Overcoming network obfuscation

Some simple design guidelines and a little planning ahead can result in more straightforward communication system architecture.

10/29/2012


Within the field of manufacturing automation, we face hurdles unique to the ways industrial control systems communicate. This often leads to piecemeal approaches to communication architecture development and installation. With a careful approach, legacy communication systems can be converted to higher performing systems, capable of providing connectivity without sacrificing security.

With the ever growing need for real-time data related to manufacturing, two of the largest concerns are accessibility and security. While these two requirements, at first glance, appear to be at odds with each other, cues can be taken from existing IT technologies which can lead to successful communication architectures.

Hurdles

In many cases (especially in discrete manufacturing) there will exist many independent networks, resident on individual machines or production lines. In a case where these independent networks are not configured to be compatible with each other, additional care will need to be taken and production downtime may be required to allow for reconfiguration of devices on the network.

With control systems, each device or control system will require proprietary software to implement the configuration changes required for the network. Knowledge and training on these individual pieces of software and hardware are required to ensure all communication configuration changes will not affect the performance of the devices on the networks.

It is important to evaluate the network you are joining to ensure the new components fit properly into the existing network architecture. Often times, the introduction of new or replacement control systems cannot be completed without integrating into these existing (sometimes legacy) systems. These systems range in complexity and performance from simple unmanaged switches and a handful of devices, to large distributed networks employing various network management protocols. It is not uncommon to find architectures that have evolved over time, employing components from various vendors and a host of layers.

In systems where no IT direction is provided by the manufacturing facility, connectivity to the production line can become obfuscated. While this obfuscation itself can provide security through difficulty of discovery, it often creates complexities in accessing the communication networks for systems and individuals requiring access. Overly complex systems can also create instabilities in connectivity, reducing the consistency of information flow to and from the production lines.

Solutions

Several security and communications companies are focusing more on the unique needs of industrial production. Several methodologies are being put forth, but ultimately it is up to the control systems engineers and IT staff to implement the right technologies for a given facility(s).

There are a few basic performance criteria that need to be considered to ensure the proper technologies are implemented.  These are not listed in order of importance.

• Throughput per segment
• Fault tolerance
• Accessibility
• User authorization/licensing
• Remote connectivity/routing
• Segmentation
• Diagnostic coverage
• Network protocol requirements
• Software patching
• Antivirus coverage
• Expandability
• Physical environment
• Power requirements, and
• On-site support requirements.

Through the application of appropriate network architecture features, a balanced approach to network architecture can be achieved. The proper planning of such systems can reduce downtime, improve control system performance, and reduce support costs for manufacturing facilities. 

Any opportunity to ease the learning curve of understanding a network architecture should be taken. Many vendors are now providing solutions which can integrate into domain structures, providing single-point management of user authorization, as well as many other security features of a network. Many tools are now available to provide visual representations and point-and-click management for network appliances.

Secure networks do not necessarily need to be complex networks. Try to avoid creating multiple access paths between networks and don’t construct tiers of networks where they are not necessary. Avoid appliances which do not integrate user management with a domain structure, as this typically leads to simplified security, leaving vulnerabilities to intrusion either accidental or malicious. Try to stay with a single family of appliances as this will shorten the learning curve for IT personnel.

In the end, there is no magic-bullet solution for architectural design of networks. Common sense plays a large role as well as familiarity with the components. Calculations will need to be made on the front end, with an eye to expandability and reliability. Communication networks are no longer simple structures with simple components. Robust communication solutions require careful planning, which will ultimately provide more simplified and higher performing results.

This post was written by Karl Schrader. Karl is a senior engineer at MAVERICK Technologies, a leading system integrator providing industrial automation, operational support and control systems engineering services in the manufacturing and process industries. MAVERICK delivers expertise and consulting in a wide variety of areas including industrial automation controls, distributed control systems, manufacturing execution systems, operational strategy, and business process optimization. The company provides a full range of automation and controls services – ranging from PID controller tuning and HMI programming to serving as a main automation contractor. Additionally MAVERICK offers industrial and technical staffing services, placing on-site automation, instrumentation and controls engineers.



No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
Each year, a panel of Control Engineering editors and industry expert judges select the System Integrator of the Year Award winners.
Control Engineering Leaders Under 40 identifies and gives recognition to young engineers who...
Learn more about methods used to ensure that the integration between the safety system and the process control...
Adding industrial toughness and reliability to Ethernet eGuide
Technological advances like multiple-in-multiple-out (MIMO) transmitting and receiving
Virtualization advice: 4 ways splitting servers can help manufacturing; Efficient motion controls; Fill the brain drain; Learn from the HART Plant of the Year
Two sides to process safety: Combining human and technical factors in your program; Preparing HMI graphics for migrations; Mechatronics and safety; Engineers' Choice Awards
Detecting security breaches: Forensic invenstigations depend on knowing your networks inside and out; Wireless workers; Opening robotic control; Product exclusive: Robust encoders
The Ask Control Engineering blog covers all aspects of automation, including motors, drives, sensors, motion control, machine control, and embedded systems.
Join this ongoing discussion of machine guarding topics, including solutions assessments, regulatory compliance, gap analysis...
News and comments from Control Engineering process industries editor, Peter Welander.
IMS Research, recently acquired by IHS Inc., is a leading independent supplier of market research and consultancy to the global electronics industry.
This is a blog from the trenches – written by engineers who are implementing and upgrading control systems every day across every industry.
Anthony Baker is a fictitious aggregation of experts from Callisto Integration, providing manufacturing consulting and systems integration.
Integrator Guide

Integrator Guide

Search the online Automation Integrator Guide
 

Create New Listing

Visit the System Integrators page to view past winners of Control Engineering's System Integrator of the Year Award and learn how to enter the competition. You will also find more information on system integrators and Control System Integrators Association.

Case Study Database

Case Study Database

Get more exposure for your case study by uploading it to the Control Engineering case study database, where end-users can identify relevant solutions and explore what the experts are doing to effectively implement a variety of technology and productivity related projects.

These case studies provide examples of how knowledgeable solution providers have used technology, processes and people to create effective and successful implementations in real-world situations. Case studies can be completed by filling out a simple online form where you can outline the project title, abstract, and full story in 1500 words or less; upload photos, videos and a logo.

Click here to visit the Case Study Database and upload your case study.