Six hours into an eight-hour process at a pharmaceutical plant, production hit a fatal snag and shut down, essentially flushing $100,000 down the drain. The problem: A software update came at just the wrong time. What would have been a routine update in the IT world proved a costly mistake in the world of operational technology (OT).
Welcome to the brave new world, where IT and OT intersect in ways that plant operators couldnât have imagined just a few years ago. That intersection is allowing companies to streamline processes and maintenance, and connect vendors and suppliers with data to save time and money. Except when it doesnât go as planned.
In the case of the pharmaceutical company, the problem was a window that popped up on an interface to ask the operator if he would like to update the software. Choosing to update resulted in a reboot of the batch server that was running a medicine-making processâand the loss of vital genealogy required by the U.S. Food and Drug Administration (FDA).
It was, as Gregory Wilcox, global technology and business development manager for Rockwell Automation, later put it, âa really bad day.â The batch was ruined and the pharmaceutical company could only call in Wilcox and other experts to recommend policies, procedures, technology and training to help make sure that kind of mistake was never repeated.
Despite the potential pitfalls, the benefits of connected automationâmachines and processes that share information with each other and the businesses that operate them as well as with customers and suppliersâare legion, and growing all the time.
âConnecting plant-floor assets with the enterprise, and connecting manufacturers and suppliers can offer tremendous value,â says Scot Wlodarczak, a manager for industry marketing at Cisco and a spokesperson for Industrial IP Advantage, a trade group dedicated to education about industrial information architectures. âIn fact, itâs estimated that four out of 10 companies will be disrupted in their market position by companies fully embracing connected factory solutions.â
Key to realizing those benefits is mitigating the potential risksâwhich, fortunately, can be done with proper planning and use of already-established best practices. It starts with getting off on the right foot.
Connecting the dots
Laying the groundwork for connected automation starts with an evaluation of what an automated process or factory already has to work with, and where managers want to go with it, says Tony Shakib, vice president of Ciscoâs IoE Vertical Solutions Engineering organization. The starting point is what Shakib calls level oneâjust getting the component pieces, including machines, connected and sharing data.
An important consideration here is how tightly to link IT and OT systems, says Ryan Lepp, director of business development for industrial automation and the Internet of Things (IoT) for Panduit. âIs your end goal a completely converged network, where IT and OT coexist?â he asks his customers. His recommendation is for as unified a network as possible to reduce costs.
Once machines and processes are sharing data, Shakib says, companies deploying connected automation can proceed to level twoâmaking use of all that data. Predictive maintenance is one benefit to be achieved at level two. âBy having a constant connection monitoring the health of these devices, quite often you can predict when somethingâs going to go down months ahead of time,â he explains. Reducing or eliminating downtime is an obvious benefit, saving millions of dollars for manufacturers.
Also at level two, data can flow the other way, back to the machines. âRather than having to spend hours changing a machine over manually to work with a different product, the machine has devices onboard that automatically can get changed almost just with a recipe,â says Robert Miller, senior manager of strategic collaborations and partnerships at Mitsubishi Electric Automation. The recipe (information about how to build a new product) instructs servos and other parts of each machine to reconfigure themselves to handle products of different sizes, shapes and weights.
Level three connects a factory with outside suppliers and customers, potentially extending the benefits of connectivity to the entire supply chain. But greater connectivity presents greater security risks. âEnd users need to adapt and embrace these new business models to remain competitive,â Wlodarczak says. âHowever, turning traditionally siloed industrial networks into borderless industrial Ethernet networks shared with suppliers can open up new attack vectors.â
Fortunately, careful planning and best practices can prevent a bad day.
Securing the network
Proper security practices operate on multiple levels, Wilcox says. âWe always recommend to customers that they use a holistic defense-in-depth approach,â he says, which should address security at the physical, electronic and administrative levels.
Security at the physical layer can be as simple as restricting physical access to certain areas of a plant to only those who need to be there. Thatâs an approach all too often overlooked, Wilcox says. âUnfortunately, sometimes our customers have whatâs commonly referred to as an M&M approach to security,â he says. âItâs hard candy outside and itâs soft and gooey inside. Once you get past the perimeter, whether at the receptionist or even a guard, at times there are no procedures to actually track visitors.â Access control provided by locked doors opened by ID badges can go a long way toward mitigating this potential security risk.
Physical security can also extend to physically preventing machines and controls from connecting to the wrong networks or devices. This can be ensured with cables that will not connect to the wrong places. Panduit, for example, makes cables and connectors that foster this level of physical security. âWe have an entire line that can be used to configure and construct the physical security of a network,â Lepp says.
At the electronic level, says Miller, the right kind of network can ensure that only known devices are able to share data, Miller says, noting that CC-Link IE is an Ethernet-based network that provides this level of security. âCC-Link IE is inherently deterministic and inherently secure because of the technology and the communication that it uses,â explains Miller, who serves as director for the Americas for the CC-Link Partner Association. âUnless the network controller knows about a certain device, that new device will not be able to communicate across that network.â In other words, he explains, âYou couldnât just walk up to a CC-Link IE network, plug into it with a laptop and hack into the system.â
Finally, administrative access controls should restrict users to only parts of a network or to software that they have been authorized to use. Packages like FactoryTalk Security from Rockwell Automation can help system administrators establish the appropriate levels of access to software and hardware based on who is logging in to the system from which locations.
Stabilizing the network
As the example with the rebooting batch server at the pharmaceutical plant exemplifies, greater connectivity also can present challenges to maintaining uptime. Uptime is often less critical in the purely IT world than it is in the operational world, and bringing operational-level uptime to a converged network is the name of the game for many plant operators.
Step one in ensuring network uptime is simplifying wherever possible, Lepp says. That requires planning. âIf thereâs no strategy or plan,â he explains, âyou develop this nest of communications, where you may have critical points of failure.â
Planning should include such factors as ensuring that switches have enough capacity to handle the volume of data passing through them. âThat is something thatâs going to become more and more of an issue,â Miller says. âAs more devices become available to be put on a network and to monitor through the network, thereâs going to be more and more data.â And more data increases the risk of network congestion, which can bring a process to a grinding halt.
Lepp cites the case of a food and beverage plant whose network teetered on the brink of collapse at any given moment because of too much network traffic. âIf you added anything, it would crash the network,â he recalls. âIf you took that extra device out, the network could recover and you could start the machine again.â Lepp and his team solved the problem by carefully assessing the network and then redesigning it to handle more data.
Such reconfigurations could include whatâs known as zone architecture, Lepp says. âWhat a zone architecture does, is it pulls the switches out of a control panel and puts them into a rafter or higher level, then you disburse the backbone network off into individual zones,â he explains. That way, even if a control panel does go offline for any reason, the distributed switches keep the network and the systems that depend on them up and running.
In addition to reducing data loads, zone architecture promotes redundancy, another key to enhancing uptime. This can extend to cables as well as to switches. Lepp and his team make sure that there are backup data lines connecting switches, controls and machines. Equally important is that the lines donât all follow the same route. âIf you have got redundant fiber lying in the same pathway, then the physical location isnât redundant,â Lepp says. âAs soon as you hit that with a forklift, your network is down.â
The future of connected automation
Cisco and Rockwell Automation have collaborated on the Converged Plantwide Ethernet (CPwE), an evolving set of reference architectures for connected automation. Each partner maintains its own labs where best practices are designed and tested before being added to a growing library of reference materials. For example, a white paper released in June outlines use cases for deploying industrial firewalls. Panduit also recently introduced physical infrastructure recommendations for the reference architectures.
All of which should help plant engineers and operators in the future avoid the kinds of problems faced by the pharma manufacturer and its errant software upgrade process. In that case, Wilcox says, plant managers were able to keep the problem from happening again through additional operator education (donât accept a system upgrade while a batch is running), improved communication between IT and OT departments (donât try to upgrade production servers while theyâre running), and preventive controls (critical systems are only upgradable on maintenance days). âTo my knowledge, that customer has never had an incident like that again,â he says. âA little pain upfront, but it was a happy ending.â
Call it growing pains on the way to a new world of connected automation.