© ELPRO Technologies Think Wireless…Think ELRPO NORCAL ISA Industrial Wireless Ethernet The New Era of Data Transmission.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
LAN Devices 5.3 IT Essentials.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
IP, Wireless The world is the network. From Ethernet up Ethernet uses 6 byte addresses Source, destination, data, and control stuff Local networks only.
IEEE Overview and Meshed Networking ELEC6076 Computer Networks Alan Ford
1-1 Introduction to Computer Networks and Data Communications.
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
Wi-Fi the Standard and Security. What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.
A Guide to major network components
© ELPRO Technologies NORCAL ISA Think Wireless…Think ELRPO Wireless Gateways Smart Wireless Gateways The 21 st Century modem Frank Williams May 1, 2007.
Technical Training: DIR-615
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
Wireless LANs Presented by: Jerome Thompson Mei-Lun Huang Liu-Yin Hu Kai-Wing Sum.
WIRELESS NETWORKING Presenter: Nhan Nguyên Phương.
Wireless Networking 102.
195Eg Ethernet Wired LAN 195Eg. Wireless Ethernet Setting IP Address Using Utility Programs Begin Programming Definition Selection Programming Modes of.
OSI Model Routing Connection-oriented/Connectionless Network Services.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
Module 4 - Networking MIS5122: Enterprise Architecture for the IT Auditor.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Communications & Networks
1 Chapter Overview Wireless Technologies Wireless Security.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Introduction to Networking. Key Terms packet  envelope of data sent between computers server  provides services to the network client  requests actions.
Common Devices Used In Computer Networks
Wireless Networks Tamus, Zoltán Ádám
Chapter 1 Introduction to Computer Networks and Data Communications Data Communications and Computer Networks: A Business User’s Approach.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Module 2: Information Technology Infrastructure
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Computer Concepts 2014 Chapter 5 Local Area Networks.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
EDT 661 Kelly Maurer. (((DS))) (((WIRELESS PRINTER))) ((( NETBOOK ))) DESKTOP ROUTER MODEM INTERNET /DLS (FROM WALL)
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
Basic Description of Wireless ISP System
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
PRESENTATION ON WI-FI TECHNOLOGY
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Presented by Hampton Smith  An IEEE (Institute for Electrical and Electronics Engineers) protocol ratified in 1997 which defines a standard.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
MASNET GroupXiuzhen ChengFeb 8, 2006 Terms and Concepts Behind Wireless Communications.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
1 LAN – local area network overview: 1.Types of networks 2.Network topology 3.LAN local area networks 4.Introduction to TCP/IP 5.IEEE / Wireless.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
195Eg Ethernet Wired LAN. 38,400,N,8,1 RJ-45 Connector (RS-232) Terminal Window (HyperTerminal, ESTeem Utility, Putty, TerrTerm, etc) Serial Port Access.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
INTRODUCTION TO THE INTERNET Internet Protocol Cameras Training: Session 1.
Exploring the World of Wireless James Taylor - COSC 352 Fall 2007.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Select appropriate hardware for building networks. Objective Course Weight 2%
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
ICT Unit 4: Network and the effects of using them
Wireless Ethernet Programming
Chapter Objectives In this chapter, you will learn:
SECTION 11 - Wireless Serial Overview
Advanced Configuration
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Networking Devices.
Chapter 12 Communications Security & Countermeasures
Computing Over Distance
Presentation transcript:

© ELPRO Technologies Think Wireless…Think ELRPO NORCAL ISA Industrial Wireless Ethernet The New Era of Data Transmission

© ELPRO Technologies Think Wireless…Think ELRPO NORCAL ISA OSI Layers Open Systems Interconnection (OSI) is a standard reference model for communication between two end users in a network Ethernet communications is made up using these layers. Data from the application layer i.e. File transfer or DCS etc. is wrapped up inside all of the other layers

© ELPRO Technologies Think Wireless…Think ELRPO NORCAL ISA Types of Spread Spectrum for Ethernet Frequency Hopping (FHSS) 900MHz Frequency Hopping (FHSS) 900MHz Change frequency after each data packet. Slower data rates (115.2Kbd), but more robust. Less vulnerable to interference. 100mW to 1W 100mW to 1W 20 mile LOS (Line of Sight) 20 mile LOS (Line of Sight) Direct Sequence (DSSS) 2.4GHz Direct Sequence (DSSS) 2.4GHz Spreads data packet over wide band, effectively transmitting each bit on many channels. Higher data rates (>1Mb/s), but vulnerable to interference. 100 to 500mW 100 to 500mW 1-5 mile LOS (Line of Sight) 1-5 mile LOS (Line of Sight)

© ELPRO Technologies Think Wireless…Think ELRPO NORCAL ISA Power and Antenna’s Under FCC regulations, the Effective Isotropic Radiated Power (EIRP) must be less than 4W. Under FCC regulations, the Effective Isotropic Radiated Power (EIRP) must be less than 4W. Radio power level of 1Watt, 100mW or 300mW allows the use of gained antennas, which results in greater distances. Radio power level of 1Watt, 100mW or 300mW allows the use of gained antennas, which results in greater distances. The drawback of using higher gain antennas is that a radio will pick up more background interference, and is only recommended in interference free areas. The drawback of using higher gain antennas is that a radio will pick up more background interference, and is only recommended in interference free areas. 2.4GHz, (300mW) + 11dB gain antenna = 4W EIRP 2.4 GHz, (100mW) + 16dB gain antenna = 4W EIRP 900Mhz, (1W) + 6dB gain antenna = 4W EIRP 900Mhz, (250mW) + 12dB gain antenna = 4W EIRP

© ELPRO Technologies Think Wireless…Think ELRPO NORCAL ISA Main Groups for Wireless Ethernet 5.8Ghz a WiFi, Higher performan with more bandwidth, less interference, distance is shorter than b or g 2.4GHz WiFi (also known as “802.11b or g”) very high data rates but very short distance 2.4GHz frequency hopping spread spectrum high data rates but short distance 900MHz frequency hopping spread spectrum lower data rates but longer distance

© ELPRO Technologies Think Wireless…Think ELRPO NORCAL ISA The Common Security Concerns Hacking Hacking Most common occurrence is when an intruder uses the same modulation or spread spectrum as the target system For protection utilize an AES system with WEP, WPA or WPA2 Make sure products include an embedded or physical firewall Industrial Espionage Industrial Espionage Systems should have a data format that has a unique structure with added security features, including network and address validation Data can be encrypted using a high-security encryption algorithm Send messages on an Exception Reporting protocol instead of continuous transmission Jamming Jamming With enough resources any wireless system can be jammed. To decrease this be sure the system utilizes wider channels, exception reporting, Frequency Hopping techniques, or with Direct Sequence proper encryption and powerful radios With enough resources any wireless system can be jammed. To decrease this be sure the system utilizes wider channels, exception reporting, Frequency Hopping techniques, or with Direct Sequence proper encryption and powerful radios

© ELPRO Technologies Think Wireless…Think ELRPO NORCAL ISASecurity Wired Equivalent Privacy (WEP) – Lowest level of encrypting data wirelessly with a 64 or 128 bit encryption key. WiFi Protected Access (WPA) - uses a series of mathematical algorithms to authenticate users. If a user sends unauthorized data in short bursts the system shuts down x-based authentication. WiFi Protected Access(WPA2) - provides government grade security by implementing the National Institute of Standards and Technology (NIST) FIPS compliant Advanced Encryption Standard (AES) encryption algorithm and 802.1x-based authentication.

© ELPRO Technologies Think Wireless…Think ELRPO NORCAL ISA MAC Address Filtering A MAC (Media Access Control) address is a unique identifiers for all Ethernet hardware devices Mac addresses are factory set and are expressed as a 6 bytes string eg. xx:xx:xx:xx:xx:xx Blacklist is a list of nominated MAC addresses you don’t want to have access to your network Whitelist is a list of nominated MAC addresses that you want to allow access to your network Cannot have both Blacklist and Whitelist

© ELPRO Technologies Think Wireless…Think ELRPO NORCAL ISA IP Address & Filtering 255 Consumers Road Protocol – refers to the Networking protocols used to control the message addressing, switching, routing etc. e.g. TCP, UDP,ARP etc Ports – TCP uses a 16-bit unsigned port number ( ) to identify sending and receiving application end points on a host. You can filter by IP address range, Protocols, Port numbers or any combination of the above. An IP address is a unique Internet identifying address like street addresses are used to identify where you live. An IP network uses an IP address to identify an Ethernet location

© ELPRO Technologies Think Wireless…Think ELRPO NORCAL ISA Access Point This is the “Master” unit. All Ethernet messages are directed by an Access Point Can be Point to Point and/or Point to Multipoint systems. Client Are the “Slaves.” There can be up to 255 Clients connected to an Access Point. Bridge A “Bridge” extends a LAN – or connects Ethernet devices to a LAN. For example, connecting a PLC on a remote machine to an existing wired LAN. Router A “Router” connects separate LAN’s. For example, connecting two separate LAN’s in two separate buildings. Wireless Ethernet Terms ACCESS POINT ROUTER BRIDGE CLIENT

© ELPRO Technologies Think Wireless…Think ELRPO NORCAL ISA Access Point - On start-up begins sending “Beacons” (Link messages) Client Scans for messages from AP and attempts to establish a link with the strongest radio signal Client Link Establishment Checks Authentication (System address and Encryption) Request a link (Association), Link LED AP Link LED, Acts as a Master and controls flow of messages Client 1 … Client N Access Point Client 2 Client 3 PC How Is A Connection Established?

© ELPRO Technologies Think Wireless…Think ELRPO NORCAL ISA Why Wireless Ethernet? Massive growth of Wired Ethernet in the last 5 years Wireless Ethernet is an extension of this growth Ethernet is well-known, carries multiple applications Simple IP programming compared I/O Telemetry programming and mapping

© ELPRO Technologies Think Wireless…Think ELRPO NORCAL ISA Developed for industrial customers & Factory Automation Process control and automation applications -PLCs, DCS, SCADA, data acquisition, wireless video Can handle multiple applications simultaneously Uses for Wireless Ethernet

© ELPRO Technologies Think Wireless…Think ELRPO NORCAL ISA Typical Applications Access Point Client Connecting a PLC to an existing wired LAN Connecting several PLC’s to an existing wired LAN Access Point Client

© ELPRO Technologies Think Wireless…Think ELRPO NORCAL ISA Applications Most are PLC connections - PLC to PLC or PLC to computer Automation industries - Pharmaceutical, Manufacturing, Ethernet Enabled Transmitters, Video Security Process Control – Data Loggers, RTU’s, Digital Recorders, Video Security SCADA market - Oil & Gas, Water/Waste Water, Irrigation

© ELPRO Technologies Think Wireless…Think ELRPO NORCAL ISA ETHERNET LAN A Device Server Access Point 1 Multi-Tier, Multi-Drop SCADA Installation PLC Access Point 2 Client AClient C Client B Client ETHERNET LAN B SYSTEM A PLC SYSTEM B

© ELPRO Technologies Think Wireless…Think ELRPO NORCAL ISA Wireless Ethernet Spanning Tree The “Spanning Tree Algorithm” function is able to handle network loops and provide redundant paths in networks. redundant paths until needed. Blocks redundant paths until needed. Each Wireless Bridge OR WIRED ETHERNET has a priority which determines where the node sits in the tree. When the highest connection point (255) fails the lowest connection point (0) instantly activates to become the main node connection on the network. There is some overhead in maintaining a network utilizing the Spanning Tree Algorithm.

© ELPRO Technologies Think Wireless…Think ELRPO NORCAL ISA Configuration and Diagnostics Configuration and diagnostics via Web browser (Internet Explorer) – Typically there is an Easy Quick Start Configuration Password protected Configuration and diagnostics accessed remotely via radio link Radio signal, Background noise, and connection diagnostics Most have default configuration by DIP switch Firmware easily upgraded

© ELPRO Technologies Think Wireless…Think ELRPO NORCAL ISA Quick Start Configuration Menu Item Sample Quick Start Page

© ELPRO Technologies Think Wireless…Think ELRPO NORCAL ISA Ethernet Modems in the Real World Can I browse the internet? Can I browse the internet? 900Mhz, Yes, but expect to get web browsing speeds slightly faster than a 56k dial up modem. 900Mhz, Yes, but expect to get web browsing speeds slightly faster than a 56k dial up modem. 2.4Ghz Yes, used in many commercial applications, Hotels, Airports, etc. 2.4Ghz Yes, used in many commercial applications, Hotels, Airports, etc. Can it do video? Can it do video? 900Mhz - is not designed for that purpose unless utilizing very high compression MPEG 3 or Mhz - is not designed for that purpose unless utilizing very high compression MPEG 3 or Ghz – Can display realtime live video, more reliable at b 2.4Ghz – Can display realtime live video, more reliable at b

© ELPRO Technologies Think Wireless…Think ELRPO NORCAL ISA Key To Wireless Ethernet 1. Long Range 2. Security 3. Reliability 4. Repeater 5. Configuration 6. Installation 900Mhz - Provides much greater distances (up to 60 miles) 2.4Ghz - High power WiFi and FHSS. 900Mhz - less prone to interference provides better penetration of signal and reflection off of surfaces. 2.4Ghz – Standard b WiFi, Proven Technology 900Mhz & 2.4Ghz – Most can double as a Repeater 900Mhz & 2.4Ghz – Configuration done via embedded web pages that can be accessed remotely. Installation is simple. AP automatically sends out a beacon to detect available clients and establish the link. 900Mhz bit AES or 64 bit proprietary encryption 2.4Ghz - 40 or 104 bit WEP, WPA1 or WPA2 (128 bit AES)

© ELPRO Technologies Think Wireless…Think ELRPO NORCAL ISA THANK YOU Wireless Ethernet The New Era of Data Transmission Tim Gross ELPRO Technologies