Guidelines For Industrial Ethernet Infrastructure Implementation: A Control Engineer'S Guide
Guidelines For Industrial Ethernet Infrastructure Implementation: A Control Engineer'S Guide
Guidelines For Industrial Ethernet Infrastructure Implementation: A Control Engineer'S Guide
ABSTRACT
As part of a continuing effort to make their organizations more efficient and flexible, manufacturers are
rapidly migrating to Industrial Ethernet technology to network their industrial automation and control
systems. The use of standard Ethernet technology enables organizations to control costs by moving from
costly plant-optimized networks to a proven technology that is simpler to integrate, requires widely
available skills, and is more secure and reliable while still meeting real-time traffic requirements.
This white paper provides an overview of Ethernet technology and implementation guidelines to
implement in the both control and information networking environment. It discusses the requirements and
consideration in implementing a switched Ethernet architecture in industrial networking environments.
Discussion will include:
● Real-time network performance (including low latency, low jitter, and minimal packet loss) to
develop deterministic systems
● Reliability
Industrial Ethernet applies the Ethernet and IP suite of standards developed for data communication to
manufacturing control networks. By implementing an intelligent Industrial Ethernet solution, organizations
can build a manufacturing infrastructure that delivers the resiliency and network security of traditional
fieldbus solutions, as well as the improved bandwidth, open connectivity, and standardization that
Ethernet provides. Industrial Ethernet gives organizations substantially greater control over their
networked manufacturing equipment.
INTRODUCTION
As manufacturers seek to improve processes, increase productivity, and integrate manufacturing and
business networks, many are turning to Ethernet technology at their plant. This migration is rapidly
gaining momentum. Once considered a solution that was limited to corporate network environments,
Ethernet technology has proven to be a robust alternative that can meet the unique needs of the
manufacturing environment.
Industrial Ethernet networks that use intelligent switching technology can offer a variety of advantages
compared to traditional industrial networks. The technology can be deployed using a switched Ethernet
architecture and has proven successful in multiple critical applications in different markets. Because the
technology is based on industry standards, Industrial Ethernet enables organizations to save money by
moving away from expensive, closed, factory-floor optimized networks. Using standard Ethernet
technologies also reduces overall risk and provides investment protection, as manufacturers and
automation vendors can take advantage of continued industry
By providing a scalable platform that can accommodate multiple applications, Ethernet-based
automation systems can increase flexibility and accelerate deployment of new applications in the
future. At the same time, Ethernet delivers the network security, performance, and availability
required to support critical manufacturing applications.
To deploy this technology, engineers on the manufacturing floor should be familiar with some of
the important concepts behind Industrial Ethernet. This paper will provide a general overview of
the most important traditional Ethernet technologies in use today. It will also discuss how
Industrial Ethernet upgrades traditional, proprietary factory-floor networks to a low-cost, secure,
high-performance, scalable architecture. Finally, this paper will review some of the intelligent
features that make Industrial Ethernet an attractive choice for manufacturing organizations.
The corporate IT network supports traditional administrative functions and corporate applications,
such as human resources, accounting, and procurement, as well as WAN connections between
sites and Internet connectivity. This network is usually based on the Ethernet and IP suite of
standards.
The control-level network connects control and monitoring devices, including programmable
automation controllers, PC-based controllers, I/O racks, drives, and human-machine interfaces
(HMIs). This network, which has not been based upon standard Ethernet and IP in the past,
requires a router or, in most cases, a gateway to translate application-specific protocols to
Ethernet-based protocols. This translation lets information pass between the control network on
the factory floor and the corporate network infrastructure, but has limited functionality and
bandwidth, and requires significant effort to keep up to date.
The device-level network links the controllers with the plant floor’s I/O devices, including sensors
such as transducers, photoeyes, and flowmeters, and other automation and motion equipment,
such as robotics, variable frequency drives, and actuators. Interconnectivity between these
devices was traditionally achieved with a variety of fieldbuses such as DeviceNet, Profibus, and
Modbus. Each fieldbus has specific power, cable, and communication requirements, depending
on the factory application it supports. This has lead to a replication of multiple networks in the
same space and the need to have multiple sets of spares, skills, and support programs.
Instead of using architectures composed of multiple separate networks, Industrial Ethernet can
unite a company’s administrative, control-level, and device-level networks to run over a single
network infrastructure. In an Industrial Ethernet network, fieldbus-specific information that is used
to control I/O devices and other manufacturing components are embedded into Ethernet frames.
Because the technology is based on industry standards rather than on custom or proprietary
standards, it is more interoperable with other network equipment and networks.
WHAT IS ETHERNET?
Ethernet is by far the most widely used LAN technology today, connecting more than 85 percent
of the world’s LAN-connected PCs and workstations. Ethernet refers to the family of computer
networking technologies covered by the IEEE 802.3 standard, and can run over both optical fiber
and twisted-pair cables. Over the years, Ethernet has steadily evolved to provide additional
performance and network intelligence. This continual improvement has made Ethernet an
excellent solution for industrial applications. Today, the technology can provide four data rates.
● 10BASE-T Ethernet delivers performance of up to 10 Mbps over twisted-pair copper
cable.
● Gigabit Ethernet extends the Ethernet protocol even further, increasing speed tenfold
over Fast Ethernet to 1000 Mbps, or 1 Gbps. Because it is based upon the current
Ethernet standard and compatible with the installed base of Ethernet and Fast Ethernet
switches and routers, network managers can support Gigabit Ethernet without needing to
retrain or learn a new technology.
TCP provides reliable, in-order delivery of packets between two devices. It relies upon IP. TCP
applications establish connections between one another over which they send packets. TCP is a
stateful protocol; it maintains the state after the packet is sent. TCP checks whether all packets
have arrived and can request re-transmission if a packet is dropped, lost, or corrupted during
transmission. Due to this overhead though, TCP is not always ideal for real-time applications.
UDP is often used for real-time communications such as voice and I/O traffic. UDP also relies on
IP. UDP does not guarantee delivery or the order of the packets, thus simplifying the protocol.
The applications would rather drop a packet than receive it late. UDP is considered a “stateless”
protocol. It is compatible with packet broadcast (sending to all on local network) and multicasting
(sending to all subscribers).
There are a whole host of other protocols designed for specific purposes in the networking world,
but the key ones for an automation and control system are IP, TCP, and UDP
For example, Common Industrial Protocol (CIP) has implementations based upon Ethernet and
the IP protocol suite (EtherNet/IP), DeviceNet, and ControlNet (among others). Most controllers
(with appropriate network connections) can transfer data from one network type to the other,
leveraging existing installations, yet taking advantage of Ethernet. The fieldbus data structure is
applied to Layers 5, 6, and 7 of the OSI reference model over Ethernet, IP, and TCP/UDP in the
transport layer (Layer 4). .
The advantage of Industrial Ethernet is that organizations and devices can continue using their
traditional tools and applications running over a much more efficient networking infrastructure.
Industrial Ethernet not only gives manufacturing devices a much faster way to communicate, but
also gives the users better connectivity and transparency, enabling users to connect to the
devices they want without requiring separate gateways.
● Latency: Switches normally have very low latencies, which refers to the time it takes for
a network packet to transit between a source and a target. Most control operations in
industrial applications can tolerate latencies of 10 to 50 milliseconds (ms). Because
control traffic frames in industrial applications are usually below 500 bytes, the latency
introduced by a switch at 100 Mbps is only about 30 microseconds with a worst-case
scenario of close to 100 microseconds – well below the limit and 100 times faster than
most applications require.
● Standardization: One of the main motives for using Industrial Ethernet is the need to
standardize around a common infrastructure..
● Security: Managed switches play a major role in a security approach as the first point of
access to a network and system. It starts with port security and settings that control which
devices can connect. And managed switches can be configured to reduce or eliminate
common types of attacks (intentional or unintentional) such as broadcast or multicast
storms. A broadcast or multicast storm results when a device produces a large quantity of
broadcasts or multicast messages that flood the network. With a managed switch you
can apply VLANs and access control lists (ACLs) to segregate devices and traffic from
one another, even down to a port level.
● Diagnostics: A critical factor when resolving a problem on the factory floor is having the
right information. Managed switches provide a host of diagnostic information that can be
helpful to resolve network and device issues occurring in the automation and control
systems. Critical diagnostic information includes port status, amount of traffic being
passed, and the ability to mirror a port to see the type of traffic a node is generating or
receiving. As well, switches are being developed (and are already available) that function
as common industrial devices that can be directly managed and controlled by the
automation and control applications, like any other device on the factory floor.
NETWORK SECURITY
Ethernet technology can provide not only excellent performance for manufacturing applications,
but a wide range of network security measures to maintain availability, integrity, and
confidentiality of the automation and control systems. Availability is most often cited as the key
security requirement from a manufacturing point of view: keep the automation and control
systems operational. Integrity protects data and systems from intentional or accidental alteration.
Confidentiality helps ensure that data cannot be accessed by unauthorized users. These network
security advantages protect manufacturing devices such as programmable automation controllers
(PACs) as well as PCs, and apply to both equipment and data security.
As with any system characteristic, security is maintained through a lifecycle of design,
implementation, maintenance, and improvement. Security and administration policies are a key
foundation for developing robust network security. A security policy should logically segment the
devices and network in a manufacturing environment into groups or zones, on which the policies
can be applied. Once the security policy is defined, there are a number of key technical
capabilities available to implement the policy. These include, but are not limited to:
● VLAN configuration: A VLAN is a group of devices on one or more physical LANs that
are configured by the network so that they can communicate as if they were attached to
the same wire, when in fact they are located on a number of different LAN segments.
Conversely, VLANs enable devices on a single LAN segment to be logically segmented
into different VLANs. VLANs should be used to segment devices that need to
communicate to each other. Then, other devices or users that infrequently need to
communicate with those devices can be allowed access to the VLAN. VLANs form a
basic level of segmentation on which a security policy can be applied.
● Firewalls: A firewall regulates network traffic between various networks. Except for
completely disconnecting networks, firewalls are about the strongest form of
segmentation. Firewalls inspect all aspects of traffic flowing between networks, even
inspecting the data content of a packet (versus just the header information) – a process
known as deep packet inspection – and maintaining stateful information of the network
traffic. A firewall can be hardware- or software-based. Firewalls are applied at major risk
points in networks, for example where manufacturing networks interface with enterprise
networks or between the enterprise network and the Internet.
RELIABILTY
Because factory-floor applications run in real time, the network must be available to users on a
continuous basis, with little or no downtime. Manufacturers can help ensure network reliability
using effective network design principles, as well as intelligent networking services. Reliability
needs to be considered at each layer in the OSI model. Especially important for network design
considerations are Layers 1–3
Table 1: Network Design Considerations
Reliability exists at other layers, but is applied by the automation and control applications. For
example, TCP (a Layer 4 protocol) is inherently reliable because dropped or corrupt packets are
automatically resent when detected by the protocol. But the overhead and delay represented in
the process have led automation and control vendors to use UDP for some types of traffic. UDP
has less overhead, but no automated resending for particular information to communicate and
therefore relies upon the application to detect and manage packet loss or delay
Physical Layer Reliability
At the physical layer, a number of techniques can be applied to help achieve a resilient, highly
available network. First, the various components can be configured or purchased with resilient
features such as redundant power supplies (or even UPS), and redundant components (such as
fans, CPUs, network interface cards [NICs], etc.). Additionally, some devices may also support in-
line upgradeability of components or software that allows for continued service while the device is
being maintained or upgraded. These techniques will usually significantly improve the mean time
to repair (MTTR) the device itself or ensure the device has network access in the case of media
disruption or port failure (on either the end device or switch).
Using redundant devices may also help maintain high network availability. For example, multiple
switches or routers can be configured in a high-availability manner so that in the case of
disruption of one device, the other device will take over the network services quickly and
automatically.
Data Link Reliability
Manufacturers deploying an Ethernet solution should design networks with redundant paths to
ensure that a single device or link outage does not take down the entire network. How the end
devices and network devices are all inter-connected is a network topology. Two network
topologies most often used to achieve higher availability are ring and redundant star. The
topology chosen also has implications on wiring cost and complexity, performance, and
installation and maintenance cost. Other topologies (such as bus or trunk-drop) may be cheaper
to install and easier to maintain, but are more susceptible to outage and have a higher impact
when a connection or device is lost.
In redundant star designs (Figure 6), switches and routers are connected in a hierarchical
fashion. The first layer where devices are connected to switches is often referred to as the access
layer. These switches provide connections for endpoint devices such as PLCs, robots, and HMIs.
Access-layer switches generally operate at Layer 2 (data link) of the OSI model. Above the
access layer is another layer of switches referred to as the distribution layer. These switches
interlink the various access layer switches. If they support multiple cell/area zones, they may
need to operate at Layer 3 (network) of the OSI model, referred to as Layer 3 switches or routers,
to support multiple VLANs.
Figure 6: Redundant Star Network Topology
In ring topologies (Figure 7), all devices are connected in a ring. Each device has a neighbor to its
left and right. If a connection on one side of the device is broken, network connectivity can still be
maintained over the ring via the opposite side of the device. In a typical topology, the ring is at the
access layer, and connected up through the distribution and core layers using a redundant star
topology. In this model, the distribution and core layers provide the same functionality as in the
redundant star, with the distribution layer routing between cells, and the core connecting to
higher-level or external networks. .
All of these network performance implications need to be considered along with the cost,
complexity, and feasibility of cabling when determining the optimal network topology for a specific
application in a manufacturing environment. Table 2 highlights the appropriate topology based on
some common concerns: .
When a network has redundant paths, a loop can be formed in the network if the appropriate
protocols are not used to block redundant paths until a failure is detected. In Ethernet networks,
an unmanaged loop is dangerous because broadcast and multicast messages are continuously
passed until the network overloads, called a broadcast storm. A variety of protocols exist to
prevent loops from being formed in the network when devices are interconnected via multiple
paths by logically closing a connection or path until a failure is detected and the connection or
path is re-enabled. The standard protocol for this function is the Spanning Tree Protocol and its
more modern version called Rapid Spanning Tree Protocol (RSTP). Spanning Tree Protocol was
developed to manage redundant paths in a Layer 2 network. These protocols virtually close a link
or links to eliminate loops, yet maintain network viability. If a problem occurs on a network node,
the protocol detects it and re-opens any needed closed links to re-establish network connectivity.
This function is referred to as convergence. The protocols also automatically detect the repair of
broken links and subsequently re-converge the network.
The original Spanning Tree Protocol has been considered too slow for industrial environments.
To address these performance concerns, the IEEE standards committee has ratified the Rapid
Spanning Tree Protocol (802.1w). This protocol provides sub-second convergence times that
vary between 500 and 2000 ms, depending on network topology and size. Using 802.1w,
organizations can achieve the benefits of redundant Ethernet networks, with the performance and
reliability that many manufacturing applications demand.
Many manufacturing applications depend on multicast traffic, which can introduce performance
problems in the network and in the end devices themselves. To address these challenges in an
Industrial Ethernet environment, organizations can turn on IGMP “snooping”6 on their managed
switch network. IGMP snooping limits the flooding of multicast traffic by dynamically configuring
the interfaces so that multicast traffic is forwarded only to interfaces associated with IP multicast
devices. In other words, when a multicast message is sent to the switch, the switch forwards the
message only to the interfaces that are interested in the traffic. This is very important because it
reduces the load of traffic traversing through the network. It also relieves the end devices from
processing frames that are not needed. .
In a producer-consumer model used by Industrial Ethernet protocols such as CIP, IGMP
snooping can limit unnecessary traffic from the I/O device that is producing, so the traffic only
reaches the device consuming that data. Messages delivered to a particular device that were
intended for other devices consume resources and slow performance, so networks with many
multicasting devices will suffer performance issues if IGMP snooping or other multicast limiting
schemes are not implemented.
The IGMP snooping feature allows Ethernet switches to “listen” to the IGMP conversation
between end devices. With IGMP snooping, the Ethernet switch examines the IGMP traffic
coming to the switch and keeps track of multicast groups and member ports. When the switch
receives an “IGMP join” report from a host for a particular multicast group, the switch adds the
host port number to the associated multicast forwarding table entry. When it receives an IGMP
“leave group” message from a host, it removes the host port from the table entry. After the switch
relays the IGMP queries, it deletes entries periodically if it does not receive any IGMP
membership reports from the multicast clients. Only devices that are part of the group receive the
multicast messages sent to that group, thus reducing the amount of messages that the network
must send and that the end devices need to process.
QUALITY OF SERVICE
An Industrial Ethernet network may transmit many different types of traffic, from routine data to
critical control information (such as I/O traffic), or even bandwidth-intensive video or voice. The
network must be able to distinguish among and give priority to different types of traffic. By giving
priority to different types of traffic, the network can deliver real-time network services: low latency
and jitter and minimal packet loss when the network infrastructure is under load. This capability to
share the network with other applications, yet maintain the priority of the critical traffic, is a key
differentiating factor for Industrial Ethernet versus existing industrial network protocols.
Organizations can implement QoS using several techniques. QoS involves three important steps.
First, different traffic types in the network need to be identified through classification techniques
and then tagged. The classification and marking can occur either in the end device or the network
infrastructure, depending on the capabilities of both. There are also various ways to tag and
priority levels that can be applied. It is important to understand the type of traffic that will exist on
the network and ensure that the QoS approach takes into consideration all of those traffic types
and the capability of the network infrastructure. Second, advanced buffer-management
techniques need to be implemented to prevent high-priority traffic from being dropped during
congestion. Finally, scheduling techniques need to be incorporated to transmit high-priority traffic
from queues as quickly as possible. All three steps need to be considered when developing a
technique to implement QoS .
Although the application of QoS should be designed and tested before implementation, it is
relatively easy to deploy and maintain through the use of predefined port and switch
configurations. As well, the QoS approach for the manufacturing zone may be different for the
approach in the enterprise zone (where, for example, voice traffic gets the highest priority), thus
reinforce the need to logically segment the manufacturing zone to set up boundaries between the
different QoS implementations.
In an Industrial Ethernet application, real-time I/O control traffic would share network resources
with administrative data (such as explicit data), configuration files (FTP, for example) and data-
collection flows, as well as other traffic, in the upper layers of the OSI reference model. By using
QoS to give high priority to real-time UDP control traffic, organizations can realize the benefit of
sharing resources yet maintain the real-time network characteristics required for I/O control traffic
in industrial automation and control applications.
Network Management and IP Addressing
Network Management
Network management is a set of tools, applications, and devices used monitor and maintain a
network. Although a typical automation and control network does not drastically change after
deployment, as with all other aspects of the system, the network does need to be maintained and
managed. To a large extent, these functions have not been incorporated into the automation and
control systems, but this is changing. Therefore, production control engineers designing and
managing automation and control systems need to be aware of how the network will be managed
and what tools, training, and resources are required to put those in place.
The key functions of a network management as defined by the International Organization for
Standards (ISO) are:
● Performance management is gathering, analyzing, and reporting on key network
variables including device and link availability, throughput and utilization, and user
response time.
● Configuration management is managing and updating network configurations including
operating system versions, and network parameters (port, switch, and router settings).
● Accounting management is managing user and device accounts on the network.
● Fault management is detecting, logging, and notifying administrators of issues or faults
within the network.
● Security management is controlling access to the network and monitoring the network
traffic for security threats and breaches.
Production control engineers should make sure tools are available to help personnel to perform
these functions and they are trained in their use. This usually involves working with IT
organizations that already have tools and expertise.. One key aspect of network management
that does need particular attention is IP address allotment and allocation.
IP Addresses
Establishing policy and managing the IP addresses are relevant to a control engineer. Typically,
any Industrial Ethernet device (new or replacement) needs an IP address assigned to it. Many
production facilities use statically assigned addresses where someone has to decide the address
and configure end devices with their IP addresses. As most automation and control applications
use the IP address directly in their programs, this is a straightforward way to make sure they stay
in-synch, although as a facility grows, it can become a maintenance burden. Therefore, some
facilities use dynamically administered IP addresses, where every time the device starts, it gets
its IP address from a network service, for example using the Dynamic Host Configuration Protocol
(DHCP) Option 82. The network service can be configured to issue consistent IP addresses so
automation and control programs do not have to be changed, provided the appropriate network
design and configuration. Lastly, control engineers should also ensure they get enough IP
addresses allocated and have an allocation method that allows factory floor devices to be easily
recognized. IT is usually responsible for allocating enterprise IP addresses.
Using DHCP Option 82
Ethernet switches provide excellent connectivity and performance; however, each switch is
another device that must be managed on the factory floor. To make switched Ethernet networks
easy to support and maintain, intelligent switches include built-in management capabilities. These
intelligent features make it easy to connect manufacturing devices to the network, without
creating additional configuration tasks. And they help minimize network downtime if part of the
network should fail. One of the most useful intelligent features in a switched Ethernet network is
Option 82.
In an Ethernet network, DHCP lets devices dynamically acquire their IP addresses from a central
server. The DHCP server can be configured to give out the same address each time or generate
a dynamic one from a pool of available addresses.
Because the interaction of the factory-floor devices requires specific addresses, Industrial
Ethernet networks usually don’t use dynamic address pools. However, static addresses can have
drawbacks. Because they are linked to the MAC address of the client, and because the MAC
address is often hard-coded in the network interface of the client device, the association is lost
when a client device fails and needs to be replaced.
Extended fields in the DHCP packet can be filled in by the switch, indicating the location of the
device requesting an IP address. The 82nd optional field, called Option 82, carries the specific
port number and the MAC address of the switch that received the DHCP request. This modified
request is sent on to the DHCP server. If an access server is Option 82-aware, it can use this
information to formulate an IP address based on the Option 82 information. Effective use of
Option 82 enables manufacturers to minimize administrative demands and maintain maximum
network uptime even in the event of the failure of individual devices.
CONCLUSION
The migration to Ethernet in manufacturing environments has been growing steadily as
companies recognize the many benefits that Industrial Ethernet can deliver. The reasons behind
the success of Industrial Ethernet are clear. The technology lets manufacturers standardize and
consolidate their different manufacturing network architectures, using products offered by a
variety of equipment vendors. Because Industrial Ethernet is a standard technology, it enables
companies to take advantage of economies of scale, while still providing the flexibility needed to
support their specific factory-floor requirements. Because Industrial Ethernet uses the intelligent
networking features found in corporate data Ethernet environments, organizations can enjoy
substantially greater control over their networked manufacturing equipment.
A well-implemented Industrial Ethernet network can do much more than simply emulate the
functions of a traditional manufacturing network. It enables companies to more closely link their
internal data networks with the factory floor to make the entire company’s operations more
efficient. And by enabling manufacturers to tap the innovation underway that supports the millions
of existing Ethernet networks, it can make possible a wide range of new applications to support
business needs well into the future.
REFERENCES