![Show Menu](styles/mobile-menu.png)
![Page Background](./../common/page-substrates/page0005.png)
3
industrial communications handbook 2016
Contents
Comment
by Professor Ian Jandrell
1
Chapter 1: Introduction
4
1.1
History
5
1.2
Going forward
5
1.3
Greenfield
5
1.4
Wrap-up
6
Chapter 2: Radio Basics
8
2.1
Time, length, phase
9
2.2
Wavelengths, antennas, etc
9
2.3
Radiation
10
2.4
Polarisation
12
2.5
Radiation pattern
12
Chapter 3: Applying Wireless in Practice 14
3.1
How far?
15
3.2
Line of sight
15
3.3
Indoor and diversity
16
3.4
Wireless coexistence
17
Chapter 4: Security of the Physical Network
20
4.1
Communications technology of choice for mission-critical systems
21
4.2
A threat defined
21
4.3
Physical security
21
4.4
External devices
22
4.5
Direct access devices
22
Chapter 5: Security at a Wireless/ Logical Level
28
5.1
Wireless meets wires
29
5.2
Outdated firmware
29
5.3
(pa$$.wOrds)
29
5.4
Secure versus unsecure networks
30
5.5
Firewalls
30
5.6
Virtual Private Networks
31
5.7
An ounce of prevention
32
5.8
Monitoring
33
Chapter 6: Greenfield
36
6.1
A fresh start
37
6.2
Hardware
37
6.3
Cabling
37
6.4
Logical topology and redundancy
38
6.5
VLANs
38
6.6
IP address structures
39
6.7
Routing
41
6.8
Firewalls
41
6.9
Less stress
41
Chapter 7: EtherNet on Steroids
42
7.1
Time sensitive networking
43
7.2
Trusted wireless 2.0
45
7.3
Industrial network market share
47
Chapter 8: Conclusion
48
8.1
Concluding remarks
8.2
References
49
About the authors
50
Abbreviations
51