Professional Documents
Culture Documents
Network Solutions For Tunnel Automation 1614004261
Network Solutions For Tunnel Automation 1614004261
Summary
Abstract
work under specific tunnel conditions to provide
This white paper concentrates on guidelines for uninterrupted communication.
connecting tunnel applications by discussing each
pertinent network layer to meet the industrial
requirements.
Background
PHOENIX CONTACT 2
1 Industrial controllers
Whitepaper | Network solutions for tunnel automation Industrial controllers
Traffic detection
Power supply
Uninterruptible power supply
Data / Measurement and control signals
The majority of applications inside a tunnel are all its devices. This proven technology has been
of industrial nature. Some examples of these used for many years as the main communication
applications are (emergency) lighting, pump technology.
stations, ventilation, gas detection, radar vehicle
detection, … The second group describes devices which have a
network connection. This means all communication
Most industrial systems work using a central con- between the controller and these devices can be
troller or PLC. This controller is the beating heart sent over the tunnel network. The main difficulty is
of the industrial application. It is able to retrieve that industrial communication protocols can require
data from sensors in the field, process this data and specific functionalities or hardware to be present in
control devices based on these inputs. order to guarantee the real-time requirements or
redundancies of the applications. Some examples
The controller can use a network connection in are Profinet, EtherNet/IP, OPC UA, Modbus/TCP,
order to communicate with a SCADA solution or …
to be remotely controlled. The connection to the
sensors and devices in the field can be divided in At this moment, there is an ongoing shift from
2 groups: Serial and Ethernet connections. serial devices towards Ethernet connected devices.
Due to the growing number of these network
The first group uses a serial bus like RS232 or connected devices and their specific requirements,
RS485 in order to talk to the end devices. This the importance of a good design of tunnel
means the controller is connected directly with networks will continue to grow in the future.
PHOENIX CONTACT 4
2 Technical description
Whitepaper | Network solutions for tunnel automation Technical description
6 Presentation layer
• Specifies architecture independent data transfer format
• Encodes and decodes data
5 Session layer
• Manages user sessions and dialogues
• Controls establishment and termination of logical links between users
4 Tranport layer
• Ensures delivery of files and messages
PHOENIX CONTACT 6
3 Layer 1 (L1)
Whitepaper | Network solutions for tunnel automation Layer 1
CAT5e CAT6A
PHOENIX CONTACT 8
Whitepaper | Network solutions for tunnel automation Layer 1
• Impervious to electromagnetic interference connectors have single mode and multimode toler-
• Infinite galvanic isolation against potential ances. Some advantages of the LC Fiber connector
equalizing currents and in high voltage distribution include:
• Light cannot catch on fire (not a fire hazard)
• Less prone to damage in comparison to copper • System cost reduction. The LC connector is half
wires the size of the traditional SC connector. There-
fore, it can double fiber density in shelves and
OM (Optical Multimode fiber) & outlets.
OS (Optical Single mode fiber) • Polarized feature helps maintain the transmitting/
receiving direction and assures high repeatability
Fiber optic cables are broadly categorized in two • Anti-snag latch, which improves durability and
types – Single mode fiber and multimode fiber reduces rearrangement work caused by the cross
cables. The main difference between them is in the connection
core diameter. OM multimode fibers have a much • Time-saving for installation, because there is no
larger core size. The large core gives OM cables need to install the field mountable connectors.
a higher light-gathering capacity compared to OS
cables. OS cables require more expensive laser Optical Transceiver
sources.
The SFP (Small Form-factor Pluggable) transceiver
OS cables are typically used for long distance (up to is a widely used compact and pluggable module.
80km), higher bandwidth applications. This transceiver mainly acts as an interface between
a networking device and its fiber optic cable. SFP
OM cables are typically used for short distance (up uses LC fiber optic connector for its interface.
to 2km), data and audio/video applications in LAN’s. This module has a robust design and performs
conversions between optical signals. They are
There is no possibility to mix single mode and flexible due to a wide range of detachable interfaces
multimode fiber. Due to their size difference in the to multimode/single-mode fiber optics.
core and different light mode transmission, it is not
recommended to combine them since it will result
in a large amount of optical loss.
Patch panels
Optical Connector
A patch panel or patch bay is a panel that houses
An optical connector is a flexible key piece that is cable connections. It contains Ethernet ports that
placed on each end of a fiber optic cable. A large are used to connect and manage incoming and
variety of fiber connectors are available such as outgoing LAN cables. The patch panel ports are
LC, SC, ST, FC, … Among them, the LC fiber optic configured to accommodate Ethernet cables in an
connector is one of the most common types. The enterprise network. It serves as a sort of static
LC connector is a small form factor (SFF) con- switchboard. Patch panels are recommended to
nector, which is designed to join LC fibers where have surge protection. This protects devices and
a connection or disconnection is required. LC applications against sudden high voltages. With the
PHOENIX CONTACT 9
Whitepaper | Network solutions for tunnel automation Layer 1
use of patch panels, troubleshooting will become A PoE system is consisted of minimum four pieces
easier, avoiding a time-consuming cabling issue. Its of equipment:
primary benefit is creating a structure in your large
local network. This becomes necessary once a 1. Power Sourcing Equipment (PSE)
network expands. A patch panels serves to have no A PSE is a device which supplies power to the
other function except for acting as a connector. rest of the system. It will draw power from its
own conventional power source and provide
power to the rest of the PoE system.
Copper-based patch panels
Copper patch panels have the insulation displace- 2. Powered Device (PD)
ment connector style on one side and 8-pin mod- A PD is a device which receives power from
ular ports on the other. Wires coming into the the PSE device. It does not require its own
panel are therefore terminated to the insulation conventional power source.
displacement connector. On the opposite side,
the 8-pin modular connector plugs into the port 3. Ethernet cable
which corresponds to the terminated wires. With The Ethernet cable is the power and data
the copper patch panel, each pair of wires has an transmission medium of a PoE system. It is
independent port. used to provide the link between two devices
enabling bi-directional communication and
uni-directional supply of power.
Fiber optic patch panels
Fiber patch panels require two ports for a pair of 4. Power Supply
wires. One port is responsible for the transmitting There must be a power source from which the
end while the other looks after the receiving end. PSE draws power. Typically, a PoE system is
A fiber optical cable needs be split at one end in powered by a nominal power source.
order to gain access to the individual fibers.
Power sourcing equipment Power sourcing equipment Powered device Powered device
Power over Ethernet (PoE)
PHOENIX CONTACT 10
Whitepaper | Network solutions for tunnel automation Layer 1
Power
Sourcing Powered
Power
Equipment Device
Powered
Sourcing
(PSE) (PD)
Device
Equipment
(PSE) (PD)
3 3
3 3
Data pair Data pair
Data pair 6 6 Data pair
6 6
A
A
3 3
Data pair Data pair
Data pair 6 6 Data pair
6 6
B
B
PHOENIX CONTACT 11
Whitepaper | Network solutions for tunnel automation Layer 1
PoE Standards
IEEE Standard IEEE 802.3af IEEE 802.3at (PoE+) IEEE 802.3bt (PoE++)
Voltage 44 – 57 V DC 50 – 57 V DC 50 – 57 V DC
PHOENIX CONTACT 12
Whitepaper | Network solutions for tunnel automation Layer 1
PoE Splitter
cally enable power. Managed PoE switches provide
Splitters are generally used to divide the data advanced network features and remote manage-
and power from an existing PoE cable so power ment capabilities. They are extremely useful when
can be redirected into the end device using more combined with PoE because the PoE power budget
conventional means, such as a DC power cable. can be managed from a central location, typically
This also results in 48V DC can be reduced to 24 V via a website based graphical user interface (GUI).
DC. They act as an intermediary device between a The switches use the original PoE standard (IEEE
compliant PSE and a non-compliant PD. 802.3at), which provides up to 15 W (per port)
to each powered device. There more supported
standards (IEEE 802.3af & bt), which can provide
PoE Switch
30 W per port.
A PoE switch is a network component that has
built in PoE injection. When connected with In conclusion, a PoE switch is an all-in-one box with
other n etwork devices, the switch will detect no additional appliance with ports that needs to be
whether they are PoE-compatible and automati- used to manage both network and power.
PHOENIX CONTACT 13
4 Layer 2 (L2)
Whitepaper | Network solutions for tunnel automation Layer 2
PHOENIX CONTACT 15
Whitepaper | Network solutions for tunnel automation Layer 2
Redundant ring
Configuration com- Simple (Master & Slave) Medium (root bridge, priority)
plexity
PHOENIX CONTACT 16
Whitepaper | Network solutions for tunnel automation Layer 2
PHOENIX CONTACT 17
5 Layer 3 (L3)
Whitepaper | Network solutions for tunnel automation Layer 3
The final media layer supervises the rout- filtering of packets is based on specific protocol
ing, control and logical addressing of data information and communication is contained within
and traffic on the network. A considerable specific IP subnets. Some of the reasons for utilizing
threat to application security on this layer Layer 3 routing are network segmentation, broad-
is IP address or packet spoofing, where data cast firewall security, intelligent wide area route
packets originating from malicious sources connectivity as well as overall relief from bandwidth
are cloaked so that they appear to come congestion.
from legitimate addresses within a network. The first feature you would expect to see on a
Route and anti-spoofing filters in conjunction switch that makes it no longer strictly L2 is static
with strongly configured firewalls can provide routing. The next stand out feature on a L3 switch
optimal security on this layer. is dynamic routing. The ability to support Dynamic
Routing Protocols is one of the true identifiers of a
Layer 3 switch. Dynamic Routing Protocols are used
to link large networks together and share rout-
Router / L3 Switch ing tables between them. They can also allow for
dynamic routing of multicast traffic on the network.
While switches allow different devices on a net-
work to communicate, routers allow communica-
tion between different networks. Forwarding and
LWL / FO
Tunnel control center Ethernet
Power over Ethernet
Feldbus
WAN
PHOENIX CONTACT 19
Whitepaper | Network solutions for tunnel automation Layer 3
Layer 3 at
automation level
LWL / FO
Ethernet
Subnetwork 1 Subnetwork 2 Power over Ethernet
Feldbus
PHOENIX CONTACT 20
Whitepaper | Network solutions for tunnel automation
When a router is defined as a static default gateway functions independently on any physical device. The
and no other dynamic routing protocol is being virtual router acts as a standalone network gateway
utilized, the gateway becomes a critical point in for all network devices in a tunnel’s LAN network.
the network. If that router fails, that critical link The VRRP eliminates the single point of failure
would be broken and all required network devices inherent in the static default routed environment.
in a tunnel for example, would not be providing or VRRP specifies a form of an ‘election’ protocol that
receiving any data in different subnetworks. There- dynamically assigns responsibility for a virtual router
fore, it should be taken into consideration to set to one of the network devices in a tunnel. The
up another router or routers as backup(s) that can physical router controlling the IP address associ-
serve as the static default gateway. ated with a virtual router is called the Master, and
It is possible to tell switches in a tunnel to use a forwards packets sent to those IP addresses. When
different gateway by adding extra interfaces and the master becomes unavailable, a Backup physical
routes on the switches (which adds to complex- router takes the place of the master. Utilizing
ity of the network and also slows down network VRRP guarantees network availability, stability and
communication at switch its level). Another alter- continuity.
native is to possess a virtual gateway or router that
PHOENIX CONTACT 21
5 Network segmentation
(VLANs)
Whitepaper | Network solutions for tunnel automation Network segmentation (VLANs)
LWL / FO Router
Ethernet
Power over
Ethernet
Feldbus
Switch
PHOENIX CONTACT 23
Whitepaper | Network solutions for tunnel automation Network segmentation (VLANs)
VPN tunnel
to personal data for commercial benefit or targeted if systems are connected to the internet. Cyber
attack. A VPN is very useful for users connecting security is an essential part for critical infra-
on public internet networks, because it can hide the structure. Due to the ever-increasing connectivity
IP address of users thereby preventing continuous of Industrial Control Systems (ICS), the attack
tracking of devices. A VPN can also be used for surface becomes larger.
protecting internet traffic. In general, a VPN is very
effective at encrypting all internet traffic and can ISA/IEC 62443 is a series of published international
ensure that all data is kept hidden. standards, developed by the ISA99 committee
and adopted by the International Electrotechnical
Commission (IEC) that focuses on the operational
technology (OT) and covers all aspects of secu-
Cyber security in a tunnel rity (processes, people, technology). It addresses
the different roles and responsibilities of the asset
owner, operator, maintainer, integrator and product
IEC 62443 Standards – a cornerstone of supplier. The process of the standard results in
industrial cyber security a collection of documentation, procedures and
When thinking of cyber threats, we immediately technologies. The objective of the standard is to
think of identity theft and other cyber-attacks reduce the risk, including prevention or mitigation
affecting sensitive information technology (IT). of cyber-attacks.
However, cyber threats to operational technology
(OT) systems can affect critical infrastructure and By complying with the IEC 62443 series of stan-
might result in serious consequences. Systems that dards, you have the protection of your tunnel
control the operations of chemical plants, water/ operational systems against vulnerabilities. The
utilities, power, … all face cyber threats. Especially compliance report gives insight at the current
PHOENIX CONTACT 24
Whitepaper | Network solutions for tunnel automation Network segmentation (VLANs)
maturity of the tunnel controls that you wish to be does not end at the monitor and maintaining phase.
assessed against. Because the framework consists of The cycle is repeated with the goal of improving
different modules, you can determine which one is cybersecurity maturity and getting as close to the
more applicable. Since the process is a life cycle, it defined target security levels as possible.
Office
ISO 27000 IT-Network
Information security
management systems – IT
Requirements
Factory
Backbone-Network
Production-Network
(DMZ)
IEC 62443 ICS
Industrial network Industrial Control
and system OT Systems
security
Machine-Network
Overview of a VPN
connection between Tunnel
control center and tunnel
ISA-62443-4-1 ISA-62443-4-2
Secure product Technical security
development lifecycle requirements for IACS
requirements components
PHOENIX CONTACT 25
Whitepaper | Network solutions for tunnel automation Network segmentation (VLANs)
PHOENIX CONTACT 26
6 Network
management system
Whitepaper | Network solutions for tunnel automation Network management system
Tunnel applications are of critical importance. The mated network management systems (NMS). The
trend is towards larger, more complex networks increasing decentralization of network services are
supporting more applications and more users. As exemplified by the increasing importance of work-
these tunnel applications grow in scale, two facts stations. Client/Server computing makes coherent
become painfully evident: and coordinated network management increasingly
difficult. In such complex information systems,
• Each tunnel network and its associated resources significant network assets are dispersed far from
become indispensable to tunnel control centers network management personnel.
• More things can go wrong, disabling the network
or a portion of the network or degrading perfor- For any tunnel network environment, what is
mance to an unacceptable level needed is an NMS that includes a comprehensive
set of data gathering and control tools that is
integrated with the network hardware. An NMS is
A large tunnel network cannot be put together and designed to view an entire tunnel network infra-
managed by human effort alone. The complexity structure as a unified architecture, with addresses
of such infrastructure dictates the use of auto- and labels assigned to each point/node and the
PHOENIX CONTACT 28
Whitepaper | Network solutions for tunnel automation Network management system
specific attributes of each element and link known Simple Network Management Protocol (SNMP)
to the NMS. The active elements of the tunnel net- was developed for use as a network management
work provide regular feedback of status information tool for networks operating TCP/IP. The model
to the tunnel control center. Each network compo- of network management that is used for SNMP
nent in a tunnel contains a collection of software includes the following elements:
devoted to the network management task:
• Management station / Manager (interface
• Collect statistics on communications and between human network manager and NMS)
network-related activities • Agent (Hosts, bridges, routers…)
-- Respond to commands from the tunnel control • Management information base (Collection of
center, including commands to; objects from a manageable node)
-- Transmit collected data to the tunnel control • Network management protocol (SNMP)
center
-- Change a parameter (e.g. a timer used in a Many of the functional deficiencies of SNMP
transport protocol) were addressed in SNMPv1/v2. To correct the
-- Provide status information security deficiencies, SNMPv3 was issued as a
-- … set of proposed standards. SNMPv3 provides
three important services that are crucial to any
• Send messages to the tunnel control center when critical infrastructure (authentication, privacy and
local conditions undergo a significant change. access control).
PHOENIX CONTACT 29
7 Network performance
monitoring (NPM)
Whitepaper | Network solutions for tunnel automation Network performance monitoring (NPM)
The increasing demand of a proper network and after updates are made and monitoring
performance should also be acknowledged performance on an ongoing basis are the
and is more important than ever before. only valid methods to fully ensure the quality
When delivering services and applications of a network. While measuring and moni-
for tunnels, network downtime, bandwidth toring network performance parameters
issues and bottlenecks can quickly escalate are essential, the interpretation and actions
into a serious issue. Pro-active network per- stemming from these metrics are just as
formance management solutions that detect critical to understand.
and diagnose performance issues are the
best way to ensure a solid network infras- When looking for a tailor-made solution for
tructure for tunnels. The performance of a monitoring the performance of a network
network can never be fully modeled, so mea- infrastructure, please feel free to contact the
suring network performance before, during authors of this white paper.
PHOENIX CONTACT 31
Whitepaper | Network solutions for tunnel automation Network performance monitoring (NPM)
Tunnel #1
Programmable
controller
Fiber-optic Application #n
Ethernet
Power over Ethernet
Feldbus Ventilation
PHOENIX CONTACT 32
8 Use case
(Train Tunnel Project)
Whitepaper | Network solutions for tunnel automation Use Case (Train Tunnel Project)
The Train Tunnel Project is a key example tunnel infrastructure. A number of tunnel
of why a good network design is essential techniques were connected to the network:
for secure and reliable communication in a
Firecentral
Technical room 1 Technical room 2
L2 Switch
Server room
Railway tunnel
MSP-x
LWL / FO
Ethernet
TL Sensors Lighting Emergency exit
Power over Ethernet every 20 m
Feldbus
• TMS: Tunnel Management System • Integration of sump pits - smoke curtains – eleva-
• BRS: Automated Fire Scenario’s tors – excavators - platform lighting
• DEG: Dynamic Evacuation Guidance • Main tunnel lighting and tunnel entrance lighting
• Development of static evacuation signs with built • T-switches - failsafe off-switching of the catenary
in acoustic alarming and integration of SwareFlex (ProfiSafe)
emergency lighting • Integration of L20 measurements and slumber
• Emergency doors luminance
• Train localisation
• RWA: Smoke- and heat extraction
• HVAC: Heat, Ventilation and Airconditioning
PHOENIX CONTACT 34
Whitepaper | Network solutions for tunnel automation Use Case (Train Tunnel Project)
For the Train Tunnel Project, a backbone communi- Key to the design was redundancy and a secure
cation using PROFINET was chosen. The network communication, which also translates into ring
was designed with: networks and redundant layers and even servers.
Designing a network for a tunnel infrastructure
• 1 Backbone ring: needs to take care of all communication needs,
-- >20 switches considering safety, security and bandwidth
-- >8 Remote field controllers requirements, over a fail-safe, redundant design.
-- >2 redundant SQL Servers
• 12 Subrings:
-- ~100 switches
-- >100 Programmable controllers
-- 13km or >2500 DEG-profiles
PHOENIX CONTACT 35
9 Products and solutions
Whitepaper | Network solutions for tunnel automation Products and solutions
2m 1403929 1413161
3m 1403930 1413162
5m 1403933 1413163
10 m 1403934 1413164
15 m 1410797 1413165
20 m 1423033 1413166
PHOENIX CONTACT 37
tunnel automation Products and solutions
Whitepaper | Network solutions for tunnel automation
LC Duplex LC Duplex
(OM2*/Multimode) (OS2*/Single mode)
1m 2989158 2989187
2m 2989255 2989284
5m 2901799 2901826
*Fiber optical cables such as OM2, OM4 and OS1 are also available.
LC Duplex Single
Multimode
Coupler module mode
Distances Up to 550 m Up to 10 km
PHOENIX CONTACT 38
Whitepaper | Network solutions for tunnel automation Products and solutions
Transmission
Product Port Wavelength Order no.
speed
PHOENIX CONTACT 39
10 Copper-based
patch panels
Whitepaper | Network solutions for tunnel automation Copper-based patch panels
PHOENIX CONTACT 41
Whitepaper | Network solutions for tunnel automation Copper-based patch panels
Cable shield
Using an RJ45 socket Toolless using shield contact spring
protection
PHOENIX CONTACT 42
11 Fiber-optical
splice boxes
Whitepaper | Network solutions for tunnel automation Fiber-optical splice boxes
Main features
FOC-SB-FR19: FOC-SB-FR19:
FOC-FDX20- FOC-FDX20-
Product 1U-LCD12- 1U-LCD24-
PP-LCD6-MM PP-LCQ6-MM
OM4 BK OM4 BK
Mounting type DIN rail DIN rail 19” mounting 19” mounting
PHOENIX CONTACT 44
12 Injectors
Whitepaper | Network solutions for tunnel automation Injectors
PoE Standard Prepared for IEEE802.3 af/at (PoE+) Prepared for IEEE802.3 bt (PoE++)
PHOENIX CONTACT 46
13 PoE Splitter
Whitepaper | Network solutions for tunnel automation PoE Splitter
Thanks to the support of Gigabit and Fast Ethernet, The PoE splitter can be used for all automation
the PoE splitter can be used for any transmission protocols, because it does not interfere with data
speed. Furthermore, the switch supports both PoE transmission.
Output voltage 24 V DC
PHOENIX CONTACT 48
14 Managed Switches
Whitepaper | Network solutions for tunnel automation Managed Switches
Flexible use
PHOENIX CONTACT 50
Whitepaper | Network solutions for tunnel automation Managed Switches
ETH 1 ETH 2
LNK LNK
US ACT ACT
X21 X22
MODE
RDY BF SF
XF XF
1 5 PWR IN PWR OUT
US
XF XF UA
2 6 X31 X32
XF XF
3 7
30 31
X01 X02
XF XF
4 8
32 33
X03 X04
UA UA
X05 X06
XD1
UA UA
X07 X08
1 2 3 4 5
LINK ACT
70 71 72 73 74 75 76 77
60 61 62 63 64 65 66 67
X1
50 51 52 53 54 55 56 57
2701450
DI64/1
X2
LINK ACT
40
70
60
50
40
41
71
61
51
41
42
72
62
52
42
43
73
63
53
43
44
74
64
54
44
45
75
65
55
45
46
76
66
56
46
47
77
67
57
47
Configuration
Diagnosis
AXC 1050
2700988
BF RUN
SF FAIL
DBG
D D 00 01 02 03 04 05 06 07
E UI 10 11 12 13 14 15 16 17
20 21 22 23 24 25 26 27
30 31 32 33 34 35 36 37
a1 00 01 02 03 04 05 06 07
X3
SD-CARD
RUN/PROG a2 10 11 12 13 14 15 16 17
STOP
Controller
MRESET
b1 20 21 22 23 24 25 26 27
b2 30 31 32 33 34 35 36 37
LINK ACT
70 71 72 73 74 75 76 77
60 61 62 63 64 65 66 67
X1
50 51 52 53 54 55 56 57
2701450
DI64/1
X2
40 41 42 43 44 45 46 47
70 71 72 73 74 75 76 77
60 61 62 63 64 65 66 67
LINK ACT 50 51 52 53 54 55 56 57
BK PN 40 41 42 43 44 45 46 47
2701815
BF RDY
SF
D
E D 00 01 02 03 04 05 06 07
UI 10 11 12 13 14 15 16 17
20 21 22 23 24 25 26 27
30 31 32 33 34 35 36 37
a1 00 01 02 03 04 05 06 07
Switch X3
UL
a2 10 11 12 13 14 15 16 17
Bus coupler
a1 b1 b1 20 21 22 23 24 25 26 27
a2 b2
2 b2 30 31 32 33 34 35 36 37
Redundancy mechanisms are essential for failsafe In addition, errors in the network can be quickly
networks. The 2300 Managed Switches support localized and remedied, thanks the numerous
various redundancy mechanisms such as RSTP, diagnostic functions. Also, important device
Large Tree Support, Fast Ring Detection and Media information can be accessed during remote
Redundancy Protocol (MRP). The switches thus maintenance.
ensure that down_times are minimized through
media redundancy, irrespective of the manufacturer. In the event of a device failure, DHCP server
Furthermore, these functions prevent network functions for assigning IP addresses allow the
errors caused by inadvertently created loops and defective device to be replaced quickly and easily.
enable a ring structure in PROFINET environments.
PHOENIX CONTACT 51
Whitepaper | Network solutions for tunnel automation Managed Switches
FL SWITCH 2300/2500
Filter functions -
VLAN Yes
Redundancy
Management functions
Automation protocols
PHOENIX CONTACT 52
Whitepaper | Network solutions for tunnel automation Managed Switches
PHOENIX CONTACT 53
15 FL Switch 4000 Series
(Power Over Ethernet)
Whitepaper | Network solutions for tunnel automation FL Switch 4000 Series (Power Over Ethernet)
The 4000 series managed With the PoE watchdog function, you can moni-
PoE switches supply end tor your PoE end devices to ensure that they are
devices with up to 60 W functioning correctly. Here, the switch sends a ping
per port. They are also to the powered device (PD) at regular intervals.
suitable for use in appli- After a configurable number of unanswered pings,
cations with end devices a power cycle is performed. The PD is restarted.
that comply with the With this approach, end devices that stop function-
pre-standard IEEE 802.3bt ing due to a malfunction during operation can be
(PoE++), such as high-power cameras. returned to the correct state, without the interven-
tion of a service technician. As an alternative, the
PoE Switch can also shut the PD down completely.
The 4000 series Managed PoE Switches enable you PoE scheduler function
to make user-defined PoE settings. The PoE func-
tion can be activated or deactivated for each port With the PoE scheduler, you can plan the days
separately for example. In addition, a PoE prioriti- and times during which the switch makes Power
zation feature is available and you can set maximum over Ethernet available to your end devices. This is
power budgets. This ensures that in the event of useful when end devices are only needed at certain
any problems with the power supply of the switch, times of the day. You thus reduce the consumption
your most important devices continue to be sup- of electricity and the data load on your network
plied with PoE. during the remaining periods.
PHOENIX CONTACT 55
Whitepaper | Network solutions for tunnel automation FL Switch 4000 Series (Power Over Ethernet)
Ports and Transmission speed 8 x RJ45 (PoE) 10/100 Mbps, 2x SFP 1000 Mbps
Alarm contact Yes
Temperature range -40°C ... +75°C
Degree of protection IP30
Supply voltage 52 … 55 V DC, redundant
PHOENIX CONTACT 56
16 Smart Camera Box
Whitepaper | Network solutions for tunnel automation Smart Camera Box
Surge protection
Wal/pole mount
PHOENIX CONTACT 58
Whitepaper | Network solutions for tunnel automation Smart Camera Box
Features
Product portfolio
Variants
Camera ports 4x RJ-45 (PoE) 2x RJ-45 (PoE) 4x RJ-45 (PoE) 2x RJ-45 (PoE)
Type SCX 4POE 2LX SCX 2POE 2LX SCX 4POE 2T SCX 2POE 2T
PHOENIX CONTACT 59
17 FL Switch
4800E Series
Whitepaper | Network solutions for tunnel automation FL Switch 4800E Series
FL SWITCH 4800E
Filter functions
VLAN Yes
Redundancy
MRP manager/client No / No
PHOENIX CONTACT 61
Whitepaper | Network solutions for tunnel automation FL Switch 4800E Series
FL SWITCH 4800E
Management functions
DHCP server No
Automation protocols
PROFINET IO device No
PHOENIX CONTACT 62
18 Layer 3
switches
Whitepaper | Network solutions for tunnel automation Layer 3 switches
PHOENIX CONTACT 64
Whitepaper | Network solutions for tunnel automation Layer 3 switches
STP STP
MRESET MRESET
functions LNK
LAN
1.1
ACT
LNK
LAN
1.2
ACT
LNK
RFC 470S PN 3TX
Ord.No 29 16 79 4
I/O LNK
LAN
1.1
ACT
LNK
LAN
1.2
ACT
LNK
RFC 470S PN 3TX
Ord.No 29 16 79 4
I/O
WAN
LAN LAN
USB USB
2 2
ACT ACT
24 VDC 24 VDC
+ +
REMOTE
REMOTE
COM1
COM1
– –
XF XFF
1 5
RSTP
• Integration in PROFINET control environments,
XF XFF
2 6
XF XFF
3 7
XF XFF
4 8
FL NAT 2000
XD1
XF XF XF XF
XF XF
6 2
XF XF
7 3
1 2 3 4 5 1 2 3 4 5
FL NAT 2304-2GC-2SFP
4 x RJ45
Ports 2 x combo ports (SFP/RJ45)
2x SFP
PHOENIX CONTACT 65
Whitepaper | Network solutions for tunnel automation Layer 3 switches
FL NAT 2304-2GC-2SFP
Filter functions
VLAN Yes
Redundancy
Management functions
Automation protocols
PHOENIX CONTACT 66
Whitepaper | Network solutions for tunnel automation Layer 3 switches
Basic Features
VLAN + QoS 802.1p(Cos), 8 queues per port, 802.1Q (Tagged frames), GVRP
802.1D (STP),
L2 Redundancy 802.1W (RSTP),
802.1S (MSTP)
Static Routing,
RIPv2,
L3
OSPFv2,
VRRP (Router redundancy)
PHOENIX CONTACT 67
19 FL SWITCH
EP7400 Series
Whitepaper | Network solutions for tunnel automation FL SWITCH EP7400 Series
Front
PHOENIX CONTACT 69
Whitepaper | Network solutions for tunnel automation FL SWITCH EP7400 Series
PHOENIX CONTACT 70
Whitepaper | Network solutions for tunnel automation
Tunnel
core zone
Critical
infrastructure
network
Local tunnel
distribution zone
VRRP
Local tunnel
Redundancy Protocol Redundancy Protocol access zone
Local tunnel
control zone
a 0 1 2 3 a 0 1 2 3 a 0 1 2 3 a 0 1 2 3 a 0 1 2 3 a 0 1 2 3
D 00 01 02 03 D 00 01 02 03 D 00 01 02 03 D 00 01 02 03 D 00 01 02 03 D 00 01 02 03
UA 10 11 12 13 UA 10 11 12 13 UI 10 11 12 13 UA 10 11 12 13 UA 10 11 12 13 UI 10 11 12 13
E1 20 21 22 23 E1 20 21 22 23 20 21 22 23 E1 20 21 22 23 E1 20 21 22 23 20 21 22 23
E2 30 31 32 33 E2 30 31 32 33 30 31 32 33 E2 30 31 32 33 E2 30 31 32 33 30 31 32 33
a1 00 01 02 03 a1 00 01 02 03 a1 00 01 02 03 a1 00 01 02 03 a1 00 01 02 03 a1 00 01 02 03
a2 10 11 12 13 a2 10 11 12 13 a2 10 11 12 13 a2 10 11 12 13 a2 10 11 12 13 a2 10 11 12 13
b1 20 21 22 23 b1 20 21 22 23 b1 20 21 22 23 b1 20 21 22 23 b1 20 21 22 23 b1 20 21 22 23
b2 30 31 32 33 b2 30 31 32 33 b2 30 31 32 33 b2 30 31 32 33 b2 30 31 32 33 b2 30 31 32 33
PLC PLC
PHOENIX CONTACT 71
20 FL Switch
GHS Series
Whitepaper | Network solutions for tunnel automation FL Switch GHS Series
PHOENIX CONTACT 73
Whitepaper | Network solutions for tunnel automation FL Switch GHS Series
FL Switch IN6908-
FL Switch GHS 4G/12 FL Switch EP7400
16SFP-4SFP+
Modular Yes Yes No
Redundancy RSTP, LTS, MRP STP, RSTP, MSTP STP, RSTP, MSTP
functions (Manager/Client) VRRP VRRP
VRRP
PHOENIX CONTACT 74
21 FL Network
Manager
Whitepaper | Network solutions for tunnel automation FL Network Manager
PHOENIX CONTACT 76
Whitepaper | Network solutions for tunnel automation
Contact
Evaluation and planning: Inspect and analyze your individual threat and risks
Implementation: On-site assistance and increasing performance and availability
Maintenance and support: Eliminating anomalies and identify security gaps
Seminars: Providing awareness instructions and practical tailored training sessions
https://phoe.co/TunnelTechnology
77