Sunteți pe pagina 1din 4
aan2016 ‘Applying network best pracios via Ethornet network redundancy | Canal Enginearing Applying network best practices via Ethernet network redundancy Implementing redundancy in an indusral network and choosing an appropriate application method can ensure continung relat and oporationa success. aioaz0i8 Among the most relevant overlooked—Issues to address wien planning an industial Ethemet network isthe use of an Appropriate redundancy mechan sm. Consider that a communication fal na production network can create costly Sownime, cause the loss of important company data, or even initate conditions for serous damages to production equipment—or Worse: jury fo personnel. A redundant physical layer natwore Structure protects against production downtime by ensuring tho avallabity of communication continues, even if erors occur, ‘The following questions should be asked and meticulously discussed. fs redundancy required? Iso, which redundancy ‘method is best forthe apolcation? Otten, network planners and fend users consider the redundancy option extremely costy or a ‘technology that's too daunting to deploy. A decision to have redundant connectivity n the network does necessitate the higher Cost of managad switches, as well as the added timo and effort of primary configuration and continuing management. However, the Additonal equipment cost and resources can be far offset by continuous system uptime experienced, superior network ‘onitoringimanagement capabilites, and reduced troubleshooting measures through extended diagnostics (see Figure 1). [Network redundancy involves the integration of hardware with software, This ensures thatthe availabilty of the network Femains optimum in ho event ofa single point of faire. The communication systom-—tho industrial nowork-—is tho ove of| ‘every madem automation project, To handle network errors, a protocol can be selected from various options and integrated into the infastucture elements. Redundancy methods can be eategorized into four groups: IEEE open source, proprietary su- Second, standardized high-avaiab ty network redundancy protocol, and zervinteruption (oumpless) redundancy (see fedundancy methods and examples”). Characterstic ofthese categores ara distinguishable among te many redundancy rathods and are paricularly suited to certain applicalons and requirements (see "Table: Redundancy methods and choices below") etal Tepsevemn Avnet same ot Econ Sa aii lapse SUR lly mam hicciaatal ‘nga! ee a me Mommas Tt, ree omens ee SUEER oem Seer ian set SS se oes Gee ee = | eee During the planning stage, iit is determined thatthe industrial network must be resilient and able fo automatically recover in the event of a Layer / fale, arecundancy mechanism absolutely must ae employed. After that determination is made, atlention must tum tothe s «tion of an appropriate redundancy mechanism the pracess thatthe network supports can “withstand up to a couple of seconds of delay while a network re-convergence takes place, then bled and ue rapid spanning ttoe protocol (RSTP) can be used, and ther is no need to look further. tstwirw.cortrcleng comisingle-artcllaplying-network-bestpractices-via-eherel-network-redundancy/487OdaSAbEb0SO600Gaed IdObbes6BhimI70... 1 aan2016 ‘Applying network best pracias via Ethernet netwark recundancy | Conrl Engineering ‘Conversly, whon th topology sles tolerant to an extended outage and a ‘conmuntaton gop ef seeorte may ease syptem arms or nue (70) {Sate then arigropeed echorion shout bo deployed, Gon, hese are froprtay, but an povga th Ur wih sub-second recovery ine, superior 0 TERE standards-based redundancy, and can accommodate handreds of sche in single or matte ings 2aSor Spanning tee protocol (STP) A thom networks with recuncant data path il fm a meshes topology wth ATH) em cS impermissible loops, Due to these loops, data packets can cieulale endlosely “within the network and also can be duplicated. STP is an open protocol that is. pecan tlosurbed in oe 902,10-2004: [EEE Standard for Local and Metropoktan Area og \Networks—Media access control (MAC) Bridges. lis an Open Systems Inerconnectcn (08) Layer2 prove that gurantee 6 dose, foopiee local ive rulwork CAR) iis based onan agar dovloped by normed otware designer and network enghest Rada Petman wie she was employed at Digital Equipment Corp. STP rade it posse to extend ne network whereby recurdart inks are agrated ns way ah Automated backup path was provided inthe event an actve link dropped out for whatever reason without ceaing closed loops inthe network. To apply this protocol and gain the maximum benef. as with the other redundancy methods, the used switches must support the protocol. After the interruption of a segment, ican easily take 30 to 50 seconds before te alematve path becomes avaliable, Tis tmer-based delay is unacceptable for controls, and 30 seconds is extremely long for any mon toring application, Generally, the standard STP delay in execuling @ recover is io0 long to b¢ acceptaale in an Incustal application. Unfortunately, the strengths ofthe STP are what make it inherently nol unsuitable for redundant rng stuctures ‘The complexity thet allows STP to support a varity of topologies limits its performance in relatively simple Fedundant ring Thus, when a fault fccur in arng, the obvious solution is to treat the interruptec ring as two Separate network segments unt the Tink layer break is remeciod. Given that there ts only one fault recovery solution ina ring, the typical tie taken by standard STP fo collect fault data ang process the massaging lo create an ‘nalysis ofthat fautistkely tmacceptabl, RSTP ‘To deal with the shortcomings of STP, IEEE established RSTP in 2001. RSTP isa standardized, open redundancy method (IEEE 80210-2004) supported by a vast range of managed switches regardless of their manufacturer. The protocol supports Ting and tre topologies, a8 well as meshed networks, and easly can be enabled In any managed network. Te protocol Initaly was described in IECE 802. 1-200": Rapid Recanfguratin of Spanning Trae. Then, na 2004 revision af he standard, the orginal STP was noted as superfuous inthe IEEE 802. {a standard and recommended the use of RSTP instead ofthe ofginal STP whenever possible. IEEE 802.tw is therefore included inthe 602 1d standare, ‘The network tree structure is calculated by the RSTP algorithm so there is one switch configured as the root (see Figure 2) Different redundant physical connections can be created within the network Without the presenca ofa racunéancy ‘mechanism, this would result in tha occurrence of unacceptable oops that woule quickly congest the entre network, which would creat fatures. RSTP converts this fopology ino a tee structure, albelt inverted, by closing off a number of ports whose paths are deomed as lesser by the algorthm, This creates the necessary, ogial, logp-ree environment. With an inFasicture Sevice configured asthe network 00 ‘and logical blocks creates from that Foot, al other switches can be reached Via one path a network ear does ‘cur, such as a broken oF Sleconnected cable, then & new active palhis automaticaly created ‘The recovery times experienced with STP are significantly lower than tose ofthe original spanning tree (hence the fname) and are specifically 1 second to $3 few seconds, instead ofthe 30-10 50-second tmas of te orginal iteration. Depending an the application, tha recovery time of RSTP already may bo fast enough to ensure dopendabily. 3 STP has had quite a lengthy tenure ‘An example of rapid spanning tree redundancy mesh 2s the redundancy of choice in mary 1 and industial newark installations. Although faster redundancy schemes have been developed during the ensuing years, today, RSTP actual remains quile a viable choice for the average application, especially where device cost may be a concern, Proprietary redundancy-extensions of RSTP. To moet the ever-expanding requirements fora faster recovery of the automation network, many manufacturers have developed proprietary redundancy mechanisms o attain recovery times of less than 1 second, Often developed as an extension of RSTP. proprietary redundancy schemes dier Inthe recovery speeds and setup complexites, They employ ‘various concept, sucn as fast poling By the root bridge to gauge ring neath and to nate the fastest potential recovery ofthe retwork. In some proprietary technologies, the ring pors that are used to connect the switch tothe ring—as well as perform the Interconnection or coupling of ings—are established automaticaly In others, these ports must specifically be selected and configured before connecting the switches fo form the ring. AS an example of operation, upon power-up, the switches wil aulomalically choose the last switch Inthe ing. As the last switch, his tae. contclang comisinge-artclalaplying-network-bestpractices-via-etherat-network-redundancy@7Oca@Abebe0soe00daed TidObbsseahimI70... 24 aai2o16 ‘Applying network best pravias via Ethernet netwark recundany | Conrl Engineering ‘vice wu oe me nat one to power up, ren proceed to 10ex a nng port ana rau sena ou packers (0 nt determine Te health ofthe ring. Durng operation, each switch in the fing wil independant ‘monitor the stats oft ing ports, and upon a ing ink failure, the adjacent Switches wil send a ink-down message out on the rng fo the last switen, which Unblock the previously blocked port Rogardless ofthe redundancy selection, when a network connection or switch [ rope aut, recovery mes of 76 to 500 millsacands can be realized. A recovery | time of not more than 800 miligeconds ean be had, even in extenelve automation otworks with heavy traffic loads and a considerablo number of address enties to i the media access contol (MAC) tables inthe switches, As wth other technologies, the witnessed recovery times are scalable and can be much shorter for Instalations of fewer terminals (smaller MAC tables) in the network. With any of these scenarios, though, sub-second recovery can be achieved, and thereby | {ually of service can be maintained in te bulleing of redundant automation Retworks Device level ring (DLR) ‘The device level ring (OLR) redundancy protocal is part ofthe EtherNeUIP standard. DLR realizes recovery times of less than 3 mlsecands and therelore provides nearly bumps switchover (seo Figure 3). DLR Is supported by many current ElietNeUIP fold devices, such as 10 modules or programmable cantor that ‘an be networked in a nng topology using DLR via an integrated two-port switch function. The use of switches that natively Suppor DLR enables the simultaneous integration of several devices on the DLR, whe the integral system aiagnosties of DLR ‘low faults and erors to be Wdentied and ramediag quickly, ‘The DLR protocol supports a single ring topology; mutiple rings or overlapping rings are not allowed, Its possible though, “hen using suitable smicnes, to connett a redundant rng or operate multiple rested rings. As such, the DLR protocol information does not leave the individ ng or appecr i other rings. In Figure 4, he topology shows two DLR rings, each of ‘which make up indiidual segments, Thess segments are redundantly meshed and connected with one another va RSTP. Fedundancy. As such, the individual segments are respectively separated from other segmrants so thal no protocol information an leave the individual ring ‘The DLR nood not bo tied exclusively to EtherNetIP. In many nen-EtrerNetIP topologies, such as networking wind turbines, @ fedundancy mechanism is roqulred that svlchos over as fast as possible inthe event of an error lo prevent syetom alarming, In these instances, as wll the DLR redundancy mechanism can guarantoe a switchover of the transmission path in loss than Similiseconds. Media redundancy protocol (MRP) ‘Tye media redundancy protocol (MRP) Is fr rng installations and Is part of IEC 62439-3: Indusval communleatlon networks. MRP quarantoos a maximum recovery timo of 200 mlisacords in tho event ofan interruption in the ring topology, with 2 ‘maximum of 60 MRP node devices. MRP is supported by Pro‘inet switches and many Profinet eld devices to achieve Inoreased rlibity directly at tne device evel ira machine network. The Integrated rar diagnastics allow errors fo be removed quickly. {As previously mentioned, MRP is part ofthe Profinet standard, So, inthe case of MRP, a ring manager blocks one por to obtain an active ne sirucur. In the event ofa network eror, the network splis into Mo isolated lines i the network, which 're again Inked together afte the eror is resolved and the blocked por is released. Generaly, recovery limos typically are Tess than 100 milleaconds Para | redundancy protocol (PRP) In contrast wit the other technologies, PRP dass not Jed fo plan a change ofthe active topology in the fevent of a network error. The PRP protocal hnetions fn two parallel networks and in parallel redundant transmission. According to IEC 62439-3, all data telegrams are transmitted twice via two autonomous networks, This means that uninterruptible or Bumpless communication is attainable, even ithere ipa failure none of tne networks, Given that each ‘ata frame fs eont ver the two networks, the Fecelving node processes the message that arives first and rejects the secondary message when iis. foceived. The PRP protocol ensures the copying and forwarding, a8 well as the ulimate rejection, of the duplicate messages, all t Layer 2. In doing so, PRP Yea falso makes the double network invisible tothe higher layers in the communication stack Itis nat uncommon to find PRP deployed in cecal areas of application, such asin energy switchgear systems, chemical manufacturing, and wastawatertraalment sysioms. Because PRP does rol require any raconfiguration me, suse Is, particulary sulted tothe criical infrastructure sectors whose systems and networks are considered so vial that th ‘reapacitaion could have a debitaing effect on national soc. the economy, andor public health and safely. the analysis and design phase of an industil communications network wil necessitate asking a broad varity of {quostons an will adeross soveral potontal technology selections. Wether itis pandorngiloms, such as tho network transmission speed (Ethernet. fast Ethernet, Gigabt, and beyond) and media type (coppeto* fiber), ar the mplomentaton of high-end functionalities, sven as por-based dynamic host configuration protocol (OMCP}, Ink aggregation, or emote authentication dan user service (RADIUS) authentication, each selecton willbe important nis own right. The decision ‘whether fo implement a redundancy mechanism in an indusiral network and then choose the mast appropriate metnod forthe ‘pplication willbe of paramount impariance Ia the ongoing reliably ofthe network and the overall sucess of te operation (ee Figure 5). Redundancy methods and examples Redundancy methods can be categorized ino four groups: IEEE open souree, proprietary sub-second, standardized high: ‘valli network redundancy protocol, and zero-nterupton (bumpless) redundancy. The flowing groups include fexplanaione and examples. ita. contclang comisinge-artclalapelying-network-bestpractces-via-etheret-network-redundancy/4@7OdabAbebensobNOdaed TidObbsseahimI70.,. 34 aan2016 ‘Applying network best pracios via Ethornet network redundancy | Canal Enginearing IEEE open-source redundancy: This method has the slowest fault recovery time, butts the least expensive and the easiest redundancy fo implement and maintain. This redundancy can be applied to ary lopology selection including mesh and includes STP and RSTP. ry sub-second redundancy: Generally, here itle-to-no cost ference in equipment ar ime compared to RSTP. Only ring structures are possible, butt does allow the fexbilly of various ring canfiguraions, such as mulple fngs, dual Fedundant rings, and large capacity rings. It also Includes the rng-coupling and duahoming connectivity concepts. Urtike TEE open redundancy, the selection ofa proprietary redundancy technology locks the network-—or at least that ing segment —o one switch manufacturer's tochnology and devices. Duo fo tho variations inthe operation ofthe products, switch interoperability wihin one ring isnot feasiole. Tis methao includes extended ring reaundancy and fast ring detection. ‘Standardized high availablity network redundancy protocol: Ordinary for ring topologies only, these mechanisms are beacon-based ana maintain a Hierarchy wih a ring manager or superdsor and parspating ring nodes that are able to process the messaging. Ths method inclides MRP and OLR. Zero interruption (bumpless) redundancy: This, ‘method ean be used ina line o ing topology and Under certain conatons can be deployed in & me Configuration. However, ere isa price lobe pata for the speed because it requires addtional hardware- her integrated Ino the sitchin infrastructure on ‘ond devices, This method includes high- availabilty, seamless redundancy and PRP. Ken Austin is lead product marketing specialist for Ethernet at Phoenix Contact USA, This ancl appears inthe Appliog Automation supplement for Control Engineering ‘and Plant Engneering. ‘See other articles from the supplement below. Related News: [B of network redundancy and PID ‘contol = 11.08.2018 00:03 MARCOS , Non-US/Not Applicable, Venezuela, 08/31/16 10:05 AM: Very helpful, your information, Thanks Ken Post a comment = roquied felt Fetname: foam) E-mail Location Please Post Comment Anonymously (no user identification willbe posted with comment) Content [ sutrit Reset tstwirw.cortrcleng comisingle-artclalaplying-network-bestpractices-via-eherel-network-redundancy/487OdaSAbEbs0SO600Gaed tdObbss6BhimI70... 4!

S-ar putea să vă placă și