Considerations for Hybrid Communications Network Technology for Pipeline Monitoring



Similar documents
WIRELESS REMOTE MONITORING OF CATHODIC PROTECTION SYSTEMS. John Hawkyard MICorr Deputy General Manager Rawabi Corrosion Technology Co Ltd Al-Khobar

Telecom CPE Management Overview

Wireless Technologies for Wind Turbine Vibration Monitoring

Improving SCADA Operations Using Wireless Instrumentation

WHITE PAPER. 4G: The Distributed Intelligence Revolution

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005

SCADA Systems. Make the most of your energy. March 2012 / White paper. by Schneider Electric Telemetry & Remote SCADA Solutions

Section 2: Overview of Wireless Broadband Networks

The data can be transmitted through a variety of different communications platforms such as:

Business Continuity White Paper

Deploying Firewalls Throughout Your Organization

IBM Global Small and Medium Business. Keep Your IT Infrastructure and Assets Secure

future data and infrastructure

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

How To Build A Network For Mining

Managing business risk

Network Intrusion Prevention Systems Justification and ROI

Southern Utah Water SCADA Project and Dispelling Myths regarding 900MHz Spread Spectrum Technology:

Industrial Defender, Inc.: Recipient of the 2008 Global Risk Management Process Control & SCADA Company of the Year Award

Using Cellular RTU Technology for Remote Monitoring and Control in Pipeline and Well Applications

Preemptive security solutions for healthcare

SCADA Security: Challenges and Solutions

Information Technology Security Review April 16, 2012

Optimizing Energy Operations with Machine-to-Machine Communications

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

Real Time Remote Monitoring over Cellular Networks. Wayne Chen Marketing Specialist

Cloud Computing for SCADA

ACE3600 HIGH PERFORMANCE MONITORING & CONTROL REMOTE TERMINAL UNIT

Uninterrupted Internet:

Understanding SCADA System Security Vulnerabilities

White Paper. April Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks

esoft Technical White Paper: Who Needs Firewall Protection?

Five keys to a more secure data environment

The Advantages of a Wireless Water Utility Network

How To Secure A Wireless Utility Network

Cisco Mobile Network Solutions for Commercial Transit Agencies

Managed Services. Business Intelligence Solutions

The digital future for energy and utilities.

Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions

Cyber Security for SCADA/ICS Networks

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Leveraging the Industrial Internet of Things (IOT) to Optimize Renewable Energy

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Security Alarm Systems

Wireless solutions for water and wastewater management

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Common security headaches. Common security headaches and how to avoid them. PineApp.com

Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks

Managing IT Security with Penetration Testing

How To Test For Security On A Network Without Being Hacked

Environmental Monitoring: Guide to Selecting Wireless Communication Solutions

Why a Server Infrastructure Refresh Now and Why Dell?

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Wireless Local Area Network Deployment and Security Practices

Exam Name: Cisco Sales Associate Exam Exam Type: Cisco Exam Code: Doc Type: Q & A with Explanations Total Questions: 50

Motorola AirDefense Network Assurance Solution. Improve WLAN reliability and reduce management cost

The Information Assurance Process: Charting a Path Towards Compliance

How Secure is Your SCADA System?

Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking

QUICK REFERENCE GUIDE MOBILE HUMAN MACHINE INTERFACE (HMI): INNOVATION THAT EMPOWERS THE MOBILE OPERATOR

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Wireless Networking for Small Businesses, Branches and Home Offices

Trust Digital Best Practices

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Cyber Risk to Help Shape Industry Trends in 2014

MULTI - PHASED, STRATEGIC APPROACH ENHANCES COMMUNICATIONS

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk

Truffle Broadband Bonding Network Appliance

ENTELEC 2000 SCADA Outsourcing A Business Case Abstract. By Gerald E. Snow UTSI International Corporation

Advantages of Managed Security Services

Using HART with asset management systems

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

QUICK GUIDE. How to Select an Effective Mobile Workforce Management Solution. How to Select an Effective Mobile Workforce Management Solution

Sygate Secure Enterprise and Alcatel

Fusing Vulnerability Data and Actionable User Intelligence

CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS

How To Manage Risk On A Scada System

Cisco Security Optimization Service

Cyber Threats in Physical Security Understanding and Mitigating the Risk

THE INDUSTRIAL INTERNET OF THINGS NEXT GENERATION TECHNOLOGY ENHANCING PRODUCTIVITY AND SAFETY

Meeting Today s Customer Needs with Internet Banking

Utility of the Future Virtual Event Series Monthly Virtual Studio Event Series for Utilities

Wireless Network Analysis. Complete Network Monitoring and Analysis for a/b/g/n

OPCNet Broker TM for Industrial Network Security and Connectivity

Cybersecurity Converged Resilience :

Totally Wireless Video Security

Network Security and the Small Business

Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives.

Board Portal Security: How to keep one step ahead in an ever-evolving game

Securely Access and Manage Firewall- Protected Equipment From Anywhere

Network Security Landscape

WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION

Transcription:

Considerations for Hybrid Communications Network Technology for Pipeline Monitoring Craig Held White Paper April 2012

Abstract The concept of automation (and its corresponding technologies) is a primary driver of competitiveness for all types of organizations, but, increasingly it is critical for energy and pipeline companies looking to improve upon their pipeline monitoring efforts. Energy pipeline companies have faced countless regulatory compliance issues, especially due to recurring accidents and events that have made front page news. This has elevated concerns to the extent that government entities across the world continue to produce legislation directed specifically toward improving safety standards in regards to corrosion and cathodic protection (CP) practices. In an industry saturated with many pipeline monitoring solutions, it is critical for operators to understand which technologies are best suited for their pipeline infrastructure and its impact on their CP efforts. Sometimes, it makes the most sense to take a hybrid approach and leverage several solutions for a company s asset monitoring needs. For the purposes of examining a hybrid network approach in this paper, pipeline corrosion and CP remote monitoring applications will be considered, even though hybrid communication networks can be leveraged in numerous other industrial applications. Introduction Automating processes and key business functions enable organizations to improve operations and make procedures more streamlined, cost-effective, safer and robust. Obviously, the key building block to a costeffective, pipeline integrity, corrosion protection program is vital, timely monitoring and reporting of CP data. Historically this activity has been a manual event, but over the past decade or so, owners and operators have been looking to automate these processes and implement real-time monitoring of their critical pipeline assets. Reliable and efficient data communication technologies are key considerations under these circumstances. There are several data communication technologies available today to help automate key functions within an organization, including, cellular, satellite, licensed and spread spectrum wireless data radios, fiber and wire. Traditionally, companies with large geographically dispersed communication networks typically have selected one technology, one source, one vendor to collect, retrieve and report data to assess the health of their pipeline infrastructures. However, there is a new paradigm today in which organizations are breaking away from tradition and deploying multiple communication technologies to create a hybrid communications network that can better serve an organization s needs. Why is this important? Because now we have many different technologies available to us that we can utilize to: Drive maintenance/monthly costs down directly impacting the bottom line Decrease polling cycle times and reducing the time needed to identify and remedy problems within the network Eliminate system pinch points or single points of failure Considerations for a Hybrid Network The days of building large, single technology communication networks are likely behind us. If you are collecting data from multiple locations and delivering it to offices over a widespread area, no one technology will be able to accomplish all your objectives. However, by combining technologies, you can create a seamless data stream from several locations and share data over a Local Area Network (LAN) or Wide Area Network (WAN) with multiple users. The end result is more effective and efficient management of the communications network and increased reliability through reduced downtime all at a much more affordable price. A relevant Company Confidential April 11, 2013 2

application to consider is cathodic protection monitoring systems that travel along oil and gas pipelines. For example, if an operator wants to automate rectifier management, they must drop a remote monitoring unit every 10 miles (at each rectifier location). Using a single source or technology for remote monitoring, for example cellular or satellite technology can be very costly given the large number of connection and data transfer fees charged. Instead, operators can deploy a relatively inexpensive technology, such as a wireless data communications along the pipeline path, reducing the number of cell or satellite modems used and thus reducing the fees that will be charged. A proprietary radio network combined with a cellular bridge capability can alleviate cost issues and provide a reliable and secure data communications network. Here is an example of how it could work: Operators looking to remotely monitor corrosion and rectifier locations would install a wireless data radio along the pipeline path to limit the number of cellular or satellite connection fees incurred. Along the pipeline and rectifier stations, this technology is proven to be one of the most cost-effective solutions on the market today. However, when running into a line of sight issue where a radio tower or repeater station might need to be installed, operators could instead turn to a different modality, such as cellular or satellite communications. Operators would want to install a cellular or satellite modem at a few specific access points (where line of sight would be lost along the pipeline) and as a result would spend much less on connection fees to get the data back to the host server at the WAN or LAN location. Questions to ask during network design that will help determine the need for a hybrid system: Is this link worth the monthly fees required by a cellular system? Can I afford the lower prioritization a non-proprietary system allocates to my data? Does the radio link require a tower infrastructure to maintain line of sight? Would an existing network be a better decision? If properly evaluated and combined, hybrid technologies can create an extremely effective and efficient management of a network, as well as increased reliability through reduced downtime. Here is an example of a hybrid network comparison: Company Confidential April 11, 2013 3

Other Considerations for Selecting Multiple Communication Technology Options: Data reliability, network security and other demands at various levels of a large communication network are also changing the game. For example, cathodic protection remote monitoring also requires the pipeline operators and companies to review issues, like network security, automation network expansion and the reliability of data retrieval/delivery when reviewing technology options for a hybrid network scenario. Security When considering various communications system solutions, it is critical to understand security threats and features before making a purchasing decision. With threats to our information infrastructure and data communication networks (including Supervisory Control and Data Acquisition (SCADA) networks responsible for critical infrastructure) increasing in both frequency and sophistication, it is no wonder that many organizations, and even branches of the government, are looking at addressing this issue with new policies and security standards. The two most common threats to data communication networks are Denial of Service (DoS) and Intrusion. Companies also will want to review other access control and privacy issues to make the most informed decision about their communication technology options. It is essential to use communication network solutions that aren t easily accessed by hackers or intruders. DoS attacks can range from something as simple as jamming the signal, to completely preventing access to the data entirely. The consequences of intrusion range from spying or stealing information to corrupting data or taking over an entire network and/or computers and control systems. Proprietary systems and devices offer a higher degree of security, but even those devices can be penetrated if you know how and where to get access. A good network security strategy should go even further and protect data in transit as well. Even if an unauthorized device manages to gain access to the network, it won t necessarily gain access to the actual data without passing yet another layer of security. Company Confidential April 11, 2013 4

Expandability Expandability considerations for network automation activities also need to be considered, because as a company evolves, so must its communications network. Adopting an expandable platform often is essential because of additional monitoring needs, new process technologies that require more points for monitoring and control, and for peace of mind -- knowing that more points are easy to add no matter what the future brings. Keep in mind that the early adopters of automation expansion have faced security issues and are working toward reducing the number of access points in general, leaving them less vulnerable to network disturbances and cyber security threats. Today, proven wireless I/O technologies can effortlessly interface with SCADA systems. One the main benefits for introducing wireless I/O is the capability of providing operators with additional conditionbased monitoring techniques. When considering wireless I/O expansion modules for CP remote monitoring, it also is important to understand how I/O expansion might be an optimal choice. An I/O expansion module offers a scalable solution to meet the demands of an operator s automation requirements. These options today can either be stacked on an applicable I/O wireless data radio or can serve as expandable remote I/O modules through a serial connection. Data Reliability It sounds obvious, but data reliability is actually a much bigger issue than pipeline operators and technicians think. Ask this question: what good is any of the data if people can t access or receive it to make real-time and well-informed decisions? The answer is also obvious, but it emphasizes the need to explore the specific data features for each communication solution, especially when implementing a hybrid network. For example, the ability to confirm the receipt of accurate data (both distributed and Company Confidential April 11, 2013 5

received) isn t always offered as part of one solution by communication technology vendors. In fact, there may only be one or two options today can provide this confirmation to the end-users. In large energy infrastructure projects, such as a network of oil and gas pipelines, reliable data retrieval and delivery for process automation and remote command and control of assets in the field is especially important. Further considerations for data reliability include the speed and distance of data transferring, as well as the noise immunity of the communication solution (how well a solution performs in a congested network environment). Operators and technicians should inquire about the versatility of each option as well as the potential for error in the communication link. Some wireless data radio providers even offer error-free communication features as well as enhanced diagnostic tools that enable real-time diagnostics without disrupting or tying up the communication link. Operators should also inquire about the network design and network management support that communication technology provider s offer as part of their solution. A network is only as strong as its weakest link and critical infrastructure automation relies heavily on support from each technology vendor that is part of the system. Summary With so many communication options to consider when implementing a remote monitoring solution, it is critical for utility operators to ensure they have selected the best communications network for their organization. Taking a hybrid approach not only can provide better results, but, also has a positive impact on reducing an organization s investment, operating costs and more. Companies with large communication networks and automation need to break away from thinking of communication needs in vertical silos. With a hybrid approach, a company can use the least expensive modality available until they run into a barrier. Organizations should review the idea of combining several communications technologies into a hybrid network, especially when confronting the challenges of operating a large network infrastructure. Due to the need for expanding automation across large networks, certain communication expansion technologies will be required and security threats must be considered and mitigated. A proactive approach, with the help of reputable communication technology manufacturers, enables decision-makers not only to implement the best solutions for their organizations, but helps have a lasting impact on the integrity of their critical infrastructure projects. Company Confidential April 11, 2013 6

FreeWave Technologies, Inc. 5395 Pearl Parkway, Suite 100 Boulder, CO 80301 303.381.9200 sales@freewave.com www.freewwave.com Company Confidential April 11, 2013 7