Fieldbus & Industrial Networking


Top 10 mistakes on mission critical networks

October 2015 Fieldbus & Industrial Networking

Ethernet networks have become a standard for communications networks for mission-critical applications. However, the Ethernet and TCP/IP standards, and their attached protocols, are quite complex and should not be under­estimated. Very often it is seen that mission-critical Ethernet networks are implemented with the minimum amount of pre-planning, and while the network will work, it will not perform to its full potential and over time problems will start to present themselves. This article discusses 10 of the most common mistakes made with regards to mission-critical networks, and how they should best be addressed.

Physical parameters and monitoring

Physical cable degradation is the first point. Cables (both fibre and copper) are subject to degradation, especially when exposed to the elements, buried underground, or installed in other harsh environments. EMI affecting copper cables is also a concern as this can affect traffic over these cables, which can cause severe network problems. Inspection and correct installation are key preventative measures that must be addressed with regards to cables.

Next, we next discuss cable redundancy and why it is so important that this be implemented correctly. Redundancy is a key component for any mission-critical communications network, and cannot be trivialised or overlooked. However, although having redundancy in place is critical, without correct monitoring it can become largely ineffectual. Various options are available to ensure correct monitoring of the network, both physically and logically. Logical monitoring generally includes the use of an automated NMS (network management system) and SNMP (simple network management protocol). The article discusses the advantages of these rather than performing manual monitoring of the network and its attached devices, not only as it relates to time and effort saved, but also the accuracy of the automated mechanisms versus manual methods.

Protecting the network against attack

We then move on to include monitoring of possible malicious attacks on the network, specifically viruses/malware and potential hackers. Software and hardware exist that can and should be used to increase security on the network, however, it is important to realise that company policies plays just as important a role in protecting against these types of attacks. For instance, correct access control, and how the company/site deals with outside storage (USBs, HDDs etc.) which could contain potential viruses, are two company policies that can increase the safety and reliability of the network.

Maintenance

Monitoring and maintenance are two closely linked concepts, as simply monitoring a network and attached devices without acting on any potential problems is pointless. Maintenance includes not only physical maintenance (checking cables, hardware, power supplies etc.) but also logical maintenance such as firmware updating and checking of device logs. Firewalls and anti-viruses are also critical and must be maintained regularly. Anti-virus needs constant (preferably twice daily) updating of virus definition databases in order to protect against all viruses in the wild, new and old. Firewall rules should also be reg­ularly checked in order to adapt to a changing environment and new/replacement devices on the network.

Open systems and structures?

The next mistake we look at is vendor locking, where network administrators use proprietary protocols for critical network functionality (such as redundancy). Proprietary mechanisms may often work better than the open standards that are available, however using them means that future expansion will often be tied in to a single supplier, as changing away from this equipment (and the proprietary functionality) could require replacing most of the networking hardware.

Linked to the above is another error that many network administrators make, which is to become too comfortable with the existing network. This means that newer protocols and steps in technology are often ignored. Ethernet is constantly evolving, and networks (especially mission critical ones) should not be allowed to stagnate too much. Improvements in existing mechanisms, or completely new ones, could greatly improve the stability and reliability of the network, and also can provide advanced monitoring options which can assist in future troubleshooting or expansions.

We move on to look at some of the logical mistakes made on these networks, such as incorrectly designed and implemented IP structures and VLANs. As IP structures are part of the heart of any network, designing them correctly and efficiently is essential, especially if there may be expansion in the future. Related to this is correct broadcast and multicast control on the network, which will help keep the logical network clean of unwanted and erroneous traffic. Finally the article briefly discuss time synchronisation and how this can assist greatly with troubleshooting and analysis of the network, even if it is not directly required for any end device functionality.

Interested readers can download the full paper at: http://instrumentation.co.za/+j113



Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Introduction to Part 2 loop signatures and process transfer functions
Fieldbus & Industrial Networking
The previous series of loop signature articles dealt with the basics of control loop optimisation, and concentrated on troubleshooting and ‘SWAG’ tuning of simple processes. In this new series, consideration will be given to dealing practically with more difficult issues like interactive processes, and with processes with much more complex dynamics.

Read more...
Siemens sets new standards in drive technology
Fieldbus & Industrial Networking
Siemens is setting new standards in industrial drive technology with the launch of its new high-performance drive system, Sinamics S220. This offers a seamless and innovative drive system with comprehensive simulation and analysis capabilities and advanced connectivity features that enable full integration into digital work processes.

Read more...
PC-based control in the plastics industry
Beckhoff Automation Fieldbus & Industrial Networking
Nissei Plastic, an injection moulding machine manufacturer based in Japan is implementing a worldwide tend towards open automation systems from experienced specialists using PC and EtherCAT-based control technology from Beckhoff.

Read more...
Loop Signature 31: Non-linearity in control loops (Part 2)
Michael Brown Control Engineering Fieldbus & Industrial Networking
This article is a continuation of Loop Signature 30 published in the last issue in this series, exploring reasons for non-linearities which may be encountered in feedback control loops

Read more...
PC-based control for flat wire motors for electric vehicles
Beckhoff Automation Fieldbus & Industrial Networking
Special machine manufacturer, ruhlamat Huarui Automation Technologies unveiled the second generation of its mass production line for flexible stators with bar winding. This enables extremely short production cycle and line changeover times, supported by PC- and EtherCAT-based control technology from Beckhoff.

Read more...
Case History 200: The final case history – desuperheater control problem.
Michael Brown Control Engineering Editor's Choice Fieldbus & Industrial Networking
For this final article I have chosen to relate a problem that existed in a desuperheater temperature control on a boiler in a petrochemical refinery.

Read more...
PC-based control technology in additive manufacturing
Beckhoff Automation Editor's Choice Fieldbus & Industrial Networking
As an open control platform, PC-based control supports different engineering approaches, including low-code programming. The machine builder, Additive Industries uses this to create the code for the TwinCAT runtime of its 3D printers.

Read more...
Suppression and safety solutions for fire and gas in mission-critical industries
Fieldbus & Industrial Networking
By representing world-leading brands and focusing on fully integrated, certified systems, HMA South Africa is positioning itself as a trusted partner in fire detection, suppression and explosion-proof safety solutions across the continent.

Read more...
Integrating fire alarm systems into building management systems
Beckhoff Automation Fieldbus & Industrial Networking
Fire alarm systems work independently of the building automation system. Schrack Seconet has developed a flexible gateway using ultra-compact industrial PCs and TwinCAT from Beckhoff, which can be used to flexibly convert a customer-specific communication protocol to a wide range of transmission standards.

Read more...
Premium unmanaged industrial switch
Vepac Electronics Fieldbus & Industrial Networking
Premium unmanaged industrial switch for long-distance, noise-free fibre connectivity

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved