Industrial Ethernet and Networking

Slides:



Advertisements
Similar presentations
Ethernet, IP Addresses and Honeywell Automation Systems
Advertisements

MCT620 – Distributed Systems
Module 2: Assigning IP Addresses in a Multiple Subnet Network.
9-1 Chapter 9 - Communication Principles of Computer Architecture by M. Murdocca and V. Heuring © 1999 M. Murdocca and V. Heuring Principles of Computer.
IP Addressing Higher Computing. TCP/IP TCP/IP is the communication protocol for the internet. TCP/IP is the communication protocol for the internet. TCP/IP.
IP Addressing Terminology
Computer Networks TCP/IP Protocol Suite.
1 UNIT I (Contd..) High-Speed LANs. 2 Introduction Fast Ethernet and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet Fibre Channel Fibre Channel High-speed.
Virtual Trunk Protocol
Network Layer: Address Mapping, Error Reporting, and Multicasting
McGraw-Hill©The McGraw-Hill Companies, Inc., 2003 Chapter 11 Ethernet Evolution: Fast and Gigabit Ethernet.
Schutzvermerk nach DIN 34 beachten Ethernet IP. Schutzvermerk nach DIN 34 beachten TCP / IP and the OSI reference model Process / Application Host-to-Host.
Communicating over the Network
IP-Internet Protocol Addresses. Computer Engineering Department 2 Addresses for the Virtual Internet The goal of internetworking is to provide a seamless.
Protocol layers and Wireshark Rahul Hiran TDTS11:Computer Networks and Internet Protocols 1 Note: T he slides are adapted and modified based on slides.
1 Chapter One Introduction to Computer Networks and Data Communications.
Local Area Networks - Internetworking
Lecturer, Department of Computer Application
Week Review. In an IPv4 environment, what information is used by the router to forward data packets from one interface of a router to another? a.
Click to continue Network Protocols. Click to continue Networking Protocols A protocol defines the rules of procedures, which computers must obey when.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 2 The OSI Model and the TCP/IP.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Subnetting IP Networks Network Fundamentals.
Chapter 20 Network Layer: Internet Protocol
Configuring and Troubleshooting ACLs
1 Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT.
IP ADDRESS Compiled by : S. Agarwal Lecturer & Systems Incharge St. Xavier’s Computer Centre St. Xavier’s College, Kolkata.
1 Data Link Issues Relates to Lab 2. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet,
The TCP/IP Model  Internet Protocol Address.  Defined By IANA [Internet Assigned Number Authority] in  IP Address is a Logical Address and it.
IP Addressing  To go somewhere on the Internet, you must type a Uniform Resource Locator (URL).  A query is sent to the nearest DNS (Domain Name System)
Nov-03 ©Cisco Systems CCNA Semester 1 Version 3 Comp11 Mod11 – St. Lawrence College – Cornwall Campus, ON, Canada – Clark slide 1 Cisco Systems CCNA Version.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 EN0129 PC AND NETWORK TECHNOLOGY I IP ADDRESSING AND SUBNETS Derived From CCNA Network Fundamentals.
IP address Universally accepted addressing method is required so that all hosts can communicate with each other TCP/IP based network is assigned with unique.
IP Addressing & Subnetting!!!.
Chapter 9 ARP CIS 82 Routing Protocols and Concepts Rick Graziani Cabrillo College Last Updated: 5/13/2008.
Network Fundamentals – Chapter 4 Sandra Coleman, CCNA, CCAI
Network Layer IP: Internet Protocol –Datagram format –IPv4 addressing –ICMP –IPv6.
Topic 19 TCP/IP Enabling Objectives 19.1 DESCRIBE the OSI model and the TCP/IP Protocol DISCUSS IP addresses IDENTIFY common TCP/IP based protocols.
Chapter 9: Subnetting IP Networks
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA TCP/IP Protocol Suite and IP Addressing Halmstad University Olga Torstensson
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Connecting LANs, Backbone Networks, and Virtual LANs
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 9 TCP/IP Protocol Suite and IP Addressing.
$1 Million $500,000 $250,000 $125,000 $64,000 $32,000 $16,000 $8,000 $4,000 $2,000 $1,000 $500 $300 $200 $100 Welcome.
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
1 Version 3.0 Module 10 Routing Fundamentals and Subnetting.
Data Communications and Networks
OSI Model Routing Connection-oriented/Connectionless Network Services.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
ITED 328 Lecture 4 12 Feb 2004 Loosely covering Chapter 5 Internet and LAN Technology.
Computer Networks.  The OSI model is a framework containing seven layers that defines the protocols and devices used at each stage of the process when.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Data Transmission Basics for Digital Investigations.
1 TCP/IP Internetting ä Subnet layer ä Links stations on same subnet ä Often IEEE LAN standards ä PPP for telephone connections ä TCP/IP specifies.
UNDERSTANDING THE HOST-TO-HOST COMMUNICATIONS MODEL - OSI LAYER & TCP/IP MODEL 1.
CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
Networking Fundamentals Network Protocols. Protocol Rule for how networks communicate Each OSI layer handled by one or more protocols Protocol Suites.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Connecting to the Network Introduction to Networking Concepts.
CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler.
ISDS 4120 Project 1 DWAYNE CARRAL JR 3/27/15. There are seven layers which make up the OSI (Open Systems Interconnection Model) which is the model for.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Introduction to TCP/IP.
Computing: Computer Networking Fundamentals Ian Eyre Part 4 Data Transmission.
OSI LAYERS.
The Open System Interconnection (OSI) Model & Network Protocols.
Computing Over Distance
TCP/IP Protocol Suite: Review
Presentation transcript:

Industrial Ethernet and Networking Craig LaRose Product Sales Engineer Network Solutions October 24, 2006

Industrial Ethernet and Networking What You Will Learn Basic hardware and addressing TCP/IP protocol Routers, Bridges, & Switches Webservers, Email & FTP Dial-up networking OPC connectivity software Wireless networking Additional Resources Industrial Ethernet and Networking

Industrial Ethernet and Networking Term Alert: ETHERNET What is Ethernet? It is not the cable you connect to your PC It is group of standards which cover the transmission of data over a medium Industrial Ethernet and Networking

Industrial Ethernet and Networking Standards How can we best describe these standards OSI 7 Layer Model The Open Systems Interconnection (OSI) model is an attempt to standardize the functionality of end to end computer communications. Industrial Ethernet and Networking

Industrial Ethernet and Networking 7 Layer OSI Model Open Systems Interconnect (OSI) Model Layer Function Application Presentation Session Transport Network Data Link Physical 7 – Network Application 6 – Formatting of data and encryption 5 – Establishment and maintenance of sessions 4 – Provides reliable end-to-end delivery 3 – Packet delivery, including routing 2 – Framing of information and error checking 1 – Physical Medium requirements Industrial Ethernet and Networking

Industrial Ethernet and Networking OSI Model The path of data through the stack Sender Receiver Application Presentation Session Transport Network Data Link Physical Application Presentation Session Transport Network Data Link Physical Industrial Ethernet and Networking

Determine of Data Path in Network Industrial Ethernet and Networking 7 Layer OSI Model How Ethernet Fits in the OSI Model Application Presentation Session Ethernet Standard Error Checking Transport Determine of Data Path in Network Network Logical Link Control Media Access Control Data Link Physical Media specifications Industrial Ethernet and Networking

Determine of Data Path in Network Industrial Ethernet and Networking 7 Layer OSI Model Layer 1 Specifications Application Presentation Session Ethernet Standard Error Checking Transport Determine of Data Path in Network Network Logical Link Control Media Access Control Data Link Physical Media specifications Industrial Ethernet and Networking

Physical Layer Specifications Industrial Ethernet and Networking

Industrial Ethernet and Networking Cables and Connectors Speed = 10 Mbps Physical Media (Twisted Pair) 10baseT Cat 5e: voice and data at 100 mbps Cat 6: voice and data at 250 mbps Patch cable: straight thru; used with hubs & routers Cross cable: crossed; used for PC to device direct RJ45: standard 10baseT (twisted pair) connector* Speed = 100 Mbps Physical Media (Fiber Optic) 100baseFL Industrial Ethernet and Networking

Physical Layer: More Wires Backbone Coax Cable 10base5 ThinNet Coax Cable 10BASE-2 Multimode Fiber Optic Cables, ST®-ST 10baseFL, 100baseFL Industrial Ethernet and Networking

Determine of Data Path in Network Industrial Ethernet and Networking 7 Layer OSI Model Layer 2 Specifications Application Presentation Session Ethernet Standard Error Checking Transport Determine of Data Path in Network Network Logical Link Control Media Access Control Data Link Physical Media specifications Industrial Ethernet and Networking

Industrial Ethernet and Networking Layer 2 : Data Link Logical Link Control Sub layer Establishes and Controls Logical Links between Local Devices on a Network Makes it Possible for Different Technologies to Work Seamlessly with Higher Layers Logical Link Control (LLC): Logical link control refers to the functions required for the establishment and control of logical links between local devices on a network. As mentioned above, this is usually considered a DLL sub layer; it provides services to the network layer above it and hides the rest of the details of the data link layer to allow different technologies to work seamlessly with the higher layers. Most local area networking technologies use the IEEE 802.2 LLC protocol. Industrial Ethernet and Networking

Industrial Ethernet and Networking Layer 2 : Data Link Media Access Control Layer Procedures used by devices to control access Responsible for final encapsulation of data frames that are sent over the network Responsible for Final Addressing of Messages on Network. Responsible for Error Detection and Handling.. Media Access Control (MAC): This refers to the procedures used by devices to control access to the network medium. Since many networks use a shared medium (such as a single network cable, or a series of cables that are electrically connected into a single virtual medium) it is necessary to have rules for managing the medium to avoid conflicts. For example. Ethernet uses the CSMA/CD method of media access control, while Token Ring uses token passing. Data Framing: The data link layer is responsible for the final encapsulation of higher-level messages into frames that are sent over the network at the physical layer. Addressing: The data link layer is the lowest layer in the OSI model that is concerned with addressing: labeling information with a particular destination location. Each device on a network has a unique number, usually called a hardware address or MAC address, that is used by the data link layer protocol to ensure that data intended for a specific machine gets to it properly. Error Detection and Handling: The data link layer handles errors that occur at the lower levels of the network stack. For example, a cyclic redundancy check (CRC) field is often employed to allow the station receiving data to detect if it was received correctly. As I mentioned in the topic discussing the physical layer, that layer and the data link layer are very closely related. The requirements for the physical layer of a network are often part of the data link layer definition of a particular technology. Certain physical layer hardware and encoding aspects are specified by the DLL technology being used. The best example of this is the Ethernet standard, IEEE 802.3, which specifies not just how Ethernet works at the data link layer, but also its various physical layers. Since the data link layer and physical layer are so closely related, many types of hardware are associated with the data link layer. Network interface cards (NICs) typically implement a specific data link layer technology, so they are often called “Ethernet cards”, “Token Ring cards”, and so on. There are also a number of network interconnection devices that are said to “operate at layer 2”, in whole or in part, because they make decisions about what to do with data they receive by looking at data link layer frames. These devices include most bridges, switches and barters, though the latter two also encompass functions performed by layer three. Some of the most popular technologies and protocols generally associated with layer 2 are Ethernet, Token Ring, FDDI (plus CDDI), HomePNA, IEEE 802.11, ATM, and TCP/IP's Serial Link Interface Protocol (SLIP) and Point-To-Point Protocol (PPP). Key Concept: The second OSI Reference Model layer is the data link layer. This is the place where most LAN and wireless LAN technologies are defined. Layer two is responsible for logical link control, media access control, hardware addressing, error detection and handling, and defining physical layer standards. It is often divided into the logical link control (LLC) and media access control (MAC) sublayers, based on the IEEE 802 Project that uses that architecture. Industrial Ethernet and Networking

Industrial Ethernet and Networking Layer 2 : Data Link MAC Addressing Each device on a Network has a unique number called a MAC Address that is used to ensure that data for an intended machine gets to it properly. Made up of a 48 bit number First 6 bytes assigned by IEEE (Vendor’s ID) Last 6 bytes assigned by Vendor 00-80-a3-13-34-04 Vendor Device Media Access Control (MAC): This refers to the procedures used by devices to control access to the network medium. Since many networks use a shared medium (such as a single network cable, or a series of cables that are electrically connected into a single virtual medium) it is necessary to have rules for managing the medium to avoid conflicts. For example. Ethernet uses the CSMA/CD method of media access control, while Token Ring uses token passing. Data Framing: The data link layer is responsible for the final encapsulation of higher-level messages into frames that are sent over the network at the physical layer. Addressing: The data link layer is the lowest layer in the OSI model that is concerned with addressing: labeling information with a particular destination location. Each device on a network has a unique number, usually called a hardware address or MAC address, that is used by the data link layer protocol to ensure that data intended for a specific machine gets to it properly. Error Detection and Handling: The data link layer handles errors that occur at the lower levels of the network stack. For example, a cyclic redundancy check (CRC) field is often employed to allow the station receiving data to detect if it was received correctly. As I mentioned in the topic discussing the physical layer, that layer and the data link layer are very closely related. The requirements for the physical layer of a network are often part of the data link layer definition of a particular technology. Certain physical layer hardware and encoding aspects are specified by the DLL technology being used. The best example of this is the Ethernet standard, IEEE 802.3, which specifies not just how Ethernet works at the data link layer, but also its various physical layers. Since the data link layer and physical layer are so closely related, many types of hardware are associated with the data link layer. Network interface cards (NICs) typically implement a specific data link layer technology, so they are often called “Ethernet cards”, “Token Ring cards”, and so on. There are also a number of network interconnection devices that are said to “operate at layer 2”, in whole or in part, because they make decisions about what to do with data they receive by looking at data link layer frames. These devices include most bridges, switches and barters, though the latter two also encompass functions performed by layer three. Some of the most popular technologies and protocols generally associated with layer 2 are Ethernet, Token Ring, FDDI (plus CDDI), HomePNA, IEEE 802.11, ATM, and TCP/IP's Serial Link Interface Protocol (SLIP) and Point-To-Point Protocol (PPP). Key Concept: The second OSI Reference Model layer is the data link layer. This is the place where most LAN and wireless LAN technologies are defined. Layer two is responsible for logical link control, media access control, hardware addressing, error detection and handling, and defining physical layer standards. It is often divided into the logical link control (LLC) and media access control (MAC) sublayers, based on the IEEE 802 Project that uses that architecture. 00-00-64 is the Yokogawa vendor ID Industrial Ethernet and Networking

Industrial Ethernet and Networking Layer 2 : Data Link MAC Addresses: How do you find yours? Windows NT/2000/2003/XP Open the command prompt from “Run” From the command prompt type "ipconfig /all" Find the network adapter you want to know the MAC address of Locate the number next to Physical Address. This is your MAC address Note: there are 248 = 2.81474977 × 1014 available Mac addresses. Don’t worry we wont run out. Industrial Ethernet and Networking

Industrial Ethernet and Networking 7 Layer OSI Model Layer 3 Specifications Application Presentation Session Ethernet Standard Error Checking Transport Logical Addressing Routing Network The third-lowest layer of the OSI Reference Model is the network layer. If the data link layer is the one that basically defines the boundaries of what is considered a network, the network layer is the one that defines how internetworks (interconnected networks) function. The network layer is the lowest one in the OSI model that is concerned with actually getting data from one computer to another even if it is on a remote network; in contrast, the data link layer only deals with devices that are local to each other. While all of layers 2 through 6 in the OSI Reference Model serve to act as “fences” between the layers below them and the layers above them, the network layer is particularly important in this regard. It is at this layer that the transition really begins from the more abstract functions of the higher layers—which don't concern themselves as much with data delivery—into the specific tasks required to get data to its destination. The transport layer, which is related to the network layer in a number of ways, continues this “abstraction transition” as you go up the OSI protocol stack. Data Link Logical Link Control Media Access Control Physical Media specifications Industrial Ethernet and Networking

Industrial Ethernet and Networking Layer 3 : Network Layer Network Layer Functions Logical Addressing – every device over a network has a logical address. For example the Internet Protocol (IP) is the network layer protocol and every machine has an unique IP address. Routing – responsible for information to move data across interconnected networks. Datagram Encapsulation Fragment and Reassembly Error Handling and Diagnostics Network Layer Functions Some of the specific jobs normally performed by the network layer include: Logical Addressing: Every device that communicates over a network has associated with it a logical address, sometimes called a layer three address. For example, on the Internet, the Internet Protocol (IP) is the network layer protocol and every machine has an IP address. Note that addressing is done at the data link layer as well, but those addresses refer to local physical devices. In contrast, logical addresses are independent of particular hardware and must be unique across an entire internetwork. Routing: Moving data across a series of interconnected networks is probably the defining function of the network layer. It is the job of the devices and software routines that function at the network layer to handle incoming packets from various sources, determine their final destination, and then figure out where they need to be sent to get them where they are supposed to go. Datagram Encapsulation: The network layer normally encapsulates messages received from higher layers by placing them into datagrams (also called packets) with a network layer header. Fragmentation and Reassembly: The network layer must send messages down to the data link layer for transmission. Some data link layer technologies have limits on the length of any message that can be sent. If the packet that the network layer wants to send is too large, the network layer must split the packet up, send each piece to the data link layer, and then have pieces reassembled once they arrive at the network layer on the destination machine. A good example is how this is done by the Internet Protocol. Error Handling and Diagnostics: Special protocols are used at the network layer to allow devices that are logically connected, or that are trying to route traffic, to exchange information about the status of hosts on the network or the devices themselves. Network Layer Connection-Oriented and Connectionless Services Network layer protocols may offer either connection-oriented or connectionless services for delivering packets across the network. Connectionless ones are by far more common at the network layer. In many protocol suites, the network layer protocol is connectionless, and connection-oriented services are provided by the transport layer. For example, in TCP/IP, the Internet Protocol (IP) is connectionless, while the layer four Transmission Control Protocol (TCP) is connection-oriented. The most common network layer protocol is of course the Internet Protocol (IP), which is why I have already mentioned it a couple of times. IP is the backbone of the Internet, and the foundation of the entire TCP/IP protocol suite. There are also several protocols directly related to IP that work with it at the network layer, such as IPsec, IP NAT and Mobile IP. ICMP is the main error-handling and control protocol that is used along with IP. Another notable network layer protocol outside the TCP/IP world is the Novell IPX protocol. Key Concept: The OSI Reference Model’s third layer is called the network layer. This is one of the most important layers in the model; it is responsible for the tasks that link together individual networks into internetworks. Network layer functions include internetwork-level addressing, routing, datagram encapsulation, fragmentation and reassembly, and certain types of error handling and diagnostics. The network layer and transport layer are closely related to each other. The network interconnection devices that operate at the network layer are usually called routers, which at this point should hopefully come as no surprise to you. They are responsible for the routing functions I have mentioned, by taking packets received as they are sent along each “hop” of a route and sending them on the next leg of their trip. They communicate with each other using routing protocols, to determine the best routes for sending traffic efficiently. So-called “brouters” also reside at least in part at the network layer, as do the rather obviously named “layer three switches”. J Industrial Ethernet and Networking

Industrial Ethernet and Networking Term Alert: TCP/IP The TCP/IP protocol suite is named for two of its most important protocols. Transmission Control Protocol (TCP) Internet Protocol (IP) The design goal of TCP/IP was to build an interconnection of networks that provided universal communication services: an Internet. TCP/IP provides a common interface for user-applications inderpendent of the underlying physical network. IP (Internet protocol) address Known as the logical address What Network is the device on? Industrial Ethernet and Networking

The Big 3: IP, Subnet, Gateway IP Addressing An IP address is a unique identifier for a node or host connection on an IP network Every IP address consists of two parts, one identifying the network and one identifying the node. The Class determines which part belongs to the network address and which part belongs to the node Class A addresses begin with 1 to 126 Class B addresses begin with 128 to 191 Class C addresses begin with 192 to 223 Class D addresses begin with 224 to 239 Class E addresses begin with 240 to 254 www.yokogawa.com 203.174.79.168 www.us.yokogawa.com 65.203.177.26 An IP (Internet Protocol) address is a unique identifier for a node or host connection on an IP network. An IP address is a 32 bit binary number usually represented as 4 decimal values, each representing 8 bits, in the range 0 to 255 (known as octets) separated by decimal points. This is known as "dotted decimal" notation. Example: 140.179.220.200 It is sometimes useful to view the values in their binary form. 140 .179 .220 .200 10001100.10110011.11011100.11001000 Every IP address consists of two parts, one identifying the network and one identifying the node. The Class of the address and the subnet mask determine which part belongs to the network address and which part belongs to the node address. Address Classes There are 5 different address classes. You can determine which class any IP address is in by examining the first 4 bits of the IP address. Class A addresses begin with 0xxx, or 1 to 126 decimal. Class B addresses begin with 10xx, or 128 to 191 decimal. Class C addresses begin with 110x, or 192 to 223 decimal. Class D addresses begin with 1110, or 224 to 239 decimal. Class E addresses begin with 1111, or 240 to 254 decimal. Addresses beginning with 01111111, or 127 decimal, are reserved for loopback and for internal testing on a local machine. [You can test this: you should always be able to ping 127.0.0.1, which points to yourself] Class D addresses are reserved for multicasting. Class E addresses are reserved for future use. They should not be used for host addresses. Now we can see how the Class determines, by default, which part of the IP address belongs to the network (N) and which part belongs to the node (n). Class A -- NNNNNNNN.nnnnnnnn.nnnnnnnn.nnnnnnnn Class B -- NNNNNNNN.NNNNNNNN.nnnnnnnn.nnnnnnnn Class C -- NNNNNNNN.NNNNNNNN.NNNNNNNN.nnnnnnnn In the example, 140.179.220.200 is a Class B address so by default the Network part of the address (also known as the Network Address) is defined by the first two octets (140.179.x.x) and the node part is defined by the last 2 octets (x.x.220.200). In order to specify the network address for a given IP address, the node section is set to all "0"s. In our example, 140.179.0.0 specifies the network address for 140.179.220.200. When the node section is set to all "1"s, it specifies a broadcast that is sent to all hosts on the network. 140.179.255.255 specifies the example broadcast address. Note that this is true regardless of the length of the node section. Private Subnets There are three IP network addresses reserved for private networks. The addresses are 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16. They can be used by anyone setting up internal IP networks, such as a lab or home LAN behind a NAT or proxy server or a router. It is always safe to use these because routers on the Internet will never forward packets coming from these addresses. These addresses are defined in RFC 1918 Class C Class A Industrial Ethernet and Networking

More About IP Addresses Internet Assigned Numbers Authority 4676 Admiralty Way, Suite 330 Marina del Rey, CA 90292 USA +1-310-823-9358 (phone) +1-310-823-8649 (facsimile) www.iana.org network.host.host.host network.network.host.host network.network.network.host 20.10.2.5 134.140.2.5 192.230.10.5 Industrial Ethernet and Networking

The Big 3: IP, Subnet, Gateway Subnetting Can be done for use of different physical media, preservation of address space, security, or more commonly to control network traffic Example 1: 10001100.10110011.11110000.11001000 140.179.240.200 Class B IP Address 11111111.11111111.00000000.00000000 255.255.000.000 Default Class B Subnet Mask -------------------------------------------------- 10001100.10110011.00000000.00000000 140.179.000.000 Network Address Default subnet masks Example 2: 10001100.10110011.11011100.11001000 140.179.220.200 IP Address 11111111.11111111.11100000.00000000 255.255.224.000 Subnet Mask --------------------------------------------------- 10001100.10110011.11000000.00000000 140.179.192.000 Subnet Address 10001100.10110011.11011111.11111111 140.179.223.255 Broadcast Address Total of 49,140 node versus 65,534 using a unsubnetted Class B address Subnetting an IP Network can be done for a variety of reasons, including organization, use of different physical media (such as Ethernet, FDDI, WAN, etc.), preservation of address space, and security. The most common reason is to control network traffic. In an Ethernet network, all nodes on a segment see all the packets transmitted by all the other nodes on that segment. Performance can be adversely affected under heavy traffic loads, due to collisions and the resulting retransmissions. A router is used to connect IP networks to minimize the amount of traffic each segment must receive. Subnet Masking Applying a subnet mask to an IP address allows you to identify the network and node parts of the address. The network bits are represented by the 1s in the mask, and the node bits are represented by the 0s. Performing a bitwise logical AND operation between the IP address and the subnet mask results in the Network Address or Number. For example, using our test IP address and the default Class B subnet mask, we get: 10001100.10110011.11110000.11001000 140.179.240.200 Class B IP Address 11111111.11111111.00000000.00000000 255.255.000.000 Default Class B Subnet Mask -------------------------------------------------------- 10001100.10110011.00000000.00000000 140.179.000.000 Network Address Default subnet masks: Class A - 255.0.0.0 - 11111111.00000000.00000000.00000000 Class B - 255.255.0.0 - 11111111.11111111.00000000.00000000 Class C - 255.255.255.0 - 11111111.11111111.11111111.00000000 More Restrictive Addressing Additional bits can be added to the default subnet mask for a given Class to further subnet, or break down, a network. When a bitwise logical AND operation is performed between the subnet mask and IP address, the result defines the Subnet Address (also called the Network Address or Network Number). There are some restrictions on the subnet address. Node addresses of all "0"s and all "1"s are reserved for specifying the local network (when a host does not know its network address) and all hosts on the network (broadcast address), respectively. This also applies to subnets. A subnet address cannot be all "0"s or all "1"s. This also implies that a 1 bit subnet mask is not allowed. This restriction is required because older standards enforced this restriction. Recent standards that allow use of these subnets have superceded these standards, but many "legacy" devices do not support the newer standards. If you are operating in a controlled environment, such as a lab, you can safely use these restricted subnets. To calculate the number of subnets or nodes, use the formula (2n-2) where n = number of bits in either field, and 2n represents 2 raised to the nth power. Multiplying the number of subnets by the number of nodes available per subnet gives you the total number of nodes available for your class and subnet mask. Also, note that although subnet masks with non-contiguous mask bits are allowed, they are not recommended. Example: 10001100.10110011.11011100.11001000 140.179.220.200 IP Address 11111111.11111111.11100000.00000000 255.255.224.000 Subnet Mask 10001100.10110011.11000000.00000000 140.179.192.000 Subnet Address 10001100.10110011.11011111.11111111 140.179.223.255 Broadcast Address In this example a 3 bit subnet mask was used. There are 6 (23-2) subnets available with this size mask (remember that subnets with all 0's and all 1's are not allowed). Each subnet has 8190 (213-2) nodes. Each subnet can have nodes assigned to any address between the Subnet address and the Broadcast address. This gives a total of 49,140 nodes for the entire class B address subnetted this way. Notice that this is less than the 65,534 nodes an unsubnetted class B address would have. You can calculate the Subnet Address by performing a bitwise logical AND operation between the IP address and the subnet mask, then setting all the host bits to 0s. Similarly, you can calculate the Broadcast Address for a subnet by performing the same logical AND between the IP address and the subnet mask, then setting all the host bits to 1s. That is how these numbers are derived in the example above. Subnetting always reduces the number of possible nodes for a given network. There are complete subnet tables available here for Class A, Class B and Class C. These tables list all the possible subnet masks for each class, along with calculations of the number of networks, nodes and total hosts for each subnet. Industrial Ethernet and Networking

The Big 3: IP, Subnet, Gateway A Default Gateway is a node (Router) on a computer network that serves as an access point to another network. Example: NETWORK ADDRESSES RANGE FROM 192.168.4.0 TO 192.168.4.255 IP Address:192.168.4.5 Subnet: 255.255.255.0 Default Gateway: 192.168.4.1 Packets addressed outside of this range, for example 192.168.12.3 are instead sent to the default gateway address, in this case to 192.168.4.1, which is resolved into a MAC address as usual. The destination IP address will stay 192.168.12.3, it is just the next-hop physical address that is used, in this case it will be the router's interface physical address. IP Address:192.168.4.3 Subnet: 255.255.255.0 Default Gateway: 192.168.4.1 IP Address:192.168.4.4 Subnet: 255.255.255.0 Default Gateway: 192.168.4.1 IP Address:192.168.4.1 IP Address:192.168.12.1 Default gateway is a node (a router) on a computer network that serves as an access point to another network. In homes, the gateway is the ISP that connects the user to the Internet. In enterprises, however, the gateway is the computer that routes the traffic from a workstation to the outside network that is serving the Web pages. In such a situation, the gateway node often acts as a proxy server and a firewall. The gateway is also associated with both a router, which uses headers and forwarding tables to determine where packets are sent, and a switch, which provides the actual path for the packet in and out of the gateway. In other words, it is an entry point and an exit point in a network Usage A default gateway is used by a host when an IP packet's destination address belongs to someplace outside the local subnet (thus requiring more than one hop of Ethernet communication). The default gateway address is usually an interface belonging to the LAN's border router. IP Address:192.168.4.2 Subnet: 255.255.255.0 Default Gateway: 192.168.4.1 IP Address:192.168.12.3 Subnet: 255.255.255.0 Default Gateway: 192.168.12.1 Industrial Ethernet and Networking

Recap : IP and MAC Addresses This is the .3 device This is the 192.168.10 network IP Address 192.168.10.3 Subnet Mask 255.255.255.0 Gateway 192.168.10.1 IP 0 means device 255 means network Internet Protocol IP address tells you which network and what device in that network IP addresses must be unique within a network Subnet mask identifies network vs. device Gateway defines a router that moves data to higher level networks 00-00-64-13-34-04 MAC Vendor Device Media Access Control MAC address identifies the device at hardware level (physical address) MAC addresses contain unique vendor and device ID’s Industrial Ethernet and Networking

Industrial Ethernet and Networking Network Info on DX2000 Industrial Ethernet and Networking

Industrial Ethernet and Networking IPv4 to IPv6 IPv4 supports 4.3 Billion addresses Will not be enough to support the future IPv6 will support 3.4 x 1038 addresses Will this be enough address to support our needs? Internet Protocol version 6 (IPv6) is a network layer IP standard used by electronic devices to exchange data across a packet-switched internetwork. It follows IPv4 as the second version of the Internet Protocol to be formally adopted for general use. The main improvement brought by IPv6 is the increase in the number of addresses available for networked devices, allowing, for example, each cell phone and mobile electronic device to have its own address. IPv4 supports 4.3×109 (4.3 billion) addresses, which is inadequate for giving even one address to every living person, much less support the burgeoning emerging market for connective devices. IPv6 supports 3.4×1038 addresses, or 5×1028(50 octillion) for each of the roughly 6.5 billion people alive today, or almost 57 billion addresses for each gram of matter in the Earth. (Note: statements that IPv6 provides enough address space to give an address for each atom in the universe or even for each atom on Earth are exaggerated. However, the average person could address each atom in their body.) Invented by Steve Deering and Craig Mudge at Xerox PARC, IPv6 was adopted by the Internet Engineering Task Force in 1994, when it was called "IP Next Generation" (IPng). (Incidentally, IPv5 was not a successor to IPv4, but an experimental flow-oriented streaming protocol intended to support video and audio.) As of December 2005, IPv6 accounts for a tiny percentage of the live addresses in the publicly-accessible Internet, which is still dominated by IPv4. The adoption of IPv6 has been slowed by the introduction of classless inter-domain routing (CIDR) and network address translation (NAT), each of which has partially alleviated the impact of address space exhaustion. Nevertheless, as of August 2006, the primary IANA pool is expected to run out in the 2009 to 2011 timeframe if current trends continue. The U.S. Government has specified that the network backbones of all federal agencies must deploy IPv6 by 2008.[1] Meanwhile China is planning to get a head start implementing IPv6 with their 5 year plan for the China Next Generation Internet. It is expected that IPv4 will be supported alongside IPv6 for the foreseeable future. However, ipv4-only clients/servers will not be able to communicate directly with IPv6 clients/servers, and will require service-specific intermediate servers or NAT-PT protocol-translation servers. There are fewer grains of sands in the Sahara Desert than will be available IP addresses Industrial Ethernet and Networking

Industrial Ethernet and Networking Term Alert: DNS Domain Name Server Software running on a host machine that links an IP address with a name. Allows users to connect to a device by IP address or by name. dx200.yca.com Domain names ending with .biz, .com, .info, .name, .net or .org can be registered through many different companies (known as "registrars"). The domain name system (DNS) stores and associates many types of information with domain names, but most importantly, it translates domain names (computer hostnames) to IP addresses. It also lists mail exchange servers accepting e-mail for each domain. In providing a worldwide keyword-based redirection service, DNS is an essential component of contemporary Internet use. Useful for several reasons, the DNS pre-eminently makes it possible to attach easy-to-remember domain names (such as "wikipedia.org") to hard-to-remember IP addresses (such as 66.230.200.105). Humans take advantage of this when they recite URLs and e-mail addresses. In a subsidiary function, the domain name system makes it possible for people to assign authoritative names without needing to communicate with a central registrar each time. Industrial Ethernet and Networking

Industrial Ethernet and Networking Term Alert: DHCP Dynamic Host Configuration Protocol Process of automatically assigning an IP address when a device is connected to a local area network. Typically used in an office to conserve IP addresses. DX2000 and MW100 can run static or dynamic (DHCP) Industrial Ethernet and Networking

Static vs. Dynamic Addressing Dynamic IP (DHCP) Static IP Industrial Ethernet and Networking

Looking at Your Network winipcfg (W95, W98, ME) ipconfig (NT 4.0, 2000) Industrial Ethernet and Networking

Looking at Your Network “Pinging” to test an IP address Reply from 65.203.177.86: bytes=32 time<10ms TTL=128 IP Address Round Trip Time Time To Live Maximum Hops Number of bytes transmitted Industrial Ethernet and Networking

Industrial Ethernet and Networking 7 Layer OSI Model Layer 4 Specifications Application Presentation Session Ethernet Standard Error Checking Transport Network Logical Addressing Routing The transport layer is layer four of the seven layer OSI model. It responds to service requests from the session layer and issues service requests to the network layer. The transport layer provides transparent transfer of data between hosts. It is usually responsible for end-to-end error recovery and flow control, and ensuring complete data transfer. In the Internet protocol suite this function is most commonly achieved by the connection oriented Transmission Control Protocol (TCP). The datagram-type transport, User Datagram Protocol (UDP), provides neither error recovery, nor flow control, leaving these to the application. The purpose of the Transport layer is to provide transparent transfer of data between end users, thus relieving the upper layers from any concern with providing reliable and cost-effective data transfer. The transport layer usually turns the unreliable and very basic service provided by the Network layer into a more powerful one. There is a long list of services that can be optionally provided at this level. None of them are compulsory, because not all applications want all the services available. Some can be wasted overhead, or even counterproductive in some cases. Connection-Oriented This is normally easier to deal with than connection-less models, so where the Network layer only provides a connection-less service, often a connection-oriented service is built on top of that in the Transport layer. Same Order Delivery The Network layer doesn't generally guarantee that packets of data will arrive in the same order that they were sent, but often this is a desirable feature, so the Transport layer provides it. The simplest way of doing this is to give each packet a number, and allow the receiver to reorder the packets. Reliable Data The underlying network may well be noisy, and the data received may not always be the same as the data sent. The Transport layer can fix this: typically by providing a checksum of the data which detects if there has been a glitch of some kind. Of course, error free is impossible, but it is possible to substantially reduce the numbers of undetected errors. This layer may also retransmit packets which have gone missing en route. Flow Control The amount of memory on a computer is limited, and without flow control a larger computer might flood a computer with so much information that it can't hold it all before dealing with it. Nowadays, this is not a big issue, as memory is cheap while bandwidth is comparatively expensive, but in earlier times it was more important. Flow control allows the receiver to say "Whoa!" before it is overwhelmed. Sometimes this is already provided by the network, but where it is not, the Transport layer may add it on. Byte Orientation Rather than dealing with things on a packet-by-packet basis, the Transport layer may add the ability to view communication just as a stream of bytes. This is nicer to deal with than random packet sizes, however, it rarely matches the communication model which will normally be a sequence of messages of user defined sizes. Ports Ports are essentially ways to address multiple entities in the same location. For example, the first line of a postal address is a kind of port, and distinguishes between different occupants of the same house. Computer applications will each listen for information on their own ports, which is why you can use more than one network-based application at the same time. On the Internet there are a variety of Transport services, but the two most common are TCP and UDP. TCP is the more complicated, providing a connection and byte oriented stream which is almost error free, with flow control, multiple ports, and same order delivery. UDP is a very simple 'datagram' service, which provides limited error reduction and multiple ports. TCP stands for Transmission Control Protocol, while UDP stands for User Datagram Protocol. Other options are the Datagram Congestion Control Protocol (DCCP) and Stream Control Transmission Protocol (SCTP). Some things, such as connection orientation can be implemented at either Transport or Network layer. The idea is that the Network layer implements whatever set of options is easiest: for some underlying networks it is easiest to implement connectionless communication, while for others it is easiest to implement connection oriented communication. The Transport layer uses this simplest set of options to Logical Link Control Media Access Control Data Link Physical Media specifications Industrial Ethernet and Networking

Industrial Ethernet and Networking Layer Four: Transport Provides transparent transfer of data between hosts. It is usually responsible error recovery and flow control, and ensuring complete data transfer. Reliable Data The Transport layer can detect and repair data errors. Flow Control The Transport layer controls the amount of data flow on the network. The amount of memory on a computer is limited, and without flow control a larger computer might flood a computer with so much information that it can't hold it all before dealing with it. Byte Orientation Rather than dealing with things on a packet-by-packet basis, the Transport layer may add the ability to view communication just as a stream of bytes. This is nicer to deal with than random packet sizes, however, it rarely matches the communication model which will normally be a sequence of messages of user defined sizes. Ports Ports are essentially ways to address multiple entities in the same location. Computer applications will each listen for information on their own ports, which is why you can use more than one network-based application at the same time. On the Internet there are a variety of Transport services, but the two most common are TCP and UDP. TCP is the more complicated, providing a connection and byte oriented stream which is almost error free, with flow control, multiple ports, and same order delivery. UDP is a very simple 'datagram' service, which provides limited error reduction and multiple ports. TCP stands for Transmission Control Protocol, while UDP stands for User Datagram Protocol. Other options are the Datagram Congestion Control Protocol (DCCP) and Stream Control Transmission Protocol (SCTP). Industrial Ethernet and Networking

Industrial Ethernet and Networking IEEE 802.3 Ethernet Carrier Sense Multiple Access/Collision Detection Devices wait until “the wire” is empty Allows two devices to try and talk at the same time Collisions occur (contention based) Has methods to handle collisions 802.3 is a broadcast network Collision Success Industrial Ethernet and Networking

Term Alert: Ethernet Ports Port numbers are divided into three ranges: Well Known Ports 0 - 1023 Registered Ports 1024 - 49151 Dynamic and/or Private Ports 49152 - 65535 Industrial Ethernet and Networking

Industrial Ethernet and Networking Term Alert: WAN Wide Area Network Wide-area networks (WANs) interconnect LANs with geographically dispersed users to create connectivity. Some of the technologies used for connecting LANs include T1, T3, ATM, ISDN, ADSL, Frame Relay, radio links, and others. New methods of connecting dispersed LANs are appearing everyday. Individual LAN’s (local area networks) that are connected to each other so they appear as a single, coordinated network to the users. A WAN may contain LAN’s in a single building or LAN’s in different countries. Industrial Ethernet and Networking

Industrial Ethernet and Networking WAN PC PC Network: 66.222.124.0 Routeable Corporate Router:66.222.124.56 InternetServiceProvider Plant A Plant B Router: 65.203.177.76 Router:67.222.124.56 DX200 DARWIN DC100 Network: 65.203.177.0 Routeable DX200 Network: 10.196.1.0 Non-Routeable Using NAT PC PLC Industrial Ethernet and Networking

Industrial Ethernet and Networking 7 Layer OSI Model Layer 5,6,7 Specifications Application Application Layer HTTP, FTP & SMTP Presentation Session Error Checking Transport Network Logical Addressing Routing Logical Link Control Media Access Control Data Link Physical Media specifications Industrial Ethernet and Networking

What Can We Do on the Application Layer? Configure Devices View operations remotely Control operations remotely Transfer data files Transfer graphics Industrial Ethernet and Networking

Industrial Ethernet and Networking Term Alert: Web Server Web Server Application software embedded in a network device that automatically delivers a pre-formatted screen and data views to a PC when a browser (Internet Explorer or Netscape) connects to the device over a network. Uses software technology like html, JAVA, and CGI. Provides access with custom software! Industrial Ethernet and Networking

Industrial Ethernet and Networking What is a Web Server ? PC(10.2.2.1) DX200 10.2.1.11 /C2 option MB master Industrial Ethernet and Networking

Configuration via Network Industrial Ethernet and Networking

PNG Graphic Files via Network Industrial Ethernet and Networking

Industrial Ethernet and Networking Hardware Industrial Ethernet and Networking

Industrial Ethernet and Networking Term Alert: NIC Network Interface Card A computer card containing and Ethernet controller chip and communications transceivers able to connect to the “wire” and talk using Ethernet rules and format. Laptop PCMCIA Card IEEE802.3 Desktop “NIC” Card IEEE802.3u Desktop “NIC” Card IEEE802.3 Laptop PCMCIA Card Wireless IEEE802.11 Industrial Ethernet and Networking

Industrial Ethernet and Networking Hardware Layer 1 Devices Device Types Repeaters Media converters Hubs Function Signal regeneration Media conversion Isolate network faults by segmenting How they work Operate at the Ethernet physical layer Receive Messages, regenerate and repeat on all ports Application Presentation Session Transport Network Data Link Physical Industrial Ethernet and Networking

Industrial Ethernet and Networking Hub: Good Performance All devices in the same collision domain All devices in the same Broadcast domain Devices share the same bandwith Industrial Ethernet and Networking

Data Flow in TCP/IP Networks 192.168.225.101 Hub LAN LAN 192.168.225.102 192.168.225.103 192.168.225.104 Industrial Ethernet and Networking

Industrial Ethernet and Networking Hardware Layer 2 Devices Device Types Bridges Switches Function Segmentation of Networks Speed Transition How they work Processes Ethernet header information Learns a node’s location by examining source address, forwards messages based on the destination address Application Presentation Session Transport Network Data Link Physical Industrial Ethernet and Networking

Switch: Better Performance Each device has a unique collision domain All devices in the same broadcast domain Devices do not share bandwith Industrial Ethernet and Networking

Industrial Ethernet and Networking Hardware Layer 3 Devices Device Types Routers Layer 3 Switch Function Coupling of subnets Network transition (ISDN – Ethernet) Internet Connectivity How they work Processe IP header information Forwards packets between networks based on Network layer information Application Presentation Session Transport Network Data Link Physical Industrial Ethernet and Networking

Router: Best Performance Unique collision domain for each device Unique broadcast domain for each device Devices do not share bandwith Industrial Ethernet and Networking

Industrial Ethernet and Networking Data Flow with a Switch 192.168.225.102 192.168.225.101 Send Packet Hub Switch 192.168.225.103 192.168.225.104 192.168.225.105 Send Reply Industrial Ethernet and Networking

Industrial Ethernet and Networking Demo (Webserver) Industrial Ethernet and Networking

Industrial Ethernet and Networking Term Alert: FTP File Transfer Protocol A format and procedure making it easy to send/receive/view files between devices on a network. DX uses FTP to automatically send files to a network server, eliminating need for manual collection of data files. Industrial Ethernet and Networking

DX=FTP Server, PC=FTP Client PC “pulls” files PC(10.2.2.1) Client Using an FTP client on the PC, files on DX can be copied &deleted. Internet Explorer has an embedded FTP client. Server Industrial Ethernet and Networking

DX=FTP Client, PC=FTP Server Using an FTP server on the PC, DX will automatically send files to the PC. DX “pushes” files Client Industrial Ethernet and Networking

Internet Information Services Setup your PC as an ftp Server Internet Information Services (IIS) is the Windows component that makes it easy to publish information and bring business applications to the Web. IIS makes it easy for you to create a strong platform for network applications and communications. Industrial Ethernet and Networking

Industrial Ethernet and Networking FTP Demo Industrial Ethernet and Networking

Industrial Ethernet and Networking Term Alert: SMTP & POP3 Simple Mail Transfer Protocol Post Office Protocol Version 3 SMTP is a protocol in OSI 7 layer model that defines format and procedure for a network device to send “email” to another device on the network. POP3 is a protocol that defines how to retrieve email on the Internet Industrial Ethernet and Networking

Industrial Ethernet and Networking Email Server/Client PC(10.2.2.1) Argosoft Mail server SMTP POP DX with SMTP Industrial Ethernet and Networking

Industrial Ethernet and Networking Email Demo Industrial Ethernet and Networking

Terminal/Device Servers Device Servers enable non-Ethernet ready products to communicate via Ethernet(TCP/IP). Virtual Com Port Redirector COM5 = 192.168.1.3:3001 Yokogawa Chart Recorder Serial RS422 Interface Device Server IP Address 192.168.1.3 192.168.1.2 Industrial Ethernet and Networking

Industrial Ethernet and Networking Term Alert: OPC OLE for Process Control A software standard developed by hardware vendors, software vendors and end users that specifies a common client/server interface format between hardware and software. SCADA/HMI vendors create OPC clients. Hardware vendors create OPC servers. Industrial Ethernet and Networking

Industrial Ethernet and Networking The OPC Concept PC Running OPC Server Plant Information Management Software Yokogawa Exaquantum OSI PI Aspentech SCADA/HMI Software Wonderware Intellution Iconics RSView Lookout Ethernet or Serial Interfaces Other Vendor Devices Industrial Ethernet and Networking

Industrial Ethernet and Networking OPC Demo Industrial Ethernet and Networking

Industrial Ethernet and Networking MODBUS Protocol MODBUS, a defacto standard from Modicon Three basic types, RTU, ASCII, TCP MODBUS TCP is over Ethernet MODBUS Plus is an enhanced peer to peer Modbus TCP is Modbus Protocol encapsulated in a TCP Packet. Industrial Ethernet and Networking

Industrial Ethernet and Networking MODBUS: DX to SLC500 A-B PLC with Prosoft MODBUS card Daqstation RS422/485 Modbus provides a common interface between hardware from multiple products. Industrial Ethernet and Networking

MODBUS: Extended Inputs DAQSTATION RS422/RS485 Modbus Master Device DARWIN I/O RS422/485 Modbus Slave Device 101010101 Ethernet 101010101 101010101 30 Analog Inputs via Modbus RS422/485 Serial 30 Analog Inputs 30 Analog Inputs Industrial Ethernet and Networking

MODBUS: External Controllers DAQSTATION CX RS422/RS485 Modbus Master Device Ethernet 16 Single Loop Controllers via Modbus RS422/485 Serial 20 Analog Inputs Industrial Ethernet and Networking

Foundation Fieldbus World's First FOUNDATIONTM Fieldbus-Compatible Recorder DAQSTATION will support the FOUNDATIONTM Fieldbus that's becoming the bi-directional digital communication standard for instrumentation in the 21st century. The FOUNDATIONTM Fieldbus can: ◆Dramatically increase the amount of data transmitted. ◆Drastically reduce the wiring costs. ◆Support a multivendor environment. ◆Simplify control. DPharp EJA Digital differential pressure transmitter YEWFLO Vortex flowmeter ●Device type: Link master ●Function blocks AI: 8 blocks MAI: 8 channels  1 block MAO: 8 channels  1 block YVP Valve positioner DAQSTATION YTA Temperature transmitter ADMAG-AE Electromagnetic flowmeter Industrial Ethernet and Networking

Fieldbus Applications Industrial Ethernet and Networking

Fieldbus Applications Industrial Ethernet and Networking

Fieldbus Applications Industrial Ethernet and Networking

Industrial Ethernet and Networking Recap 65.203.177.1 65.203.177.2 65.203.177.3 65.203.177.4 65.203.177.240 VPN Server IP:192.168.1.2 SN:255.255.255.0 DG:192.168.1.1 Hub 192.168.?.? INTERNET Remote User VPN Client Typical Office LAN Typical Data Acquisition LAN Ftp Server Primary 192.168.1.6 Secondary 192.168.1.7 LAN Router WAN Router PI Database 192.168.1.8 ISP 192.168.1.1 IP:192.168.1.3 IP:192.168.1.4 IP:192.168.1.5 Industrial Ethernet and Networking

Industrial Ethernet and Networking Additional Resources http://kb.us.yokogawa.com http://www.us.yokogawa.com/support/events/seminars/network/default.htm - Copy of PowerPoint - PDF’s of tutorials and white papers - Links to useful sites Industrial Ethernet and Networking

What You Will Learn Today Introduction to basic network concepts Radio frequency and spread spectrum technology basics Wired and wireless standards Wireless topologies (Ad Hoc vs. Infrastructure) Security in wireless networks Setting up an office grade wireless router Radio Physics Types of wireless radios (industrial and office) Implementation issues (antennaes, site surveys) Typical uses of wireless in industrial settings Industrial Ethernet and Networking

Microwaves, RC Cars, Cordless Phones, & Door Openers These everyday devices use radio frequency technology Microwave (2.5 GHz) RC Toys (27 or 49 MHz) Garage Door Opener (300-400 MHz) Cordless Phones (900MHz, 2.4GHz, 5.8GHz) Industrial Ethernet and Networking

A Look At Radio Frequencies Radio frequency spectrum is assigned by governments CB radio: 26.96 - 27.41 MHz FM radio: 88 - 108 MHz WiFi for PC’s: 2.4 GHZ Licensed vs. Unlicensed bands Licensed provides more power! Two licensed frequency bands 400 MHz 900 MHz 3 unlicensed frequency bands in U.S. ISM bands (Industrial, Scientific, Medical) 902-928 MHz 2.4 to 2.483 GHz 5.725 to 5.875 GHz (U-NII*) . *Unlicensed National Information Infrastructure Industrial Ethernet and Networking

Frequencies By Country North America License-free 900MHz, 2.4 GHZ, and 5.4 GHZ spread spectrum Licensed 400MHz to 500MHz fixed frequency Europe License-free 433 MHz (all countries) UK, Sweden, Finland, Spain, Portugal, Poland, Czech also have special channels in the 400 MHz band 869MHz 500mW 10% duty factor or 5mW 100% duty factor Licensed 450MHz (most countries) South America License-free 900MHz spread spectrum (most countries) Asia License-free 450MHz (Singapore, Hong Kong) License-free 220MHz fixed frequency (China) Licensed 400MHz to 500 MHz fixed frequency (most countries) Middle East Licensed 900MHz spread spectrum (some countries) Africa License-free 433MHz (some countries) www.Elprotech.com Industrial Ethernet and Networking

Sending Information by Radio Start with “data” Modulate the data “over” the fixed frequency carrier Resulting signal has data Industrial Ethernet and Networking

Narrow Band vs. Spread Spectrum Two approaches for signal delivery Spread Spectrum is our interest for Office and Industrial http://catalog.omnispread.com Industrial Ethernet and Networking

Industrial Ethernet and Networking Who is this Woman? Hedwig Eva Maria Kiesler Industrial Ethernet and Networking

What is Spread Spectrum? The signal from the radio transmitter is “spread” across a wider range of radio frequency than is required for standard narrow band applications (like FM radio) Original application of spread spectrum was Military Industrial radios use spread spectrum technology Lower power density (less power at any given frequency) Higher noise immunity and resistance to interference Improved security Two types of spread spectrum Direct Sequence (DSSS) Frequency Hopping (FHSS) Industrial Ethernet and Networking

A Bit of History : The Frequency Hopping Patent In the United States Hedy Lamarr and George Antheil, shunned by the Navy, no longer pursued their invention. But in 1957, the concept was taken up by engineers at the Sylvania Electronic Systems Division, in Buffalo, New York. Their arrangement, using, of course, electronics rather than piano rolls, ultimately became a basic tool for secure military communications. It was installed on ships sent to blockade Cuba in 1962, about three years after the Lamarr-Antheil patent had expired. Subsequent patents in frequency changing, which are generally unrelated to torpedo control, have referred to the Lamarr-Antheil patent as the basis of the field, and the concept lies behind the principal anti-jamming device used today, for example, in the U.S. government's Milstar defense communication satellite system. Heddy Lamarr Industrial Ethernet and Networking

FHSS Frequency Hopping DSSS Direct Sequence Back to Basics The Two Commonly Used Types of Spread Spectrum Technology FHSS Frequency Hopping DSSS Direct Sequence Industrial Ethernet and Networking

DSSS (Direct Sequence Spread Spectrum) DSSS “Spreads” the message across a wide frequency Base transmission is centered at a specific frequency Transmitted with frequency changing many times per data bit Multiple copies of each original data bit are sent at different frequencies Transmission at each frequency is sent at lower power Industrial Ethernet and Networking

Industrial Ethernet and Networking DSSS Encoding Scheme Encoding is done in the data stream before transmission Direct sequence encoding uses psuedo-random noise generator (PN) Each data bit is encoded into a longer data string Resulting longer message is now encrypted, only matching radio can decode www.breezecom.com 1 = 10110 0 = 01001 http://wireless.industrial-networking.com THE WIRELESS OPTION FOR INDUSTRIAL ETHERNET Industrial Ethernet and Networking

DSSS Signal Advantages Encoded data looks like noise Transmission is sent at low power so it is harder to detect RFI noise can easily be discriminated from data signal Industrial Ethernet and Networking

FHSS (Frequency Hopping Spread Spectrum) FHSS moves the message between different frequencies A single data packet is transmitted at one frequency The radio then “hops” to a new frequency to transmit the next packet Transmitter and receiver are programmed with the same hop pattern The frequency hops appear random to observers Hopping avoids interference (usually narrow band at one frequency) Redundancy is achieved by re-transmitting at different frequency Industrial Ethernet and Networking

Industrial Ethernet and Networking FHSS Encoding Frequency hopping encoding is done at transmission The hop pattern for the frequency is encoding Data itself is not directly encoded (as in direct sequence) Observed frequencies do not show any obvious pattern http://wireless.industrial-networking.com THE WIRELESS OPTION FOR INDUSTRIAL ETHERNET Industrial Ethernet and Networking

Comparison of DSSS vs. FHSS DSSS encodes the data FHSS encodes the frequency Data speed: DSSS has higher rates (FHSS has hop latency ) Power: FHSS is lower power (DSSS has complex circuits) Cost: FHSS is generally lower in cost Robustness: FHSS has stronger noise immunity Density: More FHSS in one area than DSSS Data Accuracy: DSSS wins on this one Industrial Ethernet and Networking

OFDM: Orthogonal Frequency Division Multiplexing A Third Type of Spread Spectrum Technology ! Used in 802.11g and 802.11a home/office radios Provides higher data rates Uses multiple sub-carrier frequencies each centered at different frequencies Breaks the data message into parts Transmits all the parts at the same time using the sub-carriers Fast transmission is sent as many parallel slow transmissions Not used in current generation of industrial radios Industrial Ethernet and Networking

Industrial Ethernet and Networking Quick Quiz #1 Do industrial radios use narrow band or spread spectrum technology? Spread spectrum Name the 2 types of spread spectrum technology used in industrial radios DSSS: Direct Sequence Spread Spectrum FHSS: Frequency Hopping Spread Spectrum Which is capable of higher speeds, DSSS or FHSS? DSSS ISM is an abbreviation for what? Industrial, Scientific, and Medical How many ISM bands exist? Three Are the ISM bands licensed or unlicensed? Unlicensed What are the frequencies of the ISM bands? 900 MHz, 2.4 GHz, 5.8 GHz What is the primary advantage of a licensed band? More power than unlicensed bands (i.e. more power is more distance) Industrial Ethernet and Networking

Wired & Wireless Standards 802.3 802.3i 802.5 802.3u 802.3af 10base-T ethernet Token Ring (IBM…) 100base-TX ethernet Powered ethernet 802.3ab 1000base-T gigabit copper Wireless WPAN (wireless personal area network) 802.1x 802.11 802.11a 802.11b 802.11g 802.16 802.15 54 Mbps at 5.4 GHz “Wi-Fi”, 11 Mbps in 2.4 GHz 54 Mbps at 2.4 GHz 802.15.1 Bluetooth 802.15.4 Zigbee WMAN (wireless metropolitan area network) WLAN (wireless local area network) Industrial Ethernet and Networking

Industrial Ethernet and Networking Wireless Standards 802.11 1 or 2 Mbps transmission in the 2.4 GHz band Frequency hopping spread spectrum (FHSS) Direct sequence spread spectrum (DSSS) 802.11b (2.4 to 2.497 GHz) Data speeds to 11Mbps DSSS only Wi-Fi is interoperability standard for 802.11b (WECA) 802.11g (2.4 to 2.497 GHz) 54 Mbps speed extension of 802.11b with OFDM Backward compatible with 802.11b for <11 Mbps 802.11a (5.15 to 5.875 GHz) Data speeds to 54 Mbps 300 MHz bandwidth indoor, OFDM Orthogonal frequency division multiplexing (OFDM) Industrial Ethernet and Networking

Wireless G w/Speedbooster Industrial Ethernet and Networking Wireless A B G Wireless Standard Wireless B Wireless G (802.11 G) Wireless G w/Speedbooster Wireless A/G Wireless G with SRX Wireless G with SRX200 Wireless G with SRX400                                                            N/A Up to 5 Times Faster Than Wireless B 35% Faster than Wireless G Uncrowded 5GHz Band Up To 8X Faster than Wireless G. Range up to 3X farther Up To 6X Faster than Wireless G. Range up to 2X farther Up To 10X Faster than Wireless G. Range up to 3X farther                                   2.4Ghz 2.4Ghz & 5Ghz Typically Up To 150ft Up to 150 ft Up to 150 ft (Wireless G) Up to 150 ft (Wireless G) Up to 3X farther than Wireless G Up to 2X farther than Wireless G More Popular Standards for hotspots Yes Yes in a Wireless-G Mode Growing use in Wireless-A 802.11b & 802.11g 802.11a, 802.11b & 802.11g 802.11b & 802.11g Based on MiMo Technology Legacy Standard Fast Speed Faster Speed Fast Speed with less interferance from other Wireless LANs. Works with all wireless standards Farthest Range & Fastest Speed Superior Range & Superior Speed Premium Range & Speed Wireless-B (802.11b) - Operates on the 2.4GHz frequency band and can transmit data at speeds of up to 11Mbps within a range of up to 100-150 feet. Wireless range can be affected by reflective or signal-blocking obstacles, such as mirrors, walls, devices and location, whether indoors or outdoors. Learn more about network speeds. Wireless-A (802.11a) - Operates at the frequency of 5GHz, which is less crowded than 2.4GHz where telephones and microwaves may cause interference. Although the speed is up to 54Mbps, the range is only up to 75 feet. Wireless-A is incompatible with both Wireless-B and G because it operates at a different frequency. Wireless-A+G (802.11a + g) - Linksys also offers dual-band products, in which routers and adapters are compatible with both 2.4GHz and 5GHz frequencies. Both radio bands work simultaneously, blanketing your wireless zone and bandwidth. Wireless-G (802.11g) - Features the same benefits as Wireless-B, but offers 5X the speed at up to 54Mbps. Wireless-G currently offers the best combination of performance and value. You can mix Wireless-B with Wireless-G equipment, but you will lose the higher performance speeds of Wireless-G. Wireless-N (802.11n) - The next generation of high-speed wireless networking, capable of delivering the range and capacity to support today's most bandwidth-hungry applications like streaming high definition video, voice, and music. Wireless-N is based on MIMO (Multiple Input, Multiple Output) technology, which uses multiple radios to transmit multiple streams of data over multiple channels. Learn more. Industrial Ethernet and Networking

Why are the Standards numbered 802? IEEE’s development of LAN standards was assigned the project number 802, for February 1980 when the committee convened. Get it? 2/80 or 802 Industrial Ethernet and Networking

Industrial Ethernet and Networking Quick Quiz #2 What is the 802 sub-designation for wireless technologies 802.11 802.11b is known by the common name of ? Wi-Fi The max data rate of 802.11b is ??? Mbps 11 Mbps True or False, 802.11b supports both FHSS and DSSS? False. FHSS is not available in 802.11b. FHSS is too slow to support 11 Mbps True or False, All industrial radios support 802.11 standards False, many industrial radios use proprietary FHSS or DSSS A microwave oven could interfere with which 802.11 technologies 802.11b and 802.11g because they are 2.4 GHz & a microwave is 2.5 GHz Industrial Ethernet and Networking

Wireless Topologies: Ad-Hoc vs. Infrastructure Ad-Hoc (or point-to-point) 2 or more network devices transfering data directly between themselves. Most efficient network with a minimum of network overhead Infrastructure (or access point) With this network one of the Ethernet radio modems is configured as the "access point ". Access Point is then used as a wireless bridge to the cabled LAN network. All nodes (either wireless cards or other Ethernet radio modems configured as remotes) communicate only with the Access Point that serves the WLAN as a HUB THE WIRELESS OPTION FOR INDUSTRIAL ETHERNET by Eric Marske from http://wireless.industrial-networking.com Industrial Ethernet and Networking

A Little About Channels in 802.11b/g 2.473 GHz 2.462 GHz 2.412 GHz 1 2 3 4 5 6 7 8 9 10 3 MHz 2.401 GHz 22 MHz 11 channels with each channel 22MHz in width. Each channel is centered at 5MHz intervals starting at 2.412GHz and ending at 2.462GHz . 802.11b and 802.11g standards have a maximum of three non-overlapping channels carrying 11 Mbps throughput each (33 Mbps total) and 54 Mbps (162 Mbps total) throughput 802.11a has a maximum of eight non-overlapping channels carrying 54 Mbps throughput each, or 432 Mbps total throughput. Industrial Ethernet and Networking

Linksys G Wireless Router Industrial Ethernet and Networking Our Wireless Network 802.11b wireless 802.11g wireless Linksys G Wireless Router 192.168.20.1 Radiolinx 192.168.30.1 CX1000 192.168.30.3 UT351 192.168.30.2 MX100 192.168.20.20 FA-M3 PLC 192.168.20.8 Industrial Ethernet and Networking

Hands-On #1: Setting Up an Office 802.11g Router Use web configuration to setup wireless router IP address Keep SSID at default of linksys Set up channel (1 thru 11) Do not activate WEP encryption Activate DHCP (dynamic host configuration protocol) FA-M3 PLC 802.3 10baseT hardwire 192.168.20.8 192.168.20.22 (internal wireless) 802.11g wireless 192.168.20.1 Industrial Ethernet and Networking

Industrial Ethernet and Networking Security Industrial Ethernet and Networking

Industrial Ethernet and Networking Security SSID (Service Set IDentifier) - Your wireless network's name. WEP (Wired Equivalent Privacy) - A method of encrypting data transmitted on a wireless network for greater security. WPA (Wi-Fi Protected Access ) -WPA was designed to be a replacement for WEP networks without requiring hardware replacements. Now WPA2 is being offered. WPA and WEP are technologies that "encrypt" the traffic on your network. That is, they scramble it so that an attacker can't make any sense of it. To unscramble it at the other end, all systems using it must know a "key" or password. Note that WPA is now in a second generation, referred to as WPA2. Unless otherwise specified, this document uses "WPA" to refer to both. WPA and WEP provide both access control and privacy. Privacy comes from the encryption. Access control comes from the fact that someone must know the password to use your network. For this reason, for small networks, using WPA is enough to meet the requirements of the Wireless policy. However you will still want to make sure that any services that use a password or other private information use SSL or some other type of end to end encryption. WEP is significantly less secure than WPA, but can be used until your equipment can be upgraded to support WPA. While WEP is widely regarded as insecure, it is still a lot better than nothing. WPA has two modes, personal and enterprise. For small installations you'll want to use personal mode. It just requires a password. Enterprise mode is for larger installations, that have a Radius server that will support WPA. The primary problem with WPA in personal mode is that it has a single password, which you must tell to all users. That becomes impractical for larger installations. WPA in enterprise mode requires each user to login with their own username and password. That simplifies management in large installations, because you don't have to distribute a common password to all your users. However it is a bit more complex to implement: Each user's system must have special software to let the user login to the network. This software is referred to as an "802.1x supplicant". The access point must support WPA enterprise mode. The access point is configured to talk to a RADIUS server, which is a central server that actually checks the password. You must have a RADIUS server that supports WPA enterprise mode. While the RADIUS server may have its own list of usernames and passwords, it would be more common for it to talk to an LDAP or Active Directory server, so that users login to the network with the same password that they use for other services. For this reason, most large implementations at Rutgers do not use enterprise mode. Instead they use separate gateway boxes for access control, and depend upon end to end encryption for privacy. One can argue that this is not as secure as WPA enterprise mode, but it avoids the support implications of requiring users to login to the network with an 802.1x supplicant. Industrial Ethernet and Networking

Industrial Ethernet and Networking A Few Terms VPN – “Virtual Private Network” Creates another layer of networking on top of wireless. This layer is encrypted. Independent of any weakness in the network technology Unfortunately SSL and SSH are not yet sufficiently widespread that we can be sure all activity is covered by one or the other of them. Another approach is to use VPN ("virtual private network") technology. This creates another layer of networking on top of the wireless network. This layer is encrypted. Because VPNs are implemented in software (at least on the user's end), they are independent of any weaknesses in the network technology, and they can be used with any vendor's network cards. Windows and several other operating systems come with the software needed to use a VPN. However you will need to supply something on the other end. There are similarities between SSL/SSH and a VPN: both encrypt your communications. The difference is that SSL and SSH are used for individual connections. E.g. when you are talking to a web server using SSL, the specific connection between you and the web server is encrypted using SSL. With a VPN, all of your traffic goes through a single encrypted connection. If every service you talk to supports SSL or SSH, the result is the same. A typical VPN setup will look like this: The VPN box should be configured so that users must establish a VPN from their laptop to it. In the process of establishing the VPN, they need a username and a password. Thus this approach deals with both access and privacy issues. It deals with access issues, because users must specify a username and password in order to establish the VPN. It deals with privacy issues because all traffic is encrypted. The significant drawbacks to VPNs are All users will need to set up VPN software. This may require significant user support. There are situations where this approach is probably not practical. The primary one involves guests. If you take this approach, you need to think about how you will handle guests. E.g. if you host a conference, and attendees expect to use laptops, it may not be practical to get all of them to set up VPN software. You may also have people from other institutions that need to access their home institutions using a corporate firewall. It is normally not practical to use two VPN's at once. So if someone needs to use VPN software to get into their home network, they probably will not be able to use your wireless VPN. For these reasons people implementing this approach should plan on having the ability for selected users to bypass the VPN. However this bypass needs to be controlled so that normal Rutgers users don't use it. Otherwise their passwords will be compromised. Industrial Ethernet and Networking

So What About Security in Wireless? The first and obvious weakness of wireless is “no wire” Three Popular “hacking” methods 1) MAC Address Spoofing Packets transmitted over a network, either your local network or the Internet, are preceded by a Packet Header. These packet headers contain both the source and destination information for that packet. A hacker can use this information to spoof (or fake) a MAC Address allowed on the network. With this spoofed MAC Address, the hacker can also intercept information meant for another user. 2) Data Sniffing Data "sniffing" is a method used by hackers to obtain network data as it travels through unsecured networks, such as the Internet. Tools for just this kind of activity, such as protocol analyzers and network diagnostic tools, are often built into operating systems and allow the data to be viewed in clear text. 3) Man in the Middle Attacks Once the hacker has either sniffed or spoofed enough information, he can now perform a "man in the middle" attack. This attack is performed, when data is being transmitted from one network to another, by using this information to reroute the data and appear to be the intended destination. This way, the data appears to be going to its intended recipient. From Linksys VPN whitepaper Industrial Ethernet and Networking

How to Improve Basic Security in 802.11 Networks Let’s look at a live example with the Linksys router Change SSID (must know or guess SSID to connect) Turn off SSID broadcast (cannot automatically see network) Activate WEP encryption (data is visible but not readable) Turn off DHCP (Even if you connect, you must guess IP) Activate MAC filtering (Must specify MAC address) Industrial Ethernet and Networking

A Quick Comparison: Office vs. Industrial 32 mW 200 feet indoors 0 C to 40 C Plastic Power Distance Operating Temp Construction Mounting 500 mW 20 miles outdoor -30 C to 60 C Aluminum Industrial Ethernet and Networking

Hands-On #2: Setting Up an Industrial 802.11b radio Use web configuration to setup wireless router IP address Set up SSID as Radiolinx Set up channel as 1 Activate WEP encryption to improve security 802.3 10baseT hardwire 192.168.30.22 (internal wireless) UT351E Controller 802.11b wireless 192.168.10.4 192.168.20.4 192.168.30.1 Industrial Ethernet and Networking

A Few Quick Points on RF Propogation Higher frequencies have higher data rates (bandwith) There is 1000 times more spectrum between 1-2 GHz as there is between 1-2 MHz. RF waves lose power as they travel in the air Higher frequencies lose power (attenuate) faster RF waves attenuate as they pass through objects Higher frequencies attenuate faster Lower Frequencies (i.e. 900 mHz have greater distance) Industrial Ethernet and Networking

Performance of 2.4 GHZ vs. 900 MHz 2.4 GHz has 10-20% of the reliable distances of 900 MHz 900 MHz has 5-10 times the distance of 2.4 GHz inside Typical Outdoors with Line of Sight 2.4GHz, 1W plus 6dB gain antennas 5 – 15 miles 900MHz, 1W plus 6dB gain antennas 15 – 25 miles 2.4GHz, 100mW plus 16dB antennas 10 – 40 miles 900MHz, 100mW plus 16dB antennas 20 – 60 miles 2.4GHz, 1W 100 – 600 feet 900MHz, 1W 500 – 5000 feet Typical Indoors in Congested Environment Industrial Ethernet and Networking

Office vs. Industrial Radios Radio linx FH Radio linx Hotspot MDS iNet900 Industrial Ethernet and Networking

The Physics of Radios: Terms and Formulas What is a decibel (dB)? RF power calculation basics EIRP (Effective Isotropic Radiated Power) Types of propogation losses (attenuation) Free space loss Penetration loss Multipath fading Near/far problem in DSSS radios Interference from other RF sources Collocation Industrial Ethernet and Networking

Industrial Ethernet and Networking What is a decibel? The decibel (abbreviated dB) must be the most misunderstood measurement since the cubit. Although the term decibel always means the same thing, decibels may be calculated in several ways, and there are many confusing explanations of what they are. The decibel is not a unit in the sense that a foot or a dyne is. Dynes and feet are defined quantities of force and distance. A decibel is a RELATIONSHIP between two values of POWER. Decibels are designed for talking about numbers of greatly different magnitude, such as 23 vs. 4,700,000,000,000. With such vast differences between the numbers, the most difficult problem is getting the number of zeros right. We could use scientific notation, but a comparison between 2.3 X 10 and 4.7 X 1012 is still awkward. For convenience, we find the RATIO between the two numbers and convert that into a logarithm. This gives a number like 11.3. As long as we are going for simplicity, we might as well get rid of the decimal, so we multiply the number times ten. If we measured one value as 23 hp and another as 4.7 trillon hp, we say that one is 113dB greater than the other.                                        The usefulness of all this becomes becomes apparent when we think about how the ear perceives loudness. First of all, the ear is very sensitive. The softest audible sound has a power of about 0.000000000001 watt/sq. meter and the threshold of pain is around 1 watt/sq. meter, giving a total range of 120dB. In the second place, our judgment of relative levels of loudness is somewhat logarithmic. If a sound has 10 times the power of a reference (10dB) we hear it as twice as loud. If we merely double the power (3dB), the difference will be just noticeable. [The calculations for the dB relationships I just gave go like this; for a 10 to one relationship, the log of 10 is 1, and ten times 1 is 10. For the 2 to one relationship, the log of 2 is 0.3, and 10 times that is 3. Incidentally, if the ratio goes the other way, with the measured value less than the reference, we get a negative dB value, because the log of 1/10 is -1.] Decibels measure the power of a radio system! www.howstuffworks.com Industrial Ethernet and Networking

Understanding Gain Measurements Antenna performance is primarily established by its gain. There are three common references used when defining gain in radios: Gain referenced to a dipole antennae: dBd Gain referenced to an isotropic source: dBi Gain referenced to power in milliwatts: dBm Industrial Ethernet and Networking

Understanding Power in Radios RF transmitter and receiver power is expressed in watts. RF power can also be expressed in dBm (decibels relative to milliwatts) dBm for RF power is useful when calculating radio system gains (since other gains and losses from cables & Antennas are in dB’s) The relation between dBm and watts can be expressed as follows: Power(dBm) = 10 x Log10 Power(mW) 1 Watt = 1000 mW; PdBm = 10 x Log10(1000) = 30 dBm 100 mW; PdBm = 10 x Log10 (100) = 20 dBm 1mW: PdBm = 10 x Log10 (1) = 0 dBm Power(mW) = 10(Power(dBm)/10) 15 dBm = 10 (15/10) = 10 (1.5) = 32 mW Industrial Ethernet and Networking

Industrial Ethernet and Networking A Table of mW to dBm Industrial Ethernet and Networking

EIRP (Effective Isotropic Radiated Power) EIRP is the effective power transmitted from the antenna. EIRP = (power at transmitter) - (cable attenuation) + antenna gain EIRP = Pout - Ct - Gt Pout = output power of transmitter in dBm Ct = transmitter cable attenuation in dB Gt = transmitting antenna gain in dBi Take the following example: transmitter power out = Pout = 50mW cable loss (attenuation) = Ct = 4dB transmitting antenna gain = Gt = 6 dBi convert transmitter power from mW to dBm 10 x log (50/10) = 17 dBm EIRP = 17dBm - 4 dBm + 6 dBm = 19 dBm www.breezecom.com Industrial Ethernet and Networking

Industrial Ethernet and Networking Path Loss Industrial Ethernet and Networking

Link Budget Calculation Industrial Ethernet and Networking

Industrial Ethernet and Networking Antenna Basics Industrial Ethernet and Networking

Extra Power: A Gift from the FCC The FCC had already decided to place a limit of +36 dBm (4 watts) Effective Isotropic Radiated Power (EIRP) on Multi-Point WLAN links, and a maximum power of +30 dBm (1 watt) at the WLAN tranmitter's connector. So they also defined that if any antenna used in point-to- point links has a gain higher than 6 dBi, the transmitter power must be reduced so that the "peak output power of the intentional radiator" is reduced by 1 dB for every 3 dB of antenna gain beyond 6 dBi. This is a gift from the FCC. It allows point-to-point WLANs to achieve an EIRP well in excess of +36 dBm, and the greater range that results from the higher power. Here is a table of some typical values: Industrial Ethernet and Networking

Discuss RSSI Sensivitiy Calculations Look at specs with RSSI -dBm and BEC rate…. Industrial Ethernet and Networking

Factors Affecting Performance Higher frequency signals show bigger losses Multipath fading Near/far problem in DSSS radios Interference from other RF sources Collocation Industrial Ethernet and Networking

Industrial Ethernet and Networking Attenuation Industrial Ethernet and Networking

Industrial Ethernet and Networking Multipath Industrial Ethernet and Networking

Industrial Ethernet and Networking Near/far Industrial Ethernet and Networking

Industrial Ethernet and Networking Interference Industrial Ethernet and Networking

Industrial Ethernet and Networking Collocation Industrial Ethernet and Networking

Industrial Ethernet and Networking Typical Distances MDS iNet900 Elpro Radio linx The End Result (elpro technical article 1.1 “Wireless Solutions for Process Applications) The end result of the effects of RF power, propagation losses, penetration attenuation, defraction and reflection loss is that 2.4GHz has only a very short reliable operating distance in industrial environments - with reliable distances of only around 10-20% of the lower frequency bands. That is, the lower frequency bands reach 5-10 times the distance in plants and factories. In many applications, distances of more than 100 metres (300 feet) cannot be achieved with 2.4GHz over congested obstructed paths. This is an important factor, as for most 100 metre applications, it is still cheaper to install wiring than use wireless. Industrial Ethernet and Networking

Industrial Ethernet and Networking Speed vs. Distance Industrial Ethernet and Networking

Transmission Technology Options Industrial Ethernet and Networking

Industrial Ethernet and Networking Elpro II Industrial Ethernet and Networking

Industrial Ethernet and Networking What is a Mesh Radio? WPAN 802.15 Bluetooth Zigbee Features Bi-directional Self-forming Self-healing Industrial Ethernet and Networking

Industrial Ethernet and Networking Other Radio Types Mesh Cellular (CDPD) Satellite Industrial Ethernet and Networking

Radiolinx Products sold by Yokogawa RLX-FHE: Frequency Hopping Ethernet ($1,395 per radio) Use with Ethernet DAQ/FA-M3/Controllers Does not use 802.11b so it will not link to PC wireless RLX-FHS: Frequency Hopping Serial ($1,250 per radio) Use with serial DAQ/FA-M3/Controllers Supports MODBUS RTU Runs Yokogawa protocol in transparent mode RLX-FHES: Frequency Hopping Ethernet with serial server ($1,495 per radio) Has RS232/RS485 port built-in Use when you need to get serial protocol into Ethernet RLX-IH: 802.11b “HotSpot” ($1,549) Use when you need Ethernet with PC wireless connectivity Antennas, connectors and cables are also available from Yokogawa Industrial Ethernet and Networking

RLX-FHE Frequency Hopping Ethernet (2.4GHz) $1,395 per radio Mobile configuration and data logging without wires! Frequency hopping 2.4 GHz unlicensed (ISM band) Not compatible with 802.11 wireless (Wi-Fi) Designed for industrial environment (-40 to 158 degF) Up to 16 mile range with line of sight with hi gain antennas Proprietary radio frequency protocol (158 hopping patterns) 40 or 128 bit hardware data encryption Industrial Ethernet and Networking

RLX-FHE Frequency Hopping Ethernet (2.4 GHz) Data from Remote DX100’s is Consolidated in PC PC running: DAQStandard (configuration) DAQLogger SCADA/HMI with OPC RLX-FHE DX104 RS232 MODBUS RTU Slave #1 RLX-FHE DX104 10BaseT Ethernet RLX-FHE RS232 MODBUS RTU Slave #2 RLX-FHE DX104 RS232 MODBUS RTU Slave #3 Industrial Ethernet and Networking

RLX-FHS Frequency Hopping Serial (2.4GHz) $1,250 per radio Mobile data logging without wires! Frequency hopping 2.4 GHz unlicensed (ISM band) Modbus RTU, Modbus ASCII, DF1, generic ASCII RS232, RS422, or RS485 Flexible set-up modes Point to point Point to multi-point Peer to peer Designed for industrial environment (-40 to 158 degF) Up to 16 mile range with line of sight with hi gain antennas Proprietary radio frequency protocol (158 hopping patterns) 40 or 128 bit hardware data encryption Industrial Ethernet and Networking

RLX-FHS Frequency Hopping Serial (2.4 GHz) Data from Remote DX100’s is Consolidated in DX200 RLX-FHS DX104 RS232 MODBUS RTU Slave #1 10BaseT Ethernet RLX-FHS DA100 RLX-FHS RS485 MODBUS RTU Slave #2 RS232 MODBUS RTU DX220 RLX-FHS UT450 RS485 MODBUS RTU Slave #3 Industrial Ethernet and Networking

RLX-IH 802.11b Industrial Wireless Radio $1,549 per radio Mobile configuration and data logging without wires! 802.11b direct sequence spread spectrum radios Can be implemented with a single radio! 2.4 GHz unlicensed (ISM band) Compatible with standard PC wireless cards Designed for industrial environment Up to 20 mile range in outdoor settings Industrial Ethernet and Networking

UT351 with Radiolinx 802.11b Hotspot Laptop with 802.11b “Wi-Fi” wireless ability Laptop with 802.11b “Wi-Fi” wireless ability Industrial Ethernet and Networking

Advanced Security Issues for 802.11 Security Enhancements to 802.11 Encryption & Authentication TKIP – Temporal Key Integrity Protocol – interim solution AES – Advanced Encryption Algorithm – new hardware 802.1x Authentication Framework included in 802.11i Authentication protocol (EAP-TTLS, LEAP) Dynamic encryption key distribution method Supported in Windows XP Linksys wants to make wireless networking as safe and easy for you as possible. So, please keep the following points in mind whenever setting up or using your wireless network. 1. Performance. The actual performance of your wireless network depends on a number of factors, including: In an Infrastructure environment, your distance from the access point. As you get farther away, the transmission speed will decrease. Structural interference. The shape of your building or structure, the type of construction, and the building materials used may have an adverse impact on signal quality and speed. The placement and orientation of the wireless devices. 2. Interference. Any device operating in the 2.4 GHz spectrum may cause network interference with a 802.11b wireless device. Some devices that may prove troublesome include 2.4 GHz cordless phones, microwave ovens, adjacent public hotspots, and neighboring 802.11b wireless LANs. 3. Security. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation. While the following is a complete list, steps A through E should, at least, be followed: Change the default SSID. Disable SSID Broadcasts. Change the default password for the Administrator account. Enable MAC Address Filtering. Change the SSID periodically. Enable WEP 128-bit Encryption. Please note that this will reduce your network performance. Change the WEP encryption keys periodically. For information on implementing these security features, please refer to the User Guide. 4. Security Threats Facing Wireless Networks Wireless networks are easy to find. Hackers know that in order to join a wireless network, wireless networking products first listen for  "beacon messages".   These messages are unencrypted and contain much of the network’s information, such as the network’s SSID (Service Set Identifier) and the IP Address of the network PC or access point. One result of this, seen in many large cities and business districts, is called “Warchalking”. This is one of the terms used for hackers looking to access free bandwidth and free Internet access through your wireless network. Here are the steps you can take: Change the administrator’s password regularly.  With every wireless networking device you use, keep in mind that network settings (SSID, WEP keys, etc.) are stored in its firmware. Your network administrator is the only person who can change network settings. If a hacker gets a hold of the administrator’s password, he, too, can change those settings. So, make it harder for a hacker to get that information. Change the administrator’s password regularly. SSID. There are several things to keep in mind about the SSID: Disable Broadcast Make it unique Change it often Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID. Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use. Change your SSID regularly so that any hackers who have gained access to your wireless network will have start from the beginning in trying to break in. MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address. WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a panacea for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult. There are several ways that WEP can be maximized: Use the highest level of encryption possible Use a “Shared” Key Use multiple WEP keys Change your WEP key regularly Implementing encryption will have a negative impact on your network’s performance. If you are transmitting sensitive data over your network, encryption should be used. These security recommendations should help keep your mind at ease while you are enjoying the most flexible and convenient technology Linksys has to offer. Industrial Ethernet and Networking

Security Issues for FHSS and DSSS Breezecom FHSS DSSS Industrial Ethernet and Networking

Example of Security Setup in Linksys Industrial Ethernet and Networking

Industrial Ethernet and Networking Site Surveys : Indoor Software packages such as Ekahau ESS site survey Determine performance characteristics Help locate access point positions Determine antennae selection and positioning Detect “foreign” connections Industrial Ethernet and Networking

Site Surveys : Outdoors Industrial Ethernet and Networking

Site Surveys : Outdoors Industrial Ethernet and Networking

Industrial Radio Types Radio Modems (Ethernet and Serial data ) I/O (Telemetry) Wireless gateways Combined Data and I/O Wireless Device Servers Cellular Satellite Industrial Ethernet and Networking

Product Samples: Ethernet Radio Modems             Product Samples: Ethernet Radio Modems ELPRO 905U-D MDS iNET900 YLink RadioLinx SCADALINK LANBRIGDE 900 MHz FHSS 900 MHz FHSS 2.4 GHz FHSS 900 MHz FHSS Industrial Ethernet and Networking

Product Samples: Serial Radio Modems             Product Samples: Serial Radio Modems Put serial devices on radio SCADALINK SM900 Prosoft RadioLinx 2.4 GHz FHSS 900 MHz FHSS Industrial Ethernet and Networking

Product Samples: (I/O) Telemetry Think of 4-20 ma radios! SCADALINK IO900 Elpro 905-U Phoenix (Omnex) 900 MHz FHSS 900 MHz FHSS Industrial Ethernet and Networking

Product Samples: Wireless Protocol Gateways 105UG Profibus DF1 Modbus Industrial Ethernet and Networking

Product Samples: Combined Modem/IO SCADALINK 900-MB SCADALINK 900-MB 900 MHz FHSS 900 MHz FHSS Industrial Ethernet and Networking

Home/Office Radio Types Wireless routers With and without cable/DSL broadband Wireless access points (bridges) Wireless print servers Industrial Ethernet and Networking

Product Samples: Home/Office Linksys 802.11a/g Router Linksys 802.11g Access Point Netgear 802.11g Wireless Cable/DSL WGR614 Router DLink 802.11b Print Server DP-311P 802.11a/g DSSS 802.11g DSSS 802.11g DSSS 802.11b DSSS Industrial Ethernet and Networking

Product Samples: Device Servers                                       Industrial Ethernet and Networking

Product Samples: Cellular SCADALINK UNICON IP SCADALINK MobileGateway Cellular IP Modem/RTU (CDPD or IDEN) CDMA to 802.11b/g Industrial Ethernet and Networking

Product Samples: Satellite Industrial Ethernet and Networking

MODBUS RTU between DX Video Recorders Industrial Ethernet and Networking

Industrial Ethernet and Networking

Industrial Ethernet and Networking Resources Ethernet University (Contemporary Controls) http://www.industrialethernetu.com/index.html Industrial Ethernet and Networking

Industrial Ethernet and Networking Glossary Industrial Ethernet and Networking

Industrial Ethernet and Networking Questions Which radios are DS vs FH Is 802.11 without any letter a standard? What determines actual throughput What happens if you have 10baseT trying to run on 1 meg Does OFDM run under DS and FH or is it a third type? Are all industrial radios 802.11 compliant or do they run proprietary? Industrial Ethernet and Networking

Industrial Ethernet and Networking SS II BreezeACCESS and BreezeNET: A Robust Wireless Access Solution for Unlicensed Band ISP Services Although both technologies are implemented differently, the rules are focused on providing a set of guidelines that minimized the probability of these systems interfering with other radio systems and to also minimized the probability of these systems being interfered with. To accomplish this, the transmitted signal is spread over a wide bandwidth to reduce the power spectral density. (The power spectral density is the amount of RF power per MHz.) As part of the spreading, redundant information is also spread over the same wide bandwidth. The idea is that in the presence of interference, some information may be lost but is recoverable due to the built in redundancy. The amount of redundancy is measured as the processing gain of the system. Both direct sequence and frequency hopping systems are restricted to 1 watt of transmitter power to the antenna of 6 dBi maximum gain (for multipoint systems, the gain may be increased 1 dB for every dB the power is reduced). Industrial Ethernet and Networking

Questions for Kevin Zamzow Does a FHSS transmit each hop at lower power? Why does DS modulating at a faster bit rate mean more bandwith? DS gets signal gain by encoding with 11 bit barker? I do not get this signal gain issue The faster the carrier is modulated the more bandwith it requires See DSSS notes Industrial Ethernet and Networking

Industrial Ethernet and Networking Comparison II http://www.sensorsmag.com/articles/0901/35/main.shtml When making a decision on which physical layer to use, consider the following characteristics of frequency hopping:   Lower cost. Lowest power consumption Most tolerant to signal interference Lowest potential data rates from individual physical layers. Highest aggregate capacity using multiple physical layers Less range than direct sequence, but greater range than infrared Lowest aggregate capacity using multiple physical layers than frequency hopping. Smallest number of geographically separate radio cells due to a limited number of channels. More range than frequency hopping and infrared physical layers Industrial Ethernet and Networking

More about Channels and Collocation Breezecom FHSS DSSS DSSS technologies (Direct Signal Spread Spectrum)work in 22MHz- wide bands (IEEE 802.11b).This provides three non-overlapping 22MHz channels over the band 2.400 to 2.483 GHz. Industrial Ethernet and Networking

Yokogawa DAQ Systems: Network Security July 2005

Corporate and Plant Network Industrial Ethernet and Networking

Industrial Ethernet and Networking Plant Network Detail Increasing Plant Floor Security Today Rockwell Automation Industrial Ethernet and Networking

Security Problems with PC’s on a Network Unauthorized access (Invasion) Viruses (via email or hackers) Hackers Email spam “Leakage” of System Information Resulting security problems Unauthorized control of equipment or process Data manipulation File deletion Configuration changes or deletion Corruption of operating system Industrial Ethernet and Networking

The Basic Defense at Corporate IT Level IT Tools Routers Firewalls Proxy servers VPN’s Virus protection Anti-spy software Industrial Ethernet and Networking

Corporate IT vs. Plant Floor Network Industrial Ethernet and Networking

Industrial Ethernet and Networking Ports and TCP Servers Industrial Ethernet and Networking

Test Your System Five Ways 1) Open ports 2) Simple network management protocol (SNMP) robustness 3) Malformed packets 4) Broadcast traffic storms 5) Resource starvation Test your System 5 Ways InTech March 2003 Eric Byres Industrial Ethernet and Networking

Why is a DAQSTATION Safer than a PC? No Intel chips No Microsoft software Proprietary OS based on u-Itron realtime OS Does not accept email Built-in username/password login Password access Industrial Ethernet and Networking

Industrial Ethernet and Networking Preventive Actions Standard IT security Routers, proxy servers and firewalls Intrusion detection software Turn of ICMP (ping) in routers Consider VPN for remote access Implement a security and risk assessment DAQStation Utilize control logins with username/password Restrict access Change on a periodic basis Use passwords for webserver access Isolate FTP server from primary network Industrial Ethernet and Networking

Industrial Ethernet and Networking ISA 99: Network Security Part 1: Models and Terminology Part 2: Establishing a Manufacturing & Control Systems Security Program Part 3: Operating a Manufacturing and Control Systems Security Program Part 4: Specific Security Requirements for Manufacturing & Control Systems Industrial Ethernet and Networking

21 Steps to Improving SCADA Security Department of Energy Office of Energy Assurance Industrial Ethernet and Networking

Industrial Ethernet and Networking Steps 1-11 Industrial Ethernet and Networking

Industrial Ethernet and Networking Steps 12-21 Industrial Ethernet and Networking