As we step into the Industrial IoT (Internet of Things) era, network reliability remains the first objective for factory control and automation systems. However, many people are not familiar with the unique requirements of Industrial Networks or their integration with traditional enterprise networks. In this webinar you will learn about the trends for SMART factories, best practices for network integration and some leading technologies available to help you design and build an industrial network that meets your needs today and in the future.
Key Takeaways:
1. Understand the unique needs of industrial networks
2. Understand how they interface with traditional IT/Enterprise networks
3. Learn about some available technologies that address these needs
IoT how it works, IoT Perspectives, IoT technologies, IoT architecture, IoT protocols, IoT applications, sensor as service model, IoT data flow, IoT functional view, IoT analogy, IoT taxanomy of research
IoT design considerations
An introductory video and presentation looking at Internet of Things (IoT) and differences between IoT and #IIoT. Examples are provided to help clarify the understanding.
This project presents a door locking system which suggests two ways for unlocking a door using Internet of Things (IoT) and Fingerprint. Most of the major door lock security systems have several loopholes which could be broken down to gain access to the desired places, and it creates a concern for a secure lifestyle and proper working environment. People can access Internet services by using their cell phone, laptop and various gadgets. Fingerprint is a reliable biometric feature having a wide range of applications that require authentication. Biometric systems such as fingerprint provide tools to enforce reliable logs of system transactions and protect an individual’s right to privacy. In the proposed system, fingerprints of the authorized users are enrolled and verified to provide access to a facility that is used by multiple users. A user can also be removed and a new user can be enrolled in the system. We have implemented a centralized control system from where we can control who can enter in which rooms and who cannot. This is an Arduino Mega device based. Fingerprints are stored dynamically in a database for computing the different statistics.
IoT how it works, IoT Perspectives, IoT technologies, IoT architecture, IoT protocols, IoT applications, sensor as service model, IoT data flow, IoT functional view, IoT analogy, IoT taxanomy of research
IoT design considerations
An introductory video and presentation looking at Internet of Things (IoT) and differences between IoT and #IIoT. Examples are provided to help clarify the understanding.
This project presents a door locking system which suggests two ways for unlocking a door using Internet of Things (IoT) and Fingerprint. Most of the major door lock security systems have several loopholes which could be broken down to gain access to the desired places, and it creates a concern for a secure lifestyle and proper working environment. People can access Internet services by using their cell phone, laptop and various gadgets. Fingerprint is a reliable biometric feature having a wide range of applications that require authentication. Biometric systems such as fingerprint provide tools to enforce reliable logs of system transactions and protect an individual’s right to privacy. In the proposed system, fingerprints of the authorized users are enrolled and verified to provide access to a facility that is used by multiple users. A user can also be removed and a new user can be enrolled in the system. We have implemented a centralized control system from where we can control who can enter in which rooms and who cannot. This is an Arduino Mega device based. Fingerprints are stored dynamically in a database for computing the different statistics.
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
Internet Society (ISOC) aims are:
make security an integrated function of connected objects and encourages IoT device and service providers for consumers to adopt the Online Trust Alliance (OTA) security and privacy principles ;
increase the consumer demand for security and privacy in the IoT devices they purchase;
create government policies and regulations that promote better security and privacy features in IoT devices.
The growth of embedded systems connecting to the Internet or "Internet of Things" (IoT) increases year by year. Thus, the IoT ecosystems become new targets of the attackers. This presentation will talk about the basic principle of information security, why we need to secure IoT ecosystems, and also the vulnerabilities and solutions from OWASP.
Iot: Introduction ,architecture ,application especially engineering ,software,hardware,protocols and challenges
nodered software code for Iot simulation
** Edureka IoT Training: https://www.edureka.co/iot-certification-training**
This Edureka tutorial video on "Iot Technology" will help you grasp the outline of Internet of Things, and let you relate to how it is revolutionizing the world today. This IoT tutorial helps you learn the following topics:
1. Vision of IoT
2. “Things” in IoT
3. IoT Technology Stack
4. IoT Ecosystem
5. IoT Demo – Media Center using Raspberry Pi
6. Prospects & Scopes
A Presentation on Smart Sensor
Presentation By:
Indrojyoti Rano
Debraj Roy
Ritwik Nandi
Students of Asansol Engineering College
3rd Year B.Tech Applied Electronics and Instrumentation Enginnering
An overview of security and privacy challenges that must be faced and solved when creating new Things for the Internet of Things. We discussed why are Things inherently insecure together with examples of attack vectors and learned some risk mitigation strategies. We realized why should users be wary of Things violating their privacy and gained awareness of upcoming EU privacy legislation that affects providers of IoT-based solutions. Talk given at Pixels Camp 2017, Lisbon.
As Industrial Ethernet networks become the backbone of communications on the plant floor, getting these networks up and running and keeping them running has a direct impact on overall plant uptime and productivity. Industrial Ethernet technologies have matured over the years and now offer many tools and technologies that aid in the commissioning, maintenance and troubleshooting of these networks. Join us as we share some of the most useful tools and technologies that help get your network up and running quickly and maximize availability to keep production at its peak.
After attending this webinar, you will:
• Understand ways to speed up configuring & commissioning your industrial network
• Understand best practices for maintaining your network once itis up & running
• Understand tools for troubleshooting and minimizing downtime
this explains how we can provide preventive maintenance to equipment manufacturers. This is a process of continuous data flow to cloud and for meaning display of data through BI Tools. ! Pharmaceuticals | Wind Mills | Mobile Towers |
! Give us a try !
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
Internet Society (ISOC) aims are:
make security an integrated function of connected objects and encourages IoT device and service providers for consumers to adopt the Online Trust Alliance (OTA) security and privacy principles ;
increase the consumer demand for security and privacy in the IoT devices they purchase;
create government policies and regulations that promote better security and privacy features in IoT devices.
The growth of embedded systems connecting to the Internet or "Internet of Things" (IoT) increases year by year. Thus, the IoT ecosystems become new targets of the attackers. This presentation will talk about the basic principle of information security, why we need to secure IoT ecosystems, and also the vulnerabilities and solutions from OWASP.
Iot: Introduction ,architecture ,application especially engineering ,software,hardware,protocols and challenges
nodered software code for Iot simulation
** Edureka IoT Training: https://www.edureka.co/iot-certification-training**
This Edureka tutorial video on "Iot Technology" will help you grasp the outline of Internet of Things, and let you relate to how it is revolutionizing the world today. This IoT tutorial helps you learn the following topics:
1. Vision of IoT
2. “Things” in IoT
3. IoT Technology Stack
4. IoT Ecosystem
5. IoT Demo – Media Center using Raspberry Pi
6. Prospects & Scopes
A Presentation on Smart Sensor
Presentation By:
Indrojyoti Rano
Debraj Roy
Ritwik Nandi
Students of Asansol Engineering College
3rd Year B.Tech Applied Electronics and Instrumentation Enginnering
An overview of security and privacy challenges that must be faced and solved when creating new Things for the Internet of Things. We discussed why are Things inherently insecure together with examples of attack vectors and learned some risk mitigation strategies. We realized why should users be wary of Things violating their privacy and gained awareness of upcoming EU privacy legislation that affects providers of IoT-based solutions. Talk given at Pixels Camp 2017, Lisbon.
As Industrial Ethernet networks become the backbone of communications on the plant floor, getting these networks up and running and keeping them running has a direct impact on overall plant uptime and productivity. Industrial Ethernet technologies have matured over the years and now offer many tools and technologies that aid in the commissioning, maintenance and troubleshooting of these networks. Join us as we share some of the most useful tools and technologies that help get your network up and running quickly and maximize availability to keep production at its peak.
After attending this webinar, you will:
• Understand ways to speed up configuring & commissioning your industrial network
• Understand best practices for maintaining your network once itis up & running
• Understand tools for troubleshooting and minimizing downtime
this explains how we can provide preventive maintenance to equipment manufacturers. This is a process of continuous data flow to cloud and for meaning display of data through BI Tools. ! Pharmaceuticals | Wind Mills | Mobile Towers |
! Give us a try !
THE NETWORK Communication Group credentials jan 2014 Saad El Zein
THE NETWORK Communication Group is a holding company created to host the group’s different specialized communication disciplines that professionally serve local, regional and international clients.
Answering the clients needs and challenges of the growing and evolving communication landscape, THE NETWORK Communication Group provides partners holistic and integrated creative solutions.
Module 9: Increasing Security for Network Communication
Internet Protocol security (IPsec) is a framework of open standards for protecting communications over IP networks through cryptographic security services. IPsec supports network-level peer authentication, data-origin authentication, data integrity, data confidentiality (encryption), and replay protection. The Microsoft IPsec implementation is based on standards that the Internet Engineering Task Force (IETF) IPsec working group developed. In this module, you will learn how to implement, configure, and troubleshoot IPsec.
Lessons
Overview of IPsec
Configuring Connection Security Rules
Configuring NAP with IPsec Enforcement
Monitoring and Troubleshooting IPsec
Lab : Increasing Security for Network Communication
Selecting a Network Security Configuration
Configuring IPsec to Authenticate Computers
Testing IPsec Authentication
After completing this module, students will be able to:
Describe when and how to use IPsec.
Configure Connection Security rules.
Configure IPsec with NAP Enforcement.
Describe how to monitor and troubleshoot IPsec.
A computer network is defined as the interconnection of two or more computers. It is done to enable the computers to communicate and share available resources.
Components of computer network
Network benefits
Disadvantages of computer network
Classification by their geographical area
Network classification by their component role
Types of servers
In today’s connected world, cyber security is a topic that nobody can afford to ignore. In recent years the number and frequency of attacks on industrial devices and other critical infrastructure has risen dramatically. Recent news stories about hackers shutting down critical infrastructure have left many companies wondering if they are vulnerable to similar attacks. In this webinar we will discuss the most common security threats and unique challenges in securing industrial networks. We will introduce the current standards and share some useful resources and best practices for addressing industrial cyber security.
Key Takeaways:
1. Gain perspective regarding common security threats facing industrial networks.
2. Learn about the relevant standards governing industrial cyber security.
3. Increase understanding of some best practices for securing industrial networks.
The rapid growth of connected devices in the industrial sector is driving a significant increase in scope and complexity for industrial networks as they converge with more traditional IT networks. In addition, growing concerns about security, availability and performance are associated with costs that can often exceed the initial investment in networking hardware. In this webinar, we introduce a model for understanding an industrial network’s total cost of ownership (TCO), review the top 5 hidden costs that operators face, and share some tips and tools to lower the TCO for industrial control networks.5 Tips to Reduce Your Industrial Network TCO
Here's What We'll Cover:
1. Common networking challenges for industrial users
2. The Total Cost of Ownership model
3. Top 5 hidden industrial networking costs
4. Tips & tools to lower your industrial network’s TCO
InSource 2017 IIoT Roadshow: Collecting and Moving DataInSource Solutions
By Pete Bayes, Advantech
In today’s world, the infrastructure provided by smart city and industrial automation systems enables continuous connectivity. The commonality shared by such systems is their association with the Internet of Things (IoT). With the inclusion of sensors and control devices, entire infrastructures can be integrated with information and communication technologies, resulting in networked and embedded devices that enable intelligent monitoring and management.
Advantech is a global leader in the embedded computing market, learn more by viewing the presentation.
An in-depth look at all the products and services that ICP DAS USA will be offering in the year 2020. The types of products we have on offer include: remote I/O data acquisition modules in a wide variety of protocols and specifications, industrial controllers, PACs, PLCs, ruggedized touchscreen displays and panel PCs, SCADA & HMI software, data loggers and data logging software, power meters, gateways, converters, power supplies, and much more.
PROFINET - The backbone of IIoT.
IOT, IIOT, Industrie 4.0 are becoming popular topics of conversation, but what do they mean and where does PROFINET fit into the equation? This presentation will try to explain this and provide a clearer idea of the benefits of using PROFINET as part of an overall move towards these concepts, collectively known as the 4th Industrial Revolution.
BIOGRAPHY
Peter Thomas is a Process Control and Automation Engineer with Control Specialists Ltd. He is Chairman of the PROFIBUS & PROFINET International Training Centre (PITC) Workgroup and is a member of the PROFIBUS UK Steering Committee.
Learn what makes SCADAguardian (the Nozomi Networks flagship technology) so unique and powerful. From enterprise IT, to OT, we enable scalable security strategies for ICS.
Ls catalog thiet bi tu dong master rtu e_dienhathe.vnDien Ha The
Khoa Học - Kỹ Thuật & Giải Trí: http://phongvan.org
Tài Liệu Khoa Học Kỹ Thuật: http://tailieukythuat.info
Thiết bị Điện Công Nghiệp - Điện Hạ Thế: http://dienhathe.org
Global adoption of automation, AI, and robotics to increase productivity is
inseparable from monitoring and managing equipment remotely. Teltonika
Networks has long-standing experience in this field, enabling manufacturers,
integrators, and machine builders to stay in control of their equipment
anytime, anywhere
Internet of Things - structured approach to the physical plant network - Rock...Carotek
The convergence of new technologies that securely connect plant information with enterprise systems can bring greater productivity, better utilization of assets, and improved decision-making to industrial companies. By bridging the gap between factory-level systems and enterprise systems, Rockwell Automation and Cisco can show how the connected enterprise offers ease of use, lower total cost of ownership, and improved operations.
A communication network is a fundamental necessity in most modern industrial operations to support process control and other factory applications. In many industrial facilities, wired networks are difficult to install or not flexible enough to support quick process reconfiguration, making wireless an ideal choice. A Tropos industrial wireless mesh network provides customers with the flexibility to install the type of network they need, including support for remote locations and mobile equipment.
Cloak your critical industrial control systems before they get hackedTempered
Learn how cloaking allows you to safely connect your ICS networks and SCADA systems with end to end encryption. Easy to deploy, manage and maintain--without IT security skills.
Modernizing the Manufacturing Industry with Kafka and MQTT Dominik Obermaier
Industry 4.0 and smart manufacturing are driving the manufacturing industry to modernize their software infrastructure. The current infrastructure is costly to maintain, creates barriers to sharing data, difficult to integrate with other systems and is limiting corporations to new opportunities promised by Industry 4.0. A key challenge to modernizing a manufacturing infrastructure is how do you integrate old existing systems with new modern systems. Apache Kafka and MQTT are unique positioned to provide the core technology to enable modernization of the manufacturing industry.
This presentation will look at the unique business drivers for modernizing the manufacturing industry and how MQTT and Kafka can help make it a reality.
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Smart Networks for the Industrial Internet of Things
1. Building a SMART Network for
the Industrial IoT
Richard Wood
Product Marketing Manager
Industrial Ethernet Infrastructure
April 29, 2015
IIoT Webinar Series
4. Confidential
Megatrend – Internet of Things (IoT)
“The IoT refers to devices, systems, and services
communicating with each other via the Internet to
enable smarter operations and new applications.”
5. Confidential
Industry Trend – Industry 4.0 (IIoT)
IoT in Manufacturing - The Next Industrial Revolution
Objective
Utilize a combination of
cyber and physical systems
to build up highly efficient
Smart Factory
Industry 4.0
6. Confidential
Interconnected ERP, MES, and industrial automation systems
together
The goal is to reach High Efficiency by reducing defects,
unplanned downtime, waste, and waiting
Smart Factory is
“The Factory of The Future”
MES
Machine (PLC)
Manufacturing Prodution
Production Planning
ERP (PLM)
Product Development
Device (Sensor)
Manufacturing Prodution
Smart Factory
Network Integration
8. Confidential
Integration with Enterprise Networks
Industrial Ethernet is the Common Platform
• Interconnect devices, systems, and services
• Transmit data for analysis, decision making and control
Source: IEEE, 2014
SMART
FACTORY
Network Integration
Enterprise Network
Data Center
9. Industrial Network Top 3 Challenges
How do we…
Simplify Installation
& Deployment
Minimize Error
Probability
Accelerate Error
Discovery & Repair
• Optimized Network
Topology
• Quick Mass
Configuration
• Device Durability
• Network
Redundancy
• Cyber security
Protection
• Instant Active
Alarm
• Easy SCADA
Integration
• Remote Visualized
Network
Management
Top Strategies
11. Confidential
Factory is Vulnerable to Cyber Attacks
Source: ICS-CERT 2013 Report, Region: the U.S.
Cyber attacks may come from both outside AND inside factory
Security
12. Confidential
Industrial Security Concerns
PLC/IO Network
Control
Network
Field Site / Factory
Control Room
Attack from
public network
Unauthorized
connection
Malfunctioning PLC
Broadcast
Storm
• VPN function for data encryption
• VPN server for dynamic remote access
• Standard protocol: IPSec, L2TP, PPTP
• Protect unauthorized connections to
critical devices (PLC, RTU, DCS)
• Isolated broadcast packets from
malfunctioning device to entire network
VPN tunnel Firewall
Security
13. Confidential
Quick Mass Configuration
How do we reduce industrial network installation
& configuration time?
• Industrial Network Configuration Tools
Client ITS System Integrator
Current
Solution
Configure 20+ switches
individually thru Web UI
Pain
Point
Cost a lot of time and
manpower to complete
the configuration
Sequential IP setting
Redundancy
VLAN
…
Smallest IP
Current With Tools 10
times faster
Management
14. Confidential
Visualized Network Management
How can maintenance engineers monitor & manage
large scale industrial networks?
• Visualized NMS
Industrial NMS Enterprise NMS
Design for… Industrial Engineers, Maintenance Engineers IT expert
Connection Physical link (Down to “port”) Logical link
Information
Dispaly
Visualization & List List
Response Real time Periodic
Management
18. Confidential
Build Up a Highly Reliable
Communication Network
How do you choose the best redundancy for your application?
Network switch/recovery time < Max. acceptable system downtime
(Grace Time)
Non time critical
< 1 s
Real Time
< 100 ms
Isochronous Real Time
< 1ms
Applications
Non time critical
applications
Process Automation
/ Factory Automation
Motion Control
Grace Time
Reliability Availability
19. Confidential
Optimized Network Topology
Redundant
Technology
Type Mesh Ring
Pros
• Good reliability
• High resilience
• Standard protocol
• Better performance and recovery time:
~millisecond level
• Lower cost
Cons • Slow recovery time ~second level • Limited Scale
Available
Technology
RSTP
General
Fast Recovery
(millisecond level)
RSTP
(20 ms @ 250 devices)
Applied
Environment
Commercial Harsh environment, Industrial automation
Backup Link
Root
Source: Moxa
Industrial
Preferred
Availability
20. Confidential
Fast Boot-up is Critical to
Increase Network Availability
• PLC Boot-up Time*: ~20 sec
• Most Switches: 40 sec ~ 1.5 min.
•Industrial Ethernet Switches: 10 sec
The time for switches to boot-up should be
shorter than the PLC in order to improve the
stability of the network
* Siemens S7300, Allen Bradley CompactLogix 1769
Higher system availability, lower
maintenance cost
Prevention of unnecessary alarm
messages
Benefits
Ready !
Ready !
Ready !
Not yet!
Availability
21. Confidential
Seamless Communications
Allows mobile devices (like AGVs) to be
constantly connected to a wireless network
Reduces downtime and ensures all data gets
through
Availability
22. Confidential
Zero Packet Loss - Overview
Traditional Approach Vulnerable to Packet Loss
• Single-RF devices
• When interference disrupts data transmission, communication is
disabled
• Dual-RF devices
• The secondary frequency is activated and data transmission
resumes
• However, packet loss will occur during the switching period.
• Threshold setting will generate a “ping-pong” effect between two
bands making the switching mechanism very inefficient
Availability
23. Confidential
Zero Packet Loss: Concurrent Dual-Radio
Technology
Eliminates the possibility of wireless interference
• Duplicate packets and transmit via two independent
modules simultaneously
• When interference interrupts data transmission on the
primary channel, concurrent transmission via the
secondary frequency eliminates packet loss
Increase the throughput by reducing the number
of resend request
Availability
26. Confidential
Integration with Control Level Network
SCADA Integration?
• Plant field SCADA to control and manage devices through
industrial protocols
• Some switches support industrial protocols in order to
integrate with SCADA
• PROFINET
• Ethernet/IP
• Modbus TCP
There are industrial automation specific
switches that enable industrial protocols
by default - Plug-n-Play!
Systems Integration
27. Integrating from Device to Enterprise
Confidential
Systems Integration
Device
Servers
Gateways
Core
Switches
Edge
Switches
29. Confidential
Facility Management >> Country: Taiwan
NMS enables SCADA to monitor network status
The switches have 3 GbE ports for creating a
GbE redundant ring and GbE uplink
Ring and Chain technologies allow Gigabit
redundancy < 50 ms
Solution & Benefits
A semiconductor plant invested in
thousands of dry pumps for an exhaust
system to protect workers from toxic gases
Solutions needed to simplify pump system
control and monitoring
Background & Requirements
Environmental Monitoring for
Air Purification Systems
30. Confidential
Warehouse Automated
Guided Vehicle System
Facility Management >> Country: Germany
A wireless solution saves wiring cost, and
supports wireless AP, bridge, and client modes
for easy deployment and mobility
Enables wireless VLAN and secure polling
Supports fast roaming for millisecond-level
handover
Solution & Benefits
A factory in Europe chose an industrial
access point to control and monitor
numerous AGVs to support their fast
growing warehouse management
system
Background & Requirements