Introduction To Networking: Robust Industrial Data Communications - Made Easy
Introduction To Networking: Robust Industrial Data Communications - Made Easy
Introduction To Networking: Robust Industrial Data Communications - Made Easy
2
Introductions
Dakota Diehl Benjamin Campbell
Network Application Engineer Technical Support Engineer
[email protected] [email protected]
847.453.3899 847.453.3896
3
Who is Westermo 2020
Founded in 1975 Flexible production with state of the
Order Value: 60 M USD art process control
No. of employees: 250 Sales and support units in 12
14% R&D countries, distributors in another 36
Extensive IPR portfolio for key Member of the Beijer Electronics
technologies Group
4
Industrial Networking Introduction
Operate on the “Edge”
Likely interfaces with the core network
Completely different considerations
Environmental
Noise
Legacy Cabling
Focuses on “LAN” type networking
Many Physical Layers (Layer 1)
MAC Addresses (Layer 2)
IP Addresses (Layer 3)
Firewalls (Layer 3 and 4)
5
Industrial Networking Considerations
Tough Physical Environment
Noisy Electromagnetic Environments
Many Different Physical Mediums
Fiber
Multi-mode
Single-mode
Copper
Cat 5 and better
“Legacy” Copper
Legacy Devices
Serial Devices
ISDN
Dial-up
6
Tough Physical Environments
Hot
+70 c
Cold
-40 c
Dusty
No fans to pull in dirt
Wet
Environmental ratings as high as IP67
Shock and Vibration
“Core Networking” devices won’t cut it
Requires devices designed to live in
these places
7
Noisy Environments and Old Cables
High levels of Electromagnetic Noise
Extreme spikes
High average noise (Noise Floor)
Cables installed for legacy systems
RS 232/422/485
LonWorks
New cables cost prohibitive
Fiber or Cat 5,6,7 is rare
Requires a “Media Conversion”
8
Physical Mediums
Fiber optic is the best choice
Expensive to install
Relatively rare in brown field
applications
Cat 5,6,7
Ethernet Compliant
Legacy cabling
Installed for legacy systems
Non-Ethernet compliant
Often not shielded
Maybe twisted pair, maybe not (50/50)
Coax
9
More Physical Mediums
Wireless (WiFi)
Only option sometimes
Can be affected by high noise floors
Media Conversions (Legacy Cables)
SHDSL PLC
Long distances (15 km) Extreme environments
High noise resilience Cable sharing
Limited Speed Shorter Distances
15.3 Mbit/s 300 m
30.6 Mbit/s with bonding Higher Speeds
70 Mbit/s
10
OSI Model and Packetization
12
Layers 1 and 2
• The Physical Layer refers to the physical medium through which data
communication occurs.
• Includes Copper, Fiber, even Air as a wireless medium.
• Focuses on the conversion of binary 1 and 0s (bits) into a signal.
• Outlines the method for node-to-node data transfer, a link over which
data is transferred.
• The layer establishes and terminates connections between two
physically connected devices.
• MAC Addresses are assigned at this layer, with any physical Network
Interface Card (NIC) receiving a standardized MAC address for all
communications.
13
Layers 3 and 4
• The Network Layer provides the means to transfer packets from one
node to another, located in different networks.
• Assigns a logical address of nodes (IP Address).
• Path determination, or Routing is enforced. Many protocols were
created to cover many different network types.
• Transport layer covers how to transfer data from source to host while
maintaining the Quality of Service (QoS).
• Reliability is maintained through flow control and error checking.
• Acknowledges failures in sent data and resend lost packets to ensure
communications are not lost.
• Firewalls exist between layers 3 and 4.
14
Layers 5 through 7
15
Packetization
DATA DATA
DATA DATA
DATA DATA
SEGMENT SEGMENT
PACKET PACKET
FRAME FRAME
BITS
16
DATA
APPLICATION
HEADER DATA
APPLICATION
HEADER DATA
APPLICATION
HEADER DATA
TCP
HEADER APPLICATION DATA
IP TCP
HEADER HEADER APPLICATION DATA
17
Layer 2 Switching Concepts
19
Hub vs Switch
B
A
C
• With a Hub, all traffic is broadcasted (sent to all
connected nodes) regardless of destination.
D
20
Hub vs Switch
B
A
C
• The Switch only sends traffic to the intended recipient
based on information in the Frame.
D
21
Switching and Frames
In a Layer 2 Environment, all data is sent in the form of Frames.
Frames are a type of data transmission unit containing a single network packet.
Destination Source
VLAN Tag Type Data FCS
Address Address
22
MAC Addresses
Media Access Control Address is a unique identifier assigned to every Network
Interface Controller.
Also known as a “Physical Address” or “Ethernet Hardware Address"
6 pairs of hexadecimal values or Octets, separated by “ : ”
Made up of 2 parts: OUI and NIC Specific
OUI (Organizationally Unique Identifier) is first 3 octets of MAC Address
Denotes a manufacturer of NIC or node
NIC Specific are remaining 3 octets that are a unique number given to each device.
EC:B1:D7:9A:E9:D2
1 00:07:91:21:23:8C Fa0/1
1 00:12:9E:5C:EE:D7 Fa0/2
10 00:1D:9D:5D:37:55 Fa0/3
10 00:20:2E:3B:24:76 Fa0/4
24
VLANs
VLAN, or Virtual LAN, or Virtual Local Area Network segments a single broadcast
domain.
Several physical devices can all share the same network while being separated by
VLAN software controls.
“Pipes inside a pipe”
Adds security, performance, and can organize a complex network.
Frames are tagged with a VLAN ID to define what VLAN they belong to.
VLANs can be configured to apply to either a physical port on the switch (Static VLAN)
or to all traffic coming from a specific MAC address (Dynamic VLAN).
25
VLANs
26
Layer 2 Redundancy
When learning MAC Addresses, a switch broadcasts all traffic for the first time.
These broadcasts can propagate and flood the network in a “Broadcast Storm” when
a loop is made between multiple switches.
Protocols exist such as Spanning Tree Protocol (STP) and Fast Reconfiguration of
Network Topology (FRNT) that automatically disable a link to prevent Broadcast
Storms and only enable it when another link is detected to go down.
In networks without these protocols configured, it’s very important to avoid looping
the network.
27
Broadcast Storms
28
Broadcast Storms
29
Broadcast Storms
30
Broadcast Storms
31
Broadcast Storms
32
FRNT
33
FRNT
34
Layer 3
Westermo North America
36
IP Addressing
IP Addresses
Not burned into the hardware
Divided into 4 octets
Required for any IP routing functions
IPv4 still most common in industrial
IPv6 becoming more common in core
networks
Private vs. Public Addresses
192.168.0.0 – 192.168.255.255
172.16.0.0 – 172.31.255.255
10.0.0.0/8 – 10.255.255.255
37
Subnetting
Defined by a Subnet Mask
32 bit number like an IP Address
Used to logically divide IP Networks
Segregates a physical network into
smaller logical subnetworks
A “filter” of sorts
Helps a device determine if the host it
wishes to reach is in the same network
Controls how many hosts can be on a
network
Requires a router to communicate
across subnets
38
Ports
The “room number” at the hotel
Paired with an IP Address
192.168.1.1:80
Many network applications running on
the same computer
Each application would be “bound” to
a port
Web Server : 80
SSH : 22
FTP : 21
39
Routing Basics
Allows communications between subnets or VLANs
Device 1 Device 2
192.168.0.100 VLAN1 VLAN2 10.2.1.50
255.255.255.0 255.0.0.0
VLAN1: 192.168.0.1
VLAN2: 10.0.0.1
40
Firewalls
Controls what data can enter or leave
a network
Work on a “deny by default” policy
Only traffic that is explicitly allowed is
passed thru the firewall
Different kinds
Port Based
Port 80 is allowed in
Host Based
10.0.1.2 is allowed
10.0.0.0/24 is allowed
Deep Packet Inspection
Looks at the data in a packet
Requires a lot of “horsepower”
41
Generally standalone appliance
Address Resolution Protocol
The glue that ties Layer 2 to 3
“Links” a MAC Address to an IP
Switches, Routers, Computers all rely on this. Any network device.
Expire after some time. Different from operating system to operating system.
Cleared after reboot.
When a device wants to send a message to a device that it’s never talked to, it will only have
it’s IP address. The device will send a layer 2 message to all devices asking, “who as IP
Address aaa.bbb.ccc.ddd”. If a device has that IP it will respond saying “IP Address
aaa.bbb.ccc.ddd is at MAC Address eee.fff.ggg.hhh”.
42
Next Webinar in February! Cyber Secure focus, coming on 2/27.
See Westermo’s Website under News and Events for more details.
43
Robust Industrial Data
Communications – Made Easy
44