Previous Page  5 / 56 Next Page
Information
Show Menu
Previous Page 5 / 56 Next Page
Page Background

3

industrial communications handbook 2016

Contents

Comment

by Professor Ian Jandrell

1

Chapter 1: Introduction

4

1.1

History

5

1.2

Going forward

5

1.3

Greenfield

5

1.4

Wrap-up

6

Chapter 2: Radio Basics

8

2.1

Time, length, phase

9

2.2

Wavelengths, antennas, etc

9

2.3

Radiation

10

2.4

Polarisation

12

2.5

Radiation pattern

12

Chapter 3: Applying Wireless in Practice 14

3.1

How far?

15

3.2

Line of sight

15

3.3

Indoor and diversity

16

3.4

Wireless coexistence

17

Chapter 4: Security of the Physical Network

20

4.1

Communications technology of choice for mission-critical systems

21

4.2

A threat defined

21

4.3

Physical security

21

4.4

External devices

22

4.5

Direct access devices

22

Chapter 5: Security at a Wireless/ Logical Level

28

5.1

Wireless meets wires

29

5.2

Outdated firmware

29

5.3

(pa$$.wOrds)

29

5.4

Secure versus unsecure networks

30

5.5

Firewalls

30

5.6

Virtual Private Networks

31

5.7

An ounce of prevention

32

5.8

Monitoring

33

Chapter 6: Greenfield

36

6.1

A fresh start

37

6.2

Hardware

37

6.3

Cabling

37

6.4

Logical topology and redundancy

38

6.5

VLANs

38

6.6

IP address structures

39

6.7

Routing

41

6.8

Firewalls

41

6.9

Less stress

41

Chapter 7: EtherNet on Steroids

42

7.1

Time sensitive networking

43

7.2

Trusted wireless 2.0

45

7.3

Industrial network market share

47

Chapter 8: Conclusion

48

8.1

Concluding remarks

8.2

References

49

About the authors

50

Abbreviations

51