The promise of innovation is beneficial to customers and suppliers alike. And innovation is spilling over in the business environment that is cultivating and nurturing the Industrial Internet of Things (IIoT). The more enticing IIoT business outcomes include smart devices, smart machines and smart manufacturing, in which information technology (IT) and operations technology (OT) are able to leverage the intelligence that results from these evolutionary improvements.
āRight now, there are differences between OT and IT network infrastructures,ā warned Gregory Wilcox, global technology & business development manager, Rockwell Automation, who spoke at the 2017 ODVA Industry Conference in Palm Harbor, Florida. āBut, over time, youāll see more similarities and fewer differences.ā
Standard network technology and security services still differ considerably between IT and OT. Network services for ITāsimple network management protocol (SNMP) and low-latency data transfer (LLDT)āare pretty consistent. āIf you look at the OT side, standards like SNMP or LLDT are sporadically or inconsistently deployed,ā said Wilcox. āIn the IT world, security is pervasive. Their focus is the confidentiality piece. In our world, itās about productivity. EtherNet/IP is open by default.ā
ALSO READ: 12 steps to Li-Fi implementation
For those looking to create cloud gateways, there are many companies around the world that still have islands of automation. āThe technology of choice is cellular,ā said Wilcox. āYou see that more and more around the world. Some companies have a fully blended IT and OT network. Or thereās connectivity by data diodesāone-way communication from the OT network up to the enterprise. Industrial demilitarized zones for industrial control are network-secure practices.ā
Best practices for an industrial control system address key requirements for network infrastructure that includes scalability, reliability, safety, security and future-readiness. An application may be in place for decades.
The architecture can be used to create smaller connected LANs, which restore natural boundaries. The architecture should include key tenets such as smart endpoints, segmentation/zoning, managed infrastructure, resiliency, time-critical data, wireless mobility, holistic defense-in-depth security and convergence-ready solutions.
āWe organize levels into functional zones,ā said Wilcox. āLevel 0 includes actuators, sensors, drives and robots. Level 1 is controllers, and Lever 2 is area supervisory control. Level 3 represents the highest level of the industrial automation and control system. The systems and applications that exist at this level manage plantwide functions. Levels 0 through 3 are considered critical to site operations and control. Levels 4 and 5 are data centers and enterprise networks.ā
Zoning is based on the application environment. āIn this concept of zoning, CIP security comes in,ā explained Wilcox. āIām creating smaller, Level 2 domains. Itās a great way to segment my domains into smaller levels of trust.ā It also eliminates collisions if you have different vendor technologies.
āOne size does not fit all,ā warned Wilcox. āWhatās sufficient for one customer may be insufficient for another. What are the application requirements? It comes down to the topologiesāswitch-level topologies, such as redundant star, ring and star/bus linear; and device-level topologies.ā
Network address translation (NAT) enables controls engineers to reuse Internet protocol (IP) addresses and build system applications to integrate into a plantwide architecture, which requires unique IP addressing. NAT can be configured to translate only specific IP addresses from inside the application to the architecture, which also hides the inside IP addressing schema.
āOEMs like to clone their IP addressing,ā said Wilcox. āNetwork address translation enables the reuse of IP addressing without introducing a duplicate IP address error. What do they have to do to make sure their solution is ready to be integrated? We recommend early and open dialogue on the OT and IT side.ā
As deployment of wireless solutions continues to grow, equipment may roam across the industrial zone and associate to multiple access points. āThere are lots of great use cases for wirelessāstatic machines with moving parts; skids that are nomadic; continuous roaming capabilities such as AGVs; workforce mobility devices like tablets and smart phones,ā said Wilcox. āWe thought wired was the IT-OT battleground, but that was nothing compared to wireless. You have to worry about frequency spectrums.ā
No single product, technology or methodology can fully secure control-system applications. āIt requires multiple layers,ā explained Wilcox. āWho are the characters? Controls engineers? IT personnel? How do I make sure I have tools in place to support the framework? I can do things physically for port security. There are things I can do electronically to disable a port.ā
Mike Bacidore is the editor in chief forĀ Control DesignĀ magazine. He is an award-winning columnist, earning a Gold Regional Award and a Silver National Award from the American Society of Business Publication Editors. Email him atĀ [email protected].