Introduction to Networking

Deep dive into networking distech controls optigo networks transport and application layers

Do you struggle to communicate with your IT colleagues? Do they use concepts and language that go right over your head?

The worlds of IT and Operational Technology (OT) are merging more and more these days as the Internet of Things grows in prominence. This collaboration between IT and OT is great, but there are still gaps in understanding that keep us from fully working together.

We recently teamed up with Distech Controls to create an introduction to networking on the essentials of IT speak. We dug into key terms and concepts in IT networking and explained why networking is similar to the postal system. Our attendees left with a basic understanding of IT language, enabling them to participate in overall network design conversations.

Now, this intro to networking is only the beginning. Working on this webinar, we realized that we couldn’t fit such a massive topic into just one webinar. So we launched a five-part series with Distech, to really dig into networking. 

Check out our first Introduction to Networking webinar and read the recap here! You can also download the PDF notes from this presentation. 

The webinar dug into a lot of different topics including:

  • Network Layers (from 3:00 to 11:40)
  • Network Access (from 11:41 to 26:34)
    • Ethernet
    • Wi-Fi
    • Unmanaged vs. Managed Switches
    • VLAN
  • Internet (from 26:35 to 47:56)
    • IPv4
    • DHCP
    • Subnet
    • Gateway and NAT
    • IP Routing
    • DNS
    • Firewall and VPN
  • Transport & Application (from 47:57 to 50:49)
    • Transport Layer
    • TCP
    • UDP
    • Application Layer
    • Protocols

Network Layers

We started our presentation by dividing the network into several distinct layers. Now, there are a few different models you can use to better understand the network architecture. These have no real bearing on how your network is set up. The models are simply a logical way to understand how the different pieces function.

One popular model is OSI, which uses seven different layers including Physical, Data Link, Network, Transport, Session, Presentation, and Application. For this training session, we used the TCP/IP model, which we find is simpler, and is better for implementing IP-based controllers. The TCP/IP model includes Network Access, Internet, Transport, and Application.

Deep dive into networking distech controls optigo networks

Graphic via Distech Controls

Network Access

Network Access functions as the physical layer, defining how devices physically connect and send data through the network. The most common methods are Ethernet and Wi-Fi.

Ethernet connects some computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.

Advantages

  • Ethernet ports are common
  • Faster than wireless
  • Typically more secure
  • Greater stability

Disadvantages

  • Expensive to install
  • Not supported by mobile devices

Wi-Fi is the standard wireless local area network (WLAN) technology for connecting different electronic devices and the Internet. Wi-Fi is the wireless version of a wired Ethernet network, and it is commonly deployed alongside it.

Advantages

  • Lowered cost of install
  • Compatible with mobile phones and tablets
  • Better accessibility for technicians and other trades

Disadvantages

  • Slower than wired
  • Subject to interference
  • Typically less secure than wired

VLANs

VLANs (or Virtual Local Area Networks) are designed to help you isolate and segregate your network. You might do this for security purposes if there are multiple services connected to the same switch. Devices on VLAN-10 in the diagram below, for example, won’t be accessible from VLAN-20 or VLAN-30, or vice versa.

Say you had a lot of security cameras, and you wanted to make sure that only those cameras and the devices that work directly with them were connected. You can segregate your security camera system from unrelated other building automation systems, such as lighting, HVAC, and the like.

VLANs are a secure, efficient way to do all of this, compared with subnets which are internetworked and require individual switches per subnet. In this diagram, we’ve added three different VLANs without adding any additional hardware.

Deep dive into networking distech controls optigo networks Virtual Local Area Networks VLANs

Graphic by Optigo Networks. 

Internet Layer

The Internet Layer is responsible for packaging data into IP datagrams, and routing those datagrams throughout the network.

A few protocols included at the Internet layer are IP (Internet Protocol), ICMP (Internet Control Message Protocol), ARP (Address Resolution Protocol), RARP (Reverse Address Resolution Protocol), and IGMP (Internet Group Management Protocol).

Some concepts we dug into on the webinar are Dynamic Host Configuration Protocol (DHCP), subnets, gateways, and Domain Name System (DNS).  

1) DHCP is a client/server protocol that automatically provides an IP host with its IP address, as well as other configuration information like the subnet mask and default gateway.

2) Subnets are logical subdivisions of an IP network. The act of dividing a network into two or more networks is called subnetting. A subnet is basically a smaller network within a larger one. With subnets, we can control how much of the network sees our broadcast traffic.

3) Gateways are routers, by definition. Typically in a TCP/IP network, nodes such as servers, workstations, and network devices have a defined default route setting pointing to the default gateway. This defines where to send packets for IP addresses if they can’t determine a specific route.

4) DNS is the Internet’s system for converting alphabetic names into numeric IP addresses. When a web address (URL) is typed into a browser, DNS servers return the IP address of the web server associated with that name.

Deep dive into networking distech controls optigo networks

Graphic by Optigo Networks. 

Transport Layer

The Transport Layer is like a “language,” defining what protocols the devices on a network will “speak” with one another. There are lots of protocols, but the two you’ll most often work with on IP-based controllers are the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP).

TCP is considered a reliable transmission protocol because it re-orders unordered segments, and it will re-send any data that gets lost in the network. TCP has significantly more overhead than UDP, though, and does not allow for “one-to-many” messages.

UDP allows for multi-cast and is typically faster than TCP with less delay, assuming ideal network conditions. UDP is not considered reliable, though, since it does not typically make use of acknowledgments, retransmission of missing packets, or timeouts.

Application Layer

The Application Layer provides network services to applications. This is the layer that most people are familiar with, containing high-level protocols like HTTP, SNMP, SMTP, NTP, DNS, and BACnet. An easier way to understand the Application Layer is with another analogy: if the Transport Layer is like the “language” on a network, the Application Layer is the subject that’s being discussed.

Deep dive into networking distech controls optigo networks

Graphic via Distech Controls


We hope you enjoyed this introductory webinar! Be sure to check out our deep dives on Network Access, Internet, Transport and Application, and Designing a Network with Distech Controls’ ECLYPSE and Optigo Connect.

Share This Post

Don't want to wait?

Sign up now to get posts delivered right to your inbox the moment they go live.

An overhead photograph of a solar farm in an urban setting, possibly a parking lot.

How OT Networks Drive Decarbonization and Energy Efficiency

Energy efficiency is at the heart of many organizations’ policies to address their overall carbon footprints. For facilities operators, campus managers, and their vendors, the drive to decarbonize falls under their purview. Let’s look at what exactly decarbonization is, what impacts this policy has on OT networks, and some of the ways facilities and systems integrators have begun to tackle the problem.

Read More »
A photograph of a blue pad lock on top of an open laptop

Is BACnet/SC the Key to Securing OT Networks?

The success of BACnet/SC will depend on how widely it is adopted and how well it integrates with other security technologies. That said, with the right implementation strategies, and a focus on maintaining flexibility and interoperability, BACnet/SC has the potential to play a central role in securing OT networks against future threats.

Read More »

How OptigoVN Helps Hardware Sales

Selling hardware to your customers is a net positive for everyone. So how do you encourage customers to break into their budgets for upgrades and replacements? Leveraging OptigoVN is a great way to bring data-based proof to your customers when it comes time to make recommendations.

Read More »