Power Up: Utilities Must Get Ready To Meet Rising Energy Demand

 

Written by Guilhermme Lisboa and Aman Sheth

 

Recent U.S. energy demand has remained stagnant—until now. Find out how power transmission and distribution companies should prepare for the surge ahead.

Over the past few decades, U.S. energy demand has remained stagnant. Upcoming decades, however, will tell a much different story.

 

In fact, the country is already seeing spikes in energy use. In 2023, for example, grid planners virtually doubled their five-year forecast for load growth (from 2.6% to 4.7%). By 2028, they predict peak demand growth of 38 GW—and this growth will continue to trend upward. The U.S. Energy Information Administration estimates that energy demand will rise to 4.112 billion kWh this year and will stretch to 4.123 billion kWh next year.

What’s Driving Higher Energy Demand?

As the economy, businesses and consumers become more electrified, they create new kinds of energy loads. Here are three examples:

Electric Vehicle

Electric vehicles (EVs) are on the move—literally and figuratively. As more EVs hit the road, they’re also making energy mobile, consuming energy from different places on the grid at different times, depending on when and where they charge. This requires dynamic, real-time control over the grid so electrons can be pushed to wherever they’re needed.

Data Centers

As data centers handle new demands ranging from artificial intelligence (AI) to virtual reality (VR), they play an increasingly critical role in our digital world—and they consume more power. According to commercial real estate advisor Newmark, U.S. data center power consumption will reach 35 GW by 2030, which is almost double the energy they consumed in 2022. As the world becomes more tech-forward, data center deployment will continue.

Industrial Processes

With record investments in U.S. manufacturing supported by key legislation like the Infrastructure Investment and Jobs Act (IIJA), the Creating Helpful Incentives to Produce Semiconductors (CHIPS) and Science Act and the Inflation Reduction Act (IRA), the industry is experiencing significant momentum. And many manufacturing and industrial processes require heat—which will require more energy.

 

What This All Means for Power Transmission and Distribution Companies

The time to prepare for more energy demand is now. Grid infrastructure must be ready to support double-digit load increases in relatively short order, which requires rapid planning for and construction of new power generation and transmission systems.

More Power Generation

As energy demand increases, more power generation will be needed. Because energy transition is moving consumers away from fossil fuels and toward sustainable energy, much of this power generation may happen by adding more wind farms, solar farms and other types of renewable energy sources. Traditional power plants, such as gas-fired plants, will also be needed.

More Transmission Lines

Even more challenging than increasing generation is increasing the country’s number of transmission and distribution lines, which carry energy from where it’s generated to where it’s consumed.

In California, for example, it can take 10 years or longer to build a single high-voltage transmission line. The process involves numerous stakeholders, from landowners who must agree on the line’s route to regulatory bodies that must approve and oversee their construction. Also creating challenges is the grid itself, which is undersized, is many decades old and can’t always support increased power transmission and distribution.

Remember: The grid was designed in and for an earlier era. While it has handled growing energy demands so far, it has a limited capacity to do so in the future. Increasing the flow of electrons on the grid could overload infrastructure and impact voltage and frequency stability.

More Substations

In addition to more lines, power transmission and distribution companies will also need more substations to improve grid resilience, integrate renewable sources of energy, reduce the distance between power generation and consumers and distribute energy loads evenly.

Tomorrow’s substations will need to be intelligent to handle more real-time data—from voltage, flow and current measurements to fault detection, event logging and maintenance records. These digital substations use sensors and this real-time data to support remote monitoring and control, enable digital communication and promote efficient, profitable power supply.

Because they contain their own computers, storage, networking, power, cooling and other infrastructure for given workloads, some even refer to these substations as micro data centers.

More Energy Storage

Energy sources like solar and wind aren’t always predictable. Unlike traditional power plants that generate the same amount of energy at the same times, variables like weather, system orientation and maintenance impact renewable energy generation.

Storage systems act as a warehouse to stock pile energy surpluses that are generated during sunny or windy periods—by consumers’ residential systems as well as utilities’ commercial systems—so it can be released when these resources aren’t as plentiful. This ensures a consistent supply of power and can protect against fluctuations in output or prevent voltage drops and blackouts.

New Job Roles

Remember what we said about digital substations becoming data centers? As this transformation happens, power transmission and distribution teams will need new skills.

A data center environment operates much differently than an operational technology (OT) environment (such as a traditional substation). Utility companies will need IT professionals to oversee software and hardware capabilities in complex substation environments that will include servers and other networking equipment.

In some cases, hiring may be necessary. In other cases, upskilling for existing OT team members can help fill gaps.

It’s Time to Accelerate Digitization

As society progresses and consumes more energy per capita, we all have a responsibility to generate, transmit and distribute energy in a sustainable manner.

Belden enables power transmission and distribution companies to accelerate digitization and outperform industry benchmarks in operational areas like substation automation systems, smart grids and load dispatch centers.

The experts and consultants in our Customer Innovation Centers can help you create a digital roadmap so you can start to prepare now for the surge in energy demand ahead and take advantage of the data being captured by your digital substations to improve operations.

 

Find the original article here

The Time to Build a Foundation for Energy Transition Is Now

Written by Guilhermme Lisboa and Aman Sheth

 

Digitalization can facilitate capabilities that will help power transmission and distribution companies support energy transition.

As the world relies on fossil fuels for energy production and generation, the effects can be far-reaching—from potential property damage to an increase in greenhouse-gas emissions.

The concept of energy transition is changing how people obtain and use energy, moving them away from fossil fuels and toward sustainable energy options.

Countries and U.S. states are moving at their own pace toward energy transition—some faster than others. Within the United States, California, for instance, has an ambitious plan to achieve 100% clean energy by 2045. By 2030, the state plans to source 60% of energy from renewables. Washington State is calling for utilities to phase out coal-fired electricity from state portfolios by 2025 and achieve 100% clean energy by 2045.

While these targets are admirable (and many would argue necessary), they’re also going to be tough to meet in many cases due to the condition and age of power transmission and distribution infrastructure.

The current U.S. grid, for example, is several decades old. It’s also designed to be unidirectional (with power flowing in one direction from the grid to the consumer). But future power demands call for a bidirectional grid (power flowing to the consumer and also back to the grid) to support:

  • Integration of renewable energy systems that allow consumers to infuse excess power generated by their solar and wind systems back into the grid
  • Decentralization that enables energy to be generated closer to where it will be used
  • Increased resilience by allowing stored energy to be tapped for backup power during outages
  • Flexibility for energy flow that moves based on demand (consider electric vehicles, for example)

 

While target dates may seem far away—2030, 2045, etc.—they aren’t as far off as they seem. As power transmission and distribution companies work toward these goals, their efforts are further complicated by increasing energy loads due to factors like:

  • New types of electricity users joining the grid, including electric vehicles and electric heat pumps
  • Electricity consumption from data centers to train and run artificial intelligence
  • Population and economic growth

This all means more transmission and distribution lines, more substations and more communications infrastructure amid this energy transition.

Digitalization: The Energy Transition Enabler

With clean-energy targets in place, power transmission and distribution companies must respond—and the only way they can do so is through digital transformation. According to the latest World Energy Investment report, grid-related investments in digital technologies was expected to reach 19% of total grid investment in 2023.

 

Energy transition requires more sophisticated grids—and refined management and control of these grids. It will also require power transmission and distribution companies to scale quickly.

Consider Brazil as an example of what can happen if your company isn’t prepared. Because of the country’s growth in clean energy and the creation of micro and mini power distributed generation, energy surpluses are being injected back into to Brazil’s grid—but its existing infrastructure isn’t equipped for it, which is causing reliability issues.

That’s where digitalization comes in. It can facilitate new capabilities to support energy transition, such as the three examples below.

1. Enabling Digital Substations

Digital substations replace analog components with digital components (think relays, meters, protection systems, etc.). Digital components are also connected through fiber optic cables.

These substations are almost like micro data centers, with infrastructure that provides power transmission and distribution companies with the capability to capture, utilize and transmit accurate, real-time data.

The digital operations, technologies, methods and processes enabled by digital substations support better visualization for system awareness and resilience. They also give utilities deeper access to their connected digital systems and the opportunity to standardize their data.

2. Supporting Operational Insights

Digital transformation enables power transmission and distribution companies to capture real-time data from their infrastructure (such as through the digital substations we mentioned above) so they can monitor and respond to:

  • Energy demand
  • The mix of energy sources being fed into the grid
  • System uptime
  • Performance issues

The ability to monitor not only operational technology (OT) data, but also data about network performance, will help utilities gain insight into network reliability to gauge problems like congestion or unauthorized access.

3. Enacting Predictive Maintenance

Through devices like sensors, smart meters and SCADA systems, utilities can monitor the condition of their systems and assets to detect operational anomalies, such as abnormal temperature readings or increased vibration.

 

These indicators may be early warning signs of failure. When deviations occur, alerts can automatically be sent to the correct teams so they can prioritize, respond to and address maintenance activities before they escalate to downtime.

 

Find the original article here

IT Security vs. OT Security: What Are The Key Differences?

When most people think about cybersecurity, IT security comes to mind—but OT security is also crucial to protect digital assets and critical infrastructure.

As IT-OT convergence continues, bridging the gap between the two technology disciplines is crucial to create a comprehensive cybersecurity strategy that protects digital assets and safeguards critical infrastructure.

OT security and IT security are both essential aspects of this strategy. Let’s explore some of the differences and similarities between the two security approaches.

 

Scope & Focus

IT Security

When most people think about cybersecurity, IT security comes to mind. It protects an organization’s information technology systems—which include networks, servers, computers, devices and business data—from malicious activity, breaches, unauthorized access and other types of cyberattacks.

The goal of IT security is to maintain data integrity while protecting an organization’s sensitive enterprise data, ensuring confidentiality and stopping unauthorized users and devices from gaining access to corporate information.

In IT, critical security threats often include data breaches, intellectual property theft and other security incidents that could lead to financial loss, reputational damage or compliance issues.

 

OT Security

As opposed to securing enterprise systems, OT security secures industrial control systems, such as supervisory control and data acquisition (SCADA) systems. It also protects the physical processes and machinery that support a plant.

The goal of OT security is to prevent cyber-related issues that can cause operational disruptions. Unplanned downtime in an industrial environment can lead to lost production, missed delivery deadlines and inefficient use of staff resources.

It also aims to prevent the compromise of safety and control systems, as well as the disruption of essential services (think water, gas and electricity) or critical infrastructure, by guarding against breaches or attacks that can create safety hazards, equipment damage, physical harm or environmental risks. These can occur when cyberattacks manipulate settings or processes, tamper with systems or cause equipment malfunction.

 

Technology and Environment

IT Security

An IT environment is usually made up of general-purpose computing devices, such as laptops, desktops, printers, servers, cloud infrastructure, mobile devices and web applications. They can be found in almost any office.

As technology and needs change, the lifecycle of these devices tends to be short. They’re often updated or replaced every few years as they become outdated, less efficient or more vulnerable to security risks. As off-the-shelf devices, they usually run on common operating systems and are straightforward to replace.

IT security helps support use of these devices and systems for safe collaboration and file-sharing, internal and external communication and outreach, accounting and financial processes.

 

OT Security

An OT environment involves specialized devices like sensors, programmable logic controllers (PLCs), distributed control systems (DCSs) and industrial machinery. Instead of being housed in offices, these rugged devices can be found right on the plant floor as they support productivity, monitoring and control.

The lifecycle of OT systems tends to be longer than the lifecycle of IT devices and systems. OT systems may be purpose-built for specific applications or environments, running on specialized software and proprietary protocols. As a result, they’re not upgraded or replaced as often as IT equipment.

Real-time operations are critical in OT environments to make sure a plant can facilitate smooth processes, adjust to changing conditions and detect anomalies or hazardous conditions—all while keeping legacy systems and proprietary protocols in mind.

 

Risk Tolerance

IT Security

IT tends to be more dynamic and faster to respond to immediate threats through regular patching, software updates and vulnerability management. These are common IT practices to reduce the risk of cyberattacks.

 

Because IT environments typically include several similar types of devices, the same patch or upgrade can often be rolled out to many machines at once. They can also be scheduled during periods of office downtime to minimize productivity impacts.

 

OT Security

On the plant floor, safety and reliability are front and center. Anything that could potentially impact operations is approached slowly and carefully. The steps often taken in IT to reduce threats, such as immediate patching and running updates, aren’t as accelerated for OT due to constraints like specialized hardware, legacy systems and long lifecycles.

Scheduling downtime to install patches or updates can disrupt critical processes that may negatively impact production and safety. Because OT prioritizes production and physical safety, some vulnerabilities may remain unpatched for extended periods of time as teams assess complexity, compatibility and possible consequences.

 

Regulatory Landscape

IT Security

Depending on the business or industry, IT environments are often subject to specific industry standards and regulations covering data protection. Consider Payment Card Industry Data Security Standard (PCI DSS), which governs security practices for handling credit card data, or the Health Insurance Portability and Accountability Act (HIPAA) for patient health information and healthcare settings. Non-compliance can result in fines and penalties.

 

OT Security

Critical industries, such as energy, manufacturing, transportation and utilities, are subject to their own OT security regulations and standards. These compliance requirements often differ from traditional IT security regulations because they prioritize safety, reliability and availability of machinery and processes, with a goal of protecting equipment and infrastructure vs. databases or software.

Frameworks like the NIST Cybersecurity Framework SP 800-82 and IEC 62443 are used in some industries for guidance on things like risk assessment, security controls, incident response and reporting obligations.

 

Skillset and Expertise

IT Security

The professionals who work in IT security require a deep understanding of things like network security, endpoint protection, application security and data security. Because they work closely with data, networks and software, their knowledge lies in addressing traditional cyber threats, such as malware, phishing and unauthorized access.

 

OT Security

OT security professionals require a deep understanding of industrial processes, SCADA systems and ICS protocols. Because they work with physical processes and industrial systems, these professionals must have expertise in securing complex physical systems and mitigating cyber risks to equipment and infrastructure.

 

Helping You Strengthen OT Security

Belden and its brands, including macmon, can help you navigate IT-OT convergence so you can experience the benefits it offers, while reducing the risks it can bring to OT security and systems.

Our broad portfolio of industrial cybersecurity solutions offers visibility to and protection from events that threaten the safety, quality and productivity of control systems.

 

Find the original article here

Written by Patrick Deruytter

Anomaly Detection Is the Next Big Thing in Smart Hotels

Written by John Wojnicki

In a hospitality environment, anomaly detection can support optimal operation in many ways—from reservation systems to potential cybersecurity threats. Learn more about why it’s the next big thing in smart buildings.

 

A smart building is a self-sufficient, data-driven building—all about connecting the physical world to the digital world. It generates its own performance data using sensors, devices, systems and detectors. That information can be used to continuously improve efficiency, comfort and safety.

 

In gaming and leisure environments specifically, data gives owners the insights they need to empower staff, wow travelers and add value to the right guest touchpoints—all while driving down costs and optimizing maintenance.

 

When anomalies are detected within the data—inconsistencies that don’t align with normal data patterns or that deviate from established baselines—they can be signs of a potential problem.

 

Anomaly detection is a way to monitor network and system performance, pinpoint data variability and alert the right person when something falls outside normal operating parameters.

 

In hospitality facilities, creating a fabulous guest experience is no longer only about excellent service, impressive amenities or state-of-the-art technology. It’s about preventing situations that may negatively impact guests.

 

Because data anomaly detection uncovers inconsistencies in network and system performance, your team can work behind the scenes to address issues and make sure they don’t turn into larger, more costly problems.

 

The value of anomaly detection in hospitality

When real-time data from smart building devices and sensors is consistently evaluated, anomaly detection can perceive something as simple as a malfunctioning wireless access point or as complex as an entire system malfunctioning.

 

If a wireless access point that supports maintenance activity uses the same channel as your hotel’s videoconferencing platform, for example, this could introduce additional network traffic that causes buffering and jitter.

 

Before users notice these network issues, anomaly detection can identify when network traffic begins to change—by pinpointing an increase in channel utilization on an access point by a certain percentage, for example—and notifies the right people so corrective actions can be taken, if needed.

 

Machine learning can take anomaly detection to the next level by removing manual work from the equation completely. Performance thresholds can be adjusted based on network activity over a period of time. Based on what’s happening, the network can learn to self-heal without anyone stepping in.

 

The real world: anomaly detection in action

In a hospitality environment, anomaly detection can support optimal operation in many ways.

  • Reservation Systems: Anomaly detection algorithms can analyze reservation data to identify irregular booking patterns, such as a sudden influx of bookings from unusual sources or an abnormal number of cancellations. This helps prevent fraudulent activities and protects against reservation system abuse.
  • Employee Activities: Anomaly detection can be used to monitor the flow of employee data. For instance, if an employee accesses sensitive guest information outside their regular work hours or attempts to extract large amounts of data from the system, then this could indicate unauthorized access or data theft.
  • Potential Cybersecurity Threats: Monitoring network traffic within the hospitality space is essential to identify any abnormal activities that may indicate cyberattacks or data breaches. Anomaly detection algorithms can analyze network traffic patterns, detect unusual data transfers or communication patterns and raise alerts for potential security threats.

 

Improve the guest experience in new ways

By identifying and addressing anomalies promptly, gaming and leisure organizations can safeguard operations, protect customer data and maintain a high level of trust and satisfaction. This allows you to prevent problems and improve the guest experience in ways never possible before.

 

Belden can help you create high-quality data acquisition, transmission, orchestration and management solutions that support your innovative hospitality technology initiatives—including anomaly detection.

 

Learn more about how we can help you integrate technology and anomaly detection into the guest experience.

 

Find the original article here

To Dress or Not to Dress: Cable Combing for Category 6A Cabling

Written by Henry Franc

Cable combing or dressing creates neat, organized cables with parallel runs, while also reducing installation time. But find out how it impacts the performance of Category 6A cables.

When your cable installation is exposed and visible, such as in open, overhead cable trays or racks and cabinets, you want it to look professional and pristine. Tangled and misaligned cables are not only unsightly, but also can lead to performance issues if they’re kinked or bent.

That’s where cable combing or dressing comes in. It helps create neat, organized cables with parallel runs. It also reduces labor costs and installation time when multiple cables must be untangled and bundled during a project.

When it comes to lower grades of copper cabling, such as Category 5e and Category 6, combing has always been a regular and recommended practice during installation. But the introduction of Category 6A changed that.

 

How did Category 6A cables change combing practices?

While Category 6A cabling was being developed prior to approval in 2008, it brought with it higher levels of frequency and noise to support 500 MHz of data transmission bandwidth.

But noise sensitivity increases at higher frequencies. As bandwidth increased, so did the importance of controlling cable noise to ensure proper data transmission. First-generation 10GBASE-T systems were so sensitive to noise, in fact, that engineers had to take cell phones out of their pockets before entering lab spaces.

It was also discovered that running Category 6A cables and connectors in parallel was a main contributor to noise—a type of interference we now call “alien crosstalk.”

With lower grades of Category cable and connectors like Category 5e and Category 6, alien crosstalk wasn’t a problem—because it didn’t exist.

Alien crosstalk occurs when a signal on one cable (the “aggressor”) induces noise to the signal of an adjacent cable (the “victim”). Victim and aggressor signals impact each other the most when in parallel. This is why a cable’s copper wires are twisted into pairs: to balance the conductors of a pair and ensure that the differential signal remains equal and opposite. Alien crosstalk must be managed so it doesn’t cause performance issues.

It’s also different from near-end crosstalk (NEXT) and far-end crosstalk (FEXT), which occur within a single cable. Because NEXT and FEXT can be measured and predicted, they can be remediated through digital signal processing. But alien crosstalk is unpredictable interference that comes from outside the cable.

To address this noise-sensitivity issue, manufacturers tried all types of solutions and designs. They did everything from creating cables with very large ODs to using spacers that coiled around the four pairs in an attempt to separate and randomize interfering signals.

Still, due to this level of interference, many manufacturers advised against cable combing for Category 6A—and they still do today.

 

Cable Combing for Category 6A: yes or no?

Today, we often receive questions about cable combing. It was such a common practice with Category 5e and Category 6, but should it be done with Category 6A, given what we learned above? What do best practices dictate?

Here’s our answer: If you use Category 6A solutions from Belden, then cable combing is still fine.

These cables feature our EquiBlock™ design, which provides an equal potential barrier to minimize alien crosstalk to adjacent cables.

We also test our cables to worst-case conditions, using a combed, six-around-one configuration. Six outer cables are laid around a center cable, and cables are tied every 6 to 8 inches along the full length of the channel, bringing connectors closer together as well. Many manufacturers can’t pass six-around-one configuration with four connectors in a shortened (24 m) channel.

Belden passes this testing because its cables and connectors are designed with the best possible balance to exceed all performance characteristics and parameters specified in the Category 6A standard, including alien crosstalk, insertion loss and return loss. And our REVConnect® Connectors provide the best controlled electrical performance possible.

So go ahead—be proud of your installation work and comb your Category 6A cables from Belden if you want. In fact, we encourage it!

It’s important to note, however, that it may be problematic to comb Category 6A cables from other vendors. If another cable manufacturer advises against combing or dressing, then it’s probably wise to listen. Their Category 6A cables likely require randomization (a less tidy installation) to eliminate the potential for alien crosstalk and degraded performance.

Find the original article here

LEMO – Connecting The Alfa Romeo F1 Team Orlen

Written by LEMO

Developing and operating Formula One cars is a mission under very high pressure. For sure, Sauber Motorsport knows something about this: it designs and manufactures the C42 of the Alfa Romeo F1 Team ORLEN. Every component is well thought, analyzed and tested. But also the electric and electronic parts, including connectors.

 

“The space available on a Formula One car is reduced to a minimum, every square centimeter counts” explains Davide Spagnol, Head of Systems Engineering at Sauber Motorsport. “So does every gramme, since performance depends greatly on the weight of the car. Like all the rest, connectors need to be as small and as lightweight as possible.” They must also be very robust. “In order to withstand extreme conditions during races and the handling by mechanics who connect and disconnect them often under stressful conditions!”

 

Formula One is one of the extreme environments that LEMO perfectly masters. LEMO has even developed dedicated solutions, the F Series launched in 1995 and the M Series in 2006. They have been rather successful since both series have been adopted by the FIA and are on board all Formula One cars. The M Series equip even a crucial part, the ECU (electronic control unit), which controls, among other systems, the engine, the throttle pedal, the gear box or even the energy recovery system – in addition to the transmission of masses of data to the team.

 

Alfa Romeo F1 Team ORLEN uses no fewer than twenty different types of LEMO connectors. “Those on the systems which are common to all cars, as well as the ECU and the HIU (hub interface unit), but also on some sensors” explains Davide Spagnol. Others connect the teams communication equipment – “you can find them under the control screens and portable radios.” The drivers even wear them: “The interface to the drivers’ earplug and microphone is also equipped with LEMO connectors.”

 

According to the Davide Spagnol, Sauber has been using LEMO solutions for 25 years. The two Swiss technological groups – sharing the same quest for excellence and a true passion for motorsport – have further strengthened their cooporation this year. They have signed a partnership contract on exchanging products and engineering in view of developing new solutions.

 

Find the original article here

Data Visualisation – 5 Ways to Easily Improve Your Operations

Written by Brainboxes

Wherever you are on your digital transformation journey, data visualisation makes it easy to optimise operations.

Big Data – shorthand for the billions of transactions datasets generated daily – is key in industry, but simply collecting reams and reams of counts and figures isn’t enough. The data must of course be accurate and relevant. Moreover, it’s vital that it can be analysed in the right way to enable businesses to make the best data-driven decisions.

The actionable insights are already there, contained in the data. Data visualisation – viewing information in clear graphical forms – takes the guesswork out of analysing big data by cutting out the noise and making it easier to spot trends, patterns and unusual values (outliers.) Often complex statistical analysis isn’t required; simple data visualisation allows humans to understand the big picture unclouded by individual data points.

 

Data visualisation can gather data from different sources and show it graphically in one place, making it easier to identify organisational opportunities, shine a spotlight on inefficiencies, and help solve other common challenges on the factory floor.

1. Reduce costly errors

To err is human; the ability to spot inevitable mistakes in real-time and respond quickly can make a huge difference.

Using data visualisation to show data from varied sources on a centralised visual dashboard allows supervisors to see everything at a glance (shift productivity, machine downtime, outputs, etc.), making it easier to keep track of every part of the manufacturing process and action fast responses.

 

2. Streamline the supply chain

Data visualisation means you can take data at any given time, and compare it against historical performance data. With historic data visualisation, it’s easier to track ROI and delivery rates, identify where resources are allocated, and manage Overall Equipment Effectiveness to optimise supply chain efficiency.

 

3. Balance quality control with cost-cutting

A visual data model makes it easy to see where resources are spent and proactively identify potential flaws; ensuring that all processes are designed to meet quality assurance standards in the most cost-effective way. Quality doesn’t always have to come at a price; some of the largest quality gains can be made by simple changes highlighted by data visualisation.

 

4.  Identify & eliminate inefficiencies

Enterprise Resource Planning (ERP) is the measurement and management of critical processes, often in real time. Data visualisation lets you discover datasets related to resources, materials, productivity, and shift performance in a comprehensive database. This will enhance ERP, allowing decisions to be made more rapidly and with fewer errors.

 

5.  Data visualisation with free open-source software

Even without the facilities to capture data, it’s possible to prove concepts without wiring sensors, by using free-to-start, open-source software (InfluxDB and Grafana) and Brainboxes BB-400 Industrial Edge Controller.

In industry, it’s common to count how often something changes, store the information, and then review and analyse the information in a graph. For example temperature, parts counts, or machine errors. Node-RED can be used to send data to InfluxDB which can then be visualised in Grafana.

Watch the video above for an easy-to-follow tutorial, that will walk you through sending data from an edge controller to a database in InfluxDB and how to produce graphical visualisations of the data.

 

Find the original article here

Attacks on Mission-Critical Power Infrastructure: Why Cybersecurity Is Necessary

Written by Zane Blomgren

Cyberattacks on utilities are on the rise. To protect mission-critical power infrastructure from threats and vulnerabilities, don’t forget about the cybersecurity basics.

When mission-critical power infrastructure goes down, there’s always an impact: disruption to business, communications, transportation and even vital medical care.

As long as countries have had energy grids and power infrastructure, they’ve been vulnerable to incidents that cause downtime. Decades ago, these events may have involved a tripped transmission line, an incorrect setting on a protective relay, an act of vandalism or nasty weather.

Today, utilities continue to grapple with these threats while juggling new pressures, including cyberattacks. These malicious and deliberate attempts at disrupting or destroying data and/or information systems may be spearheaded by other countries, hacktivists, lone hackers or even organized criminals.

According to research conducted at the end of last year, 2022 set an all-time high for the number of cyberattacks on utilities that took place in a single year.

When it comes to the threat actors that utilities will face tomorrow … who knows? But, no matter the cause, losing power will always be bad news.

As utilities continue their digital journeys, connecting systems to networks to make equipment and data more accessible, their attack surfaces swell while cyberattacks grow. The opportunity for remote assaults also increases. Bad actors from halfway across the world can use remote connectivity with high levels of intelligence and craftiness to bring down mission-critical power infrastructure.

While the industry continues to advance, and cyberattacks become more frequent, securing power infrastructure ecosystems and boosting cyber resilience are the only ways to prevent widespread and potentially disastrous outcomes.

 

A tale: How I realized the value of cybersecurity for utilities

In a previous role several years ago, I remember visiting one power facility in particular. Before I could set foot onsite, I went through an extensive background check. Upon arrival, I walked through a gate secured by armed guards. Before touring the facility, I went through training. As I explored the facility, the staff pointed out a light near the doors: When illuminated, it indicates the possible presence of a physical breach to the facility—my guide used an active shooter as his example. It was clear to me that the plant placed lots of value on its critical infrastructure and was taking steps to protect it. Everyone seemed to have a heightened level of awareness regarding potential threats.

That evening, when I returned to my hotel room, curiosity got the best of me. After doing some simple research, I discovered that some critical infrastructure equipment was openly exposed, using insecure protocols and lacking authentication or security measures to protect them. It was eye-opening—and a good reminder that security at every level is critical to mitigate the potential for negative outcomes.

Rewind to the early 2000s and cybersecurity in the form of Critical Infrastructure Protection (CIP) standards developed by the North American Electric Reliability Corporation (NERC) began to form, bringing cybersecurity up as well as physical security.

The lesson? Don’t forget about the basics. With innovations like artificial intelligence, robotics and virtual reality on the horizon, now is the time to make sure you have the right foundation in place. Otherwise, your advanced technology and processes will fail. Here are some pointers.

 

1. Use NERC CIP as your compass

The Critical Infrastructure Protection (CIP) standards ensure that electric utilities have the right physical and cybersecurity measures in place to protect their critical infrastructure from threats.

While these are compulsory with some real consequences for non-compliance, understand the intent behind the requirements, give thought to what protection is intended and work hard to deliver that protection. They have helped the industry make dramatic improvements to protect critical infrastructure by providing prescriptive guidance in categories like:

  • Control center communications
  • Incident response
  • Network security
  • Personnel and training
  • Physical security of cyber assets
  • Recovery plans
  • System security controls
  • Vulnerability management

These standards provide the framework to secure your critical infrastructure.

 

2. Build and rely on your professional network

While you don’t have to give away trade secrets, having a trusted network of like-minded peers in the power transmission and distribution industry can be valuable to your cybersecurity practices.

It provides a chance to talk about what’s working and what isn’t, share the threats you see in the new digital landscape, explore what other utilities are trying and learn and discuss best practices.

If you don’t have a group of colleagues that you currently network with, consider establishing one to support:

  • Information sharing and collaboration on identifying and mitigating cyber threats
  • Sharing access to resources, tools, training and expertise that can help advance the industry
  • Acquiring advice on tough challenges or new situations

 

3. Explore and prepare your power infrastructure

Good power infrastructure is the foundation for everything: reliability, operational efficiency, customer satisfaction, safety and even sustainability.

The future of utilities is all about connectedness. Your mission-critical infrastructure needs to be ready to support innovations like:

  • Cross-enterprise device integration and data flow for real-time transparency, monitoring and performance alerts
  • Remote monitoring, operation and inspection
  • Seamless communication and collaboration across the utility, from the corporate office to the field
  • Predictive maintenance to optimize equipment repair and replacement
  • Smart scheduling for equipment and labor to improve resource allocation
  • Gain more intelligence and insight from substations to improve decision-making

As technologies and applications like these continue to roll out, they will need to be supported by robust, high-performance telecommunications systems that can manage heavy increases in network traffic and bandwidth consumption.

For example, most utilities have relied on TDM (time-division multiplexing) as their backbone technology to transmit data across networks. As smart grids and smart substations become prolific, however, TDM is becoming obsolete. It can’t support modern communications protocols or keep up with bandwidth requirements.

MPLS-TP (multiprotocol label switching – transport profile) is the best option to replace TDM. It can support legacy systems and next-gen smart grid applications and transport most forms of traffic, including traditional serial-based technologies and IEC 61850 packet-based intelligent electronic devices.

 

Belden: your partner in protecting mission-critical power infrastructure

Belden’s in-house industry experts have decades of experience in helping utilities prepare for the future while maximizing current investments in legacy technology. Our digital automation consultants, solution consultants and solution architects understand the intricacies of the utility market, have worked in the field and have experienced your challenges first-hand.

After understanding your situation and environment, our Customer Innovation Center works closely with you to assess network strengths, deficiencies and workflows; define your goals; outline your best opportunities to increase value and meet KPIs; and present a holistic view of implementation costs and a blueprint that acts as your digital transformation guide.

 

Find the original article here

NetModule’s Success Story – Rhaetian Railway’s WiFi Solution

Written by NetModule

The Project

The Rhaetian Railway transports twelve million passengers on adventurous journeys through Graubünden every year. One third of the 385-kilometre-long route network is 1500 metres above sea level. One third is also a UNESCO World Heritage Site. Thanks to the panoramic Bernina Express and Glacier Express trains and with the Rhaetian Railway in the Albula/Bernina Landscape being named a UNESCO World Heritage, the railway enjoys a global reputation.

In 2016, onway ag (formerly WLAN-Partner AG) installed Public-WiFi at the Rhaetian Railway (RhB) station in St. Moritz as part of a pilot project. Further stations in the RhB network followed. This powerful WiFi is now also being made available to passengers on the train. The RhB already had its own infotainment solution in the Bernina and Glacier Express vehicles. In establishing an internet connection, the company sought to meet the following requirements:

  • Passengers can connect to the infotainment via WiFi and still access other activities online, such as chats, social media, etc.;
  • All requirements of the Federal Act on the Surveillance of Post and Telecommunications Traffic (SPTA) are met (e.g. identification obligation);
  • Fleets can be managed via the same solution.

 

Requirements

The following points convinced RhB that onway’s solution with NetModule hardware was the most suitable:

  • Ongoing legal protection of all Public-WiFi internet access points via the same portal and system – continuous flow of information for both trains and stations;
  • Passengers only need to register once in a six-month period using an SMS token;Security, reliability and speed
  • Central management system for monitoring and managing the entire fleet;
  • Ability to offer different usage models for passengers and company employees.of additional devices

 

Solution

On the hardware side, our certified mobile railroad routers of the NB3800 series were used at RhB for easy networking of large fleets. Our NetModule routers were chosen in this project due to the quality, stability, functionality as well as the modularity of the network components. All data traffic from the vehicle is consolidated using these vehicle routers and routed through a secure VPN tunnel via the mobile network to onway’s data centre.

The VPN tunnel terminates here. The data centre fulfils all central functions such as user authentication, filtering and monitoring user traffic, as well as limiting bandwidths and fulfilling the legal requirements according to the SPTA.

 

onway ag

Since 2004, the onway ag team has been supporting its customers in the evaluation, planning, implementation as well as operation and support of their WLAN/Network-Access-Control-Solutions and has already successfully implemented more than 100 projects. NetModule AG supports onway ag with its products in the industrial, bus and railroad sectors through its long-standing partnership.

Find the original article here

Lightware Saves UAVs From Hard To Detect Power Lines

Written by Nadia Nilsen

“Drone lands on power lines resulting in a power outage for thousands” is certainly not the first or the last news headline of its kind. Overhead power lines pose a serious risk to UAV operations. These incidents could not only result in the loss of the drone and its payload but could also cause injury to people and animals and damage infrastructure and property. Retrieving the drone from high-voltage power lines is also a dangerous task. As a UAV operator, it’s crucial to avoid flying into these obstacles at all costs.

 

Power lines are notoriously difficult to detect. Distribution lines are relatively small, ranging from 0.2 inches (5mm) to 0.8 inches (20mm) in diameter, and are often black, brown, or gray in color. Against a complex and dynamic background, they are difficult to see even with perfect human vision. Moreover, power lines can vary in height depending on location and terrain, making their presence hard to predict. Low visibility or lighting conditions can exacerbate these challenges, making it even more difficult to detect overhead power lines from a distance or at high speed.

 

Power lines are not the only overhead lines that pose a risk to UAVs. Telecommunication lines, internet lines, bridge cables, train and trolley cables and overhead crane wires are just a few other examples. For UAVs to become truly autonomous in a complex world and unlock the full commercial potential of this technology, they need a reliable way to detect and avoid these everyday obstacles.

 

Stereoscopic cameras and computer vision have been woefully unsuccessful in solving this problem. Radar has limited resolution and may not be able to accurately detect small and thin power lines or identify the exact location of the power lines to avoid them. High-resolution radar systems can be expensive, and using them solely for detecting power lines may not be cost-effective. Ultrasonic sensors have a limited range, low resolution and can be negatively impacted by changing environmental factors like wind and temperature.

 

The best technology for detecting these burdensome hazards is LiDAR. With its small beam divergence, LiDAR can pinpoint the location of overhead lines to ensure they can be avoided. LiDAR is unaffected by low visibility or lighting conditions as it generates and pulses its own light source. LiDAR’s relatively long range allows for detection well ahead of a potential collision, even if the UAV is traveling at a high speed.

 

LightWare’s professional-grade microLiDAR® sensors offer all of these benefits in a small form factor with low power consumption at an affordable price point, making them ideal for integration onto drones. These sensors allow for wide adoption, especially in cases where multiple sensors are required to be installed per drone.

 

To detect overhead lines with a narrow LiDAR beam, the key factor is the update rate of the sensor. Imagine you are a fast-moving drone and need to detect a small obstacle with a narrow LiDAR beam. It may seem easy to miss, but with a high update rate scanning LiDAR, it’s nearly impossible to miss. Let’s look at some numbers: if you’re traveling at 60 mph (97 km/h) and pass under a power line with a vertically mounted LightWare SF30/D microLiDAR reading at 20kHZ, then the sensor will hit a passing 0.2 inch diameter line over 360 times and a 0.8 inch line over 1 400 times!

 

The ability to detect power lines not only ensures safe operations of UAVs, but also unlocks commercial opportunities such as fully autonomous power line inspections and other beyond visual line of sight (BVLOS) missions. Customers of LightWare are already using the SF40/C and SF45/B microLiDAR sensors to maintain a safe distance from and follow power lines while capturing high-resolution photos for later analysis.

 

Our team recently ran some tests to see how accurately the SF30/D and SF45/B microLiDAR® sensors detect overhead power lines. The experiment was conducted by holding the sensor outside the window of a moving vehicle pointed directly toward the open sky.

 

The results of this experiment showed that LighWare microLiDAR® sensors were not only detecting the main power lines but also picking up the static lines that run above them. These cables are used for lighting protection and are much thinner than the power lines. To no surprise, the SF30/D and SF45/B microLiDAR® sensors easily managed to detect all the power lines.

Data was logged using LightWare Studio. The objective was to detect the presence or absence of the overhead power lines using the SF30/D and the results show the bundles of power lines as well as the lightning cable that are a few meters above the bundles.

 

Data was logged using LightWare Studio. The next sensor for testing was the SF45/B, which was used for horizontal or vertical detection and avoidance. This test was to determine the type of readings one would receive from the SF45/B when scanning power lines.

 

As a global pioneer in LiDAR, LightWare has a proven track record of delivering technology that exceeds industry expectations.

 

Talk to LightWare’s technical support team to help you solve these and other challenges with LightWare microLiDAR sensors.

 

Find the original article here

Copyright © 2024 Jaycor International
Engineered by: NJIN Agency