PLC - Industrial Communication Network
PLC - Industrial Communication Network
TOPIC:
Industrial Communication Network
Major components of industrial network
Industrial Network Types
INDUSTRIAL NETWORK TOPOLOGIES
Transmission Media:
Industrial Network Protocols
The term network typically refers to connecting many devices together to permit
the sharing of data between devices over a single (or redundant) circuits.
There may also be networks used at lower levels in the control system architecture,
for communications between different PLCs in the same subsystem or industrial
facility, as well as for communications between field devices and individual PLCs.
The below figure shows the various levels of network communications in a typical
large SCADA system.
1
Two terms that are commonly used with respect to management information
systems communication are local area network (LAN) and wide area network
(WAN). A LAN consists of all of the devices, typically PCs and servers within a
particular industrial facility or site.
2
Major components of Industrial network
There are two types of NIC: wireless NIC and wired NIC.
Wireless NIC: All the modern laptops use the wireless NIC. In
Wireless NIC, a connection is made using the antenna that employs
the radio wave technology.
Wired NIC: Cables use the wired NIC to transfer the data over the
medium.
ii. Hub
Hub is a central device that splits the network connection into multiple devices.
When computer requests for information from a computer, it sends the
request to the Hub. Hub distributes this request to all the interconnected
computers.
iii. Switches
Switch is a networking device that groups all the devices over the network to
transfer the data to another device. A switch is better than Hub as it does not
broadcast the message over the network, i.e., it sends the message to the
device for which it belongs to. Therefore, we can say that switch sends the
message directly from source to the destination.
3
iv. Cables and connectors
Cable is a transmission media that transmits the communication
signals. There are three types of cables:
v. Router
Router is a device that connects the LAN to the internet. The router is
mainly used to connect the distinct networks or connect the internet to
multiple computers.
vi. Modem
Modem connects the computer to the internet over the existing telephone line.
A modem is not integrated with the computer motherboard. A modem is a
separate part on the PC slot found on the motherboard.
4
Industrial Network Types
Industrial network is a group of devices linked to each other that enables the
them to communicate with another device and share their resources, data,
and applications.
5
It is less costly as it is built with inexpensive hardware such as hubs, network
adapters, and Ethernet cables.
The data is transferred at an extremely faster rate in Local Area Network.
Local Area Network provides higher security.
6
MAN (Metropolitan Area Network)
A metropolitan area network is a network that covers a larger geographic area by
interconnecting a different LAN to form a larger network.
Government agencies use MAN to connect to the citizens and private industries.
In MAN, various LANs are connected to each other through a telephone exchange
line.
The most widely used protocols in MAN are RS-232, Frame Relay, ATM, ISDN, OC-
3, ADSL, etc.
It has a higher range than Local Area Network(LAN).
7
Uses of Metropolitan Area Network:
8
Advantages of Wide Area Network:
Following are the advantages of the Wide Area Network:
Security issue: A WAN network has more security issues as compared to LAN
and MAN network as all the technologies are combined together that creates the
security problem.
Needs Firewall & antivirus software: The data is transferred on the internet
which can be changed or hacked by the hackers, so the firewall needs to be
used. Some people can inject the virus in our system so antivirus is needed to
protect from such a virus.
High Setup cost: An installation cost of the WAN network is high as it involves
the purchasing of routers, switches.
9
INDUSTRIAL NETWORK TOPOLOGIES
What is Topology?
Topology defines the structure of the network of how all the components are
interconnected to each other. There are two types of topology: physical and logical
topology.
10
Bus Topology
The bus topology is designed in such a way that all the stations are connected through
a single cable known as a backbone cable.
Each node is either connected to the backbone cable by drop cable or directly
connected to the backbone cable.
When a node wants to send a message over the network, it puts a message over the
network. All the stations available in the network will receive the message whether it
has been addressed or not.
The bus topology is mainly used in 802.3 (Ethernet) and 802.4 standard networks.
The configuration of a bus topology is quite simpler as compared to other topologies.
The backbone cable is considered as a "single lane" through which the message is
broadcast to all the stations.
The most common access method of the bus topologies is CSMA (Carrier Sense
Multiple Access).
CSMA: It is a media access control used to control the data flow so that data integrity is
maintained, i.e., the packets do not get lost. There are two alternative ways of handling
the problems that occur when two nodes send the messages simultaneously.
Low-cost cable: In bus topology, nodes are directly connected to the cable
without passing through a hub. Therefore, the initial cost of installation is low.
11
Moderate data speeds: Coaxial or twisted pair cables are mainly used in bus-
based networks that support up to 10 Mbps.
Familiar technology: Bus topology is a familiar technology as the installation
and troubleshooting techniques are well known, and hardware components are
easily available.
Limited failure: A failure in one node will not have any effect on other nodes.
Extensive cabling: A bus topology is quite simpler, but still it requires a lot of
cabling.
Difficult troubleshooting: It requires specialized test equipment to determine
the cable faults. If any fault occurs in the cable, then it would disrupt the
communication for all the nodes.
Signal interference: If two nodes send the messages simultaneously, then the
signals of both the nodes collide with each other.
Reconfiguration difficult: Adding new devices to the network would slow down
the network.
Attenuation: Attenuation is a loss of signal leads to communication issues.
Repeaters are used to regenerate the signal.
Ring Topology
12
Ring topology is like a bus topology, but with connected ends.
The node that receives the message from the previous computer will retransmit
to the next node.
The data flows in one direction, i.e., it is unidirectional.
The data flows in a single loop continuously known as an endless loop.
It has no terminated ends, i.e., each node is connected to other node and having
no termination point.
The data in a ring topology flow in a clockwise direction.
The most common access method of the ring topology is token passing.
A token move around the network, and it is passed from computer to computer
until it reaches the destination.
The sender modifies the token by putting the address along with the data.
The data is passed from one device to another device until the destination
address matches. Once the token received by the destination device, then it
sends the acknowledgment to the sender.
In a ring topology, a token is used as a carrier.
13
Disadvantages of Ring topology:
The configuration in the figure below typically represents the lowest installed cost per
device.
14
Star Topology
15
Easily expandable: It is easily expandable as new stations can be added to the
open ports on the hub.
Cost effective: Star topology networks are cost-effective as it uses inexpensive
coaxial cable.
High data speeds: It supports a bandwidth of approx 100Mbps. Ethernet
100BaseT is one of the most popular Star topology networks.
A Central point of failure: If the central hub or switch goes down, then all the
connected nodes will not be able to communicate with each other.
Cable: Sometimes cable routing becomes difficult when a significant amount of
routing is required.
Tree topology
Tree topology combines the characteristics of bus topology and star topology.
A tree topology is a type of structure in which all the computers are connected
with each other in hierarchical fashion.
The top-most node in tree topology is known as a root node, and all other nodes
are the descendants of the root node.
There is only one path exists between two nodes for the data transmission. Thus,
it forms a parent-child hierarchy.
16
Advantages of Tree topology
Mesh topology
17
Mesh technology is an arrangement of the network in which computers are
interconnected with each other through various redundant connections.
There are multiple paths from one computer to another computer.
It does not contain the switch, hub or any central computer which acts as a
central point of communication.
The Internet is an example of the mesh topology.
Mesh topology is mainly used for WAN implementations where communication
failures are a critical concern.
Mesh topology is mainly used for wireless networks.
Reliable: The mesh topology networks are very reliable as if any link breakdown
will not affect the communication between connected computers.
Fast Communication: Communication is very fast between the nodes.
Easier Reconfiguration: Adding new devices would not disrupt the
communication between other devices.
18
Hybrid Topology
Reliable: If a fault occurs in any part of the network will not affect the functioning
of the rest of the network.
Scalable: Size of the network can be easily expanded by adding new devices
without affecting the functionality of the existing network.
19
Flexible: This topology is very flexible as it can be designed according to the
requirements of the organization.
Effective: Hybrid topology is very effective as it can be designed in such a way
that the strength of the network is maximized and weakness of the network is
minimized.
Complex design: The major drawback of the Hybrid topology is the design of the
Hybrid network. It is very difficult to design the architecture of the Hybrid network.
Costly Hub: The Hubs used in the Hybrid topology are very expensive as these
hubs are different from usual Hubs used in other topologies.
Costly infrastructure: The infrastructure cost is very high as a hybrid network
requires a lot of cabling, network devices, etc.
20
Transmission Media:
GUIDED MEDIA
It is defined as the physical medium through which the signals are
transmitted. It is also known as Bounded media.
Twisted pair:
Twisted pair is a physical media made up of a pair of cables twisted with each other. A
twisted pair cable is cheap as compared to other transmission media. Installation of the
twisted pair cable is easy, and it is a lightweight cable. The frequency ranges for twisted
pair cable is from 0 to 3.5KHz.
A twisted pair consists of two insulated copper wires arranged in a regular spiral pattern.
The degree of reduction in noise interference is determined by the number of turns per
foot. Increasing the number of turns per foot decreases noise interference.
21
Types of Twisted pair:
Category 1: Category 1 is used for telephone lines that have low-speed data.
It is cheap.
Disadvantage:
This cable can only be used for shorter distances because of attenuation.
22
Shielded Twisted Pair
A shielded twisted pair is a cable that contains the mesh surrounding the wire that allows
the higher transmission rate.
The cost of the shielded twisted pair cable is not very high and not very low.
Disadvantages
Coaxial Cable
Coaxial cable is very commonly used transmission media, for example, TV wire is
usually a coaxial cable.
The name of the cable is coaxial as it contains two conductors parallel to each
other.
The inner conductor of the coaxial cable is made up of copper, and the outer
conductor is made up of copper mesh. The middle core is made up of non-
conductive cover that separates the inner conductor from the outer conductor.
The middle core is responsible for the data transferring whereas the copper mesh
prevents from the EMI (Electromagnetic interference).
23
Coaxial cable is of two types:
Fibre Optic
Fibre optic cable is a cable that uses electrical signals for communication.
Fibre optic is a cable that holds the optical fibres coated in plastic that are used to
send the data by pulses of light.
The plastic coating protects the optical fibres from heat, cold, electromagnetic
interference from other types of wiring.
24
Diagrammatic representation of fibre optic cable:
Core: The optical fibre consists of a narrow strand of glass or plastic known as a
core. A core is a light transmission area of the fibre. The more the area of the core,
the lighter will be transmitted into the fibre.
Jacket: The protective coating consisting of plastic is known as a jacket. The main
purpose of a jacket is to preserve the fibre strength, absorb shock and extra fibre
protection.
Greater Bandwidth: The fibre optic cable provides more bandwidth as compared
copper. Therefore, the fibre optic carries more data as compared to copper cable.
Faster speed: Fibre optic cable carries the data in the form of light. This allows
the fibre optic cable to carry the signals at a higher speed.
Longer distances: The fibre optic cable carries the data at a longer distance as
compared to copper cable.
Better reliability: The fibre optic cable is more reliable than the copper cable as
it is immune to any temperature changes while it can cause obstruct in the
connectivity of copper cable.
25
UNGUIDED TRANSMISSION
An unguided transmission transmits the electromagnetic waves without using any
physical medium. Therefore, it is also known as wireless transmission.
In unguided media, air is the media through which the electromagnetic energy can
flow easily.
Radio waves
Radio waves are the electromagnetic waves that are transmitted in all the
directions of free space.
Radio waves are omnidirectional, i.e., the signals are propagated in all the
directions.
In the case of radio waves, the sending and receiving antenna are not aligned,
i.e., the wave sent by the sending antenna can be received by any receiving
antenna.
A Radio wave is useful for multicasting when there is one sender and many
receivers.
26
An FM radio, television, cordless phones are examples of a radio wave.
Radio transmission is mainly used for wide area networks and mobile cellular
phones.
Radio waves cover a large area, and they can penetrate the walls.
Radio transmission provides a higher transmission rate.
Microwaves
Terrestrial microwave
Microwaves are the electromagnetic waves having the frequency in the range from
1GHz to 1000 GHz.
27
In this case, antennas are mounted on the towers to send a beam to another
antenna which is km away.
It works on the line of sight transmission, i.e., the antennas mounted on the towers
are the direct sight of each other.
Characteristics of Microwave:
Frequency range: The frequency range of terrestrial microwave is from 4-6 GHz
to 21-23 GHz.
Advantages Of Microwave:
It is free from land acquisition as it does not require any land for the installation
of cables.
28
Satellite Microwave Communication
A satellite is a physical object that revolves around the earth at a known height.
We can communicate with any point on the globe by using satellite communication.
The satellite accepts the signal that is transmitted from the earth station, and it amplifies
the signal. The amplified signal is retransmitted to another earth station.
The coverage area of a satellite microwave is more than the terrestrial microwave.
The transmission cost of the satellite is independent of the distance from the
Centre of the coverage area.
It is easy to install.
Satellite designing and development requires more time and higher cost.
The life of the satellite is about 12-15 years. Due to this reason, another launch of
the satellite has to be planned before it becomes non-functional.
Infrared
An infrared transmission is a wireless technology used for communication over
short ranges.
The frequency of the infrared in the range from 300 GHz to 400 THz.
29
It is used for short-range communication such as data transfer between two cell
phones, TV remote operation, data transfer between a computer and cell phone
resides in the same closed area.
Characteristics of Infrared:
It supports high bandwidth, and hence the data rate will be very high.
Infrared waves cannot penetrate the walls. Therefore, the infrared communication
in one room cannot be interrupted by the nearby rooms.
Infrared communication is unreliable outside the building because the sun rays will
interfere with the infrared waves.
30
Industrial Network Protocols
Network protocols are network rules and standards that are used in industrial networks to
ensure different components in an industry are reliable and at the same time provide real-time
control to the users.
Proprietary protocols are those developed by vendors for use with their own systems and for
which application information is not made publicly available for use by other vendors.
Open protocols are those for which all application information is in the public
domain, permitting any vendor to develop devices and software that can use the
protocol.
SCADA Systems
SCADA systems for industrial facilities should use open protocols for a number of
reasons:
31
Types of Industrial Network Protocols
Modbus
Modbus is the oldest commercial network protocol. Introduced in 1979, it transfers
information using serial lines between electric devices. Modbus is extensively used in
critical infrastructures and also provides interaction in a client-server setting. It
transmits data from control devices back to the main controller.
Modbus is executed in two ways:
Profibus
Profibus is based on serial communications that are transferred via a fiber optic
wire. It is an open field standard communication through fieldbus, which enables vast
applications in manufacturing automation.
Profinet
Profinet is a network protocol based on Profibus. It uses Ethernet as its physical
interface for connection.
Profinet makes use of the full TCP/IP performance for data transmission, which
facilitates wireless applications and high-speed transfers.
Equipment used for Profinet Network protocols is designed to enable real-time
interactions.
For security against threats, a strict border is enforced to spot and also prevent any
type of unapproved or questionable web traffic.
32
Common Industrial Protocol (CIP)
Common Industrial Protocol (CIP) is a network protocol that automates industrial
processes. With a variety of modifications, this protocol makes it possible for
intercommunication and also assimilation of different types of networks. These
adjustments are:
CIP networks consist of a set of messages for the collection of producing automation
applications. This allows customers to incorporate these manufacturing applications
to Ethernet networks as well as the Internet.
DNP3
DNP3 is a three-layer protocol that operates at the data link as well as application
layer levels. It is used to transfer information between different components in
process automation systems. Established in 1993, protocol's layout was executed in
the electricity department mostly in the USA and Canada as well as water supply
companies.
DNP3 concentrates less on data privacy and stability to make the most of system
accessibility. This protocol was designed to attain interoperability in between
substation computer systems as well as master stations. It prefers remote
interactions but has limited transmission capacity.
Functions of DNP3 network protocol are:
33
Computer Network Models
OSI Model
TCP/IP Model
1.OSI Model
OSI stands for Open System Interconnection is a reference model that
describes how information from a software application in one computer moves
through a physical medium to the software application in another computer.
OSI consists of seven layers, and each layer performs a particular network
function.
OSI model was developed by the International Organization for Standardization
(ISO) in 1984, and it is now considered as an architectural model for the inter-
computer communications.
OSI model divides the whole task into seven smaller and manageable tasks.
Each layer is assigned a particular task.
Each layer is self-contained, so that task assigned to each layer can be
performed independently.
34
Characteristics of OSI Model:
The OSI model is divided into two layers: upper layers and lower layers.
The upper layer of the OSI model mainly deals with the application related
issues, and they are implemented only in the software. The application layer is
closest to the end user. Both the end user and the application layer interact with
the software applications. An upper layer refers to the layer just above another
layer.
The lower layer of the OSI model deals with the data transport issues. The data
link layer and the physical layer are implemented in hardware and software. The
physical layer is the lowest layer of the OSI model and is closest to the physical
medium. The physical layer is mainly responsible for placing the information on
the physical medium.
1. Physical Layer
2. Data-Link Layer
35
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
36
2. TCP/IP model
The TCP/IP model was developed prior to the OSI model.
The TCP/IP model consists of five layers: the application layer, transport layer,
network layer, data link layer and physical layer.
A network layer is the combination of the Physical layer and Data Link layer defined
in the OSI reference model.
It defines how the data should be sent physically through the network.
This layer is mainly responsible for the transmission of the data between two
devices on the same network.
The functions carried out by this layer are encapsulating the IP datagram into
frames transmitted by the network and mapping of IP addresses into physical
addresses.
The protocols used by this layer are ethernet, token ring, FDDI, X.25, frame relay.
37
II. Internet Layer
The main responsibility of the internet layer is to send the packets from any
network, and they arrive at the destination irrespective of the route they take.
The two protocols used in the transport layer are User Datagram protocol and
Transmission control protocol.
When one application layer protocol wants to communicate with another application
layer, it forwards its data to the transport layer.
38