You are on page 1of 52

11.

2017 Issue 103


ISSN 1470-5745

The Journal of Industrial Networking and IoT

Rise of cloud connectivity


drives smart factory 8

Common Industrial Cloud Single-pair balanced IIoT best practices using Fast roaming challenge
Interface for CIP data 12 Ethernet transmission 30 MQTT architectures 33 for industrial WiFi 42

www.iebmedia.com/ethernet n www.iebmedia.com/wireless
Open road to a common goal:
Your Industrial IoT future

POWERLINK
and OPC UA TSN
The seamless solution
for integrated connectivity.
Efficient, vendor-independent,
optimized for fast cycle times and
structured access to big data.
Let's shape the future.
www.ethernet-powerlink.org

IEB103_p2.indd 2 08.11.1745 10:32


GET CONNECTED www.iebmedia.com/ethernet n www.iebmedia.com/wireless

Contents
Rise of the Cloud Contents
Lost in all of the hyperbole about the
Industrial Internet of Things and Industry 4.0 Industry news 4
is the rise and importance of cloud computing.
Earlier this year, Oracle Corporation published Automation data leverages cloud connectivity architectures 8
a research study that showed that 62%
of businesses are currently implementing Common Industrial Cloud Interface for CIP data transfer 12
robotics technology, or are planning to do
so. More than 60% have or plan to work with
Artificial Intelligence. POWERLINK and CODESYS enable Industry 4.0 solutions 18
Most companies also realize that a reliable
cloud infrastructure is required to bring these
Future-oriented communication for setting up machine networks 20
technologies to life. Again, 60% believe
an enterprise cloud platform provides the Cloud-based, cellular SCADA system for water treatment 22
opportunity for organizations to capitalise
on innovation such as robotics and artificial Gigabit Ethernet addresses requirements of Industry 4.0 24
intelligence. And believe it or not, a large
majority of businesses are on-course with their Next generation software-defined Wide Area Networks 26
plans to establish a single integrated cloud
model across their organization. Open architecture enables edge-computing applications 28
The Oracle study went on to say that,
while only 8% currently have an integrated Single-pair balanced Ethernet transmission for IoT applications 30
cloud model in place that works for legacy
applications and new platforms, 36% say they
are implementing one in 2016 and another
IIoT best practices: guidelines for MQTT architectures 33
40% expect to do so in 2017. Only 5% have
no plans in place to make this transition. Industrial web-based computing: is data intelligence finally here? 38
This issue is filled with perspectives on cloud
computing and its benefits. Fast roaming: a challenge for industrial Wi-Fi applications 42
On page 8, youll find how Cloud
communication architectures are
New Products 45
providing options for enabling IoT
applications by integrating connectivity Private Ethernet 50
with field level devices. IoT gateways
and controllers that offer intrinsic cloud
connectivity are combining with OPC UA
to provide powerful, secure and flexible Industrial Ethernet Book
solutions. The next issue of Industrial Ethernet Book will be published in January/February 2018
Deadline for editorial: December 21, 2017 Deadline for artwork: January 12, 2017
On page 12, we take a look at the
Common Industrial Cloud Interface and Product & Sources Listing
how it leverages cloud technologies All Industrial Ethernet product manufacturers (not resellers) are entitled to free of charge
to provide consumers and producers entries in the Product locator and Supplier directory sections of the Industrial Ethernet Book.
the most value throughout the entire If you are not currently listed in the directory, please complete the registration form at
lifecycle of devices that use CIP www.iebmedia.com/buyersguide/ to submit your company details.
technologies for data transfer.
Update your own products
On page 26, you can learn how next If you wish to amend your existing information, login to the Editor section
generation software-defined networking www.iebmedia.com/buyersguide/register.htm and modify your entry.
is transforming Wide Area Networks.
Do you want to receive issues of Industrial Ethernet Book? Call, mail or e-mail your details, or
And on page 38, we look into how fog subscribe at www.iebmedia.com/service/
computing and cloud technology are
actually working together to provide
more power for control centres.
Editor: Al Presher, editor@iebmedia.com
In the world of automation and control, there Contributing Editor: Leopold Ploner, info@iebmedia.com
is no question that network connectivity
Advertising: map Mediaagentur Ploner, info@iebmedia.com
has become the focal point of technology
initiatives. And the cloud in all of its various Tel.: +49-(0)8192-933-7820 Fax: +49-(0)8192-933-7829
incarnations is becoming squarely at the Online Editor: Adela Ploner, info@iebmedia.com
center of future plans. We hope you continue Circulation: subscriptions@iebmedia.com
to look at the Industrial Ethernet Book as your
source for information on these key topics. Published by
That is certainly our goal, as we strive to serve IEB Media, Bahnhofstrasse 12, 86938 Schondorf am Ammersee, Germany
our readership and their plans to make the IoT
ISSN 1470-5745
and Industry 4.0 vision a reality.
Al Presher

1 1. 2017 i n d u str i a l e th e r n e t b o o k 3
IIC consortium testbeds provide
Industry news

real-world IIoT deliverables


Testbeds enable members to think through innovations, test new applications, processes, products, services
and business models to ascertain their usefulness and viability before taking them to market.

THE FOLLOWING IIC TESTBEDS have shared

SOURCE: IIC
important first results.
Track & Trace Testbed: Initially formed to
trace process tools, the team deployed sensors
that provided information about the location
of tools and assets in use. It was expanded
from tools to logistics equipment and forklifts.
Results: The testbed identified
standardization opportunities in localization-
technology interfaces, tightening-tool
interfaces, enterprise-system interfaces, data
models, data communications and device
management. It also identified reusable
interfaces that opened the solution to
components from different vendors.
Time Sensitive Networking Testbed: Time-
sensitive networking (TSN) enhances Ethernet
to bring more deterministic capabilities to
the network, including time synchronization,
which schedules traffic flows and manages
central automated system configuration.
This testbed applies TSN technology in a The Manufacturing Quality Management testbed is focused on improving manufacturing quality by retrofitting
manufacturing system with a wide range of outdated factories using modern sensory networks and analytic technologies.
automation and control vendors.
Results: The testbed deployed early-phase of a real-time, securely distributed control insight into the health of critical assets. It
IEEE 802.1 and IEEE 802 Ethernet standards. architecture for real-world microgrid leverages advanced sensors that automatically
The testbed will improve upon those standards, applications. It leverages an Industrial predict equipment failure and notifies a person
making the use of TSN where it can improve Internet Reference Architecture (IIRA) or system so that pro-active steps can avoid
efficiency, such as manufacturing and energy. pattern called the layered databus that equipment damage and downtime.
Manufacturing Quality Management federates multiple connectivity domains into Results: This testbed demonstrated how
Testbed: This testbed will improve a larger system. The testbed implemented the to make older assets smart, collecting asset
manufacturing quality by retrofitting outdated pattern with the Data Distribution Service health data from four pump/motor skids used
factories using modern sensory networks and (DDS) standard as explained in the Industrial to pump chilled water from an HVAC system.
analytic technologies. The initial success was Internet Connectivity Framework (IICF) Smart Factory Web Testbed: This testbed
shown using the welding section of the air guidance. The testbed validated both the networks a web of smart factories to improve
conditioner production line in a factory. pattern and its implementation, contributing order fulfillment by aligning capacity across
Results: In March 2017, an optimized noise to the Open Field Message Bus (OpenFMB) production sites.
detection analytic engine was proven to help design, now a power industry standard. Results: Factory assets can be registered
reduce the false detection rate by 45%. In INFINITE Testbed: The INternational Future and searched for in the Smart Factory Web
June 2017, the analytic engine for noise INdustrial Internet TEstbed (INFINITE) uses (SFW) portal. IEC standards OPC UA and
detection was integrated into the production software-defined networking to create virtual AutomationML are used to achieve semantic
line and the accuracy of pass/fail detection domains so that multiple virtual domains can interoperability and are applied to exchange
was dramatically improved. run securely on a single physical network. information between engineering tools.
Communication and Control for Microgrid Results: This testbed enabled intelligent The IIC reviews testbed proposals to
Applications Testbed: A microgrid combines route planning for ambulances to improve identify goals, value, potential partners and
generation and storage into a local power response times, leading to better pre-hospital commercial viability of each testbed. The
system. It allows more reliable use of emergency care experiences and outcomes for testbeds must offer a solid business case and
renewable sources like solar or wind power in patients. It also led to improved safety and have relevance to IIC IIoT frameworks to help
conjunction with, or even isolated from, the effectiveness of first responders in emergency members develop IIoT systems more rapidly.
rest of the power grid. Near-term uses are for situations, especially in harsh environments. A
limited areas, such as a campus, corporation, third use case enabled detection of anomalies The full report, Why We Build Testbeds:
hospital, factory or residential area. Someday, or fraudulent behavior within the power grid First Results is available on the IIC website
the microgrid architecture will enable deeper through machine learning algorithms. at http://www.iiconsortium.org/test-beds.htm.
use of renewables throughout the main grid. Condition Monitoring and Predictive
Results: This testbed proves the viability Maintenance Testbed: This testbed provides News from Industrial Internet Consortium.

4 in d u s t r ial et h er ne t b o o k 11.2017
IEB103_p5.indd 5 08.11.1745 10:44
Microsoft demonstration walls
Industry news

highlight Azure Industrial IoT


Microsoft partners with Hewlett Packard Enterprise (HPE), Honeywell, Mitsubishi, Rockwell, Siemens,
Schneider, Beckhoff, Harting and Leuze showing the Microsoft Connected Factory.

OPC FOUNDATION HAS DELIVERED the

SOURCE: OPC
first Azure IoT Suite Connected Factory
demonstration walls that will be displayed
internationally at the Microsoft Technology
Centers. These interactive walls demonstrate
vendor devices from different verticals
showing a bidirectional connection to Azure:
Device-to-Cloud (D2C): Devices push
telemetry data to the Azure IoT platform
Cloud-to-Device (C2D): Allows secure
browsing of rich OPC UA information
model from Azure IoT platform and
command and control machines
Microsoft first demonstrated OPC UA
integration into Azure IoT Suite at Hanover fair
in April 2016. Over 30 companies participated
by providing OPC UA enabled devices for an
integrated Connected Factory demonstration.
This Hanover demonstration was later turned A purpose of the Azure IoT demonstration wall is to illustrate device-to-cloud and cloud-to-device connectivity.
into a decision by Microsoft and the OPC
Foundation to actively promote the Connected Microsoft Innovation Center in Taiwan: We Microsoft Technology Centers, the IoT Labs in
Factory demonstration by developing see OPC UA as a critical standard for ensuring Redmond, Germany and China and the newly
freestanding OPC UA demonstration walls. interoperability between manufacturing established IoT Innovation Center in Taiwan,
The Connected Factory demonstrates the OPC processes and equipment, spanning decades of to demonstrate the strong ecosystem with
UA technology as a solution for Industrial investment for many companies. We have been connected OPC UA devices and the Connected
IoT, Industrie 4.0, Made in China 2025, Korea working with the OPC Foundation on building Factory preconfigured solution running on the
Manufacturing and other initiatives. up 40 OPC UA devices walls which are currently Azure IoT platform.
Jason Zander, Corp. Vice President Microsoft being distributed to the Microsoft Executive
Azure said during the opening ceremony of the Briefing Center in Redmond, worldwide News by Microsoft and OPC Foundation.

Integration of IO-Link into OPC UA


THE IO-LINK COMMUNITY has founded a

SOURCE: OPC
technical working group for specifying the
integration of IO-Link into OPC UA based on
existing use cases. The Industry 4.0 platform
sees OPC UA as a suitable architecture model
for implementing integration of IT on the field
level. This is why a corresponding standard for
a data and function model is being developed
within the framework of the IO-Link community
so as to accurately represent future IO-Link
Devices and IO-Link Masters in OPC UA. This
approach follows the general recommendation
A final proposal for the companion specification is to be available before the end of 2018.
for developing OPC UA Companion Standards.
Over the past few years, IO-Link as a point- and actuators can be connected to the Devices into systems on a higher level than the
to-point protocol for sensors and actuators various different field bus systems without field bus in order to evaluate sensor data. This
has been able to solidly establish itself and further adjustment. Such masters can even functionality is often designated as a sensor
increase its presence. It is manufacturer be economically integrated into simple to the cloud to express that sensor data is
independent (and thus field bus independent), devices today. IO-Link offers access to a very analyzed by IT systems outside the automation
has come to support more than 4,500 devices broad range of sensors and actuators in a process. In this way, sensor data can also be
and enjoys steadily increasing acceptance. standardized way and fieldbus independent. seamlessly linked to MES and ERP systems.
Through the use of corresponding logic, As Industrie 4.0 efforts progress, it is also
so-called IO-Link Masters, IO-Link sensors necessary to semantically incorporate IO-Link News by OPC Foundation.

6 in d u s t r ial et h er ne t b o o k 11.2017
One network,
all options
Make the most of all the options offered by your Ethernet network.
Hall 9, Booth 9-310
Industrial Ethernet components from Phoenix Contact offer you more real time,
more wireless, more security, and more availability. Integrate industrial Ethernet
components from Phoenix Contact with ease into your automation infrastructure
and benefit from our many years of experience.

For additional information call +49 5235 3-00 or visit phoenixcontact.com

ION05-17.000.L1
PHOENIX CONTACT 2017

IEB103_p7.indd 7 08.11.1745 10:57


Automation data leverages
Applications
Technology

cloud connectivity architectures


Cloud communication architectures are providing options for enabling Industrial Internet of Things
applications by integrating connectivity with field level devices. IoT gateways and controllers that offer
intrinsic cloud connectivity are combining with OPC UA to provide powerful, secure and flexible solutions.

CLOUD COMPUTING and the Internet of Things

SOURCE: SIEMENS
promise interesting possibilities for industrial
companies by enabling enterprise solutions
from process design to new business models.
A key prerequisite is a sufficiently wide
database transmitted from the field level to the
cloud. But this also requires a powerful, secure
and flexible communication architecture.

Big Data algorithms


So the idea is to transmit sensors from the field
level which, for example, monitor temperature
curves, vibrations and power consumption of
a machine, to the virtual evaluation platform,
the cloud, as the basis for big data algorithms.
Direct connectivity of sensors to the cloud
via the Intranet and Internet, though, seems
rather difficult in practice. Many sensors
today are not even Ethernet-enabled; instead
they transport the measured values to a
programmable logic controller (PLC) via a
current interface (4...20 mA).
Modern sensors may offer an IO-Link
interface, which is also not cloud-capable,
and therefore must first be compiled into the
corresponding protocols including a routing
capability by means of a master module
and a gateway. Even if the sensor system
came with the necessary Ethernet interfaces
and protocols, several thousand Internet
connections from the field to the cloud would
be very difficult for IT administrators to
control, not to mention the vast amounts of Cloud connectivity requires a powerful, secure and flexible communication architecture.
data without a clear business case that would
have to be processed in the cloud. acquisition and communication to the cloud. network path.
The acquisition part is used to cyclically query As an alternative, controllers can also
Effective system architectures the data to be transmitted from the field offer intrinsic cloud connectivity. Although
It therefore makes more sense to provide level, primarily from the PLC. The Ruggedcom the automation project has to be adapted in
an aggregation unit on the control level RX1400 industrial IoT gateway from Siemens, the process, the possibilities are much more
that compresses the data and bundles the for example, offers the Simatic S7 protocol, diverse. For instance, information about
information from the large number of sensors. which allows the query of data without prior the context of the cloud data is available
From the automation point of view, this task adaptation of the automation program, an in the PLC, whether a machine is starting
can optimally be carried out by a PLC, since effective solution for existing plants. up, is operating normally or is in standby.
most of the sensor data accrues there anyway, For other device types, the RX1400 also Derived from this, different data can then
e.g., for machine monitoring. In addition, the supports OPC UA on the field level. So that be transmitted, or the cycle time for the
PLC already performs its own compression, besides using Ethernet, the data can also transmission be dynamically adjusted tight
e.g., through logical or arithmetic linking of be transported via WLAN. For transmission time periods during startup, rather sporadic
the data. to the cloud, the gateways support various status reporting in standby mode.
In order to realize the communication from communication protocols, e.g., for the This helps reduce the communication
the PLC to the cloud, there are basically two connection to MindSphere. Furthermore, load and avoids flooding the cloud with
approaches with specific advantages. On the gateways are useful with regard to the security irrelevant information noise. For these
one hand, IoT gateways can be used. These of the communication networks, since the reasons, MindConnect FB technology provides
devices possess two logical units for data cloud connection can take place via a separate corresponding communication blocks for the

8 in d u s t r ial et h er ne t b o o k 11.2017
Ethernet communication between electronic equipment has increased with Industry 4.0 which brings
efficiency of manufacturing with ICT technology. In response to this increasing demand HIROSE
had standardized a new miniaturized Ethernet mating interface in compliance with IEC/PAS 61076-
3-124. The ix IndustrialTM socket size is reduced by 75% compared to the existing RJ45 modular
connectors, and offers ideal space saving cabling for applications with miniaturized requirements.

Compact: 75% smaller in size than a RJ45


Robust: 5000 mating cycles
High-speed: Ethernet 1Gbps/10Gbps
High EMC resistance
Complies with IEC/PAS61076-3-124

Security System Data Center Communications


Transportation Robotics Factory Automation

www.hirose.com/eu - info@hiroseeurope.eu

IEB103_p9.indd 9 09.11.1745 14:30


SIMATIC S7-1500 PLC and the MindSphere

SOURCE: SIEMENS
operating system, which are configured and
Technology

programmed in the TIA Portal. This also


means that the engineering data for the
cloud connection is automatically contained
in the project backup and can be duplicated
on other controllers, an important advantage
for manufacturers of standardized machines.

Importance of security
Security against attacks remains of utmost
importance when it comes to intrinsic
communication. Although the MindConnect
FB library already features an encrypted
transmission of data, the use of a separate
communication module is recommended for
maximum security, such as the CP 1543-1.
This plug-in module for the SIMATIC S7-1500
decouples the cloud communication from the
automation network as it provides a separate
Ethernet interface. To fend off attacks on the
CP, a firewall is integrated into the module.
Denial of service attacks (DoS attacks) on the
automation network can also be averted.
In addition to the actual communication
architecture, the information design has to be Variations for cloud connectivity include MindConnect FB and CP 1543-1 (left) or an industrial IoT gateway (right).
considered as well; put simply, this means the
protocols to the cloud. From the perspective
of a data analyst, proprietary data formats for IIoT is required, which preferably is supported Companion specifications
devices or manufacturers are to be avoided at by all devices in the same way. The Unified A fundamental integral to the success of
all costs to avoid complex normalizations in Architecture of the OPC Foundation (OPC UA) OPC UA, though, are industry-specific and
the cloud. Furthermore, it is important to also offers the best conditions for it. OPC UA is application-specific supplementary standards,
transport the semantic context of the PLC data non-proprietary, can be deployed on a variety so-called companion specifications. This is
to the cloud, i.e., the identifier, the data type of hardware platforms and operating systems, where manufacturer consortia or industrial
and the location in the object model. Only in offers comprehensive services ranging from associations together with the OPC Foundation
this way can a failsafe connection be realized, dynamic exploration of a device interface to formulate specific versions of OPC UA to really
and with little effort. powerful security functions and, above all, is make the different devices or applications
To this end, a common language in the supported by a broad alliance of manufacturers. interoperable.
An example is a temperature probe
manufacturer which can, of course, integrate
SOURCE: SIEMENS

its own object model into the sensor. But what


is the symbolic name: Temp, Temperature,
or just t? Is the value output in degrees
Celsius, degrees Fahrenheit, or Kelvin? Is
it an integer or a floating point value?
Determinations of this kind are made in the
companion specifications; only then does OPC
UA become truly IoT-capable.
One such companion specification was
developed for AutoID devices (RFID or optical
codes) by manufacturers such as Siemens and
Harting together with the OPC Foundation. At
the 2017 Hanover Messe, the OPC Foundation
demonstrated the interoperability between the
Simatic RF600 RFID reader and a device from
another manufacturer.
The development of these supplementary
standards, though, is relatively complex and
requires a group of manufacturers that jointly
pushes forward the work. It will therefore
still take some time until comprehensive OPC
UA modeling for all devices and objects of a
factory becomes available.
As a common language, OPC UA can integrate all levels of the IIoT.
Markus Weinlnder, Product Manager, Siemens.

10 in d u s t r ial et h er ne t b o o k 11.2017
Engineer a Better Network
Introducing the industrys first field-hardened
SDN-enabled Ethernet switch.
Todays power system engineers need the convenience of Ethernet combined with
low latency and fast healing to support mission-critical substation applications.
The SEL-2740S Software-Defined Network Switch and SEL-5056 Software-Defined
Network Flow Controller provide an innovative solution that employs software-defined
networking (SDN) to enhance the dependability, performance, configuration, and
management of proactive OT and dynamic IT networks.

Engineer a better networkit starts with the SDN-enabled SEL-2740S.

With failover times of less than 100 microseconds, ensure the performance of
mission-critical applications under all conditions.
Simplify the design, testing, and implementation of critical power utility and
industrial OT networks by using the SEL-5056 Flow Controller.
Strengthen cybersecurity through deny-by-default network access control.
Seamlessly integrate with existing network infrastructure through OpenFlow 1.3
standard support.

Order your evaluation system to see the advantages of SDN for yourself.
For details, visit www.selinc.com/betternetwork.

IEB103_p11.indd 11 08.11.1745 11:06


Common Industrial Cloud
Technology

Interface for CIP data transfer


The goal of ODVAs Common Industrial Cloud Interface is to leverage cloud technologies to provide
consumers and producers the most value throughout the entire lifecycle of devices that use CIP technologies
for data transfer.

SOURCE: ODVA
The three main architectural components in the Common Industrial Cloud Interface reference architecture are CIP Device, CICI Gateway and the Cloud.

THE INDUSTRIAL INTERNET OF THINGS (IIoT) that were previously unavailable, starting with notifications can originate from those same
is bringing new technologies, challenges the ability to connect to devices across an cloud-based applications and be pushed back
and opportunities to industrial automation. enterprise or a machine type across multiple down through the CICI Reference Architecture
Companies are looking to the internet and enterprises. In addition, the ability to scale to CIP Devices. This is made possible because
cloud computing to provide new ways to computing power and storage are enabling of the CICI Gateway. No changes to a CIP
improve operations, increasing productivity new possibilities for analyzing data streams. Device are required for it to interoperate
and generate more revenue. Acquiring data In the sections below, we will highlight some within the CICI Reference Architecture. CIP
from devices is a primary focus of IIoT in of the basics of cloud computing and explore Devices in CICI reference architecture are
the market today, but there are definitely a set of Information exchange patterns that decoupled from the Cloud; all integration
opportunities to do more. What are the are common to all applications that include requirements are handled by the CICI Gateway.
challenges presented by these relatively new devices, gateways and cloud. This important requirement enables full CICI
applications? What technologies are being As an overview, the three main architectural interoperability for legacy CIP Devices.
leveraged to solve these challenges? What components in the reference architecture are
capabilities are needed to allow CIP devices CIP Device, CICI Gateway and the Cloud. CICI gateway
to provide an advantage in these applications? A CICI Gateway is a middle-tier architectural
CIP devices component that is physically located
Introduction In the context of CICI reference architecture, a on-premise and that logically bridges between
A new Special Interest Group (SIG), the device is a CIP-enabled device connected to a the CIP network and the Internet and Cloud.
Common Industrial Cloud Interface (CICI), is CIP enabled network. The CIP devices purpose Logically, it has two logical interfaces:
grouped under the Optimization 4.0 banner doesnt change within the CICI context, nor downstream connects to the CIP-enabled
among ODVA activities. Its goal is to develop do its characteristics or behaviors. This network and n-number of CIP Devices;
standards that enable new cloud applications statement is very important to consider when upstream connects to the Internet and Cloud.
to be developed by the member community contemplating the role of the CICI Gateway As a middle tier CICI Gateway maintains
leveraging the rich data available in devices and Cloud as well as the guiding principles contextual information for n-number of CIP
that conform to ODVA standards. spelled out later in this article. Devices on its downstream interface. On its
The new SIG intends to leverage cloud Only conceptually does the CIP-enabled upstream interface, it maintains context (e.g.
technologies available today and connect Device change. In the CICI Reference security credentials, endpoint URIs, etc.) of
them with the rich information defined in Architecture, a CIP Device engages in an multiple Cloud-based services, messaging
CIP Devices in a simple and secure manner. extended, much wider architectural context systems.
The objective is to focus on making available that includes the Cloud. In this wider A CICI Gateway performs a number of roles,
means to discover CIP devices and the data architectural context, a CIP Devices data most visibly bi-directional secure routing of
available in those devices, along with also (telemetry, etc.) can be published (indirectly) Device-to-Cloud (D2C) and Cloud-to-Device
looking for opportunities to manage devices to the Cloud, to be processed, stored and (C2D) messages between CIP Devices on
and collections of devices through gateways. analyzed by services and applications its downstream interface and Cloud-based
Cloud computing offers many advantages executing there. Likewise, commands and services and apps on its upstream interface.

12 in d u s t r ial et h er ne t b o o k 11.2017
When things
just work,
work gets done.

Kepwares industrial connectivity software provides


secure and reliable data from the shop floor to the top
floor, so you can focus on productivity.

Learn more at kepware.com/IEB

IEB103_p13.indd 13 08.11.1745 11:14


SOURCE: ODVA
Technology

The diagram above shows the Telemetry Information Exchange pattern used in conjunction with the Common Industrial Cloud Interface (CICI) reference architecture.

A CICI Gateway translates and normalizes share a basic understanding of this complex business opportunity. Cloud Computing offers
message payloads as they pass across the technical landscape. companies extensive infrastructure, platforms
domain boundaries of CIP and the Cloud. Public Cloud Computing, aka the Cloud or and software services that traditionally
This crucial operation satisfies a core guiding Cloud Computing, represents a significant, have been available only at the corporate,
principle: CIP stays home. disruptive shift from traditional information enterprise or data center infrastructural level.
Logically, a CICI Gateway can be technology (IT) and software product These service groupings are referred to as
implemented at the level of a CIP Device, e.g. creation and delivery. In some cases, the as-a-Service resources and are as follows:
a CIP Device performs its own CICI Gateway Cloud will compete directly with an existing Infrastructure-as-a-Service (IaaS) is a self-
functions. This approach is a two-tier, device technological model, such as with on-premise service model for using storage, servers,
direct to cloud connectivity pattern and is not hosted Data Center, potentially displacing networks and related virtual resources. The
recommended. it. In other cases, the Cloud should be seen, user of the service is usually responsible for
not as a competitive or displacing force to managing applications, data, configurations,
Cloud existing technologies, such as CIP, but as licensing and updates of related resources,
In the CICI reference architecture, the a complementary extension and enabler including in some situations, the operating
Cloud is the Public Cloud. Technically, the for developing new and different types of system. Resources usually have a number
public cloud is a complex collection of cost applications and solutions which leverage of options for performance and quality of
effective, scalable, geographically distributed existing technologies. service levels and can be very cost effective. A
infrastructure, software and platform services. Irrespective of it being a competitive or common use of IaaS is for hosting, networking,
Conceptually, however, the Cloud should be complementary force, Cloud Computing is load balancing and storage for applications.
thought of in simpler terms: as the data disruptive to both technology and business Platform-as-a-Service (PaaS) is vendor
collection, processing and analytics platform models and brings significant risk for managed platforms and middleware on
on which value will be created for the next companies and industries attempting to adapt. which vendor applications and solutions
generation of CIP customers. The simple reason for this is that modeling can be rapidly developed, tested, operated
Value for CIP customers is provided by and implementing Cloud-based solutions such and maintained. Messaging middleware,
actionable information which can be used as IIoT is complicated and multi-dimensional. integration frameworks, databases and
to make asset management and business This is not just a question of technology, but business process management are common
decisions. Actionable information is derived extends to business models, the increasing PaaS services. These services are rapidly
by the CIP Device related data. Once collected, emphasis of OPEX over CAPEX, difficulties with leveraged and require no maintenance.
processed and analyzed, this data results costing imprecision, and the reformation of Similarly, to IaaS services, PaaS services offer
in the ultimate value for ODVA customers: sales channel and revenue stream, etc. a choice of service level and/or are billed per
actionable asset information. Cloud-based The first big challenge is that the Cloud a consumption-based subscription model.
applications will also consume raw CIP Device Computing marketplace evolves daily and Common uses of PaaS are the deployment
data as well as the derived actionable data. presents a bewildering and expanding set of of non-monolithic services, integrating
Deriving actionable data is the ultimate choices among technologies, service offerings, decoupled components in a distributed
goal of CICI since this is generally where service costing models and vendors. Secondly, system, storing of quantities of information
value is provided to customers. For example, the landscape of public Cloud vendors is at Big Data scale and deploying analytics
high levels of value to customers due to complex and confusing: small, medium and algorithms.
cost reduction can be achieved in the area large vendors compete for business in general Software-as-a-Service (SaaS) is software
of asset maintenance. As device monitoring purpose and specialized niche service markets. deployed in the Cloud, yet accessible virtually
is increasingly understood and analyzed, Finally, because of the rapid evolution of the anywhere by clients. SaaS represents the large
maintenance action can evolve from costly Cloud there is no single path for successful and growing field of cloud-based application
run-to-failure (reactive), to more efficient Cloud adoption for a company or even its services and offers as well as new architectural
preventive (proactive) to the most cost individual lines-of-business. concepts such as microservices. SaaS
effective, predictive. However, for companies and industries applications are often accessed via thin-clients
that are able to navigate these complications such as Web Browsers and mobile applications
Public Cloud Computing and can adapt to and leverage the Clouds (native or hybrid) and, therefore, generally
This section introduces Cloud Computing capability new possibilities emerge for require very limited downloaded installation
concepts as related to CICI, so that readers can developing customer value and driving components or none at all. A common use

14 in d u s t r ial et h er ne t b o o k 11.2017
The factory of the future is already here

Realize it with Cisco Connected Factory.


#digitizemanufacturing www.cisco.com/go/iot
IEB103_p15.indd 15 08.11.1745 11:21
SOURCE: ODVA
Applications

The Inquiry Information Exchange pattern using the reference architecture.

(and ultimate goal) of SaaS for vendors is to to provide previously unattainable analytic JSON
use it as a platform for deploying products outcomes. JSON, JavaScript Object Notation, is a terse,
and solutions which include capabilities Industrial examples of public/private data readable, structured data format. It is very
that are simply not possible with traditional sets are current power costs, impending popular as a payload format for Device-to-
on-premise deployment: Big Data analytics; weather events, raw materials cost, motor/ Cloud and Cloud-to-Device messaging. A
geographic redundancy; IoT-level scalability; machine/plant efficiency metrics, etc. benefit to using JSON is that many stream
and world-wide access. Veracity: Represents the fact that much processing applications are built to natively
Cloud computing has introduced, or at least of Big Data information available is of consume JSON structures efficiently and
raised to a high degree of public awareness, questionable quality. cost-effectively. Below is a very basic JSON
many new technologies and concepts. Big Inaccuracy of data in consumer-based Big message:
Data describes data sets of magnitudes and Data applications is a challenge, requiring {
complexities never seen before. Big Data cleansing and validation processing and name=CICI,
implies analysis of these data sets using assessment. It may not pose such a challenge message=Hello World!
specialized tools, algorithms programming in more tightly managed and audited }
languages and technologies to discover trends Industrial environments. Nevertheless, it must
and patterns which may be used to drive be accounted for. Guiding principles or concerns
business value. Data sets are characterized by As we apply cloud technology and cloud
the Four Vs, described below. NoSQL communication patterns to use cases, a
NoSQL is a database model/approach which number of concerns have been identified.
Four Vs of Big Data has evolved during the Big Data era and which These concerns form the basis for guiding
The Four Vs of Big Data are Volume, Velocity, contrasts markedly with Relational Database principles to be applied to any resulting work.
Variety and Veracity. Management Systems (RDBMS or SQL): NoSQL The technical, semantic and application
Volume: Represents the scale of the data databases have relaxed or non-existent difference between cloud-based and CIP
sets. One hears of systems running at Big Data referential integrity requirements, flexible Device-based ecosystems is vast. The purpose
Scale, which implies that they can consume storage options and limitless scalability and of CICI is to define an integration approach
and process data sets of unimaginable size. redundancy built in from the ground up. The to bridge between the two environments so
Technologies been built exclusively to address acronym NoSQL originated from non SQL and/ that cloud-based applications (and application
the need to scale with the many orders of or arguably not only SQL. developers) can consume CIP Device data and
magnitude expansion of storage needs. An produce actionable information useful to the
example of this is NoSQL databases, which AMQP CIP Device, directly or indirectly. It is not the
can scale to Big Data scale in IoT systems, AMQP, Advanced Message Queuing Protocol, is purpose of CICI to replicate the CIP network-
replacing SQL databases which cannot. the open standard and has emerged as a very based ecosystem in the Cloud but to abstract
Velocity: Represents the ubiquitous and popular protocol for sending messages to and and represent CIP Device data so that its use
persistent collection and delivery of data, from receiving messages from Cloud-based systems. by Cloud applications is simple and efficient.
consumers, sensors, systems into cloud-based In addition to being open and standard, The following are some of fundamental
Big Data oriented-systems. AMQP was designed with these characteristics differences of Cloud-based from CIP-network
Variety: Represents the ability to combine Security, Reliability, Interoperability. based application development:
dissimilar data sets which previously could not Distribution: Cloud-based applications are
have been combined are now being processed MQTT intrinsically distributed, combining resources
together. The Cloud enables the combination MQTT, Message Queue Telemetry Transport, from multiple compute, storage and service
of public and private data to provide insights is an ISO standard (ISO/IEC PRF 200922), platforms to achieve function.
previously unattainable. Tweets, traffic, publish/subscribe, lightweight messaging Real-Time: due to its distributed nature
weather, Facebook, stock prices postings protocol used for Cloud-connectivity for and platform dependencies, the notion of
are examples of well-known dissimilar data limited network bandwidth and remote real-time is an uncommon concept in public
sets which could be combined and analyzed applications. cloud computing.

16 in d u s t r ial et h er ne t b o o k 11.2017
Protocols and Payloads: Cloud-based Information exchange patterns cities may broadcast information about air
application developers expect message Four Information Exchange Patterns generalize pollution, suggesting fossil-fueled systems to

Technology
payloads that are easily programmatically the logical patterns of communication that throttle CO2 output or a vehicle may want to
digestible, potentially extensible for business will occur between the cloud and gateways show weather or news alerts or text messages
process purposes and normalized to contain or devices. to the driver.
meaning for a given application domain, such Notifications are initiated by the line-
as Asset Management analytics. Abstracting Telemetry of-business Cloud applications. Cloud apps
CIP details satisfies these expectations while Telemetry is one-way, with information send Notification messages to the egress
exposing CIP protocol or payload formats flowing that a device or gateway volunteers queue to which the CICI Gateway has
would cause lost productivity for developers, to a collecting service, either on a schedule subscribed. The CICI Gateway then routes the
potentially large, incremental, profit impacting or based on particular circumstances. notification messages to the appropriate CIP
unmarshalling/marshalling costs. This information represents the current or Device or group of devices. The Notification
Applications: Cloud-based applications have temporally aggregated state of the device or exchange pattern is the logical inverse of the
very broad scope and virtually no limitation to the state of its environment, like readings Telemetry exchange pattern and, therefore,
the types of functions that can be performed. from sensors that are associated with it. the Cloud application does not expect an
Cloud-based applications can be modified Telemetry is initiated by the CIP Devices acknowledgement or response from the device.
and updated very rapidly (in minutes, hours) based on a previous configuration or runtime
and often integrate multiple streams of subscription request. Data flows from the CIP Commands
information simultaneously to produce results. Device to the CiCi Gateway and sent to the Commands are service-initiated instructions
Communications between entities on the Cloud to be available for Cloud applications. sent to the device. Commands can tell a
cloud are generally based on widely used Note that security had been omitted for device to provide information about its state,
open standards which are not industry specific simplicity, but the connection to the cloud or to change the state of the device. That
and which may be replaced at any time. CIP would be set up before data would begin includes, for instance, sending a command
communications, while standardized, are to flow following a Telemetry Information from a smartphone app to unlock the doors of
industry specific and slow to change. Exchange pattern. The exchange pattern is your vehicle, whereby the command first flows
Developer Pool: Cloud developers master one way, so that the CIP Device does not to an intermediating service and from there
a variety of programming languages, cloud expect a response from the Cloud application. its routed to the vehicles onboard control
oriented development and cloud architectures system.
that are very different from those needed Inquiry Command is initiated by the line-of-business
by CIP network application developers. With inquiries, the device or gateway solicits Cloud application. Command messages are
Abstracting CIP details with a normalized information about the state of the world sent to the Digital Twin or directly to the
Device Asset domain model, for example, beyond its own reach and based on its current egress command queue to which the CICI
greatly increases the pool of potential needs. An inquiry is a singular request, but Gateway is subscribed. The CICI Gateway sends
developers for CICI-based Cloud applications. might also ask a service to supply ongoing a synchronous request to the CIP Device and
In order to not compromise security of updates about a particular information scope. relays the response to the Cloud endpoint.
on-premise resources, CICI Gateways and A vehicle might supply a set of geo-coordinates Command is the logical inverse of Inquiry.
CIP Devices are not exposed the internet for a route and ask for continuous traffic alert Therefore, the Cloud application expects a
by publicly available interfaces such as updates about particular route until it arrives response from the Device. Once again, the
publish/subscribe broker or http web service at the destination. Correlation ID enterprise integration pattern
endpoints. Device-to-Cloud and Cloud-to- Inquiry is initiated by the CIP Device and can be leveraged for correct message logical
Device communications are through an flows through the CICI Gateway to the Cloud routing and processing of responses.
established CICI Gateway. For example, to application via its messaging endpoint.
support Cloud-to-Device communications, The Cloud application receives the Inquiry Next steps
Cloud applications send messages to devices message and creates a response. The Cloud This article covered new technologies that
indirectly through Cloud-based egress queues app then sends the response message to the are being introduced into the industrial
to which the CICI Gateway subscribes. Egress queue to which the CICI Gateway is automation marketplace. It provides a first
All communication must be performant subscribed. The CICI Gateway routes the pass definition of one of the communication
and scalable across a variety of networks. message to the correct Device. patterns and an example of how that
This means that CIP must stay home or The Inquiry exchange pattern differs communication pattern could be realized.
stay on premise where responses are timely from Telemetry in that a response or It can be easily observed that the Common
and consistent. Any solution identified acknowledgement from the Cloud application Industrial Cloud Interface work is just getting
should avoid a specific implementation, but is expected. Of note is the use of Correlation started. There is a lot of ground to be covered
instead be described in general terms. On one IDs in the messaging between the CICI Gateway to completely define the remaining three
hand, this document avoids recommending and the Cloud application. Correlation ID is communication patterns at a high level.
implementation technologies. an Enterprise Integration Design Pattern used The next steps will be to fill in more
Instead, the focus is on D2C and C2D to relate a response to the correct request details, referencing all the technologies and
information exchange patterns common in in asynchronous, non-guaranteed ordered standards available and keeping in mind the
the solution marketplace and relevant to the communication scenarios. guiding principles enumerated. But the goal
design of CICI and CICI-based solutions. On is to leverage cloud technologies to provide
the other hand, some technologies (AMQP, Notifications consumers and producers the most value
MQTT, JSON, etc.) are included in typical CICI Notifications are one-way, service-initiated throughout the entire lifecycle of devices.
architectures to illustrate how contemporary messages that inform a device or a group
IIoT/Cloud integration are achieved and relate of devices about some environmental state Stephen C. Briant, Technology Manager for
to information exchange patterns important theyll otherwise not be aware of. Wind parks Rockwell Automation and Thomas Whitehill,
to CICI. will be fed weather forecast information and Remote Services Architect, Schneider Electric.

1 1. 2017 i n d u str i a l e th e r n e t b o o k 17
POWERLINK and CODESYS
Technology

enable Industry 4.0 solutions


New technology tools have been developed that enable integration of POWERLINK Industrial Ethernet
technology into the CODESYS IEC 61131 development environment. These innovations enable manufacturers
to deploy control systems already working in CODESYS as a POWERLINK master.

SOURCE: EPSG
Integration of POWERLINK in CODESYS: The POWERLINK Configuration Editor from BE.Services is a plug-in for the CODESYS IDE. The CODESYS I/O driver is embedded in
the runtime system and accesses the openPOWERLINK stack. Any device that can be written via XDD file, whether I/O module, sensor or actuator, and can be integrated
into the POWERLINK network.

THE CODESYS DEVELOPMENT ENVIRONMENT Solution overview environment, the POWERLINK plug-in is
is often used by small and medium-sized The technology includes a package of software available free of charge from the CODESYS
manufacturers of control systems but the and services that consists of four components: store. An I/O driver is available for a buyout
amount of programming work that has been a user-friendly, visual configuration editor price and includes support services and
required for POWERLINK integration, until for POWERLINK in the form of a plug-in for a license for the BE.educated e-learning
now, has been prohibitive. the CODESYS development environment; platform. The first pilot customers are already
To combine the two technologies, a an extension to the CODESYS runtime using these products in development projects.
POWERLINK software module has been system in the form of an I/O driver for For the large number of component and
developed that enables use of this real-time the openPOWERLINK stack; servicing and control system suppliers already working with
protocol as a POWERLINK master, and creates integration services as well as an e-learning CODESYS, POWERLINK is a viable option. All
user advantages including high performance, course for POWERLINK technology. of these manufacturers can now use their
noise immunity and openness. Like the CODESYS IEC 61131 development control systems as a POWERLINK master and

18 in d u s t r ial et h er ne t b o o k 11.2017
benefit from its real-time performance in The POWERLINK
their automation solutions. The POWERLINK- Configuration

Technology
CODESYS master will be tested at the upcoming Editor can be
POWERLINK plugfest, with a goal to certify used to configure
POWERLINK products that will work together master and
on both the slave and the master side. slave devices.
The BE.services software package has been Applications
integrated to provide advanced functionality can be written
and includes the ability to configure master in the CODESYS
and slave parameters, as well as device-specific IDE using any
parameters. This information is obtained from IEC 61131-3
the standardized device description files language.
(XDD) provided by product manufacturers.
In addition, there is support for advanced
POWERLINK functions such as poll response
chaining, cross-traffic and modular devices.
Linux is generally used as the operating users can choose their hardware platform. compiled directly on the hardware platform
system, preferably with a real-time extension. Moreover, the open-source approach and benefits from FPGA hardware acceleration.
But openPOWERLINK can also be used without provides investment protection. Thats In collaboration with the OPC Foundation,
an operating system, or with Windows. becoming an persuasive argument, especially the EPSG has also developed a companion
Potential applications for the POWERLINK/ in this time of disruptive business models. specification that enables data to be
CODESYS combination range from the The CODESYS implementation also offers key exchanged between OPC UA and POWERLINK.
automation of individual machines, to advantages for new designs as well. Users get the benefit of POWERLINKs
production lines or entire factories. Mobile performance at the machine level, as well
automation and process control systems are CODESYS implementation as the benefits of OPC UA TSN as the future
also possible areas of application. Within CODESYS, fieldbus and industrial standard for communication at the controller
The source code for the openPOWERLINK Ethernet communication modules are generally level and into the cloud.
stack is available under the BSD license free of implemented using IEC 61131 languages,
charge from SourceForge. The stack is entirely which are by nature slower than a native Dr. Christoph Gugg, Technology Manager,
software based and completely scalable; it can porting. The openPOWERLINK stack is modular Ethernet POWERLINK Standardization Group
be deployed on an FPGA or an x86 system, so and is available in C++. It can therefore be and Dimitri Philippe, CEO, BE.services.

Uptime. Anywhere.
Your track to high-speed networking

Industrial IP67 Managed Gigabit Ethernet Switches with PoE+


Red Lions versatile NT24k-16M12 managed switches feature
16 all-Gigabit copper M12 X-code ports and is housed in a dust
proof and water resistant IP67-rated enclosure. The NT24k-16M12
is designed to provide reliable operation in railway and other
industrial applications subject to shock, vibration and other extreme
conditions. POE budget configurable across all 16 ports, the Bypass
relay ports enable data to continue to flow even in the event of a
power outage, making this an ideal choice for rail applications.

Visit www.redlion.net/Nt24k to learn more.


Hall 8 - 327

+31 (0) 33 4723-225 I europe@redlion.net I www.redlion.net


2017 Red Lion Controls, Inc. All Rights Reserved.
Future-oriented communication
Applications

for setting up machine networks


The growth of larger and larger automation networks is overtaxing the machine builders ability to manage
their networks. With the high amount of time needed for effective deployment rising and costs escalating,
more and more companies are looking for a solution that simplifies network management.

SOURCE: PHOENIX CONTACT


SEAMLESS ETHERNET-BASED
DATA EXCHANGE from
the field level to office
applications is one of the
central challenges that
Industrie 4.0 presents to
future machine networks.
Communication specialists,
therefore, needs to offer
appropriate solutions that
are not only comprehensive,
but also easy to handle,
secure and ready for the
future.
Whether man or machine,
one thing is certain;
without communication,
nothing works. However, in
the practice, it frequently
happens that participants
do not understand each
other, or not correctly. For secure connections between the machine and production network, tsecurity appliances provide extensive firewall functions that
Reasons include many protect the machine network against unauthorized access
participants speaking
at once, different languages or complex supplemented with new technologies. And all High-availability networks
ways of expressing themselves. It is a fact of that has to stay manageable for both their In the past, unmanaged switches usually
that misunderstandings can easily cause and the customers employees. served as interface between the network
errors with unforeseeable consequences. participants in machine building. The
Therefore, a uniform language and regulated Uniform control philosophy reasons included their low price and easy
communication are fundamental prerequisites To meet these demands, new device types are startup. However, these devices cannot meet
for trouble-free information exchange between used in the machine networks, in addition to the demands that arise from the growing
all participants. And that also holds true for switches that connect the components and communication needs of the constantly
the data exchange in machines and systems. control the data transmission. For example, increasing number of network participants.
In the past, the amount of Ethernet- to connect mobile end devices or transport For example, unmanaged switches have
capable components was still relatively systems to the automation network, wireless no mechanisms for network diagnostics or
limited, but thanks to the universal Ethernet modules are used. Security components are reducing data load. Therefore, they can only
communication, their number is continuously increasingly used to ensure safe integration be used in modern machine networks to a
increasing. As a result, the risk of unwanted of the machines into the production network. limited extent.
data traffic on the network also increases. Additionally, they allow encrypted and secure On the other hand, intelligent switches
Unauthorized devices that are connected or remote access to the machines. In machine have precisely these functions. Thanks
loops that are accidentally established can building, the pressure to be competitive on to optimally matched functionality, they
interfere with the production process. If the the global market is high. combine the advantages of the easy operation
user then additionally needs special protocols, To answer the demand for devices that of unmanaged devices with the powerful
such as PROFINET or EtherNet/IP, the devices are easy to handle, it makes sense to source capabilities of the managed switches. The
used have to fulfill special requirements to all the required network components from a new FL Switch 2000 product family of Phoenix
safeguard reliable data exchange. single manufacturer. This allows a uniform Contact additionally supports redundancy
Technology trends such as cloud-based control philosophy and creates leeway for mechanisms for loop suppression, as well
solutions, IT security, the use of smart price negotiations. With the FL Switch 2000, the essential functions of the PROFINET
devices or the possibility of secure remote FL WLAN 1100, FL mGuard und TC Cloud Client and EtherNet/IP transmission standards.
maintenance also influence the network product families, Phoenix Contact therefore An innovative Unmanaged Mode ensures
communication. For machine builders, this provides a diverse set of solutions for the user-friendly handling. It allows the device
means that they constantly have to plan special requirements of modern machine to be operated as unmanaged switch, while
and service larger networks that can be requirements. management functions for stabilizing the

20 in d u s t r ial et h er ne t b o o k 11.2017
network are active in the background. With forfeit the advantages of a robust, diagnosable
the FL Switch 2100 models, it is additionally network. As mentioned above, unmanaged
possible to set up machine networks for switches with plug-and-play capabilities are
gigabit communication. frequently used. These simply have to be
connected to a power supply and the network.
Reliable wireless technology No settings have to be configured.
The trend to integrate mobile devices and To minimize the configuration work needed
driverless transport systems into the machine for components with management functions,
network makes wireless data communication without forfeiting the many benefits they
essential, for example using WLAN. To ensure offer, the new devices of Phoenix Contact
that the data is reliably transmitted to the have been optimized for machine building
receiver, an access point that sends out applications and are easy to configure. In
a WLAN signal should be installed at the addition to the configuration options usually
respective machines. Usually, the access point offered, such as web-based management
is installed in the control cabinet and at least in a browser and SNMP (Simple Network
two antennas are mounted on the machine. Management Protocol), the switches of the
With the FL WLAN 1100 product family, 2000 product family and the TC Cloud Client
Phoenix Contact has created an easy solution are equipped with an SD card.
for full WLAN reception at machines and With the card, the configurations created
systems (figure 2). The wireless module not can be replicated as often as needed. And
only unites an access point and antennas if the user needs to replace a defective
in one device, but, with a little work and component, the extensive work involved in the
using a single-hole mounting method, can initial configuration need not be repeated for
also be installed directly on the machine, on the replacement device. The wireless modules
the control cabinet or on a mobile vehicle of the FL WLAN 1100 and FL Switch 2000
even as retrofit. The two antennas integrated product families additionally offer the option
into the access point support all customary of configuration by means of a command-line
WLAN standards (IEC 802.11a/b/g/n) and interface (CLI).
frequencies (2.4 GHz and 5 GHz), as well
as the MIMO antenna technology (Multiple Transparent network management
Input Multiple Output). This ensures fast and Larger and larger automation networks - this
reliable data transmission. trend is overtaxing an increasing number of
machine builders ability to manage their
Secure remote access networks. Additionally they complain about
Connecting the machine to the production the high amount of time needed and the
network, integration into a cloud-based resulting costs.
solution or remote maintenance by the As a result, many companies are looking
machine builder: regardless of the application, for a solution that simplifies network
secure and therefore encrypted communication management. With the FL Network Manager,
is crucial. The remote maintenance modules of Phoenix Contact offers a new software tool
the TC Cloud Client and FL mGuard product that encompasses all important functions
families make it possible for service personnel for managing switches, as well as WLAN
to remotely connect to the machines and and security components from first device
systems via the Internet. Depending on configuration and monitoring functions during
what is needed, this connection is either live operation, to user-friendly configuration
established via the operators networks, or and firmware management.
via the global 4G LTE mobile network. In the past, it was necessary to perform
The mGuard Secure Cloud makes it possible firmware updates on each individual
to set up a scaleable VPN infrastructure with device. With the FL Network Manager, it
encryption by means of the IPsec security is now possible to update all components
protocol. This safeguards the confidentiality, simultaneously. The device configuration in
authenticity and integrity of all exchanged the network is just as easy. All configuration
data. For secure connections between the files can be saved locally with a single step,
machine and the production network, the to then be loaded onto a (replacement) device
FL mGuard security appliances additionally when needed. Integrated BootP/DHCP and
provide extensive firewall functions that TFTP server functions eliminate the need to
protect the machine network against use several different tools to configure the
unauthorized access. device parameters. The FL Network Manager
thus unites all important management
Easy configuration functions for an automation network into a
Many machine builders prefer using devices transparent tool.
that are easy to operate in their networks. To
avoid the additional time and costs involved Jan Aulenberg, M.Sc., product manager
in configuring more complex components, the for network technology, Phoenix Contact
machine builders make conscious decisions to Electronics GmbH.

1 1. 2017 i n d u str i a l e th e r n e t b o o k 21
Cloud-based, cellular SCADA
Applications

system for water treatment


Systems integrator Perceptive Controls has designed a cloud-based, cellular SCADA system for rural water
and wastewater treatment systems. By using a RESTful API, developers gained secure, programmatic access to
data from new or legacy physical assets wired to a programmable automation controller.

SOURCE: OPTO 22
Using its Polaris software and a SNAP programmable automation controller-based system, Perceptive Controls was able to deliver a low-cost SCADA system that avoids expensive
servers and hardware while still providing the monitoring, control, alarming, and reporting functions that water and wastewater plant operators require.

LIKE PLANTS AND PEOPLE, cities need water and as a result are prone to errors that can The solution
to grow. The average Americans daily use of lead to a system failure. Using Perceptive Polaris software with an
water reaches upwards of 100 gallons. Major The rugged and remote location of many Opto 22 SNAP PAC control system, Perceptive
cities like New York, Chicago, and Los Angeles rural water districts can also pose a challenge Controls was able to deliver a low-cost SCADA
need billions of gallons of water per day. in implementing a SCADA system. Most system that avoids expensive servers and
And when people turn on their faucets, they modern municipal water systems use some hardware while still delivering the monitoring,
expect the system that delivers their water to form of wireless technology, often 900 MHz control, alarming, and reporting capabilities
just plain work. radios, to establish a SCADA network between water and wastewater plant operators require.
In reality, a lot more goes into delivering remote sites. One of the key challenges engineers at
clean, potable water than most people These radios are a good solution for Perceptive Controls faced during development
realize. Transporting water and wastewater SCADA networks because they operate in an of the solution was how to reduce the amount
throughout municipalities is a complex unlicensed spectrum and do not require a of data sent between lift station sites on the
task that requires significant investments service provider network to relay data from SCADA network.
in advanced SCADA technology. But not all site to site. However, in rugged terrain it can We knew that using cellular modems meant
water districts have the budget to acquire the be difficult to obtain the direct line-of-sight one of the most important requirements of
necessary technology. connection 900 MHz radios require. this project would be the ability to transmit
Cellular connections are often the next the smallest data packets possible, with as
The challenge best option to establish a SCADA network much data in each packet as possible, said
Modern water and wastewater treatment between remote sites. But the data charges Kevin Finkler, software engineer for Perceptive
regulations require water districts to maintain associated with cellular connectivity can be Controls. We had to stay under the data caps
systems for monitoring, data acquisition, cost-prohibitive, due to the scan-based poll/ of the cellular provider we planned to use.
alarming, and reporting on the quality of response communication architecture of Our original design was to use a script
water delivered to residents. traditional SCADA systems. running on an Opto 22 PAC-R2 controller,
While large cities can afford the technology Recognizing the needs of smaller water added Finkler. The script would collect data
investments required to transport billions and wastewater treatment plant operators from municipal equipment and perform an
of gallons of water per day, smaller water to add affordable SCADA systems to their HTTP POST to transmit the data to a cloud-
districts, often located in remote and rural operations, systems integrator Perceptive based server we host for our clients. The
areas, can struggle to find the budget required Controls developed a cellular, cloud-based server is where our Perceptive Polaris software
to implement a modern SCADA system. SCADA system called Perceptive Polaris to application resides.
Instead, processes remain manually driven overcome these challenges. During evaluation and testing of the first

22 in d u s t r ial et h er ne t b o o k 11.2017
SOURCE: OPTO 22

Lift stations can be monitored in real time, with map overlays to give operators real-time situational awareness.

version of the system, posting large amounts The cloud application then uses the
of data from the controller to the cloud server RESTful API to write back how many tables
proved to be slow and processor intensive. were retrieved, so the controller can delete
In addition, the cloud server didnt have a the old data and move everything up in the
reliable method for ensuring configuration table, with new data again at the top. This
changes, such as HMI setpoints, were sent ensures that all data was received into the
back to the controller. cloud application.
This posed a problem, said Chris Parish, Its more efficient to make the cloud
senior application engineer at Perceptive application process large amounts of data,
Controls. The controller would often check instead of making the controller do the work
for configuration changes, only to have the in addition to its normal operations, noted
server respond back saying that no changes Finkler. This method saved an average of 5.8
were needed. It wouldnt work to have the KB per data set transmitted, which ended up
controller check less frequently, because we saving us about 250 MB per day, adding up to
wanted the controller to be able to respond significant savings in cellular data charges.
in a timely manner. Using the RESTful API, Perceptive engineers
We decided to consider alternate options can also send configuration changes on
for transferring data. So we investigated the demand. Since configuration changes rarely
RESTful API capabilities built into Opto 22 occur after the initial setup, 99% of the
SNAP PAC controllers, Parish added. previous configuration traffic has been
SNAP PAC controllers come with a eliminated, and data is transmitted only when
built-in, secure HTTP/S server with an open, necessary. The cloud application also monitors
documented API, effectively creating a for alarms and sends out notifications to
RESTful architecture. RESTful architecture operators if necessary.
and its technologies, like HTTP/S and JSON Using the Perceptive Polaris solution, water
(JavaScript Object Notation), are intrinsic and wastewater customers can monitor their
to the Internet of Things and paramount lift stations and SCADA network in real time,
to web, data, and mobile-based application with advanced map overlays that provide
development. With their RESTful API and operators with real-time situational awareness
secure server, the SNAP PACs offer valuable of the SCADA system.
alternatives for application development. Operators can view and respond to alarms
Through the RESTful API, developers can through the website, and authorized users
gain secure, programmatic access to data are alerted to alarms via email and/or text
from new or legacy physical assets wired to messaging. Operators who receive an alarm
the PAC.Developers can use any programming can acknowledge it by replying to the text
language that supports JSON to access control message. Historical data is stored on cloud
variables and input/output (I/O) data. servers hosted by Perceptive Controls and
After switching to the new RESTful API backed up regularly.
method, we now have a cloud-based software
application running on a dedicated server that Looking ahead
uses the SNAP PACs RESTful API to request The engineers at Perceptive Controls are
data directly from the controller, Parish said. currently developing a mobile app that will
Requests are made over a private cellular communicate with the Perceptive Polaris
network to avoid cyber security-related server and allow users to respond to alarms
concerns and avoid opening ports in firewalls, and change setpoints as needed. In the
Finkler added. We store data in float tables on future, the entire SCADA system will be able
the PAC (about 44 indexes per table) and the to be managed from almost any authorized
software can grab up to 100 tables of data per mobile device, Finkler said.
request without slowing down communication
performance. Application article by Opto 22.

1 1. 2017 i n d u str i a l e th e r n e t b o o k
Gigabit Ethernet addresses
Technology

requirements of Industry 4.0


Is Gigabit Industrial Ethernet adoption the key to achieving Industry 4.0 goals? While there may still be
some debate about what Industry 4.0 really means, there is no denying that greater interconnectivity of
devices and increased network capability will be the key drivers behind achieving the goals it sets out.

CC-Link IE Field Network topology examples

SOURCE: CLPA
AS MANUFACTURERS EXAMINE FUTURE
challenges around low volume production,
increased customisation and increased
competition, it is easy to understand why
the concepts of Industry 4.0 have come to Line topology
the fore. Industry 4.0, combined with the
Industrial Internet of Things (IIoT), not only Master Local Remote Remote Remote
holds the key to addressing many of these station station station station station
challenges, but also promises to deliver
innovations that todays manufacturers have
not even thought of yet.
Industry 4.0 can be defined as the
combination of cyber-physical systems with
the IIoT. Underpinning it are Ethernet and Station-to-station distance: max. 100 m
Internet-based technologies that provide the
connectivity for everything to communicate
with everything else, regardless of where
a device or system is physically located, or Overall cable distance: 12000 m
what it actually is. Today, while we talk about
high levels of interconnectivity, usually there
are incompatibilities in networks that mean
Star topology
Master
projects are divided into separate islands. station
As we overcome these incompatibilities
and drive ever greater levels of integration
and interconnectivity, Industry 4.0 will Layer 2 switch Layer 2 switch
allow production machines to provide more
transparency and cooperate to a higher
Station-to-station
degree. Some say that this will ultimately lead
distance: max. 100 m
to intelligent factories capable of autonomous
production changeovers, reassignment of
production equipment and perhaps even
scaling their capacity as demand increases. By Local Remote Local Remote Remote
extension, this will also take in the Internet station station station station station
and collaboration with vendors and customers
to a greater degree than is possible now.
None of this can happen, though, without Ring topology
the networks to carry the information between
the places where its needed, in real-time. Master Local Remote Remote Remote
Ethernet provides a good foundation for this station station station station station
infrastructure, but being able to deliver the
necessary performance will require technology
with greater capabilities than is common now.
CC-Link IE technology, however, is addressing
all of these requirements today.

Gigabit Ethernet in automation


One of the key requirements of Industry Station-to-station distance: max. 100 m
4.0 applications is the need to share large
amounts of data from multiple devices in Overall cable distance: 12100 m
real-time. Hence bandwidth is critical to the
successful operation of these systems.
CC-Link IE offers a performance increase
of around 10 times compared to any other Support for multiple topologies is important to addressing the need to share large amounts of data in real-time.

24 in d u s t r ial et h er ne t b o o k 11.2017
SOURCE: CLPA

Ring type wiring

Line type wiring


Star type wiring

CC-Link IE topologies can be combined together to provide systems that offer maximum flexibility.

similar protocol today, and offers the highest cable. This allows the CLPA to offer a cost-
bandwidth available at 1Gbps, delivering the effective, simplified, flat network architecture
performance needed to connect the most data- that meets the needs of nearly all applications
hungry processes together. in the discrete sector.
CC-Link IE is based on the Ethernet standard
IEEE 802.3, and allows for ring, line and Speed and simplicity Precise and simple!
star topologies. In addition, the line and When it comes to actually using the network,
star topologies can be combined together again, the emphasis is on simplicity. CC-Link Time synchronization
to provide systems that offer the maximum
application flexibility. The ring and line
IEs basic communication technique is based
on a shared memory model. All the devices on
using IEEE 1588/PTP
connections are particularly attractive, as the network occupy an area of the controllers
they permit simple daisy chaining of devices, memory. To communicate with them, its only  7LPHV\QFKURQL]DWLRQYLD
meaning the added cost and complexity of necessary to change the value of the data in (WKHU1HW,3RU3URQHW
network switches can be avoided. the area corresponding to the relevant device.
The network automatically handles the traffic  +LJKHVWWLPLQJDFFXUDF\LQ
Addressing cyber security concerns via the standard cyclic (synchronous) QDQRVHFRQGUDQJH
One of the key concerns related to the communication.
increasing adoption of industrial Ethernet is The same process happens in reverse  5HGXQGDQF\WKURXJKDXWRPDWHG
cyber security. While the use of Internet-based for communication to the controller from VZLWFKLQJRIUHIHUHQFHFORFNV
technologies has increased the possibilities of devices. For high priority, unscheduled events  /RFDOJHQHUDWLRQRIWLPHFRGHVOLNH
what can be achieved in manufacturing, it has such as alarms, or lower priority non-cyclic
,5,*%'&)RU33;3XOVHV
also increased the threats. transmissions such as diagnostic information,
Some industrial Ethernet protocols are an alternative transient (asynchronous)
based on a standard TCP/IP (UDP/IP) stack, communication method is available. The
which can arguably cause some security technology has been designed such that
vulnerabilities. CC-Link IE combines the even high levels of transient traffic do not
physical and data-link layers of the OSI impact the deterministic regular cyclic
hierarchy with an open protocol that extends communication, meaning normal system
from the network to application layers. The functions are not impaired and the scan cycle
result is an open, but controlled knowledge is completely deterministic.
base that CLPA partners are free to implement, Deterministic performance is achieved with
but reduces the exposure to unauthorised use. a token passing method, allowing dependable
Another concern potential users may have system operation. In practice, this allows
regarding the protocol is its compatibility with network update times to occur in a few tens
TCP/IP (UDP/IP) traffic. While current network of microseconds, depending on system size
design practice encourages segmentation and configuration. CC-Link IE also offers the
of networks for security and performance ability for redundant controllers, so even a
OMICRON Lab IEEE 1588/PTP
reasons, sometimes its still necessary to controller failure will not necessarily result in
support non-control related network traffic. lost production.
Timing Solutions:
CC-Link IE supports this with the capability We can see, then, that CC-Link IE technology OTMC 100
to encapsulate TCP/IP (UDP/IP) packets for can help manufacturers reap the benefits of ,(((373*UDQGPDVWHU&ORFN
transmission across the network, allowing greater connectivity across their processes,
this traffic to tunnel through the CC-Link with improved network performance delivering TICRO 100
IE system. tighter control, greater data throughput at ,(((3737LPH&RQYHUWHU
CC-Link IE technology also allows high speed, deterministic performance and
considerable application flexibility by inherent security. It is also set to play a key
supporting multiple protocol types on the role as manufacturers push towards models of www.omicron-lab.com/timing
same network. This reduces costs and increases Industry 4.0 in order to address the production
maintainability. In addition to the standard challenges of tomorrow.
I/O control, it also offers safety (SIL3), motion
control and energy management on the same John Browett, General Manager, CLPA Europe.

1 1. 2017 i n d u str i a l e th e r n e t b o o k
Smart Timing Solutions
Next generation software-
Technology

defined Wide Area Networks


Software-defined WAN technology leverages and virtualizes multiple types of connections between business
locations, as well as connections between data centers, remote offices, and cloud resources. SD-WAN also
provides a way to leverage broadband Internet while incorporating traditional dedicated WAN technologies.

SOURCE: VELOCLOUD
Software-defined WAN leverages and virtualizes multiple types of connections between business locations including data centers, remote offices and the cloud.

SOFTWARE-DEFINED WIDE AREA NETWORKS are connected via a local area network (LAN), downside of MPLS-based WANs is that they
becoming the basis for a new generation of which is a private, high-speed network, are expensive, slow to provision, and difficult
WANs for enterprises and service providers. installed, owned and maintained by the to change to adapt to varying requirements.
Just as Frame Relay and ATM migrated to MPLS business. The LAN can be wired and wireless Why not use the Internet for connecting
for business connectivity, the combination using technologies like Ethernet and WiFi. business locations? The Internet is ubiquitous,
of SD-WAN, migration to the cloud, and Likewise, servers within a data center are also inexpensive and flexible. However, the
commodity Internet broadband are offering tied together with high-speed LANs. Internet is famously unreliable, both in
a compelling, affordable and flexible option The WAN ties those sites together. By terms of uptime and in the ability to deliver
to augment the WAN. The move to SD-WAN contrast with the high-speed, private consistent throughput. Its also insecure, and
becomes imperative as demand increases for LAN owned by the business, WANs are without additional security, cannot be trusted
business critical, bandwidth hungry real time services traditionally provisioned by for intra-business traffic, such as accessing
applications in offices and field locations. telecommunications companies. WANs are key business applications, servers or files.
much slower than LANs, and incur monthly The challenge is that businesses are
The traditional WAN charges based on bandwidth, guaranteed increasingly frustrated with traditional WANs.
Before diving into the new world of SD-WAN, reliability, and the distance between the sites. IT professionals and executives like that WANs
lets review traditional wide area networks. WANs can take weeks or months to set up, and are reliable, predictable and secure. On the
A WAN traditionally connects a companys just as long to make service changes, such as other hand, businesses dont like the monthly
business locations together, creating whats to adding bandwidth to handle new demands. expense, slow provisioning times and the lack
essentially a single large network that might There are many telecommunications of flexibility. They also dont like that WANs
span multiple locations within a city, locations technologies used to implement traditional become more complex when the business
in many cities, or even locations across WANs. Older technologies include leased locations are in different countries. Finally,
national boundaries or around the world. lines, Frame Relay, ATM (Asynchronous with the emergence of cloud computing, the
Those businesses might have one or more data Transfer Mode). One of the most popular WAN traditional WAN falls short architecturally to
centers, and multiple offices that have remote technologies today is MPLS (Multi-Protocol the needs of the new paradigm.
workers. The goal is to provide seamless Label Switching). While MPLS-based WANs
connectivity between remote locations and run across one or more carriers networks The SD-WAN World
the applications they reply upon, no matter using complex protocols, they can be thought Software-defined WAN leverages and
where those applications are hosted. of as highly reliable, very secure, point-to- virtualizes multiple types of connections
Workers inside a business location are point links between a business sites. The between business locations, including

26 in d u s t r ial et h er ne t b o o k 11.2017
data centers and remote offices, as well as Implementing the SD-WAN
connections between data centers, remote Generally speaking, SD-WAN is a software
offices, and cloud resources. SD-WAN leverages control layer that contains a few parts. There
broadband Internet while providing the ability is a management tool implemented in a
to incorporate traditional dedicated WAN dashboard that provides easy administration
technologies like MPLS. SD-WAN is transport by IT professionals, with minimal effort by
agnostic and overlays controls that deliver staff in the field location. There is a control
quality of experience and ensure reliability, plane, that actively and intelligently manages
predictability, security, manageability, and and routes network traffic over all available
reduced cost. For example, a company may
have several data centers, large offices with
communications technologies in accordance
with business priorities. And there is a business
Machine
hundreds of employees, and small field
offices. It may use cloud-based services for
policy framework, which sets requirements and
baselines for security, quality of service, cost builders will
applications, servers, and storage, with a
mandate to eventually migrate the bulk of its
controls, user experience and priorities.
SD-WAN controls can be located within the love our new
IIoT product!
data centers to the cloud. business data center, but optimally it will be
From the users perspective, SD-WAN run via the cloud, where it is equally accessible
is a single wide area network that offers to all business locations, and where it can be
trustworthy security, plenty of bandwidth, managed as Software-as-a-Service thereby
service reliability, quality of service (QoS) reducing the workload on corporate IT.
that ensures a good user experience when Enterprises have options when it comes to
making calls using Voice over IP (VoIP) or choosing SD-WAN. They can contract directly
videoconferencing, and seamless access to with a provider of the SD-WAN software
both data center and cloud applications. solution, and implement it using internal
From the IT perspective, SD-WAN offers staff. For some organizations, that will be the
a single interface to manage the wide area best choice. For others, there are new SD-WAN
network, with the ability to rapidly adjust the offerings from major telecommunications
services to accommodate new requirements, or service providers, who are adding SD-WAN to
to provision new services. However, under the their portfolio of WAN offerings.
surface SD-WAN takes advantage of multiple For example, a new AT&T SD-WAN service will
types of network connections, including let businesses prioritize and route data across
traditional WAN technologies, the public their networks based on the performance
Internet, and even cellular data connections. requirements of the applications. The offering,
Demand is escalating for business critical, powered by SD-WAN, will also let businesses
real time applications such as voice, video better manage their bandwidth. The SD-WAN
and virtual desktop applications. Adding offering will come in two flavors: a network-
more private circuits for these bandwidth based offering and a premises-based solution.
hungry applications is expensive and does not Cloud-delivered SD-WAN technology from
improve cloud application connectivity. A cost VeloCloud, part of this new SD-WAN solution,
effective solution is to leverage broadband offers technology for true multi tenancy,
public Internet to augment the MPLS links by automatic link monitoring, auto-detection
using SD-WAN. of WAN and Internet providers and auto-
Employees in main offices and branches configuration of link characteristics, routing
need to access Software-as-a-Service and quality-of-service settings. QoS settings
applications. SD-WAN understands the are configured based on a database of more
location of those applications, and will direct than 2,500 applications, and helps determine
user sessions directly to the cloud efficiently, the best paths for applications based on the
using the high quality link for the highest business policies set by the customer.
priority applications. This represents a In addition, the system provides resilience
significant improvement over the traditional that goes beyond both the public Internet and
WAN architecture model, which routes remote traditional MPLS WANs, taking advantage of
employee traffic over the MPLS network back real-time network performance to ensure that
to a data center and then redirects cloud performance-dependent applications, such as

To be discovered at
application traffic from there to the Internet. voice and video calling, are given the proper
This adds delay and consumes unnecessary priority and blackouts, brownouts, and
WAN bandwidth. excessive delay and jitter can be remediated
In short, SD-WAN leverages multiple WAN quickly, with sub-second responses. SPS IPC DRIVES
technologies and other connections, lowering For agile businesses, branch office
monthly costs, simplifying operations, adding connectivity is not a luxury; its business- Hall 2 - Stand 419
Hall 10 - Stand 420
agility, providing full security, and offering critical. SD-WAN introduces enterprise WAN to
end users an exceptional experience. Its a the cloud era enabling quality of experience,
perfect technology for connecting branch reduction in Capex and Opex while simplifying
offices and even short-term pop-up business branch WAN infrastructure.
locations that need to be brought up instantly
such as construction sites. Mike Wood is VP Marketing at VeloCloud. www.ewon.biz
1 1. 2017 i n d u str i a l e th e r n e t b o o k
/awesome
Open architecture enables
Technology

edge-computing applications
Fragmentation and vendor lock-in are preventing companies from adopting IoT solutions to remotely manage
devices at the edge. There is a need for standard-based, flexible and modular device application frameworks
to develop IoT and edge-computing applications.

SOURCE: WSTERMO
TECHNOLOGICAL INNOVATION, together with a
steady decline of the price of sensors and devices,
has led to a constant increase in the number of
interconnected devices. Billions of devices will
reportedly be interconnected in the next years.
The fourth industrial revolution, or Industry 4.0,
is based on the assumption that devices are
becoming smarter, thanks to advanced software
applications which allow simple and cost-effective
communications among them.

Edge vs. cloud computing


Traditional IoT cloud architectures are based
on physical assets which collect data and send
them to cloud data centers for further analysis.
However, for some field applications latency is not
an option. Data has to be managed at the field
level and response must be immediate, and cloud
computing might not be the best option. There
is a need to bring the data center to the field.
In addition, bandwidth and infrastructure costs
become an issue when huge amount of data need
to be transferred (e.g. via cellular connectivity); Java/OSGi-based building blocks for developing IoT applications.
local data management is usually limited to some
filtering, triggering or averages in order to make
distilled information. Gateway initiative (OSGi) model can speed application development at
Reducing system architecture complexity is a key success factor in the IoT edge-device level, as well as offer advanced remote management
IIoT applications as well as turning field devices into edge computers. capabilities not available through traditional embedded agents. As a
They become able to process data and apply intelligence, so that matter of fact, still some of the agents are often constrained on specific
only the data which have already been analyzed are published to the hardware and mostly hard coded in C/C++, preventing developers to
cloud. This simplifies business applications development and leads to apply changes (they are rarely allowed to access some APIs to set
increased productivity. Moreover, bringing IoT application development a few parameters). Those agents cannot ensure advanced remote
to the field implies that edge computing can reduce the gap between management capabilities. Remote maintenance, over-the-air updates
information (IT) and operations technology (OT). and upgrades are difficult to perform, and developers often have to
Interoperability between the factory and the office becomes possible start from scratch to upgrade the devices.
thanks to IoT edge devices that securely connect the service platform At the edge-device level, a more robust and open device application
layer with the factory environment. These powerful edge devices, or framework is desirable to enable advanced device management
next generation gateways, become bridges for IT/OT communication features. A Java/OSGi-based application development framework
that benefit both layers. IT has a direct and remote access to field offers a portable, modular and flexible solution to easily communicate
processes and devices, whereas OT can interact with data analytics and with cloud-based management platform and develop advanced IoT
other advanced applications to optimize production processes. applications for remote monitoring and control.

Java and OSGi for edge computing platforms Advanced device management
Even if some effort has been put in place in order to provide some Companies are interested in more advanced remote management
standards and common protocols there are still some barriers that are capabilities and broad access to a wider range of parameters to
responsible for slowing down the process of adopting IoT solutions such control field devices. For example, a multi-national manufacturing
as vendor lock-in and fragmentation. At the edge, things connect company would want to remotely access data coming from its plants
to field machines through sensors, actuators, controllers, agents and distributed worldwide, in order to monitor them and perform predictive
gateways. There are numerous cloud platforms for data storage and maintenance and software updates, thus reducing maintenance costs
analysis, and in several cases, each of them has its own communication and optimizing the production line. This kind of advanced device
protocols. Therefore, IoT solutions are usually tied to specific vendors, management can be achieved with an edge-computing platform,
generating deeper fragmentation between IT and OT. and Java/OSGi is the best way to ensure open standards, modularity,
Java-based device application frameworks in the Open Services flexibility and a standard interface.

28 in d u s t r ial et h er ne t b o o k 11.2017
OSGi is a modular platform Virtualized devices are now
for Java that implements a ready to be connected to the

Technology
Case Study
complete component model, cloud. This is possible thanks
providing modularization to a Cloud Service API which
of Java applications manages data collected by the
and infrastructure gateway and publishes them
allowing components to a remote server via the
to communicate locally MQTT protocol. A store-and-
and across a distributed forward functionality provides
network with a vendor- out-of-the-box support for
independent approach. As connecting to different IoT
a result, developers have cloud providers, allowing the
access to a coherent IoT development and deployment
services architecture based of IoT gateway solutions that
on specifications that are are not tied to a particular
highly scalable for long-term vendor. In addition, the API
remote management and Visual IoT application architecture for connecting field devices to the cloud. simplifies the implementation
maintenance. As an OSGi of more complex interaction
deployment bundle, Java-based applications can be remotely managed flows such as request/response or remote resource management and
and easily configured. By adding and/or removing new application offers a policy-driven publishing system to abstract the application
bundles it is easy get directly into the application management layer. developer from the complexity of the network layer and the publishing
An edge-computing platform deployed this way, by means of its Java/ protocol used.
OSGi-based applications architecture, allows the developers to easily From a security standpoint, the platform offers an extensive security
manage various parts of the device from an application standpoint. management set of services to provide a secure application execution
Developers do not like fragmentation. They prefer to develop and environment, to reduce risks related to remote management of field
manage their apps in the same way across different edge devices, devices and to simplify the management of certificates, keystores,
whether it be a Raspberry Pi or custom-built hardware, it should be application signing and system integrity. Additionally, a VPN client
managed in the same way. Using a hardware abstraction layer on top service allows system administrators to access the devices using a
of an OSGi-based container and Java Virtual Machine (JVM) simplifies secure VPN connection via Ethernet, Wi-Fi or cellular modems.
application development and optimizes portability across systems and
hardware architectures. Leveraging a proven architecture and software Technology report by Eurotech.
building blocks that provide extensive services, an edge-computing
platform will allow shorter device software development. Once this
standard software platform is in place, processing valuable data
becomes easier than it has ever been before. Moreover, integrating
Eclipse Kura (a Java/OSGi based open-source project for IoT applications
development) means preventing vendor lock-in and guaranteeing the While you look ahead
protection of the software investment.
we have an eye for the rest.
Simplifying edge-computing application development
After providing the Eclipse Foundation with the Kura programming
code, Eurotech enhanced it and realized a commercial version for
the development of IoT applications at the edge-device level. Basic
requirements for effective and integrated IoT applications are:
Connectivity to field devices
Virtualization of field assets
Connectivity to IoT cloud services
The platform simplifies the communication between the edge-
computing device and the devices by employing a single model: it
Nuremberg
comes with pre-installed field protocols libraries (Modbus and OPC-UA, 28-30 November 2017
for instance), so that a common format can be reused across different Hall 9, Stand 231
devices. Thanks to a device abstraction layer, it creates a digital twin
of the device, by providing APIs to connect to I/O interfaces of an IoT
gateway, such as Serial communication (RS 232/485), Bluetooth 2.1
and 4.0, BLE, USB and CAN Bus. 360 Network Reliability
The virtualization of field devices enables visual development of IoT for Smart Factory Automation
applications. The Wires programming environment offers a modular
3 industrial protocols with one-click setup
data flow programming tool to define data collection and processing
2 installation options: DIN-Rail and Rackmount
pipelines at the edge by simply selecting components from a palette 1-page configuration dashboard
and wiring them together. This way users can, for instance, configure
Moxa Solutions. Protected, easy, intelligent.
an asset, periodically acquire data from its channels, store them in the
edge device, filter or aggregate them using powerful SQL queries, and
send the results to the Cloud. Different components are represented as www.moxa.com
wired nodes and added and connected with drag-and-drop, freeing
the developer from programming any code.

1 1. 2017 i n d u str i a l e th e r n e t b o o k 29
ME_AZ_FA_IEB_85x120mm+Stoerer_E_DU010917.indd 1 07.11.17 14:23
Single-pair balanced Ethernet
Applications
Technology

transmission for IoT applications


The mega trends in communication technologies, and their impact on associated cabling philosophies,
are being influenced and driven in no small way by the emergence of the IoT, Industry 4.0 (I4.0), cloud
computing and smart technologies -- ultimately leading to new connector and cabling solutions.

ETHERNET IS THE LEADING NETWORK PROTOCOL

SOURCE: HARTING
in LAN applications and is increasingly
gaining ground in new areas. At the start of
the Ethernet era in the early 1980s, coaxial
cabling dominated (thick Ethernet yellow
cable, thin or cheap Ethernet), from the 1990s
the focus shifted to cabling solutions based
on symmetric cabling (twisted pair) and fibre
optics.
Initially, twisted pair cabling relied on
two-pair cables. This utilized a wire pair as a
transmission and reception line (100Base-TX).
This principle, limited to a transfer rate of
100Mbit/s, still represents the main transfer
principle in industry and automation systems
technology today and is often achieved using
star-quad cable designs.
In order to achieve higher transfer rates of
1 Gbit/s and 10 Gbit/s, a transfer technique
was selected, which requires four symmetric
pairs in connection with 8-pole connectors.
Now, lets discuss the transfer of Ethernet
with a single strand pair, in other words, a
Overview of co-action of standardization bodies to strengthen cabling guidelines and technology.
solution that quite obviously runs contrary to
the technical development of Ethernet and its
associated cabling. At the same time, data transfer should routes in vehicles. The solution is called:
This article deals with the background of remain cost-efficient. For devices, cables and single-pair Ethernet for transmission distances
these developments, with the technical details connecting hardware this means they must up to 15 m or 40 m.
and the normative activities as well as the achieve higher performance, be smaller and This Ethernet technology has since been
applications for single-pair Ethernet. We stronger as well as possess a high degree of published in the standards (Gigabit Ethernet
consider the performance of new chipsets and modularity and compatibility (exchangeability over single-pair balanced copper cabling) and
discuss the classification of single-pair cabling and plug-compatibility). These demands can 802.3bw 100Base-T1 (100 Mbit over single-
with respect to existing two and four-pair only be fulfilled through innovation, i.e., pair balanced copper cabling).
versions as well as future n-pair cabling. new development of products with consistent To achieve simultaneous transmission of
international standardization. data and energy, PoDL was also defined under
Mega trends in communications Another trend in network technology and IEEE 802.3bu (Power over Data Lines = a
The development of new communication cabling is the increasing use of Ethernet principle suitable for single-pair transmission
technologies and their associated cabling protocols in new application areas. This for remote powering).
philosophies, are influenced and driven in no includes many automation protocols and, On the basis of these standards chipsets,
small way by the current ICT mega trends, such increasingly, sensor/actuator applications. devices, cables and connecting hardware are
as IoT, Industry 4.0 (I4.0), cloud computing Numerous traffic and transport platforms such now being designed, developed and produced
and smart technologies. as rail, tram, bus, ship and aircraft, are fitting for integration in private cars.
This leads to new demand profiles regarding their fleets with Ethernet. Cabling for private cars focuses on a
communications technology and the network While Ethernet has been successfully transmission distance of up to 15 m and, in
infrastructure behind it, based on cables and employed, in particularly for passenger general, needs to be produced in unshielded
connectors. information systems and for WLAN services for form due to weight and spatial constraints.
Demands include: high availability, short many years now in the methods of transport Larger vehicles such as trucks and buses
access times including distributed data mentioned above, it remained more or less require longer transmission distances of up
and fast transport of this data from A to B. unused in the private car/truck market for to 40 m and, due to the associated higher
Secure transfer of large datasets in different a long time. The automobile industry has EMC requirements, need to be fully shielded.
application areas up to determinism (real-time now recognized the advantages of Ethernet In fact, the latter single-pair shielded
transfer and, for example, guaranteed data and started an initiative to develop Ethernet transmission distance also has other
transfer within a defined timeframe). protocols for short-distance transmission non-automotive application groups and

30 in d u s t r ial et h er ne t b o o k 11.2017
has piqued the interest

SOURCE: HARTING
of manufacturers. This

Technology
is because, in general, Cross-section of SPE cable
shielded single-pair
Ethernet cabling offers 1. Conductor:
all of the features Uncoated Cu (stranded), AWG26/7
required to fulfil the
mega trend described 2. Isolation stranding element:
above. They are fast, 1 Cell-PP, wire : NW 1.25 mm, pair
space-saving, cheap and
3. Alu-coated polyester film, metal-side
simple to implement. 2
For this reason, external (PiMF)
industry, whose 3
automation profile is 4 Tinned Cu-meshing, optical covering
now largely based on 4 approximately 90%
1000 Mbit Ethernet
(100BASE-TX), is 5 5. Halogen, flame-resistant compound
showing increasing
interest in solutions
with single-pair New designs offer the ability to transmit Ethernet according to 1000Base T1 over a single-pair cabling channel.
Ethernet. In fact, within
building automation
developers are actively considering the via a 15 m UTP channel (Type A, unshielded) Therefore, a technical report is being
different possibilities provided by integrating and a 40 m STP channel (Type B, shielded) prepared under the title TR ISO/IEC 11801-
single-pair Ethernet within the hierarchy and is defined. Both channels are specified for a 99xy One Pair Channels up to 600MHz, which
structure of contemporary building cabling. bandwidth of 600 MHz, may contain up to four describes shielded single-pair transmission
Then there are also numerous other application connections and guarantee a transmission channels. The target applications are the
areas, which present attractive opportunities capacity of 1 Gbit/s. so-called non-automotive segments or
for the development of single-pair Ethernet. IEEE 802.3bu Physical Layer and Industry 4.0, IoT and smart lighting in the
The interest in single-pair Ethernet also Management Parameters for Power over Data style of IEEE 802.3bp.
reflects a general trend in standardised Lines (PoDL) of Single Balanced Twisted-Pair These transmission channels allow
network cabling, and diversification of Ethernet bidirectional transfer of 1 Gbit/s by using a
structured cabling for specific application Analogously to PoE (Power over Ethernet), balanced pair up to 40 m with simultaneous
areas. this also specifies the parallel provision of energy supply of end devices.
ISO/IEC JTC1 SC25 WG3 currently includes energy up to 50 W via single-pair Ethernet The transmission channels typically consist
activities or projects which deal with the channels. of a permanent link 36 m in length which
realisation and implementation of the ISO/IEC JTC1 SC25 WG3 currently includes incorpo-rates up to four connections and
technical results of IEEE 802.3 within activities or projects which deal with the two 2 m long patch cords. This document is
structured building cabling. realisation and implementation of the scheduled for completion in 2018.
technical results of IEEE 802.3 within As part of the restructuring and updating
Single-pair transmission channels structured building cabling. of ISO/IEC 11801 standards series (as 3rd
What do the standards activities look like for
single-pair Ethernet communication?

SOURCE: HARTING
First of all, standardisation is a continuous,
dynamic process, which develops and publishes
new standards, revokes existing papers or
updates and launches new standards projects.
Therefore, this white paper is just intended to
be a snap shot of the state of standardisation.
Standards activities in IEEE802.3 define the
Ethernet transmission protocol and define the
minimal requirements for link segments (link
segments are not identical but similar to the
transmission channel of cabling). ISO/IEC JTC1
SC25 WG3 defines the required cabling and in
doing so relies on the component standards
for cables and connectors, which are given in
the IEC standards groups.
As already mentioned, the following IEEE
802.3 standards have already been published:
IEEE 802.3bp 1000 BASE-T1 Physical Layer
Specifications and Management Parameters for
1 Gb/s Operation over a single Twisted Pair
Copper Cable.
In this, single-pair Ethernet transmission Cabling design standards on European and international level scheduled for 2018/19.

1 1. 2017 i n d u str i a l e th e r n e t b o o k 31
edition) it will also be determined in which combine Gigabit Ethernet performance,

SOURCE: HARTING
application-specific parts an addition with transmission reliability, optimal
Technology
Technology

single-pair shielded balanced cabling is handling and remote powering as well


technically and economically feasible. as space and weight savings.
Initial consideration seems to suggest The normative basics have already
this is so for ISO/IEC 11801-3 (industrial been defined in IEEE 802.3 Standards
applications) and ISO/IEC 11801-6 for applications within the automotive
(building automation). Publication is and non-automotive sectors. For the
expected in 2018. respective non-automotive applications,
At the same time, the cabling the planning orientation incorporated
specifications allow the requirements for within the international standards of
the components, cables and connectors to ISO/IEC and IEC is used. The respective
be derived. This is performed for cables in standardisation projects have been
the IEC SC46C standards committee and started.
for connectors in the IEC SC48B standards The compact design of the device
committee (SC = subcommittee). connectivity and the Ethernet
compatibility according to IEEE802.3
Cables for 1 Gbs over one pair offer device development, e.g. within
These international standards titles automation as well as sensor and
describe cables that are suitable for IP20 and IP67 T1 connector design studies for SPE. actuator production, a networking
transferring 1 Gbit/s over a balanced concept that represents a simple
pair. Application areas include office, home according to 1000Base T1 over a single-pair change from bus- to Ethernet technology.
and industry. cabling channel. This allows Ethernet to penetrate further
The use of 4-pair data cables should also On the one hand, this protocol can be into the field level, reduces enormously
be possible, which are capable of operating 4 transferred using existing four-pair cabling times for parameterisation, initialisation
single-pair transmission channels. This feature according to category 7 / transmission class and programming and expands the range of
is also known as so-called cable sharing. The F (specified up to 600 MHz) or according to functions of devices.
transmission parameters should be defined category 7A / transmission class FA (specified Single-pair cabling saves space, installation
for a frequency of up to 600 MHz. This up to 1000 MHz) according to the relevant time and costs. At the same time new
international standard should be published by qualification and with consideration of the applications are tapped, which were previously
2018/2019. length restriction of 40 m. This opens up the reserved for cable-based infrastructure. After
IEC 61076-3-125: Connectors for electronic option of cable sharing, which allows several the internet and Ethernet have connected
equipment - Product requirements - Detail single-pair Ethernet services to be transferred people, computers and machines both in terms
specification for 2-way, free and fixed using a four-pair cable. of space and time, this is now also happening
connectors for data transmission up to 600MHz On the other hand, and this is generally with objects and things. The backbone of
with current carrying capacity the case, new single-pair cable and connector this new technology is provided by, amongst
Following the application areas and products are created to serve new single-pair others, single-pair balanced copper cabling.
performance of the single-pair cables, the cabling structures on the basis of single-pair With this it becomes clear that the connection
two-pole connectors are being standardised Ethernet. Important points for the design of between single-pair Ethernet technology and
up to min. 600 MHz. Standardisation of the the cabling components include: is more prevalent within the mega trends of
connector means that the mated interface will Impedance 100 , bandwidth 600 MHz IoT and I4.0 than in cloud computing and big
be fully defined. Definition of the interface and the associated fixed parameters, data.
ensures plug compatibility and guarantees such as insertion loss, return loss, alien Single-pair Ethernet represents an important
that products from different manufacturers cross-talk etc. technological progression, but is still only an
can be used. It is expected that various Complete shielding to ensure addition to existing Ethernet technologies
designs of single-pair connectors will then be transmission quality under extreme EMC that use multi-pair copper cables or fibre
available in safety class IP20 to IP65/67. The conditions optics and will not replace them.
publication of this standard is also scheduled Single-pair cable with the smallest
for 2018/2019. possible outer diameter (space and Final thoughts
weight savings) for fixed and flexible Single-pair Ethernet cabling opens up new
Balanced transmission channels installation application areas, such as in industry and
The theoretical basis for designing a Two-pole connectors in the smallest represents a useful addition to existing
40 m channel with single-pair cabling has possible design form for use in IP20 four-pair cabling systems. Therefore, single-
already been worked out. This means that the and IP65/67 environments mutually pair Ethernet particularly supports trends
interested manufacturers of electronics and compatible plug interfaces. such as IoT and I4.0. In particular, single-
cabling have all the necessary information pair Ethernet can provide an important
on the development and design of chipsets, Conclusion and outlook technological basis to the further development
cables and connectors at their disposal. The increasing network requirements driven by of multi-pair cabling within the development
The first chipsets are already available on the demands of I4.0 and IoT rely on innovative of cloud computing.
the market. However, a range of new products, and application-specific solutions. Single-pair
which offer optimal support for the individual Ethernet offers a solution for cable-based Matthias Fritsche, Product Manager Device at
applications, are still expected. Accordingly, communications infrastructure. Particularly HARTING, Rainer Schmidt, Business Develop-
devices fitted with single-pair Ethernet are for application areas in industry and building ment Manager for HARTING and Yvan Engels,
expected within two to three years. There management, this represents a smart addition Strategic Market Development / Standardization
are basically two ways to transmit Ethernet to the communications landscape, which BU Datacom, LEONI Kerpen GmbH.

32 in d u s t r ial et h er ne t b o o k 11.2017
IIoT best practices: guidelines

Technology
for MQTT architectures
MQTT has three distinct features that make it an ideal IIoT protocol: low bandwidth, TLS security and
stateful awareness. Among protocols in the pub-sub category, MQTT provides a foundation for building new
architectures as long as users follow best practices and effective technical guidelines for implementation.

SOURCE: INDUCTIVE AUTOMATION


MQTT decouples devices from applications and reduces bandwidth usage. Devices connect directly to a MOM, or the MQTT server, where data is gathered.

THE INDUSTRIAL AUTOMATION INDUSTRY is offerings, organizations can actually take Allow time for testing
benefiting from the incredible opportunities full advantage of IIoT today. Before making Migrating to a brand-new IIoT system of
made possible by the Internet of Things the leap, though, they should recognize that a large magnitude requires thought and
(IoT). While the IoT has shown incredible legacy devices are still in use. Planning and thorough planning. This is a process that
promise within the corporate and consumer patience are required as your team moves shouldnt be rushed or taken lightly.
environment, the true value of the IoT can forward with an IIoT solution for your Taking your time affords the ability to
be found in the industrial space, and the organization. As the old saying goes, look test your system. As your company gradually
Industrial Internet of Things (IIoT). before you leap. builds new infrastructure, testing along the
The thirst for industrial data has ignited way makes sure that communication is stable.
this IIoT movement to bring operational Build a parallel infrastructure Furthermore, if a failure occurs while you
technology (OT) up to speed with its enterprise There are still hundreds of millions of install your new infrastructure, the current
counterpart, information technology (IT). This proprietary legacy PLCs and devices being system is still available, mitigating any
movement aims to overcome hurdles that have used by organizations today, and they will downtime.
handicapped the growth of the industrial continue to be in use for many years to As your team begins developing a plan for
world, and to connect data across a wide come. Upgrading all of these devices would your new IIoT infrastructure, you should start
network throughout an organization. be incredibly cost-prohibitive. It would also looking at which communication protocols to
The IIoT unlocks data, clearing the way be very difficult to just switch to a new use in your infrastructure. The protocol chosen
for easy access and shareability. By working technology, because making a quick switch will determine the IIoT devices and software
with IT, OT can leverage the scalability and could result in a catastrophic failure and loss for your infrastructure. Take the time to
flexibility of open technologies to access and of revenue. understand the needs of your organization and
share all types of data with every level of an The best approach is to build a parallel how your current system is setup. The final
organization. In this article, well provide infrastructure alongside with your existing solution you choose is a large commitment.
some best practices when approaching new installation and gradually transition Once implemented, your infrastructure will be
IIoT infrastructure projects. devices from your old system to a new IIoT in place for many years to come.
infrastructure. Many systems are critical in In the next section, well look at MQTT and
New IIoT infrastructures nature and upgrades could cause outages, why it is an ideal communications protocol
There is a lot of hype about the IIoT and many which are unacceptable. Building a system in for IIoT.
organizations want to leverage the benefits it parallel allows you and your organization to
promises. However, for many organizations, compare data from your established system MQTT as IIoT messaging protocol
the path to technological adoption seems with your new system. The gradual approach The entire IIoT solution will heavily depend
unclear, and some still question if IIoT will helps to make sure your new system works, on the protocol selected, as it is the backbone
ever happen. and is stable before making a complete of your system.
Fortunately, with current and emerging infrastructure transition. Most common IIoT protocols fall into two

1 1. 2017 i n d u str i a l e th e r n e t b o o k 33
SOURCE: INDUCTIVE AUTOMATION
Technology

Cirrus Link MQTT modules leverage a rich feature set and SQL database capabilities to take existing equipment and systems into a robust IIoT infrastructure.

categories. One category is the publish-and- true value of MQTT is now found in its ability The second important feature is the use
subscribe (pub-sub) protocols which connect to decouple edge devices from applications of a cryptographic security protocol called
and publish data to a topic on an intermediary that need the data. Traditional poll-response Transport Layer Security (TLS), which provides
broker. MQTT, AMQP, DDS, and XMPP are communication protocols can eat a lot of communications security over a computer
examples of pub-sub protocols. bandwidth without providing any real value. network. TLS aims to provide privacy and
The other category is the poll-response MQTTs pub-sub method allows devices to put data integrity between two communicating
or client-server protocols, such as Allen- data on message-oriented middleware (MOM). computer applications. It is designed to
Bradley, Omron, and Modbus, in which clients Instead of applications constantly checking prevent eavesdropping and tampering. By
continually connect to the server and make devices for any value changes, applications using TLS, MQTT establishes a secure, private
requests to determine if any data has changed. can connect to a MOM and subscribe to the connection via a handshake process. Once a
Of the two categories, which one should important data that they need, including connection is made, data is encrypted and
your team choose? To effectively build a device state information. transmitted between the client and the server.
highly scalable solution with a high level Since MQTT has proven to be a formidable If the handshake fails, data is not transmitted.
of efficiency, it is best to adopt a publish- communications protocol, its use has gone far In addition to providing low bandwidth and
subscribe communication protocol. Rather beyond the oil and gas industry, and it has a high level of security, MQTT has a useful
than connecting applications directly to emerged as the de facto standard for IIoT and feature called stateful awareness. While current
devices, publish-subscribe protocols decouple M2M messaging. In the Eclipse Foundations SCADA implementations purely transmit data
devices and allow applications to connect to 2016 IoT Developer Survey, 80 percent of from devices, MQTT also sends the device
middleware. Through middleware, the system the respondents chose MQTT as the leading state data about the health of the device or
can connect any application that requires data protocol for IIoT. MQTT is becoming more network connection. This is important for
from any device without placing any heavy available as manufacturers begin to embed remote locations because it enables operators
demands on the network. MQTT onto their devices. With so much interest to determine if network connections are
From the list of available protocols in the in MQTT, it is safe to say that MQTT is the best operational or devices are unavailable.
pub-sub category, we highly recommend using choice for your IIoT solution. As we dive deeper into the best practices for
MQTT. More than just a protocol, MQTT is the IIoT, we will discover that stateful awareness
foundation for building new architectures, MQTT the ideal protocol? is one of the key ingredients to a successful
making IIoT a reality today. MQTT has three distinct features that also make IIoT implementation. Next, lets look into the
it the ideal IIoT protocol: low bandwidth, TLS importance of stateful awareness and how to
MQTT communications protocol security, and stateful awareness. implement MQTT.
While MQTTs recent emergence into the Limited bandwidth presents a serious
limelight may suggest that its a brand new challenge to IIoT, especially for remote Built-in stateful awareness
technology, MQTT has been around for quite locations, which is why MQTT is the perfect With its low-bandwidth publish-subscribe
some time. In 1999, Dr. Andy Stanford-Clark solution. It is a lightweight, low-bandwidth methodology and TLS security, MQTT has
of IBM and Arlen Nipper invented a messaging communications protocol that uses a pub-sub proven to be a formidable IIoT communication
protocol that was mainly intended for methodology. Poll-response protocols send protocol. Another feature that is critical
real-time, oil-and-gas SCADA systems. At the and receive a lot of repetitive data which can to your IIoT infrastructure is the stateful
time, operational technology and information take up an unnecessary amount of bandwidth. awareness that is built into MQTT.
technology were two separate worlds. Unlike MQTT employs a MOM which decouples devices Stateful awareness is important for SCADA
IT, bandwidth in OT was neither free nor from applications and thus reduces bandwidth systems, especially for remote installations.
unlimited. usage. Devices connect directly to a MOM, or Knowing the health of the device and the
In an effort to circumvent the in this case the MQTT server, where data is network connection helps to mitigate any
communication limitations of OT, MQTT was gathered. Applications then connect to the downtime and ensures data is being shared
designed to be a lightweight, pub-sub protocol MQTT server, getting an update whenever there with all levels of an organization. By having
that economizes on bandwidth. However, the are changes to the data. stateful awareness, data becomes more stable,

34 in d u s t r ial et h er ne t b o o k 11.2017
reliable, and contextual. system, our next step is to look at ways to multiplexers, and a variety of metropolitan-
Most enterprises still depend on legacy poll- start implementing MQTT. There are three main area network (MAN) and wide-area network

Technology
response communication protocols to be able strategies to transition your SCADA system over (WAN) devices. An edge gateway can be
to know the state of the network connection to MQTT: converting existing devices to MQTT, thought of as a combination of a router,
between devices and the SCADA system. Un- enabling existing devices to communicate with network box, terminal server, and a net- work
fortunately, devices must be polled frequently MQTT platforms, and embedding MQTT directly arbitrator.
to determine whether or not a network onto devices. As their name suggests, edge gateways live
connection is good, which can put a strain The first strategy is to convert legacy devices at the outermost edge of a SCADA system. With
on the system. to use MQTT. An edge-of-network device is an abundance of legacy PLCs and devices still
designed to communicate with legacy devices using poll-response communication protocols,
Stateful awareness in MQTT using their native protocol. The edge gateway edge gateways act as a bridge to connect to
MQTT has stateful awareness built in and it then connects directly to an MQTT server. The these legacy devices, converting them to
is the only stateful architecture available. It poll-response is moved to the local level, and MQTT, enabling them to communicate to MQTT
is designed with a last will and testament: data is converted to MQTT and published to an servers, and allowing enterprise networks to
if the device stops working and falls off the MQTT server. This strategy is ideal for current access the data.
network, then the MQTT server will publish installations using legacy equipment and
a death certificate and the device will be traditional poll-response protocols. Redundant edge gateways
marked as being unable to publish data. On The second strategy is to enable edge Putting in failsafes is a must for the SCADA
a larger scale, with thousands of devices devices to communicate with MQTT platforms transition. The data youre collecting and
connected to the MQTT server, it is important using the Sparkplug specification from Cirrus sharing is important and any failures can
to know within seconds the state of each Link Solutions. Cirrus Link provides open- lead to negative effects on your organization.
device: whether it is online and ready to source software, tools, and the Sparkplug Because edge gateways are critical, adding a
publish data or if it is unavailable. reference specification to allow applications, redundant edge gateway is a best practice.
Lets say that youre using the Ignition sensors, devices, or gateways to seamlessly It is also highly recommended that you add
platform with an MQTT server and an MQTT integrate with Ignition using the Cirrus Link redundancy to your IIoT infrastructure as a
client. When a device connects to an MQTT MQTT modules. whole. Make sure there isnt a single point
server, it registers its state and then it The third strategy, which is appropriate of failure that can cripple your operation.
registers its last will and testament. Ignition for newer installations, is to use devices You should add redundancy at every point
and the MQTT client will know that the devices with MQTT already embedded into them. in the system where data is published. Make
are online and will deliver information if and Manufacturers have begun to offer devices sure you have edge gateways that are able
when it changes. that have the Sparkplug specification enabled, to communicate via cellular and satellite. Set
In the event of hardware failure or making them ready to install and connect to up multiple MQTT servers and use all available
environmental issue, the MQTT server will your MQTT server and to the rest of your IIoT channels to make sure data is available at all
publish the fact that the device is no implementation. In this strategy, these edge- times.
longer available. In Ignition, those tags are of-network devices do not require a separate
represented as stale data and the device is edge gateway since the MQTT functionality is Always have backup systems
marked as unavailable. When the device comes already built in. Redundancy is crucial for your IIoT
back online, it republishes its birth certificate. Now that we have established the implementation, especially when you have
The MQTT client knows that the device is importance of stateful awareness and how to installations in remote geographical areas.
available, and Ignition shows the updated tags implement MQTT, we can turn our attention Having a failsafe ensures your data is safe and
and the devices availability. to edge-of-network devices, which act as a available when it is needed the most. If there
bridge between PLCs and the MQTT server or are system failures, having backup systems
Awareness improves processes broker. This capability makes them a critical ensures smooth operation and minimizes
Stateful awareness is a subtle but powerful component in the MQTT architecture and IIoT downtime, which could save your organization
feature of MQTT. There are many MQTT infrastructure. thousands or millions of dollars.
implementations that are stateless, but for The key to a redundant architecture is to
SCADA implementations, stateful awareness is Redundant edge gateways take advantage of multiple communication
essential. MQTT uses reporting by exception Regardless of whether a location is local channels. Having a hardline system is always
(RBE), which is made possible by stateful or remote, connectivity can pose a major preferable, but having a wireless backup such
awareness. Data is only sent when there are challenge. Local locations tend to rely on as cellular or satellite ensures your system has
changes to the state of the device or when hardline connections to transmit data. Remote continual coverage to ensure your valuable
data values change, which reduces the amount locations rely on wireless services such as data is safe and your system keeps running
of useless data taking up bandwidth resources. cellular or satellite. In either case, the main smoothly. Next, well discuss options for the
Knowing the device state is valuable since communications conduit could potentially edge devices, MQTT servers, and MQTT clients
it helps to provide context to the data. fail. As a best practice, especially for mission- in your MQTT architecture.
Operators, especially, can keep track of devices critical systems, make sure to integrate
and quickly pinpoint any trouble spots without failsafes and install redundant edge gateways. Use MQTT modules for IIoT apps
having to send a technician out to a location MQTT is an incredible communications protocol
to verify an issue. On the organizational level, Edge devices and gateways that is ideal for your IIoT infrastructure. Yet,
data can be verified to be up-to-date and Edge gateways are a type of edge-of-network you still need an industrial platform that fully
accurate. device. Edge-of-network devices are a key takes advantage of MQTT and brings IIoT
component in MQTT architectures, providing together. With Cirrus Links MQTT modules,
Ways to implement MQTT an entry point into an enterprise core network. Ignition becomes the ideal IIoT platform. The
Now that we have established that MQTT is the Edge devices can include routers, routing Cirrus Link MQTT modules leverage Ignitions
ideal communications protocol for your IIoT switches, integrated access devices (IADs), rich feature set and superb SQL database

1 1. 2017 i n d u str i a l e th e r n e t b o o k 35
capabilities to take existing equipment and small, self-contained MQTT server. It provides MQTT local masters, and switching over to the
systems to create a robust IIoT infrastructure. you with a complete MOM solution that is best pure MQTT solution.
Technology

Depending on specific needs, be it an edge suited for an on-premise MQTT infrastructure Step 1: Install and set up an edge gateway,
gateway, an MQTT server, or enabling MQTT with a limited number of edge-of-network such as an Elecsys Director. The edge gateway
functionality, the Cirrus Link MQTT modules will devices. acts as a TCP/IP cellular, VSAT, or Ethernet IP
create a solid solution. Ignition architectures The module provides rapid development and endpoint. In this step, you are setting up the
with MQTT are comprised of several elements: is ideal for situations where communications edge gateway to communicate with PLCs or
edge devices, MQTT servers, and MQTT clients. are restricted or costly. Its designed to edge devices using the poll-response protocol.
Each of these elements plays an important role simplify and speed up the process of getting The edge gateway then connects to an MQTT
in your ability to take a legacy system and a complete MQTT infrastructure going. Its also server using a TCP/IP link and sends collected
migrate into a cutting-edge SCADA system. very effective at increasing data throughput data via the MQTT protocol.
for high-performance plant-floor solutions. Step 2: Start the conventional poll-response
Edge-of-network devices by connecting to the internal terminal
The edge-of-network device is the first MQTT clients server and keeping poll-response going.
important component of the MQTT The third piece of the MQTT architecture is You will enable both the serial and Ethernet
architecture. Edge devices which include edge the MQTT client, which connects to the MQTT connections between Ignition and the field
gateways (also known as directors) allow you server and subscribes to one or more topics of devices using the edge gateway.
to communicate to legacy devices such as information, bringing that data right into an Step 3: Enable MQTT local masters. Once
PLCs and RTUs, to collect tag and state data, application. While there are many MQTT client the conventional poll-response protocols
convert it to MQTT, and publish that data onto tools available, it is recommended to use the have been enabled, legacy SCADA users can
an MQTT server. Edge gateways, along with Cirrus Link MQTT Engine Module for Ignition. start to see the conventional use of Ignition.
MQTT, allow you to decouple devices from The MQTT Engine Module is the key component The resulting parallel communication system
applications, thus improving bandwidth usage. that enables Ignition to act as a native MQTT can compare values coming in from the
There are four methods for implementing an citizen. conventional poll-response and publish-
edge-of-network device. The first method is to The MQTT Engine allows the platform to subscribe of MQTT.
use a dedicated edge gateway to bridge legacy communicate bidirectionally with MQTT- Step 4: The system is now ready to switch
devices to new devices or to an MQTT server. enabled edge-of-network devices via the over to a pure MQTT solution. Once the
The second method is to install a brand-new MQTT server, which can be sent securely all organization is happy with the final, pure
edge device that natively communicates the way down to the device. It takes data from MQTT infrastructure, you can remove the OPC
via MQTT. Several manufacturers are now the MQTT server and injects it into industrial poll-response components. This will greatly
embedding the Sparkplug specification SCADA applications. simplify the network topology and creates a
onto their devices, allowing for direct Now that we have covered all the available clean and pure MQTT solution. Furthermore,
communication with an MQTT server. options, resources, and best practices, it since the solution provides a plug-and-play
The third method is to use the Cirrus Link is time to look at how to bring everything SCADA system, it is easily scalable and can
MQTT Transmission Module on an Ignition together. In the last section, well take a look quickly grow with your organizations needs.
server. The module turns the server into an at the best migration strategy to take when
edge gateway, allowing you to collect and implementing an IIoT infrastructure. Best practices recap
publish edge data to the MQTT server. The To recap the best practices for a successful
fourth method is to use Edge MQTT, a limited, Optimal IIoT migration strategies IIoT implementation, we recommend:
lightweight solution that turns touch panels, Migrating to a new IIoT infrastructure takes Planning the strategy and adding to
client terminals, or virtually any embedded time and careful planning. As we discussed in your infrastructure in pieces, giving
PC or field device into an MQTT-enabled edge the first best practice, you must approach the opportunities for testing and making
gateway. migration transition slowly. There are many sure everything is working.
pieces involved with an IIoT infrastructure and Choosing MQTT as your IIoT messaging
MQTT servers when you factor in the added complexity of a protocol since its feature set is ideal for
The second piece of the architecture is the legacy system, you need a slow transition to an IIoT infrastructure.
MQTT server, often called the broker. This ensure that downtime is minimized. Leveraging stateful awareness to
is where the message-oriented middleware Many organizations face a Catch-22 help maintain the health of your IIoT
(MOM) resides. All edge-of-network devices in when implementing a SCADA infrastructure infrastructure.
the MQTT architecture publish MQTT tag and upgrade. Current SCADA solutions still use Employing a redundant strategy
state data to the MQTT server. the poll-response protocol drivers that are throughout your solution.
The MQTT server then enables MQTT clients directly connected to field devices over a Using advanced technology in the MQTT
to securely connect and subscribe to the communications channel or a TCP/ IP network. engine, transmission and distributor
devices published data. Since MQTT is an open Because of this, they cannot replace or upgrade modules to simplify integration.
standard, there are many companies making the poll-response protocol on the SCADA host Finally, following the optimal migration
their own brand of MQTT servers. For example, until the new protocol is in the field and, vice strategy to ensure a smooth transition to
theres AWS IoT from Amazon, Azure IoT Hub versa, they cannot upgrade devices until they a new IIoT infrastructure.
from Microsoft, and Chariot from Cirrus Link, as have a new protocol on the SCADA host. The best practices discussed in this article
well as HiveMQ, CloudMQTT, Red Hat AMQ, and are proven methods for success. Even with a
VerneMQ. There are many options to choose Best way to migrate systems legacy system, the solutions offered reduce
from, whether it be a locally hosted or cloud- There is a proven four-step migration strategy friction and offer the resources needed to
hosted solution. that uses the Ignition platform, the MQTT move an existing installation into a state-of-
As a best practice, use the Cirrus Link MQTT Engine Module and an edge gateway. the-art IIoT and SCADA solution.
Distributor Module. The MQTT Distributor The four steps are installing an edge
Module is launched by the gateway and is a gateway, starting the poll-response, enabling Technology report by Inductive Automation.

36 in d u s t r ial et h er ne t b o o k 11.2017
Reader Service Card
IEB issue 103 - November 2017

Service
IMPORTANT: You must update your subscription
annually to continue receiving your free copy
of Industrial Ethernet Book magazine.
Return by mail to: Or use our online reader service at:
IEB Media www.iebmedia.com/service
Bahnhofstr. 12
86938 Schondorf
Germany

Please enter your contact details below: Company Activity (select one)
Aerospace/Defence
Name: ___________________________________ Electronics Industrial/Consumer
Position: ___________________________________ Instrumentation/Measurement/Control
Company: ___________________________________ Manufacturing Automation
Address: ___________________________________ Metal Processing
___________________________________ Mining/Construction
City: ___________________________________ Oil & Gas/Chemical Industry
State: ___________________________________ Packaging/Textiles/Plastics
Zip Code: ___________________________________ Pharmaceutical/Medical/Food & Drink
Country: ___________________________________ Power Generation/Water/Utilities
Phone: ___________________________________ Research/Scientific/Education
Email: ___________________________________ System Integration/Design/Engineering
Telecomms/Datacomms
I want to: Transport/Automotive
Start a new subscription Other: _____________________________________
Update my subscription
Digital edition or Print edition Job Activity (select one)
Change my address Engineer - Instrumentation & Control
I do not want to receive promotional emails from Engineer - Works/Plant/Process/Test
Industrial Ethernet Book Engineer - Research/Development
I want to be removed from the Designer - Systems/Hardware/Software
subscription list Manager - Technical
Manager - Commercial or Financial
Signature: _____________________________________ Manager - Plant & Process/Quality
Scientific/Education/Market research
Date: _________________________________________ Other: _____________________________________
IEB Media reserves the right to refuse an application for a free copy of Industrial Ethernet Book or the provision of information on any of the advertisers or articles

IEB103_p37.indd 37 08.11.1745 12:25


Industrial web-based computing:
Technology

is data intelligence finally here?


Fog computing and cloud computing are no longer strictly processing partitioned, which leaves more power
in the control centre at quite minimal costs. Another key advantage is that no longer are very powerful
computers needed, nor is there a need for high levels of human intervention or even monitoring.

DATA INCLUDING TEXT, PICTURES, RAW BITS

SOURCE: MOXA
and bytes that tell humans things has been
around for a long time, from the early grunts
and cave drawings, to the printed word.
Making sense of it all and to put data to
use, on the other hand, takes understanding
and processing. Processing needs a brain or
a computer to give us information. Why? The
amount of data can be huge and to bring it
down to a manageable size may lose points of
interest, so encapsulating that data in a wider
sense with understanding of where the data is
from and what it is about helps enormously in
forging solutions.
The UK Meteorological Office takes 10
million observations on the weather every
day but if you watch a weather forecast the
information presented rarely takes more than Using a ring topology can automatically correct standard errors and faults in the transport layers.
5 minutes. How is this done; by targeting the
audience and encapsulating the raw data in The cloud Fog computing
information packets, packets which have been An ethereal place of residence on networks As the name implies, this is processing done
processed, analysed and organised in order to circling the globe, and today, of near orbit, on the data but the computing engine is close
provide succinct details. where servers and storage can be found and to the edge or at the point of data collection.
An interpretation of this is much like one used for data derived in a more physical world. Unlike cloud computing this is very much
word being able to insinuate many ideas; Provided and patrolled by an invisible though under the control of the application developer
the term congested road gives the picture powerful entity, the community at large, it and it is usually left to the developer to not
of a traffic jam or could simply be a road is very much indefinable though effectively only implement it in the system but also to
containing many cars difficult to pass, would easily usable. ensure ancillary services such as connectivity
this also lead to frustration and anger? If we and backups are maintained as well.
add just one further idea of congested urban Cloud Computing
road then just that one extra piece of data By having the processing carried out in Grammar
puts the visualisation into context and makes the cloud by multi-user and powerful Akin to language we now look at how data
clear the thought on the subject. computers it alleviates the cost of having a can be visualised more succinctly. The very
This leads to the preposition that digital powerful computer in the local environment; definition of grammar is placing meaningful
data can provide intelligence. In software the optimising machine cost and, to some extent, words in a correct contextual sense whereby
idea of concatenating bits into binary arrays development costs due to the application accepted words of the language are used
where a 16 bit word contains digital flags frameworks or Applications as a Service, more within an accepted boundary, the context.
indicating many things, can be carried further commonly today referred to as Software as a This also provides the implicit facility to
by defining an object structure of say Door Service (SaaS), provided by cloud computers. have the same word having several different
Operation, a door being opened or closed Such points as regular backups and meanings and raises the question as to how
and a time for how long the door has been validated recovery mechanisms are benefits we can utilise similar techniques with the
opened or closed. Add to the structure who to this method of computing but there are processed data both to aid understanding but
opened the door and then an extrapolation ongoing regular costs to take into account also ease the necessary processing to achieve
may be made as to why the door was opened. also for such things as bandwidth usage and optimum usage and efficient deployment in
Such situations are seen as data providing amount of data storage. the network environment.
intelligence rather than being intelligent in
its own right. What if we pass to a centralised Fog Shrink boundary & extend the area
core not real time data but extrapolated data In the Operational Technology (OT) world It would seem incongruous to attempt to
on the subject? the fog is so termed as it is, like the climatic take a circle and shrink the circumference
First, let us provide some definitions condition, is close to the ground or, more but increase the area covered by the circle.
on which we can more easily describe precisely, close the real world interface layer Here we now move between the physical
the segmented parts of the subject under at the edge of the industrial topology used to world and the metaphysical, or possibly more
discussion. create effective plant networks. understandably, the modelled world.

38 in d u s t r ial et h er ne t b o o k 11.2017
SOURCE: MOXA
Technology
The reaction of the fog is far faster than that of the cloud, so even with a catastrophic failure the motor can be stopped in highly distributed control systems.

To take as an example a CNC machine which seemingly impossible paradox of both what are these attributes? A typical list could
has detectors applied monitoring such data removing the need for more sensors (shrinking include the following.
points as the size of the material to be worked the boundary) as well as monitoring the whole At the fog or edge, the real world monitoring
on, the speed of the cutters, the temperature process more fully (extending the area). In and control data that will be passing through
of the cutters, the temperature of the material order to do this we need some processing the transport. For this, the cyclic parameter
being worked, the position of the cutting power to apply the necessary algorithms but must be determined; the cycle time obviously
head, the power used in moving the head. the question of the moment is, does this apply must be sufficient for system accuracy but
Those data points are our circle of the world intelligence to the data as the data points also automatic failure detection and aspects
the CNC operates within but what else can we are transformed from explicit data to implicit needed to overcome such failures.
achieve from these? information? Any processing that is to be applied in the
Obviously this close to the edge the fog has to be sufficient to achieve the above
processing needed is required to act in real Clarify the picture desired results. File storage and retrieval
time but only small applications are needed Taking a system as a whole entity we then come times, computer bus speeds and ability to
with the objectivity detailed in small chunks to the question of how to define the details be placed automatically in burst modes,
of processing. This can be achieved with of the needed processing and efficiently make processor speed alongside number of pipelines
small RISC computers such as Moxas IA260 or use of the system parts. For the most simple and manipulation of apparent parallelism by
even the UC-8100 series which, in addition, of system the partitioning is straightforward kernels.
have the ability to communicate wirelessly as to utilise the whole attributes abilities to the Latency and jitter imported to system
required. full or even not to take any heed of them. efficiency by all transport parts brought about
The fog computers themselves can receive However, for the more complex systems we by the transport protocols in use.
the real world data in standardised format must understand in full how each system Towards the cloud, the sufficiency of
such as Digital IO or serial packets but having attribute could be utilised most efficiently. So buffering and local storage that can overcome
networking connectivity can also receive

SOURCE: MOXA
digital format data such as in Modbus/fieldbus
format from serial to Ethernet converters as
well as Iologik IO modules, each of which
themselves also have variants for native wired
Ethernet or wireless capabilities.
Can we optimise anything here to lower the
total cost of manufacture? Take the cutter
temperature, if we statistically analyse the
profile of the material being worked and the
temperature of the cutting tool we can then
make an assumption as to the temperature of
the material. From there we can control the
speed of the machine, the cut depth, as well
as the optimum wear of the cutting tool for
the process being performed and ensure the
material tempering is not affected by the
cutting process itself. With this method we can
then, as you see, achieve a level of condition
based monitoring of the tool as well as the
material.
In this example we have overcome the All layers of the communication and machine control network can use the same basic network technologies.

1 1. 2017 i n d u str i a l e th e r n e t b o o k 39
SOURCE: MOXA
Applications
Technology

Effective monitoring systems on wide area networks (WAN) can be created by integrating a combination of field devices, wireless data logging and monitoring software.

connectivity outages for small time intervals. as the weather at height is important, not that Failure in a good way
At the cloud, the level of information that at ground level, so satellite data is taken in Driving a motor at the correct speed
is to be utilised to achieve the desired needs as well weather monitoring stations. It is the continuously needs accuracy as, in the real
of the first point. aircraft themselves that could monitor their world, many controllable and uncontrollable
We can now see that there is the possibility own weather (by radar and pressure sensors) factors can affect the speed; not least of
to have a distributed management process and pass this as a more local and accurate which are power surges, ambient temperature/
overseeing the system as we would want much view to the control centres. The centres can moisture changes, friction build up etc.
of the data transform to be carried out in the then have not only weather information as a However, monitoring the speed over time
fog. Information rather than raw data is passed 2D object but also as a 3D model. can give us an indication of the serviceability
up towards the cloud, lessening the required Ground-based radars throughout the country status of the motor in that answering the
throughput and leaving less to be completed are monitoring the airspace and their data question of the current wear level will show
in the cloud which, although having possibly can now be joined to provide 3D positional when the motor may fail.
powerful computers may be used by many in informational which can be used to check the We have already discussed that at the edge,
a virtual machine environment (to minimise position being fed from other sensors both or in the fog layer, the processing needs are
costs) and are more than likely not under our on the aircraft itself as well as other external for accurate, fast computers and introduced
tight control. aids. By distributing the monitoring between RISC computers but Moxa also has Intel
Let us take another example, in this case aircraft themselves, airfields and localised Processor based computers which come in
one most have encountered in some degree positions, the information provided to central several form factors and capable to operate, in
over time, that of aircraft operations. Today air traffic controllers can be seen to be very some variants in hazardous environments. The
this is a good example of distributed control accurate and clean. V2000A series being targeted at rail transport
and monitoring as many countries have, or Notice again, as in previous examples that and DA Series specifically made for the energy
are migrating their airspace management to, the fog is providing information forward and generation markets.
a centralised system. Taking two aspects that not just raw data. Information, a joining and Alongside these are Panel PC models as well
are important, we have weather and aircraft contextualisation of several data points, is as straight processing platforms in the marine
position. Aircraft only make profit when they being used in preference to raw data. market. Such points then can be used to aid
are airborne. As an aside, we often think of defining the function partitioning; whether to
the hierarchical view of Command and Control But what can go wrong? use the fog to process the data or the cloud.
as the real world being at the bottom and the The mechanism of providing information The time needed to get information to the
overview being at the top. In this case, it has one big disadvantage. The closer to an cloud and make the decision as to whether the
is the aircraft that are physically above the overview picture we move the information, speed is correct may generally be satisfactory
control centre so in essence the physical and the more diluted the data gets. Here we are but is it efficient enough to actually introduce
metaphysical have been reversed. looking at the distinction already described speed control? The fog would be more efficient
Weather is reviewed on a long cyclic view, between data and information. to apply the speed control aspect with the

40 in d u s t r ial et h er ne t b o o k 11.2017
SOURCE: MOXA
Applications
Microsoft Azure IoT and OPC UA can work together to provide effective links between the private and public cloud.

cloud monitoring the serviceability state. The story begins pressure/level/efflux data passed upwards.
There is also a further aspect to this. That of Everyone has recently started discussing cloud cloud processing and storage is far less and
maintaining control even if errors or failures and fog computing but in reality they have so are cloud running costs.
are affecting the system. The reaction of the always, relatively, been there. It is only now
fog is far faster than that of the cloud so even that the terms have been given meaning in Can data be intelligent?
with a catastrophic failure the motor can be the system function partitioning that clarity to We started this journey asking if data can be
stopped, possibly reducing secondary damage the uninitiated comes and helps to target the intelligent. In most ways the answer has to
and hence efficiently allowing maintenance to system architecture design decision thought be no, as to exhibit intelligence processing
be more cost effective. On the other hand, processes. has to be involved. Intelligence in all guises
maintenance can also be made more cost System design can be seen to be based understood today would seem to point at the
effective if the cloud monitoring the motors around a simple derivation; the data that is need for an understanding of the end to end
information can calculate when it is expected obtained from the real world, the information needs but Artificial Intelligence is based on
to fail and so schedule maintenance at the the data forms and the use the information is many conjoined disciplines, not least of which
most appropriate time. put to. Detailing the transform to information is that of system operation utilising operations
When designing the system, we can also at the edge is where the fog lies. The transform that behave akin to a neuron. A data point
implement mechanisms as ring topology and actually clears the fog from the system, easing becomes the data itself, some self-imposed
use standard protocols to automatically correct sight of the overall picture or control needed, limits, feedback of the amortised data point
standard errors and faults in the transport allowing optimum use of resources such as and its output. Effectively now we appear to
layers. Defined and standardized to make the lessening the bandwidth needs of information be on the cusp of data becoming intelligent in
system rugged, such methods also can allow moving towards the cloud as well as aiding its own right with little processing.
different devices to interoperate and ensure the edge peer to peer use of the information Add to this a data point becoming an
the rugged platform, and as such, data and derived. Obviously, from such operations we information point, where information is passed
information integrity, is maintained. have now formed several aspects of the system through a similar neuron, as discussed the
layer definition with time and effort to do so raw data is diluted but the information now
Failure in a bad way making time to market less. aids a better overview and gives wiser system
Always good engineering practice, the Take for example a water tank fed by usage and control. One of the better points of
designer will obviously cater for most, if not streams used to irrigate farmland. It is desired all this metaphysical understanding is that,
every, failure condition that could be met to keep the water tank at a specific level to with the power of quite small devices today it
within the system. Devices can fail, wiring can ensure good pressure to the irrigation system. is no longer the case that the fog computing
fail but such events can be catered for within Function partitioning is by functions looking and cloud computing are strictly processing
devices and their reporting facilities but today at items which can be controlled in the fog partitioned. More, it leaves the control centre
the thing that should be to the forefront of and items which cannot be controlled locally with a newly acquired power at quite minimal
everybodys mind is cyber-security. too well are pushed to the cloud. Water purity costs. No longer are very powerful computers
A forced, intentional failure could be and temperature are fed to the cloud but tank needed nor is there a need for high levels of
approached and caused anywhere in the level is monitored and controlled in the fog. human intervention or even monitoring.
system if it is open to abuse, the designer It would be pointless having an on/off Look at the vehicle industry today. Cars
should cater for such in the design. The control for letting the water into the irrigation, order their own spare parts to be replaced
level of security applied is of course going far better to have a variable opening which at the next managed servicing period as well
to increase the TCO but when offset against maintains the pressure but controls the efflux as driving themselves. Intelligent data? Yes.
such a potentially harmful failure, which could amount over time as the amount of influx Possibly in a premature state today, but it is
go undetected for some considerable time, it changes with the level of water in the streams. definitely present.
is more optimum to implement safety and In such a system the amount of data passed
security features than not. to the cloud is far less than having all the Alan Harris, Field Application Engineer, Moxa.

1 1. 2017 i n d u str i a l e th e r n e t b o o k 41
Fast roaming: a challenge
Technology

for industrial Wi-Fi applications


Fast roaming WiFi offers reliable and secure communication, especially for mobile applications. For train-to-
ground applications and automated guided vehicles, wireless IEEE 802.11 networks are suitable because of
long range and high data rates, and when participants can be moving over long distances at high speeds.

SOURCE: BELDEN
Application example of train-to-trackside communication.

IEEE 802.11 WI-FI WIRELESS NETWORKS are networks minimizes the cost of applications in different access points along the route.
used today in a wide variety of applications. which wear and tear would damage or destroy The communication range of the trackside
This technology is well known for its long cable connections quickly. In addition, the use access points and the wireless network
range and high transmission speeds. However, of wireless communication systems becomes on-train clients are particularly important for
fast roaming is a particular challenge for the mandatory whenever communication between the reliability and efficiency of such a system
quality characteristics of Wi-Fi networks in mobile clients needs to be implemented. since every switchover (roaming) of a client
industrial environments. Thanks to their long range and high data between two different access points along the
Fast roaming is especially important when rates, wireless IEEE 802.11 networks are route causes an interruption of the train-to-
the reliability and security of communication suitable for the sophisticated application ground connection. Hence, frequent roaming
in a mobile application scenario needs to be scenarios of Train-to-Ground Communication degrades the connection quality, especially
unaffected. However, due to the complexity of and Automated Guided Vehicles (AGVs) in when the interruption is long.
this application, optimizing a wireless network which the participants can be moving over The network requirements for the AGV
for operation is far from straightforward and long distances at high speeds. application are very similar in terms of
offers technical challenges. coverage and interruptions. In this case,
Wireless networks can offer many new Factoring Wi-Fi network quality vehicles are moving autonomously through
options for the implementation of industrial The objective of train-to-ground a manufacturing site to independently fulfil
applications. On the one hand, they offer an communication is to establish fast and various tasks.
easy-to-install option to provide facilities reliable signal transmission between trains The vehicles communicate with the
in changing environments with network and the subway and track-side infrastructure. infrastructure about sensitive and time-
communications. The network on a train can connect WLAN critical information necessary for autonomous
On the other hand, the use of wireless clients on the train via specialized Wi-Fi with operation, such as receiving control

42 in d u s t r ial et h er ne t b o o k 11.2017
commands. Thus any longer interruption on

SOURCE: BELDEN
the communication network might cause the

Technology
stop of an AGV which could lead to disruptions
in the manufacturing process.
The most important quality indicators
of how a wireless network can meet the
requirements of both applications are:
Packet loss rate: the percentage of sent
messages (or packets/frames) that are
not successfully received by the intended
recipient
Latency: the delay in transmission for
the delivery of a message via a wireless
connection
Data throughput of the wireless A mobile client on a train or AGV moves through the wireless networks of different access points.
connection: the ability to transmit a
certain amount of data within a specified devices to rapidly change between access frequencies for suitable access points.
time points. Since the security of the wireless A mobile client must therefore periodically
Interruption: a break in transmission that network should be ensured at all times, interrupt its established connection to scan
takes place when a client roams from one including in scenarios with high mobility, all eligible channels/frequencies to obtain
access point to another there should be no compromises of the an overview of signal strengths of the other
Communication range: the area covered implemented security technology in favor of access points in its environment. Only with
by an access point or the seamlessness in faster roaming times. this information can a client decide whether
the coverage of a facility that determines Therefore, technologies for faster roaming there is a possible connection with a better
whether the Wi-Fi connections are strong should always be viewed in the context of quality than the present quality, and then
enough to reach all necessary locations the underlying security mechanisms. These initiate the roaming process.
Generally speaking, the importance of roaming enhancements are often specific to Depending on the trains speed and the
each parameter varies according to the special hardware or software features and associated changes in the environment of
application. When it comes to train-to- therefore are only available on certain wireless the WLAN client, the scanning processes must
ground communication and AGVs, reliable network products. For example, the current be performed repeatedly. Since the active
communication has top priority. The wireless BAT devices of the Hirschmann access point connection cannot be used during these scans,
network must deliver a certain data throughput series support the following technologies: it is not possible for the client to transfer the
with minimal packet loss at every point of the packets for the application during the scan
area. Fast roaming the network is not available whenever the
A standard requirement of a train-to-ground Although a mobile client moves through the client scans. For this reason, scan processes
installation is 20 to 80 Mbit/s data throughput transmission range of several different access should be as short as possible.
with less than 1% packet loss. Especially the points, the reliability of the communication
requirement on high reliability is similar and the available bandwidth must be Secure fast roaming
for AGV scenarios, since any interruption in guaranteed at all times. Ideally, to optimize Whenever a client decides to switch its
communication might cause the AGV to stop bandwidth, neighboring access points with connection to a different access point, it will
its operation. overlapping radio coverage should operate on initiate the procedure for the fast BSS (Basic
different channels to minimize interference. A Service Set) transition defined in the IEEE
Quality of wireless networks mobile client can connect automatically to the 802.11 standard, meaning the actual roaming
To ensure this reliability can be achieved, access point with the best signal. Fast roaming to the better access point. In consideration
the installation must have sufficient network between wireless network access points has of the highest WiFi security, fast roaming is
coverage; in addition, the interruptions of been possible for a long time. Interruptions usually labelled as Fast BSS Transition.
a mobile client during the switch from one of less than 50 ms can be achieved; however, The security of a WiFi connection can only be
access point to another should be as short even faster roaming requires further technical guaranteed if a client properly authenticates at
as possible (typically < 50 ms). Insufficient tricks and achieving such fast roaming times the target access point when connecting and
coverage results in a stark reduction of the with proper security is even more challenging. if a valid key for this connection is provided
data throughput, and frequent interruptions for encryption of the data packets. This takes
that are too long lead to extreme packet loss. Reducing scan times time and must be repeated with every roaming
For these reasons, an optimal mechanism When roaming between two access points, process, unless special techniques are used.
for changing the connection from the client an on-train client must first identify the Fast roaming is therefore only possible using
to the access points factors into these both next target access point. This is not as a faster authentication mechanism.
aspects. Roaming needs to occur as quickly as simple as it may sound, because in order Over time, more and more (necessary and
possible and must be initiated precisely when to avoid interference between adjacent important) security mechanisms have been
the client leaves the range of the current access points, these access points typically added to wireless networks, so that wireless
access point and the next access point offers operate on different channels, meaning networks today are very secure. But this
a stronger signal transmission which leads to different frequencies. However, a client can security comes at a price: the connection
a more reliable data throughput. only communicate with access points on one setup and connection switching between
channel at a time. Therefore, when searching access points is slower because the necessary
State-of-the-art technologies for candidate target access points, the client security parameters must first be negotiated
Presently, there are various technological must deactivate its current communication and exchanged. Here too, a certain level of
wireless network capabilities to enable client connection in order to search other channels/ technical trickery is needed to create both

1 1. 2017 i n d u str i a l e th e r n e t b o o k 43
SOURCE: BELDEN
Technology

Application example of automated guided vehicle (AGV) communication.

secure and fast Wi-Fi when roaming. In order possible, there are still some disadvantages: as IEEE 802.11r
to ensure both a fast and secure exchange, two a requirement for Pre-Authentication, a client A conceptually very similar procedure to the
problems must be addressed: must be able to predict with which access Opportunistic Key Caching, 802.11r is specified
How can the mobile client switch as point it will connect as early as possible. This in the IEEE standard. A significant difference
quickly as possible between access information may not be available in certain between this specification and OKC is the
points? circumstances, since a client would have to use of a defined key hierarchy at the Wi-Fi
How can the time for the negotiation of scan the Wi-Fi channels in its surroundings controller and the connecting clients. Based
security parameters be minimized? for access points often and continuously. on this hierarchy, the access point and the
The following optimizations lead to a This in turn leads to loss of performance and client are able to gain access to a part of the
significantly faster roaming while continuing interruptions. Alternatively, of course, a client necessary information for key negotiation.
to maintain good security. can authenticate itself with as many access
points as possible, regardless of whether it System solutions
PMK (pre-master key) caching will connect with them later on. However, The software used for access points, clients
The PMK Caching method also uses a full since a full IEEE 802.1X process is required for and WiFi controllers offers solutions for both
authentication via IEEE 802.1X. However, every authentication, this approach generates core challenges of fast roaming. On the one
the client and access points store/cache the a significant load on the authentication server. hand, comprehensive configuration options for
negotiated keys and can reuse them for quick Therefore, this Pre-Authentication method for scanning behavior facilitate efficient, optimal
access to their next connection. Nevertheless, fast roaming has limited applicability. roaming decisions. On the other hand, the
this method for fast roaming can only be used mechanisms for fast roaming in combination
to a limited extent, since a client would have Opportunistic key caching with IEEE 802.1X authentication, such as Pre
to log in to all access points in the system The utilization of Opportunistic Key Caching Authentication, Opportunistic Key Caching,
for the roaming processes to use the stored (OKC) can provide fast roaming without and IEEE 802.11r are supported as well.
key information for a fast connection later on. generating a heavy load on the IEEE 802.1X
authentication server. The central approach of Reliability and security
Pre-authentication this method is the managing of key information Both train-to-ground communication and AGV
The Pre-Authentication method enables the for all access points by a Wi-Fi controller. applications need reliable communication
client to authenticate via IEEE 802.1X to The Wi-Fi controller can distribute the between fast moving participants and the
the next access point via the wired backhaul authentication information to all Wi-Fi access stationary infrastructure. Based on the high
network, independent from the actual roaming points under its control. Therefore, a client mobility and the specific requirements for
procedure. This way, the client does not must no longer negotiate its own Pre-Master the data throughput with very low packet
communicate directly with the access point via Key for every access point but is able to use loss, optimal fast roaming with the highest
Wi-Fi but uses its currently active connection the same Pre-Master Key for all access points WiFi network security is needed. Only with
with the wired LAN in order to connect to the managed by the single Wi-Fi controller. The optimization of the roaming behavior, and
next access point. Pre-Master Key will be negotiated during with the very short interruptions associated
During this early authentication process, the first IEEE 802.1X authentication. Thus, a with it, can the target of low packet loss for
the Master Key is already negotiated between client must only complete a single IEEE 802.1X these mobile applications be achieved.
the client and the access point, which authentication to any access point in order to
means that, when roaming at a later point, connect to all access points of the network. Dr. Tobias Heer, Technology & Innovations
the connection to this access point is made For this reason, fast roaming times of 50 ms and Dr. Bernhard Wiegel - Embedded Software
without authentication. are possible through the use of OKC, despite Development, Hirschmann Automation and
Although this method makes fast roaming the use of the full security of IEEE 802.1X. Control.

44 in d u s t r ial et h er ne t b o o k 11.2017
Wireless access points simple to use and configure. Industrial ADSL/VDSL2 router

Product News
The new device can provide IP-based
networking across sprawling industrial
environments and includes built-in I/O capability
for digital and analog inputs and outputs. The
modem can be easily configured for use globally
via a built-in webserver.
The unit provides robust and secure two-way
wireless communications for challenging indoor
and outdoor industrial environments. An internal
radio transceiver is designed to operate reliably
even in applications with obstructed pathways,
using Weidmullers ProMesh redundancy
Siemens: Additions have been made to the protocol. ProMesh networking provides mesh
companys portfolio of network components with node remote units the ability to automatically
the new Scalance W1788 Access Points, designed detect available connectivity options and make
to facilitate implementation of the current WLAN decisions based on link quality. It also offers the
Standard IEEE 802.11ac Wave 2 in industrial ability to set fixed links, providing a high level of
applications. Users will benefit from investment connection reliability and redundancy.
protection for industrial networks, future-proof Westermo: An industrial ADSL and VDSL2
wireless applications and projects in industrial IIoT gateway starter kit router/modem provides robust and secure
environments. communications to remote industrial
The standard will enable wireless applications automation equipment. The BRD-355 uses
with high bandwidths to be implemented at the Internet to cost-effectively inter-connect
gigabit data rates, for instance, to transmit systems, allowing SCADA, HMI, PLCs and sensors
video data or where a high user density is to communicate with each other. By providing
involved. The integrated switch features two remote access to equipment, the BRD-355 helps
managed Ethernet gigabit ports offering wide- to remove boundaries, eliminates the need for
ranging networking possibilities such as link time-consuming site visits and creates a suitable
aggregation.The industrial feature (iFeature) network infrastructure.
iPRP (Industrial Parallel Redundancy Protocol) The BRD-355 has been designed to support
ensures reliable redundancy via WLAN even in leased line replacement, analogue/dial-up
tough ambient conditions. modem replacement, operating broadband over
Scalance W1788 uses MU-MIMO (Multiuser ISDN and providing broadband for utilities. The
Multiple Input Multiple Output) technology to Moxa: To serve the needs of system integrators BRD-355 provides a fixed broadband connection
structure data flows and achieve higher data and engineers developing applications for the via ADSL or VDSL. Recent broadband protocol
transmission rates. Industrial Internet of Things (IIoT), a new IIoT technology changes by telecommunication
Gateway Starter Kit includes built-in support carriers has forced the industrial communications
Wi-Fi gateway modem for Amazon Web Services (AWS). This data- industry to adapt their solutions. The unit
acquisition-ready kit provides a ready-to-use supports most ADSL/VDSL2 communication
platform that simplifies development of IIoT standards including ADSL Annex J and VDSL2
solutions by providing all the essentials needed Vectoring. VDSL2 Vectoring enables data rates
to get data from edge devices to cloud services, to be doubled, helping users to achieve up to
with little to no programming required. This 100Mbit/s over copper cables. This is particularly
results in faster development, integration, and useful when fibre infrastructure is unavailable.
time to market, giving system integrators the
boost they need. NC integrated controller
The main component of the starter kit is
the ThingsPro Gateway, a ready-to-run data-
acquisition software platform that simplifies
the complex task of transferring edge data to
the cloud.
To simplify getting data, ThingsPro Gateway
provides a Modbus framework to easily connect
with Modbus RTU/TCP devices and SCADA
Weidmuller: The WI-I/O-2-E-N-GBL wireless systems. It also includes extensive network OMRON: The NC Integrated Controller provides
networking I/O and Wi-Fi gateway accommodates support for 4G connectivity, wireless failover, G-Code functionality and numerical control
multiple I/O nodes and extends communications firewalls, and VPN to ensure that data can be functionality, enabling high-precision complex
to sensors and actuators in local, remote or easily and securely retrieved from remote field profiling and increasing the production capacity
difficult to reach locations. sites. of processing machines.
The gateway offers reliable and robust wireless To get data into the cloud, it has built-in client With changes and advancement of
technology with multiple benefits for industrial support for services such as AWS IoT and Cirrus technologies, products with more diverse
applications, including a simple web-based Link Sparkplug. By integrating the AWS IoT and complicated shapes and materials are
user interface, and a standards-based wireless Device SDK, ThingsPro Gateway lets a user set now increasing while product lifecycles are
protocol with a networking topology that is up tags and devices on AWS IoT. becoming shorter. Along with these changes,

1 1. 2017 i n d u str i a l e th e r n e t b o o k 45
manufacturing sites are facing challenges of conditions. The LNP-C500G series provides
Product News

achieving more difficult processing at higher a 48~55VDC redundant power input with
productivity rates. power polarity reverse and overload current
The NC Integrated controller provides both protections. These switches also have high
NC and PLC functionality and synchronizes NC electrical fast transient (EFT), surge protection
processes and others at high speed. This will help (2,000 VDC), and electrostatic discharge (ESD)
significantly increase the production capacity (6,000 VDC) protection to prevent against any
of the entire machine. NC setting and G-Code unregulated voltage. It can be mounted on
programming are added to the Sysmac Studio Din-rail and wall mountable orientations.
which provides a true Integrated Development
Environment (IDE) for configuration, Condition monitoring for mobile
programming, monitoring, and 3D simulations.
Function Blocks for NC make program structure
simple, even for synchronization between NC
process and others, cutting development time. The MEG5000 is flexible, easy to configure
and manage. It features three scalable cards
Unmanaged 8-port Gigabit switches that support a variety of interfaces to meet
the changing demands of applications in the
industrial Industrial Internet of Thing (IIoT).
Thanks to quick deployment and simple
customization the gateway can be tailored to
virtually any industrial requirement.
Through edge computing, the MEG5000 B&R: The modular X90 control and I/O system
gateway is able to process data right at the can now be equipped with condition monitoring
network edge and in real time. It can therefore functions. Problems can be detected in their
collect, analyze and act on data more efficiently, early stages and corrected before they result
and it supports data optimization which is vital in unplanned downtime. Condition-based
in the IIoT. predictive maintenance can maximize machine
When transferring large amounts of data to availability and save the cost of outages and
the cloud over limited bandwidth, latency might unplanned service calls.
occur. MEG5000 supports up to 1300 Mbps Wi-Fi The X90 module allows operators to
speed ensuring that its edge computing power continuously monitor the status of mobile
WAGO: Two new industrial unmanaged 8 port helps to reduce data uploads by acting like a equipment. The results help determine exactly
gigabit switches have been added to its growing local, edge-based cloud service tool. which components require maintenance and
switch portfolio. when. Typical applications include continuous
Each of the RJ-45 ports support Unmanaged Gigabit PoE+ switches monitoring of rotating machine components
10/100/1000Mbps speeds with auto- such as hydraulic assemblies, belts, gears
negotiation and auto-MDI-/MDX detection. and motors. The processed sensor data is also
Housed in compact enclosures of 50 mm, these available for further use in the application.
devices reduce the footprint of the control
cabinet. They each have an operating voltage Protocol gateway devices
of 9 to 57 VDC and two LEDs per port for flexible
and easy-to-use operations. The 852-1112
style industrial switch is DIN rail mounted and
is powered with 24VDC.The 852-1102 industrial
switch offers dual power feeds for redundant
power capabilities as well as operations over
a wide voltage range and a monitoring alarm
relay. Differentiators between the two are as
follows:
The 852-1112 ECO switch provides the Antaira Technologies: The LNP-C500G
following feature set: single power supply series is a five-port industrial gigabit PoE+
connections and operating temperatures from unmanaged Ethernet switch embedded with
-32to 140F. 4*10/100/1000Tx PoE+ (30W/Port) ports and
The 852-1102 standard switch offers: 1*10/100/1000Tx RJ45 port. The small form
redundant power supply connections, and alarm factor of this metal casing switch is 50% smaller
relay, and operating temperature from -40to than the LNP-0500G series which allows for
158F. Both switches are offered at competitive more versatile implementations. Advantech: The company has extended
prices, allowing for flexibility in deciding which It is designed to fulfill industrial applications its protocol gateway product line with the
works best for a given application. that have small space requirements and need introduction of two new EKI-1221IEIMB &
high bandwidth capabilities such as security, EKI-1221PNMB Protocol Gateway Series for
Industrial IoT edge gateway ITS transportation, power/utility, and water protocol conversion.
Robustel: Modular industrial IoT edge gateways wastewater treatment plants. This series also These new protocol gateway devices support
support various communication protocols to works well in any other outdoor application protocol conversion from Modbus TCP to
facilitate fast application development. that is susceptible to extreme ambient weather EtherNet/IP, and Modbus TCP to PROFINET.

46 in d u s t r ial et h er ne t b o o k 11.2017
They provide a cost-effective solution and own power supplies and are easily configured to connect unattended retail terminals and

Product
Industry News
enable seamless connection between different and commanded through the PLCs existing remote devices in third-party locations. It
devices with different protocols, and also software, eliminating the need for a separate is also applicable for systems migrating to
provide a high level of device management plug-in card controller. LTE technology needing to connect to legacy
efficiency. The embedded Ethernet switch in the devices. In an effort to future-proof applications
The EKI-1221IEIMB and EKI-1221PNMB are networked drives provide a network connection and protect investments, SmartStart provides
designed for reliable protocol extensibility and for additional devices and eliminates the need fallback to 3G/2G technologies to ensure that
seamless integration with existing network for an external Ethernet switch. DLR topology connectivity is reliable in areas where LTE is still
devices. They offer a solution for efficiently provides a fault tolerant connection that can under development.
converting data from legacy devices and detect a break in the network and redirect the The SmartStart LTE router stands out in the
reduce the possibility of costly software network traffic, maintaining communication market when compared to similar LTE routers.
programming errors. and system up-time. While other M2M devices are hindered by
With the addition of these protocol gateway carrier-specific support limitations, such as
devices into existing network infrastructures, IP65 Gigabit switches only Verizon, only AT&T or only EMEA. Similarly,
customers can build a seamless data path SmartStart solves issues concerning LTE Cat 4
between otherwise incompatible network radio overkill, fixed power input, nonexistent
devices and extend their useful life. I/O, nonexistent Wi-Fi, annual software licenses
and more.
ONF Certified OpenFlow switch
Industrial edge appliance

Lanner: The company is partnering with


Brain4Net, a SDN/NFV solution vendor and
ONF member, to launch ONF-certified network Kyland Technology: A total of six managed
appliances, optimized by the B4N SwitchOS. IP65 switches, specifically designed for train
The network appliances in this collaboration networks, can also be deployed in other
have successfully completed the certification applications in harsh environmental conditions.
process under OpenFlow Conformance Testing Since the devices of the 86xx series support
Program at the University of New Hampshire routing, both subnets can be formed and
InterOperability Laboratory (UNH-IOL), and coupled with each other.
received the OpenFlow Version 1.3.4 Switch The switches have four Gigabit uplinks
Conformance Test Report. Lanners participating (10/100/1000 BASE-TX) and eight, 16 or
x86-based appliances FW-8894 and NCA-5510, 24 Fast Ethernet ports (10/100 BASE-TX)
along with B4N SwitchOS have become the first with M12 technology. Terminal devices can
OpenFlow switches that have passed extensive be powered with PoE/PoE + via data lines. Opto 22: The enhanced groov industrial edge
rounds of testing and are able to guarantee Different redundancy protocols and security appliance now offers OPC-UA drivers for Allen-
the highest level of product conformance mechanisms ensure high-availability and Bradley and Siemens PLCs, along with support
with OpenFlow specifications as well as the secure data communication. A passive bypass for MQTT protocol communications.
ecosystem-readiness deployment. function guarantees that networks remain Added to the groov View software for web
functional even at multiple points of failure. and mobile visualization and the open-source
Ethernet-based controller/drives Further features of the switches, which can be Node-RED development environment, the new
put into operation according to the plug-and- release offers engineers, technicians, and
play principle, include high shock and vibration developers a comprehensive set of tools for
resistance, almost complete insensitivity to edge deployment in industrial environments.
electromagnetic interference and a temperature These new embedded capabilities are made
range of -40 to + 70 C. possible through forging close partnerships
The switches provide industrial approvals with technology providers Inductive
such as EN 50155 and EN 45545, and have a Automation and Cirrus Link Solutions, and are
metal housing intended for wall mounting. part of the Ignition Edge Onboard program.

Advanced Micro Controls: An embedded switch SmartStart LTE industrial router Smart HART temperature transmitter
has been added to its line of Ethernet-based Moore Industries: A new member of its
integrated stepper controller/drives. It has Associated Intrinsically-Safe (AIS) family of
been designed to integrate with Allen Bradley products has been enhanced with the release
PLCs using the Common Industrial Protocol (CIP) of the THZ3 compact Dual Input Smart HART
for communication, control and data gathering. Temperature Transmitter in DIN Rail Mount
The embedded switch, added to the companys B+B SmartWorx: The SmartStart, industrial- housing with Associated IS sensor connections.
EtherNet/IP integrated stepper drives, offers grade Wi-Fi-capable LTE machine-to-machine The intrinsically-safe -AIS option allows direct
support for Device Level Ring (DLR) installations (M2M) router is both cost-effective, and carrier- connection of sensors located in hazardous
to provide a fault tolerant connection. AMCIs agile. areas since it includes an internal intrinsically-
powerful AC line powered stepper motor SmartStart addresses the growing flexibility safe barrier in the front end of the THZ3. The
controller/drives are self contained with their needs of service providers and OEMs struggling Universal mounting bracket easily snaps on

1 1. 2017 i n d u str i a l e th e r n e t b o o k 47
industrial computers provide modern variety of management systems installed
Product News

visualization and data aggregation for smart including climate control systems, lighting,
manufacturing. The computers use an open sensors of various types, building PA systems,
architecture design, allowing users to install and security systems. In the past, each of
software specific to their applications. these systems would have required their own
dedicated wiring. Recently, trends have shifted
Connectivity software for IIoT toward utilizing existing direct current (DC)
power lines in configurations where these
communication lines are shared with the power
system.

Fibre cables for Industrial Ethernet

and off of 35mm Top Hat DIN-rails and standard


relay tracks. The THZ3-DIN with the -AIS option
is an associated apparatus suitable for mounting RTI : Connext DDS software ensures edge to fog
in Non-Hazardous or Class I, Division 2/Zone 2 to cloud connectivity for secure and scalable
hazardous locations with sensor input terminals IIoT applications. Connext DDS 5.3 provides
connected to equipment or sensors located in connectivity software for building layered-
Class I, II, III, Division 1/Zone 0/1 hazardous databus architectures and IIoT systems.
locations. Installation costs are reduced if an Typical IIoT systems require sharing data
associated apparatus like the THZ3-DIN with across multiple networks, from the edge to the
-AIS option is used, since the intrinsically-safe fog to the cloud. For example, in a connected HARTING: Fiber optic solutions are addressing
barrier is embedded in the receiving device. hospital, devices have to communicate within extremely tough environments. One new
a patient or operating room, to nurses stations solution for high data rates under extreme
Scalable computing for IoT data and off-site monitors, to real-time analytics conditions is an expanded beam cable assembly.
applications for smart alarming and clinical As a result, HD-TV is no longer a problem on
decision support, and with IT health records. machines and systems because the fibre is
This is challenging for several reasons. packed in a connector that cannot be affected by
Built on the Object Management Group (OMG) dust, water or operation in harsh environments
Data Distribution Service (DDS) standard, environments.
Connext DDS 5.3 introduces support for the Also, regular dis-connection and
recently finalized DDS Security standard. As a re-connection of cabling in these environments
result, devices and applications developed with is less problematic compared to standard fiber
Connext DDS 5.3 will interoperate with those optic cabling. Even extending the length of the
that take advantage of future Connext DDS optical connection is uncomplicated, and is as
versions. simple as connecting an additional cable, with
no need to pay attention to the laying direction.
Rockwell Automation: Three compute offerings Communication over power lines Thanks to the hermaphroditic mating face, an
at the device level help operators make additional adapter is not required. As a result,
faster, more informed decisions closer to the the customer saves time and money, and also
source of information. Each offering allows the risk of having a mating face other than
users to run applications in a Windows 10 IoT needed at the end of the cable.
Enterprise environment to gain better insight
into machines and equipment. The variety of USB smart modules
platforms also gives users flexibility to meet
individual application needs.
The Allen-Bradley ControlLogix compute
module allows users to add Windows 10 IoT
directly into the Logix system in existing
applications and provides high-speed access Renesas Electronics: The new solution consists
to ControlLogix data across the backplane. As a of a PLC software modem (R9A06G037),
result, users can combine Windows applications which manages the PLC communications,
as close to the point of decision-making as and the RX651 microcontroller (MCU), which
possible. controls the audio codec processing. The new
The Allen-Bradley CompactLogix 5480 solution enables system manufacturers to Molex: Single port and dual port modules allow
controller combines Logix5000 control and enhance security systems by incorporating for fast charging in automotive and commercial
Windows-based computing in one controller. voice capabilities to an existing installation at vehicles.
The controller supports Windows applications, low cost. For a new installation that includes The USB Smart Charge Modules are available
such as data collection, analytics and predictive various sensors as well as voice communication, in both single port and dual port models.
computations. It is designed for meeting the wiring costs can be reduced by approximately Outside of the number of ports, the two
demands of high-performance production lines 60 percent while installation and maintenance models are nearly identical. Each features
and information-driven smart machines. costs can be reduced up to 40 percent. over-voltage, over-current and short-circuit
Third, the Allen-Bradley VersaView 5000 Facilities such as office buildings have a protection for safety. Both models also are

48 in d u s t r ial et h er ne t b o o k 11.2017
equipped with a 2.4A output current, a battery systems from anywhere, at any time. The L1/

Product News
operating voltage of 9 to 16V, and can operate C1 automation panels in conjunction with the
at temperatures ranging from -40 to 85C. WebVisu software offer a versatile platform for
Additionally, each have an automotive-grade web-based graphical user interfaces.
USB and are compliant to Apple MFI. The web panels use the panels of the L1/C1
device series as a hardware platform. The over
Support for Precision Time Protocol 10 different front units from 7" to 21.5" in 16:9
or 4:3 display format, which are available with
resistive singletouch or glass front with PCAP
multitouch, can be combined with different
system units. Variants with powerful 32-bit ARM
Cortex-A9 Multicore CPU, Intel Celeron or Core-i
CPUs are available. If required, front unit and
PC can also be operated separately from each (available for Europe and North America), Wi-Fi,
other via a single, up to 100 meter long cable for Bluetooth Low Energy, and two Fast Ethernet
video, touch screen and power supply. ports; other interfaces are two protected
Linux, web browser and Java-VM are the basis RS-232/485 serial ports, two CAN bus, two
for the use of the L1/C1 automation panels noise and surge protected USB ports, and four
as a web panel. Web browser and Java-VM isolated digital I/O.
support HTML5/CSS and are optimized for ReliaGATE 10-12 is a low power (2W typical)
communication with web visualizations such as gateway with a wide range power supply (9 to
Kithara Software: Support for the Precision Time CODESYS Web Visualization, ProconWeb, B & R 36VDC) and a wide operating temperature range
Protocol (IEEE 1588 v2) allows for the precise mapp View, TwinCAT PLC HMI Web, WinCC/Web (-20 to +70C) making it particularly suitable for
synchronization of network participants with Navigator etc. Thanks to an integrated tool with demanding applications.
Kithara RealTime Suite. PTP can be used for graphical user interface, L1/C1 web panels can The gateway comes with the genuine Oracle
image data alignment of cameras, determination be easily and intuitively configured. Java SE Embedded 8 Virtual Machine and
of exact measurement data or the execution of the Everyware Software Framework (ESF),
parallel robotic tasks. Layer 3 Ethernet backbone family a commercial, enterprise-ready edition of
With the PTP stack, accurate timestamps Eclipse Kura, the open source Java/OSGi edge
can be generated with deviations in the computing platform and middleware for IoT
sub-microsecond range for synchronization gateways.
of PCs. With a connection to GPS, computers
can be synchronized on a global scale. To run Remote connectivity HMI
the synchronization, the best master clock
algorithm (BMCA) can be utilized, which
will determine the participant with the most
accurate system clock within a network and set it
as reference for the other participants. With the
PTP stack, raw Ethernet as well as IP/UDP can Belden: To meet the need for increased network
be used as transport layer. For high-precision bandwidth and flexible future-oriented
timestamping, a variety of PTP-compatible solutions Hirschmann has designed a next
network controllers are supported. The priorities generation Layer 3 Ethernet backbone product
can be adjusted with the API. family: DRAGON MACH4000/4500.
Available in two major open variants, they Mitsubishi: The GT25 Wide HMI features remote
Single & multitouch web panels offer a maximum of 80 x 1Gb/s modular ports connectivity through the company's GOT Mobile
and 8 x 10G fixed ports. The DRAGON MACH4000 option.
family supports redundant internal power GOT Mobile provides remote access via web
supplies to increase device availability, and server functionality for production monitoring
low-cost future expansion is easy thanks to and system operation. It is designed to monitor
spare slots for a total of 48 additional ports in controllers using web browsers on devices such
copper or fiber. as tablets, phones and personal computers,
allowing machine operators, plant managers
IoT gateway portfolio and maintenance personnel to remotely monitor
Eurotech: A new ReliaGATE 10-12 gateway with and verify equipment status at any time from
integrated LTE connectivity has been announced anywhere.
including two expansion modules for extended The GT25 Wide HMI is equipped with two
I/O capabilities and LoRa LPWAN connectivity. Ethernet ports to physically separate the
The expanded IoT offering features LTE information system network in the office from
connectivity for industrial and lightly rugged the control system network at the production
applications. site, creating safer and more secure network
ReliaGATE 10-12 is based on the TI AM3352 architecture.
CANNON-Automata: Web panels are becoming Cortex-A8 (Sitara) processor running at 1GHz, This high performance HMI also features a
more and more important in the context of with 1GB of RAM, 4GB of eMMC and a user- built-in sound output interface, which provides
Industrie 4.0. Web-based visualizations provide accessible microSD slot. It provides a wide range audio feedback, notifications and verbal
access to the user interface of machines and of connectivity capabilities, including LTE Cat 1 instructions to operators.

1 1. 2017 i n d u str i a l e th e r n e t b o o k 49
Harald Bltand, king of
Private Ethernet

Denmark, Norway and Wireless


Harald was the the son of King Gorm the Old and of Thyra Dannebod, and became king of Denmark in the
year 958. He introduced Christianity to Denmark and consolidated his rule over Jutland and Zealand. He
might be largely forgotten today, had he not had a bad tooth that appeared blue.

THIS BAD TOOTH LED TO King Haralds nickname


Bltand, which means Bluetooth. In 1941,
Swedish writer Frans Bengtsson included king
Bluetooth in his historical adventure novel
The long ships.
46 years later, a copy of this book landed
on the desk of Jim Kardach. He was a design
engineer at Intel, working on a short-link
radio technology. He proposed the name
Bluetooth for this new technology, as he
hoped that it would unite the different
communication protocols into one universal
standard, just like king Harald had united the
Scandinavian countries.

Hagalaz und Berkanan


This nordic origin is still present in the
Bluetooth logo, which combines the old runic
symbols Hagalaz und Berkanan.

The runic symbols Hagalaz and Berkanan form


the Bluetooth logo.

While the vikings conquered Scandinavia,


Bluetooth went on to conquer the whole
world. Today, the Bluetooth Special Interest
Group (SIG) has more than 30,000 members,
and experts assume that there is an installed PHOTO: WIKIMEDIA

base of nearly 10 billion Bluetooth-enabled


devices worldwide.

It started with headphones The proud longships of king Harald and his Vikings
The development of a short-link wireless
standard was initiated at Ericsson Mobile, defined as one transmission slot. The master Lamarr, who had fled from Nazi Germany, and
mainly to develop wireless headsets. The transmits in even slots and receives in odd composer George Antheil. They developed this
engineers opted for short-wavelength UHF slots, for the slaves it works the other way method to make US forces radio communica-
radio waves in the globally unlicensed 2.4 to around. tions harder for enemies to detect or to jam.
2.485 GHz industrial, scientific and medical To ensure a reliable connection, Bluetooth Bluetooth divides transmitted data into
(ISM) band. uses frequency-hopping spread spectrum packets, and transmits each packet on one
Bluetooth is a packet-based protocol with a (FHSS), rapidly switching the carrier frequency of 79 designated Bluetooth channels. Each of
master/slave architecture, where one master channels in a sequence that is known to both these channel has a bandwidth of 1 MHz, and
may communicate with up to seven slaves. The transmitter and receiver. The inventors of Bluetooth hops between these frequencies 800
master defines the basic clock, with 625 s this technology are the Austrian actress Hedy times per second.

50 in d u s t r ial et h er ne t b o o k 11.2017

IEB103_p50.indd 50 10.11.1745 15:21


Bluejay When another TrackR user is within Bluetooth

Private Ethernet
After Sara Du got lost in the mountains, she range of the lost item, the owner will receive
developed the concept of Bluejay, a combina- a location update. Also, the app records the
tion of software and hardware that is able to last known location on a map, so at least you
find missing people. Bluejay is a drone that know where to start searching.
uses an onboard Intel Edison computer and
Bluetooth technology to communicate with Novalia
both people in need of rescuing and rescuers. The Novalia project brings touch-based inter-
While cellular service may fail in such activity to virtually any printed material.
situations, Bluetooth would still function, so Paper thin self adhesive touch sensors from
the drone could communicate with cell phones printed conductive ink are combined with a
and facilitate rescues. microcontroller module that handles processing
and Bluetooth communications. Touching the
sensors controls apps on a smart phone or
laptop. A single CR2016 coin cell powers the
system for up to one year.
Using this technology, Novalia created what
PHOTO: WIKIMEDIA

the world had been waiting for a long time:


The first playable pizza box DJ decks. The Pizza
Hut boxes come in a design modelled on a
modern DJ set-up. They feature two turntables,
Hedy Lamarr, contemplating frequency-hopping
a cross-fader, pitch volumes, cue buttons and
spread spectrum technology the ability to rewind the music. The decks
sync via Bluetooth to the users smartphone
Originally, Gaussian frequency-shift keying with DJ software such as Algoriddims DJAY Pro.
(GFSK) modulation was used, which limited The sound is produced from the smartphone
the bandwidth to 1 Mbit/s. The introduction or computer, which can be linked to external
of Bluetooth 2.0 in 2004 allowed the use of speakers.

PHOTO: SARA DU
differential quadrature phase shift keying, The DJ decks work by sensing human touch
increasing the bandwidth to 3 Mbit/s. through conductive ink and can differentiate
between taps, long presses and even swipes of
Different flavours the finger in any direction. This allows music
With ongoing development, Bluetooth today TrackR and pizza fans to mix and scratch their own DJ
comes in three different flavours. While we may not get lost at home, our car sets by tapping and sliding their fingers over
Classic Bluetooth, in Basic Rate or Enhanced keys sometimes do. Thats where TrackR comes the controls.
Data Rate, is still the dominant cable replace- in. It creates a virtual floor plan of a users Its really a shame that this was only a
ment technology. It is what we all use for home and helps track frequently misplaced one-off promotion and limited to just a few of
wireless keyboards, mice, speakers and items. After attaching the coin-sized TrackR the Pizza Hut restaurants.
headsets. bravo to keys, wallet or phone, the TrackR app Let us know if there is interest in a DJ-enabled
Bluetooth Low Energy (LE), introduced in can locate it in seconds. edition of Industrial Ethernet Book magazine.
2010, is optimised to use as little energy One smart feature is that the app even helps
as possible. Powered by only a coin-sized you find items that you misplaced outside Leopold Ploner
battery, it can often last for years. Almost your home through a crowd-sourced network.
every smartphone or tablet today supports
Bluetooth LE.
The latest addition is Bluetooth mesh, which
was launched this summer. It is intended to
make the technology better suited for IoT
applications. Classic Bluetooth is a star-
topology in which all devices are connected to
a central hub, which limits the network range
to the furthest connected device. In the mesh
network, all devices communicate with each
other, which makes the area covered by the
network almost unlimited.

Beyond wireless speakers


So what can Bluetooth do beyond connecting
speakers or keyboards to our tablets and PCs?
To find this out, the Bluetooth SIG organizes
the annual Imagine Blue Awards. Designers
develop solutions that push the boundaries of
PHOTO: PIZZA HUT

wireless connectivity. Here are some creative


projects from the Imagine Blue competition.

i n d u s tr i a l e th e r n e t b o o k 11. 2017 51

IEB103_p50.indd 51 10.11.1745 15:21


IEB103_p52.indd 52 08.11.1745 12:27

You might also like