Make Sure Today’s Infrastructure Design Supports Tomorrow’s Tech

 

Written by Ron Tellas

 

Just like fiber and copper cabling systems can be certified for performance, smart buildings can be certified for their intelligence and functionality. 

What happens when a smart building doesn’t have a high-performance infrastructure working behind the scenes to handle power and data-transmission needs quickly and efficiently?

 

Bandwidth bottlenecks and latency issues, device and system malfunction, and user inefficiency are sure to be the result.

 

Smart Building Infrastructure Design Considerations

Every smart building is unique based on the goals its owner mapped out (operating-cost improvements, energy-efficiency gains, employee-satisfaction growth, etc.). These distinct objectives help identify the technologies, systems, and devices that should be deployed and integrated throughout the smart building. From there, the right cabling and network infrastructure can be designed to support data access, software platforms, and protocols.

 

Planning a connected infrastructure for a smart building requires many considerations for each application.

 

Cabling and Connectivity

Selecting the right cable type depends on several factors, including performance and bandwidth requirements for current and future applications, distances between telecommunications rooms (TRs) and devices, power requirements, and costs.

 

Most smart buildings rely on a mixture of cabling types:

  • Balanced twisted-pair copper cabling (Single Pair Ethernet or four-pair Category cable)
  • Fiber optic cabling (singlemode or multimode cable)
  • Hybrid fiber-copper cable
  • Specialty cables (RemoteIP Cable, Fault-Managed Power Cable, etc.)

Work Area Outlets vs. Service Outlets

There are two types of work area outlets to consider:

  • Telecom outlets (TOs)
  • Service outlets (SOs)

TOs are used in locations where devices are administered by the user (a laptop or IP phone). SOs connect to more permanent devices that are for a specific application or remain in a certain location (security cameras, wireless access points, etc.). They also support modular plug terminated link (MPTL) topology, which allows horizontal cable to be terminated on one end to an RJ45 plug that connects directly to a device.

 

Pathways and Spaces

ANSI/TIA-569 provides general requirements for pathways and spaces, while ANSI/BICSI-007 covers TR layout and size options. Best practices dictate that pathways and spaces should accommodate future growth of at least 50%. (If you’re renovating an existing facility, however, this isn’t always possible.)

 

Possible scenarios include:

  • A single TR to house telecom equipment and specialty systems, with the core network located in racks in the middle of the room
  • One TR for the core network and one TR for the other systems

Remote Power

Connected devices in smart buildings require low-voltage DC power. PoE and SPoE (Single-Pair Power over Ethernet) that deliver DC power to devices over twisted-pair copper cabling are considered Class 2 power-limited circuits, defined in the National Electrical Code’s Article 725. Class 2 power can also be delivered via hybrid fiber-copper cabling. Some devices, such as those used in professional sound, AV, security, and life-safety systems, are powered via Class 3 power-limited circuits. Both Class 2 and Class 3 circuits limit power-source output.

 

Another way to deliver power to devices in smart buildings is through fault-managed power (FMP), or Class 4 power. In these systems, the circuit is continuously monitored for fault conditions. Fault detection stops the flow of electricity within milliseconds.

 

Like Class 2, Class 4 can be deployed using hybrid fiber-copper cables that bring power and data together over long distances using a single cable run.

 

Evaluate the Connectivity Capabilities of Your Smart Building

Smart-building owners need to not only invest in high-performance infrastructure but also be confident that the infrastructure will operate at its full potential. That way, systems, devices, and people can communicate and connect to the information they need.

 

This confidence comes in the form of certification, achieved through testing which proves that the mission-critical infrastructure operates as intended.

 

Just like cabling systems can be certified for performance, smart buildings can also be certified for their intelligence and functionality.

 

Get to Know SPIRE

SPIRE™ (Smart Buildings Assessment and Rating Program)—a collaboration between TIA and UL Solutions—is an assessment and rating program designed to help owners verify that their building’s systems are integrated to share data and be managed across a single interface.

 

First launched in 2020 and updated in 2023, SPIRE offers a framework that connects owners with technology-agnostic metrics they can use to evaluate building systems, processes, and infrastructure in six areas:

  • Connectivity
  • Cybersecurity
  • Health and well-being
  • Life and property safety
  • Power and energy
  • Sustainability

SPIRE’s connectivity assessment criteria is used to verify the intelligence of the building. It evaluates five areas to make sure the smart building can effectively and efficiently connect and power more people and more IT and OT devices.

  • Media: Assesses the bandwidth and low-power delivery capabilities of media installed throughout the building.
  • Coverage: Assesses support and coverage for IT-OT convergence throughout the building and property.
  • Security: Assesses physical security of building connectivity, infrastructure, and related assets.
  • Expansion: Assesses the ability of connectivity, pathways, and spaces to support expansion.
  • Resilience: Assesses connectivity redundancy and the policies and procedures surrounding the ability of critical operations to continue functioning during an event.

 

Your Resource for ICT Infrastructure in Smart Buildings

Following best practices and standards to design smart building connectivity infrastructure is essential for a futureproof facility.

 

Making the right decisions requires a trusted advisor like Belden. We understand smart buildings and are at the heart of this technology transformation. Our team is here to help you make your smart building safer, more comfortable, more resilient, and more cost-effective.

 

If you want to read more about the topic of designing and selecting ICT infrastructure for smart buildings, read the latest issue of ICT Today, which features an article penned by contributing members of CCCA’s New Technology & Trends Committee, including Belden.

 

Learn more about our smart building solutions.

 

Find the original article here

Cable Testing Tips to Certify Your Copper Cabling System

 

Written by Molly Hunter

 

Following these tips can help ensure that your cable testing results will be accepted and lead to the certification you want for your copper cabling system.

The performance of a copper-based Ethernet cabling system hinges on not only the products selected for installation but also the professionals who install them.

 

If technicians and installers don’t understand the products they install, or they aren’t trained and certified to install those products according to the latest standards and best practices, then the final result likely won’t align with performance expectations. In other words, the owner won’t get the system they paid for.

 

Certified installers know which installation factors matter most when it comes to system reliability. They also make fewer mistakes, and they have a direct line to the manufacturers they work with. If there’s a problem, they can work with the manufacturer to make sure it’s resolved promptly.

 

The Link Between Cable Testing and Certification

If owners want to ensure that their copper cabling installation is done appropriately, the cabling is free from defects, and they won’t face unexpected network performance issues down the road, then cabling-system certification is necessary.

 

Certification is achieved through copper cable testing, which not only proves that the mission-critical infrastructure operates as intended but also gives installers a way to differentiate their work.

 

Belden’s copper cabling products have always been supported by a 10-year product warranty, but when an end-to-end Belden system is installed, these systems are eligible for additional outstanding performance warranties:

  • Product warranties of up to 25 years
  • Lifetime Application Assurance

 

This ensures that the installed copper cabling system will meet or exceed industry standards for 25 years or more, as well as support future standards and protocols. But these performance warranties are only accessible after testing is completed.

 

If you or your customer wants a warranty (and who doesn’t?), then certification is the way to access it.

 

How to Test Copper Cabling Systems

Testing verifies that an installed copper cabling system aligns with standards for performance and installation quality.

 

Cable testing must return a “passing” result for performance parameters like near-end crosstalk, power sum near-end crosstalk, attenuation, and return loss to ensure data-transmission reliability.

 

Following these tips can help ensure that your cable testing results will be accepted and lead to the certification you want:

  • You must use an approved tester brand and model that is recognized by Belden to ensure that the tester meets ANSI/TIA-1152, Requirements for Field Test Instruments and Measurements for Balanced Twisted-Pair Cabling.
  • It’s important to choose the right test limit when setting up a testing device. This tells the tester how you plan to test the copper cabling. The appropriate test limit depends on specific customer testing requirements, the test limit required by the manufacturer, the types of cables and connectors used, etc.
  • According to TIA standards, the tester must be calibrated regularly (typically every 12 months). If you haven’t calibrated the device in a few years, then certification will not be granted based on the test results.
  • To ensure that you test to the latest standards, use the most recent version of the testing software available from the tester manufacturer.
  • Keep dates in mind. For example, Belden issues warranties based on the invoice date. If the system was invoiced on Nov. 1, then that is when the warranty will begin. The certification process extends the warranty from our terms and conditions limitations.

 

Permanent Link or Channel Link Testing?

Channel link testing refers to testing the connection from one active device to another, including patch cords (a patch cord from the outlet to an end device, for example).

 

Permanent link testing verifies the performance of only the fixed portion of the channel—not the entire channel. This means it does not include patch cords.

 

For warranty purposes, you should always test the performance of the channel. While permanent link testing can be done as well, not including the patch cords when testing the entire channel may lead to unexpected results. Why? Because the channel is focused on the foundation of the network.

 

If a permanent link uses high-quality patch cords, then that channel will pass, and only the permanent link needs to be measured. If non-Belden patch cords are used, then the channel test may result in failure due to these poor-quality patch cords. While the permanent link may be perfect, connecting it to poor-quality patch cords degrades the performance quality.

 

Do LinkIQ Test Results Count?

Recently, Belden has seen an increase in LinkIQ test results being submitted for certification—but these results won’t qualify a copper cabling system for a warranty.

 

LinkIQ is a network test that is not an ANSI/TIA-1152-approved tester. The test provides a snapshot in time to say whether a packet (or packets) of data can be sent. It does not measure other cabling performance characteristics that ensure long-term reliability.

 

It analyzes system performance at any moment in time, depending on network conditions like throughput, jitter, latency, etc. While this type of cable testing holds value in many situations, it doesn’t provide enough information for certification.

 

Prepare for Proper Cable Testing

Owners and installers want worry-free cabling systems that perform like they should from the very beginning—and they also want warranties to reduce risk, guard against defects, and protect investments. Properly testing copper cabling for certification is the only way to meet these objectives.

 

Just like with system installation, cutting corners during testing can result in network downtime, wasted resources, and lost revenue.

 

Belden wants to make sure that you’re equipped to conduct tests in the best, most efficient way possible to gather the information required for certification. If you have any questions about this topic, or want to learn more about how we certify our copper cabling systems, please send us a note.

 

Find the original article here

Single Pair Ethernet: Industrial Automation Stakeholders Weigh In

 

Written by Dr. Michael Hilgner, Lukas Bechtel, Cornelia Eitel

 

Meet the stakeholders involved in Single Pair Ethernet decision-making: They help determine whether SPE is right for your industrial automation application.

As Single Pair Ethernet (SPE) extends the use of Ethernet technology beyond automotive applications to sensors and actuators in industrial automation, SPE becomes more visible to and accessible by various user groups.

 

In a recent blog, we covered the five technical SPE features that leaders in industrial environments can use to determine the relevance of the technology for their specific applications. These features include:

  • Seamless communication
  • High bandwidth
  • Long transmission distances
  • Remote power capabilities
  • Installation flexibility

 

But deciding whether to deploy SPE is rarely this simple. The decision to use Single Pair Ethernet is often made by a group of stakeholders with differing priorities and opinions on which SPE features and benefits are most critical or relevant.

 

Below, we introduce the stakeholders who are typically involved in the SPE decision-making process, as well as their specific interests and opportunities when it comes to SPE technology.

 

Construction and Installation Professionals

Communication technology choices have a major influence on the decision to move forward with SPE. Weight, cable routing, installation of data and power cabling, maintenance, and fire protection must be taken into account.

 

In some applications, SPE offers advantages over today’s physical transmission standards:

  • SPE cables can reduce weight compared to other types of copper-based cabling.
  • With a small outer diameter and bend radius, SPE can simplify cable routing.
  • In harsh industrial environments, copper-based transmission, such as SPE, offers durability advantages over fiber-based systems.
  • Thanks to SPE’s remote power capabilities, a single data cable can be used to transmit data and provide power. This can be achieved similar to Power over Ethernet (PoE) via the data pair or by using hybrid cables.

 

Construction of a train is an application where SPE may be beneficial: This is a weight- and space-sensitive environment that exposes cables to harsh conditions. Here, the use of SPE cables for networking control, monitoring systems, and passenger information systems within the train offers significant advantages.

 

Smaller, lighter-weight cables streamline cable routing, take up less space on the train, and increase flexibility for trouble-free installation. This significantly reduces the overall weight of the train, which improves energy efficiency and performance (a lower mass makes it easier to accelerate and decelerate).

 

The cables do not break easily in tight installations or under vibration. At the same time, SPE’s remote power capabilities use data-transmission cables to enable an efficient power supply for sensors, cameras, and displays.

 

The result: better operational efficiency, safety, and passenger experiences.

 

Network Administrators

Once a system is installed, a network administrator must distribute the addresses and authorizations of the communication participants in the network.

 

SPE’s features of seamless communication and remote power play a central role in simplifying network installation and maintenance while supporting common security mechanisms. Seamless communication simplifies integration and management of network components by providing a unified, IP-based communication platform to the sensor/actuator level.

 

This reduces the complexity of network commissioning and supports the efficient application of security mechanisms, such as IEEE 802.1X, and enables end-to-end authentication and encryption across all network levels. SPE’s remote power supply also helps streamline the installation and maintenance of devices by eliminating the need for separate power cables, which is particularly useful when setting up network components in hard-to-reach or remote areas.

 

An example of this can be found in the creation of a secure network in a large warehouse, where SPE is used to integrate a variety of surveillance cameras and access control systems.

 

By using SPE, these devices can be easily connected to data and power over a single cable, significantly reducing installation costs and complexity while facilitating compliance with security standards through IEEE 802.1X to ensure secure and reliable network operation. However, for network-enabled devices, this calls for extra effort in implementing the required functions compared to fieldbuses and potentially requires more hardware resources, such as computing power or memory.

 

Application Programmers

The seamless communication and bandwidth features of SPE are particularly important for application engineers who are involved in programming systems and carrying out factory acceptance tests (FATs). SPE supports efficient, end-to-end IP-based communication, which enables direct and uncomplicated networking of sensors, actuators, and control units.

 

This simplifies the programming and integration of system components, as there are fewer restrictions in terms of compatibility and connectivity. For example, an application engineer can switch flexibly between sensor manufacturers without having the connection as a central selection criterion. At the same time, the switch from fieldbus to Ethernet technology provides end devices with more bandwidth so that additional diagnostic data can be retrieved.

 

In contrast to four- and eight-wire Ethernet connections, SPE enables the use of compact connectors and lighter cables. Compared to fieldbuses, however, SPE requires the implementation of a complete IEEE network stack, which creates additional development costs. Standards development organization ODVA has accepted this challenge and has responded with a reduced functional scope of EtherNet/IP for devices with severe hardware limitations (“constrained devices”). This includes CIP Security with pre-shared keys and control data exchange exclusively via UDP.

 

Application Operators

For application operators tasked with the control, maintenance, and servicing of systems, the remote power and seamless communication features of SPE play a central role.

 

Remote power makes it possible to supply end devices, such as sensors and actuators, with power via Ethernet cables, which simplifies installation and maintenance, especially in difficult-to-access or large-footprint areas.

 

This becomes even more important in the context of remote monitoring and control of installations that use SCADA systems, which require reliable and parallel communication for process control and monitoring. The seamless communication offered by SPE is crucial here to ensure uniform IP-based networking to the sensor/actuator level.

 

This end-to-end connectivity not only facilitates the integration of different system components but also supports the parallel transmission of control commands and real-time data acquisition for SCADA systems.

 

A concrete example of this is the remote control and monitoring of a distributed power generation system. By using SPE, application operators can monitor the output of solar panels and wind turbines in real-time and simultaneously send control commands to inverters and load management systems, ensuring optimum energy yield.

 

The combination of remote power supply and seamless communication enables efficient, reliable, and cost-effective operations management, which is essential for modern infrastructure management. Until now, remote monitoring and control has not been implemented directly with sensor data, but the controllers in the processes have provided aggregated data to SCADA systems. This reduces demand for the sensors in fieldbus applications but requires regular adaptation of the control programs to extract current data.

 

Data Scientists

For data scientists involved in plant-wide data analysis, predictive maintenance, and control optimization, SPE’s bandwidth and seamless communication features are particularly important. The high bandwidth of SPE enables the fast transmission of large amounts of data required for analysis and machine learning. This is crucial for gaining real-time insights and developing accurate predictive models. Seamless communication also facilitates the integration of data from disparate sources via a unified interface, reducing the complexity of data collection and enabling more comprehensive data analysis.

 

A practical example of this is the optimization of production processes in a manufacturing plant. A data scientist can use SPE to collect data from sensors on machines at high frequency and use this information to develop predictive maintenance algorithms. By analyzing this data, potential failures can be detected, and maintenance work can be proactively planned before unplanned downtime occurs.

 

The combination of high bandwidth and seamless communication enables efficient data collection and analysis, leading to a significant increase in plant availability and optimization of operational processes. In current fieldbus environments, sensor connections are isolated by controllers that act as gateways. As a result, data scientists cannot retrieve the sensor data in the required resolution. This limitation restricts their role in current fieldbus environments.

 

Belden’s Focus on SPE

As industry-specific SPE variants continue to be standardized through IEEE 802.3 and stakeholders consider the technology for their industrial automation applications, Belden will help lead the charge in bringing Single Pair Ethernet to industrial automation applications so plants can reap the benefits.

 

Our Single Pair Ethernet portfolio of cabling and connectivity products is designed to optimize Ethernet connection possibilities in harsh environments, including industrial and transportation operations.

 

Find the original article here

Data Center Trends Driven by Faster Speeds and More Bandwidth

 

Written by Belden

 

Data centers are moving toward 400G, 800G and 1T connections. Find out what this means for future data center trends, fiber use and network architecture.

Data center bandwidth continues to climb—and it’s not coming back down any time soon.

 

New technology and applications call for faster speeds. From where we stand today, the industry is moving quickly toward 400G, 800G and even 1T connections (and higher). According to Henkel’s 2024 Data Center Pulse Report, nearly 70% of data center and telecom professionals around the globe have adopted some form of 800G technology (with varying levels of success), and 33% believe the industry will fully transition to widespread use of 1.6T in just one to two years.

 

What does this mean for data centers in the future? For starters, faster speeds equal more fiber. In Getting Granular on Connectivity, a recent webinar led by Data Center Dynamics, Belden Vice President of R&D and Strategy Andrew Oliviero shared his thoughts on data center trends. During the discussion, he explains and explores the connection between data center bandwidth and the need for more fiber.

 

We recapped some of the highlights below, but you can watch the full discussion any time.

Making Data Center Predictions

To support higher data rates, data center trends will involve many upcoming changes. During the Data Center Dynamics webinar, we discussed some of our predictions:

  • As lane rate per wavelength starts to plateau, duplex links are being replaced with parallel links that can offer more fiber-pairs per link.
  • Instead of Top of Row (ToR) layouts, we’ll see more Middle of Row (MoR) and End of Row (EoR) switches with optical switch-to-server interconnects, especially in cloud and hyperscale environments.
  • Historically, data center switch investments have been focused on front-end networks. With the increasing use of AI, however, data center workloads will require new back-end infrastructure driven by high-speed Ethernet or InfiniBand transmission protocol.

 

Multimode and Singlemode Fiber Both Matter

According to the Ethernet Alliance’s Ethernet Roadmap, singlemode deployment hovers between 50% and 60%, and it rises every year.

 

As a result, some industry professionals have been anticipating a slowdown in multimode fiber installation. For now, however, this data center trend isn’t taking hold. Multimode fiber is keeping pace with singlemode—and the Ethernet Roadmap indicates that it will continue to do so for quite some time. For example, many of today’s hyperscale data centers still use multimode fiber links for some of their applications.

 

Although multimode is still relevant, it’s critical that data centers begin to prepare now for the increase in singlemode fiber that will be necessary to accommodate more data transmission and faster speeds.

 

To support these connections, data centers will also need the right components in place. Future networking technologies will continue to drive the importance of high-density fiber optic cable and connectivity, such as:

  • High-density optical distribution frames that support optimal space utilization, scale as business grows and changes, protect signal integrity and support multiple fiber configurations.
  • Multifiber connectors (MPOs) and cassettes that can support the rapid deployment of high-density infrastructure.
  • Ribbon fiber, which saves space and installation time in data centers.
  • Breakout assemblies that can break out to multiple ports to support varying speeds.
  • VSFF (very small form factor) connectors that feature a compact, space-saving design to improve data center density.

 

Changes in Network Architectures

With more data and faster speeds also come different network architectures.

 

Especially in enterprise networks, devices have historically been connected to aggregation switches that then connected to a layer 3 core switch and router.

 

This traditional three-tier hierarchical architecture accommodates traffic between servers that are connected to the same access switch; however, traffic between different access switches transmits through higher-level switch tiers in a north-south pattern. This creates speed and latency differences, which can lead to performance problems in data centers.

 

Today, the industry is migrating to a much simpler, two-tier architecture, where aggregation switches connect directly to spine switches. Called leaf-spine architecture, this approach eliminates a layer of hardware, improves latency and supports better port utilization.

 

Every leaf switch connects to every other leaf and spine switch. To evenly distribute traffic among top-tier switches, the transmission path is chosen randomly. If a switch fails, then performance degradation is minimal (but there are also more fiber connections that must be managed).

 

To connect leaf and spine switches, cross-connect architecture is a popular approach. It uses patch panels that mirror the leaf-switch ports and are connected by permanent cabling instead of by patch cords. This allows data centers to easily change which leaf switch port connects to which spine switch port.

 

Optimizing Data Center Investments

As data center bandwidth gathers speeds, Belden will continue to work with its customers to find systems and innovations that support holistic and client-specific solutions to enable scalability, customizability, high density and modularity.

 

We excel at not only helping data centers prepare for higher speeds and new media types but also finding ways to optimize investments in pre-existing infrastructure to reduce future expenses.

 

Find the original article here

Enabling Affordable Digital Transformation In Plant Operations

 

Written by Matt Wopata

 

Uniting Ignition and Hirschmann’s OpEdge family helps your plant implement digital transformation faster so you can see ROI sooner as you capture, process and visualize critical data.

Bringing computing intelligence to the edge of an OT network unlocks new waves of advanced automation capabilities, from predictive maintenance that anticipates equipment needs to intelligent robotics that self-operate (think automated guided vehicles, for example).

 

According to MIT Technology Review, 27% of manufacturing plants have edge computing in production today, with another 56% prepared to kick off pilot projects in the next two years.

 

Bringing Edge Computing to Automation Infrastructure with OpEdge

To process large volumes of operational data in today’s connected industrial environments, Hirschmann OpEdge-8D brings edge computing capabilities to automation infrastructure.

 

Acting as a robust industrial edge gateway, it allows mission-critical applications to run at the network edge, enabling plants to quickly transform their heaps of local data into useful insights and actions. When integrated with Belden Horizon™ Console Edge Orchestration, cloud-hosted device management, application orchestration and secure remote access functionality are all possible.

 

Designed to complement OT spaces, the OpEdge-8D platform is easy to use and install, supports application deployment in a few different ways and can be used with many systems and applications.

 

How Belden and Inductive Automation Work Together

To help industrial environments take full advantage of what digital transformation has to offer, Belden partners with industry players, such as Inductive Automation, a provider of industrial automation software, to provide solutions that help industrial environments fulfill their Industry 4.0 journey.

 

Inductive Automation’s Ignition software removes the technological and economic obstacles associated with bridging production and IT so plants can turn great ideas into reality quickly. It enables the creation of virtually all kinds of industrial applications, including SCADA, IIoT, MES (machine execution systems) and more—all on one platform.

 

Uniting Ignition and Hirschmann’s OpEdge family makes affordable digital transformation and edge computing possible for industrial operations in three ways.

1. Faster Time to Value

The Belden Horizon Console streamlines the onboarding, configuration and maintenance of OT gateways, end devices (e.g., PLCs and I/O) and edge applications through three main services:

  • Belden Horizon Device Manager allows users to seamlessly onboard and configure Belden and ProSoft edge gateways.
  • Belden Horizon Edge Orchestration allows users to seamlessly deploy and manage edge applications (e.g., Ignition containers) on fleets of Hirschmann OpEdge hardware.
  • Belden Horizon Secure Remote Access (SRA) allows users to remotely access and configure both the OT end device connected to the Hirschmann gateways (e.g., PLCs and I/O) and the edge applications running on the gateways (e.g., accessing an Ignition instance running on an OpEdge).

2. Lower Maintenance Costs

The Belden Horizon Console helps users reduce two types of maintenance costs associated with IIoT deployments:

  • Troubleshooting time associated with OT end devices can be reduced by leveraging Belden Horizon Console’s SRA software, which empowers technicians to remotely connect to OT assets and applications and eliminates the need to travel onsite. The Belden Horizon Console also supports remote packet captures, allowing network engineers to diagnose pesky network-related issues.
  • Fleet management costs associated with updating OT devices and edge applications can be reduced thanks to the Belden Horizon Console’s ability to provide secure remote access to OT devices and edge applications (like Ignition) and update multiple Hirschmann OpEdge systems simultaneously.

3. Certified Performance

OpEdge-8D is one of the industry’s first certified Ignition edge devices. The certification is granted by Inductive Automation to devices that are fully compatible with Ignition Edge software and are ready to be pre-imaged with it.

 

This gives you the confidence to launch Ignition software and easily and affordably expand your system to capture, process and visualize large volumes of critical operational data at the edge.

Explore Our Ecosystem Partnerships

We partner with industry experts to connect you with the products and solutions you need—all in one place—to streamline project complexity while maximizing business value and agility for digital transformation.

 

Find the original article here

3 Steps For A Smooth Transition To Digital Transformation

Written by Jeremy Friedmar

 

It’s time to move from big data to smart data in manufacturing. How can your plant prepare? By following these three steps for digital transformation.

It’s time to shift from “big data” to “smart data.” Plants are no longer concerned about collecting information—most are knee-deep in it. Instead, they’re now questioning how to get more value from their data, whether it’s used to improve processes, reduce costs or optimize equipment efficiency.

 

But many manufacturers can’t extract valuable insights from their data because they’re still trying to figure out how to manage the sheer volume of information generated at every step in the production process, from production to quality control.

 

How can you move from overwhelm to action? By following these three steps for digital transformation.

Step 1: Develop a Solid Network Infrastructure

To support the transmission of data from point A to point B, you need to build a solid network infrastructure that can support increasing numbers of devices.

 

What characteristics make a network up to the challenge?

  • High bandwidth. Bandwidth sets the limit for how much data can flow through the network. With the number of connected devices growing every day, the result is more traffic. An increase in traffic means that more bandwidth is required.
  • Low latency. Managing latency is essential for processes that require determinism (consider robotic arms, for example). Low levels of latency help ensure that a specific action executes reliably and consistently, so you always know exactly when it will occur (in the case of a robotic arm, this means knowing when the arm will perform an expected movement).
  • Security. To protect critical processes, networks must incorporate tools and best practices that prevent and detect cybersecurity issues, such as unauthorized access, tampering or disruption.
  • Remote management. By providing remote access to the network, workers can monitor and control network activity and devices from anywhere to minimize downtime and optimize performance.

 

All these factors work together to improve uptime and keep mission-critical networks running. This minimizes disruption, maintains revenue and reduces waste.

Step 2: Make Sure Your Network Can Support Data Contextualization

Through sensors and automation systems, industrial environments are producing copious amounts of data. In order to do anything with this data, however, your network must be able to support the deployment of software that can process and contextualize it. This will help you quickly digest complex datasets to uncover patterns, establish benchmarks and predict future trends.

 

These resources can be deployed at the edge, in the cloud or both (a hybrid approach). How do you know which is right for you?

  • Edge computing helps you maintain control over your data and reduces latency by decreasing the physical distance between data sources and destinations. Some companies also choose this option for security reasons (to eliminate internet connectivity).
  • Cloud computing removes the burden of having to develop your own infrastructure for data storage and management. It also helps you easily access and manage data remotely.
  • Hybrid offers a mix of both so your plant can reap the benefits of edge computing and cloud computing while using the most effective resource for each workload.

Step 3: Follow Established Best Practices

Following best practices can help you overcome the challenges you’ll confront along your digital transformation journey. Consider interoperability among automation products, for example: Guidance is available from organizations like the NAMUR User Association of Automation Technology in Process Industries.

 

The manufacturers and integrators you partner with can always step in to provide help in this area as well, sharing what they know and have learned through their years of hands-on work.

Make Digital Transformation Your Competitive Advantage

Belden is here to offer the right guidance and help you take the right steps so you reap the benefits of innovation as you embark on your digital transformation journey.

 

Manufacturers that are efficiently digitalized will have a clear competitive advantage: They’ll be able to use data to drive differentiators like predictive maintenance, operational visibility and faster troubleshooting and diagnosis.

 

Our Customer Innovation Center experts can help you design, develop and validate solid network solutions tailored to the complexity of your unique business needs so you can unleash the power of your OT data.

 

Find the original article here

Power Up: Utilities Must Get Ready To Meet Rising Energy Demand

 

Written by Guilhermme Lisboa and Aman Sheth

 

Recent U.S. energy demand has remained stagnant—until now. Find out how power transmission and distribution companies should prepare for the surge ahead.

Over the past few decades, U.S. energy demand has remained stagnant. Upcoming decades, however, will tell a much different story.

 

In fact, the country is already seeing spikes in energy use. In 2023, for example, grid planners virtually doubled their five-year forecast for load growth (from 2.6% to 4.7%). By 2028, they predict peak demand growth of 38 GW—and this growth will continue to trend upward. The U.S. Energy Information Administration estimates that energy demand will rise to 4.112 billion kWh this year and will stretch to 4.123 billion kWh next year.

What’s Driving Higher Energy Demand?

As the economy, businesses and consumers become more electrified, they create new kinds of energy loads. Here are three examples:

Electric Vehicle

Electric vehicles (EVs) are on the move—literally and figuratively. As more EVs hit the road, they’re also making energy mobile, consuming energy from different places on the grid at different times, depending on when and where they charge. This requires dynamic, real-time control over the grid so electrons can be pushed to wherever they’re needed.

Data Centers

As data centers handle new demands ranging from artificial intelligence (AI) to virtual reality (VR), they play an increasingly critical role in our digital world—and they consume more power. According to commercial real estate advisor Newmark, U.S. data center power consumption will reach 35 GW by 2030, which is almost double the energy they consumed in 2022. As the world becomes more tech-forward, data center deployment will continue.

Industrial Processes

With record investments in U.S. manufacturing supported by key legislation like the Infrastructure Investment and Jobs Act (IIJA), the Creating Helpful Incentives to Produce Semiconductors (CHIPS) and Science Act and the Inflation Reduction Act (IRA), the industry is experiencing significant momentum. And many manufacturing and industrial processes require heat—which will require more energy.

 

What This All Means for Power Transmission and Distribution Companies

The time to prepare for more energy demand is now. Grid infrastructure must be ready to support double-digit load increases in relatively short order, which requires rapid planning for and construction of new power generation and transmission systems.

More Power Generation

As energy demand increases, more power generation will be needed. Because energy transition is moving consumers away from fossil fuels and toward sustainable energy, much of this power generation may happen by adding more wind farms, solar farms and other types of renewable energy sources. Traditional power plants, such as gas-fired plants, will also be needed.

More Transmission Lines

Even more challenging than increasing generation is increasing the country’s number of transmission and distribution lines, which carry energy from where it’s generated to where it’s consumed.

In California, for example, it can take 10 years or longer to build a single high-voltage transmission line. The process involves numerous stakeholders, from landowners who must agree on the line’s route to regulatory bodies that must approve and oversee their construction. Also creating challenges is the grid itself, which is undersized, is many decades old and can’t always support increased power transmission and distribution.

Remember: The grid was designed in and for an earlier era. While it has handled growing energy demands so far, it has a limited capacity to do so in the future. Increasing the flow of electrons on the grid could overload infrastructure and impact voltage and frequency stability.

More Substations

In addition to more lines, power transmission and distribution companies will also need more substations to improve grid resilience, integrate renewable sources of energy, reduce the distance between power generation and consumers and distribute energy loads evenly.

Tomorrow’s substations will need to be intelligent to handle more real-time data—from voltage, flow and current measurements to fault detection, event logging and maintenance records. These digital substations use sensors and this real-time data to support remote monitoring and control, enable digital communication and promote efficient, profitable power supply.

Because they contain their own computers, storage, networking, power, cooling and other infrastructure for given workloads, some even refer to these substations as micro data centers.

More Energy Storage

Energy sources like solar and wind aren’t always predictable. Unlike traditional power plants that generate the same amount of energy at the same times, variables like weather, system orientation and maintenance impact renewable energy generation.

Storage systems act as a warehouse to stock pile energy surpluses that are generated during sunny or windy periods—by consumers’ residential systems as well as utilities’ commercial systems—so it can be released when these resources aren’t as plentiful. This ensures a consistent supply of power and can protect against fluctuations in output or prevent voltage drops and blackouts.

New Job Roles

Remember what we said about digital substations becoming data centers? As this transformation happens, power transmission and distribution teams will need new skills.

A data center environment operates much differently than an operational technology (OT) environment (such as a traditional substation). Utility companies will need IT professionals to oversee software and hardware capabilities in complex substation environments that will include servers and other networking equipment.

In some cases, hiring may be necessary. In other cases, upskilling for existing OT team members can help fill gaps.

It’s Time to Accelerate Digitization

As society progresses and consumes more energy per capita, we all have a responsibility to generate, transmit and distribute energy in a sustainable manner.

Belden enables power transmission and distribution companies to accelerate digitization and outperform industry benchmarks in operational areas like substation automation systems, smart grids and load dispatch centers.

The experts and consultants in our Customer Innovation Centers can help you create a digital roadmap so you can start to prepare now for the surge in energy demand ahead and take advantage of the data being captured by your digital substations to improve operations.

 

Find the original article here

Beating The OT Security Skills Gap Amid Rising Cyber Threats

 

Written by Zane Blomgren

 

The cybersecurity workforce is growing, but not fast enough to fill positions or keep up with cyber threats. Hiring isn’t the answer—tech and automation are.

When it comes to the future of OT cybersecurity, the outlook is ominous.

 

There are, of course, some positives to consider. In general, the cybersecurity workforce is growing (by almost 9% in the last year alone!).

 

The bad news: It’s not growing fast enough to fill the rising number of open positions—or to combat growing numbers of cyber threats. Moody’s Analytics reports that, in the past five years, the number of publicly reported cyber incidents has doubled. If these critical roles remain unfilled, then organizations and people will face higher risk of data breaches, unplanned downtime, privacy violations and financial fraud.

 

The report also details these critical statistics:

  • Cyber incidents have “substantial, statistically significant and persistent negative impact” on company value.
  • There’s an obvious connection between cybersecurity performance and rises in reported incidents.

 

Companies say they’re already feeling the effects of the ever-shrinking workforce. In The Life and Times of Cybersecurity Professionals, published by Enterprise Strategy Group in 2023, 71% of organizations report impacts from the shortage. And 67% of surveyed cybersecurity professionals say their organizations lack cyber staff to prevent and troubleshoot cyber-threat issues.

 

Although these numbers are daunting, the situation is even more dire in OT cybersecurity. Because these professionals must have specialized expertise in specialized industrial control systems and physical infrastructure processes, they’re harder to find.

 

There’s no easy way out of this conundrum. The problem is too big and too complex to be solved through recruiting, hiring or training, because there aren’t enough qualified employees in the workforce to fill these roles. But that doesn’t mean there aren’t solutions.

For example, automation and technology can help cybersecurity professionals be more effective and efficient so they can focus on strategic work—reducing and responding to cyber threats—instead of manual tasks. Let’s take a look at how this can be done.

Streamline Security Response

Incident response isn’t simple or straightforward, due in part to the complexity and diversity of systems. OT environments are made up of a wide variety of architectures, protocols and proprietary components. This makes it difficult to create standardized incident response procedures. Today, when a cyber threat appears or an incident occurs, most security professionals must chase down how to respond.

 

The language of security is complicated, too, which prevents valuable conversations about it. Complexity makes it intimidating for others to get involved or help address issues.

 

Monitoring 24/7 is critical to simplify the complex. It ensures that network performance and access are always being evaluated—and that data is readily available. Anomalies can be reported to the right place upon detection for further investigation.

 

When a cyber threat is identified, the appropriate way to fix it should also be at the worker’s fingertips. Remediation guidance should be accessible and live close to the problem.

 

Look for vendors that offer simplified interfaces and take a general approach to security. This removes unnecessary work associated with accessing systems, reviewing logs and reports, etc. It also makes it easier for others in the organization to support the cyber team’s efforts (through participation in education that prevents accidental insider threats, for example).

Simplify System and Network Designs

When possible, look for ways to simplify and standardize network design, firewall rules, physical layout, etc. This ensures simple yet effective security.

 

Remember: “Simplified” doesn’t always mean “simple.” Instead, simplification is about removing roadblocks; breaking down processes and concepts into smaller, more digestible pieces; and making things easier to understand.

 

Some examples:

  • If you can do the job with one piece of hardware instead of three, use one (as long as it provides everything you need.) For example, Hirschmann’s Industrial HiVision network management software can help you support management of network devices, simplify device replacement and enhance network visibility.
  • Put measures in place to prevent and avoid revisiting or rework. This can mean using modern technology with proper access controls and standardized security measures, as well as clearly defining roles for IT, OT and external partners.

 

If your team doesn’t have the skills to do these things, bring in an advisor who understands industrial networking and cyber threats. That’s one way to increase manpower without having to recruit and hire more staff.

 

Integrate Tools to Eliminate Siloes

Integration helps eliminate siloes, enable holistic overviews and enable automation. Integrating cybersecurity tools results in fewer touchpoints and repetitive tasks. For example, integration with Active Directory means you don’t have to manually add users from scratch to every system.

 

It also reduces the likelihood of human error, which removes the opportunity for security risks. For example, most outages related to human error are caused by people who ignored procedures or followed inadequate procedures.

 

Tools should not only be integrated with each other, but also with the business. IT and OT can learn from one another and share best practices. For example, these groups can work together to recognize disparities, implement effective security measures tailored to each environment and apply practices holistically to protect critical infrastructure.

 

Artificial intelligence (AI) can support these efforts, helping you automate network intelligence by completing tasks like analyzing for misconfigurations and vulnerabilities, as well as system mapping to understand system-wide weaknesses and prevent incidents.

Consolidate Partnerships to Minimize Vendor Sprawl

Finally, consider consolidating vendors. This offers many benefits:

  • Fewer contracts and relationships to manage, simplifying procurement
  • Clearer communication channels that lead to improved collaboration and problem-solving
  • Easier auditing and monitoring of vendor performance
  • Simplified interoperability and integration
  • Centralized and consolidated information
  • Streamlined budgeting

 

It also helps reduce misconfigurations and incompatibility, so there’s less finger pointing between vendors and more time for strategic security practices.

Educating the Next Generation

Instead of focusing on recruiting and hiring, make sure you prioritize training the next-generation cybersecurity workforce that’s already in place, and taking steps to simplify what they do so they can respond to cyber threats. This will make the existing workforce as effective and efficient as possible.

 

Belden believes in making OT and OT cybersecurity professions as attractive as possible. If you have questions about how to create an OT environment that supports up-and-coming workers, we’re here to help.

Find the original article here

The Time to Build a Foundation for Energy Transition Is Now

Written by Guilhermme Lisboa and Aman Sheth

 

Digitalization can facilitate capabilities that will help power transmission and distribution companies support energy transition.

As the world relies on fossil fuels for energy production and generation, the effects can be far-reaching—from potential property damage to an increase in greenhouse-gas emissions.

The concept of energy transition is changing how people obtain and use energy, moving them away from fossil fuels and toward sustainable energy options.

Countries and U.S. states are moving at their own pace toward energy transition—some faster than others. Within the United States, California, for instance, has an ambitious plan to achieve 100% clean energy by 2045. By 2030, the state plans to source 60% of energy from renewables. Washington State is calling for utilities to phase out coal-fired electricity from state portfolios by 2025 and achieve 100% clean energy by 2045.

While these targets are admirable (and many would argue necessary), they’re also going to be tough to meet in many cases due to the condition and age of power transmission and distribution infrastructure.

The current U.S. grid, for example, is several decades old. It’s also designed to be unidirectional (with power flowing in one direction from the grid to the consumer). But future power demands call for a bidirectional grid (power flowing to the consumer and also back to the grid) to support:

  • Integration of renewable energy systems that allow consumers to infuse excess power generated by their solar and wind systems back into the grid
  • Decentralization that enables energy to be generated closer to where it will be used
  • Increased resilience by allowing stored energy to be tapped for backup power during outages
  • Flexibility for energy flow that moves based on demand (consider electric vehicles, for example)

 

While target dates may seem far away—2030, 2045, etc.—they aren’t as far off as they seem. As power transmission and distribution companies work toward these goals, their efforts are further complicated by increasing energy loads due to factors like:

  • New types of electricity users joining the grid, including electric vehicles and electric heat pumps
  • Electricity consumption from data centers to train and run artificial intelligence
  • Population and economic growth

This all means more transmission and distribution lines, more substations and more communications infrastructure amid this energy transition.

Digitalization: The Energy Transition Enabler

With clean-energy targets in place, power transmission and distribution companies must respond—and the only way they can do so is through digital transformation. According to the latest World Energy Investment report, grid-related investments in digital technologies was expected to reach 19% of total grid investment in 2023.

 

Energy transition requires more sophisticated grids—and refined management and control of these grids. It will also require power transmission and distribution companies to scale quickly.

Consider Brazil as an example of what can happen if your company isn’t prepared. Because of the country’s growth in clean energy and the creation of micro and mini power distributed generation, energy surpluses are being injected back into to Brazil’s grid—but its existing infrastructure isn’t equipped for it, which is causing reliability issues.

That’s where digitalization comes in. It can facilitate new capabilities to support energy transition, such as the three examples below.

1. Enabling Digital Substations

Digital substations replace analog components with digital components (think relays, meters, protection systems, etc.). Digital components are also connected through fiber optic cables.

These substations are almost like micro data centers, with infrastructure that provides power transmission and distribution companies with the capability to capture, utilize and transmit accurate, real-time data.

The digital operations, technologies, methods and processes enabled by digital substations support better visualization for system awareness and resilience. They also give utilities deeper access to their connected digital systems and the opportunity to standardize their data.

2. Supporting Operational Insights

Digital transformation enables power transmission and distribution companies to capture real-time data from their infrastructure (such as through the digital substations we mentioned above) so they can monitor and respond to:

  • Energy demand
  • The mix of energy sources being fed into the grid
  • System uptime
  • Performance issues

The ability to monitor not only operational technology (OT) data, but also data about network performance, will help utilities gain insight into network reliability to gauge problems like congestion or unauthorized access.

3. Enacting Predictive Maintenance

Through devices like sensors, smart meters and SCADA systems, utilities can monitor the condition of their systems and assets to detect operational anomalies, such as abnormal temperature readings or increased vibration.

 

These indicators may be early warning signs of failure. When deviations occur, alerts can automatically be sent to the correct teams so they can prioritize, respond to and address maintenance activities before they escalate to downtime.

 

Find the original article here

IT Security vs. OT Security: What Are The Key Differences?

When most people think about cybersecurity, IT security comes to mind—but OT security is also crucial to protect digital assets and critical infrastructure.

As IT-OT convergence continues, bridging the gap between the two technology disciplines is crucial to create a comprehensive cybersecurity strategy that protects digital assets and safeguards critical infrastructure.

OT security and IT security are both essential aspects of this strategy. Let’s explore some of the differences and similarities between the two security approaches.

 

Scope & Focus

IT Security

When most people think about cybersecurity, IT security comes to mind. It protects an organization’s information technology systems—which include networks, servers, computers, devices and business data—from malicious activity, breaches, unauthorized access and other types of cyberattacks.

The goal of IT security is to maintain data integrity while protecting an organization’s sensitive enterprise data, ensuring confidentiality and stopping unauthorized users and devices from gaining access to corporate information.

In IT, critical security threats often include data breaches, intellectual property theft and other security incidents that could lead to financial loss, reputational damage or compliance issues.

 

OT Security

As opposed to securing enterprise systems, OT security secures industrial control systems, such as supervisory control and data acquisition (SCADA) systems. It also protects the physical processes and machinery that support a plant.

The goal of OT security is to prevent cyber-related issues that can cause operational disruptions. Unplanned downtime in an industrial environment can lead to lost production, missed delivery deadlines and inefficient use of staff resources.

It also aims to prevent the compromise of safety and control systems, as well as the disruption of essential services (think water, gas and electricity) or critical infrastructure, by guarding against breaches or attacks that can create safety hazards, equipment damage, physical harm or environmental risks. These can occur when cyberattacks manipulate settings or processes, tamper with systems or cause equipment malfunction.

 

Technology and Environment

IT Security

An IT environment is usually made up of general-purpose computing devices, such as laptops, desktops, printers, servers, cloud infrastructure, mobile devices and web applications. They can be found in almost any office.

As technology and needs change, the lifecycle of these devices tends to be short. They’re often updated or replaced every few years as they become outdated, less efficient or more vulnerable to security risks. As off-the-shelf devices, they usually run on common operating systems and are straightforward to replace.

IT security helps support use of these devices and systems for safe collaboration and file-sharing, internal and external communication and outreach, accounting and financial processes.

 

OT Security

An OT environment involves specialized devices like sensors, programmable logic controllers (PLCs), distributed control systems (DCSs) and industrial machinery. Instead of being housed in offices, these rugged devices can be found right on the plant floor as they support productivity, monitoring and control.

The lifecycle of OT systems tends to be longer than the lifecycle of IT devices and systems. OT systems may be purpose-built for specific applications or environments, running on specialized software and proprietary protocols. As a result, they’re not upgraded or replaced as often as IT equipment.

Real-time operations are critical in OT environments to make sure a plant can facilitate smooth processes, adjust to changing conditions and detect anomalies or hazardous conditions—all while keeping legacy systems and proprietary protocols in mind.

 

Risk Tolerance

IT Security

IT tends to be more dynamic and faster to respond to immediate threats through regular patching, software updates and vulnerability management. These are common IT practices to reduce the risk of cyberattacks.

 

Because IT environments typically include several similar types of devices, the same patch or upgrade can often be rolled out to many machines at once. They can also be scheduled during periods of office downtime to minimize productivity impacts.

 

OT Security

On the plant floor, safety and reliability are front and center. Anything that could potentially impact operations is approached slowly and carefully. The steps often taken in IT to reduce threats, such as immediate patching and running updates, aren’t as accelerated for OT due to constraints like specialized hardware, legacy systems and long lifecycles.

Scheduling downtime to install patches or updates can disrupt critical processes that may negatively impact production and safety. Because OT prioritizes production and physical safety, some vulnerabilities may remain unpatched for extended periods of time as teams assess complexity, compatibility and possible consequences.

 

Regulatory Landscape

IT Security

Depending on the business or industry, IT environments are often subject to specific industry standards and regulations covering data protection. Consider Payment Card Industry Data Security Standard (PCI DSS), which governs security practices for handling credit card data, or the Health Insurance Portability and Accountability Act (HIPAA) for patient health information and healthcare settings. Non-compliance can result in fines and penalties.

 

OT Security

Critical industries, such as energy, manufacturing, transportation and utilities, are subject to their own OT security regulations and standards. These compliance requirements often differ from traditional IT security regulations because they prioritize safety, reliability and availability of machinery and processes, with a goal of protecting equipment and infrastructure vs. databases or software.

Frameworks like the NIST Cybersecurity Framework SP 800-82 and IEC 62443 are used in some industries for guidance on things like risk assessment, security controls, incident response and reporting obligations.

 

Skillset and Expertise

IT Security

The professionals who work in IT security require a deep understanding of things like network security, endpoint protection, application security and data security. Because they work closely with data, networks and software, their knowledge lies in addressing traditional cyber threats, such as malware, phishing and unauthorized access.

 

OT Security

OT security professionals require a deep understanding of industrial processes, SCADA systems and ICS protocols. Because they work with physical processes and industrial systems, these professionals must have expertise in securing complex physical systems and mitigating cyber risks to equipment and infrastructure.

 

Helping You Strengthen OT Security

Belden and its brands, including macmon, can help you navigate IT-OT convergence so you can experience the benefits it offers, while reducing the risks it can bring to OT security and systems.

Our broad portfolio of industrial cybersecurity solutions offers visibility to and protection from events that threaten the safety, quality and productivity of control systems.

 

Find the original article here

Written by Patrick Deruytter

Copyright © 2024 Jaycor International
Engineered by: NJIN Agency
This is a Blog Category Page