per channel is prioritized and pre-emption mechanism is supported .Higher priority channel could interrupt the lower priority traffic , and afterwards resume disrupted traffic, so lower latency is guaranteed for higher priority traffic.

System synergy TOCAT( Time-Oriented Control Automation Technology) + control instruction target time Random deliver in cycle deliver data by cycle control software system A controlled device TAN system N contolled device -N t system A system N 500us 1000us 1500us 600us Different systems on the network can achieve system synergy by TOCAT 1200us 1800us

Synchronization of multi-axis & NENET & NENET Make Changes with TOCAT Synchronization of multi-axis

TAN Synchronization of multi-axis + Multiple Sampling Commands control system + sampling t1 TAN t1 time sample sample sample sample sample sampling Simultaneously servo motor 1 servo motor 2 servo motor 3 servo motor 4 servo motor n Since the clock of servo motor on TAN is synchronized, Servo motor 1,2,,N can take sampling simultaneously with the unique reference clock. Or take actions in the same way. The synchronization of multi-axis design is much simplified compared with the legacy method. TAN can achieve multiple-axis synchroniztion control, with unlimited number of axis. data transfer from source to destination is determined.

& NENET Robustness in TAN

Any network topology at layer 2 Legacy Layer 2 topology The TAN network can do more

Any network topology at layer 2 If you need,the TAN topology can be like this

Any network topology, without pre-configuration (Loop-free design) Achievement T The TAN support any network topology as you can ever imagined.The real “WEB” design at your hand The TAN network management can scan the whole network and gives you the real topology. With this feature, in field application, we need only electricians not IT engineers. All layer 2 Seamless redundency Loop-free No pre-configuration TAN technology support network topology as you never imagined

Multi-path transportation seamless redundency is achieved Achievement The TAN network will intelligently calculate the LEAST EFFECTIVE AREA(LEA) of communication and select multiple paths for traffic within selected area(LEA).The LEA is dynamic for traffic of different network access.Traffic is “always” confined within LEA. Multi-path communication possibles fault-free network which significantly enhance network robustness. The “LEAST EFFECTIVE AREA” rule is designed in with maximum 4 optimized paths are dynanically auto configured

Wireless Communication & NENET Make Changes with TAN Dual-path Wireless Communication

The legacy wireless communication Control Server Switch AP 1 AP 2 Data Loss Caused by Linkage Switching link Down link Up Data Loss Caused by Environmental Impact on Single path Communication Mobile devices

TAN Dual-path wireless communication Data TAN network Control Server TAN Switch TAN Switch AP 1 AP 2 link Set-up No linkage switching link Up No data loss TAN Client Two identical data Data

Evolution TAN Switch TAN network Control Server TAN Switch AP 1 AP 2 Each location keeps two active links Significantly Reducing wireless data Loss TAN Client TAN Client TAN Client Support wireless roaming Location 1 Location 2 Location 3

Compatibility Legacy Ethernet devices can join in TAN Switch TAN network Control Server TAN Switch AP 1 AP 2 AP3 AP4 Legacy Ethernet devices can join in Support wireless roaming TAN Client

Network Observability & NENET Time aware of data Network Observability

TAN Network Observability Achievement The legacy IT technology use port mirroring only, But TAN can do the entire network scanning as you desired: 1.Topology and topology changes are visible 2. All data with network access time and network delay is visible. 3. Accurate observation is achieved. 4. Accurate data path is observed. TAN Device A Observation Device C Device B Device D DATA Direction Access Time Network Dlay hello.. A->B 10:01m1s233ms3us 70us hi B->A 10:01m1s233ms4us 88us nice A->D 10:01m1s233ms80us 99us NO Need A->C ....... timing resolution 1us

Secured TAN A New Method of Network Security & NENET Network Security in TAN Secured TAN A New Method of Network Security

Network Security Achievement The communication model is easily obtained as TAN provide a transparent network with time features , thus potential network attack can be discovered at early stage. IT has matured protection methods for threats that are known; but how can we prevent Industry from the unknown attack ? TAN provides a unique protection scheme for the unknown attack. Watch a movie at 1:00 on April 1st Watch a movie at 1:00 on April 2nd Watch a movie at 1:00 on April 3rd Watch movies at 1:00;1:30;2:00 on April 4th Abnormal

THANK YOU BEIJING NENET TECHNOLOGY CO. LTD E-mail:techsupport@nenetsystem.com Tel:86-10-82687355 WEB: www.nenetsystem.com