Cisco Secure Wireless Plant: Security and Quality of Service for Industrial Environments
|
|
|
- Byron Miles
- 10 years ago
- Views:
Transcription
1 Cisco Secure Wireless Plant: Security and Quality of Service for Industrial Environments Today s process industries, from oil and gas producers and mining companies to manufacturers of chemicals, foods, and beverages, are exploring new ways to improve production processes and automate them to raise plant efficiency. By relying on automation, organizations can improve profit margins, enhance monitoring and visibility throughout the facility, achieve compliance with safety standards, and make workers more productive Though each has its own challenges and business drivers, industrialists also have many needs and trends in common. These include: Gathering more information from the production process to improve safety, asset utilization, and production yield Distributing information in real time to a globally dispersed workforce and field personnel throughout the plant site Integrating data from production systems to business applications and partners Reducing capital and operating expenses of control systems and IT systems Improving safety for workers and security for information Meeting increasing regulatory requirements Improving connectivity between systems and between personnel Improving integration of production systems and IT However, many companies cannot meet these goals. A significant percentage of organizations still rely on manual methods to oversee production stages, verify the status and condition of facilities, check and maintain equipment, and assemble records for audits. They are falling behind the competition as highly paid personnel spend their time and expertise on basic data collection to keep the plant running. Many firms have taken a step forward from the manual approach, relying on wired computer networks and control systems to support basic automated monitoring of the physical plant. However, installing wired networks in industrial environments can be prohibitively expensive, limiting the amount of information that is gathered. More data remains to be harvested. To improve the functionality and efficiency of industrial monitoring and control systems, therefore, process industries are looking toward wireless sensor networks (WSNs) to provide detailed, accurate data collection from previously hard-to-reach, unaffordable areas. In plants still relying on manual oversight, a wireless sensor network may be installed for a fraction of the cost (sometimes up to 90 percent less) of a wired network, which can cost up to US$3000 per foot of cable to install in industrial environments. For plants with a wired control system network already in place, the addition of wireless sensors, commonly called wireless field devices, significantly enhances data collection, expands security perimeters, and brings the organization to a new level of efficiency and productivity. Cisco and Dust Networks are leading this trend with the Secure Wireless Plant solution, which combines industry-leading networking and field device development to deliver a comprehensive wireless solution for the industrial environment. This powerful technology offers the power to 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 10
2 oversee, remotely maintain, accurately assess, and fully protect every aspect of the facility, its data, and its operation. Based on this solution, operations managers and IT personnel are positioned to enter a new phase of their business, operating with more confidence in their data and able to rely more completely on plant equipment and processes. What is a Wireless Sensor Network? Developed during the 1990s, secured WSNs are increasingly being used for a variety of commercial applications, such as monitoring machinery, automatic temperature regulation in buildings and plants, and monitoring of industrial environments such as oil pipelines or storage areas for chemicals. WSNs can also be used to watch for physical attacks on sensitive tanks, buildings, or holding areas, or for equipment malfunctions caused by an Internet-based attack or operator error. Installed at a critical location, such as on a water pump at a water treatment plant, each field device forms part of a mesh network, acting as both a sensor (or node) and a relay device (or router) to exchange data in brief, coordinated radio transmissions. Each node joins the network to forward data collected by its own sensor or others nearby. The mesh requires little power because each brief transmission travels only a short distance to reach nearby nodes. In practice, this means that batteries can last for five to ten years sometimes even outlasting the usefulness of the sensor. The mesh, in turn, communicates with a wireless LAN (WLAN) that sends data to the control room for monitoring and analysis. A mesh network is self-organizing and self-healing, which minimizes maintenance costs and helps to ensure constant availability of information. If one node goes down, the system finds an alternative path for sensor traffic, looking across all the available radio frequencies and enhancing the signal through a spread-spectrum coding technique known as channel hopping. The more devices are attached, the more efficient and resilient the network becomes. Cisco s powerful networking infrastructure provides the foundation for integrating Dust s sensor networking technology with industrial wired networks, legacy and proprietary systems, and standard Ethernet and non-ethernet technologies. Based on new specifications for industrial wireless communications, the Secure Wireless Plant solution offers a secured, cost-effective, industrial-grade network capable of supporting the process industry facility s sensor needs. Sensor Networking Standards Industrial systems have relied for many years on the Highway Addressable Remote Transducer (HART) Communication Protocol for their control system networks. The HART standard is an early implementation of the wired industrial automation protocol fieldbus, and it is more widely used than any other industrial specification to date. The HART 7 specification, released in September 2007, includes a section for wireless defined as the WirelessHART protocol. Additional support for WirelessHART is planned for the ISA SP standard, which in its current draft form provides for multiple protocols utilized by a single wireless infrastructure. The WirelessHART protocol has opened the door to a broad implementation of wireless within industrial environments. It allows organizations to take advantage of full backward compatibility with existing instrumentation and host systems, benefiting from the easy deployment and cost savings of wireless networking while protecting existing investments in HART-enabled devices, tools, training, applications, and procedures Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 10
3 Highly Available Sensor Networking The Secure Wireless Plant solution supports WirelessHART-enabled devices based on the timesynchronized mesh networking technologies and protocols pioneered by Dust Networks. WirelessHART devices remain synchronized with each other and communicate in dynamic timeslots, offering redundancy and failover to ensure high reliability even in challenging radio environments. With radios only turned on for scheduled periods, WirelessHART devices use frequency hopping to avoid interference: Data packets traveling between devices are sent on different radio channels depending on the time of transmission or the level of interference seen on a particular channel. Time-Synchronized Communication In a WirelessHART system, all devices share a common sense of time so that they transmit, listen, or sleep during communication windows called timeslots. Timeslots are measured in milliseconds, and in typical applications this leads to a duty cycle of less than 1 percent for all nodes in the network, including those relaying messages for neighboring nodes. Thus WirelessHART systems are ultra-low-power networking solutions, greatly extending battery lifespan. A common sense of time enables many network advantages: Bandwidth can be preallocated to ensure extremely reliable transmission and zero selfinterference. Transmitting nodes can effectively change frequencies on each transmission and the receiving node can keep in lockstep. Bandwidth can be predictably and methodically added or removed at will to accommodate traffic spikes. Frequency Hopping In addition to enabling wireless media by slicing time, WirelessHART also slices across frequency. This provides robust fault tolerance in the face of common RF interference and a great increase in effective bandwidth. Commonly referred to as frequency hopping spread spectrum (FHSS), hopping across multiple frequencies is a proven method for sidestepping interference and overcoming RF challenges with agility rather than sheer power. Another technique used in WirelessHART, direct sequence spread spectrum (DSSS), provides a few decibels of coding gain and improvement in multipath fading. By combining FHSS and DSSS, WirelessHART provides both interference rejection (FHSS) and a coding gain (DSSS). When a new WirelessHART device joins the network, it receives synchronization information and a frequency hopping sequence from each of its parent nodes. In this way, each pairwise connection is ensured to be on a different channel during each timeslot, enabling broad use of the available band in any one location. Automatic Node Joining and Network Formation A key attribute of WirelessHART is its ability to self-organize a mesh network. Every WirelessHART device has the intelligence to discover its neighbors, measure the RF signal strength of these connections, acquire synchronization and frequency hopping information, and establish communications. The network ID, which is included in all communications, allows multiple WirelessHART-based networks to operate in the same radio space without the risk of sharing data or misrouting information. If a device attempts to join a network and detects devices with a network ID not 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 10
4 matching its own, it continues unsynchronized listening until it hears a device with the right ID. Network integrity is also protected by a join key that encrypts a request to join the network. If a device has the wrong join key, its join request is ignored and it reverts to unsynchronized listening. Fully Redundant Mesh Routing Every WirelessHART device also has the ability to route traffic from neighbors as dictated by requirements of RF connectivity and network performance. A network is simply a set of devices that share the same network ID and password and are synchronized with each other. A gateway node serves as the timing master and relays configuration information to the other network nodes. It also serves as the point through which the wireless data from the WSN interfaces with the Cisco Wi-Fi mesh backbone (see Figure 1). Fully redundant mesh routing is essential for WSNs in industrial settings where RF conditions change dramatically over time due to weather, new or unknown RF systems, and moving equipment and plant workers. The router nodes themselves do not use significantly more battery power than nodes that are only sensing. Routing algorithms are also used to dynamically balance the load across the network, further improving battery life. In some cases, field devices can use power scavenging technology, such as solar or vibration scavenging. Security and Quality of Service Because there is no need for a physical connection, wireless networking can sometimes be perceived as being less safe than wired networks. In particular, some plant managers and administrators are concerned about the possibility of jamming, malicious eavesdropping, and performance problems. Security Wireless sensor networks deployed in a mesh configuration can be among the most secure networks available equivalent to a wired system. The frequency-hopping protocol of WSNs has proven an efficient means of coordinating node communications: It has been demonstrated that more than 1000 WirelessHART devices can operate in the same radio space without affecting endto-end reliability. All measurement and control traffic in the network is protected by end-to-end encryption, message integrity checking, and authentication as well as procedures for devices joining the WSN, key establishment, and key exchange. It is true that traditional point-to-point wireless networks can be vulnerable to industrial issues of RF interference, changes in the position of the device, reconfiguration of the environment, or simple node failure due to damage or a power surge. However, in a mesh architecture, the network isolates any individual points of failure and eliminates or mitigates their impact, allowing the network as a whole to maintain reliability in spite of local failures. The security features provide: Confidentiality: End-to-end data encryption using 128-bit AES encryption algorithm is employed in the packets to prevent sensitive data from being intercepted. Data integrity: Data transmitted within the packets is protected by message integrity codes to ensure that it has not been tampered with and that it originated from a known source. Replay protection: Replay attacks are prevented on both the link layer and the network layer by using nonrepeating replay counters. Denial-of-service (DoS) protection: DoS attacks are mitigated with a combination of all of the above. In addition, the slotted channel hopping protocol diminishes the risks of a DoS attack by using the entire radio space Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 10
5 Access control: The source address of a WSN packet is verified with a secure key to prevent device spoofing. Compartmental security: Loss of any one piece of data does not compromise the entire network. In industrial environments, the physical strength of the equipment is also important. High-quality mesh network equipment is based on ruggedized enclosures that protect against harsh industrial conditions as well as rain, lightning, wind, and vibration from storms or road traffic. A well-designed wireless mesh architecture transparently adapts to changing environments, allowing long-term operation with little or no maintenance. Wireless sensor networking technology is able to provide extremely high reliability and predictability for up to years at a time, without constant tuning by technicians. In fact, many of the older control network technologies that plants still rely on, such as distributed control systems (DCSs), are far more vulnerable to attack and poor service performance. Quality of Service Plant administrators are also looking for a high quality of service (QoS), the ability of a network to provide outstanding performance on selected real-time or critical network traffic. QoS is the measure of transmission quality and service availability of a network. The transmission quality of the network is determined by transmission latency, jitter, and loss. QoS is based on the concept of differentiated services, where data packets are marked with different priority levels corresponding to the type of service. The ISA 100 committee has defined six different classes of wireless automation: Class 0: Includes safety-related actions that are critical to personnel and plant, such as safety-interlock, emergency shutdown, and fire control. Class 1: Motor and axis control as well as primary flow and pressure control. Class 2: Longer time constants, with timeliness of communications measured in seconds to minutes. Class 3: Includes actions where an operator, rather than a machine, closes the loop between input and output. Such actions may include taking a unit offline when conditions so indicate. Class 4: Monitoring with short-term operational consequences, including high-limit and lowlimit alarms and other information that might instigate further checking or dispatch of a maintenance technician. Class 5: Monitoring without immediate operational consequences. Some, such as sequence-of-events logs, require high reliability; others, like reports of slowly changing information of low economic value, need not be so reliable, as loss of a few consecutive samples may be unimportant. With QoS, plant administrators manage bandwidth more efficiently across the network based on these class definitions, providing enhanced and predictable network service by supporting dedicated bandwidth for critical users and applications, controlling jitter and latency, and minimizing congestion Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 10
6 The Cisco Approach to WSNs The Cisco Secure Wireless Plant solution is built upon the sensor networking technologies of Dust Networks and the family of products that make up the Cisco Unified Wireless Network Architecture. This powerful infrastructure delivers scalable, manageable, and secure WLANs to support meshed sensor networks. It includes RF capabilities with transparent connection through Cisco s wireless networks to the control room and corporate IT systems. The Secure Wireless Plant solution provides industrial organizations with the same level of security, scalability, reliability, ease of deployment, and management for WLANs that they already expect from their wired networks. (See Figure 1.) Figure 1. Cisco Secure Wireless Plant Solution This capability is built upon the Cisco Aironet 1500 Series of lightweight outdoor mesh access points, which connects field devices into a single network and provide automated capabilities to help reduce deployment and maintenance costs. These include intelligent routing, which allows the access point to sense the best possible path for each packet of data, and optimizing the network and choosing new routes or resetting if exposed to radio interference or outages. Cisco Radio Resource Management (RRM) software enables access points to monitor each environment and adjust channels and frequencies in real time to avoid interference from other devices. The access points in turn are managed and monitored by the Cisco Wireless Control System (WCS), a centralized platform for WLAN planning, configuration, and management. Cisco WCS allows IT managers to design, control, and monitor enterprise wireless networks from a single location, simplifying operations. It oversees a series of WLAN controllers, which are responsible for networkwide wireless functions such as security policies, intrusion prevention, RF management, QoS, and mobility. Cisco WCS itself facilitates load balancing and traffic management, policy provisioning, network optimization, troubleshooting, user tracking, and monitoring for end-to-end security Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 10
7 With this flexible infrastructure, the embedded intelligence in each device ensures that networks can be built very easily, without even the need for a site survey. This marked departure from the static infrastructure of the traditional point-to-point wireless network has enabled significant advances in ease of use and network flexibility. The Cisco network gateway is simply connected through a wired Ethernet connection directly to the Cisco network switch. Zero-Touch Configuration and Deployment The Dust sensor network can be easily deployed based on the Lightweight Access Point Protocol (LWAPP), which enables each access point to automatically discover its controller and download the correct configuration and software for its role in the wireless mesh. The intelligent sensors in turn discover the access points as they are deployed. Once the system is up and running, having better visibility and control of the RF environment reduces operational costs for operations and IT administrators. Up to tens of thousands of indoor and outdoor lightweight access points are automatically managed by the WLAN controllers, which are in turn centrally managed by Cisco WCS. The intuitive user interface of Cisco WCS allows personnel to easily configure, monitor, and troubleshoot the network with minimal training. The Self-Configuring and Self-Healing Network The Cisco Aironet 1500 Series access points can be installed anywhere power is available, without the need for a network connection. Intelligent wireless routing based on LWAPP allows a remote access point to dynamically optimize the best route to the connected network within the mesh, providing resiliency against interference and helping ensure high network capacity. LWAPP also performs a smoothing function to signal condition information, ensuring that the ephemeral nature of RF environments does not affect network stability. Deployment and management costs for the access points are reduced through support of zerotouch configuration deployments and through the ability of the access points to bring themselves back to operational status (self-heal) in response to interference or outages. Robust Embedded Security Security of data transmitted over the sensor network is enforced by requiring that all messages be encrypted, authenticated, and checked for integrity. This is enabled by Dust s end-to-end encryption, message integrity checking, and authentication, as well as procedures for devices accessing the network, key establishment, and key exchange. Within the wireless network, Cisco provides multiple additional layers of protection, including: RF security: Detects and avoids i radio frequency interference and controls unwanted signal propagation. WLAN intrusion prevention and location: Detects and locates rogue access points or field devices, as well as potential wireless threats such as an attempt to eavesdrop, which helps IT administrators to quickly assess the threat level and take immediate action. Replay attacks are prevented on both the link layer and the network layer by using non-repeating replay counters. The slotted channel hopping protocol diminishes the risks of a DoS attack by using the entire radio space. Network Access Control (NAC): Enforces policies pertaining to access point configuration and behavior to help ensure that only recognized sensors can gain access to the network. Secure mobility: Maintains the highest level of security in mobile environments with Cisco Proactive Key Caching, an extension to the i standard and precursor to the r 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 7 of 10
8 standard. Certificates: Use of X.509 certificates and AES encryption for LWAPP transactions. This X.509 and AES encryption is embedded into the wireless mesh solution with each LWAPP transaction and all encrypted traffic. Encryption: CCM mode is used in conjunction with the AES-128 cipher to provide authentication and encryption on backhaul links. Data integrity: Data transmitted within the packets is protected by message integrity codes to ensure that it has not been tampered with and that it originated from a known source. Segmentation: Supports creation of virtual LANs (VLANs) that protect sensor networks by separating them and their traffic from other company networks (also known as flow isolation). In addition, identity-based networking enables individualized security policies for sensors with different access rights, device formats, and application requirements. Security policies include: Layer 2 security: 802.1X (PEAP, LEAP, TTLS), WPA, i (WPA2), w Layer 3 (and above) security: Integration with wired intrusion prevention systems (IPSs) Access control lists: IP restrictions, protocol types, ports, and differentiated services code point values Authentication, authorization, and accounting/radius: User session policies and rights management Quality of Service In the Cisco Secure Wireless Plant solution, the QoS standard for the sensor networks is based on e-2005, an approved amendment to the IEE standard. This specification defines a set of QoS enhancement for WLAN applications through modifications of the MAC layer, allowing QoS to be configured with great precision. QoS-enabled access points have the ability to request specific transmission parameters (such as data rate or jitter) that allow more complex applications to work more effectively on the Wi-Fi network. Based on this standard, the capabilities of the wireless network for providing a high-quality data stream are enhanced through a new coordination function, the Hybrid Coordination Function (HCF). This provides two methods of channel access, both of which define traffic classes to help differentiate high-priority and low-priority traffic. Robust Software The Cisco mesh solution software provides robust, optimal parent selection and fast convergence to help nodes organize themselves quickly and support better mesh network management. It includes mechanisms to guard against stranded access points, as well as a software-based recovery mechanism so that engineers or administrators do not have to dispatch a technician to the access points any time one goes down. The network automatically recovers from misconfigurations, such as a wrong IP address, DHCP server errors, bridge group name typos, or misprovisioning of the network. In addition, Cisco s exclusion list algorithm allows a child node to intelligently exclude a parent node in case of a routing problem, and only return to the relationship based on the parent node s subsequent behavior. Scalability The Cisco mesh architecture makes it easy to scale coverage as capacity needs dictate, including increasing access point density; adding wired connections, controllers, and radios; and using dual 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 8 of 10
9 high-powered, high-sensitive radios and a selection of high-gain antennas. The Cisco Aironet 1500 Series mesh access points can scale to 24 controllers, each with up to 16 Multiple Beacon Service Set Identifiers (MBSSIDs) that support segmentation of the wireless sensor network, and 256 virtual local area networks (VLANs), while each controller can support more than 100 access points. Capacity in a mesh network can be easily increased by adding mesh access points at the edge of the network or configuring more rooftop access points in the network. Power Management The Dust sensors in the Cisco Secure Wireless Plant solution are tailored for use in batterypowered and energy-scavenging wireless devices for applications that demand proven performance and scalability. Based on an IEEE compliant design and power amplifier, each enables up to a decade of battery life on a pair of AAA batteries. All sensors function as both battery-powered routers and nodes, enabling a full mesh topology that provides more redundant routes and higher performance. Integrated radio circuitry components eliminate the burden of complex RF design, requiring only a simple antenna connector for wireless connectivity. Coexistence with Other Wireless Networks Wireless networks need to be designed to coexist with other wireless networks in the vicinity. Since the 2.4 GHz band is a shared spectrum, coexistence helps to ensure a high standard of performance. As defined by the IEEE, coexistence is the ability of one system to perform a task in a given shared environment, where other systems have an ability to perform their tasks and may or may not be using the same set of rules. Collisions and coexistence issues can happen when two or more packets overlap in both time and frequency with sufficient energy to interfere with one another. The Cisco Secure Wireless Plant solution addresses this issue with support for: The density enabled by the Cisco mesh network architecture, which allows more than 1000 WirelessHART devices to operate within the same radio space. Time-division multiplexing (TDM), a synchronized system that reserves time slots for a specific communication link. This technique is supported by the ISA and WirelessHART protocols. Code-division multiplexing, which utilizes single code systems such as DSSS to operate in the same frequency region with minimal or no interference. Frequency diversity, in which wireless devices dynamically choose different channels of operation, including Bluetooth, DSSS, or non-periodical systems such as ZigBee. The ability to control the power transmissions of sensors in areas where they might cause interference with neighboring devices. Benefits of the Cisco Secure Wireless Plant Solution The Cisco Secure Wireless Plant solution provides a compelling set of benefits to industrial managers, administrators, and operations personnel. Wireless sensor networks overcome the challenges of traditional point-to-point wireless networks with a rugged design and adaptability that makes them an appropriate control network technology for industrial environments. This open-standards solution helps industrial facilities function more efficiently and effectively. Operations engineers and plant managers gain: Additional plant and process information, adding operational insight to improve production 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 9 of 10
10 and maintenance management Improved workforce productivity Better business and plant management Advanced services to help tailor solutions to specific plant needs The self-organizing mesh network fulfills the requirements of industrial environments for highly secure, reliable data collection and plant monitoring that is resistant to interference, damage, and hacking and that coexists effectively with other wireless networks. Its powerful management system allows IT managers to design, control, and monitor wireless sensor networks from a centralized location, thus simplifying operations, reducing the total cost of ownership and achieving a better return on investment. Finally, this sensor network solution saves money by eliminating the need for trenching and cabling in remote locations. By deploying the Cisco Unified Wireless Network as the Wi-Fi platform for the wireless sensor network foundation, process industry managers also can take advantage of other capabilities that can be cost-effectively added to the same network, allowing them to improve workforce productivity through remote and mobile operations and maintenance, automated workflow management, and mobile worker communications by phone or handheld device. They also gain the option of adding business and plant management applications including security, video surveillance, and people and asset tracking. To improve the functionality and efficiency of industrial monitoring and control systems, Cisco and Dust Networks give today s process industries the power to remotely maintain, accurately assess, and fully protect their facility, data, and operation with cost-effective wireless sensor networks. By providing the networking infrastructure for multiple wireless capabilities, these two technology leaders not only help industrial organizations address today s needs, but lay the foundation for tomorrow s growth. Printed in USA c / Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 10 of 10
Cisco Outdoor Wireless Network Serves Up Automatic Meter Reading
Cisco Outdoor Wireless Network Serves Up Automatic Meter Reading Summary Cisco outdoor wireless solutions make it practical to deploy and manage Wi-Fi on a citywide scale. This application note describes
Getting the Most Out of Your WirelessHART System
Getting the Most Out of Your WirelessHART System A White Paper presented by: Garrett Schmidt Wireless Product Manager Phoenix Contact Americas Business Unit P.O. Box 4100 Harrisburg, PA 17111-0100 Phone:
The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security
The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security The Cisco and Pelco Industrial Wireless Video Surveillance Solution
Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions
Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions EXECUTIVE SUMMARY Outdoor wireless networks are playing a vital role in helping municipalities deliver critical services to citizens.
Best Practices for Outdoor Wireless Security
Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged
Cisco Outdoor Wireless Mesh Enables Alternative Broadband Access
Cisco Outdoor Wireless Mesh Enables Alternative Broadband Access Cisco ServiceMesh defines a network design for service providers delivering valueadded municipal wireless services over a mesh network.
Why Migrate to the Cisco Unified Wireless Network?
Why Migrate to the Cisco Unified Wireless Network? Cisco is encouraging our customers to migrate to the Cisco Unified Wireless Network. This paper reviews the advantages of and reasons for migrating to
Cisco Aironet 1520 Series Lightweight Outdoor Access Points
. Data Sheet Cisco Aironet 1520 Series Lightweight Outdoor Access Points Outdoor Access Points Flexible, Secure Mesh Platform for Demanding Environments Self-configuring and self-healing mesh in response
How To Use The Cisco Aironet 1240G Series For A Wireless Network (Wired) And For A Wired Network (Wireless)
Cisco Aironet 1240G Series Access Point Cisco Aironet 1240G Series Access Points provide single-band 802.11g wireless connectivity for challenging RF environments such as factories, warehouses, and large
Cisco Wireless Control System (WCS)
Data Sheet Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform for wireless LAN planning, configuration,
Honeywell s OneWireless Network - The Building Blocks of Reliability Vibhor Tandon, Honeywell Process Solutions
White Paper Honeywell s OneWireless Network - The Building Blocks of Reliability Vibhor Tandon, Honeywell Process Solutions Executive Summary User expectations for network availability and tolerance for
Wireless Field Data Backhaul
October 2014 Page 1 Smart Wireless Gateway 1552WU An Emerson Smart Solution integrates WirelessHART data from remote areas of your plant. Scalable Reduced cost Safer deployment Secure and reliable communications
Portable Wireless Mesh Networks: Competitive Differentiation
Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.
Cisco Aironet 1524 Lightweight Outdoor Mesh Access Point
Cisco Aironet 1524 Lightweight Outdoor Mesh Access Point Product Overview The Cisco Aironet 1520 Series consists of the 1522 dual-radio mesh access point and the 1524 multi-radio mesh access point. Cisco
Cisco Aironet 1500 Series Lightweight Outdoor Mesh Access Points
Cisco Aironet 1500 Series Lightweight Outdoor Mesh Access Points Product Overview Cisco Aironet 1500 Series Lightweight Outdoor Mesh Access Points (Figure 1) enable costeffective, scalable, deployment
CISCO WIRELESS CONTROL SYSTEM (WCS)
CISCO WIRELESS CONTROL SYSTEM (WCS) Figure 1. Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform
Wireless Remote Video Monitoring
October 2014 Page 1 An Emerson Smart Solution brings visual information into your control room. Increase plant safety Comply with regulations Scalable Reduced cost Secure and reliable communications Full
Demystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
Intelligent WLAN Controller with Advanced Functions
Intelligent WLAN Controller with Advanced Functions Centralized WLAN management and auto provisioning Manages up to 512 APs with granular access control ZyMESH simplifies complex, inconvenient cabling
Cisco Aironet 1130G Series IEEE 802.11g Access Point
Cisco Aironet 1130G Series IEEE 802.11g Access Point Low-profile business-class access point with integrated antennas for easy deployment in offices and similar RF environments Product Overview The Cisco
Leveraging the Industrial Internet of Things (IOT) to Optimize Renewable Energy
Leveraging the Industrial Internet of Things (IOT) to Optimize Renewable Energy Creating More Efficient and Connected Wind Turbines By: Brian Roth, Product Marketing Engineer February 1, 2016 Leveraging
Wireless Remote Video Monitoring
February 2010 Page 1 An Emerson Smart Solution brings visual information into your control room. Increase Plant Safety Comply with Regulations Scalable Reduced Cost Secure and Reliable Communications Full
NX 9500 INTEGRATED SERVICES PLATFORM FOR THE PRIVATE CLOUD
CENTRALIZED SERVICE DELIVERY AND MANAGEMENT PLATFORM INTEGRATED SERVICES PLATFORM FOR THE PRIVATE CLOUD CONTROL YOUR ENTIRE NETWORK WITH A SINGLE, CENTRALIZED COMMAND CENTER Are you prepared to manage
Wireless Sensor Networks
Wireless Sensor Networks WIB Seminar 25 april 2007 John van Gorsel Product Manager Emerson Developed an Architecture to Extend Plant Visibility Wirelessly Plant Network Asset Tracking Security Wireless
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA
coursemonster.com/uk Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA View training dates» Overview This new market-leading course from us delivers the best in Wireless LAN training,
Wireless Process Control Network Architecture Overview
Wireless Process Control Network Architecture Overview Industrial Wireless Networks Gain Acceptance In Plant Floors By: Soroush Amidi, Product Manager and Alex Chernoguzov, Wireless Architect Wireless
Municipal Mesh Network Design
White Paper Municipal Mesh Network Design Author: Maen Artimy 1 Summary This document provides a wireless mesh network design for the downtown area of the Town of Wolfville, Nova Scotia. This design serves
Improving SCADA Operations Using Wireless Instrumentation
Improving SCADA Operations Using Wireless Instrumentation April 2010 / White paper by Hany Fouda Make the most of your energy Summary Executive Summary... p 2 Introduction... p 3 The Evolution of Wireless...
October 2014. Field Area Communication Networks for Digital Oil and Gas Fields
October 2014 Field Area Communication Networks for Digital Oil and Gas Fields The digital oil and gas field The challenge More wells More area More monitoring and control More information The old SCADA
Wireless Mobile Workforce
October 2014 Page 1 The DeltaV Remote Operator Station shown on the Panasonic Toughbook CF-19 (left) and Toughpad FZ-G1. Increased worker productivity and accuracy Mobile operations management Syncade
Industrial Communication. Securing Industrial Wireless
Industrial Communication Whitepaper Securing Industrial Wireless Contents Introduction... 3 Wireless Applications... 4 Potential Threats... 5 Denial of Service... 5 Eavesdropping... 5 Rogue Access Point...
Deploying a Secure Wireless VoIP Solution in Healthcare
Deploying a Secure Wireless VoIP Solution in Healthcare Situation Healthcare is a natural environment for wireless LAN solutions. With a large mobile population of doctors, nurses, physician s assistants
Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility
w h i t e p a p e r How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility So much is happening today to give you a chance to rethink your wireless architecture. Indeed, you
Wi-Fi Why Now? Exploring New Wireless Technologies for Industrial Applications
Wi-Fi Why Now? Exploring New Wireless Technologies for Industrial Applications Patrick McCurdy Product Marketing Manager Phoenix Contact Inc. [email protected] Ira Sharp Product Specialist Phoenix
Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
Boosting Business Mobility and Responsiveness with the Cisco Unified Wireless Network
Solution Overivew Boosting Business Mobility and Responsiveness with the Cisco Unified Wireless Network EXECUTIVE SUMMARY Today s businesses are turning to wireless networking to give employees immediate
ECB1220R. Wireless SOHO Router/Client Bridge
Wireless SOHO Router/Client Bridge 2.4GH 802.11 b/g 54Mbps PRODUCT DESCRIPTION ECB-1220R is a 2.4GHz 802.11b/g broadband Wi-Fi Router with advanced AP/Client Bridge/Repeater functions. So you could implement
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
An Overview of ZigBee Networks
An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...
Wireless Network Standard and Guidelines
Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining
Advanced Transportation Management Systems
Advanced Transportation Management Systems Summary Many Department of Transportation agencies are looking for cost-saving ways to improve the efficiencies of roadways without making actual surface improvements
Chapter 2 Configuring Your Wireless Network and Security Settings
Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless
John Ragan Director of Product Management. Billy Wise Communications Specialist
John Ragan Director of Product Management Billy Wise Communications Specialist Current Substation Communications Physical Infrastructure Twisted Pair, 4 Wire, COAX, Cat5 & Cat6, 9 Pin Serial Cable, Single-mode
Cloud-based Wireless LAN for Enterprise, SMB, IT Service Providers and Carriers. Product Highlights. Relay2 Enterprise Access Point RA100 Datasheet
Cloud-based Wireless LAN for Enterprise, SMB, IT Service Providers and Carriers The Relay2 Smart Access Point (RA100) is an enterprise-class access point designed for deployment in high-density environments
Applying Mesh Networking to Wireless Lighting Control
White Paper Applying Mesh Networking to Wireless Lighting Control www.daintree.net Abstract Recent advances in wireless communications standards and energy-efficient lighting equipment have made it possible
Wireless Technologies in Industrial Markets
SOLUTION PAPER Wireless Technologies in Industrial Markets An Examination of Mesh Technologies in Mining Executive Summary Consumers and enterprises around the globe use standards-based 802.11a/b/g/n WiFi
A NIMS Smart Practice
NIMS Smart Practice: 02-06 NIMS Integration Center, May 2006 www.fema.gov/emergency/nims 202-646-3850 A NIMS Smart Practice IN ALLEGANY COUNTY, MARYLAND: A MUNICIPAL WIRELESS NETWORK PROVIDING ENHANCED
Best Practices for Deploying Wireless LANs
Best Practices for Deploying Wireless LANs An overview of special considerations in WLAN implementations As wireless LANs (WLANs) continue to grow in popularity, particularly in enterprise networks, the
Cisco Adaptive Wireless Intrusion Prevention System
Cisco Adaptive Wireless Intrusion Prevention System Product Overview The wireless spectrum is a new frontier for many IT organizations. Like any other networking medium, the wireless spectrum must be properly
Wireless Technologies for Industrial Applications
Wireless Technologies for Industrial Applications Mats Andersson, CTO, connectblue Phone: +46 40 630 71 00 Email: [email protected] Web: www.connectblue.com Version 2.2 February 2013 Abstract
Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT)
Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Course Number: 642 845 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: Cisco CCNP Exam 642 845:
Deploy and Manage a Highly Scalable, Worry-Free WLAN
Deploy and Manage a Highly Scalable, Worry-Free WLAN Centralized WLAN management and auto provisioning Manages up to 512 APs with granular access control simplifies complex, inconvenient cabling Wi-Fi
WHITE PAPER. WEP Cloaking for Legacy Encryption Protection
WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area
Wireless Sensor Network for Performance Monitoring of Electrical Machine
International Journal of Reconfigurable and Embedded Systems (IJRES) Vol. 4, No. 1, March 2015, pp. 1~5 ISSN: 2089-4864 1 Wireless Sensor Network for Performance Monitoring of Electrical Machine Priyanka
Site Survey and RF Design Validation
CHAPTER 8 Site Survey Introduction In the realm of wireless networking, careful planning is essential to ensure that your wireless network performs in a manner that is consistent with Cisco s design and
DISASTER RECOVERY AND NETWORK REDUNDANCY WHITE PAPER
DISASTER RECOVERY AND NETWORK REDUNDANCY WHITE PAPER Disasters or accidents would cause great harm on network infrastructure. It is unavoidable and the operation of network would be hampered for a long
How to Choose the Right Industrial Firewall: The Top 7 Considerations. Li Peng Product Manager
How to Choose the Right Industrial Firewall: The Top 7 Considerations Li Peng Product Manager The right industrial firewall can strengthen the safety and reliability of control systems Central to industrial
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Motorola Wireless Broadband. Point-to-Multipoint (PMP) Access Network Solutions
Motorola Wireless Broadband Point-to-Multipoint (PMP) Access Network Solutions Motorola Technology is as Simple as it is Powerful Motorola Wireless Broadband Point-to-Multipoint (PMP) solutions are streamlined,
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Cisco Aironet Wireless Access Points
Cisco Aironet Wireless Access Points As WLAN deployments expand, security, scalability, reliability, ease of deployment, and management become increasingly important. Cisco provides a comprehensive line
WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION
WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION Ingenico is often asked: what are the differences between Bluetooth and Wi-Fi technologies, which is the best one,
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations
White paper. Cisco Compatible Extensions: Client Benefits on a Cisco WLAN
White paper Cisco Compatible Extensions: Client Benefits on a Cisco WLAN Overview Some of the most compelling benefits to working under a unified network architecture are the advanced networking capabilities
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
CDW PARTNER REVIEW GUIDE WIRELESS INFRASTRUCTURE
CDW PARTNER REVIEW GUIDE WIRELESS INFRASTRUCTURE DIRECTION OF THE WIRELESS MARKET AND THE INFRASTRUCTURE THAT SUPPORTS IT As mobile devices become more common in the workplace, IT managers must prepare
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
Application Note License-Exempt Gigabit Ethernet Microwave Radio Applications
Application Note License-Exempt Gigabit Ethernet Microwave Radio Applications Applicable Products: EX-5r GigE, EX-5r-c GigE Introduction The accelerated growth of fixed and mobile wireless broadband services
Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance
White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA
Ad hoc and Sensor Networks Chapter 1: Motivation & Applications
Ad hoc and Sensor Networks Chapter 1: Motivation & Applications Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Give an understanding what ad hoc & sensor networks are good
How To Build A Network For Mining
GE Digital Energy Industrial Communication Solutions for the Mining Industry g imagination at work GE Industrial Communications For over twenty-five years, GE Industrial Communications has provided rugged
VLANs. Application Note
VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static
Wi-Fi, Health Care, and HIPAA
AN AIRMAGNET TECHNICAL WHITE PAPER Wi-Fi, Health Care, and HIPAA WLAN Management in the Modern Hospital by Wade Williamson WWW.AIRMAGNET.COM This page contains no topical information. Table of Contents
Using Wireless Mesh Networks for Video Surveillance Version: 1. Using Wireless Mesh Networks for Video Surveillance
Using Wireless Networks for Video Surveillance Version: 1 White Paper Using Wireless Networks for Video Surveillance Using Wireless Networks for Video Surveillance Version: 1 White Paper Table of Contents
PCI Solution for Retail: Addressing Compliance and Security Best Practices
PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment
Cisco Unified Access Technology Overview: Converged Access
White Paper Cisco Unified Access Technology Overview: Converged Access Introduction Today, less than 1 percent of things in the physical world are network connected. In the near future the growth of the
Cisco Mobile Network Solutions for Commercial Transit Agencies
Cisco Mobile Network Solutions for Commercial Transit Agencies Overview Commercial transit agencies provide a vital service to our communities. Their goal is to provide safe, affordable, and convenient
CHOOSING A WIRELESS IMPLEMENTATION STRATEGY AND APPLICATIONS
WHITE PAPER CHOOSING A WIRELESS IMPLEMENTATION STRATEGY AND APPLICATIONS Sachin Gupta, Sr. Wireless Consultant WHAT S INSIDE: 1. Introduction 2 2. Key Considerations before Selecting a Wireless Solution
B&B ELECTRONICS WHITE PAPER. Managed Ethernet Switches - Key Features for a Powerful Industrial Network
Determinism is the assurance that control/communication will occur in a set period of time. Ethernet was nondeterministic at first, and not widely used for industrial purposes. Ethernet switches designed
LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0
LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does
Emerson s Smart Wireless and WIB Requirements
Emerson s Smart Wireless and WIB Requirements Acronyms.................................................................. page 2 Overview..................................................................
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products
Wireless Controller DWC-1000
Network Architecture Manage up to 6 wireless APs, upgradable to 24 APs 1 per controller Control up to 24 wireless APs, maximum 96 APs 1 per cluster Robust Network Security Wireless Instruction Detection
Chapter 1 Reading Organizer
Chapter 1 Reading Organizer After completion of this chapter, you should be able to: Describe convergence of data, voice and video in the context of switched networks Describe a switched network in a small
Testing a Wireless LAN
Chapter 17 Testing a Wireless LAN This chapter will introduce you to: Wireless LAN Testing Considerations Signal Coverage Testing Performance Testing In-Motion Testing Security Vulnerability Testing Acceptance/Verification
Designing, Securing and Monitoring 802.11a/b/g/n Wireless Networks
Designing, Securing and Monitoring 802.11a/b/g/n Wireless Networks The importance of Wireless today Increasingly in the Corporate Environment, Wireless is becoming an enabling technology to facilitate
: The New Standard In Wireless Broadband
: The New Standard In Wireless Broadband Cambium Networks epmp wireless broadband solutions are the first to bring field-proven reliability, GPS-sync-enabled scalability and high-quality service performance
The Internet of Things: Opportunities & Challenges
The Internet of Things: Opportunities & Challenges What is the IoT? Things, people and cloud services getting connected via the Internet to enable new use cases and business models Cloud Services How is
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...
SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005
SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems
