System Integration & Control Systems Design


Industrial router aids remote commissioning in Kenya

October 2004 System Integration & Control Systems Design Information Security

Gauteng-based systems integrators, RAM-TEC Systems, recently purchased a Westermo ED-20 Industrial Router from Throughput Technologies. The purpose of this router is to allow them to establish, via a telephone connection in their Bedfordview offices, a link to a network of Ethernet-based Modicon Quantum PLCs that RAM-TEC have supplied and are currently commissioning at a maize plant in Kenya.

The ED-20 operates in conjunction with other Westermo modems. In this way system integrators and machine manufacturers can connect to remote Ethernet-based control systems anywhere in the world and monitor or re-program Ethernet-based intelligent devices. A software set called ED-Tool is supplied with each unit for the configuration task.

Another feature of the ED-20 is that it can be used to connect remote Ethernet local area networks (LAN) in different locations. An example of this in the UK is an application for a major train tunnelling system currently in progress under London. Along the tunnel there are 14 ventilation systems each with a PLC and its associated equipment, all of which are connected to a LAN at the specific site.

Utilising Westermo GSM (cellular) modems, the operator at a central control room is able to start and stop ventilation fans, dependent on requirements (central LAN to remote LAN). In addition any fault at any one of the 14 locations is relayed back to the central location from the PLC to the central control room (remote LAN to central LAN). The ED-20 is able to initialise the GSM Modem, to establish the link.

PPP (the point-to-point protocol) is a mechanism for creating and running TCP/IP over a serial link - a direct serial connection or a link made using one of the following: Westermo analog public service telephone network (PSTN), leased line (dedicated telephone or fixed lines), GSM (cellular), fibre or short-haul modems. Other computers can connect via the ED-20 and communicate over the PPP link using File Transfer Protocol (FTP), Telnet, Web, etc. in the same manner as with an Ethernet TCP/IP link. One major difference between a PPP and an Ethernet connection is of course the speed. A standard Ethernet connection operates at 10 Mbit/100 Mbit maximum theoretical throughput, whereas an analog modem operates at speeds up to 56 kbit.

PPP is strictly a peer-to-peer protocol; there is no difference between the machine that dials in and the machine that is dialled into. However, it is still useful to think in terms of servers and clients. When you dial into a site to establish a PPP connection, you are considered the client. The machine to which you connect is considered the server.

ED-20 has two network interfaces, Ethernet and PPP, so the unit can forward IP-packets between these interfaces. Ethernet interface is a part of the local network and the 'Local IP Address' and 'Subnet Mask' must be set to the right 'Network ID'. The PPP connection can be established over PSTN, leased line or private lines. ED-20 can act as a PPP Server, PPP Client or both (see information on the tunnelling application mentioned above). These functions are set on the 'Modem settings' tab in ED-Tool for ED-20.

Brouter function

The Brouter function will establish a dial-up connection when valid outbound IP address (defined on the tab 'Brouter Settings' in ED-Tool for ED-20) is sent to the ED-20.

Proxy ARP function

The Proxy ARP function can be activated and used to divide an existing network into several networks and keep the original IP address settings, ie, the networks would appear to be one single network instead of multiple networks connected to each other. This will allow the connected equipment to communicate to each other without using gateways and is a benefit when attaching equipment not supporting gateway functionality.

More and more industrial applications are making use of Ethernet as their preferred data networking method. The ED-20 provides a simple and cost effective means of connection to remote LANs, thereby enhancing the overall possibilities of control and monitoring over long distances.



Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Banking’s AI reckoning
Commercial (Industry) Surveillance Access Control & Identity Management Fire & Safety Perimeter Security, Alarms & Intruder Detection Information Security Asset Management News & Events Integrated Solutions Infrastructure Security Services & Risk Management Education (Industry) Entertainment and Hospitality (Industry) Financial (Industry) Healthcare (Industry) Industrial (Industry) Mining (Industry) Residential Estate (Industry) Retail (Industry) Transport (Industry) Conferences & Events Products & Solutions Associations Videos Training & Education Smart Home Automation Agriculture (Industry) Logistics (Industry) AI & Data Analytics Facilities & Building Management IoT & Automation Power Management
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
AI cybersecurity predictions for 2026
AI & Data Analytics Information Security
The rapid development of AI is reshaping the cybersecurity landscape in 2026, for both individual users and businesses. Large language models (LLMs) are influencing defensive capabilities while simultaneously expanding opportunities for threat actors.

Read more...
SMARTpod Talks to Check Point Technologies about the African Perspectives on Cybersecurity report
SMART Security Solutions News & Events Information Security Videos
SMART Security Solutions spoke with Check Point's Hendrik de Bruin about the report, the risks African organisations face, and some mitigation measures.

Read more...
Project & industry
System Integration & Control Systems Design
Project and Industry This project involved delivering a complete electrical, instrumentation, and automation solution for a new OEM drum-twister machine, replacing an ageing unit in a major cabling production ...

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved