White Paper. Next Generation Historians. Improve historical data access and analysis while reducing costs. What s Inside:



Similar documents
SmartGlance Mobile Reporting Architecture and Data Security

Skelta BPM and High Availability

Invensys Collaborative Plant Automation Maintenance. When it comes to operations performance... we make it happen.

The Smart Electricity Value Chain Real-Time Pricing and Costing

Wonderware MES 4.0/Operations and Performance Software

ArchestrA Workflow 2012 R2

INVENSYS OPERATIONS MANAGEMENT: AUTOMATING THE FUTURE OF A SUSTAINABLE SAN FRANCISCO. Invensys Operations Management

Wonderware Intelligence

Wonderware QI Analyst

Environmental Monitoring System (EMS) Architectures

Wonderware Workflow ENABLE TRUE COLLABORATION

White Paper. Choosing a Wireless Implementation Strategy and Applications. What s Inside:

Wonderware MES Software 2012

Leveraging Virtualization for Higher Business Continuity within Industrial Facilities

White Paper. Myths about Historians. What s Inside: Author: Elliott Middleton, Product Manager, Historian & Clients, Invensys Operations Management

White Paper. Why is Alarm Management Required in Modern Plants? What s Inside:

Invensys Security Compliance Platform

White Paper. Closed-loop Energy Management Solutions with ArchestrA Workflow Software. The Invensys Solution for Corporate Energy Management

FOOD & BEVERAGE CONSUMER PACKAGED GOODS INDUSTRIES

LOWER TOTAL COST OF OWNERSHIP & INCREASED PRODUCTIVITY

White Paper. Wonderware Mobile Solutions RFID Technology. What s Inside: Invensys is now

Wonderware Industry Solutions for Facilities Management

Reducing Risk in Large-scale Process Automation Projects

The Benefits of Component Object- Based SCADA and Supervisory System Application Development

Introduction. Tech Note 884 Setting Up Historian Servers for Tier-2 Summary Replication

Introduction. Notes. Important Considerations. Application Versions. Assumptions. 8/22/13 Setting Up Historian Servers for Tier-2 Summary Replication

Percentage breakdown of organizations using cloud services for more than 10% of their. business. processes within a BPM project

FOXBORO. I/A Series SOFTWARE Product Specifications. I/A Series Intelligent SCADA SCADA Platform PSS 21S-2M1 B3 OVERVIEW

Introduction. Application Versions. Compatibility and System Requirements. Firewall and DCOM Settings

White Paper. Cyber Security. Power Industry Locks Down. What s Inside:

Web Application Hosting Cloud Architecture

Online Transaction Processing in SQL Server 2008

F&N Dairies Achieves Significant Savings in Production, Logistics and Inventory Costs with Wonderware MES Software

AV TSS-05 Avantis.DSS 5.0 For Wonderware Intelligence

Securely Connect, Network, Access, and Visualize Your Data

Business Process Management (BPM) for Manufacturing Wonderware Skelta BPM. By Gagan Babu, Technical Consultant, Invensys Operations Management

The Continuously Current Enterprise: Trends in lifecycle management of automation assets

2015 WW Australia Training Catalogue

Wonderware Historian Client Installation Guide. Invensys Systems, Inc.

Note: This Tech Note was formerly titled Installing Microsoft SQL Server 2008 for Wonderware Historian v10.0.

Tech Note 1010 SQL Server Authentication and ArchestrA Network Account Restrictions When Installing Wonderware Historian

Tech Note 743 Configuring Reporting Services 2008 Configuration for a New Host Name in Windows 2008 R2

Wonderware InBatch. Flexible batch management

How Wonderware Software Addresses the Top Challenges of the Municipal Water and Wastewater Business. Steve Garbrecht, Director of Product Marketing

Evaluating Electrodeless Flow-through Conductivity Sensors for Sanitary Applications

SQL Server Mirroring. Introduction. Setting up the databases for Mirroring

Unisys Internet Remote Support

Vijeo Citect Architecture and Redundancy Study Guide

Dream Report vs MS SQL Reporting. 10 Key Advantages for Dream Report

Hitachi Cloud Service for Content Archiving On-Ramps Guide for Rocket Arkivio Autostor

Terminal Services for InTouch 7.1/7.11. Terminal Services for InTouch 7.1/7.11 PRODUCT POSITION PRODUCT DATASHEET

WW INFO-02 Wonderware Historian Best Practices

How To Create An Intelligent Infrastructure Solution

Wonderware System Integrator Program Guide. Partner Ecosystem

White Paper. Replacing Aging Process Automation Systems: Finding the best option. What s Inside:

Software-Defined Networks Powered by VellOS

The Project Management Software for Outlook, Web and Smartphone

Server Scalability and High Availability

Using Network Application Development (NAD) with InTouch

Avantis Enterprise Asset Management Suite

Project management - integrated into Outlook

This Tech Note provides step-by-step procedures to install Microsoft SQL Server 2012 on a 32- or 64-bit Operating System.

abc Operations Viewer and Server Product Data MODELSOpsF,OpsS,OpsW

Redundant Serial-to-Ethernet Data Connections for Mission-critical Devices

PANO MANAGER CONNECTOR FOR SCVMM& HYPER-V

I/A Series SOFTWARE Product Specifications

InTouch Access Anywhere

Invensys-Skelta Takes BPM to Operations. customers and the Invensys challenge is to Invensys manufacturing customers.

Server Installation ZENworks Mobile Management 2.7.x August 2013

MITEL. NetSolutions. Flat Rate MPLS VPN

Wonderware Enterprise Integration Application. By Tim Sowell

Dell Spotlight on Active Directory Deployment Guide

Dell One Identity Cloud Access Manager Installation Guide

FoxCTS. Change Tracking Software. Secure Information Tracking. I/A Series Server. File Changes (CTS Client Hard Drives)

Tech Note 920 Resolving Disabled ActiveFactory Reporting Website for Wonderware System Platform R2

Security Settings for Wonderware Products

Introduction. Application Versions. Installing Virtual SMTP Server. Tech Note 692 Using Virtual SMTP Server for SCADAlarm Notifications

Dynamic Simulation Suite

Reimagining Business with SAP HANA Cloud Platform for the Internet of Things

Network Client. Troubleshooting Guide FREQUENTLY ASKED QUESTIONS

MaaS360 Cloud Extender

Deploy Remote Desktop Gateway on the AWS Cloud

Copyright 2013, 3CX Ltd.

How To Write A Summary On A Historyorian Server

Process Solutions. Uniformance Process History Database (PHD) Product Information Note

WW HMI SCADA-11 System Platform Best Practices 1: Engineering Efficiencies

MaaS360 On-Premises Cloud Extender

ActiveFactory 8.5. Data Analysis Tools for IndustrialSQL Server. Visualize, Analyze, Optimize PRODUCT HIGHLIGHTS. Real Business Value

Introduction to Virtual Datacenter

Installing Policy Patrol on a separate machine

SQL Server 2008 Performance and Scale

Simplified Management With Hitachi Command Suite. By Hitachi Data Systems

Raising the Bar on Scalability

Industry White Paper. Ensuring system availability in RSView Supervisory Edition applications

Enabling Remote Management of SQL Server Integration Services

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Three Key Design Considerations of IP Video Surveillance Systems

Version 3.8. Installation Guide

White Paper ClearSCADA Architecture

Transcription:

White Paper Next Generation s Author: Mike Brost, Consulting Systems Engineer, Invensys Operations Management What s Inside: 1. Introduction 2. Historical Data Types, Usage and Management Challenges 3. Next Generation s from Invensys 4. How Domain Isolation is Achieved 5. Summary

1. Introduction Most companies today are organized into multiple departments, each with their own set of functions, duties, priorities, and users. Ensuring that each user has access to the right data at the right time and in the right context is paramount to maximizing efficiency and productivity, and keeping costs low. Prime examples of this are the operational users at the control layer and analytical users at the corporate layer of the business. Although each user needs the access to consistent and reliable data, they have very different needs for the use of data. An advanced and cost-effective solution from Wonderware can solve this problem by isolating the SCADA domain (Control Network) from the business domain (Corporate Network). It allows customers to easily configure costeffective domain isolation of the Control Network from the Corporate Network, while fully maintaining data integrity and security. This enables production to be completely isolated while fully integrated with the business systems a welcomed option for both Production and IT managers. Next generation historians from Wonderware can help companies dramatically reduce capital costs associated with the perimeter hardware, while ensuring high availability of historical data and advanced trending capabilities at both the control level and the business level. This white paper discusses the issues concerning the access of data across the enterprise; the need for domain isolation; and the solution based on a new generation of s. 2. Historical Data Types, Usage and Management Challenges The use of historical data within manufacturing, infrastructure and process industries can be divided into two main categories: Operational and Analytical. Operational uses of historical data focus on short-term time horizons used to run the facility. This involves realtime trending for the understanding of current state and process movements and directions. At the operational level, recent historical trending and reporting of historical data are required for decision making. The time horizon of operational needs typically ranges from hours to days, but is usually less than a week. This information is also required to be at full process fidelity. And the information must be easy to comprehend so that it could resolve the process at its native time constant. For a motor current or flow rate this time constant is millisecond or second based. For a level or environmental measurement this time constant could be minute based. The basic premise is that resolving and understanding a problem must be done with information at an equal or higher resolution than the frequency of the problem. Analytical use of process history involves longer time horizons, encompassing compliance reporting, production summaries, optimization studies, cause and effect analysis, and many other requirements placed on the historian. Due to this it becomes necessary to keep the historical data intact for longer periods, typically for years, with some industries and/or regulations requiring no expiration of data. Analytical uses could involve process validation for recalled products, accident investigation, or training. Requirements placed on the historian could involve handling very large data sets. Analytical analysis over longer time horizons might be facilitated by statistically summarizing highfidelity data into more manageable time frames, such as 15 minute, hourly, daily, shift, weekly, and monthly. Traditionally operational and analytical roles have been tasked to the same historian and this historian was required to serve essentially two masters. The two roles, SCADA (supervisory control and data acquisition) or Plant operations personnel and the business or engineering personnel, require access to a process historian to support their needs. To further complicate the situation, these roles are in many instances located in different locations of the organization and typically members of different domains with separate user communities. In some cases they are located in external organizations accessing the historian via public infrastructure and all have legitimate uses of the historian. Page 1

Generally, to enable these users, a single historian is set up and access is then granted through the entire network and firewall infrastructure to allow these users to get the information they require. One historian is commonly used for many legitimate reasons, including: s were an expensive and complex asset to install and maintain Duplicating s meant very often doubling the costs s pulled their data from the process control system and sensors so they had to be allowed access through externally open firewalls 3. Next Generation s from Invensys Invensys Operations Management has implemented historian products that allow a different approach to solving problems related to secure data access across the enterprise and domain isolation. The Wonderware is now available in four editions, which can be combined to provide a unique solution for getting information to a diverse user community. Each edition of the historian is identical in capability except for the following three metrics: Number of data values to retrieve information Length of time for the retrieval Ability to consolidate data from other historians The four editions of the Wonderware are: (1) A Free running on SQL Server Express 32 retrievable tags 7 Days from current time Unlimited Store forward to Enterprise (2) A Local running on SQL Server Express or Standard Edition 25,000 retrievable tags 7 Days from current time Unlimited Store forward to Enterprise (3) A Standard running on SQL Server Express or Standard Edition 100 to 100,000 retrievable tags Unlimited retrieval from current time Unlimited Store forward to Enterprise (4) An Enterprise running on SQL Server Standard Edition Up to 500,000 retrievable tags Unlimited retrieval from current time Able to consolidate multiple s of any edition Page 2

4. How Domain Isolation is Achieved All four editions of Wonderware can now be combined to provide unique solutions to solve your historical data management problems. There are important considerations to understand with this approach. Data and configuration is delivered from the transmitting historian to the receiving historian. The data path is established via a single, user-configured TCP port (an outgoing port), which can only be established from inside the firewall. These two historians do not need to have any shared membership within their respective domains. There is no requirement to trust the domains between the Control and the Corporate networks. Each historian can reside within its own network and there is no requirement to install them within a DMZ. A can be configured to deliver its data to multiple receiving historians with unique tag sets and fidelity for each one. Each transmitting historian can also be configured to automatically add any new tags created within it to the replication schedule being transmitted to the receiving historian. In this way all configuration tasks can be automated to keep the data model between the historians synchronized. to communication is designed to handle very low speed, high latency, and intermittent network infrastructures. Redundancy can be accomplished by simply adding a second historian of any edition to the layer requiring it. This partner or redundant historian can also be remotely located from its partner since communication infrastructure is not required between the two historians. The tools will also recognize this redundancy and automatically switch between the two partner historians. All data transmitted to the receiving historian is also presented via a Data Access Server (DAS) on the historian. This provides a real-time (read-only) data stream, which can be subsequently used by SCADA systems for process visualization and alarming, and is completely isolated from the SCADA network without any shared credentials or physical access. Business Domain Enterprise Tier 2 Server Corporate Network SCADA Domain I/O Open Outbound Replication (single TCP port) Local/Standard Tier 1 Server InTouch Application Server Server Pairing for secure, highly available data and domain isolation Control Network Page 3

Given the design possibilities of these historian architectures, a strategy of Domain Isolation can truly be implemented between the SCADA and Business Domains. Each can be enabled with their own Active Directory Servers (ADS) with no shared credentials existing between the two or more than two, if required. The within the SCADA Domain is responsible for connecting to the Enterprise in the Business Domain. It does this via a Windows Communication Foundation (WCF) service that requires a single, user-configured outgoing port on the firewall protecting the SCADA Domain. The Enterprise has no knowledge of the credentials required to connect to the SCADA historian(s). Configuration is maintained from the SCADA environment as to which data to send and the tag configuration required. While no shared credentials or domain trusts need to exist between the networks, the Business domain has access to full fidelity, real-time data in a completely read-only mode. The workload of using historical data for detailed reporting and process analysis of the business uses will have no effect on the performance of the SCADA network. The data delivery between these networks can be encrypted to allow secure transmission through public infrastructure to Cloud environments or even directly to external organizations. All this is now available with the Wonderware as a part of System Platform from Invensys Operations Management. These scenarios are extremely cost effective and easy to setup and maintain. 5. Summary Companies today face multiple challenges when it comes to providing users with the access to the mission-critical data, in the right context, at the right time. This is of paramount significance since companies have different sets of users at different levels operational users at the control layer and the business or analytical users at the corporate layer of the business with very different priorities. Next generation s from Wonderware can help address historical data management challenges by enabling domain isolation of the Control Network from the Corporate Network. This can help improve historical data access and analysis while reducing costs. Invensys Operations Management 10900 Equity Drive, Houston, TX 77041 Tel: (713) 329-1600 Fax: (713) 329-1700 iom.invensys.com Invensys, the Invensys logo, ArchestrA, Avantis, Eurotherm, Foxboro, IMServ, InFusion, SimSci-Esscor, Skelta, Triconex, and Wonderware are trademarks of Invensys plc, its subsidiaries or affiliates. All other brands and product names may be the trademarks or service marks of their representative owners. 2012 Invensys Systems, Inc. All rights reserved. No part of the material protected by this copyright may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording, broadcasting, or by any information storage and retrieval system, without permission in writing from Invensys Systems, Inc. Rel. 12/12 PN WW-4154 Page 4