Computer Networks and Remote Control



Similar documents
Figure 41-1 IP Filter Rules

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Configuring Security for FTP Traffic

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

SSL VPN Technology White Paper

Exam Questions SY0-401

Advanced Higher Computing. Computer Networks. Homework Sheets

Device Log Export ENGLISH

Automatic Backup in Oracle Database

Application Note Connect to a Rockwell PLC over Netbiter Remote Access

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip

ISG50 Application Note Version 1.0 June, 2011

Firewall Defaults and Some Basic Rules

ReadyNAS Remote White Paper. NETGEAR May 2010

Establishing a VPN tunnel to CNet CWR-854 VPN router using WinXP IPSec client

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Immotec Systems, Inc. SQL Server 2005 Installation Document

Creating a VPN Using Windows 2003 Server and XP Professional

Pre Sales Communications

Access control policy: Role-based access

Network Configuration Settings

Connecting an Android to a FortiGate with SSL VPN

1. Introduction What is Axis Camera Station? What is Viewer for Axis Camera Station? AXIS Camera Station Service Control 5

How to configure VPN function on TP-LINK Routers

FTP Server Configuration

Configuring TheGreenBow VPN Client with a TP-LINK VPN Router

How To Configure SSL VPN in Cyberoam

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

Technical Notes TN 1 - ETG FactoryCast Gateway TSX ETG 3021 / 3022 modules. How to Setup a GPRS Connection?

MilsVPN VPN Tunnel Port Translation. Table of Contents Introduction VPN Tunnel Settings...2

ADMINISTRATIVE POLICY # (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # (2014) Remote Access

Elluminate Live! Access Guide. Page 1 of 7

Quidway SVN3000 Security Access Gateway

Directory and File Transfer Services. Chapter 7

H3C SSL VPN RADIUS Authentication Configuration Example

Lab assignment #2 IPSec and VPN Tunnels (Document version 1.1)

PROCESS DATA VISUALIZATION AND MONITORING USING INTERNET

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

FTP e TFTP. File transfer protocols PSA1

Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0

How to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130.

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at

BASIC ANALYSIS OF TCP/IP NETWORKS

External Authentication with Windows 2008 Server with Routing and Remote Access Service Authenticating Users Using SecurAccess Server by SecurEnvoy

OvisLink 8000VPN VPN Guide WL/IP-8000VPN. Version 0.6

Introduction to Computer Security

Network Security and Firewall 1

Elluminate Live! Access Guide. Page 1 of 7

Transport Layer Protocols

How to configure VPN function on TP-LINK Routers

21.4 Network Address Translation (NAT) NAT concept

Quick Connect. Overview. Client Instructions. LabTech

Intranet Security Solution

Purple Sturgeon Standard VPN Installation Manual for Windows XP

Scenario 1: One-pair VPN Trunk

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

Intranet, Extranet, Firewall

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

Contents. 1 VPN Remote Access Service

Fig : Packet Filtering

IT Data Communication and Networks (Optional)

This is a guide on how to create an IPsec VPN tunnel from a local client running Shrew Soft VPN Client to an Opengear device.

ewon-vpn - User Guide Virtual Private Network by ewons

Leostream Corporation leostream.com Share this Whitepaper!

ZyWALL OTPv2 Support Notes

Small Business Server Part 2

DEPLOYMENT GUIDE. Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Open Thunderbird. To set up an account in Thunderbird, from the Tools menu select Account Settings; choose account; then click Next.

INTRUSION DETECTION SYSTEMS and Network Security

Transparent cryptographic embedded computer system

SSL Certificate Based VPN

Network/Floating License Installation Instructions

Tunnels and Redirectors

Portal Authentication Technology White Paper

Configuring Avaya 1120E, 1140E, 1220 and 1230 IP Deskphones with Avaya IP Office Release 6.1 Issue 1.0

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (

Introduction to Computer Security

Note that if at any time during the setup process you are asked to login, click either Cancel or Work Offline depending upon the prompt.

Setting up Your Acusis Address. Microsoft Outlook

How to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0

Building scalable IPSec infrastructure with MikroTik. IPSec, L2TP/IPSec, OSPF

How to use FTP Commander

Configuring Network Load Balancing with Cerberus FTP Server

Evolutionism of Intrusion Detection

PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES

Your remote sites at your fingertips?

To install the SMTP service:

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module

Securing Networks with Cisco Routers and Switches ( )

Specialized Programme on Internetworking Design and LAN WAN Administration

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

Transcription:

Computer Networks and Remote Control Michal KUBÍK Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovakia kubik_michal@pobox.sk Abstract. This contribution deals with possibility of using computer networks in automation for remote control and brings design of possible solution for remote control calibration workplace that is used for calibration of digital electricity meters. In the first part the differences between local and remote control are explained. The possibility of using various network protocols, which can be used in automation (TCP, HTTP, FTP, SMTP, RDP) is analyzed too. It is important to discern between remote control inside and outside of LAN and related security. 1 Introduction The requirement of quality increase, sharing resources or cost saving, which cause, that control technique is still more and more including information systems, is necessary. Usually, the first step is virtual or whole virtual laboratories, which purpose is control process simulation. In the next step virtual s are substituted with real s and control process are made inside laboratories. This step is kind of preparation for employment control process in real control applications. Computer networks are relatively new part of control technique. They offer possibility of remote control. For operator this fact allows to move away from control process or even to become a mobile and control process from almost any place of the world. Supervisor: Ing. Čičáková Oľga, Department of Measurement, Faculty of Electrical Engineering and Information Technology, doc. Ing. Kotočová Margaréta, Institute of Computer Systems and Networks, Faculty of Informatics and Information Technologies STU in Bratislava M. Bieliková (Ed.), IIT.SRC 2005, April 27, 2005, pp. 84-89.

2 Control possibility Computer Networks and Remote Control 85 In present time it is possible to control process in local or remote mode so these two terms should be explained. Local mode control is the form of control, where the signals are transported by electric conductor, RS234, GPIB, VXI, PROFIBUS etc. Individual parts of working place can be interconnected with each other or with control computer. The control computer controls whole working place [fig. 1]. In this case control computer is only control element in entire system. Very often, in local mode control, all parts of control system are placed near each other. GPIB,VXI Control computer Fig.1. Local control. Remote mode control. Control is becoming remote if a network and next one or more computers are connected to the local control system. After that control computer is called local client and other computers are called remote clients. One of the remote clients can control process. In this case this remote client is called control client [fig. 2]. Some present control s have RJ45 interface and can be connected directly to network. remote client local client network control client GPIB,VXI Fig.2. Remote control. Tab.1. Remote control advantage and disadvantage comparison. Positives of remote mode control Negatives of remote mode control Sharing expensive s High attack risk Real time presentation of control process Access to computer network Possibility to participate on control process Higher primary investment from any place of the world

86 Michal Kubík 3 Control process and network protocols Often requirement in industry is to make real time control or control with at least certain define delay. Although this requirement can not be fulfilled by Internet, network protocols penetrate to this area. The most widely used protocol is TCP. It creates a base for higher application protocols e.g. HTTP, SMTP, FTP HTTP is protocol for transporting web pages. HTTP server can be used for actual values presentation of state values on web pages. For user the advantage of HTTP protocol is in the same way of work as with Internet [2]. SMTP is the most often used protocol for e-mail transport. Besides that, it can be used for states transport occurred during control process. Present PLC s contain SMTP client for delivering data directly to the data part of PLC or in opposite direction from PLC s to operator. FTP protocol is suitable for transporting a big amount of data. For this reason it can be used for technologic process transport. Remote Desktop is next solution for extension of local mode control to remote mode control without any changes made in existing software. With the Remote Desktop your computer can be remotely controlled from another place. It is allowed to use the data, applications, and network resources that are on local client, without being in the same room [4]. 4 Existing solutions Control system development is complicated and expensive work. Companies developing control systems deliver remote control possibility as a small part of whole system. The most widely used products are SIMATIC, Matlab, DataSocket [3]. Existing solution advantage are easy implementation and support. On the other side disadvantage are higher price and more complicated scalability. 5 Design The system was split into tree mutually communicate parts: local client, remote client and server. TCP is used as a network protocol. 5.1 Local client In the present time local client is the system for local control workplace for calibration of digital electricity meters [1]. Local client functions: receiving of commands from the server and their transformation to suitable format for the connected

Computer Networks and Remote Control 87 transformation of data received from to right format suitable for the server and subsequently, sending of transformed data to the server update of list of ports and connected s. 5.2 Remote client Remote client allows remote control workplace. It is necessary to ensure mutual exclusion algorithm for exclusive workplace control, if more remote clients are connected to server at one. The control client is remote client which has got permission to control process. The other clients are called passive clients. They can only watch control process between local client and control client in passive mode. Remote client functions: remote client authentication on the server before control process connection to the local client over the server if it s possible (no other control client) sending and receiving of commands from local client over server preparing of list of commands in the case of batch processing update of list of ports and connected s logout at the end of control process. It is necessary to have an operator for preparation and configuration workplace before calibration. 5.3 Server This part is separated because of the security and better user management. Server functions: remote client s identification and authentication ensure mutual exclusion for remote clients data distribution from the control client to the local client distribution of respond from local client to all remote clients update of list of clients and their activity.

88 Michal Kubík 5.4 Data format As it was mentioned above one of the tasks for local client is data transform from control client to the right and back. Present workplace contains s with different data format. The general data format to abstract from type was designed. General data format TYPE PRIORITY ADDRESS DATA EXTENSION TYPE - data type in field DATA (COMMAND, RESPOND, ERROR, LOGIN, LOGOUT). PRIORITY - message type priority ADDRESS - address. This field is used if field TYPE contains data (COMMAND, RESPOND, and ERROR) DATA - this content field depends on field TYPE (see part COMMAND data type and RESPOND data type) EXTENSIONS - not used in present a) COMMAND data type. This message is from control client to local client sent. COMMAND PARAMETERS DURATION TTSC COMMAND - command code PARAMETERS - command parameters DURATION - command time duration TTSC - time to send command. How many time will be command sent. b) RESPOND data type. This message is from local client to remote clients sent. ICOMMAND RESPOND ICOMMAND RESPOND - (input command) original command for which is respond sent. Fields COMMAND, PARAMETERS and DURATION contain. - respond to command from There are two reasons why original message is sent in RESPOND message 1. Respond from local client is to all remote clients routed. In this message has to be information to which command respond comes. 2. Remote client can in batch mode work and so sent batch of commands sent. Responds one by one with a delay comes and if field PRIORITY is used, then also in different order. In this case all remote clients would have to keep list of commands for which respond wait. This solution disadvantage is that respond can be shorter than command often.

5.5 Remote control over Internet Computer Networks and Remote Control 89 It is assumed, that local client and server will be placed inside of the LAN. Remote clients will be connected from outside of the LAN [fig. 3.]. For remote clients access to LAN is established by VPN. Connection security is made by IPSec on network layer. IPsec works in tunnel mode. Security is the priority of connection so ESP protocol is used. local client server Tunnel passive client Tunnel control client GPIB,VXI LAN Internet Fig. 3. Remote control over Internet. 6 Conclusions This article shortly describes possible remote control process solution and briefly existing commercial solutions in this field. Design describes remote control calibration workplace which is used for calibration of digital electricity meters inside of LAN. It is assumed that the ports for TCP protocol are permitted and access to the LAN will be able only for authorized users. There is also short design of remote control over Internet. In the future the implementation of remote control over LAN should be made, design for remote control over Internet should be finished and implemented. References 1. Skladan, B.: Programové vybavenie pre kalibračné pracovisko s EKS 05-3. Bachelor final project, Bratislava, 2004. 2. Halva, T.: Internetové procesy usnadňují řízení procesů na dálku. Automa, Vol.10, No.4 (2004), 6-7. 3. Integrating the Internet into Your Measurement System. DataSocket Technical Overview. 4. http://www.microsoft.com/slovakia/windows/xp/pro/evaluation/overviews/remotea ccess.asp, 22.03.2005.