Monday, 20 November 2017

Industrial Automation - Industrial Data Communications and Wireless

Posted By: PHARMACEUTICAL ENGINEERING - November 20, 2017

Share

& Comment

Industrial Data Communications and Wireless



             Introduction

Data communication involves the transfer of information from one point to another. Many communication systems handle analog data; examples are telephone systems, radio and television. Modern instrumentation is almost wholly concerned with the transfer of digital data.

Any communications system requires a transmitter to send information, a receiver to accept it, and a link between the two. Types of link include copper wire, optical fiber, radio and microwave.

Digital data is sometimes transferred using a system that is primarily designed for analog communication. A modem, for example, works by using a digital data stream to modulate an analog signal that is sent over a telephone line. Another modem demodulates the signal to reproduce the original digital data at the receiving end. The word 'modem' is derived from modulator and demodulator.

There must be mutual agreement on how data is to be encoded, i.e. the receiver must be able to understand what the transmitter is sending. The structure in which devices communicate is known as a protocol.

The standard that has created an enormous amount of interest in the past few years is Ethernet. Other protocol, which fits onto Ethernet extremely well, is TCP/IP, and being derived from the Internet is very popular and widely used.

             Open Systems Interconnection (OSI) model

The OSI model, developed by the International Organization for Standardization, has gained widespread industry support. The OSI model reduces every design and communication problem into a number of layers as shown in Figure 5. 1. A physical interface standard such as RS-232 would fit into the layer 1, while the other layers relate to the protocol software.


               OSI model representation: two hosts interconnected via a router                         

The OSI model is useful in providing a universal framework for all communication systems. However, it does not define the actual protocol to be used at each layer. It is anticipated that groups of manufacturers in different areas of industry will collaborate to define software and hardware standards appropriate to their particular industry. Those seeking an overall framework for their specific communications’ requirements have enthusiastically embraced this OSI model and used it as a basis for their industry specific standards.

             Protocols

As previously mentioned, the OSI model provides a framework within which a specific protocol may be defined. A protocol, in turn, defines a frame format that might be made up of various fields as follows.


Basic structure of an information frame
             
            RS-232 interface standard

The RS-232 interface standard (officially called TIA-232) defines the electrical and mechanical details of the interface between Data Terminal Equipment (DTE) and Data Communications Equipment (DCE), which employ serial binary data interchange. The current version of the standard refers to DCE as Data Circuit-terminating Equipment.

Figure illustrates the signal flows across a simple serial data communications link.

             A typical serial data communications link


The RS-232 standard consists of three major parts, which define:

       Electrical signal characteristics

       Mechanical characteristics of the interface

       Functional description of the interchange circuits

             Half-duplex operation of RS-232

The following description of one particular mode of operation of the RS-232 interface is based on half-duplex data interchange. The description encompasses the more generally used full-duplex operation.

            Half- duplex operational sequence of RS-232



Figure shows the operation with the initiating user terminal, DTE, and its associated modem, DCE, on the left of the diagram and the remote computer and its modem on the right.

Full-duplex operation requires that transmission and reception must be able to occur simultaneously. In this case, there is no RTS/CTS interaction at either end. The RTS and CTS lines are left ON with a carrier to the remote computer.

             Fiber Optics

Fiber optic communication uses light signals guided through a fiber core. Fiber optic cables act as waveguides for light, with all the energy guided through the central core of the cable. The light is guided due to the presence of a lower refractive index cladding around the central core. Little of the energy in the signal is able to escape into the cladding and no energy can enter the core from any external sources. Therefore the transmissions are not subject to any electromagnetic interference.

The core and the cladding will trap the light ray in the core, provided the light ray enters the core at an angle greater than the ‘critical angle’. The light ray will then travel through the core of the fiber, with minimal loss in power, by a series of total internal reflections. Figure illustrates this process.

            Light ray traveling through an optical fiber




             Applications for fiber optic cables

Fiber optic cables offer the following advantages over other types of transmission media:

       Light signals are impervious to interference from EMI or electrical crosstalk
       Light signals do not interfere with other signals

       Optical fibers have a much wider, flatter bandwidth than coaxial cables and equalization of the signals is not required
       The fiber has a much lower attenuation, so signals can be transmitted much further than with coaxial or twisted pair cable before amplification is necessary

       Optical fiber cables do not conduct electricity and so eliminate problems of ground loops, lightning damage and electrical shock

       Fiber optic cables are generally much thinner and lighter than copper cables
       Fiber optic cables have greater data security than copper cables

              Fiber optic cable components

The major components of a fiber optic cable are the core, cladding, coating (buffer), as shown in Figure 5. 6. Some types of fiber optic cable even include a conductive copper wire that can be used to provide power to a repeater.

                Fiber optic cable components
The fiber components include:

       Fiber core

       Cladding

       Coating (buffer)

       Strength members

       Cable sheath

There are four broad application areas into which fiber optic cables can be classified: aerial cable, underground cable, sub-aqueous cable and indoor cable.

             Modbus

Modbus Messaging protocol is an Application layer (OSI layer 7) protocol that provides client/server communication between devices connected to different types of buses or networks. The Modbus Messaging protocol is only a protocol and does not imply any specific hardware implementation. Also note that the Modbus Messaging protocol used with Modbus Serial is the same one used with Modbus Plus and Modbus TCP.

Modbus messaging is based on a client/server model and employs the following messages:

       Modbus requests, i.e. the messages sent on the network by the clients to initiate transactions. These serve as indications of the requested services on the server side

       Modbus responses, i.e. the response messages sent by the servers. These serve as confirmations on the client side

The interaction between client and sever (controller and target device) can be depicted as follows. The parameters exchanged by the client and server consist of the Function Code (‘what to do’), the Data Request (‘with which input or output’) and the Data response (‘result’).

                                   Modbus transaction


The Application Data Unit (ADU) structure of the Modbus protocol is shown in the Figure

                               Modbus serial ADU format


Modbus functions can be divided into four groups or ‘Conformance Classes’. The Function Codes are normally expressed in decimal; the hexadecimal equivalents are shown in brackets.

Conformance Class 0 is the minimum set of useful commands for both controllers and target devices. Note that the descriptions of certain commands have changed over the years, for this reason both the current and historical (‘classic’) descriptions are given here.

             Table-1 Conformance Class 0 commands


Function Code
Current terminology
Classic terminology



3 (0x03)
Read multiple registers
Read holding registers
16 (0x10)
Write multiple registers
Preset multiple registers


Conformance Class 1 comprises an additional set of commands, commonly implemented and interoperable.

Table-2 Conformance Class 1 commands

Function Code
Current terminology
Classic terminology



1 (0x01)
Read coils
Read coil status
2 (0x02)
Read input discretes
Read input status
4 (0x04)
Read input registers
Read input registers
5(0x05)
Write coil
Write single register
6(0x06)
Force single coil
Preset single register

7(0x07)          Read exception       Read exception status

status


Function Code 7 usually has a different meaning for each PLC family.

Conformance Class 2 comprises the data transfer functions needed for routine operations and supervision. These include, but are not limited to:

              Table-3 Conformance Class 2 commands

Function Code
Current terminology
Classic terminology



15 (0x0F)
Force multiple coils
Force multiple coils
22 (0x16)
Mask write register
Mask write register
23 (0x17)
Read/write registers
Read/write registers

 
There are also others such as Function Code 20 (read general reference), Function Code 21 (write general reference) and Function Code 24 (read FIFO queue) but they are considered to be outside the ambit of this section.

       Machine/vendor/network specific functions are those that, although being mentioned in the Modbus manuals, are not appropriate for interoperability because they are too machine-dependent. These include Function Codes such as 9 (program: Modicon 484), 10 (poll: Modicon 484) and 19 (reset communications link: Modicon 884/u84).

The following table summarizes the relationship of some of the more commonly used commands and the input/output addresses. The descriptions use the current rather than the classic terminology.

Table-4 Modicums addresses and Function Codes

Data type
Absolute

Relative
Function
Description

addresses

addresses
codes

Coils
00001 to 09999

0 to 9998
01
Read coils
Coils
00001 to 09999

0 to 9998
05
Write coil
Coils
00001 to 09999

0 to 9998
15
Write multiple coils
Discrete inputs
10001 to 19999

0 to 9998
02
Read input discretes
Input registers
30001 to 39999

0 to 9998
04
Read input registers
Holding registers
40001 to 49999

0 to 9998
03
Read multiple registers
Holding registers
40001 to 49999

0 to 9998
06
Write single register
Holding registers
40001 to 49999

0 to 9998
16
Write multiple registers

07
Read exception status

08
Loopback diagnostic





test



             Example of Function Code 2: Read input discretes

In classic terminology this function is known as ‘read input status’. It enables the controller to read one or more discrete inputs in a target device. The data field of the request frame consists of the protocol address of the first discrete input followed by the number of discrete inputs to be read. The data field of the response frame consists of a count of the discrete input data bytes followed by that many bytes of discrete input data.

The discrete input data bytes are packed with one bit for the status of each consecutive discrete input. The least significant bit of the first discrete input data byte conveys the status of the first input read (i.e. the one with the lowest address). If the number of discrete inputs read is not an even multiple of eight, the last data byte will be padded with zeros on the high end. If there are more than eight bits in the response, the second byte will contain the next bits and so on. Once again this is not consistent with a big-endian approach.

In the following example, the controller requests the status of discrete inputs with protocol addresses 0x0000 and 0x0001 i.e. addresses 10001 and 10002 PLC. The target device’s response indicates that discrete input 10001 is OFF and discrete input 10002 is ON (Figure5. 9).

       ‘Reference number’ refers to the input discrete with the lowest address

       ‘Bit count’ refers to the number of input discretes (‘number of points’) to be read and can vary between 1 and 2000
       ‘Byte count’ refers to the number of bytes required to return the requested input discrete values and is calculated as ((bit count + 7) / 8)

‘Bit values’ refer to the actual values of the individual inputs or ‘input data’

            Example: FC02-reading input discretes



             Modbus Plus

Modbus (or to be more exact; the Modbus Messaging protocol) is just a protocol, Modbus Plus is a complete system with a predefined medium and Physical layer (OSI layer 1) implementation. It is a LAN system for industrial control applications, allowing networked devices to exchange messages for the control and monitoring of processes at remote locations in the industrial plant. Modbus Plus uses a token-passing medium access control mechanism, which results in deterministic operation, albeit not necessarily fast under all conditions. The Modbus Plus layer 7 messaging protocol is essentially the same as that used for Modbus Serial and Modbus/TCP. The Physical layer is implemented with RS-485 and functions over shielded twisted pair cable. The Data Link layer (layer 2) protocol is based on the ISO/IEC 3309:1991 HDLC (High-level Data Link Control) multi-drop protocol, which uses a token passing medium access control mechanism and transmits data in a synchronous fashion as opposed to the asynchronous transmission of Modbus Serial. This results in transmission of data at 1 Mbps.

                     Modbus Plus protocol stack


Unlike Modbus, Modbus Plus is a proprietary standard developed to overcome the ‘single-master’ limitation prevalent in Modbus Serial.

             Data Highway Plus /DH485

There are three main configurations used in Allen Bradley data communications:

Data Highway: This is a Local Area Network (LAN) that allows peer to peer communications amongst up to 64 nodes. It uses a half -duplex (polled) protocol and rotation of link mastership. It operates at 57.6kbaud.

Data Highway Plus: This is similar to the Data Highway network although is designed for fewer nodes, and operates at a data rate of 57.6kbaud. It has peer to peer communications with a token passing scheme to rotate link mastership among the nodes.

Note that both systems implement peer to peer communications through a modified token passing system called the ‘floating master’. This is a fairly efficient mechanism as each node has an opportunity to become a master, at which time it can immediately transmit without risking contention on the bus. Both systems use a differential signaling system similar to RS-485.

The Allen Bradley Data Highway plus implements three layers of the OSI layer model, viz.:

       Physical layer hardware

       Data Link layer protocol

       Application layer protocol

Data Highway -485: This is used by the SLC range of Allen Bradley controllers and is based on RS-485.

             HART

The HART system (and its associated protocol) was originally developed by Rosemount and is regarded as an open standard, available to all manufacturers. Its main advantage is that it enables the retention of the existing 4-20mA instrumentation cabling whilst using, simultaneously, the same wires to carry digital information superimposed on the analog signal.

HART is a hybrid analog and digital system, as opposed to most field bus systems, that are purely digital. It uses a Frequency Shift Keying (FSK) technique based on the Bell 202 standard. Two individual frequencies of 1200 and 2200 Hz, representing digits ‘1’ and ‘0’ respectively, are used. The average value of the 1200/2400Hz sine wave superimposed on the 4-20mA signal is zero; hence, the 4-20mA analog information is not affected.

                   Frequency allocation of HART signaling system


HART can be used in three ways:

       In conjunction with the 4-20mA current signal in point-to-point mode
       In conjunction with other field devices in multi-drop mode

       In point-to-point mode with only one field device broadcasting in burst mode

Traditional point-to-point loops use zero for the smart device polling address. Setting the smart device polling address to a number greater than zero implies a multi- drop loop. Obviously the 4-20mA concept only applies to a loop with a single transducer; hence for a multi -drop configuration the smart device sets its analog output to a constant 4mA and communicates only digitally.

The HART protocol has two formats for digital transmission of data, viz:

       Poll/response mode

       Burst (broadcast) mode

In the poll/response mode, the master polls each of the smart devices on the highway and requests the relevant information. In burst mode the field device continuously transmits process data without the need for the master to send request messages. Although this mode is fairly fast (up to 3.7 times/second), it cannot be used in multidrop networks. The protocol is implemented with the OSI model using layers 1, 2 and 7.

             AS-i

Actuator Sensor-interface is an open system network developed by eleven manufacturers.

AS-i is a bit-oriented communication link designed to connect binary sensors and actuators. Most of these devices do not require multiple bytes to adequately convey the necessary information about the device status, so the AS-i communication interface is designed for bit-oriented messages in order to increase message efficiency for these types of devices. It was not developed to connect intelligent controllers together since this would be far beyond the limited capability of such small message streams.

Modular components form the central design of AS-i. Connection to the network is made with unique connecting modules that require minimal, or in some cases no tools to provide for rapid, positive device attachment to the AS -i flat cable. Provision is made in the communications system to make 'live' connections, permitting the removal or addition of nodes with minimum network interruption.

Connection to higher level networks (e.g. ProfiBus) is made possible through plug-in PC and PLC cards or serial interface converter modules.

              DeviceNet

DeviceNet, developed by Allen Bradley, is a low-level device oriented network based on CAN (Controller Area Network) developed by Bosch (GmbH) for the automobile industry. It is designed to interconnect lower level devices (sensors and actuators) with higher level devices (controllers). DeviceNet is classified as a field bus, per specification IEC-62026.

The variable, multi-byte format of the CAN message frame is well suited to this task as more information can be communicated per message than with bit-type systems. The DeviceNet specification is an open specification and available through the ODVA.

DeviceNet can support up to 64 nodes, which can be removed individually under power and without severing the trunk line. A single, four-conductor cable (round or flat) provides both power and data communications. It supports a bus (trunk line drop line) topology, with branching allowed on the drops. Reverse wiring protection is built into all nodes, protecting them against damage in the case of inadvertent wiring errors. The data rates supported are 125, 250 and 500K baud (i.e. bits per second in this case).

Figure 5. 12 illustrates the positioning of DeviceNet and CANBUS within the OSI model. CANBUS represents the bottom two layers in the lower middle column, just below DeviceNet Transport. Unlike most other field buses, DeviceNet does implement layers 3 and 4, which makes it a routable system. There are two other products in the same family; Control Net and Ethernet/IP. They share the same upper layer protocols (implemented by CIP, the Control and Information Protocol) and only differ in the lower four layers.

 Device net (as well as ControlNet and Ethernet/IP) vs. the OSI model


              Profibus

ProfiBus (PROcess FIeld BUS) is a widely accepted international networking standard, commonly found in process control and in large assembly and material handling machines. It supports single -cable wiring of multi-input sensor blocks, pneumatic valves, complex intelligent devices, smaller sub-networks (such as AS-i), and operator interfaces.

It is an open, vendor independent standard. It adheres to the OSI model, ensuring that devices from a variety of different vendors can communicate easily and effectively. It has been standardized under the German National standard as DIN 19 245 Parts 1 and 2 and, in addition, has also been ratified under the European national standard EN 50170 Volume 2.

The bus interfacing hardware is implemented on ASIC (Application Specific Integrated Circuit) chips produced by multiple vendors, and are based on RS-485 as well as the European EN50170 Electrical specification.

ProfiBus uses 9-Pin D-type connectors (impedance terminated) or 12mm round (M12-style) quick-disconnect connectors. The number of nodes is limited to 127. The distance supported is up to 24km (with repeaters and fiber optic transmission), with speeds varying from 9600bps to 12Mbps. The message size can be up to 244 bytes of data per node per message (12 bytes of overhead for a maximum message length of 256 bytes), while the medium access control mechanisms are polling and token passing. ProfiBus supports two main types of devices, namely, masters and slaves.

       Master devices control the bus and when they have the right to access the bus, they may transfer messages without any remote request. These are referred to as active stations
       Slave devices are typically peripheral devices i.e. transmitters/sensors and actuators. They may only acknowledge received messages or, at the request of a master, transmit messages to that master. These are also referred to as passive stations.

             Foundation Fieldbus

Foundation Fieldbus allows end-user benefits such as:

       Reduced wiring

       Communications of multiple process variables from a single instrument
       Advanced diagnostics

       Interoperability between devices of different manufacturers

       Enhanced field level control

       Reduced start-up time

       Simpler integration.

The concept behind Foundation Fieldbus is to preserve the desirable features of the present 4-20mA standard while taking advantage of the new digital technologies. This provides the features noted above because of:

       Reduced wiring due to the multi-drop capability

       Flexibility of supplier choices due to interoperability

       Reduced control room equipment due to distribution of control functions to the device level
       Increased data integrity and reliability due to the application of digital communications.

Foundation Fieldbus implements four OSI layers. Three of them correspond to OSI layers 1, 2 and 7. The fourth is the so-called ‘user layer’ that sits on top of layer 7 and is often said to represent OSI ‘layer 8’.The user layer provides a standardized interface between the application software and the actual field devices.

             Industrial Ethernet

Early Ethernet systems (of the 10 Mbps variety) use the CSMA/CD access method. This gives a system that operates with little delay if lightly loaded, but becomes very slow if heavily loaded. Ethernet network interface cards are relatively cheap and produced in vast quantities. Ethernet has, in fact, become the most widely used networking standard. However, CSMA/CD is a probabilistic medium access mechanism, there is no guarantee of message transfer and messages cannot be prioritized.

Modern Ethernet systems are a far cry from the original design. From 100BaseT onwards they are capable of full duplex (sending and receiving at the same time via switches, without collisions) and the Ethernet frame can be modified to make provision for prioritization and virtual LANs.

Early Ethernet was not entirely suitable for control functions as it was primarily developed for office -type environments. Ethernet technology has, however, made rapid advances over the past few years. It has gained such widespread acceptance in Industry that it is becoming the de facto field bus technology for OSI layers 1 and 2. An indication of this trend is the inclusion of Ethernet as the level 1 and 2 infrastructure for Modbus/TCP (Schneider), Ethernet/IP (Rockwell Automation and ODVA), ProfiNet (Profibus) and Foundation Fieldbus HSE.

             10 Mbps Ethernet

The IEEE 802.3 standard (also known as ISO 8802.3) defines a range of media types that can be used for a network based on this standard such as coaxial cable, twisted pair cable and fiber optic cable. It supports various cable media and transmission rates at 10 Mbps, such as:

       10Base2 : thin wire coaxial cable (RG-58), 10 Mbps baseband operation, bus topology
       10Base5 : thick wire coaxial cable (RG-8), 10 Mbps baseband operation, bus topology
       10BaseT : UTP cable (Cat3), 10 Mbps baseband operation, star topology
       10BaseFL : optical fiber, 10 Mbps baseband operation, point-to-point topology

Other variations included 1Base5, 10BaseFB, 10BaseFP and 10Broad36, but these versions never became commercially viable.

             100 Mbps Ethernet

100BaseT is the shorthand identifier for 100 Mbps Ethernet systems, viz. 100BaseTX (copper) and 100BaseFX (fiber). 100BaseT4 was designed to operate at 100 Mbps over 4 pairs of Cat3 cable, but this option never gained widespread acceptance. Yet another version, 100BaseT2, was supposed to operate over just 2 pairs of Cat3 cable but was never implemented by any vendor.

One of the limitations of hub-based (CSMA/CD) 100BaseT systems is the size of the collision domain, which is only 250 meters or 5.12 microseconds. This is the maximum size of a network segment in which collisions can be detected, being one tenth of the maximum size of a 10 Mbps network. This effectively limits the distance between a workstation and hub to 100 m, the same as for 10BaseT. As a result, networks larger than 200 meters must be logically interconnected by store-and-forward devices such as bridges, routers or switches. This is not a bad thing, since it segregates the traffic within each collision domain, reducing the number of collisions on the network. The use of bridges and routers for traffic segregation, in this manner, is often done on industrial Ethernet networks. Of course, the use of switches instead of hubs allows the construction of very large networks because of the full duplex operation.

The format of the frame has been left unchanged. The only difference is that it is transmitted 10 times faster than in 10 Mbps Ethernet, hence its length (in time) is 10 times less.

             Gigabit Ethernet

1000BaseX is the shorthand identifier for the Gigabit Ethernet system based on the 8B/10B block encoding scheme adapted from the fiber channel networking standard, developed by ANSI. 1000BaseX includes 1000BaseSX, 1000BaseLX and 1000BaseCX.

       1000BaseSX is the short wavelength fiber version

       1000BaseLX is the long wavelength fiber version

       1000BaseCX is a short copper cable version, based on the fiber channel standard.

1000BaseT, on the other hand, is a 1000 Mbps version capable of operating over Cat5 (or better, such as Cat5e) UTP, and has largely replaced 1000BaseCX. 1000BaseT is based on a different encoding scheme.

As with Fast Ethernet, Gigabit Ethernet supports full duplex and auto-negotiation. It uses the same frame format as 10 Mbps and 100 Mbps Ethernet systems, and operates at ten times the clock speed of Fast Ethernet, i.e. at 1Gbps. By retaining the same frame format as the earlier versions of Ethernet, backward compatibility is assured.

Despite the similar frame format, the system had to undergo a small change to enable it to function effectively at 1Gbps in CSMA/CD mode. The slot time of 64 bytes used with both 10 Mbps and 100 Mbps systems had to be increased by a factor of 8, to 512 bytes. This is equivalent to 4.096 μs. Without this increased slot time the collision domain would have been impracticably small at 25 meters. The irony is that in practice all Gigabit Ethernet systems are full duplex, and do not need this large slot time.

             TCP/IP

TCP/IP is the de facto global standard for the Internet (network) and host–to–host (transport) layer implementation of internet work applications because of the popularity of the Internet. The Internet (known as ARPANet in its early years), was part of a military project commissioned by the Advanced Research Projects Agency (ARPA), later known as the Defense Advanced Research Agency or DARPA. The communications model used to construct the system is known as the ARPA model.

Whereas the OSI model was developed in Europe by the International Standards Organization (ISO), the ARPA model (also known as the DoD model) was developed in the USA by ARPA. Although they were developed by different bodies and at different points in time, both serve as models for a communications infrastructure and hence provide ‘abstractions’ of the same reality. The remarkable degree of similarity is therefore not surprising.

Whereas the OSI model has 7 layers, the ARPA model has 4 layers. The OSI layers map onto the ARPA model as follows.

       The OSI session, presentation and applications layers are contained in the ARPA process and application layer.
       The OSI transport layer maps onto the ARPA host–to–host layer (sometimes referred to as the service layer).

       The OSI network layer maps onto the ARPA Internet layer.

       The OSI physical and data link layers map onto the ARPA network interface layer.

The relationship between the two models is depicted in Figure


                                   OSI vs. ARPA models


TCP/IP, or rather the TCP/IP protocol suite is not limited to the TCP and IP protocols, but consists of a multitude of interrelated protocols that occupy the upper three layers of the ARPA model. TCP/IP does NOT include the bottom network interface layer, but depends on it for access to the medium.

As depicted in Figure 5. 14, an Internet transmission frame originating on a specific host (computer) would contain the local network (for example, Ethernet) header and trailer applicable to that host. As the message proceeds along the Internet, this header and trailer could be replaced depending on the type of network on which the packet finds itself - be that X.25, frame relay or ATM. The IP datagram itself would remain untouched, unless it has to be fragmented and reassembled along the way.

                                        Internet frame


The Internet layer: This layer is primarily responsible for the routing of packets from one host to another.

The host–to–host layer: This layer is primarily responsible for data integrity between the sender host and receiver host regardless of the path or distance used to convey the message.

The process/application layer: This layer provides the user or application programs with interfaces to the TCP/IP stack.

Internet layer protocols (packet transport): Protocols like internet protocol (IP), the internet control message protocol (ICMP) and the address resolution protocol (ARP) are responsible for the delivery of packets (datagrams) between hosts.

Routing: Unlike the host–to–host layer protocols (for example, TCP), which control end–to–end communications, IP is rather ‘shortsighted.’ Any given IP node (host or router) is only concerned with routing (switching) the datagram to the next node, where the process is repeated.

             Wireless Fundamentals

Wireless communication is the transfer of information over a distance without the use of electrical conductors or "wires”. The distances involved may be short (a few meters as in a television remote control) or very long (thousands or even millions of kilometers for radio communications) . The term wireless technology is generally used for mobile IT equipment. It encompasses cellular telephones, personal digital assistants (PDAs), and wireless networking. Other examples of wireless technology include GPS units, garage door openers and/or garage doors, wireless computer mice and keyboards, satellite television and cordless telephones

Wireless communication involves:

       Radio frequency communication,

       Microwave communication, for example long-range line-of-sight via highly directional antennas, or short-range communication, or
       Infrared (IR) short-range communication, for example from remote controls or via IRDA.

Applications may involve point-to-point communication, point-to-multipoint communication, broadcasting , cellular networks and other wireless networks.

In the last 50 years, the wireless communications industry experienced drastic changes driven by many technology innovations. And quite often, there are start-up companies emerging and growing into multi-nationals.

Examples of wireless technology at work :

       Security systems

       Television remote control

       Cellular telephones.

Wireless is a term used to describe telecommunications in which electromagnetic waves (rather than some form of wire) carry the signal over part or the entire communication path. Common examples of wireless equipment in use today include:

       Cellular phones and pagers

       Global Positioning System (GPS)

       Cordless computer peripherals

       Cordless telephone sets

       Satellite television.

Wireless networking is used to meet a variety of needs. Perhaps the most common use is to connect laptop users who travel from location to location. Another common use is for mobile networks that connect via satellite. A wireless transmission method is a logical choice to network a LAN segment that must frequently change locations. The following situations justify the use of wireless technology:

       To span a distance beyond the capabilities of typical cabling

       To avoid obstacles such as physical structures, EMI, or RFI

       To provide a backup communications link in case of normal network failure
       To link portable or temporary workstations

       To overcome situations where normal cabling is difficult or financially impractical, or
       To remotely connect mobile users or networks

              Radio/microwave communications

A significant number of industrial protocols are transferred using radio telemetry systems. Radio is often selected in preference to using landlines for a number of reasons:

       Costs of cables and laying can far exceed that of radio telemetry systems
       Radio systems can be installed faster than landline systems

       Radio equipment is very portable and can be easily moved

       Radio can be used to transmit the data in any format required by the user
       Reasonably high data rates can be achieved compared to some landline applications
       Radio can be used as back up for landlines

The various aspects of radio and microwave communications that demand further detail in discussion are listed below:

       Components of a radio link

       Radio spectrum and frequency allocation

       Summary of radio characteristics for VHF/UHF radio telemetry systems
       Radio modems

       How to prevent inter-modulation problems

       Implementing a radio link

       Miscellaneous considerations

             Installation & Troubleshooting

When troubleshooting a communications system, the engineer or the technician tries to use some standard format to arrive at a quicker solution. Industrial communications systems do not always respond to the tried and tested approaches that worked with hardwired inputs and outputs.

Common problems and solutions: Some of the causes for industrial communications problems include:

       No power to the station on the network, resulting in a breakdown in communications
       Cable damage, with a resultant interruption in communications.

       Earthing and grounding problems resulting in intermittent failure of communications
       Electrostatic damage to the communications ports

       Software crash on one of the stations resulting in communications failure
       High levels of electrostatic/electromagnetic interference on the communications link
       High traffic loads on the link, resulting in intermittent communications

       Electrical surge or transient through the communications system resulting in hardware damage

The impact on the communications system ranges from outright failure (with no communications possible) to intermittent communications depending on the severity of the problem. Intermittent failure is arguably the worst problem to have, as it is very difficult to diagnose and fix.

General comments on troubleshooting: Obviously, there is no cut and dried method of testing. It depends on the environment and the history of the system. However, a few rules are useful in troubleshooting a communications system effectively.

       Extensive and accurate documentation

       Baseline reporting

       Network simplification

A specific methodology: When troubleshooting your communications system, the following steps should be taken:

       Check that all stations and network communications devices are powered up and operational
       Check all cabling for clean connections.

       Check grounding and earthing setups.

       Some new devices operating on the same power supply may be the cause of the problem
       Check whether there has been any changes or damage to screening of the cables.
       Use the diagnostics packages provided as part of the system to compare the number of packets transmitted to packets dropped.

       Commence by removing devices that are not critical to the system under investigation.
       Do simple diagnostic tests using simple utilities such as ‘ping’ or ‘netstat’ to identify what is happening on the network
             RS-232


Since RS-232 is a point -to-point system, installation is fairly straightforward and all RS-232 devices use either DB-9 or DB-25 connectors. These connectors are cheap and allow multiple insertions. None of the RS-232 standards define which device uses a male or female connector, but traditionally the male (pin) connector is used on the DTE and the female connector (socket) is used on DCE equipment. This is only traditional and may vary on different equipment. It is often asked why a 25-pin connector is used when only 9 pins are needed. This was done because RS-232 was used before the advent of computers and therefore used for hardware control (RTS/CTS) . It was originally thought that, in the future, more hardware control lines would be needed hence the need for more pins.

During an installation of RS-232 connection, it is important to ask the following questions:

       Is one device a DTE and the other a DCE?

       What is the gender and size of connectors at each end?

       What is the speed of the communication?

       What is the distance between the equipment?

       Is it a noisy environment?

       Is the software set up correctly (all the UART parameters the same for both sides)?

            

 RS-485




The RS- 485 line drivers/receivers are differential chips. This means that the A and B wires are referenced to each other. A ‘one’ is transmitted, for example, when one of the lines is at +5V and the other one is at 0V. A ‘zero’ is then transmitted when the line voltages are reversed. In working systems the voltages are usually somewhere around +/- 2V with reference to each other. Up to 32 devices can be connected on one system without a repeater. Some systems allow the connection of five legs with four repeaters and get 160 devices on one system.

Note: ProfiBus DP and FMS use RS-485 at the Physical layer and therefore all the RS-485 installation and troubleshooting guidelines apply.

            Modbus

No matter what extreme care you may have taken, there is hardly ever an installation that experiences trouble-free setup and configuration. Some common problems related to Modbus installations are listed below. They can be categorized as either hardware or software problems.

       Hardware problems include mis-wired communication cabling and faulty communication interfaces
       Software (protocol) related issues arise when the controller application tries to access non-existent target devices’ nodes or uses invalid Function Codes, addresses non-existent memory locations in the target devices, or specifies illegal data format types, which obviously the target devices do not understand.

             Modbus plus

The Modbus Plus network is a 3-wire (one pair and a shield) twisted pair cable with the nodes connected in a daisy-changed configuration. There is no polarity requirement at the node’s transceiver, so the data cable pair may be connected either way at a node. A 220-ohm terminator is required at each end of the network cable. There are limits on the maximum number of nodes per segment, the number of repeaters, and the lengths of cable segments on the Modbus Plus network.

The node address of the Modbus Plus device should be set before connecting it to the network. This avoids possible duplicate address problems with other units on the network.

Most software related issues arise from the use of invalid target device addressing; illegal target memory addressing, illegal data formats and even perhaps use of unrecognized function codes. Other issues are related to the actual configuration of the communication hardware itself.

             Data Highway

Data Highway Plus wiring troubleshooting: Inspect the cable closely for wiring problems if the operation of the network appears intermittent. Typical problems include:

       Damage to the cable

       No terminator (150 Ω) at the end of the line

       Screen that are not grounded or damaged.

Data Highway Plus network diagnostics: Many of the errors are the result of excessive noise on the network and can be corrected by examining the actual wiring and removing the source of noise, if possible. If not (for example, due to the highway (trunk line) parallel to a power cable in a cable tray), consideration will have to be given to the use of fiber cabling as a replacement for the copper cable.

A few errors (identified in the diagnostics registers on the interface module) worth mentioning are:

       ACK Time out

       Contention

       False poll

       Transmitted messages and received messages

       Data pin allocation.

Note that the rules for troubleshooting the physical side of these two cables are very similar to that for RS- 485. In fact, DH485 is identical to RS-485 while Data Highway Plus is essentially a transformer isolated version.

The difficult part in diagnosing problems with Data Highway Plus is in the operation of the protocol.

             HART

Beside the actual instruments that require calibration, the only major problem that can occur with HART is the cable length calculation. The HART protocol is designed to work over existing analog signal cables, but it depends on sufficient voltage drop across the series resistor. This, in turn, depends on:

       The series load resistor

       Cable resistance

       Cable capacitance

       The number and total capacitance of the field devices

       The resistance of, and position of other devices in the loop

The main reason for this is that network must pass the HART signal frequencies without excessive loss or distortion. A software package such as H-Sim can be used to calculate whether the system is operating with the correct signal level. In addition, it should be confirmed that the loop has a bandwidth of at least 2500 Hz. This can be achieved by checking that the product of the cable resistance and capacitance (R times C) is less than 65 microseconds.

             AS-i

The AS-i system has been designed with a high degree of ‘maintenance friendliness’ in mind and has a high level of built-in auto-diagnosis. The system is continuously monitoring itself against faults such as:

       Operational slave errors (permanent or intermittent slave failure, faulty configuration data such as addresses, I/O configuration, and ID codes)
       Operational master errors (permanent or intermittent master failure, faulty configuration data such as addresses, I/O configuration, and ID codes)

       Operational cable errors (short circuits, cable breakage, corrupted telegrams due to electrical interference and voltage outside of the permissible range)

       Maintenance related slave errors (false addresses entered, false I/O configuration, false ID codes)
       Maintenance related master errors (faulty projected data such as I/O configuration, ID codes, parameters etc.)
       Maintenance related cable errors (counter poling the AS-i cable)

The fault diagnosis is displayed by means of LEDs on the master. Where possible, the system will protect itself during short-circuit.

             Device Net

Networks, in general, exhibit the following types of problems from time to time. The first type of problem is of an electronic nature, where a specific node (e.g. a network interface card) malfunctions. This can be due to a component failure or to an incorrect configuration of the device.

The second type is related to the medium that interconnects the nodes. Here, the problems are more often of an electromechanical nature and include open and short circuits, electrical noise, signal distortion and attenuation. Open and short circuits in the signal path are caused by faulty connectors or cables. Electrical interference (noise) is caused by incorrect grounding, broken shields or external sources of electro-magnetic or radio frequency interference. Signal distortion and attenuation can be caused by incorrect termination, failure to adhere to topology guidelines (e.g. drop cables too long), or faulty connectors.

Whereas these are general network-related problems, the following ones are very specific to Devicenet:

       Missing terminators

       Excessive common mode voltage, caused by faulty connectors or excessive cable length
       Low power supply voltage caused by faulty connectors or excessive cable length

       Excessive signal propagation delays caused by excessive cable length

             Ethernet

Ethernet hardware is fairly simple and robust, and once a network is commissioned with professional cabling and certification, the network should be fairly trouble-free. Most problems will be experienced at the commissioning phase, and could theoretically be attributed to the cabling, the LAN devices (such as hubs and switches), the Network Interface Cards (NICs) or the protocol stack configuration on the hosts.

The wiring system should be installed and commissioned by a certified installer. This effectively rules out wiring problems for new installations, although old installations could be suspect.

If the LAN devices such as hubs and switches are from reputable vendors, it is highly unlikely that they will malfunction in the beginning. Care should nevertheless be taken to ensure that intelligent (managed) hubs and switches are correctly set up.

NICs rarely fail and nine times out of ten the problem lies with a faulty setup or incorrect driver installation or an incorrect configuration of the higher level protocols such as IP.

             TCP/IP

This section deals with problems related to the TCP/IP protocol suite. The TCP/IP protocols are implemented in software and cover the second (Internet), the third (Host to Host) and the upper (Application) layers of the ARPA model. These protocols need a network infrastructure as well as a medium in order to communicate. This infrastructure is typically Ethernet.

Typical network layer problems: If the TCP/IP protocol stack is not properly installed on the local host (host unable to access the network).

The easiest way to confirm this, apart from checking the network configuration via the control panel and visually confirming that TCP/IP is installed for the particular NIC used on the host, is to perform a loop–back test by pinging the host itself. This is done by executing ping local host or ping 127.0.0.1. If a response is received, it means that the stack is correctly installed.

Other possible problems include:

       A host failing to obtain an automatically assigned IP address

       Reserved IP addresses

       Duplicate IP addresses

       Incorrect network ID – different netIDs on the same physical network
       Incorrect subnet mask

       Incorrect or absent default gateway(s)

       MAC address of a device not known to user

       IP address of a device not known to user

       Wrong IP address.

Transport layer problems: Without really getting into the detailed treatment of the TCP protocol, there are a few simple things that a relatively inexperienced user can check.

       No connection established

       Incorrect port number.

Troubleshooting Radio: When troubleshooting an existing system, it is worth checking on a few issues discussed earlier. These are as follows:

       Frequency selection

       Interference from other radio equipment

       Inter-modulation problems

       Incorrect path loss calculation

       Radio modems.

             Industrial network security

Networking has been one of the greatest driving forces behind the growth of the computer industry. While low cost desktop computing brought the power of the digital age to millions of users, the real power of distributed computing has been unleashed by interconnecting the computers via networks, which made sharing of hardware and data resources possible.

Thus, network security involves three distinct aspects:

Confidentiality: ensuring that information is accessible only to those authorized to have access.

Integrity: safeguarding the accuracy and completeness of information and processing methods.

Availability: ensuring that authorized users have access to information and associated assets when required.

The goal of network security is to prevent an attack on the assets of the target system and in case it cannot be prevented, to minimize the undesirable consequences of a successful attack by early detection and counte-rmeasures.

             Security in the context of Industrial automation systems

The use of computer based systems for industrial automation is now commonplace. These can be broadly divided under the following classifications:

       Automation systems such as Programmable Logic Controllers (PLCs), several of which are networked to form an industrial automation network. A Distributed Control System (DCS) is a higher-end industrial automation network used for the control of more complex, special purpose equipment and processes. This often uses proprietary hardware and software, unlike a PLC based network.

       Supervisory Control And Data Acquisition (SCADA) systems, which collect data from geographically dispersed resources and allow remote monitoring and control usually used in utility systems such a electric power and water supply.

              Network security solutions

Network security threats are countered using the following approaches.

       Authentication, Authorization and Accounting (AAA)

       Encryption of data

       Access control, boundary routers, firewalls and filtering

       Intrusion detection and response.

Two other technologies need to be mentioned in this regard. One is the Virtual LAN (VLAN) is used to reduce the Internal security violations to provide a degree of control not usual in a normal LAN and the other is the Virtual Private Network (VPN). Security was not, however, the primary objective of the VLAN; it was rather the need to reduce congestion of the networks.

              Network threats, vulnerabilities and risks

The goal of network security is to prevent an attack on the assets of the target system from succeeding and in case it cannot be prevented, to minimize the risks due to undesirable consequences.

“Risk is an expression of the likelihood that a defined threat will exploit a specific vulnerability of a particular attractive target or combination of targets to cause a given set of consequences.” It is not just anyone who can pose a real and serious threat to a network. The person should have adequate technical knowledge of how systems operate and the possible vulnerabilities that can be exploited, and should have adequate motivation to mount an attack, especially with the knowledge that it is a criminal act and carries substantial penalties.

So we have:

       Threats

       System knowledge

       Motivation

       Vulnerabilities which these threats employ to attack the target assets

       Consequences of attacks.

Network security would have achieved its goal if it minimizes the risk of undesirable consequences due to an attack. Threats from those with adequate system knowledge and the motivation to mount an attack exist. The vulnerabilities are also real. That an attack will happen is only a matter of time and should be considered a certainty. The security measures should aim to prevent the attackers from penetrating the system, but in a situation where the system is breached it should detect the intrusion and take appropriate counter-measures to reduce or eliminate undesirable consequences.

The assets being protected can include many things, some of them tangible and the others not. Consider the list below:

       Industrial facilities

       Employees

       Financial resources

       Trade secrets

       Reputation.

The first three are examples of tangible assets. Trade secrets are essentially intellectual property, which can be stolen or destroyed, in their physical form. Reputation is an intangible asset that can be affected adversely by service disruption, loss of data, and substitution of incorrect data etc. 


In the outermost perimeter, we have threats, motivation and system knowledge. All these elements need to be present for an attack on a network. The attack is then started by studying the system for vulnerabilities (shown in the next layer).

A security incident happens when an attacker finds a vulnerability that can be used to break into the system. This is the next layer. The security incident has to be countered by the security measures (firewalls, encryption etc.) that deny the attacker an opportunity to get into the critical system areas, as well as other measures, which include the detection of an intrusion (the incident) and the response. If these measures fail, the attack becomes successful, opening up the system and the organization to the risks of security failure, (shown in the innermost circle). If these risks are anticipated and organizational measures are in place to tackle them, the damage to the system or organization can be reversed or reduced and the effects of an attack thus minimized.

             An approach to network security planning

Network security is not a matter of technology alone, but should focus instead on appropriate controls based on a clearly defined security policy. To determine these security policies, one needs to think about the business and examine the risks. You need to place a value- and a probability on them. You need to budget, to find the best way to spread the available money across the security options - and accept the unavoidable fact that it is not going to be perfect. You need to plan the implementation, and make sure that the rest of the organization (represented by its management) and the users understand and cooperate with the security measures that they are expected to follow. These principles are applicable not just to business networks as is commonly presumed, but to automation networks as well. Without a proper assessment of security needs and establishment of appropriate security policies, the best of security architecture, hardware and software may not protect the organizational information assets.

Connectivity to the Internet by different segments of the organization is quite essential from a business point of view. Even in Industrial Automation systems, such as SCADA networks of large utilities, Internet connectivity including access to corporate email services as a matter of necessity. This means that there is a need for connecting Industrial Automation networks to the business networks and then on to external organizations/services through the Internet. Also, remote access of the corporate network by users, either from homes or from remote locations, has become a matter of routine. All these needs, coupled with the inherent weaknesses in the technologies used make the network administrator’s task far more complex.

But threats are not just external. Many attacks take place from within the organization. A security system designed to protect data resources should therefore take both external and internal threats into consideration.

In fact, security of networks should not be looked at in isolation but should be a subject of a systematic study.

The following are the minimum steps required for arriving at a comprehensive network security system:

       Evaluate the risks in terms of tangible and intangible effects

       Plan for preventative measures

       Provide for detection of an attack and response

       Plan for the recovery of systems (in the event of a successful attack)

       Prepare a security policy document

       Arrange for dissemination and implementation of the policy

       Provide guidelines for auditing and monitoring of security measures (Including periodic review of the security policy itself)

             Securing a network by access control

The Internet has become an important business enabler. Threats are thus faced by organizations not only from insiders (those who operate from within the local network) but also from outsiders accessing an organization’s resources through the Internet. One of the devices that networks use for preventing unauthorized access is the firewall. Since the Internet is an untrusted network, the information resources of an organization have to be protected by providing security at the point of connection to the Internet using a ‘perimeter router’ - the simplest form of firewall. The perimeter router (also called a boundary router or edge router) provides protection using what is known as an access control list or access list. Firewalls are also provided to separate the internal as well as external users from important network assets such as the application servers and other servers providing FTP services, email services etc.

ACL: An ACL (Access Control List) is essentially a list of statements that filters unwanted packets by restricting network use by certain users and devices. ACLs can be used to block packets from specified source addresses, packets bound for specified destination addresses or to indicate that a packet is carrying information of specific interest.

Firewall; A firewall is either a software program or a hardware device that filters the information coming into a private corporate network, a specific part of the network or a personal computer connected through a modem. Using a certain pre-determined set of rules, a firewall acts as a filter for incoming packets of information. If the filters flag a packet, it is not allowed through.

Firewalls protect sites from attacks by outsiders who use the inherent vulnerabilities in the TCP/IP protocol suite. Additionally, they help mitigate security problems associated with an insecure system and with the inherent problems in providing a robust system of security for a large network of computers. There are several types of firewalls, from perimeter routers that can provide access control, to more powerful firewalls that can protect against vulnerabilities in the TCP/IP protocol, to even more powerful firewalls that can filter packets based on the content of the traffic. Usually large corporations install firewalls both for security against malicious incoming traffic as well as to filter out access to inappropriate sites by its internal users.

             Authentication, Authorization, Accounting & encryption

AAA   (Authentication, Authorizing and Accounting) and encryption of data are two of the main components in the security scheme of any network.

The security of any network depends on the control of who can access it and for what purpose. ‘Authentication’, the first component of AAA, achieves this objective of validating the identity of a user before permitting access. It is equally, if not more applicable to users who access the network from a remote location using public communication media such as the Internet.

The second component, ‘authorization’, determines which specific services and resources the authenticated user can have access to. Authorization defines attributes and privileges of resources, which each user is authorized to access and the activities that can be legitimately performed. This data can be stored locally on the network or in a centralized remote server if it is convenient to do so. Authorization thus provides a method for remotely controlling access where needed.

             Use of the remote security database

The security information is stored in local security servers forming part of the network being accessed. This information includes usernames and passwords for all the network hosts and other devices such as routers. With a very large number of users, multiple network access servers become necessary. Instead of duplicating the security database in all of these servers, centralized information is held in a remote host which, besides the security database, will also hold authorization and accounting information.

A remote security database can make the management of Network Access servers simpler. It consistently enforces security policies to dial up users and manages the required accounting functions.

             Encryption

Encryption is an important component of data security. It is constantly stressed that sensitive information, such as usernames and passwords used for authentication, is not to be sent in clear text. One way of sending this information is to instead send a value calculated by a hash algorithm. The other method is to encrypt the data.

All organizations are wary of sending their data over untrusted or public networks since there is always a possibility of the data being captured and read or modified.

Encryption helps in:

       Maintaining data integrity

       Maintaining privacy

       Ensuring that the data is authentic

Encryption refers to the deliberate alteration of data using a key (which is a fixed length string of bits) so that the data is meaningless to anyone intercepting the message unless he has the key. The reverse process of getting the data back from the encrypted form is called decryption and is done by the receiver using the same key. It is essential that both sender and receiver share the key. This method, where a shared key is used by both sender and receiver, is called symmetrical encryption or Private Key encryption. It is possible to attack an encrypted message (an attempt to decode it) using the ‘brute force’ method through an automated process of trying out all possible key combinations. Therefore the longer the key length, the more difficult it is to break. A 128 bit string will take thousands of years of computational time to break by ‘brute force’ method and is therefore considered safe. However, a 64 bit key can easily be cracked with current technology.

In addition to user authentication, Certification Authorities (CA) also provide digital certificates containing the public key. An enterprise can implement its own certification using certification servers or use third party services such as Verisign for issue and sharing of their public keys. This process of managing public keys is known as the Public Key Infrastructure (PKI). The PKI uses the hash functions, shared keys or public and private keys. The use of the PKI is important in situations that require a non-repudiation feature.
             Intrusion detection systems

An intruder is one who attempts to gain unauthorized access to a network. Once he is in, an intruder can manipulate data, misuse the network resources and disrupt network services. An intruder detection system can identify an intrusion and send alerts to specified users as it is happening so that necessary measures can be taken.

An Intrusion Detection System (IDS) is not a substitute for other security measures such as proper AAA implementation, encryption of data or firewalls, but merely a reinforcement of these measures. In the event of the network security devices failing to stop an attack for whatever reason, an IDS will act as a back-up measure to detect the attack taking place and initiate a suitable response.

Intrusions happen due to a variety of reasons. They are:

       The absence of proper network policies

       Improper system configuration

       Technology weaknesses.

IDS systems can therefore be classified under the following two categories:

       Network-based systems

       Host-based systems

Network- based IDSs: Network-based IDSs monitor the network packets flowing through a specific section of the network to detect an intrusion. They deploy a network adapter operating in promiscuous mode, which means that they read and process all packets regardless of the destination address.

Host-based systems: In a host-based IDS system, detection agents are deployed on all computers and report intrusions to a managing agent installed on a central computer. The detection agents operate by sharing the disk and memory available in the computers, which may cause a degradation of performance. Host-based IDSs are not suitable for large networks. These systems are best suited where there is a need to constantly monitor specific hosts.

A response to an attack can be either active or passive. A passive response is one where the IDS simply generates an alert and leaves it to system personnel to intervene and take action. Usually, an alarm is by means of a pop-up window on the administrative console.

             VLANs

When a LAN is divided into segments using a switch, with each port serving a smaller number of network nodes, the chances of collision reduces. Moreover, the devices that normally communicate with one another are placed in one segment so that the need for forwarding the packets to other ports also gets reduced. In some cases, machines that require very high bandwidth (for example, a server or a high performance workstation) are connected directly to a switch port, thus enabling them to have almost the entire bandwidth of one segment dedicated to them.

The need for VLANs: Very often the personnel involved in a particular project or those belonging to a particular department are not confined to a given area and are spread throughout a building or campus. Product design teams may be cross functional groups and usually exist for short periods of time. In such cases, grouping the users into one physical segment is not feasible. In these cases, more packets have to travel from one physical segment (or switch port) to another, thus increasing the network loading. VLANs offer a way to overcome these problems.

A VLAN logically groups switch ports into workgroups. Since broadcasts and multicasts between the users of a workgroup are likely to be high, a VLAN limits the broadcast traffic to within the particular virtual network and thus performs like a virtual broadcast domain.

Benefits of a VLAN: VLANs offer a number of advantages over the traditional

LAN implementation:

       Performance improvement

       Improved security

       Ability to set up virtual workgroups

       Reduced administration

       Reduced cost.

             VPNs and their security

A VPN is basically a corporate network that is built around the communication infrastructure of the Internet rather than using leased lines or a Remote Access Server using direct dial- in. Since the Internet is a public medium where the traffic is prone to interception or modification, unlike the privacy offered by dedicated leased circuits, security issues play an important role in the implementation of a VPN. A VPN is however a highly cost effective proposition, as dedicated lines are required only to connect the corporate network to an ISP (usually located within the same city).

             Types of VPN

VPN solutions are essentially of three distinct types:

       Inter-site or inter-LAN VPNs

       Remote access VPNs

       Extranets

While all the three of these types of connectivity are essential from the enterprise viewpoint, most of the savings result from Remote Access VPN. This is because:

       Cost of remote access and the number of employees who travel and need to connect using long distance dial up are showing an increasing trend
       A dial-up Internet connection offers good bandwidth and is therefore becoming acceptable to more users, particularly those using applications based on client server technology and multi-tier architectures that conserve bandwidth

       A local dialup connection using a reliable Internet Service Provider (ISP) offers a very high degree of availability and Quality Of Service (QOS) level compared to direct dial up through long distance lines.

            Requirements for designing a VPN system

Any enterprise planning to implement a VPN system must carefully evaluate the various issues of importance. A 5-tier model proposed by the Gartner Group sums up these issues and can be a starting point. 


The 5 tiers are: security, scalability, manageability, simplicity and quality of service. Security is a factor decided by the corporate policy. Scalability, manageability and simplicity are functional requirements and will depend on present and perceived future needs, particularly the issue of scalability. Quality of service will be primarily dependant on the ISP whose infrastructure will be used for the VPN.

             Wireless networks and their security issues

Wireless technologies, in the simplest sense, enable two or more devices to communicate without physical connections. Wireless networks serve as the transport mechanism between devices, among devices and the traditionally wired networks (such as Enterprise networks and the Internet). Wireless networks are frequently categorized into three groups based on their coverage range

WLANs allow greater flexibility and portability than do traditionally wired LANs. Unlike a traditional LAN, which requires a wire to connect a user’s computer to the network, a WLAN connects computers and other components to the network using an Access Point (AP), which connects to the wired Ethernet LAN via an RJ-45 port. APs typically have coverage areas of up to 300 feet (approximately 100 meters), referred to as cells. Users move freely within the cell with their laptop or other portable network devices. Access points can be interlinked to allow users to even roam within a building or between buildings.

             Security risks

Risks in wireless networks are equal to the sum of the risk of operating a wired network plus the new risks introduced by weaknesses in wireless protocols. To mitigate these risks, agencies need to adopt security measures and practices that help bring their risks to a manageable level. They need, for example, to perform security assessments prior to implementation to determine the specific threats and vulnerabilities that wireless networks will introduce into their environments. In performing the assessment, they should consider existing security policies, known threats and vulnerabilities, legislation and regulations, safety, reliability, system performance, the life-cycle costs of security measures and technical requirements. Once the risk assessment is complete, the network security administrator can begin planning and implementing the measures that will be put in place to safeguard the systems and lower the security risks to a manageable level. The security administrator should periodically reassess the policies and measures in place because computer technologies and malicious threats are continually changing.

About PHARMACEUTICAL ENGINEERING

Techism is an online Publication that complies Bizarre, Odd, Strange, Out of box facts about the stuff going around in the world which you may find hard to believe and understand. The Main Purpose of this site is to bring reality with a taste of entertainment

0 comments:

Post a Comment

Copyright © 2013 ENGINEERING TRICKS BY PRINCE T.K ™ is a registered trademark.

Designed by Templateism. Powered By Blogger | Published By PHARMACEUTICAL ENGINEERING