CDS ISA100 Wireless. Redundancy techniques to increase reliability in ISA100 Wireless networks. Mircea Vlasin
|
|
- Richard Sherman
- 5 years ago
- Views:
Transcription
1 CDS ISA100 Wireless Redundancy techniques to increase reliability in ISA100 Wireless networks Mircea Vlasin
2 Single Gateway issue On Gateway malfunction: wireless devices try to find another network battery consumption increases client application loose important sensors data Industrial process disruption
3 Redundant Gateway On Gateway or connection malfunction: Wireless devices remain connected No battery consumption increase Client application continues to receive sensor data Faulty can be replaced without disrupting industrial process Backup FAIL Backup Activ Target: happy user
4 Client interfaces Access INPUT and HOLDING registers Access INPUT registers Client/Server, Notifications, Alerts Ethernet infrastructure Notifications & Alerts INPUT INPUT CURRENT ROLE CURRENT ROLE HOLDING HOLDING PREFERRED ROLE PREFERRED ROLE SHUTDOWN SHUTDOWN Web tool Ethernet synchronization link Web tool
5 UDP idle Logical modules structure Idle Server TCP synchronization Server System Manager TCP synchronization System Manager Idle Web Site Heartbeat UDP active Heartbeat Web Site HA HA DB Transceiver Transceiver DB Backup is joined to SM and idle connection to Backup SM
6 Wireless network routes Dual active backbones o Faster joining process Redundant path for inbound traffic Redundant path for outbound traffic Redundant Client- Gateway connection Gateway Radio Backup Gateway Radio
7 Network formation Gateway: o o handle join requests groom the network Field devices join to Gateway trough any Gateway configures redundant wireless path after join Gateway Redundant path Backup Gateway Join path
8 Data packets flow ISA100 packets received from wireless trough any of the. forward packets to Gateway Backup Gateway updates Backup Gateway Same data available to Client application from any of the Gateway (trough or ) Sync Same data Idle Field device sending data
9 If anything breaks but data survives, user is happy Cases of failure: 1. Eth connection Client application - Gateway RF connection Sensor Gateway 4. Synchronization link - Backup 5. Backup Gateway 6. Eth connection Client application Backup Gateway Backup 5 6
10 1. Client application <-> Gateway failure continues to receive field data Data is synchronized between and Backup Client application continues to receive data from Backup Backup Backup Client application can command a software switch of roles trough: Sync PREFERRED ROLE reg o o (PREFERED ROLE register) dedicated GRO (Gateway Redundancy Object) GRO Object User can fix the broken connection without affecting process control Field device sending data
11 2. Gateway failure 1. Heartbeat mechanism detects failure in few seconds 2. Heartbeat triggers the role switch from Backup to 3. System Manager reconfigures field device paths to use only current over RF to preserve energy. During this process the client application continues to receive data User can replace the broken Gateway without affecting process control No DLL ACK Backup Heartbeat System Manager DLL Retry Field device sending data
12 3. RF link Sensor Gateway failure Redundancy path trough both s based on Multipath routing allow temporary RF link lost On each packet, failure on Preferred path triggers retry on Backup path On permanent RF link lost (based on PER statistics) System Manager reconfigures field devices paths No change on backend side Client application continues to receive data from Sync Preferred path Backup Backup path Field device sending data
13 4. Synchronization link - Backup continues to receive field data from 1. Heartbeat on Backup detect the link lost 2. Heartbeat triggers switch from Backup to 3. Client application detects the dual role and command a Gateway shutdown trough: o o (STOP register) dedicated GRO (Gateway Redundancy Object) User can fix the broken link and restart the without affecting process control failure Heartbeat 2 Sync 1 3 Backup Heartbeat Field device sending data STOP reg GRO Object
14 5. Backup Gateway failure 1. Heartbeat detects failure and no action required 2. Client application detects failed by loosing connection with Backup 3. System Manager reconfigures field device paths to use only current over RF (triggered by high PER -packet error ratestatistics). During this process the client application continues to receive data from User can replace the broken Gateway without affecting process control. Heartbeat System Manager Preferred path Field device sending data Backup No DLL ACK High PER
15 6. Client application <-> Backup Gateway failure No change in the roles continues to receive field data Client application continues to receive data from Backup User can fix the broken connection without affecting process control Sync Field device sending data
16 Conclusions Redundancy mechanism increase the reliability of the system All failure links are covered Uses two identical gateways, one as and second as Backup Redundancy connection uses a dedicated Ethernet cable Does not require other special hardware
17 Q & A Thank you For further questions send an to contact@cds.ro
Failover Solutions with Open-E Data Storage Server (DSS V6)
Failover Solutions with Open-E Data Storage Server (DSS V6) Software Version: DSS ver. 6.00 up85 Presentation updated: September 2011 Failover Solutions Supported by Open-E DSS Open-E DSS supports two
More informationForeScout CounterACT Resiliency Solutions
ForeScout CounterACT Resiliency Solutions User Guide CounterACT Version 7.0.0 About CounterACT Resiliency Solutions Table of Contents About CounterACT Resiliency Solutions... 5 Comparison of Resiliency
More informationConfiguring High Availability (HA)
4 CHAPTER This chapter covers the following topics: Adding High Availability Cisco NAC Appliance To Your Network, page 4-1 Installing a Clean Access Manager High Availability Pair, page 4-3 Installing
More informationControl Data Systems Industrial Wireless Communications
ISA100 Wireless for Control Applications ISA100 Wireless End User Conference Rotterdam, The Netherlands 27 th September 2016 Andrei Rusu, CDS Wireless Control Data Systems Industrial Wireless Communications
More informationMIU-1000 v. Revised: 4/20/2009. Copyright 2008, Traf-SYS, Inc.
MIU-1000 v 2.6g Revised: 4/20/2009 Copyright 2008, Traf-SYS, Inc. Contents Introduction... 3 Setting up your MIU-1000 for the first time... 3 Connections... 3 Connecting with a Serial Cable... 3 Connecting
More informationIP Communications Required by Cisco Unity Connection
IP Communications Required by Cisco Unity IP Communications Required by Cisco Unity, page 1 IP Communications Required by Cisco Unity Ports Table 1: TCP and UDP Ports Used for Inbound s to Cisco Unity
More informationFAULT TOLERANT SYSTEMS
FAULT TOLERANT SYSTEMS http://www.ecs.umass.edu/ece/koren/faulttolerantsystems Part 18 Chapter 7 Case Studies Part.18.1 Introduction Illustrate practical use of methods described previously Highlight fault-tolerance
More information1 sat-nms SCC Overview
1 sat-nms SCC Overview The sat-nms NMS normally uses dial-up telephone lines (analog telephone, ISDN, GSM) for the control connections between the sat-nms NMS and each particular VLC. Using modems or ISDN
More informationPortal configuration commands
Contents Portal configuration commands 1 display portal acl 1 display portal connection statistics 5 display portal free-rule 7 display portal interface 9 display portal-roaming 11 display portal server
More informationChapter 5 Ad Hoc Wireless Network. Jang Ping Sheu
Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson
More informationConfiguring VIP and Virtual Interface Redundancy
CHAPTER 6 Configuring VIP and Virtual Interface Redundancy This chapter describes how to plan for and configure virtual IP (VIP) redundancy and virtual interface redundancy on the CSS. Information in this
More information4G Business Continuity Solution. 4G WiFi M2M Router NTC-140W
4G Business Continuity Solution 4G WiFi M2M Router NTC-140W Introduction Whether you run a small corner shop, are the plant manager of a factory or manage IT in a corporate office, you ll need a reliable
More informationGroup Configuration Mode Commands
Group configuration mode allows you to configure a group. A group is a collection of local servers that initiate flows from within the local web farm. For example, after processing a group of real audio
More information1. QUICKSTART GUIDE TOOLBAR ADMIN LOWER TOOLBAR DEVICES CLIP DB MONITORING GSM SETTINGS...
ESR100 Contents 1. QUICKSTART GUIDE...3 2. TOOLBAR...4 3. ADMIN...5 4. LOWER TOOLBAR...5 5. DEVICES...6 6. CLIP DB...7 7. MONITORING...8 8. GSM...9 9. SETTINGS...10 2 EN ESR100 1. QUICKSTART GUIDE NOTE:
More informationForeScout CounterACT. Resiliency Solutions. CounterACT Version 8.0
ForeScout CounterACT Resiliency Solutions CounterACT Version 8.0 Table of Contents About ForeScout Resiliency Solutions... 4 Comparison of Resiliency Solutions for Appliances... 5 Choosing the Right Solution
More informationSafe Place and Code Alert Customer Information Technology Requirements Series 10.x Software
Safe Place and Code Alert Customer Information Technology Requirements Series 10.x Software 2017 RF Technologies, Inc. All specifications subject to change without notice. All Rights Reserved. No Part
More informationGSS Administration and Troubleshooting
CHAPTER 9 GSS Administration and Troubleshooting This chapter covers the procedures necessary to properly manage and maintain your GSSM and GSS devices, including login security, software upgrades, GSSM
More informationSynology High Availability (SHA)
Synology High Availability (SHA) Based on DSM 5.1 Synology Inc. Synology_SHAWP_ 20141106 Table of Contents Chapter 1: Introduction... 3 Chapter 2: High-Availability Clustering... 4 2.1 Synology High-Availability
More informationISA100 Wireless for Control Applications. Control Data Systems. Industrial Wireless Data Systems,
Control Data Systems Industrial Wireless Communications 1 Use case 1 Industrial Remote Controls - - - End User is IKUSI VELATIA SPAIN, Remote Controls Division Remote Controls operate Industrial Cranes
More informationConfiguring System Logs
CHAPTERS 1. Overview 2. 3. Configuration Example 4. Appendix: Default Parameters Overview This guide applies to: T1500G-10PS v2 or above, T1500G-8T v2 or above, T1500G-10MPS v2 or above, T1500-28PCT v3
More information10 Having Hot Spare disks available in the system is strongly recommended. There are two types of Hot Spare disks:
0 This Web Based Training module provides support and maintenance related information for the ETERNUS DX S2 family. This module provides an introduction to a number of ETERNUS Web GUI functions, for a
More informationUnderstanding the ACS Server Deployment
CHAPTER 1 This chapter provides an overview of possible ACS server deployments and their components. This chapter contains: Deployment Scenarios, page 1-1 Understanding the ACS Server Setup, page 1-5 Deployment
More informationRouter and ACL ACL Filter traffic ACL: The Three Ps One ACL per protocol One ACL per direction One ACL per interface
CCNA4 Chapter 5 * Router and ACL By default, a router does not have any ACLs configured and therefore does not filter traffic. Traffic that enters the router is routed according to the routing table. *
More informationCCNA 1 Chapter 7 v5.0 Exam Answers 2013
CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the
More informationCorporate Profile Isis Distributed Systems
Corporate Profile Distributed Systems Dr. Kenneth P. Birman Founder and Chief Scientist November 21th 1995 US Govt Funded Research Project First product shipped in 1991 Acquired by Stratus Computer in
More informationChapter 3 Managing System Settings
Chapter 3 Managing System Settings Using the System Settings Utility The navigation pane at the top of the web browser interface contains a System tab that enables you to manage your FS700TSSmart Switch
More informationHow to convert data from serial port to IP packets
2/2016 SATEL technical bulletin How to convert data from serial port to IP packets Serial IP is a feature where data coming from serial port is converted to IP packets and set to designated IP address.
More informationCisco Optimizing Converged Cisco Networks. Practice Test. Version 2.6. https://certkill.com
Cisco 642-845 642-845 Optimizing Converged Cisco Networks Practice Test Version 2.6 QUESTION NO: 1 Cisco 642-845: Practice Exam Refer to the exhibit. NBAR is to be configured on router R1 to limit outgoing
More informationHot Standby Access Points
Hot Standby Access Points This module describes how to configure your wireless device as a hot standby unit in the following sections: Understanding Hot Standby, page 1 Configuring a Hot Standby Access
More informationHigh Availability Synchronization PAN-OS 5.0.3
High Availability Synchronization PAN-OS 5.0.3 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Device Configuration... 4 Network Configuration... 9 Objects Configuration...
More informationHow to Monitor Network Activity with the Windows Security & Firewall Logs to Detect Inbound and Outbound Attacks. Made possible by
How to Monitor Network Activity with the Windows Security & Firewall Logs to Detect Inbound and Outbound Attacks Sponsored by 2014 Monterey Technology Group Inc. Made possible by Thanks to LOG & EVENT
More informationIncreasing Availability of Linux System using Redundancy. Beob Kyun Kim
Increasing Availability of Linux System using Redundancy Beob Kyun Kim (kyun@etri.re.kr) OUTLINE I. Availability? II. Efforts to increase availability using redundancy History on Virtual Routers UCARP
More informationWireless and Mobile Networks Reading: Sections 2.8 and 4.2.5
Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained
More informationHigh Availability on the SonicWALL TZ 210
High Availability on the SonicWALL TZ 210 Document Scope This document describes how to configure and manage the High Availability feature for the SonicWALL TZ 210 security appliance. This document contains
More informationIntroducing the SureCross Wireless Product Families 7/29/2013
7/29/2013 Contents Contents SureCross DX80 and Performance Products... 3 The SureCross Performance Wireless Network...3 SureCross Performance Gateways and Nodes...3 DX85 Modbus RTU I/O Slaves... 3 Host
More informationConfiguring IP Session Filtering (Reflexive Access Lists)
Configuring IP Session Filtering (Reflexive Access Lists) This chapter describes how to configure reflexive access lists on your router. Reflexive access lists provide the ability to filter network traffic
More informationSynapSense Software. Installation Manual. Release 7.1 Issue 1
SynapSense Software Installation Manual Release 7.1 Issue 1 Copyright 2017 Panduit Corp. All rights reserved. No part of this book shall be reproduced, stored in a retrieval system, or transmitted by any
More informationVisorALARM-Manager Application Quick Guide. (Ver. 1.3) Dm 380-I. V:3.0
VisorALARM-Manager Application Quick Guide. (Ver. 1.3) Dm 380-I. V:3.0 1. Installation Requirements 1.1. PC Pentium III processor or higher. Minimum RAM memory: 128 Mbytes Operating system: Windows XP
More informationThree interface Router without NAT Cisco IOS Firewall Configuration
Three interface Router without NAT Cisco IOS Firewall Configuration Document ID: 13893 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations
More informationNA502S Multiple RF Home Gateway
NA502S Multiple RF Home Gateway User Guide i Table of Contents CHAPTER 1 INTRODUCTION... 1 Package Contents... 1 Features... 1 LEDs... 2 CHAPTER 2 INITIAL INSTALLATION... 5 Requirements... 5 Procedure...
More information1Industrial Ethernet Switch
Ethernet Switch Rack-Mount Managed Ethernet Switch v1.0a / Jun, 2016 1 Ethernet Switch Features 26-port rack mount managed Ethernet switch with 24x10/100Base-T(X) and 2xgigabit combo, SFP socket Support
More informationBefore creating a new cluster or joining a node to an existing cluster, keep in mind the following restrictions:
Cluster Management Before starting Before creating a new cluster or joining a node to an existing cluster, keep in mind the following restrictions: It's strongly suggested to configure all Application
More informationLSI Industries AirLink Network Security. Best Practices. System Information 01/31/18. Physical Access. Software Updates. Network Encryption
LSI Industries AirLink Network Security 01/31/18 Best Practices AirLink can provide all of its basic lighting control services without an internet connection. However, many customers will find that internet
More informationCode Alert Customer Information Technology Requirements Series 30 Software
Code Alert Customer Information Technology Requirements Series 30 Software 2017 RF Technologies, Inc. All specifications subject to change without notice. All Rights Reserved. No Part of this work may
More informationDifferent network topologies
Network Topology Network topology is the arrangement of the various elements of a communication network. It is the topological structure of a network and may be depicted physically or logically. Physical
More informationSOFTWARE UPDATE INSTRUCTION MANUAL. Device Manager. Compatible with: DB4004, DB7000, Radio Explorer II, DB44
SOFTWARE UPDATE INSTRUCTION MANUAL Device Manager Compatible with: DB4004, DB7000, Radio Explorer II, DB44 Publish Date: 24-Nov-2014 DEVA Device Manager Software Update This document is intended to guide
More informationCisco Exam Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Version: 6.0 [ Total Questions: 79 ]
s@lm@n Cisco Exam 300-135 Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Version: 6.0 [ Total Questions: 79 ] Topic break down Topic No. of Questions Topic 1: Mix Questions 26 Topic 2: Troubleshooting
More informationConfiguring 802.1X Port-Based Authentication
CHAPTER 10 This chapter describes how to configure IEEE 802.1X port-based authentication on the Catalyst 3750 switch. As LANs extend to hotels, airports, and corporate lobbies, creating insecure environments,
More informationUbiquitous Sensor Network KIM, YONG-WOON ETRI
Ubiquitous Sensor Network 2007. 7. 10. KIM, YONG-WOON ETRI Table of Contents USN Definition USN Applications USN Problem Domains USN Service Requirements USN Technical Issues USN Technology Layer Model
More informationDistributed Systems. Communica3on and models. Rik Sarkar Spring University of Edinburgh
Distributed Systems Communica3on and models Rik Sarkar Spring 2018 University of Edinburgh Models Expecta3ons/assump3ons about things Every idea or ac3on anywhere is based on a model Determines what can
More informationMulti Hop Send Protocol Tool for TinyNodes Semesterthesis
Multi Hop Send Protocol Tool for TinyNodes Semesterthesis Author: Supervisor: Tutor: Remo Niedermann Prof. Dr. Roger Wattenhofer Roland Flury Zurich, February 19, 2009 Acknowledgment At first I want to
More informationHistory Page. Barracuda NextGen Firewall F
The Firewall > History page is very useful for troubleshooting. It provides information for all traffic that has passed through the Barracuda NG Firewall. It also provides messages that state why traffic
More informationDesign and Evaluation of a new MAC Protocol for Long- Distance Mesh Networks by Bhaskaran Raman & Kameswari Chebrolu ACM Mobicom 2005
Design and Evaluation of a new MAC Protocol for Long- Distance 802.11 Mesh Networks by Bhaskaran Raman & Kameswari Chebrolu ACM Mobicom 2005 Reviewed by Anupama Guha Thakurta CS525M - Mobile and Ubiquitous
More informationConfiguring UDLD. Understanding UDLD CHAPTER
21 CHAPTER This chapter describes how to configure the UniDirectional Link Detection (UDLD) protocol on the Catalyst 3750 switch. Unless otherwise noted, the term switch refers to a standalone switch and
More informationThis chapter will describe all the devices and infrastructure requirements for communication between.
The material in this document is the intellectual property of EMSYS Design Inc. We take every care in the preparation of this document, but no guarantee is given as to the correctness of its contents.
More information2. Inbound PC Anywhere for KWI help desk support. UDP & TCP ports 56xx-56xx inbound from /26, /26.
Network Requirements for Internet, POS & mpos Version 1.73 03/01/2016 Introduction KWI requires a firewall, which can filter (block) both incoming and outgoing services by IP address/protocol/port and
More informationand Ethernet Gateway Quick Start Guide
WEB-ID Wireless Sensors and Ethernet Gateway Quick Start Guide Inside the Box You should find the following items in the box: WEB-ID Wireless Sensors WEB-ID Wireless Ethernet Gateway Power Supply Antenna
More informationHA for Azure Classic Interface. Feature Description
Feature Description UPDATED: 28 March 2018 Copyright Notices Copyright 2002-2018 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies logo are registered trademarks
More informationDGS-9812GP-AIO_S. Features. Introduction
Ethernet Switch Desktop-type Ethernet Switch v1.0a / Jul, 2014 Features desktop type 20-port managed Gigabit Ethernet switch with 8x10/100/1000Base-T(X) ports and 12x100/1000Base-X, SFP socket, LC connector
More informationCisco Cisco Express Networking.
Cisco 700-901 Cisco Express Networking http://killexams.com/exam-detail/700-901 QUESTION: 35 What is a Cisco Meraki Technology Partner? A. Technology partners concentrate on delivering expedited on-site
More informationPART III. Implementing Inter-Network Relationships with BGP
PART III Implementing Inter-Network Relationships with BGP ICNP 2002 Routing Protocols Autonomous System BGP-4 BGP = Border Gateway Protocol Is a Policy-Based routing protocol Is the de facto EGP of today
More informationTable of Contents. 1 Introduction. 2 Wireless Configurations. 3 Setting Up your LAN Administrator Station
Table of Contents 1 Introduction About Avaya Wireless 1-1 About Avaya Wireless Tools 1-2 About Avaya Wireless Access Points 1-5 About This User s Guide 1-6 About Icons used in this Document 1-7 On-line
More informationBuilding Infrastructure for Private Clouds Cloud InterOp 2014"
Building Infrastructure for Private Clouds Cloud Connect @ InterOp 2014" Paul Savill Senior Vice President Product Management, Core Network Services Level 3 Communications Key Network Strategy/ Design
More informationCHAPTER 7 ADVANCED ADMINISTRATION PC
ii Table of Contents CHAPTER 1 INTRODUCTION... 1 Broadband ADSL Router Features... 1 Package Contents... 3 Physical Details... 4 CHAPTER 2 INSTALLATION... 6 Requirements... 6 Procedure... 6 CHAPTER 3 SETUP...
More informationReflexive Access List Commands
Reflexive Access List Commands This chapter describes reflexive access list commands, which are used to configure IP session filtering. IP session filtering provides the ability to filter IP packets based
More informationMonnit Wireless Sensors. and Ethernet Gateway Quick Start Guide
Monnit Wireless Sensors and Ethernet Gateway Quick Start Guide Inside the Box You should find the following items in the box: Monnit Wireless Sensors MonnitLink Wireless Ethernet Gateway Power Supply Antenna
More informationIntranets 4/4/17. IP numbers and Hosts. Dynamic Host Configuration Protocol. Dynamic Host Configuration Protocol. CSC362, Information Security
IP numbers and Hosts Intranets CSC362, Information Security i. IP numbers denote interfaces rather than entities ii. a single router can connect several different networks iii. a single interface can be
More informationDeploying ISA100 Wireless Distributed Networks. YC Cheng NEXCOM 2016/09/27
Deploying ISA100 Wireless Distributed Networks YC Cheng NEXCOM 2016/09/27 Go Industrial Wireless for IIOT Industrial IoT Industrial Wireless Sensor Network Industrial Wi-Fi Backbone Industrial Network
More informationSecurity SSID Selection: Broadcast SSID:
69 Security SSID Selection: Broadcast SSID: WMM: Encryption: Select the SSID that the security settings will apply to. If Disabled, then the device will not be broadcasting the SSID. Therefore it will
More informationGroup Configuration Mode Commands
Chapter 2 General Commands Group Configuration Mode Commands Group configuration mode allows you to configure a group. A group is a collection of local servers that initiate flows from within the local
More informationAID Android App User s Guide. Version 1.1 December, 2017
AID Android App User s Guide Version 1.1 December, 2017 Table of Contents 1 Introduction... 3 2 Using the AID Android App... 3 2.1 Installing the App... 3 2.2 Configuring the AID and AID Panels... 4 2.2.1
More informationNetwork Design. Overview. CDS with Vaults and Streamers CHAPTER
CHAPTER 2 This chapter describes the different network topologies for the Cisco TV CDS, the different network connections of the CDS servers, the CDS workflow, and network configuration considerations.
More informationCODE ALERT Enterprise Software Customer Information Technology Requirements
CODE ALERT Enterprise Software Customer Information Technology Requirements 2018 RF Technologies, Inc. All specifications subject to change without notice. All Rights Reserved. No Part of this work may
More informationdlive Shure Integration Guide
dlive Shure Integration Guide Issue 1 August 2018 Contents Shure Integration Overview...1 Shure Integration Firmware Requirements...1 Shure Integration Connection Methods...1 Control: Network / Audio:...2
More informationIQRF. Basic informations. Piotr Antończyk IQRF Tech s.r.o.
IQRF Basic informations Piotr Antończyk IQRF Tech s.r.o. History Founded in 1991 HQ in Jicin, CZ IQRF since 2004 Over 30 patents IQRF technology Ecosystem provider Basic features IQRF is complete wireless
More informationCONNECT TROUBLESHOOTING GUIDE. dspec and Resyn. Troubleshoot connections between dspec and Resyn.
CONNECT TROUBLESHOOTING GUIDE dspec and Resyn Troubleshoot connections between dspec and Resyn. Page 2 Table of Contents dspec and Resyn Network Overview... 3 Direct... 3 Indirect... 3 Remote... 3 Network
More informationSynology High Availability (SHA)
Synology High Availability (SHA) Based on DSM 6 Synology Inc. Synology_SHAWP_ 20170807 Table of Contents Chapter 1: Introduction... 3 Chapter 2: High-Availability Clustering... 4 2.1 Synology High-Availability
More informationData Networks. Lecture 1: Introduction. September 4, 2008
Data Networks Lecture 1: Introduction September 4, 2008 Slide 1 Learning Objectives Fundamental aspects of network Design and Analysis: Architecture: layering, topology design, switching mechanisms Protocols:
More informationHighPROTEC Troubleshooting Guide
HighPROTEC Troubleshooting Guide HighPROTEC Troubleshooting Guide Contents HighPROTEC Troubleshooting Guide... 2 Self-supervision Messages... 3 Troubleshooting by means of the System-OK-LED status... 5
More informationDistributed Systems. Communica3on and models. Rik Sarkar 2015/2016. University of Edinburgh
Distributed Systems Communica3on and models Rik Sarkar 2015/2016 University of Edinburgh Models Expecta3ons/assump3ons about things Every idea or ac3on anywhere is based on a model Determines what can
More informationIPedge Feature Desc. 9/28/12 VOICE MAIL SURVIVABILITY WITH MULTI-SITE DIRECT CLUSTER NETWORKING (DCN)
VOICE MAIL SURVIVABILITY WITH MULTI-SITE DIRECT CLUSTER NETWORKING (DCN) IPedge Messaging supports voice mail survivability by using a feature called Direct Cluster Networking (DCN). DCN allows joining
More informationChapter 11. High Availability
Chapter 11. High Availability This chapter describes the high availability fault-tolerance feature in D-Link Firewalls. Overview, page 289 High Availability Mechanisms, page 291 High Availability Setup,
More informationIM and Presence Service Network Setup
Configuration changes and service restart notifications, page 1 DNS Domain Configuration, page 2 IM and Presence Service Default Domain Configuration, page 6 IM Address Configuration, page 7 Domain Management
More informationTechnology Primer. HOBO Data Nodes: Advanced Technology for Wireless Energy and Environmental Monitoring
Technology Primer HOBO Data Nodes: Advanced Technology for Wireless Energy and Environmental Monitoring HOBO data nodes are portable devices that record and transmit measurements wirelessly to a computer
More informationBroadband Router DC-202. User's Guide
Broadband Router DC-202 User's Guide Table of Contents CHAPTER 1 INTRODUCTION... 1 Broadband Router Features... 1 Package Contents... 3 Physical Details...3 CHAPTER 2 INSTALLATION... 5 Requirements...
More informationTroubleshooting CHAPTER
CHAPTER 3 This chapter provides troubleshooting procedures for basic problems with the access point. For the most up-to-date, detailed troubleshooting information, refer to the Cisco Technical Support
More informationConfiguring Rapid PVST+
This chapter contains the following sections: Information About Rapid PVST+, page 1, page 16 Verifying the Rapid PVST+ Configuration, page 24 Information About Rapid PVST+ The Rapid PVST+ protocol is the
More informationFast IP Convergence. Section 4. Period from when a topology change occurs, to the moment when all the routers have a consistent view of the network.
Fast IP Convergence Section 4 2899_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 1 IP Convergence Convergence Time Period from when a topology change occurs, to the moment when all the routers
More informationIQRF - Mesh Networking
IQRF - Mesh Networking Overcoming Challanges with RF Mesh Networks Sebastian Hopp IQRF Tech s.r.o. 2nd November 2017 Microrisc Ltd. Founded in 1991 HQ in Jicin, CZ IQRF since 2004 Over 30 patents IQRF
More informationHigh Availability Deployment
April 18, 2005 Overview Introduction This addendum provides connectivity and configuration task overviews for connecting two M appliances as a high availability (HA) cluster pair. For detailed configuration
More informationITEC 3210 M - Applied Data Communications and Networks. Professor: Younes Benslimane, Ph.D.
ITEC 3210 M - Applied Data Communications and Networks Professor: Younes Benslimane, Ph.D. Midterm Exam February 11 th 2013 Instructions Duration: 1 hour 20 minutes Answer all questions No documentation
More informationConfiguring Box-to-Box Redundancy
CHAPTER 3 This chapter describes how to configure redundancy between two identically configured Cisco Content Services Switches (CSSs). Information in this chapter applies to all CSS models, except where
More informationSetting Up Hardware Failover
C HAPTER 51 Setting Up Hardware Failover Chapter 51: Hardware Failover > Settings Hardware Failover allows two identical SonicWALL PRO Series security appliances running SonicOS Enhanced to be configured
More informationWhat do we expect from Wireless in the Factory?
What do we expect from Wireless in the Factory? And what are we doing about it? ETSI Wireless Factory Workshop, 15 December 2008 Tim Whittaker System Architect, Wireless Division 11 December 2008 S4989-P-188
More informationDesigning a ZigBee Network
Wireless Control That Simply Works Designing a ZigBee Network ESS 2006, Birmingham David Egan Ember Corporation Copyright 2004 ZigBee TM Alliance. All Rights Reserved. Contents: Typical Network Design
More informationTowards a Zero-Configuration Wireless Sensor Network Architecture for Smart Buildings
Towards a Zero-Configuration Wireless Sensor Network Architecture for Smart Buildings By Lars Schor, Philipp Sommer, Roger Wattenhofer Computer Engineering and Networks Laboratory ETH Zurich, Switzerland
More informationMultilink. Ethernet Communications for Industrial Automation, Power Utility, and Traffic Control markets. Multilin
Multilink Ethernet Communication switches Ethernet for Industrial Automation, Power Utility, and Traffic Control markets Key Benefits The MultiLink family is a line of Industrial and Substation Hardened
More informationConfiguring Repeater and Standby Access Points and Workgroup Bridge Mode
CHAPTER 19 Configuring Repeater and Standby Access Points and Workgroup Bridge Mode This chapter describes how to configure your access point as a repeater, as a hot standby unit, or as a workgroup bridge.
More informationInfodraw MRS Server Web Administration Interface
Infodraw MRS Server Web Administration Interface MRS Server is a TCP and UDP server that serves MRS device and monitor clients. Its most basic functionality and prime reason for its existence is to distribute
More informationVRRP Aware PIM with PIM NonDR Join Feature Configuration Example
VRRP Aware PIM with PIM NonDR Join Feature Configuration Example Document ID: 118859 Contributed by Mohammed Muddasir Khan, Cisco TAC Engineer. Mar 26, 2015 Contents Introduction Prerequisites Requirements
More information