SlideShare a Scribd company logo
1 of 6
Download to read offline
Kepware Whitepaper

A New Distributed Architecture for Remote Communications
By: Tony Paine, President and CEO Kepware Technologies,
and Russel Treat, President and CEO EnerSys Corporation
Introduction
Control systems are used broadly by many industries and implemented in a
variety of ways. In Manufacturing and Process Plants, control systems consist
of the integration of Human Machine Interface (HMI) software, Programmable
Logic Controllers (PLCs), Distributed Control Systems (DCSs), computers, and a
wide range of automation software through the use of high-speed Ethernetbased communications. In geographically distributed systems, such as Oil and
Gas production and pipelines, control systems are much different. They consist
of the integration of SCADA and a more loosely integrated combination of
control devices in the field, local HMI software, and wide-area communications
that use a mixture of wireless, fiber optic, and telephone services. In either case,
a solution must exist that manages the connection between applications and
devices across the various communication mediums.
In operations involving production and pipeline monitoring and control, SCADA
and Electronic Flow Measurement (EFM) applications require access to data
from a wide variety of automation devices. These devices include PLCs, Remote
Terminal Units (RTUs), Flow Computers, and other data sources that are not
directly connected to the computers on which the applications reside. The
communication bridge between the applications and field devices typically
requires the use of radios, cellular networks, satellite links, or other types of
wireless technology in multiple combinations. Each of these communication
mediums has bandwidth limitations, where performance and reliability are
easily impacted by the level of traffic sent over the networks—as well as other
factors like physical obstructions, weather, and environmental elements.
Depending on who owns the communications backbone, there may be costs
associated with the volume of data that is transferred across the network,
where the need for more data results in more operational expenses. Lastly,
this information needs to be securely transmitted to ensure that sensitive data
400 Congress Street, 4th Floor | Portland, Maine 04101
207-775-1660 • sales@kepware.com
cannot be intercepted and used for malicious purposes. Together, these factors
result in a complex and expensive architecture for remote communications
within an Oil and Gas operation.
	
The Current Host-Centric Model

“Some form of
data collection
must exist in
order to provide
connectivity
between the
applications
consuming the
data and the field
devices providing
the data.”

Some form of data collection must exist in order to provide connectivity
between the applications consuming the data and the field devices providing
the data. Historically, this data collection resides on the same computer as the
SCADA host. Data collection can be owned by the SCADA Polling Engine, which
must contain the required protocol drivers that are used to pull data directly
from the field devices. In other instances, separate standalone applications
that expose a generic interface may be responsible for the data collection
between the applications and field devices. Unfortunately, the many types
of field devices that originate from a wide variety of vendors do not support
a universal protocol. As such, there is a 1:1 correlation between the number
of data collectors required to run on the host communication server and the
number of vendor-specific device types that are part of the overall operation.
With bandwidth, cost, and security concerns, the current Host-Centric Model
has several shortcomings.
First, available bandwidth can quickly become diminished as more applications
and devices are added, each increasing the communications throughput over
the network. This model results in the periodic dropping of data requests
that never make it to the device. It places the applications in a waiting-ona-response state, and forces them to rely on messaging timeouts to restart
communications. If multiple data collectors are required to retrieve all the
data of interest to each application, and each requires exclusive access to
the communications medium, the request and response transactions must
be processed serially. This means that a delay in any one transaction has
an additive impact on the overall communications cycle because the next
transaction cannot be sent until the previous transaction completes or times
out. Furthermore, if Operations wants to maintain both a local and remote
facility-centric view of pump stations, compressor stations, or gas processing,
the implementation of an easily maintained communications infrastructure
becomes complicated because different data collectors are used for the local
system versus the remote SCADA host.

400 Congress Street, 4th Floor | Portland, Maine 04101
207-775-1660 • sales@kepware.com
“The Host-Centric
Model is not a
cost effective
solution when the
system must be
scaled.”

Figure 1: In the Host-Centric Model, several different data collectors are required to
provide data locally at the facility and remotely to SCADA, EFM Collection, and other
applications. The plant PLCs and Flow Computers receive multiple requests for the
same data, diminishing available bandwidth.
Next, the Host-Centric Model is not a cost effective solution when the system
must be scaled. Typically, there are multiple client applications running on
multiple computers that are interested in collecting the same data. This results
in multiple data collectors making the same requests to the same devices at
roughly the same time. This inefficiency not only uses unnecessary bandwidth,
but can quickly become expensive in cases where there is a cost-per-byte for
the data being transmitted.
Lastly, many of the vendor-specific protocols were developed with the
knowledge of these bandwidth limitations and cost concerns. As such, vendors
have focused on engineering these protocols down to the bare minimum
required to access the data within the device. These protocols are inherently
unsecure and can be easily deciphered or subject to man-in-the-middle attacks.
This may not be a concern when communications are limited to a private
network with physical barriers; however, there usually comes a time when this
data needs to be made available externally over public networks, and secure
communications will need to be implemented.
The New Distributed Communications Architecture
A feature-rich and properly implemented Distributed Communications
Architecture addresses these issues. In this model, data collectors are no longer
required to live on the same computer as the client applications. Instead, they
400 Congress Street, 4th Floor | Portland, Maine 04101
207-775-1660 • sales@kepware.com
can exist on any computer that is tied into the communications network. In this
way, a single data collector can service multiple client applications interested in
the same data from the same devices. By removing the inefficiency of making
repeated requests, less bandwidth is needed to provide the same data set.
Multiple data collectors can be spread out across multiple computers that
are closer to the field devices, each with their own exclusive connection to
the network. This allows communications across the various device types to
run concurrently, shortening the overall time it takes to acquire all of the data
and saving costs for those pay-per-byte connections. As an added benefit,
communications to other devices will no longer be affected if a device happens
to be unresponsive.
“By removing the
inefficiency of
making repeated
requests, less
bandwidth is
needed to provide
the same data set.”

Even though communication failures will still occur, a Distributed
Communications Architecture allows you to minimize points of failure within
the system. It is intuitive to place the data collector as close to the device as
possible; the connection may even be hardwired. This proximity increases
the likelihood that data will be retrieved from the device as needed. The data
collector may even have the ability to buffer and store the data in the event that
the remote client applications are unavailable, which enables the data collector
to provide the applications with this data in the near future and prevents the
loss of data across the system. This can be accomplished through a deferred
real-time data playback mechanism or preferably with a more suitable historical
data interface for retrieving the stored data.
By distributing the data collection from the client applications, we have
introduced an abstraction layer between the vendor-specific protocol and the
sharing of the information contained within the protocol. Additionally, we can
limit the exposure of these unsecure vendor-specific protocols over a wider area
network by placing the data collector as close to the device as possible. Now it
is possible to have a single secure protocol that connects each client application
to the applicable data collectors, removing the concerns for where this data may
need to travel in order to reach its destination.

400 Congress Street, 4th Floor | Portland, Maine 04101
207-775-1660 • sales@kepware.com
“OPC UA also
provides the
secure exchange
of data between
these components
by prescribing
well-known
and adopted IT
practices.”

Figure 2: In a Distributed Communications Architecture, one data collector at each
site provides data both locally and remotely. Devices receive only one request for
data needed across all applications.
Although there are many ways you could implement a Distributed
Communications Architecture, there is one, de facto industrial automation
standard whose purpose is to allow vendors to solve the very problems
previously discussed. This is the OPC Unified Architecture (UA) standard: a multipurpose set of services that a data collector (known as an OPC server) provides
to an application (known as an OPC client) that is ready to consume this
information. The OPC UA service set generalizes the methods that are used to
discover, collect, and manipulate real-time, historical, and alarm and event data
by abstracting away the vendor-specific protocols. OPC UA also provides the
secure exchange of data between these components by prescribing well-known
and adopted IT practices. By building out your Distributed Communications
Architecture based on an open standard such as OPC UA, you will have a greater
chance of interoperability between the applications you are aware of today and
those you may need to add in the future—all while securely optimizing data
throughput across the network.
Conclusion
The Host-Centric Model requires a data collector for each application that
needs data from a specific device in the field. This results in inefficient use of
communications bandwidth because multiple requests are being made to the
same devices for the same data. Depending on the communications mediums
being used, this can come at a significant cost. Native protocols are often
400 Congress Street, 4th Floor | Portland, Maine 04101
207-775-1660 • sales@kepware.com
unsecure and should not be used to transmit sensitive data over public
networks.
A Distributed Communications Architecture removes the problems
found in the Host-Centric Model. This architecture optimizes
communications requests between client applications and field
devices, minimizing bandwidth usage and cost. By leveraging secure
communication methodologies, this architecture adds the appropriate
level of security required to transmit data over the public domain.
“The technology
needed to move
from a HostCentric Model

The technology needed to move from a Host-Centric Model to a
Distributed Communications Architecture is available today. The
transition requires minimal downtime, as configuration can be
accomplished without disrupting established communications. The
new architecture provides Oil and Gas operations with an alternative to
the current model that is more secure and cost effective, and ready to
scale to meet the needs of tomorrow.

to a Distributed
Communications
Architecture is
available today.”

400 Congress Street, 4th Floor | Portland, Maine 04101
207-775-1660 • sales@kepware.com

More Related Content

What's hot

Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...IOSR Journals
 
Enabling active flow manipulation in silicon-based network forwarding engines
Enabling active flow manipulation in silicon-based network forwarding enginesEnabling active flow manipulation in silicon-based network forwarding engines
Enabling active flow manipulation in silicon-based network forwarding enginesTal Lavian Ph.D.
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageMuthu Sybian
 
Privacy preserving public auditing for
Privacy preserving public auditing forPrivacy preserving public auditing for
Privacy preserving public auditing forkarthika kathirvel
 
Cloud computing and Software defined networking
Cloud computing and Software defined networkingCloud computing and Software defined networking
Cloud computing and Software defined networkingsaigandham1
 
Oruta phase1 report
Oruta phase1 reportOruta phase1 report
Oruta phase1 reportsuthi
 
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS cscpconf
 
Enabling Active Flow Manipulation in Silicon-based Network Forwarding Engine
Enabling Active Flow Manipulation in Silicon-based Network Forwarding EngineEnabling Active Flow Manipulation in Silicon-based Network Forwarding Engine
Enabling Active Flow Manipulation in Silicon-based Network Forwarding EngineTal Lavian Ph.D.
 
Automatic Management of Wireless Sensor Networks through Cloud Computing
Automatic Management of Wireless Sensor Networks through Cloud ComputingAutomatic Management of Wireless Sensor Networks through Cloud Computing
Automatic Management of Wireless Sensor Networks through Cloud Computingyousef emami
 
Distrix_Software_Defined_Infrastructure_White_Paper
Distrix_Software_Defined_Infrastructure_White_PaperDistrix_Software_Defined_Infrastructure_White_Paper
Distrix_Software_Defined_Infrastructure_White_PaperThomas Mehlhorn
 
Mobile computing security
Mobile computing securityMobile computing security
Mobile computing securityZachariah Pabi
 
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Editor IJARCET
 
Load balancing in_5_g_networks
Load balancing in_5_g_networksLoad balancing in_5_g_networks
Load balancing in_5_g_networksCatherineProtas
 
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY IJCNCJournal
 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...INFOGAIN PUBLICATION
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
 

What's hot (18)

Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
 
Enabling active flow manipulation in silicon-based network forwarding engines
Enabling active flow manipulation in silicon-based network forwarding enginesEnabling active flow manipulation in silicon-based network forwarding engines
Enabling active flow manipulation in silicon-based network forwarding engines
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
Privacy preserving public auditing for
Privacy preserving public auditing forPrivacy preserving public auditing for
Privacy preserving public auditing for
 
Cloud computing and Software defined networking
Cloud computing and Software defined networkingCloud computing and Software defined networking
Cloud computing and Software defined networking
 
L04302088092
L04302088092L04302088092
L04302088092
 
Oruta phase1 report
Oruta phase1 reportOruta phase1 report
Oruta phase1 report
 
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
 
Enabling Active Flow Manipulation in Silicon-based Network Forwarding Engine
Enabling Active Flow Manipulation in Silicon-based Network Forwarding EngineEnabling Active Flow Manipulation in Silicon-based Network Forwarding Engine
Enabling Active Flow Manipulation in Silicon-based Network Forwarding Engine
 
Automatic Management of Wireless Sensor Networks through Cloud Computing
Automatic Management of Wireless Sensor Networks through Cloud ComputingAutomatic Management of Wireless Sensor Networks through Cloud Computing
Automatic Management of Wireless Sensor Networks through Cloud Computing
 
Distrix_Software_Defined_Infrastructure_White_Paper
Distrix_Software_Defined_Infrastructure_White_PaperDistrix_Software_Defined_Infrastructure_White_Paper
Distrix_Software_Defined_Infrastructure_White_Paper
 
Mobile computing security
Mobile computing securityMobile computing security
Mobile computing security
 
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301
 
Load balancing in_5_g_networks
Load balancing in_5_g_networksLoad balancing in_5_g_networks
Load balancing in_5_g_networks
 
E018113036
E018113036E018113036
E018113036
 
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY
 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 

Similar to 27859 a new distributed architecture for remote communications 2013

Ericsson Review: Capillary networks – a smart way to get things connected
Ericsson Review: Capillary networks – a smart way to get things connectedEricsson Review: Capillary networks – a smart way to get things connected
Ericsson Review: Capillary networks – a smart way to get things connectedEricsson
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGIJNSA Journal
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGIJNSA Journal
 
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...inventy
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEKate Campbell
 
Essential Information about Network Architecture and Design
Essential Information about Network Architecture and DesignEssential Information about Network Architecture and Design
Essential Information about Network Architecture and DesignBizeducator.com
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEIRJET Journal
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
 
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...pijans
 
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...pijans
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
 
How Does Your Real-time Data Look?
How Does Your Real-time Data Look?How Does Your Real-time Data Look?
How Does Your Real-time Data Look?Supreet Oberoi
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com msudan92
 
TECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
TECHNICAL WHITE PAPER: NetBackup Appliances WAN OptimizationTECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
TECHNICAL WHITE PAPER: NetBackup Appliances WAN OptimizationSymantec
 
09e4150ead3fa7505a000000
09e4150ead3fa7505a00000009e4150ead3fa7505a000000
09e4150ead3fa7505a000000Fauzil Rizqi
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 

Similar to 27859 a new distributed architecture for remote communications 2013 (20)

Ericsson Review: Capillary networks – a smart way to get things connected
Ericsson Review: Capillary networks – a smart way to get things connectedEricsson Review: Capillary networks – a smart way to get things connected
Ericsson Review: Capillary networks – a smart way to get things connected
 
4 (mobile computing)
4 (mobile computing)4 (mobile computing)
4 (mobile computing)
 
CentralizedSerialWP
CentralizedSerialWPCentralizedSerialWP
CentralizedSerialWP
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
 
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
Essential Information about Network Architecture and Design
Essential Information about Network Architecture and DesignEssential Information about Network Architecture and Design
Essential Information about Network Architecture and Design
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
106248842 cc
106248842 cc106248842 cc
106248842 cc
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
 
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
 
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
 
Unit 4 part 1
Unit 4 part 1Unit 4 part 1
Unit 4 part 1
 
How Does Your Real-time Data Look?
How Does Your Real-time Data Look?How Does Your Real-time Data Look?
How Does Your Real-time Data Look?
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com
 
TECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
TECHNICAL WHITE PAPER: NetBackup Appliances WAN OptimizationTECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
TECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
 
09e4150ead3fa7505a000000
09e4150ead3fa7505a00000009e4150ead3fa7505a000000
09e4150ead3fa7505a000000
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 

More from Benjamin Kyalo

preventing-coding-errors-in-your-operation
 preventing-coding-errors-in-your-operation preventing-coding-errors-in-your-operation
preventing-coding-errors-in-your-operationBenjamin Kyalo
 
Removing-the-cost-coding-errors-in-building-materials
 Removing-the-cost-coding-errors-in-building-materials Removing-the-cost-coding-errors-in-building-materials
Removing-the-cost-coding-errors-in-building-materialsBenjamin Kyalo
 
Videojet industrial product-guide
Videojet industrial product-guideVideojet industrial product-guide
Videojet industrial product-guideBenjamin Kyalo
 
NIGHT LITE PRO II - TRAINING
NIGHT LITE PRO II - TRAININGNIGHT LITE PRO II - TRAINING
NIGHT LITE PRO II - TRAININGBenjamin Kyalo
 
Powder & Bulk Solids Magazine
 Powder & Bulk Solids Magazine Powder & Bulk Solids Magazine
Powder & Bulk Solids MagazineBenjamin Kyalo
 
Combustion Engineering Solutions - Boiler Applications
Combustion Engineering Solutions - Boiler ApplicationsCombustion Engineering Solutions - Boiler Applications
Combustion Engineering Solutions - Boiler ApplicationsBenjamin Kyalo
 
7 Key Points for Process excellence/ Process Improvement
7 Key Points for Process excellence/ Process Improvement7 Key Points for Process excellence/ Process Improvement
7 Key Points for Process excellence/ Process ImprovementBenjamin Kyalo
 
Vapour Control Systems - Cashco Products
Vapour Control Systems - Cashco ProductsVapour Control Systems - Cashco Products
Vapour Control Systems - Cashco ProductsBenjamin Kyalo
 
Control Valves - Cashco Products
Control Valves - Cashco ProductsControl Valves - Cashco Products
Control Valves - Cashco ProductsBenjamin Kyalo
 
Thermal Dispersion Technology - Magnetrol
Thermal Dispersion Technology - MagnetrolThermal Dispersion Technology - Magnetrol
Thermal Dispersion Technology - MagnetrolBenjamin Kyalo
 
Natural Gas Processing - Magnetrol
Natural Gas Processing - MagnetrolNatural Gas Processing - Magnetrol
Natural Gas Processing - MagnetrolBenjamin Kyalo
 
Renewable Energy - Magnetrol
Renewable Energy - MagnetrolRenewable Energy - Magnetrol
Renewable Energy - MagnetrolBenjamin Kyalo
 
Food & Beverage industry-Magnetrol
Food & Beverage industry-MagnetrolFood & Beverage industry-Magnetrol
Food & Beverage industry-MagnetrolBenjamin Kyalo
 
MAGNETIC LEVEL INDICATORS
MAGNETIC LEVEL INDICATORSMAGNETIC LEVEL INDICATORS
MAGNETIC LEVEL INDICATORSBenjamin Kyalo
 
GUIDED WAVE RADAR TECHNOLOGY
GUIDED WAVE RADAR TECHNOLOGYGUIDED WAVE RADAR TECHNOLOGY
GUIDED WAVE RADAR TECHNOLOGYBenjamin Kyalo
 
Cashco Products Presentation
Cashco Products PresentationCashco Products Presentation
Cashco Products PresentationBenjamin Kyalo
 
Magnetrol contour product line.
Magnetrol contour product line.Magnetrol contour product line.
Magnetrol contour product line.Benjamin Kyalo
 

More from Benjamin Kyalo (17)

preventing-coding-errors-in-your-operation
 preventing-coding-errors-in-your-operation preventing-coding-errors-in-your-operation
preventing-coding-errors-in-your-operation
 
Removing-the-cost-coding-errors-in-building-materials
 Removing-the-cost-coding-errors-in-building-materials Removing-the-cost-coding-errors-in-building-materials
Removing-the-cost-coding-errors-in-building-materials
 
Videojet industrial product-guide
Videojet industrial product-guideVideojet industrial product-guide
Videojet industrial product-guide
 
NIGHT LITE PRO II - TRAINING
NIGHT LITE PRO II - TRAININGNIGHT LITE PRO II - TRAINING
NIGHT LITE PRO II - TRAINING
 
Powder & Bulk Solids Magazine
 Powder & Bulk Solids Magazine Powder & Bulk Solids Magazine
Powder & Bulk Solids Magazine
 
Combustion Engineering Solutions - Boiler Applications
Combustion Engineering Solutions - Boiler ApplicationsCombustion Engineering Solutions - Boiler Applications
Combustion Engineering Solutions - Boiler Applications
 
7 Key Points for Process excellence/ Process Improvement
7 Key Points for Process excellence/ Process Improvement7 Key Points for Process excellence/ Process Improvement
7 Key Points for Process excellence/ Process Improvement
 
Vapour Control Systems - Cashco Products
Vapour Control Systems - Cashco ProductsVapour Control Systems - Cashco Products
Vapour Control Systems - Cashco Products
 
Control Valves - Cashco Products
Control Valves - Cashco ProductsControl Valves - Cashco Products
Control Valves - Cashco Products
 
Thermal Dispersion Technology - Magnetrol
Thermal Dispersion Technology - MagnetrolThermal Dispersion Technology - Magnetrol
Thermal Dispersion Technology - Magnetrol
 
Natural Gas Processing - Magnetrol
Natural Gas Processing - MagnetrolNatural Gas Processing - Magnetrol
Natural Gas Processing - Magnetrol
 
Renewable Energy - Magnetrol
Renewable Energy - MagnetrolRenewable Energy - Magnetrol
Renewable Energy - Magnetrol
 
Food & Beverage industry-Magnetrol
Food & Beverage industry-MagnetrolFood & Beverage industry-Magnetrol
Food & Beverage industry-Magnetrol
 
MAGNETIC LEVEL INDICATORS
MAGNETIC LEVEL INDICATORSMAGNETIC LEVEL INDICATORS
MAGNETIC LEVEL INDICATORS
 
GUIDED WAVE RADAR TECHNOLOGY
GUIDED WAVE RADAR TECHNOLOGYGUIDED WAVE RADAR TECHNOLOGY
GUIDED WAVE RADAR TECHNOLOGY
 
Cashco Products Presentation
Cashco Products PresentationCashco Products Presentation
Cashco Products Presentation
 
Magnetrol contour product line.
Magnetrol contour product line.Magnetrol contour product line.
Magnetrol contour product line.
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

27859 a new distributed architecture for remote communications 2013

  • 1. Kepware Whitepaper A New Distributed Architecture for Remote Communications By: Tony Paine, President and CEO Kepware Technologies, and Russel Treat, President and CEO EnerSys Corporation Introduction Control systems are used broadly by many industries and implemented in a variety of ways. In Manufacturing and Process Plants, control systems consist of the integration of Human Machine Interface (HMI) software, Programmable Logic Controllers (PLCs), Distributed Control Systems (DCSs), computers, and a wide range of automation software through the use of high-speed Ethernetbased communications. In geographically distributed systems, such as Oil and Gas production and pipelines, control systems are much different. They consist of the integration of SCADA and a more loosely integrated combination of control devices in the field, local HMI software, and wide-area communications that use a mixture of wireless, fiber optic, and telephone services. In either case, a solution must exist that manages the connection between applications and devices across the various communication mediums. In operations involving production and pipeline monitoring and control, SCADA and Electronic Flow Measurement (EFM) applications require access to data from a wide variety of automation devices. These devices include PLCs, Remote Terminal Units (RTUs), Flow Computers, and other data sources that are not directly connected to the computers on which the applications reside. The communication bridge between the applications and field devices typically requires the use of radios, cellular networks, satellite links, or other types of wireless technology in multiple combinations. Each of these communication mediums has bandwidth limitations, where performance and reliability are easily impacted by the level of traffic sent over the networks—as well as other factors like physical obstructions, weather, and environmental elements. Depending on who owns the communications backbone, there may be costs associated with the volume of data that is transferred across the network, where the need for more data results in more operational expenses. Lastly, this information needs to be securely transmitted to ensure that sensitive data 400 Congress Street, 4th Floor | Portland, Maine 04101 207-775-1660 • sales@kepware.com
  • 2. cannot be intercepted and used for malicious purposes. Together, these factors result in a complex and expensive architecture for remote communications within an Oil and Gas operation. The Current Host-Centric Model “Some form of data collection must exist in order to provide connectivity between the applications consuming the data and the field devices providing the data.” Some form of data collection must exist in order to provide connectivity between the applications consuming the data and the field devices providing the data. Historically, this data collection resides on the same computer as the SCADA host. Data collection can be owned by the SCADA Polling Engine, which must contain the required protocol drivers that are used to pull data directly from the field devices. In other instances, separate standalone applications that expose a generic interface may be responsible for the data collection between the applications and field devices. Unfortunately, the many types of field devices that originate from a wide variety of vendors do not support a universal protocol. As such, there is a 1:1 correlation between the number of data collectors required to run on the host communication server and the number of vendor-specific device types that are part of the overall operation. With bandwidth, cost, and security concerns, the current Host-Centric Model has several shortcomings. First, available bandwidth can quickly become diminished as more applications and devices are added, each increasing the communications throughput over the network. This model results in the periodic dropping of data requests that never make it to the device. It places the applications in a waiting-ona-response state, and forces them to rely on messaging timeouts to restart communications. If multiple data collectors are required to retrieve all the data of interest to each application, and each requires exclusive access to the communications medium, the request and response transactions must be processed serially. This means that a delay in any one transaction has an additive impact on the overall communications cycle because the next transaction cannot be sent until the previous transaction completes or times out. Furthermore, if Operations wants to maintain both a local and remote facility-centric view of pump stations, compressor stations, or gas processing, the implementation of an easily maintained communications infrastructure becomes complicated because different data collectors are used for the local system versus the remote SCADA host. 400 Congress Street, 4th Floor | Portland, Maine 04101 207-775-1660 • sales@kepware.com
  • 3. “The Host-Centric Model is not a cost effective solution when the system must be scaled.” Figure 1: In the Host-Centric Model, several different data collectors are required to provide data locally at the facility and remotely to SCADA, EFM Collection, and other applications. The plant PLCs and Flow Computers receive multiple requests for the same data, diminishing available bandwidth. Next, the Host-Centric Model is not a cost effective solution when the system must be scaled. Typically, there are multiple client applications running on multiple computers that are interested in collecting the same data. This results in multiple data collectors making the same requests to the same devices at roughly the same time. This inefficiency not only uses unnecessary bandwidth, but can quickly become expensive in cases where there is a cost-per-byte for the data being transmitted. Lastly, many of the vendor-specific protocols were developed with the knowledge of these bandwidth limitations and cost concerns. As such, vendors have focused on engineering these protocols down to the bare minimum required to access the data within the device. These protocols are inherently unsecure and can be easily deciphered or subject to man-in-the-middle attacks. This may not be a concern when communications are limited to a private network with physical barriers; however, there usually comes a time when this data needs to be made available externally over public networks, and secure communications will need to be implemented. The New Distributed Communications Architecture A feature-rich and properly implemented Distributed Communications Architecture addresses these issues. In this model, data collectors are no longer required to live on the same computer as the client applications. Instead, they 400 Congress Street, 4th Floor | Portland, Maine 04101 207-775-1660 • sales@kepware.com
  • 4. can exist on any computer that is tied into the communications network. In this way, a single data collector can service multiple client applications interested in the same data from the same devices. By removing the inefficiency of making repeated requests, less bandwidth is needed to provide the same data set. Multiple data collectors can be spread out across multiple computers that are closer to the field devices, each with their own exclusive connection to the network. This allows communications across the various device types to run concurrently, shortening the overall time it takes to acquire all of the data and saving costs for those pay-per-byte connections. As an added benefit, communications to other devices will no longer be affected if a device happens to be unresponsive. “By removing the inefficiency of making repeated requests, less bandwidth is needed to provide the same data set.” Even though communication failures will still occur, a Distributed Communications Architecture allows you to minimize points of failure within the system. It is intuitive to place the data collector as close to the device as possible; the connection may even be hardwired. This proximity increases the likelihood that data will be retrieved from the device as needed. The data collector may even have the ability to buffer and store the data in the event that the remote client applications are unavailable, which enables the data collector to provide the applications with this data in the near future and prevents the loss of data across the system. This can be accomplished through a deferred real-time data playback mechanism or preferably with a more suitable historical data interface for retrieving the stored data. By distributing the data collection from the client applications, we have introduced an abstraction layer between the vendor-specific protocol and the sharing of the information contained within the protocol. Additionally, we can limit the exposure of these unsecure vendor-specific protocols over a wider area network by placing the data collector as close to the device as possible. Now it is possible to have a single secure protocol that connects each client application to the applicable data collectors, removing the concerns for where this data may need to travel in order to reach its destination. 400 Congress Street, 4th Floor | Portland, Maine 04101 207-775-1660 • sales@kepware.com
  • 5. “OPC UA also provides the secure exchange of data between these components by prescribing well-known and adopted IT practices.” Figure 2: In a Distributed Communications Architecture, one data collector at each site provides data both locally and remotely. Devices receive only one request for data needed across all applications. Although there are many ways you could implement a Distributed Communications Architecture, there is one, de facto industrial automation standard whose purpose is to allow vendors to solve the very problems previously discussed. This is the OPC Unified Architecture (UA) standard: a multipurpose set of services that a data collector (known as an OPC server) provides to an application (known as an OPC client) that is ready to consume this information. The OPC UA service set generalizes the methods that are used to discover, collect, and manipulate real-time, historical, and alarm and event data by abstracting away the vendor-specific protocols. OPC UA also provides the secure exchange of data between these components by prescribing well-known and adopted IT practices. By building out your Distributed Communications Architecture based on an open standard such as OPC UA, you will have a greater chance of interoperability between the applications you are aware of today and those you may need to add in the future—all while securely optimizing data throughput across the network. Conclusion The Host-Centric Model requires a data collector for each application that needs data from a specific device in the field. This results in inefficient use of communications bandwidth because multiple requests are being made to the same devices for the same data. Depending on the communications mediums being used, this can come at a significant cost. Native protocols are often 400 Congress Street, 4th Floor | Portland, Maine 04101 207-775-1660 • sales@kepware.com
  • 6. unsecure and should not be used to transmit sensitive data over public networks. A Distributed Communications Architecture removes the problems found in the Host-Centric Model. This architecture optimizes communications requests between client applications and field devices, minimizing bandwidth usage and cost. By leveraging secure communication methodologies, this architecture adds the appropriate level of security required to transmit data over the public domain. “The technology needed to move from a HostCentric Model The technology needed to move from a Host-Centric Model to a Distributed Communications Architecture is available today. The transition requires minimal downtime, as configuration can be accomplished without disrupting established communications. The new architecture provides Oil and Gas operations with an alternative to the current model that is more secure and cost effective, and ready to scale to meet the needs of tomorrow. to a Distributed Communications Architecture is available today.” 400 Congress Street, 4th Floor | Portland, Maine 04101 207-775-1660 • sales@kepware.com