Control System Network

Slides:



Advertisements
Similar presentations
Chapter 4 Computer Networks
Advertisements

Chapter 3: Planning a Network Upgrade
Module 5 - Switches CCNA 3 version 3.0 Cabrillo College.
 Network topology is the layout pattern of interconnections of the various elements (links, nodes, etc.) of a computer.  Network topologies may be physical.
DHCP Dynamic Host Configuration Protocol by: Kirk Z. Moreno.
Terri Lahey LCLS Facility Advisory Committee 20 April 2006 LCLS Network Security Terri Lahey.
Terri Lahey LCLS FAC: Update on Security Issues 12 Nov 2008 SLAC National Accelerator Laboratory 1 Update on Security Issues LCLS.
ArcGIS for Server Reference Implementations An ArcGIS Server’s architecture tour.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 8 Introduction to Printers in a Windows Server 2008 Network.
ACACIA Threaded Case Study Presented By: Louise Maguire, Caroline Kearney, Peter Honeyman, Michael Mctague.
Copyright 2002 Year 2 - Chapter 4/Cisco 3 - Module 4 LAN Design By Carl Marandola.
Networking with Windows Vista.. Vista’s New Tools and Features The Network and Sharing Center Network Discovery Network Map Network Diagnostics.
INTRODUCTION TO COMPUTER NETWORKS Navpreet Singh Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA (Ph : ,
By: Aarman Tarapore 10cc.  a network is a series of points or nodes interconnected by communication paths. Networks can interconnect with other networks.
11 ASSIGNING IP ADDRESSES Chapter 2. Chapter 2: ASSIGNING IP ADDRESSES2 CHAPTER OVERVIEW  Describe the structure of IP addresses and subnet masks. 
This is the way an organisation distributes the data across its network. It uses different types of networks to communicate the information across it.
{ Networking High School Computer Application. What is a network? A system containing any combination of computers, computer terminals, printers, audio.
C LIENT /S ERVER AND P EER TO P EER National 4/5 Computing Science.
Terri Lahey EPICS Collaboration Meeting June June 2006 LCLS Network & Support Planning Terri Lahey.
DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP) BY: SAMHITA KAW IS 373.
Cluster computing facility for CMS simulation work at NPD-BARC Raman Sehgal.
Official Work Order Network Engineering Team Background: The company has recently undergone an expansion program, which has resulted in the purchase of.
Chapter 5 Networks Communicating and Sharing Resources
Internet Addressing. When your computer is on the Internet, anything you do requires data to be transmitted and received. For example, when you visit.
DNS (Domain Name System) Protocol On the Internet, the DNS associates various sorts of information with domain names. A domain name is a meaningful and.
By H.B.O. Systems July 13, 2000 Presenters: Janet Hughes, John Banister, Karen Oliver.
University of Palestine Faculty of Applied Engineering and Urban Planning Software Engineering Department INTRODUCTION TO COMPUTER NETWORKS Dr. Abdelhamid.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Services in a Converged WAN Accessing the WAN – Chapter 1.
1 Network Administration Module 3 ARP/RARP. 2 Address Resolution The problem Physical networks use physical addresses, not IP addresses Need the physical.
Proxy Installer for Windows Squid: Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. It reduces bandwidth and improves response.
Terri Lahey Control System Cyber-Security Workshop October 14, SLAC Controls Security Overview Introduction SLAC has multiple.
Computer Networks part II 1. Network Types Defined Local area networks Metropolitan area networks Wide area networks 2.
ITI-510 Computer Networks ITI 510 – Computer Networks Meeting 6 Rutgers University Center for Applied Computer Technologies Instructor: Chris Uriarte.
Data Communications and Networks Chapter 9 – Distributed Systems ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
CHAPTER - 4 COMPUTER NETWORK Dr. BALAMURUGAN MUTHURAMAN
Activity 1 5 minutes to discuss and feedback on the following:
R. Krempaska, October, 2013 Wir schaffen Wissen – heute für morgen Controls Security at PSI Current Status R. Krempaska, A. Bertrand, C. Higgs, R. Kapeller,
K. Luchini LCLS Lehman Review - Controls Breakout, May 11th 2005 Magnet Power Supplies K. Luchini Overview Hardware Software.
VMware Solutions To Access EXSi Server & Virtual Machine Consoles Presented By: Opvizor
Enterprise Vitrualization by Ernest de León. Brief Overview.
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
Network Concepts.
IP Adressing & Subnetting
CLOUD ARCHITECTURE Many organizations and researchers have defined the architecture for cloud computing. Basically the whole system can be divided into.
The Intranet.
Services DFS, DHCP, and WINS are cluster-aware.
Chapter 21 Address Mapping
Module 8: Networking Services
MCA – 405 Elective –I (A) Java Programming & Technology
ARP and RARP Objectives Chapter 7 Upon completion you will be able to:
EA C451 Vishal Gupta.
Wireless Modes.
Network Cards Server clusters use a variety of networks to communicate with other nodes and with clients.
Firewalls.
Welcome To : Group 1 VC Presentation
Module 5 - Switches CCNA 3 version 3.0.
INTRODUCTION TO COMPUTER NETWORKS
Routing and Switching Essentials v6.0
IS 4506 Server Configuration (HTTP Server)
Network Topologies Charles Warren.
AbbottLink™ - IP Address Overview
ESS Main Control Room & ICS Infrastructure
Client/Server and Peer to Peer
Networking 101.
Module 1: Overview of Systems Management Server 2003
Computer Networks Protocols
LCLS Control System Personnel Linac & BC2 Controls progress
IS 4506 Configuring the FTP Service
Layering and the TCP/IP protocol Suite
Chapter 21 Successfully Implementing The Information System
Presentation transcript:

Control System Network • Requirements • Development Network • Operations Network • Physically • Logically • Technology • Schedule

Background Ideas LCLS will have 30 year lifetime Best equipment now will be obsolete in 5 years Invest in Infrastructure which allows expansion More complex than current EPICS networks for SLC or SPEAR Not a typical “enterprise network” Need bandwidth between IOCs for fast feedback or localized control, not just to central “server” The servers are in the field, and clients are centralized (although we have centralized boot and file servers)

Four Subnets

Development Subnet

Access allowed only from Access Subnet Operations Network Must be able to operate LCLS if network is disconnected from SLAC or Internet Able to stand alone, must have servers Must have machines to run EPICS clients Access allowed only from Access Subnet SSH Servers, Web Servers EPICS Gateway Servers Offline Data Cache Servers

Operations Network Must also support access from the existing SLC network for SLC-aware IOCs (SAI). A proxy server on the SLC network must have access to all SAIs on the operations network SAIs must also be fully accessible from the operations network, as would any normal IOC.

The Ideal Network

Star Configuration

Fiber to Every Third Area

Distribution Layer

Physical Layout

Private IP Address Ranges Class A 10.0.0.0 to 10.255.255.255 Class B 172.16.0.0 to 172.31.255.255 Class C 192.168.0.0 to 192.168.255.255 Operations Network, Class A Not because of the number of nodes allowed, but because we can better organize and classify

Private IP Address Range Class A Operations Network Format is 10.10.X.Y 10.10.20.Y - Node on the Injection Subnet 10.10.21.Y - Node on the subnet for Sector 21 10.10.30.Y - Node on the subnet for Sector 30 10.10.33.Y - Node in Undulator Hall 10.10.35.Y - Node in Front-end Enclosure 10.10.100.Y - Node in Fast Feedback Subnet 10.10.120.Y - Node in LLRF Subnet for Injector

Physical Hardware 2 x Cisco 6509 (MCC) Stackable; rear panel cabling allows 32 Gb/sec Interconnect 36 x Cisco 3750

Schedule This was a first attempt given known dates

Schedule (v2)

Network Overview