Installation guide
Network Infrastructure for EtherNet/IP™
vi
4.8.3 Immediate-Leave Processing............................................................................................................. 4-48
4.9 Quality of Service in a Switched Network............................................................................................... 4-49
4.9.1 QoS Flow........................................................................................................................................... 4-50
4.9.2 Class of Service................................................................................................................................. 4-50
4.9.3 Priority Mechanisms.......................................................................................................................... 4-51
4.10 Virtual Local Area Networks................................................................................................................... 4-52
4.10.1 VLAN Trunking................................................................................................................................ 4-53
4.11 Multilayer Ethernet Switches................................................................................................................... 4-54
4.11.1 Layer 2 and Layer 3 Switching ......................................................................................................... 4-54
4.12 Achieving Deterministic Behavior .......................................................................................................... 4-56
4.13 Managing the Interface between Control and IT ..................................................................................... 4-56
5 DEPLOYING THE NETWORK.................................................................................................5-58
5.1 Validating the Integrity of the Physical Layer......................................................................................... 5-58
5.1.1 Link and Other Diagnostic LEDs...................................................................................................... 5-59
5.1.2 Ping Checks for TCP/IP Continuity .................................................................................................. 5-60
5.1.3 Switch Configuration and Management............................................................................................ 5-61
5.2 Putting Traffic on the Network................................................................................................................ 5-62
5.2.1 Characterization of EtherNet/IP Traffic ............................................................................................ 5-62
5.2.2 IP Addressing in EtherNet/IP Networks............................................................................................ 5-63
5.2.2.1 IP Addressing Example.................................................................................................................. 5-63
5.2.3 IP Multicast Traffic in EtherNet/IP Networks................................................................................... 5-64
5.3 Deployment Summary............................................................................................................................. 5-64
6 INFRASTRUCTURE APPLICATION SCENARIOS ..............................................................6-65
6.1 General Application Considerations........................................................................................................ 6-66
6.1.1 Multicast Traffic Management within a Control System .................................................................. 6-66
6.1.2 Control Device Sensitivity to Extraneous Traffic ............................................................................. 6-66
6.1.2.1 Potential for Traffic Overload ........................................................................................................ 6-66
6.1.2.2 Varying Sensitivity by Device Type ..............................................................................................6-67
6.1.3 Configurable Isolation of Enterprise and Control Traffic ................................................................. 6-67
6.2 Isolated Control Network with a Single Controller ................................................................................. 6-67
6.2.1 Systems with Low Device Counts..................................................................................................... 6-68
6.2.1.1 Use of Unmanaged Switches.......................................................................................................... 6-68
6.2.2 Systems with High I/O Count............................................................................................................ 6-71
6.3 Isolated Network with Multiple Controllers............................................................................................ 6-74
6.3.1 Multiple Single-Controller Systems without Data Sharing............................................................... 6-74
6.3.2 Multiple Single-Controller Systems with Data Sharing .................................................................... 6-75
6.3.3 Isolated Systems Summary................................................................................................................ 6-75
6.4 Enterprise-Connected and Integrated Control Systems ........................................................................... 6-76
6.4.1 Networks Connected via CIP Gateways............................................................................................ 6-76
6.4.2 Networks Integrated with Routers (or Layer 3 Switches) ................................................................. 6-77
6.4.3 Two Types of Integration.................................................................................................................. 6-77
6.4.3.1 Non-Interlock Connections ............................................................................................................ 6-77
6.4.3.2 Interlock Connections..................................................................................................................... 6-78
6.5 Application Summary.............................................................................................................................. 6-79
7 SELECTING COMPONENTS....................................................................................................7-80
7.1 Sealed Connectors: Key to Successful Operation.................................................................................... 7-80
7.1.1 Approved Sealed Version of RJ-45 Connectors................................................................................ 7-80
7.1.2 M12 “D”-Coded Connector for EtherNet/IP..................................................................................... 7-82