SlideShare a Scribd company logo
Kepware Whitepaper

A New Distributed Architecture for Remote Communications
By: Tony Paine, President and CEO Kepware Technologies,
and Russel Treat, President and CEO EnerSys Corporation
Introduction
Control systems are used broadly by many industries and implemented in a
variety of ways. In Manufacturing and Process Plants, control systems consist
of the integration of Human Machine Interface (HMI) software, Programmable
Logic Controllers (PLCs), Distributed Control Systems (DCSs), computers, and a
wide range of automation software through the use of high-speed Ethernetbased communications. In geographically distributed systems, such as Oil and
Gas production and pipelines, control systems are much different. They consist
of the integration of SCADA and a more loosely integrated combination of
control devices in the field, local HMI software, and wide-area communications
that use a mixture of wireless, fiber optic, and telephone services. In either case,
a solution must exist that manages the connection between applications and
devices across the various communication mediums.
In operations involving production and pipeline monitoring and control, SCADA
and Electronic Flow Measurement (EFM) applications require access to data
from a wide variety of automation devices. These devices include PLCs, Remote
Terminal Units (RTUs), Flow Computers, and other data sources that are not
directly connected to the computers on which the applications reside. The
communication bridge between the applications and field devices typically
requires the use of radios, cellular networks, satellite links, or other types of
wireless technology in multiple combinations. Each of these communication
mediums has bandwidth limitations, where performance and reliability are
easily impacted by the level of traffic sent over the networks—as well as other
factors like physical obstructions, weather, and environmental elements.
Depending on who owns the communications backbone, there may be costs
associated with the volume of data that is transferred across the network,
where the need for more data results in more operational expenses. Lastly,
this information needs to be securely transmitted to ensure that sensitive data
400 Congress Street, 4th Floor | Portland, Maine 04101
207-775-1660 • sales@kepware.com
cannot be intercepted and used for malicious purposes. Together, these factors
result in a complex and expensive architecture for remote communications
within an Oil and Gas operation.
	
The Current Host-Centric Model

“Some form of
data collection
must exist in
order to provide
connectivity
between the
applications
consuming the
data and the field
devices providing
the data.”

Some form of data collection must exist in order to provide connectivity
between the applications consuming the data and the field devices providing
the data. Historically, this data collection resides on the same computer as the
SCADA host. Data collection can be owned by the SCADA Polling Engine, which
must contain the required protocol drivers that are used to pull data directly
from the field devices. In other instances, separate standalone applications
that expose a generic interface may be responsible for the data collection
between the applications and field devices. Unfortunately, the many types
of field devices that originate from a wide variety of vendors do not support
a universal protocol. As such, there is a 1:1 correlation between the number
of data collectors required to run on the host communication server and the
number of vendor-specific device types that are part of the overall operation.
With bandwidth, cost, and security concerns, the current Host-Centric Model
has several shortcomings.
First, available bandwidth can quickly become diminished as more applications
and devices are added, each increasing the communications throughput over
the network. This model results in the periodic dropping of data requests
that never make it to the device. It places the applications in a waiting-ona-response state, and forces them to rely on messaging timeouts to restart
communications. If multiple data collectors are required to retrieve all the
data of interest to each application, and each requires exclusive access to
the communications medium, the request and response transactions must
be processed serially. This means that a delay in any one transaction has
an additive impact on the overall communications cycle because the next
transaction cannot be sent until the previous transaction completes or times
out. Furthermore, if Operations wants to maintain both a local and remote
facility-centric view of pump stations, compressor stations, or gas processing,
the implementation of an easily maintained communications infrastructure
becomes complicated because different data collectors are used for the local
system versus the remote SCADA host.

400 Congress Street, 4th Floor | Portland, Maine 04101
207-775-1660 • sales@kepware.com
“The Host-Centric
Model is not a
cost effective
solution when the
system must be
scaled.”

Figure 1: In the Host-Centric Model, several different data collectors are required to
provide data locally at the facility and remotely to SCADA, EFM Collection, and other
applications. The plant PLCs and Flow Computers receive multiple requests for the
same data, diminishing available bandwidth.
Next, the Host-Centric Model is not a cost effective solution when the system
must be scaled. Typically, there are multiple client applications running on
multiple computers that are interested in collecting the same data. This results
in multiple data collectors making the same requests to the same devices at
roughly the same time. This inefficiency not only uses unnecessary bandwidth,
but can quickly become expensive in cases where there is a cost-per-byte for
the data being transmitted.
Lastly, many of the vendor-specific protocols were developed with the
knowledge of these bandwidth limitations and cost concerns. As such, vendors
have focused on engineering these protocols down to the bare minimum
required to access the data within the device. These protocols are inherently
unsecure and can be easily deciphered or subject to man-in-the-middle attacks.
This may not be a concern when communications are limited to a private
network with physical barriers; however, there usually comes a time when this
data needs to be made available externally over public networks, and secure
communications will need to be implemented.
The New Distributed Communications Architecture
A feature-rich and properly implemented Distributed Communications
Architecture addresses these issues. In this model, data collectors are no longer
required to live on the same computer as the client applications. Instead, they
400 Congress Street, 4th Floor | Portland, Maine 04101
207-775-1660 • sales@kepware.com
can exist on any computer that is tied into the communications network. In this
way, a single data collector can service multiple client applications interested in
the same data from the same devices. By removing the inefficiency of making
repeated requests, less bandwidth is needed to provide the same data set.
Multiple data collectors can be spread out across multiple computers that
are closer to the field devices, each with their own exclusive connection to
the network. This allows communications across the various device types to
run concurrently, shortening the overall time it takes to acquire all of the data
and saving costs for those pay-per-byte connections. As an added benefit,
communications to other devices will no longer be affected if a device happens
to be unresponsive.
“By removing the
inefficiency of
making repeated
requests, less
bandwidth is
needed to provide
the same data set.”

Even though communication failures will still occur, a Distributed
Communications Architecture allows you to minimize points of failure within
the system. It is intuitive to place the data collector as close to the device as
possible; the connection may even be hardwired. This proximity increases
the likelihood that data will be retrieved from the device as needed. The data
collector may even have the ability to buffer and store the data in the event that
the remote client applications are unavailable, which enables the data collector
to provide the applications with this data in the near future and prevents the
loss of data across the system. This can be accomplished through a deferred
real-time data playback mechanism or preferably with a more suitable historical
data interface for retrieving the stored data.
By distributing the data collection from the client applications, we have
introduced an abstraction layer between the vendor-specific protocol and the
sharing of the information contained within the protocol. Additionally, we can
limit the exposure of these unsecure vendor-specific protocols over a wider area
network by placing the data collector as close to the device as possible. Now it
is possible to have a single secure protocol that connects each client application
to the applicable data collectors, removing the concerns for where this data may
need to travel in order to reach its destination.

400 Congress Street, 4th Floor | Portland, Maine 04101
207-775-1660 • sales@kepware.com
“OPC UA also
provides the
secure exchange
of data between
these components
by prescribing
well-known
and adopted IT
practices.”

Figure 2: In a Distributed Communications Architecture, one data collector at each
site provides data both locally and remotely. Devices receive only one request for
data needed across all applications.
Although there are many ways you could implement a Distributed
Communications Architecture, there is one, de facto industrial automation
standard whose purpose is to allow vendors to solve the very problems
previously discussed. This is the OPC Unified Architecture (UA) standard: a multipurpose set of services that a data collector (known as an OPC server) provides
to an application (known as an OPC client) that is ready to consume this
information. The OPC UA service set generalizes the methods that are used to
discover, collect, and manipulate real-time, historical, and alarm and event data
by abstracting away the vendor-specific protocols. OPC UA also provides the
secure exchange of data between these components by prescribing well-known
and adopted IT practices. By building out your Distributed Communications
Architecture based on an open standard such as OPC UA, you will have a greater
chance of interoperability between the applications you are aware of today and
those you may need to add in the future—all while securely optimizing data
throughput across the network.
Conclusion
The Host-Centric Model requires a data collector for each application that
needs data from a specific device in the field. This results in inefficient use of
communications bandwidth because multiple requests are being made to the
same devices for the same data. Depending on the communications mediums
being used, this can come at a significant cost. Native protocols are often
400 Congress Street, 4th Floor | Portland, Maine 04101
207-775-1660 • sales@kepware.com
unsecure and should not be used to transmit sensitive data over public
networks.
A Distributed Communications Architecture removes the problems
found in the Host-Centric Model. This architecture optimizes
communications requests between client applications and field
devices, minimizing bandwidth usage and cost. By leveraging secure
communication methodologies, this architecture adds the appropriate
level of security required to transmit data over the public domain.
“The technology
needed to move
from a HostCentric Model

The technology needed to move from a Host-Centric Model to a
Distributed Communications Architecture is available today. The
transition requires minimal downtime, as configuration can be
accomplished without disrupting established communications. The
new architecture provides Oil and Gas operations with an alternative to
the current model that is more secure and cost effective, and ready to
scale to meet the needs of tomorrow.

to a Distributed
Communications
Architecture is
available today.”

400 Congress Street, 4th Floor | Portland, Maine 04101
207-775-1660 • sales@kepware.com

More Related Content

What's hot

Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
IOSR Journals
 
Enabling active flow manipulation in silicon-based network forwarding engines
Enabling active flow manipulation in silicon-based network forwarding enginesEnabling active flow manipulation in silicon-based network forwarding engines
Enabling active flow manipulation in silicon-based network forwarding engines
Tal Lavian Ph.D.
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
Muthu Sybian
 
Privacy preserving public auditing for
Privacy preserving public auditing forPrivacy preserving public auditing for
Privacy preserving public auditing forkarthika kathirvel
 
Cloud computing and Software defined networking
Cloud computing and Software defined networkingCloud computing and Software defined networking
Cloud computing and Software defined networking
saigandham1
 
L04302088092
L04302088092L04302088092
L04302088092
ijceronline
 
Oruta phase1 report
Oruta phase1 reportOruta phase1 report
Oruta phase1 report
suthi
 
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
cscpconf
 
Enabling Active Flow Manipulation in Silicon-based Network Forwarding Engine
Enabling Active Flow Manipulation in Silicon-based Network Forwarding EngineEnabling Active Flow Manipulation in Silicon-based Network Forwarding Engine
Enabling Active Flow Manipulation in Silicon-based Network Forwarding Engine
Tal Lavian Ph.D.
 
Automatic Management of Wireless Sensor Networks through Cloud Computing
Automatic Management of Wireless Sensor Networks through Cloud ComputingAutomatic Management of Wireless Sensor Networks through Cloud Computing
Automatic Management of Wireless Sensor Networks through Cloud Computing
yousef emami
 
Distrix_Software_Defined_Infrastructure_White_Paper
Distrix_Software_Defined_Infrastructure_White_PaperDistrix_Software_Defined_Infrastructure_White_Paper
Distrix_Software_Defined_Infrastructure_White_PaperThomas Mehlhorn
 
Mobile computing security
Mobile computing securityMobile computing security
Mobile computing security
Zachariah Pabi
 
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Editor IJARCET
 
Load balancing in_5_g_networks
Load balancing in_5_g_networksLoad balancing in_5_g_networks
Load balancing in_5_g_networks
CatherineProtas
 
E018113036
E018113036E018113036
E018113036
IOSR Journals
 
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY
IJCNCJournal
 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
INFOGAIN PUBLICATION
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
 

What's hot (18)

Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
 
Enabling active flow manipulation in silicon-based network forwarding engines
Enabling active flow manipulation in silicon-based network forwarding enginesEnabling active flow manipulation in silicon-based network forwarding engines
Enabling active flow manipulation in silicon-based network forwarding engines
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
Privacy preserving public auditing for
Privacy preserving public auditing forPrivacy preserving public auditing for
Privacy preserving public auditing for
 
Cloud computing and Software defined networking
Cloud computing and Software defined networkingCloud computing and Software defined networking
Cloud computing and Software defined networking
 
L04302088092
L04302088092L04302088092
L04302088092
 
Oruta phase1 report
Oruta phase1 reportOruta phase1 report
Oruta phase1 report
 
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
 
Enabling Active Flow Manipulation in Silicon-based Network Forwarding Engine
Enabling Active Flow Manipulation in Silicon-based Network Forwarding EngineEnabling Active Flow Manipulation in Silicon-based Network Forwarding Engine
Enabling Active Flow Manipulation in Silicon-based Network Forwarding Engine
 
Automatic Management of Wireless Sensor Networks through Cloud Computing
Automatic Management of Wireless Sensor Networks through Cloud ComputingAutomatic Management of Wireless Sensor Networks through Cloud Computing
Automatic Management of Wireless Sensor Networks through Cloud Computing
 
Distrix_Software_Defined_Infrastructure_White_Paper
Distrix_Software_Defined_Infrastructure_White_PaperDistrix_Software_Defined_Infrastructure_White_Paper
Distrix_Software_Defined_Infrastructure_White_Paper
 
Mobile computing security
Mobile computing securityMobile computing security
Mobile computing security
 
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301
 
Load balancing in_5_g_networks
Load balancing in_5_g_networksLoad balancing in_5_g_networks
Load balancing in_5_g_networks
 
E018113036
E018113036E018113036
E018113036
 
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY
 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 

Similar to 27859 a new distributed architecture for remote communications 2013

Ericsson Review: Capillary networks – a smart way to get things connected
Ericsson Review: Capillary networks – a smart way to get things connectedEricsson Review: Capillary networks – a smart way to get things connected
Ericsson Review: Capillary networks – a smart way to get things connected
Ericsson
 
4 (mobile computing)
4 (mobile computing)4 (mobile computing)
4 (mobile computing)
JIEMS Akkalkuwa
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
IJNSA Journal
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
IJNSA Journal
 
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
inventy
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
Kate Campbell
 
Essential Information about Network Architecture and Design
Essential Information about Network Architecture and DesignEssential Information about Network Architecture and Design
Essential Information about Network Architecture and Design
Bizeducator.com
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
IRJET Journal
 
106248842 cc
106248842 cc106248842 cc
106248842 cc
homeworkping7
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
pijans
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
pijans
 
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
pijans
 
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
pijans
 
How Does Your Real-time Data Look?
How Does Your Real-time Data Look?How Does Your Real-time Data Look?
How Does Your Real-time Data Look?
Supreet Oberoi
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com msudan92
 
TECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
TECHNICAL WHITE PAPER: NetBackup Appliances WAN OptimizationTECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
TECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
Symantec
 
09e4150ead3fa7505a000000
09e4150ead3fa7505a00000009e4150ead3fa7505a000000
09e4150ead3fa7505a000000
Fauzil Rizqi
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
theijes
 

Similar to 27859 a new distributed architecture for remote communications 2013 (20)

Ericsson Review: Capillary networks – a smart way to get things connected
Ericsson Review: Capillary networks – a smart way to get things connectedEricsson Review: Capillary networks – a smart way to get things connected
Ericsson Review: Capillary networks – a smart way to get things connected
 
4 (mobile computing)
4 (mobile computing)4 (mobile computing)
4 (mobile computing)
 
CentralizedSerialWP
CentralizedSerialWPCentralizedSerialWP
CentralizedSerialWP
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
 
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
Essential Information about Network Architecture and Design
Essential Information about Network Architecture and DesignEssential Information about Network Architecture and Design
Essential Information about Network Architecture and Design
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
106248842 cc
106248842 cc106248842 cc
106248842 cc
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
 
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
 
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
 
Unit 4 part 1
Unit 4 part 1Unit 4 part 1
Unit 4 part 1
 
How Does Your Real-time Data Look?
How Does Your Real-time Data Look?How Does Your Real-time Data Look?
How Does Your Real-time Data Look?
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com
 
TECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
TECHNICAL WHITE PAPER: NetBackup Appliances WAN OptimizationTECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
TECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
 
09e4150ead3fa7505a000000
09e4150ead3fa7505a00000009e4150ead3fa7505a000000
09e4150ead3fa7505a000000
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 

More from Benjamin Kyalo

preventing-coding-errors-in-your-operation
 preventing-coding-errors-in-your-operation preventing-coding-errors-in-your-operation
preventing-coding-errors-in-your-operation
Benjamin Kyalo
 
Removing-the-cost-coding-errors-in-building-materials
 Removing-the-cost-coding-errors-in-building-materials Removing-the-cost-coding-errors-in-building-materials
Removing-the-cost-coding-errors-in-building-materials
Benjamin Kyalo
 
Videojet industrial product-guide
Videojet industrial product-guideVideojet industrial product-guide
Videojet industrial product-guide
Benjamin Kyalo
 
NIGHT LITE PRO II - TRAINING
NIGHT LITE PRO II - TRAININGNIGHT LITE PRO II - TRAINING
NIGHT LITE PRO II - TRAINING
Benjamin Kyalo
 
Powder & Bulk Solids Magazine
 Powder & Bulk Solids Magazine Powder & Bulk Solids Magazine
Powder & Bulk Solids Magazine
Benjamin Kyalo
 
Combustion Engineering Solutions - Boiler Applications
Combustion Engineering Solutions - Boiler ApplicationsCombustion Engineering Solutions - Boiler Applications
Combustion Engineering Solutions - Boiler Applications
Benjamin Kyalo
 
7 Key Points for Process excellence/ Process Improvement
7 Key Points for Process excellence/ Process Improvement7 Key Points for Process excellence/ Process Improvement
7 Key Points for Process excellence/ Process Improvement
Benjamin Kyalo
 
Vapour Control Systems - Cashco Products
Vapour Control Systems - Cashco ProductsVapour Control Systems - Cashco Products
Vapour Control Systems - Cashco Products
Benjamin Kyalo
 
Control Valves - Cashco Products
Control Valves - Cashco ProductsControl Valves - Cashco Products
Control Valves - Cashco Products
Benjamin Kyalo
 
Thermal Dispersion Technology - Magnetrol
Thermal Dispersion Technology - MagnetrolThermal Dispersion Technology - Magnetrol
Thermal Dispersion Technology - Magnetrol
Benjamin Kyalo
 
Natural Gas Processing - Magnetrol
Natural Gas Processing - MagnetrolNatural Gas Processing - Magnetrol
Natural Gas Processing - Magnetrol
Benjamin Kyalo
 
Renewable Energy - Magnetrol
Renewable Energy - MagnetrolRenewable Energy - Magnetrol
Renewable Energy - Magnetrol
Benjamin Kyalo
 
Food & Beverage industry-Magnetrol
Food & Beverage industry-MagnetrolFood & Beverage industry-Magnetrol
Food & Beverage industry-Magnetrol
Benjamin Kyalo
 
MAGNETIC LEVEL INDICATORS
MAGNETIC LEVEL INDICATORSMAGNETIC LEVEL INDICATORS
MAGNETIC LEVEL INDICATORS
Benjamin Kyalo
 
GUIDED WAVE RADAR TECHNOLOGY
GUIDED WAVE RADAR TECHNOLOGYGUIDED WAVE RADAR TECHNOLOGY
GUIDED WAVE RADAR TECHNOLOGY
Benjamin Kyalo
 
Cashco Products Presentation
Cashco Products PresentationCashco Products Presentation
Cashco Products Presentation
Benjamin Kyalo
 
Magnetrol contour product line.
Magnetrol contour product line.Magnetrol contour product line.
Magnetrol contour product line.
Benjamin Kyalo
 

More from Benjamin Kyalo (17)

preventing-coding-errors-in-your-operation
 preventing-coding-errors-in-your-operation preventing-coding-errors-in-your-operation
preventing-coding-errors-in-your-operation
 
Removing-the-cost-coding-errors-in-building-materials
 Removing-the-cost-coding-errors-in-building-materials Removing-the-cost-coding-errors-in-building-materials
Removing-the-cost-coding-errors-in-building-materials
 
Videojet industrial product-guide
Videojet industrial product-guideVideojet industrial product-guide
Videojet industrial product-guide
 
NIGHT LITE PRO II - TRAINING
NIGHT LITE PRO II - TRAININGNIGHT LITE PRO II - TRAINING
NIGHT LITE PRO II - TRAINING
 
Powder & Bulk Solids Magazine
 Powder & Bulk Solids Magazine Powder & Bulk Solids Magazine
Powder & Bulk Solids Magazine
 
Combustion Engineering Solutions - Boiler Applications
Combustion Engineering Solutions - Boiler ApplicationsCombustion Engineering Solutions - Boiler Applications
Combustion Engineering Solutions - Boiler Applications
 
7 Key Points for Process excellence/ Process Improvement
7 Key Points for Process excellence/ Process Improvement7 Key Points for Process excellence/ Process Improvement
7 Key Points for Process excellence/ Process Improvement
 
Vapour Control Systems - Cashco Products
Vapour Control Systems - Cashco ProductsVapour Control Systems - Cashco Products
Vapour Control Systems - Cashco Products
 
Control Valves - Cashco Products
Control Valves - Cashco ProductsControl Valves - Cashco Products
Control Valves - Cashco Products
 
Thermal Dispersion Technology - Magnetrol
Thermal Dispersion Technology - MagnetrolThermal Dispersion Technology - Magnetrol
Thermal Dispersion Technology - Magnetrol
 
Natural Gas Processing - Magnetrol
Natural Gas Processing - MagnetrolNatural Gas Processing - Magnetrol
Natural Gas Processing - Magnetrol
 
Renewable Energy - Magnetrol
Renewable Energy - MagnetrolRenewable Energy - Magnetrol
Renewable Energy - Magnetrol
 
Food & Beverage industry-Magnetrol
Food & Beverage industry-MagnetrolFood & Beverage industry-Magnetrol
Food & Beverage industry-Magnetrol
 
MAGNETIC LEVEL INDICATORS
MAGNETIC LEVEL INDICATORSMAGNETIC LEVEL INDICATORS
MAGNETIC LEVEL INDICATORS
 
GUIDED WAVE RADAR TECHNOLOGY
GUIDED WAVE RADAR TECHNOLOGYGUIDED WAVE RADAR TECHNOLOGY
GUIDED WAVE RADAR TECHNOLOGY
 
Cashco Products Presentation
Cashco Products PresentationCashco Products Presentation
Cashco Products Presentation
 
Magnetrol contour product line.
Magnetrol contour product line.Magnetrol contour product line.
Magnetrol contour product line.
 

Recently uploaded

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 

Recently uploaded (20)

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 

27859 a new distributed architecture for remote communications 2013

  • 1. Kepware Whitepaper A New Distributed Architecture for Remote Communications By: Tony Paine, President and CEO Kepware Technologies, and Russel Treat, President and CEO EnerSys Corporation Introduction Control systems are used broadly by many industries and implemented in a variety of ways. In Manufacturing and Process Plants, control systems consist of the integration of Human Machine Interface (HMI) software, Programmable Logic Controllers (PLCs), Distributed Control Systems (DCSs), computers, and a wide range of automation software through the use of high-speed Ethernetbased communications. In geographically distributed systems, such as Oil and Gas production and pipelines, control systems are much different. They consist of the integration of SCADA and a more loosely integrated combination of control devices in the field, local HMI software, and wide-area communications that use a mixture of wireless, fiber optic, and telephone services. In either case, a solution must exist that manages the connection between applications and devices across the various communication mediums. In operations involving production and pipeline monitoring and control, SCADA and Electronic Flow Measurement (EFM) applications require access to data from a wide variety of automation devices. These devices include PLCs, Remote Terminal Units (RTUs), Flow Computers, and other data sources that are not directly connected to the computers on which the applications reside. The communication bridge between the applications and field devices typically requires the use of radios, cellular networks, satellite links, or other types of wireless technology in multiple combinations. Each of these communication mediums has bandwidth limitations, where performance and reliability are easily impacted by the level of traffic sent over the networks—as well as other factors like physical obstructions, weather, and environmental elements. Depending on who owns the communications backbone, there may be costs associated with the volume of data that is transferred across the network, where the need for more data results in more operational expenses. Lastly, this information needs to be securely transmitted to ensure that sensitive data 400 Congress Street, 4th Floor | Portland, Maine 04101 207-775-1660 • sales@kepware.com
  • 2. cannot be intercepted and used for malicious purposes. Together, these factors result in a complex and expensive architecture for remote communications within an Oil and Gas operation. The Current Host-Centric Model “Some form of data collection must exist in order to provide connectivity between the applications consuming the data and the field devices providing the data.” Some form of data collection must exist in order to provide connectivity between the applications consuming the data and the field devices providing the data. Historically, this data collection resides on the same computer as the SCADA host. Data collection can be owned by the SCADA Polling Engine, which must contain the required protocol drivers that are used to pull data directly from the field devices. In other instances, separate standalone applications that expose a generic interface may be responsible for the data collection between the applications and field devices. Unfortunately, the many types of field devices that originate from a wide variety of vendors do not support a universal protocol. As such, there is a 1:1 correlation between the number of data collectors required to run on the host communication server and the number of vendor-specific device types that are part of the overall operation. With bandwidth, cost, and security concerns, the current Host-Centric Model has several shortcomings. First, available bandwidth can quickly become diminished as more applications and devices are added, each increasing the communications throughput over the network. This model results in the periodic dropping of data requests that never make it to the device. It places the applications in a waiting-ona-response state, and forces them to rely on messaging timeouts to restart communications. If multiple data collectors are required to retrieve all the data of interest to each application, and each requires exclusive access to the communications medium, the request and response transactions must be processed serially. This means that a delay in any one transaction has an additive impact on the overall communications cycle because the next transaction cannot be sent until the previous transaction completes or times out. Furthermore, if Operations wants to maintain both a local and remote facility-centric view of pump stations, compressor stations, or gas processing, the implementation of an easily maintained communications infrastructure becomes complicated because different data collectors are used for the local system versus the remote SCADA host. 400 Congress Street, 4th Floor | Portland, Maine 04101 207-775-1660 • sales@kepware.com
  • 3. “The Host-Centric Model is not a cost effective solution when the system must be scaled.” Figure 1: In the Host-Centric Model, several different data collectors are required to provide data locally at the facility and remotely to SCADA, EFM Collection, and other applications. The plant PLCs and Flow Computers receive multiple requests for the same data, diminishing available bandwidth. Next, the Host-Centric Model is not a cost effective solution when the system must be scaled. Typically, there are multiple client applications running on multiple computers that are interested in collecting the same data. This results in multiple data collectors making the same requests to the same devices at roughly the same time. This inefficiency not only uses unnecessary bandwidth, but can quickly become expensive in cases where there is a cost-per-byte for the data being transmitted. Lastly, many of the vendor-specific protocols were developed with the knowledge of these bandwidth limitations and cost concerns. As such, vendors have focused on engineering these protocols down to the bare minimum required to access the data within the device. These protocols are inherently unsecure and can be easily deciphered or subject to man-in-the-middle attacks. This may not be a concern when communications are limited to a private network with physical barriers; however, there usually comes a time when this data needs to be made available externally over public networks, and secure communications will need to be implemented. The New Distributed Communications Architecture A feature-rich and properly implemented Distributed Communications Architecture addresses these issues. In this model, data collectors are no longer required to live on the same computer as the client applications. Instead, they 400 Congress Street, 4th Floor | Portland, Maine 04101 207-775-1660 • sales@kepware.com
  • 4. can exist on any computer that is tied into the communications network. In this way, a single data collector can service multiple client applications interested in the same data from the same devices. By removing the inefficiency of making repeated requests, less bandwidth is needed to provide the same data set. Multiple data collectors can be spread out across multiple computers that are closer to the field devices, each with their own exclusive connection to the network. This allows communications across the various device types to run concurrently, shortening the overall time it takes to acquire all of the data and saving costs for those pay-per-byte connections. As an added benefit, communications to other devices will no longer be affected if a device happens to be unresponsive. “By removing the inefficiency of making repeated requests, less bandwidth is needed to provide the same data set.” Even though communication failures will still occur, a Distributed Communications Architecture allows you to minimize points of failure within the system. It is intuitive to place the data collector as close to the device as possible; the connection may even be hardwired. This proximity increases the likelihood that data will be retrieved from the device as needed. The data collector may even have the ability to buffer and store the data in the event that the remote client applications are unavailable, which enables the data collector to provide the applications with this data in the near future and prevents the loss of data across the system. This can be accomplished through a deferred real-time data playback mechanism or preferably with a more suitable historical data interface for retrieving the stored data. By distributing the data collection from the client applications, we have introduced an abstraction layer between the vendor-specific protocol and the sharing of the information contained within the protocol. Additionally, we can limit the exposure of these unsecure vendor-specific protocols over a wider area network by placing the data collector as close to the device as possible. Now it is possible to have a single secure protocol that connects each client application to the applicable data collectors, removing the concerns for where this data may need to travel in order to reach its destination. 400 Congress Street, 4th Floor | Portland, Maine 04101 207-775-1660 • sales@kepware.com
  • 5. “OPC UA also provides the secure exchange of data between these components by prescribing well-known and adopted IT practices.” Figure 2: In a Distributed Communications Architecture, one data collector at each site provides data both locally and remotely. Devices receive only one request for data needed across all applications. Although there are many ways you could implement a Distributed Communications Architecture, there is one, de facto industrial automation standard whose purpose is to allow vendors to solve the very problems previously discussed. This is the OPC Unified Architecture (UA) standard: a multipurpose set of services that a data collector (known as an OPC server) provides to an application (known as an OPC client) that is ready to consume this information. The OPC UA service set generalizes the methods that are used to discover, collect, and manipulate real-time, historical, and alarm and event data by abstracting away the vendor-specific protocols. OPC UA also provides the secure exchange of data between these components by prescribing well-known and adopted IT practices. By building out your Distributed Communications Architecture based on an open standard such as OPC UA, you will have a greater chance of interoperability between the applications you are aware of today and those you may need to add in the future—all while securely optimizing data throughput across the network. Conclusion The Host-Centric Model requires a data collector for each application that needs data from a specific device in the field. This results in inefficient use of communications bandwidth because multiple requests are being made to the same devices for the same data. Depending on the communications mediums being used, this can come at a significant cost. Native protocols are often 400 Congress Street, 4th Floor | Portland, Maine 04101 207-775-1660 • sales@kepware.com
  • 6. unsecure and should not be used to transmit sensitive data over public networks. A Distributed Communications Architecture removes the problems found in the Host-Centric Model. This architecture optimizes communications requests between client applications and field devices, minimizing bandwidth usage and cost. By leveraging secure communication methodologies, this architecture adds the appropriate level of security required to transmit data over the public domain. “The technology needed to move from a HostCentric Model The technology needed to move from a Host-Centric Model to a Distributed Communications Architecture is available today. The transition requires minimal downtime, as configuration can be accomplished without disrupting established communications. The new architecture provides Oil and Gas operations with an alternative to the current model that is more secure and cost effective, and ready to scale to meet the needs of tomorrow. to a Distributed Communications Architecture is available today.” 400 Congress Street, 4th Floor | Portland, Maine 04101 207-775-1660 • sales@kepware.com