23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Trends and Challenges for Industrial Communication Systems 67-3<br />

scalability, or low costs. “Universal” networks that can satisfy every possible connectivity need do not<br />

exist, but hybrid networks are getting close.<br />

A hybrid network consists of more than one <strong>communication</strong> channel, ideally of very diverse<br />

channels. An example is a mobile device with GPRS and GPS. It combines a bidirectional best-effort<br />

channel with a unidirectional information source. Similar thoughts are behind energy management<br />

nodes that use Internet and electricity grid frequency as information sources [FK07].<br />

Another possibility to move toward universal networks is newer developments where features of<br />

several domains were combined. Most notably, this happened on the media access control layer in the<br />

case of networks like IEEE 1394 or IEC 61580. Typically, one part of the bandwidth is reserved for deterministic<br />

traffic (i.e., isochronous slots), while the rest of it can be arbitrated in a CSMA way as many<br />

other networks do. With this hybrid design, two very different network qualities can be achieved: Easy<br />

scalability for non-real-time services and guaranteed service for real-time applications.<br />

An important factor for hybrid designs is how quality of services (QoS) is implemented. As surely, the<br />

IP suite will play a continuously important role in ICS, it is good to know that version 6 of IP addresses<br />

QoS. Although one (especially an ICS) can still feel v4’s problems in v6, it has at least (beside its oftenmentioned<br />

better scalability) flow labeling, better priorities, and is prepared for extended headers that<br />

might contain additional QoS information. Surely, the designers of IPv6 QoS had multimedia services<br />

in mind, but ICS are also sensitive to (all four aspects of) QoS:<br />

• Bandwidth<br />

• Latency (packet delay)<br />

• Latency variation (jitter)<br />

• Packet loss<br />

Bandwidth might be the least important aspect in 80% of all <strong>industrial</strong> <strong>communication</strong> (especially<br />

automation) cases, but robot vision and image processing is on the rise at the shop floor. Also, the size<br />

of installations and the number of nodes is dramatically increasing, so bandwidth will play a larger role<br />

than up to now where an IP network over 100 Mb Ethernet will practically never experience a bandwidth<br />

problem in an automation environment. Latency and jitter are most important for network-based<br />

control where guaranteed timely behavior is required. Especially, time synchronization—a very important<br />

service in distributed <strong>systems</strong> (think of system diagnostics in process control or multimedia)—<br />

needs accurately defined upper boundaries for latency. Packet loss is no problem for media streams but<br />

counted quantities during production or emergency shutdown messages demand high availability and<br />

reliability of the ICS. It is to be expected that QoS will play a more prominent and visible role in the<br />

future of ICS. The existing proposals and implementation of IPv6 QoS is certainly not sufficient for ICS<br />

and we have to work on suitable extensions, probably via its flexible header.<br />

67.5 M2M Communication<br />

Machines are—and will increasingly be—used to act on behalf of humans. In the past, this meant physical<br />

labor; nowadays, it is more and more decision making and “softer” tasks. Computer programs that<br />

act on behalf of certain individuals or roles are commonly called software agents. Just like humans, software<br />

agents need to communicate with other agents, the environment, and humans to be able to fulfill<br />

their tasks. Unlike humans, however, they are not legal and physical person with an associated identity<br />

and trust. This is a very important distinction when it comes to information security.<br />

Most existing security measures rely on cryptographic methods to satisfy security needs like authenticity<br />

or confidentiality. The security problem is boiled down to protecting a certain cryptographic key<br />

during setup and operation. If the end points of the respective <strong>communication</strong> relation are humans,<br />

this key—which provides identity and confidentiality—might be protected with personal identification<br />

numbers (PINs) or other “side channels,” which can only be provided by the intended person.<br />

Transferring these established procedures to M2M <strong>communication</strong> is not trivial. The only affordable<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!