Verifying the IEC Configuration and Assessing the Communication Network during Commissioning

Size: px
Start display at page:

Download "Verifying the IEC 61850 Configuration and Assessing the Communication Network during Commissioning"

Transcription

1 1 Verifying the IEC Configuration and Assessing the Communication Network during Commissioning Dr. Fred Steinhauser, OMICRON, Austria Abstract Although IEC is sometimes just called the "new communication protocol for the substation" it is much more. Besides the fact that it indeed defines a collection of protocols for different purposes (GOOSE, Sampled Values, Client/Server), there are many more elements which are defined by the standard. One of these additional elements is the Substation Configuration Language (SCL) [2]. Its intended purpose was for engineering, especially the vendor independent engineering. While the IEC community is still working hard to achieve this goal to the full expectations of the customers, the SCL already serves multiple uses when dealing with IEC devices and systems. The SCL as universal data source One important aspect is that the SCL is a perfect basis for testing. The SCL contains the communication configuration. While this was still partly incomplete in IEC Edition 1, this has been essentially enhanced in Edition 2. For instance, not only the publishing side of the GOOSE communication can now be persisted in an SCL file, but also the subscriptions. From an SCD (Substation configuration description) file, that contains the communication definitions for the whole multiplicity of devices comprising the protection, automation and control (PAC) system, it can be easily derived which GOOSE messages and SV streams that should be present in the power utility communication network if all publishing devices are connected, active, and correctly configured. It is now possible to sniff this actual traffic from the communication network and to verify if it matches the configuration from the SCL file. Fig. 1 The SCL description contains information which actual traffic shall be on the network Matches and orphans The criteria for a match are not exactly defined by the IEC standard. It takes some common sense to come to a useful convention. Identifiers GOOSE messages and Sampled Values streams have multiple "identifiers", such as control block references (CBRef), GOOSE ID, SV ID, APPID, multicast MAC addresses. But when looking at the details of the definitions, e.g. for GOOSE, it becomes obvious that only the GOOSE control block reference is really unique. The other identifiers are not necessarily unique (although partly recommended), so they can be used e.g. for filtering, but not really for unambiguously identifying a GOOSE message. For a human, these control block references are readable and, if sensibly constructed, give good information about the GOOSE's origin and use. But technically speaking, these are potentially long strings (of variable length) and thus among the most ineffective data structures for performing a comparison. With the Sampled Values, a different practice has been established: while the control block references are still unique, the mainly used identification field is the Sampled Value ID (SvID). Of course, it must then be also unique within the scope of the application using the SV streams. During this verification, multiple results can occur. If all identifiers match, the verification can be simply checked as "OK". If only the "main" (unique) identifier matches but there are differences with others, the device is obviously online and publishing, but there are configuration issues that have to be resolved. If an expected GOOSE message / SV stream is not found, it needs to be checked first if the IED is online at all. The non-matching cases have to be worked off until all comparisons show a perfect match. The following figure shows a list of IEDs (the SLC file represents an artificial case from a multi-vendor interoperability demonstration) and related GOOSE and Sampled Values definitions being parsed into a testing tool.

2 2 Observation of the process quantities Observation is a live view on the data for checking if the connected, acquired and mapped signals are plausible. Wrong scaling of ratios of instrument transformers or inverted binary statuses become visible at this stage. The time resolution on this function is not suitable to assess the exact timing of the signals, but it can well be observed if the values change as expected. Fig. 2 GOOSE and Sampled Value information parsed from an SCL file for comparison with actual traffic published by the IEDs During commissioning, the case of not having all devices online at the same time is not unusual. So the option of incrementally re-checking the configuration without losing previous results is useful. Orphans It can also occur that GOOSEs or SVs show up that have not been defined in the provided SCL file. Such messages that cannot be related to a configuration are called orphans. By additionally loading SCL files that contain information for individual IEDs (typically ICD or IID files) such cases can be resolved as well. The last resort is manually creating an IED entry to relate the messages to and to make use of the conveyed data later on. Mapping and Observation To use the information coded in the messages, they need to be mapped to a "signal" that represents the actual meaning of the information in the electrical power system. For example, binary status information from GOOSE messages may be mapped to binary traces, just as if the information came from a conventional binary input. The data in Sampled Values packets have to be mapped to voltages and currents to represent their actual meaning. Fig. 3 Observation view with binary trace originating from a GOOSE message This step ensures that the values recorded later on are correctly connected and calculated. Recording and analysis For an in-depth investigation of the signals, especially the timing, recordings have to be made and analyzed. Fig. 4 Flexible trigger conditions for good discrimination of events to be captured in a recording To make the acquisition device recording only the events of interest, flexible and configurable trigger conditions are required. During commissioning, this might not be much of an issue because the start of the test case can be easily detected in most cases. But for troubleshooting, the importance of a sophisticated trigger condition is much more significant. The particular metrics that can be derived from recorded data and which are useful for assessing the communication network are occupied bandwidth and propagation delays for Ethernet packets when traversing through the network. These values are not calculated from the mapped signals, but from the generically captured traffic on the Ethernet network.

3 3 Propagation delay measurements From recorded network traffic, the bandwidth usage can be displayed, showing in detail which kind of traffic (GOOSE, SV, IP) contributed which share to it. Such an analysis is valid for a single port and can be easily obtained. To measure propagation times, data from at least two different locations need to be captured. The captures need to contain the same Ethernet packets, showing up at the different locations at different times. When captured, the packets obtain an accurate time stamp. The propagation delay is the difference of the time stamps. When this calculation can be performed for many packets, solid statistics can be evaluated. In a local network, such measurements can be relatively easy performed when it is possible to reach all locations from which traffic is to be captured from one single measurement device. The relative timing of the data packets captured with the device is always accurate and no additional time synchronization is required. The figure below shows such a measurement setup for a minimal network with two switches S1 and S2 that are connected by a trunk link. The next figure shows the delay time distribution of the Sampled Values under the described conditions. Fig. 6 Delay time distribution with ICMP packets (size: 500 bytes) as network load The left two bars, that contain most (96 %) of the measured packets represent the delay times between 25 µs and 28 µs. This is the time needed for a packet to traverse the little network undisturbed. The bars to the right, extending to delay times with a maximum of 66 µs, come from packets that got in conflict with one of the ping packets. The maximum is exactly 40 µs (the duration of the ICMP packets) higher than the average value for an undisturbed passage. This result matches perfectly the expectations that can derived from the theoretical examination of the situation. This demonstrates how other traffic can for example influence the transfer times of mission critical information in such networks. On the other hand, the actual performance of a communication network can easily be assessed by looking at the propagation delay distribution for a certain type of traffic. Outliers at with high propagation times are a safe indicator for a problem in the communication network. Conclusion Fig. 5 Possible measurement setup in a LAN A Sampled Value source (a merging unit) publishes one Sampled Values stream into the network. The measurement device captures the Sampled Values packets coming from the Sampled Values source before they enter the network at switch S1 and then again when they are broadcasted from the other switch S2, after traversing through the network. A PC connected to switch S1 generates load traffic by "pinging" an IED which is connected to switch S2. This forces ICMP messages to be exchanged over the trunk link and therefore interfering with the Sampled Values. The ping utility used for generating this load traffic allows specifying the size and the frequency of the ICMP packets. In the used setup, all Ethernet links, also the trunk link, operated at 100 Mbit/s. The ICMP packets were be issued at a rate of about 1000 packets per second. At a packet size of 500 bytes, one ICMP packet occupies the network for 40 µs and the ping packets utilize 4 % of the total bandwidth. When commissioning a power utility automation system with IEC 61850, some new testing tasks need to be performed. But with the usage of the configuration information in standardized SCL format and with modern measurement equipment, the verification of the communication setup is even easier to perform as with other protocols. The proper setup and performance of the power utility communication network itself can be easily verified by looking at the propagation delay statistics. Possible problems with the network performance would become visible as unexpectedly high propagation delay values. Bottom line, the described tasks can be performed in much shorter time than formerly needed for doing the corresponding checks with conventional signaling and communication technologies, which are now replaced by IEC

4 4 Literature [1] Ingram, D., et. al.: Direct Evaluation of IEC Process Bus Network Performance. IEEE Transactions on Smart Grid, Vol. 3, No. 4, December 2012 [2] IEC : Communication Networks and Systems for Power Utility Automation. Part 6: Configuration description language for communication in electrical substations related to IEDs. IEC, 2009 [3] Steinhauser, F.: Measuring the Performance of GOOSE Communication - Assessing IEC Real Time Messaging, CIGRÉ SEAPAC 2011, Sydney About the Author Dr. Fred Steinhauser was born in Austria. He studied Electrical Engineering at the Vienna University of Technology, where he obtained his diploma in 1986 and received a Dr. of Technical Sciences in In 1998 he joined OMICRON, where he worked on several aspects of testing power system protection. Since 2000 he works as a product manager with a focus on substation communication issues. Fred Steinhauser is a representative of OMICRON in the UCA International Users Group. As a member of WG10 and WG17 in the TC57 of the IEC he contributes the standard IEC He is also a member of SC B5 of CIGRÉ.

5 OMICRON is an international company serving the electrical power industry with innovative testing and diagnostic solutions. The application of OMICRON products allows users to assess the condition of the primary and secondary equipment on their systems with complete confidence. Services offered in the area of consulting, commissioning, testing, diagnosis and training make the product range complete. Customers in more than 140 countries rely on the company s ability to supply leadingedge technology of excellent quality. Service centers on all continents provide a broad base of knowledge and extraordinary customer support. All of this together with our strong network of sales partners is what has made our company a market leader in the electrical power industry. For more information, additional literature, and detailed contact information of our worldwide offices please visit our website. OMICRON

ISIO 200. Binary Input/Output (I/O) Terminal with IEC 61850 Interface

ISIO 200. Binary Input/Output (I/O) Terminal with IEC 61850 Interface ISIO 200 Binary Input/Output (I/O) Terminal with IEC 61850 Interface Compact and Easy ISIO 200 Put your Binary I/Os where you need them ISIO 200 is a simple and versatile binary I/O terminal with IEC 61850

More information

IEC 61850 TRAINING PROGRAM

IEC 61850 TRAINING PROGRAM IEC 61850 TRAINING PROGRAM A True Hands-On Experience... Ver. 2.0 Date: January 2013 TRAINING OVERVIEW GridSoftware IEC 61850 Training Program is specifically built for conventional protection and control

More information

Testing Intelligent Device Communications in a Distributed System

Testing Intelligent Device Communications in a Distributed System Testing Intelligent Device Communications in a Distributed System David Goughnour (Triangle MicroWorks), Joe Stevens (Triangle MicroWorks) [email protected] United States Smart Grid systems

More information

Astaro Deployment Guide High Availability Options Clustering and Hot Standby

Astaro Deployment Guide High Availability Options Clustering and Hot Standby Connect With Confidence Astaro Deployment Guide Clustering and Hot Standby Table of Contents Introduction... 2 Active/Passive HA (Hot Standby)... 2 Active/Active HA (Cluster)... 2 Astaro s HA Act as One...

More information

Application-Centric Analysis Helps Maximize the Value of Wireshark

Application-Centric Analysis Helps Maximize the Value of Wireshark Application-Centric Analysis Helps Maximize the Value of Wireshark The cost of freeware Protocol analysis has long been viewed as the last line of defense when it comes to resolving nagging network and

More information

UNLOCK YOUR IEC 61850 TESTING EXCELLENCE

UNLOCK YOUR IEC 61850 TESTING EXCELLENCE IMPROVE EFFICIENCY TEST WITH CONFIDENCE OF KNOW-HOW LEARN AND EXPAND YOUR IEC 61850 SKILLS MASTER YOUR NETWORK KNOWLEDGE GENERATE TEST RESULTS UNLOCK YOUR IEC 61850 TESTING EXCELLENCE Connect To & Read

More information

How To Monitor And Test An Ethernet Network On A Computer Or Network Card

How To Monitor And Test An Ethernet Network On A Computer Or Network Card 3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel

More information

Networking 4 Voice and Video over IP (VVoIP)

Networking 4 Voice and Video over IP (VVoIP) Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move

More information

VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port

VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port 1. VLAN Overview 2. VLAN Trunk 3. Why use VLANs? 4. LAN to LAN communication 5. Management port 6. Applications 6.1. Application 1 6.2. Application 2 6.3. Application 3 6.4. Application 4 6.5. Application

More information

This webinar brought to you by the Relion product family Advanced protection and control from ABB

This webinar brought to you by the Relion product family Advanced protection and control from ABB This webinar brought to you by the Relion product family Advanced protection and control from ABB Relion. Thinking beyond the box. Designed to seamlessly consolidate functions, Relion relays are smarter,

More information

Accelerating Development and Troubleshooting of Data Center Bridging (DCB) Protocols Using Xgig

Accelerating Development and Troubleshooting of Data Center Bridging (DCB) Protocols Using Xgig White Paper Accelerating Development and Troubleshooting of The new Data Center Bridging (DCB) protocols provide important mechanisms for enabling priority and managing bandwidth allocations between different

More information

OMICRON Monitoring Solutions

OMICRON Monitoring Solutions OMICRON Monitoring Solutions Partial discharge monitoring of high voltage assets M/G Extending the service life of high-voltage assets Why monitoring? Insulation degradation in critical high-voltage (HV)

More information

OptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an

OptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an No one knows the value of an Network Analysis Solution Total integration Total control Total Network SuperVision integrated solution better than network engineers and Fluke Networks. Our Network Analysis

More information

SSVP SIP School VoIP Professional Certification

SSVP SIP School VoIP Professional Certification SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover

More information

OptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an

OptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an No one knows the value of an Network Analysis Solution Total integration Total control Total Network SuperVision integrated solution better than network engineers and Fluke Networks. Our Network Analysis

More information

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)

More information

Vehicle data acquisition using CAN By Henning Olsson, OptimumG [email protected]

Vehicle data acquisition using CAN By Henning Olsson, OptimumG henning.olsson@optimumg.com Vehicle data acquisition using By Henning Olsson, OptimumG [email protected] Introduction: Data acquisition is one of the best tools to increase the understanding of vehicle behavior. One can

More information

Latency on a Switched Ethernet Network

Latency on a Switched Ethernet Network Application Note 8 Latency on a Switched Ethernet Network Introduction: This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency

More information

OAM Operations Administration and Maintenance

OAM Operations Administration and Maintenance OAM Operations Administration and Maintenance IERU Communications Ltd OAM Rev. A Page 1 of 9 Operations Administration and Maintenance 1. Overview This paper describes the Ethernet and Multi-Protocol Label

More information

Simplify VoIP Network Setup and Troubleshooting with NetTool VoIP

Simplify VoIP Network Setup and Troubleshooting with NetTool VoIP Simplify VoIP Network Setup and Troubleshooting with NetTool VoIP Introduction As businesses search for new ways to cut costs and increase efficiency, they are moving their phone systems to VoIP (voice

More information

Quality of Service in Industrial Ethernet Networks

Quality of Service in Industrial Ethernet Networks György Kálmán, ABB Corporate Research Norway, [email protected] Quality of Service in Industrial Ethernet Networks February 10, 2013 Slide 1 Can we provide appropriate Quality of Service for industrial

More information

The IP Transmission Process. V1.4: Geoff Bennett

The IP Transmission Process. V1.4: Geoff Bennett The IP Transmission Process V1.4: Geoff Bennett Contents Communication Between Hosts Through a MAC Bridge Through a LAN Switch Through a Router The tutorial is divided into four sections. Section 1 looks

More information

24 Port Gigabit Ethernet Web Smart Switch. Users Manual

24 Port Gigabit Ethernet Web Smart Switch. Users Manual 24 Port Gigabit Ethernet Web Smart Switch Users Manual Content Web Smart Switch Configure login -------------------------------- 2 Configuration System Configuration ---------------------------------------------------

More information

Troubleshooting Common Issues in VoIP

Troubleshooting Common Issues in VoIP Troubleshooting Common Issues in VoIP 2014, SolarWinds Worldwide, LLC. All rights reserved. Voice over Internet Protocol (VoIP) Introduction Voice over IP, or VoIP, refers to the delivery of voice and

More information

1 PC to WX64 direction connection with crossover cable or hub/switch

1 PC to WX64 direction connection with crossover cable or hub/switch 1 PC to WX64 direction connection with crossover cable or hub/switch If a network is not available, or if it is desired to keep the WX64 and PC(s) completely separated from other computers, a simple network

More information

UNIVERSIDADE DA BEIRA INTERIOR Faculdade de Engenharia Departamento de Informática

UNIVERSIDADE DA BEIRA INTERIOR Faculdade de Engenharia Departamento de Informática 1 1. This is a frequency evaluation test. 2. Read the questions carefully before answering. 3. Write your answers in the answer sheet provided. 4. Return only the answer sheet with your name, number and

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

SSVVP SIP School VVoIP Professional Certification

SSVVP SIP School VVoIP Professional Certification SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that

More information

mbits Network Operations Centrec

mbits Network Operations Centrec mbits Network Operations Centrec The mbits Network Operations Centre (NOC) is co-located and fully operationally integrated with the mbits Service Desk. The NOC is staffed by fulltime mbits employees,

More information

Kepware Technologies Using Wireshark for Ethernet Diagnostics

Kepware Technologies Using Wireshark for Ethernet Diagnostics Kepware Technologies Using Wireshark for Ethernet Diagnostics March, 2012 Ref. 50.08 Kepware Technologies Table of Contents 1. Introduction... 1 2. Setting up the Software... 1 3. Using Wireshark... 2

More information

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and

More information

What is VLAN Routing?

What is VLAN Routing? Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one

More information

Implementation of Virtual Local Area Network using network simulator

Implementation of Virtual Local Area Network using network simulator 1060 Implementation of Virtual Local Area Network using network simulator Sarah Yahia Ali Department of Computer Engineering Techniques, Dijlah University College, Iraq ABSTRACT Large corporate environments,

More information

Chapter 4 Customizing Your Network Settings

Chapter 4 Customizing Your Network Settings . Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It

More information

Optimum Business SIP Trunk Set-up Guide

Optimum Business SIP Trunk Set-up Guide Optimum Business SIP Trunk Set-up Guide For use with IP PBX only. SIPSetup 07.13 FOR USE WITH IP PBX ONLY Important: If your PBX is configured to use a PRI connection, do not use this guide. If you need

More information

FOUNDATION Fieldbus High Speed Ethernet Control System

FOUNDATION Fieldbus High Speed Ethernet Control System FOUNDATION Fieldbus High Speed Ethernet Control System Sean J. Vincent Fieldbus Inc. Austin, TX, USA KEYWORDS Fieldbus, High Speed Ethernet, H1, ABSTRACT FOUNDATION fieldbus is described in part by the

More information

From Fieldbus to toreal Time Ethernet

From Fieldbus to toreal Time Ethernet Process Automation From Fieldbus to toreal Time Ethernet Safety, reliability IEC61158-2 as the physical layer too slow for Ethernet/IP frames Unsafe cables towards wireless solutions Factory automation

More information

IEC 61850 SCL - MORE THAN INTEROPERABLE DATA EXCHANGE BETWEEN ENGINEERING TOOLS

IEC 61850 SCL - MORE THAN INTEROPERABLE DATA EXCHANGE BETWEEN ENGINEERING TOOLS IEC 61850 SCL - MORE THAN INTEROPERABLE DATA EXCHANGE BETWEEN ENGINEERING TOOLS Wolfgang Wimmer ABB Baden, Switzerland [email protected] Abstract The IEC 61850 SCL language for Substation Configuration

More information

CMA5000 SPECIFICATIONS. 5710 Gigabit Ethernet Module

CMA5000 SPECIFICATIONS. 5710 Gigabit Ethernet Module CMA5000 5710 Gigabit Ethernet Module SPECIFICATIONS General Description The CMA5710 Gigabit Ethernet application is a single slot module that can be used in any CMA 5000. The Gigabit Ethernet test module

More information

Network Visibility Guide

Network Visibility Guide Network Visibility Guide Even Superman could only see through walls, not networks! We understand your lack of Network visibility. So we give you ManageEngine NetFlow Analyzer! Network visibility is the

More information

IP Networking Primer. Presented by: Michael Leary

IP Networking Primer. Presented by: Michael Leary IP Networking Primer Presented by: Michael Leary Purpose and Objective OSI Model IP Addressing Bandwidth Networks Network Devices Power over Ethernet Cabling Internet Protocol IP is a key network layer

More information

NTP Receiver/Software Installation Guide

NTP Receiver/Software Installation Guide NTP Receiver/Software Installation Guide 11869 Teale St. Culver City, CA 90230 Tech Support: 888-608-0125 www.innovationwireless.com Table of Contents Important Note... 3 Software Installation... 4 DHCP

More information

IP and Ethernet Communication Technologies and Topologies for IED networks

IP and Ethernet Communication Technologies and Topologies for IED networks IP and Ethernet Communication Technologies and Topologies for IED networks Authors Navindra Yadav Principal Engineer, Cisco Systems, Inc. [email protected] Eruch Kapadia Sr. Solutions Architect/Technical

More information

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev. Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of

More information

HARTING Ha-VIS Management Software

HARTING Ha-VIS Management Software HARTING Ha-VIS Management Software People Power Partnership HARTING Management Software Network Management Automation IT - with mcon Switches from HARTING With the Ha-VIS mcon families, HARTING has expanded

More information

LGS-2624C LGS-2816C-RPS

LGS-2624C LGS-2816C-RPS Lantech Communication Global, Inc. Pioneering Industrial and IP Networks White Paper Static Multicast Forwarding Central Management Switches LGS-2624C LGS-2816C-RPS Abstract: In the case of industrial

More information

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,

More information

Network setup and troubleshooting

Network setup and troubleshooting ACTi Knowledge Base Category: Troubleshooting Note Sub-category: Network Model: All Firmware: All Software: NVR Author: Jane.Chen Published: 2009/12/21 Reviewed: 2010/10/11 Network setup and troubleshooting

More information

Introduction. What is a Remote Console? What is the Server Service? A Remote Control Enabled (RCE) Console

Introduction. What is a Remote Console? What is the Server Service? A Remote Control Enabled (RCE) Console Contents Introduction... 3 What is a Remote Console?... 3 What is the Server Service?... 3 A Remote Control Enabled (RCE) Console... 3 Differences Between the Server Service and an RCE Console... 4 Configuring

More information

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities) QoS Switching H. T. Kung Division of Engineering and Applied Sciences Harvard University November 4, 1998 1of40 Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p

More information

Lab VI Capturing and monitoring the network traffic

Lab VI Capturing and monitoring the network traffic Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)

More information

IEC 61850: Communication Networks and Systems in Substations

IEC 61850: Communication Networks and Systems in Substations IEC 61850: Communication Networks and Systems in Substations Sistemi e strumenti per l'automazione, A. Flammini, AA2011-2012 Background I: Power Grid Sistemi e strumenti per l'automazione A. Flammini,

More information

B&B ELECTRONICS WHITE PAPER. Managed Ethernet Switches - Key Features for a Powerful Industrial Network

B&B ELECTRONICS WHITE PAPER. Managed Ethernet Switches - Key Features for a Powerful Industrial Network Determinism is the assurance that control/communication will occur in a set period of time. Ethernet was nondeterministic at first, and not widely used for industrial purposes. Ethernet switches designed

More information

Chapter 4 Customizing Your Network Settings

Chapter 4 Customizing Your Network Settings Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the RangeMax Dual Band Wireless-N Router WNDR3300, including LAN, WAN, and routing settings.

More information

Hands On Activities: TCP/IP Network Monitoring and Management

Hands On Activities: TCP/IP Network Monitoring and Management Hands On Activities: TCP/IP Network Monitoring and Management 1. TCP/IP Network Management Tasks TCP/IP network management tasks include Examine your physical and IP network address Traffic monitoring

More information

Secure Networks for Process Control

Secure Networks for Process Control Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

5 IPTV MONITORING BEST PRACTICES

5 IPTV MONITORING BEST PRACTICES 5 IPTV MONITORING BEST PRACTICES Chances are you ve seen Internet Protocol TV (IPTV) but didn t know it. Different types of IPTV are popping up in our daily lives ranging from Video-On-Demand to being

More information

How To Use A Help Desk With A Pnettrap On A Pc Or Mac Or Mac (For A Laptop)

How To Use A Help Desk With A Pnettrap On A Pc Or Mac Or Mac (For A Laptop) Integration Guide Help Desk Authority, PacketTrap and sl360 1.800.424.9411 www.scriptlogic.com 2010 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo, Help Desk Authority and

More information

An enhanced communication scheme for 4DIAC

An enhanced communication scheme for 4DIAC An enhanced communication scheme for 4DIAC Georgios Sfiris, Researcher Georgios Hassapis, Supervisor Professor Laboratory of Computer System Architecture Department of Electrical and Computer Engineering

More information

Substation Communications Design - Legacy to IEC 61850

Substation Communications Design - Legacy to IEC 61850 Substation Communications Design - Legacy to IEC 61850 Part 2/3: Practical Application Tim Wallaert Chris Jenkins Your Utility Customer Tells You We re doing our first IEC 61850 substation and we want

More information

Are Duplicate Packets Interfering with Network Monitoring? White Paper

Are Duplicate Packets Interfering with Network Monitoring? White Paper Are Duplicate Packets Interfering with Network Monitoring? White Paper A network monitoring switch allows IT teams to simultaneously connect a wide array of monitoring tools. The best-in-class network

More information

BioStar Config Guide V1.0

BioStar Config Guide V1.0 BioStar Config Guide V1.0 Suprema Inc. 16F Parkview Tower 6 Jeongja, Bundang Seongnam 463-863 Korea www.supremainc.com Last edited: 27 December 2011 This document is copyright 27 December 2011 by Suprema

More information

Customer Tips. Network Packet Analyzer Tips. for the user. Purpose. Introduction to Packet Capture. Xerox Multifunction Devices.

Customer Tips. Network Packet Analyzer Tips. for the user. Purpose. Introduction to Packet Capture. Xerox Multifunction Devices. Xerox Multifunction Devices Customer Tips January 15, 2004 This document applies to these Xerox products: Network Packet Analyzer Tips Purpose This document contains a procedure that Xerox customers can

More information

REQUIREMENTS FOR AUTOMATED FAULT AND DISTURBANCE DATA ANALYSIS

REQUIREMENTS FOR AUTOMATED FAULT AND DISTURBANCE DATA ANALYSIS REQUIREMENTS FOR AUTOMATED FAULT AND DISTURBANCE DATA ANALYSIS Mladen Kezunovic *, Texas A&M University Tomo Popovic, Test Laboratories International, Inc. Donald R. Sevcik, CenterPoint Energy Aniruddha

More information

Building Secure Network Infrastructure For LANs

Building Secure Network Infrastructure For LANs Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives

More information

Lab Module 3 Network Protocol Analysis with Wireshark

Lab Module 3 Network Protocol Analysis with Wireshark Pacific Northwest National Laboratory Lab Module 3 Network Protocol Analysis with Wireshark NATO ASI on Energy Infrastructure Security October 2015 PNNL-##### Lab Module 3 Network Protocol Analysis with

More information

Extending Network Visibility by Leveraging NetFlow and sflow Technologies

Extending Network Visibility by Leveraging NetFlow and sflow Technologies Extending Network Visibility by Leveraging and sflow Technologies This paper shows how a network analyzer that can leverage and sflow technologies can provide extended visibility into enterprise networks

More information

IntraVUE Diagnostics. Device Failure

IntraVUE Diagnostics. Device Failure IntraVUE provides a method to record and capture the issues that occur in the Ethernet networks being used for automation applications. Automation networks are susceptible to subtle disturbances due to

More information

Introduction to Wireshark Network Analysis

Introduction to Wireshark Network Analysis Introduction to Wireshark Network Analysis Page 2 of 24 Table of Contents INTRODUCTION 4 Overview 4 CAPTURING LIVE DATA 5 Preface 6 Capture Interfaces 6 Capture Options 6 Performing the Capture 8 ANALYZING

More information

Integration Guide. Help Desk Authority, Perspective and sl360. 1.800.424.9411 www.scriptlogic.com

Integration Guide. Help Desk Authority, Perspective and sl360. 1.800.424.9411 www.scriptlogic.com Integration Guide Help Desk Authority, Perspective and sl360 1.800.424.9411 www.scriptlogic.com Table of Contents Introduction... 3 Product Overview... 3 Benefits of Product Integration... 3 Advanced Help

More information

Product Summary Report

Product Summary Report Product Summary Report March 2008 S Report 080330 olera Networks engaged Miercom, to independently evaluate the performance of its Model DS5100 deep packet capture and storage appliance. Testing was conducted

More information

Diagnosing the cause of poor application performance

Diagnosing the cause of poor application performance Diagnosing the cause of poor application performance When it comes to troubleshooting application performance issues, there are two steps you can take to make diagnosis easier, faster and more accurate.

More information

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:

More information

Using ODVA Common Industrial Protocol to Enhance Performance White Paper

Using ODVA Common Industrial Protocol to Enhance Performance White Paper Monitor & Control Multiple Groups Using ODVA Common Industrial Protocol to Enhance Performance White Paper Monitor & Control Multiple Groups Using ODVA Common Industrial Protocol to Enhance Performance

More information

Industrial Requirements for a Converged Network

Industrial Requirements for a Converged Network Industrial Requirements for a Converged Network IEEE 802.3 SG DMLT Phoenix (AZ) Albert Tretter, Siemens AG Ethernet captures more and more Applications Traditional Markets - Industrial Automation - Factory

More information

Network Master Gigabit Ethernet Tester. Network Master Gigabit Ethernet Tester. Introduction. By Ole Sørensen Product manager.

Network Master Gigabit Ethernet Tester. Network Master Gigabit Ethernet Tester. Introduction. By Ole Sørensen Product manager. Network Master Gigabit Ethernet Tester Introduction By Ole Sørensen Product manager Slide 1 Important Technology Background The market for GigE Installation and Maintenance testers is growing 20% annually.

More information

BiPAC 7800NL. Wireless-N ADSL2+ Firewall Router. Quick Start Guide

BiPAC 7800NL. Wireless-N ADSL2+ Firewall Router. Quick Start Guide BiPAC 7800NL Wireless-N ADSL2+ Firewall Router Quick Start Guide BiPAC 7800NL Wireless-N ADSL2+ Firewall Router Billion BiPAC 7800NL Wireless-N ADSL2+ Firewall Router PLEASE READ THE QUICK START GUIDE

More information

What is LOG Storm and what is it useful for?

What is LOG Storm and what is it useful for? What is LOG Storm and what is it useful for? LOG Storm is a high-speed digital data logger used for recording and analyzing the activity from embedded electronic systems digital bus and data lines. It

More information

Sample Configuration Using the ip nat outside source static

Sample Configuration Using the ip nat outside source static Sample Configuration Using the ip nat outside source static Table of Contents Sample Configuration Using the ip nat outside source static Command...1 Introduction...1 Before You Begin...1 Conventions...1

More information

Observer Analysis Advantages

Observer Analysis Advantages In-Depth Analysis for Gigabit and 10 Gb Networks For enterprise management, gigabit and 10 Gb Ethernet networks mean high-speed communication, on-demand systems, and improved business functions. For enterprise

More information

Virtual Private LAN Service (VPLS) Conformance and Performance Testing Sample Test Plans

Virtual Private LAN Service (VPLS) Conformance and Performance Testing Sample Test Plans Virtual Private LAN Service (VPLS) Conformance and Performance Testing Sample Test Plans Contents Overview...3 1. VPLS Traffic CoS Test...3 2. VPLS VSI Isolation Test...5 3. VPLS MAC Address Purge Test...7

More information

Business case for VoIP Readiness Network Assessment

Business case for VoIP Readiness Network Assessment Business case for VoIP Readiness Network Assessment Table of contents Overview... 2 Different approaches to pre-deployment assessment:.......... 2 Other considerations for VoIP pre-deployment... 3 The

More information

EMR-5000. Software-Version: 2.5.b. Protocol Implementation Extra Information for Testing (PIXIT) UCA International Users Group Testing Sub Committee

EMR-5000. Software-Version: 2.5.b. Protocol Implementation Extra Information for Testing (PIXIT) UCA International Users Group Testing Sub Committee EMR-5000 Software-Version: 2.5.b Protocol Implementation Extra Information for Testing (PIXIT) UCA International Users Group Testing Sub Committee Contents of this document This document is applicable

More information

TMA Management Suite. For EAD and TDM products. ABOUT OneAccess. Value-Adding Software Licenses TMA

TMA Management Suite. For EAD and TDM products. ABOUT OneAccess. Value-Adding Software Licenses TMA For EAD and TDM products Value-Adding Software Licenses ABOUT OneAccess OneAccess designs and develops a range of world-class multiservice routers for over 125 global service provider customers including

More information

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent? What is Network Agent? The Websense Network Agent software component uses sniffer technology to monitor all of the internet traffic on the network machines that you assign to it. Network Agent filters

More information

Chapter 5 Customizing Your Network Settings

Chapter 5 Customizing Your Network Settings Chapter 5 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the RangeMax NEXT Wireless Router WNR834B, including LAN, WAN, and routing settings.

More information

Wireless Technologies for the 450 MHz band

Wireless Technologies for the 450 MHz band Wireless Technologies for the 450 MHz band By CDG 450 Connectivity Special Interest Group (450 SIG) September 2013 1. Introduction Fast uptake of Machine- to Machine (M2M) applications and an installed

More information

IP Office Technical Tip

IP Office Technical Tip IP Office Technical Tip Tip no: 195 Release Date: October 26, 2007 Region: GLOBAL Using Packet Capture Software To Verify IP Network VoIP Quality Of Service (QoS) Operation Converged networks can experience

More information

Configuring for Integra Telecom SIP Solutions

Configuring for Integra Telecom SIP Solutions February 2013 Configuring for Integra Telecom SIP Solutions Section Title Page Background 1 Table 1 Software & Firmware Versions Tested 1 Figure 1 Generic IP PBX Test Configuration (with Transparent SIP

More information

VoIP 110R/200R/422R/404R/440R. User s Guide

VoIP 110R/200R/422R/404R/440R. User s Guide VoIP 110R/200R/422R/404R/440R User s Guide Trademarks Contents are subject to revise without prior notice. All trademarks belong to their respective owners. FCC Warning This equipment has been tested and

More information

LEASED-LINE REPLACEMENT

LEASED-LINE REPLACEMENT WHITE PAPER LEASED-LINE REPLACEMENT 10 Things to Consider Before Choosing Your IP Gateway WWW.OMNITRONICSWORLD.COM Outline Leased-lines are still being used in many parts of the world to carry voice communications

More information

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests Rohde & Schwarz R&S Encryption Device Functionality & Performance Tests Introduction Following to our test of the Rohde & Schwarz ETH encryption device in April 28 the European Advanced Networking Test

More information