GarrettCom OSI manual Using Ethernet To Network, Topology And Redundancy, Security

Models: OSI

1 10
Download 10 pages 21.65 Kb
Page 8
Image 8

USING ETHERNET TO NETWORK

There are many ways Ethernet components and standards can be employed to provide redundancy, robustness, security, and flexibility of design for many industrial networks. As has already been mentioned, Ethernet is also the best integration strategy available to network planners and architects.

TOPOLOGY AND REDUNDANCY

Ethernet works with star, bus, mesh, and ring topologies insuring the right topology for the job is selected. At the edges of a network with geographically separated devices the ring topology supported by Ethernet managed switches provides several advantages. Ethernet switches that support IEEE 802.1w, the Rapid Spanning Tree Protocol (RSTP), provide redundant links that can quickly recover from topology changes and add to the reliability of the ring. Because RSTP is designed to work with all topologies, some vendors offer proprietary and/or standards-based redundancy protocols that can significantly reduce recovery time down to as little as 50ms in the simple rings that are often used at the edge of a network.

Since the ring is comprised of devices with point-to-point links, signal reshaping and re- transmission of the sending leg reduce the possibility of transmission errors. Cabling costs are also significantly reduced from installing a separate link to each remote device as in a star or mesh topology. Where all devices are co-located a simple star or bus topology can be employed.

Some Ethernet switches support dual-homing. In Ethernet LANs, dual-homing is a network topology that adds reliability by allowing a device to be connected to the network by way of two independent connection points (points of attachment). One connection point is the operating connection, and the other is a standby or back-up connection that is activated in the event of a failure of the operating connection.

All media types from coax and copper to fiber are supported by Ethernet, often as plug-in modules for hubs and switches. Bandwidth to the Gigabit range is available in several combinations.

SECURITY

The 2003 Slammer worm attack on portions of the Northeast U.S. power grid confirmed the need for better security than currently implemented. The Energy Policy Act of 2005, which goes into effect the summer of 2006, provided a further push for a higher level of security in power systems. Both Ethernet and TCP/IP provide several sophisticated security features honed in IT departments and equally available to industrial Ethernet users.

Several TCP/IP-based and IEEE-based standards have been updated or created to handle intrusions over Internet-like connections. These include various forms of user authentication, password protection, and encryption. Managing a remote Ethernet component (switch, router, and hub) is most effective using standard GUI-based protocols. These in turn are translated into a command line

Distributed with permission of author by ISA 2006

Presented at ISA EXPO 2006

Page 8
Image 8
GarrettCom OSI manual Using Ethernet To Network, Topology And Redundancy, Security