Browse Prior Art Database

INDUSTRIAL ETHERNET PROTOCOL SNOOPING BASED SOFTWARE-DEFINED ACCESS UNDERLAY TOPOLOGY PROPAGATION

IP.com Disclosure Number: IPCOM000251931D
Publication Date: 2017-Dec-11
Document File: 4 page(s) / 355K

Publishing Venue

The IP.com Prior Art Database

Related People

Nagendra Kumar Nainar: AUTHOR [+2]

Abstract

Techniques are provided for using Industrial Ethernet (IE) switches to snoop Process Field Net (PROFINET) protocols (e.g., alarms, Discovery and Configuration Protocol (DCP), etc.) and exchange relevant information with a Fabric Edge Node (FEN) via an out of band mechanism to provide efficient end-to-end service delivery. This may enable populating a mapping server and signaling the loss of a PROFINET device.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 54% of the total text.

Copyright 2017 Cisco Systems, Inc. 1

INDUSTRIAL ETHERNET PROTOCOL SNOOPING BASED SOFTWARE- DEFINED ACCESS UNDERLAY TOPOLOGY PROPAGATION

AUTHORS: Nagendra Kumar Nainar

Carlos M. Pignataro Rajiv Asati

CISCO SYSTEMS, INC.

ABSTRACT

Techniques are provided for using Industrial Ethernet (IE) switches to snoop

Process Field Net (PROFINET) protocols (e.g., alarms, Discovery and Configuration

Protocol (DCP), etc.) and exchange relevant information with a Fabric Edge Node (FEN)

via an out of band mechanism to provide efficient end-to-end service delivery. This may

enable populating a mapping server and signaling the loss of a PROFINET device.

DETAILED DESCRIPTION

Digital Network Architecture (DNA) (e.g., Cisco DNATM) may have characteristics

that enable secured and automated fabric deployment and connectivity. Internet of Things

(IoT) solutions may be deployed over a DNA / Software Defined Access (SDA)

architecture to leverage existing benefits. Figure 1 below illustrates a conventional example

deployment that includes an SDA network.

Copyright 2017 Cisco Systems, Inc. 2

Figure 1

It is anticipated that one of the IoT deployments over SDA will be Layer 2 (L2)

Virtual Private Network (VPN) based, where the Programmable Logic Controller (PLC)

and Input/Output (I/O) devices may reside within the same L2 network that spans across

different sites (over an SDA network). Such an IoT deployment raises many issues,

including: (1) how the mapping server can be populated with the Internet Protocol (IP) /

Media Access Control (MAC) details on each PLC/Controller/I/O device in a PROFINET

/ Device Level Ring (DLR) network; (2) how a Fabric Edge Node (FEN) node can learn

the IP/MAC Ethernet for Proxy Address Resolution Protocol (ARP) or Proxy Neighbor

Discovery (ND); and (3) how an FEN node can learn that a PROFINET device is down

and withdraw the MAC/IP address. As such, described herein are techniques for using

Industrial Ethernet (IE) switches to snoop PROFINET protocols (e.g., alarms, Discovery

Copyright 2017 Cisco Systems, Inc. 3

and Configuration Protocol (DCP), etc.) and exchange the relevant information with the

FEN via an out of band mechanism for efficient end-to-end service delivery.

In an SDA architecture, the mapping server may serve as...