Difference Between Data Sheet Transmit Power & Data Stream Transmit Power
Image courtesy of Flickr Creative Commons You need to link a two production sites together in your IIoT network in order to move critical voice, video, data and sensor data (VVDS™) between the sites by deploying access points. So, you consider using industrial Wi-Fi Access Points to implement this short-haul, point-to-point (PTP) RF link between the two sites. Short-haul RF links out to 8 miles are very doable using industrial Wi-Fi Access Points with directional antennas. You evaluate potential Wi-Fi Access Points from their data sheet specs. This is given, and you select one. Now, there is one specification that is commonly misunderstood and leads to confusion when evaluating MIMO capable Wi-Fi Access Points and using them in either PTP or point-to-multipoint (PMP) IIoT networks as wireless infrastructure. Confusion and mistakes arise from the difference between the transmit power stated on the product data sheet and the transmit power of a single MIMO data stream of the Access Point. For example, a 3×3 MIMO Access Point data sheet states the transmit power is 27dBm for MCS4/12/20 data encoding in either the 2.4 or 5GHz band. This is typical, and not a surprise, but what is this transmit power really stating. The FCC limits and regulates maximum transmit power from an intentional emitter, e.g. Wi-Fi Access Points. For Wi-Fi devices, the limits apply to the aggregate transmit power of the device. In above product spec example, the transmit power stated is the aggregate transmit power for the 3 MIMO data streams. Still good? Yes. You have a Wi-Fi Access Point and the total transmit power is 27dBm. Now, you design your short-haul PTP link using Wi-Fi Access Points and directional antennas. What transmit power do you use in your RF link budget? 27dBm since it is the transmit power for the Access Point for the data encoding and the band you plan to use. Right? No. While 27dBm is the total aggregate transmit power for the Access Point, it is not the transmit power of an individual data stream. The individual data stream transmit power is roughly 5dB less than the aggregate transmit power found in the data sheet for a 3×3 MIMO product. Difference in Transmit Power versus Aggregate Power 1 Data Stream transmitting at 22dBm — Aggregate Transmit Power is 22dBm 2 Data Streams transmitting at 22dBm — Aggregate Transmit Power is 25dBm 3 Data Streams transmitting at 22dBm — Aggregate Transmit Power is 27dBm So here it is… If you use the transmit power from the data sheet in your RF link calculation without correction, your actual link distance will be approximately half what you expect for the planned fade margin or the link reliability will be less than what you expect for the planned link distance. When designing RF links for the IIoT networks, make certain you are using the correct transmit power in your RF link budget calculations.
Sensor-2-Server: Benefits & Security for IIoT Communications
*This is part of a series of blogs examining Sensor-2-Server (S2S) communications, development, security and implementation. For the past two weeks, we’ve taken an in-depth look at what Sensor-2-Server communications are, how to implement these systems, and some of the specific aspects of communication that these systems facilitate. This week, for our final installment, we’ll examine some of the benefits, as well as security considerations, for S2S communications. Benefits of Sensor-2-Server Communications From a technology partnership perspective, Big Data vendors face the challenge of comparing data in motion versus data at rest. If the data has already moved through a SCADA system and has been aggregated, changed, stalled, or is not quite granular enough, it can be difficult to deliver high-value predictive analytics. The concept of predictive analytics is that an operator can make an accurate estimate that certain things can happen during operations. However, the operator needs to determine what the drivers are for the predicted actions to happen and must look at active data to determine if this is, in fact, happening. Without insight into the active data in motion, they are lacking an essential piece of the predictive analytics. This ability to compare data in motion at the access layer could benefit Big Data vendors when it comes to predictive analytics because it allows them to give higher value to their customers, which drives additional revenue. With S2S technology, they can deploy a tiered application infrastructure that allows data to intelligently move from one point to another. S2S also enables operators to go beyond a legacy SCADA data network. To operate a SCADA network, it requires a lot of institutional knowledge to truly understand, manage and work within the environment. S2S expands beyond moving the data into SCADA systems and allows operators to leverage more advanced technology, like predictive analytics. Essentially, S2S communications provide the opportunity to take advantage of new advanced tools, but the operator doesn’t necessarily have to sacrifice the institutional knowledge built into the SCADA data systems. As new generations enter the workforce, it’s likely that there will be a shift and some of that institutional knowledge will be replaced with technology that will allow operators to do more than they ever could before. The addition of new technology and IoT networks is where operators are starting to see the functional lines blur between the IT and production groups. As more technology is leveraged, these two disparate groups will have to work together more often. There is now a drive for a more holistic picture of what is going on in IT, what is going on in the field, and whether the technology used will be compatible with future needs. SCADA will likely always have value for industrial communications but, going forward, there will be an increase in the use other technologies as well. Additionally, with more technology physically in the field, there is always going to be a focus on data security. Security Sensors at the access layer present interesting security challenges. For example, consider a data concentrator sitting on an oil pad that is collecting data. This device is collecting data from a number of sensors and has data logging capabilities, which also means the other devices sitting at the remote site contain historical data. Technology providers need to insure that the technology used is taking advantage of all the security features that are available to make sure their data is protected through a variety of means including encryption, authentication, virus and intrusion protection, and by being physically tamperproof. With the growing interest in IIoT, the system is providing a communication path with highly valuable information. These sensors may be running an application on the edge of the network, and many of these devices are using IP. When there are Ethernet and IP devices going out to edge devices in the field, each one of those devices has the potential to become a threat to the entire corporate network if they’re not secure. Operators in IIoT environments need to be concerned with everything that could be introduced to the network at every single connection point. Data protection data is a fundamental and extremely important element in determining the effectiveness of S2S communication. Technology vendors must be mindful of security in every step of the design and installation process, and operators must require security features that will protect their data and networks. In addition to data security, the threat to physical infrastructures in very remote locations is driving the need for new security solutions such as intelligent video surveillance designed to maximize security and minimize cost. S2S solutions need to be physically capable of delivering the bandwidth to enable these new solutions. Where Do We Go From Here? Industrial communication is changing in the sense that IIoT enables the possibility for every device in a network to be connected – including those in the outer access layer. This has created a convergence of OT and IT operations in many instances or – at the very least – has brought the two departments to a closer working capacity. IoT and technology at the access layer enable the option for Sensor-2-Server, a form of intelligent communications that can move the sensor data to a specific server for detailed analysis. New data and technology are allowing operators to do things they’ve never done before, such as predictive analytics. As this shift continues, SCADA is not becoming an obsolete technology; rather it will become a piece in the bigger technology picture. Any operator choosing S2S technology, or any technology for that matter, must carefully consider the options and keep security as a top priority.
Sensor-2-Server: Intelligent Communication at the Access Layer
*This is the first in a series of blogs examining Sensor-2-Server communications, development and implementation. Throughout history, industrial revolutions have hinged on the power of automating processes. While automation today offers many benefits, imagine if you could automate thousands – or even millions – of processes simultaneously? This is the next potential wave of innovation, and it’s the organizations that are “geographically dispersed” or “automation heavy” that will benefit the most. While long-range communications and connectivity have become increasingly easier to attain, businesses need to be able to break down their isolated islands of automation in industry to achieve comprehensive and connected automation at scale. For example, there always has been a clear line dividing operations technology (OT) and information technology (IT) networks. The emergence of the Internet of Things (IoT) blurs that line as industrial operations head in the direction of complete connectivity for all devices on a network – including those remotely located in the field. With new dedicated access layer platforms, IoT data can be analyzed, acted upon and transmitted from anywhere in an Industrial IoT (IIoT) network. The increasing shift toward Industrial Internet of Things (IIoT) tends to bring up a lot of questions about the continued value of Supervisory Control and Data Acquisition (SCADA) systems that have traditionally served as the driver for monitoring and control in industrial markets. Although OT and IT are beginning to converge, there is still high demand for SCADA data. However, new technology offers the opportunity for data to be used in ways that were previously not possible, such as predictive analytics. This doesn’t make SCADA obsolete, as many operators are using it and will continue to employ it. Going forward, industries will leverage new technologies designed to help them make better business decisions than with SCADA alone. Sensor-2-Server™ (S2S™) intelligent communications for the access layer can collect and transport the data that supports higher-level analytics. As IoT becomes adopted by industrial markets, there is going to be an increased demand for video, voice, data and sensor data communication from the outermost layer of the network (think sensors on oil pads or water tanks). Industries like oil and gas, electric power, agriculture and utilities are starting to pick up on the benefits of S2S when it comes to profitability and cost savings through more advanced data analytics. Defining Sensor-2-Server S2S is intelligent communication that begins at the sensor level and targets servers for specific reasons. These servers could include anything from a SCADA data server that collects and monitors through the SCADA system or a Big Data engine. S2S could be leveraged in a predictive analytics engine that compares data at rest stored in a database to data in motion in real time from the access layer of the network. The concept of S2S extends beyond transmitting data. It is about creating intelligent transmission from a specific location back to the appropriate server with the appropriate intelligence to drive action for change. What is the Access Layer? The access layer is the edge of the IT network. An IT infrastructure has a core that is home to all the Big Data and data analytics. At this core, the data is “at rest” because it has reached its final destination. Next is the distribution layer of the IT infrastructure which is where the major plants, sites and facilities are located. Further out is the aggregate layer where data at the next level in the network is collected. Extending out even further is the access layer. The access layer is the layer at the far edge of the IT network. In oil and gas, for example, oil pads would be part of the access layer because they are typically remotely located at the edge of the network. It is highly likely that sensors physically exist in this layer for monitoring and control of these devices. Additional examples of the access layer are tanks, refinery sites and ocean exploration vessels. In water/wastewater, the access layer could be the treatment facility that has the water meters, pumps, smart meters, etc. Essentially, in an industrial site, the S2S access layer is the furthest point at which the operators are collecting sensor data. Industrial organizations today need intelligent secure communication and transmission from the sensor data back to the appropriate server, and there are a number of available options. What’s Next? Next week, we’ll continue our Sensor-2-Server series with a look at implementation and some of the core tenets of communication system development.
DistribuTECH Day 3 Recap: Utilities-as-a-Service?
We’ve wrapped up another year at DistribuTECH, and we’re leaving Orlando feeling invigorated and excited about the industry
Solving The Challenges of Remote Wi-Fi in the Industrial Internet of Things
Most of us can relate to the frustration of when the Wi-Fi is down, or running slowly, or if we travel away from an established network and aren’t able to connect to another one nearby. The lack of Wi-Fi makes it impossible to check our emails, look up something on the internet, connect with others, or get our work done efficiently. In short, it makes us feel a little helpless and a whole lot of cranky because we’ve become way too accustomed to getting the information we want – when we want it – and staying in 24/7 connection with our world. Now, if we’re challenged by our Wi-Fi experiencing a service blip in a metropolitan area, imagine a remote industrial setting like an oil pad, a water treatment plant, or a rural electric tower. All of these reside in what is known as the access layer – or at the very outer edge of an IT network. Not only is there usually no internet connectivity in the access layer, but these devices are typically operating in rugged terrain where they’re experiencing extreme and volatile weather conditions such as wind, snow, blistering heat, tornadoes, dust storms, etc. Each of these access layer settings is part of a larger industrial Internet of Things (IIoT) network that connects the information gathered from local sensors that transmit or receive operational data. From there, they pass it along through subsequent network touch points all the way to the IT department at headquarters where this data is collected, analyzed, and acted upon for improved decision making. So, at the access layer – sometimes in the middle of nowhere where there can be no Wi-Fi networks for miles – talk about being disconnected from the world! Adding the environmental component to that, as well as the fact that most of these remote sites aren’t adequately monitored and data security is at risk, it makes your occasional Wi-Fi challenges seem a bit tame, yes? Here’s where wireless IIoT communications technology can help transmit this critical sensor data from remote industrial locations with no Wi-Fi connectivity all the way to where they’re supposed to go – and at very high speeds. This week, FreeWave is launching its new WavePro™ WP201 shorthaul and Wi-Fi platform that delivers secure collection, control, and transport of Voice, Video, Data, and Sensor (VVDS™) information from the access layer. Think of it as high-speed, rugged Wi-Fi connectivity that can be positioned in that oil pad, power plant or wherever Wi-Fi is needed. It will not only connect these sensors to the internet, but can also transport voice and video to create an instant in-field network, provide greater visibility into what’s going on at these sites, and better protect remote assets. The Advent of Short Haul and the Access Layer Change is inevitable, and change is taking place in SCADA, M2M and IIoT networks. SCADA networks started as networks that transported periodic process updates and used low bandwidth networks with longer links to meet their mission. Today, remote SCADA and Wi-Fi networks are transporting more data from more sensor data with greater frequency in order to drive operational efficiency into business processes. SCADA and M2M networks are becoming more multi-functional than their predecessors. These networks are transporting more than sensor data from the remote site to the enterprise. These networks linking remote sites to the enterprise network are now transporting: Video for remote process monitoring, enhanced site security and theft deterrence Voice, since cellular coverage is not ubiquitous Data so field personal have access to information needed to work efficiently This combination of data types is what FreeWave terms as VVDS™ (voice, video, data and sensor). VVDS transport is now a requirement for your wireless network. Another change occurring in traditional SCADA networks is that link distances are decreasing. In the past, SCADA networks with wireless links of more than 10 miles were common. Today, wireless links in excess of 10 miles typically use high speed, microwave, point-to-point (PTP) systems because of the increased capacity demands of VVDS. The WP201 links the formerly unconnectable and is designed to not only meet the harshest environmental conditions, but also encrypts the data to keep it secure and protected. It can be used in a wide variety of industries like oil & gas, utilities, mining, disaster recovery, facility automation – anywhere where field sensor information needs to be transmitted to servers for Sensor-2-Server™ (S2S™) connectivity. The applications are almost limitless. With higher speed, shorter wireless links, FreeWave defines wireless networks in three tiers: Long Haul (or the Distribution Layer) are wireless links from 5 miles, and greater and are typically implemented using high speed, PTP microwave systems. Short Haul (or the Aggregation Layer) are wireless links from 1 to 8 miles that are easily implemented using high speed, 2.4GHz or 5GHz radios with directional antennas to create point-to-multipoint (PMP) networks for data and information aggregation, or PTP links that provide network ingress/egress points. Close Haul (or the Access Layer) are PMP networks with wireless links operating from a few feet to a couple of miles to transport VVDS data. Designing and deploying wireless networks using a layer approach that enables each layer to be optimized for transport and for cost ─ leveraging the right equipment at the right point. The WP201 and its remote Wi-Fi and short haul capabilities is the first in a series of S2S products that FreeWave is offering to be that critical communication bridge in the IIoT world. So in your own operations, what are some ways you might incorporate the WP201 into your network?
Today’s IIoT Security Challenges
For decades, Supervisory Control and Data Acquisition (SCADA) systems have played a significant role in industrial operations. Industries like oil and gas, electric power/smart grid, agriculture and utilities have implemented SCADA systems and networks to collect data and automate processes, and are always looking to automation systems for more effective ways to operate. The ability to collect more data from geographically dispersed field assets in remote locations has driven the need for enhanced communication technologies. With the emergence of continuously improving wireless machine-to-machine (M2M) technologies, networks have more access to data points than ever before. The number of sensors and data points collected will continue to rise dramatically with improved connectivity. This collected data helps operators improve operational decisions, save manpower and, in many instances, keep employees safe by avoiding dangerous environments. Today, industrial network operators are increasingly implementing end-to-end Internet Protocol (IP) connectivity or the Internet of Things (IoT), enabling more capabilities at the edge of these networks. This does not make SCADA systems obsolete by any means; it opens the door to greater possibilities of enabling new applications and analytics with every single data point being captured in the system. So What’s the Security Tradeoff? There are many implications for the concept of a completely connected enterprise in terms of network security. Critical infrastructure projects are only as reliable and secure as the technology serving them. Security, therefore, will ultimately be the limiting factor on how much IoT technology is deployed. With security, the traditional trade-off is either “easy to use” or “secure”— but not both. We often consider a third tradeoff as well of features, though in most cases, operators are not willing to trade off features, but it is certainly part of the equation. An operator striving for an Industrial IoT (IIoT) network must look at SCADA security, the convergence of Operations Technology (OT) and Information Technology (IT), and make a thorough assessment of what will allow them to achieve a secure data communications network. Some of the top security challenges for the IIoT today include: With more data being transported than ever before, it’s important not only to secure assets, but to secure the communication link itself. Traditionally, SCADA systems have been on the outside of a firewall from the corporate IT network. Newer SCADA systems that use Ethernet devices are more security focused with measures such as VPN, secure sockets, encryption and dedicated log-ins on the devices. One Final Thought There are many benefits to the concept of a completely connected IoT system, but this also implies more crossover between IT and OT systems. Companies need to prioritize security in their quest to create end points for all of their field assets. Some industries, like the smart grid, are already experiencing mandates that ensure a more cyber-secure network. With others, however, it is still up to the organization to make security a top priority.