2013年9月17日 星期二

Secure Connections over the Internet


The concept of being able to remotely connect to a network anywhere in the world is not a new one. It has long been utilized in the IT world to prevent IT administrators from having to drive into work at 3 a.m. to fix a software automation.
The implications of a secure automation from anywhere in the world extend beyond nightmare troubleshooting scenarios, such as a remote PLC in the middle of a desert with only basic cellular coverage connecting to the primary information center (SCADA PC or database server) across the Internet. How is this accomplished in a secure, simple fashion?
The answer is the humble Virtual Private networking (VPN) connection, sometimes referred to as a VPN tunnel. This particular piece of technology allows two disparate networks separated by the cloud to connect to each other as though they are on the same local networking, albeit with a substantial penalty in connection speed. This penalty is not particularly relevant when passing small pieces of data, such as a SQL command or a Modbus function call. It is now even possible to send programs to PLCs and monitor visualizations of industrial networks across such tunnels. These capabilities allow for truly unparalleled possibilities.
VPNs are typically established between two pieces of network infrastructure, such as a commercial router and an industrial hardware VPN solution. Alternatively, software VPNs are available that would allow a PC to connect to the remote network. Software VPNs are particularly useful for the traveling technician, allowing remote troubleshooting to one customer’s site while at another site for long-term support. This sort of flexibility means that a technician can, quite literally, be in two places at once.

refer to:
http://www.automation.com/leveraging-it-technology-for-industrial-controls-applications

2013年9月10日 星期二

Right for the security elements



As shown in the picture, additional security elements include multiple solutions. TenAsys also offers the INtime RTOS family, which can run as a stand-alone RTOS or alongside Microsoft Windows as shown. Both products enable users to partition a multicore platform to run mixed fanless embedded systems, making better use of the processor’s advanced features to provide highly integrated  solutions. (Microsoft and TenAsys are both Associate members of the Alliance.)A factory is only as strong as its weakest link, so every Internet of Things client in the factory needs protection from viruses, malware, and hacking to prevent costly interruptions to factory operation. The 4th generation Intel Core processor adds a number of features to its security portfolio, including McAfee’s Deep Defender technology, which resides between the memory and embedded system to perform real-time memory and CPU monitoring without impacting overall system performance.

They work in harsh environments, and they get little or no recognition. But their impact on power plant efficiency can be significant. Valves and actuators are critical in almost every aspect of single board computer.

refer to: