The Open Group Preliminary Standard: O-PAS™ Standard, Version 2.0 - Technical Architecture Overview (Informative)
The Open Group Preliminary Standard: O-PAS™ Standard, Version 2.0 - Technical Architecture Overview (Informative)
Contents
1 Introduction ............................................................................................................... 1
1.1 Objective ......................................................................................................... 1
1.2 Overview......................................................................................................... 1
1.3 Conformance................................................................................................... 2
1.4 Normative References..................................................................................... 2
1.5 Terminology ................................................................................................... 2
1.6 Future Directions ............................................................................................ 3
2 Terms and Definitions ............................................................................................... 4
2.1 Terms .............................................................................................................. 4
3 Technical Architecture Concept Overview ............................................................... 5
3.1 O-PAS Connectivity Framework (OCF) ........................................................ 6
3.2 Distributed Control Node (DCN).................................................................... 6
3.3 Application Types ........................................................................................... 6
3.4 Equipment using the O-PAS Communication Interface (OCI) ...................... 8
3.5 Business Function Connectivity ..................................................................... 9
3.6 Internal and External OT Data Centers ........................................................... 9
4 O-PAS Interface Overview ..................................................................................... 10
4.1 Components and Interfaces ........................................................................... 10
4.2 O-PAS Interfaces .......................................................................................... 11
4.2.1 Layer-F Import/Export and Download/Upload Formats ............... 13
4.2.2 Configuration Management Interface............................................ 14
4.2.3 Application Management Interface ............................................... 14
4.2.4 Connectivity Framework Interface ................................................ 14
4.2.5 System Management Interface ...................................................... 14
5 O-PAS Connectivity Framework (OCF) ................................................................. 16
6 System Security....................................................................................................... 18
7 Planned Platform-Independent Application Interfaces ........................................... 19
7.1 Security Management Interface .................................................................... 22
7.2 Security Services Interface ........................................................................... 23
7.3 Connectivity Framework Software Interface ................................................ 23
7.4 Application Services Interface ...................................................................... 23
7.5 Configuration Information Interface ............................................................. 23
7.6 Platform Services Interface ........................................................................... 24
7.7 Platform I/O Physical Interface .................................................................... 24
7.8 Typical Layer-L Application and Service Functions .................................... 25
7.9 Platform-Dependent Applications ................................................................ 25
A Use-Cases ................................................................................................................ 27
A.1 Small Systems ............................................................................................... 27
A.1.1 DCN Only ..................................................................................... 27
O-PAS™ Standard, Version 2.0: Part 1 – Technical Architecture Overview (Informative) iii
Copyright © 2020 The Open Group, All Rights Reserved
Evaluation Copy. Not for redistribution
Evaluation Copy
Preface
The Open Group
The Open Group is a global consortium that enables the achievement of business objectives
through technology standards. Our diverse membership of more than 700 organizations includes
customers, systems and solutions suppliers, tools vendors, integrators, academics, and
consultants across multiple industries.
The mission of The Open Group is to drive the creation of Boundaryless Information Flow™
achieved by:
Working with customers to capture, understand, and address current and emerging
requirements, establish policies, and share best practices
Working with suppliers, consortia, and standards bodies to develop consensus and
facilitate interoperability, to evolve and integrate specifications and open source
technologies
Offering a comprehensive set of services to enhance the operational efficiency of
consortia
Developing and operating the industry’s premier certification service and encouraging
procurement of certified products
The Open Group publishes a wide range of technical documentation, most of which is focused
on development of Standards and Guides, but which also includes white papers, technical
studies, certification and testing documentation, and business titles. Full details and a catalog are
available at www.opengroup.org/library.
This Document
This document is Part 1 of the O-PAS™ Standard, Version 2.0, a Preliminary Standard of The
Open Group. It has been developed and approved by The Open Group.
The O-PAS Standard consists of the following 12 parts (of the anticipated 13 parts):
O-PAS Part 1 – Technical Architecture Overview (Informative) (this document)
O-PAS Part 2 – Security
O-PAS Part 3 – Profiles (Informative)
O-PAS Part 4 – O-PAS Connectivity Framework (OCF)
O-PAS Part 5 – System Management
O-PAS Part 6.1 – Information and Exchange Models: Overview and Interfaces
The parts listed above will each be a separate document that can be updated and re-versioned as
required as we move forward with the O-PAS Standard.
The O-PAS Standard, Version 2.0 is being published initially as a Preliminary Standard since it
addresses an emerging area of technology; therefore, it may change before being published as a
full Standard of The Open Group. In such a case it will be made as upwards-compatible as
possible with the corresponding Preliminary Standard, but complete upwards-compatibility is
not guaranteed.
Once this document becomes a full standard, it will supersede the O-PAS Standard, Version 1.0
published in December 2019.
Conventions
A Glossary and Abbreviations reference is available. If a term is not defined in that document
then the common English definition, as defined in Merriam-Webster’s Collegiate Dictionary,
applies.
Trademarks
ArchiMate®, DirecNet®, Making Standards Work®, Open O® logo, Open O and Check®
Certification logo, OpenPegasus®, Platform 3.0®, The Open Group®, TOGAF®, UNIX®,
UNIXWARE®, and the Open Brand X® logo are registered trademarks and Agile Architecture
Framework™, Boundaryless Information Flow™, Build with Integrity Buy with Confidence™,
Dependability Through Assuredness™, Digital Practitioner Body of Knowledge™, DPBoK™,
EMMM™, FACE™, the FACE™ logo, IT4IT™, the IT4IT™ logo, O-AAF™, O-DEF™, O-
HERA™, O-PAS™, Open FAIR™, Open Platform 3.0™, Open Process Automation™, Open
Subsurface Data Universe™, Open Trusted Technology Provider™, O-SDU™, Sensor
Integration Simplified™, SOSA™, and the SOSA™ logo are trademarks of The Open Group.
UML® is a registered trademark of Object Management Group, Inc. in the United States and/or
other countries.
All other brands, company, and product names are used for identification purposes only and may
be trademarks that are the sole property of their respective owners.
O-PAS™ Standard, Version 2.0: Part 1 – Technical Architecture Overview (Informative) vii
Copyright © 2020 The Open Group, All Rights Reserved
Evaluation Copy. Not for redistribution
Evaluation Copy
Acknowledgements
The Open Group gratefully acknowledges the International Society of Automation for use of the
ISA copyrighted ANSI/ISA 62443 series of standards. Visit www.isa.org.
Referenced Documents
The following documents are referenced in Part 1 of the O-PAS Standard.
The documents are referred to in the text in such a way that some or all of their content
constitutes requirements of this part. For dated references, only the version cited applies. For
undated references, the latest version of the referenced document (including any amendments)
applies.
(Please note that the links below are good at the time of writing but cannot be guaranteed for the
future.)
Normative References
Normative references for Part 1 of the O-PAS Standard are defined in Section 1.4.
Informative References
O-PAS Standard, Version 2.0: Part 4 – O-PAS Connectivity Framework (OCF), The Open
Group Preliminary Standard (P201-4), February 2020, published by The Open Group;
refer to: www.opengroup.org/library/p201
O-PAS Standard, Version 2.0: Part 5 – System Management, The Open Group
Preliminary Standard (P201-5), February 2020, published by The Open Group; refer to:
www.opengroup.org/library/p201
O-PAS Standard, Version 2.0: Part 6.1 – Information and Exchange Models: Overview
and Interfaces, The Open Group Preliminary Standard (P201-6a), February 2020,
published by The Open Group; refer to: www.opengroup.org/library/p201
O-PAS Standard, Version 2.0: Part 6.2 – Information and Exchange Models: Basic
Configuration, The Open Group Preliminary Standard (P201-6b), February 2020,
published by The Open Group; refer to: www.opengroup.org/library/p201
O-PAS Standard, Version 2.0: Part 6.4 – Information and Exchange Models: Function
Blocks, The Open Group Preliminary Standard (P201-6d), February 2020, published by
The Open Group; refer to: www.opengroup.org/library/p201
O-PAS Standard, Version 2.0: Part 7 – Physical Platform, The Open Group Preliminary
Standard (P201-7), February 2020, published by The Open Group; refer to:
www.opengroup.org/library/p201
The Industrial Internet of Things Volume G5: Connectivity Framework
(IIC:PUB:G5:V1.0:PB:20170228), Industrial Internet Consortium; refer to:
https://www.iiconsortium.org/IICF.htm
1 Introduction
1.1 Objective
The objective of Part 1 of the O-PAS Standard is to define the components that make up the
O-PAS specification. This document lays out the overall Technical Architecture, developed by
the Open Process Automation™ Forum, a Forum of The Open Group, of an O-PAS conformant
system through a set of interfaces to the components. The detailed interface specifications are
defined in the other parts of the O-PAS Standard and contain the associated conformance
criteria. The objective of the Technical Architecture is to meet the requirements of a federated
and secure process automation system using an open and interoperable architecture. The O-PAS
Standard is defined to allow development of systems consisting of components from multiple
vendors, without requiring custom integration.
Part 1 of the O-PAS Standard is informative and intended to provide a general overview of a
system composed of O-PAS conformant components and to describe the general functionality of
the interfaces.
The contents and security scope of Part 1 of the O-PAS Standard are related to the scope and
overall objective of the O-PAS Standard, Version 2.0.
1.2 Overview
The Technical Architecture allows for construction of safe, reliable, secure process automation
systems that are scalable from very small to very large, which do not require system shutdown to
perform updates and extensions, and which can be applied to existing systems and to new
construction. The Technical Architecture has been defined to not compromise the safety,
resilience, reliability, maintainability, or security of a process automation system.
To support safety and resilience, the Technical Architecture has been defined so that
redundancy can be implemented on an I/O point-by-I/O point basis, reducing the scope of
failure to a single loop and providing the capability for automatic transfer of control logic
To support resiliency, the Technical Architecture has been defined so that it provides the
environment for m-to-n redundancy, where a node may assume the role of a failed node
and either run its applications, use alternate I/O, or simulate the failed I/O
To support reliability and maintainability, the Technical Architecture is defined so that a
system can be implemented to be incrementally upgraded and enhanced, without system
shutdowns and without turning off power to the rest of the system, except for components
being repaired or replaced
To support reliability and maintainability, the Technical Architecture is defined to allow
incremental upgrades by replacement of components with the same or additional
functionality, without system redesign
1.3 Conformance
Part 1 of the O-PAS Standard is informative, and no conformance requirements have been
defined in this part. Normative requirements and conformance criteria are defined in the other
parts of the O-PAS Standard.
1.5 Terminology
For the purposes of the O-PAS Standard, the following terminology definitions apply:
May Describes a feature or behavior that is optional. To avoid ambiguity, the opposite of
“may” is expressed as “need not”, instead of “may not”.
For the purposes of the O-PAS Standard, the following terms and definitions apply. Merriam-
Webster’s Collegiate Dictionary should be referenced for terms not defined in this section.
2.1 Terms
For the glossary of terms, see the definitions here.
Figure 1 is a concept diagram that illustrates a process automation system that is a collection of
O-PAS conformant components. A conformant component is any device or software that is
conformant to a profile defined in the O-PAS Standard. The primary conformant components
described in this document are Distributed Control Nodes (DCNs) connected via the O-PAS
Connectivity Framework (OCF).
The OCF provides for determinism and quality of service required for data exchanges that are
sufficient to support a distributed control logic execution environment. An O-PAS system is a
collection of O-PAS conformant components all exchanging information using the OCF.
A DCN resides on a physical platform (see O-PAS Part 7 – Physical Platform) or a virtualized
platform conforming to the O-PAS profiles and optionally contains applications. A component
which does not have a conforming physical platform (for example, Distributed Control System
(DCS), Programmable Logic Controller (PLC), analyzer, etc.) may also conform to O-PAS
profiles and communicate using the OCF Communication Interface (OCI).
Each component in the system may execute all or part of the overall control and operations
strategies, based on the capabilities and capacities of the components.
On-Premise External Enterprise
OT Data Center OT Data Center IT Data Centers
(Executing IEC 62264 Level 2 & 3 Functions) (Executing IEC 62264 (Executing IEC 62264
Level 2 & 3 Functions) Level 4 Functions)
Advanced Computing Platform External Data Centers
Virtual Virtual Virtual may run physical or
Business Non O-PAS
DCN DCN DCN Virtual DCN virtual DCNs that are
Platf orm Environments
connected to the OCF
Application Application Application DCN
through a f irewall. OCI
DCN
Virtual
DCN
DCN
DCN
DCN
While the OCF is shown as a single network in Figure 1, actual implementations will usually
consist of segmented networks in order to support security, performance, and quality of service
requirements.
Each DCN can be configured based on the role it performs in the overall automation and
operations strategies. This allows replacement of a DCN to be a simple maintenance action, with
no excessive manual configuration to specify the role of the new DCN.
Application
There are different types of applications defined in this document using a “FILO” model of
describing layers of software, as shown in Figure 3.
The FILO model is used to uniquely define the meaning of the term “application” that can have
different meanings to different users. An application is a combination of configuration
information, a program, and data used by the program. The labels “F”, “I”, “L”, and “O” are in
alphabetic order, reflecting their relative order in the layered FILO model of applications.1
Layer-F applications are those that are defined via the O-PAS configuration specifications
defined in the subparts of O-PAS Part 6 – Information and Exchange Models. These include
function blocks, alarm applications, IEC 61131-3 programs, and IEC 61499-1 applications. This
also includes the basic configuration information defined in O-PAS Part 6.2 – Information and
Exchange Models: Basic Configuration. The Layer-F applications may also include Layer-F
1
FILO is not intended to be a word or acronym; however, the word “filo” is used because it is also a type of layered pastry dough and
reinforces the layered model to applications and services.
functions that follow the same configuration structure. These functions could be provided as
function block libraries that can be used in the construction of Layer-F applications or to build
additional Layer-F libraries.
Layer-I applications are defined in a typical IT programming language (such as C#, C++,
Python, GO, ADA, etc.). Layer-I applications commonly execute the Layer-F applications and
operate on the Layer-F configuration information. Layer-I applications are generally platform-
dependent, in that they have been compiled into a binary format for a specific CPU architecture
and O/S. A future version of the O-PAS Standard will include interface definitions to support
platform-independent Layer-I applications.
Layer-L applications are typically libraries or service programs that are defined in a typical IT
language (such as C#, C++, Python, GO, ADA, etc.) which provide services to the Layer-I
applications. Layer-L applications are generally platform-dependent, in that they have been
compiled into a binary format for a specific CPU architecture and O/S.
Layer-O applications are typically parts of the underlying O/S which provides the environment
for the Layer-L and Layer-I applications. In the O-PAS Technical Architecture this is identified
as the platform O/S, or an O/S running above a hypervisor/separation kernel.
The OCI is a functional unit that provides a configurable interface to the OCF. It can be applied
to equipment other than DCNs.
The OCI services are defined in multiple places in the O-PAS Standard. Conformant
components using the OCI:
1. Support the interfaces defined in O-PAS Part 2 – Security
2. Participate in OCF communications using the services defined in O-PAS Part 4 – O-PAS
Connectivity Framework (OCF)
3. Support the System Management Interface defined in O-PAS Part 5 – System
Management
4. Support the Configuration Management Interface defined in O-PAS Part 6.1 –
Information and Exchange Models: Overview and Interfaces
5. Support basic configuration information defined in O-PAS Part 6.2 – Information and
Exchange Models: Basic Configuration
Connection to OT data centers is shown in Figure 1 controlled by a firewall between the OCF
and the external OT data center as an example, following the recommended best practice as
documented in the ANSI/ISA 62443 standards. However, applications running in OT data
centers may participate directly in OCF communication, if allowed by local security rules.
Layer-F
Download/Upload
Information
DCN
Layer-F Applications/Configuration
Distributed
Control
Distributed
Layer-I Applications
Node Control
(DCN)
Distributed
Distributed
Node Control
(DCN)
Node (DCN)
Control
Node (DCN) Layer-L Applications/Services
Layer-O Applications/Services
Blue Arrows = O-PAS Standard, Version 2.0 Specifications Folded corner figures represent
Red Arrows = Future Interface Specifications physical or virtual files
Notes
The “ball and cup” symbols are UML® symbols used to indicate interfaces between objects or
systems. The “ball” is connected to the object or system defining the interface. The “cup” is
connected to the object or system using the interface.
Layer-F
Import/Export
Interface
Layer-F Application Editing Tools
Import/Export
Format Import/Export Conf iguration Application System
Interface Management Management Management
Services Services Services
Configuration Application
Management Management System
Interface Interface Management
(Layer-F Upload/Download) (start, stop, …) Interface
O-PAS
Connectivity
Other O-PAS Framework
Conformant Interface+
O-PAS
Components Conformant Component
O-PAS
Connectivity
Framework
Interface+
Physical Platform
Networking
Interface Physical Platform
Networking Interface
The interfaces defined in the O-PAS Standard, Version 2.0 are as follows:
Information in the Layer-F application import/export format defines the configuration of a
system of DCNs and applications that are created and maintained by external management
services or tools, such as Layer-F application editing tools, configuration management
services, application management services, and system management services
The Configuration Management Interface defines the configuration management services
used to manage the download and upload of configuration information in an O-PAS
conformant component by configuration management services
The Application Management Interface defines the application management services used
to manage applications in an O-PAS conformant component by application management
services
The Connectivity Framework Interface defines the network protocols necessary for DCNs
to communicate across the OCF
The System Management Interface defines the system management services and
information models used to manage the hardware and associated O/S software in an O-
PAS conformant component by system management tools
The Platform Networking Physical Interface defines the physical layer interface to the
network
The Layer-F import/export format is often organized by physical processing equipment asset
(such as areas, process units, process cells, equipment modules, control modules, etc.) using
hierarchies defined in IEC 61512-1 (ISA 88), IEC 62264 (ISA 95) and ISA-TR106, and by OCF
network hierarchies.
The Layer-F import/export format also includes the specification of the platform and conformant
component execution environments, such as:
The information that characterizes capability and capacity requirements of applications,
such as required support for the application services, timing requirements for cyclic
programs, and required available memory
The information that defines the capabilities and capacities of conformant components
The information that defines the capabilities and capacities of platforms
The information that defines the capabilities and capacities of the OCF, organized by
network segment if appropriate
Vendor-specific download information or an O-PAS conformant component, such as
binary files or encoded configuration information
The download information in the Layer-F import/export files would be used by a configuration
management service to select what to download to each component. The information is
downloaded using the Configuration Management Interface . The downloaded information is
used to fill in the local storage that is exposed using an OCF information model. The run-time
information is then made available using the OCF access methods, as illustrated in the
example in Figure 6.
The Application Management Interface is used to control the execution of Layer-F applications.
To meet the requirement to be able to manage a system of components from multiple vendors,
the System Management Interface is defined in O-PAS Part 5 – System Management.
The O-PAS Connectivity Framework (OCF) defines the framework services, using the Industrial
Internet Consortium, Industrial Internet Connectivity Stack Model, as described in The Industrial
Internet of Things Volume G5: Connectivity Framework. The OCF provides the transport
services for messages, the services for data consisting of streams, events, and state information,
and the information needed for distributed real-time control.
The OCF interfaces are defined in O-PAS Part 4 – O-PAS Connectivity Framework (OCF).
One of the main purposes of the OCF is to define the services for handling the information flows
between applications. Any Layer-F application that exposes information to or reads information
from other applications does so through the Connectivity Framework Software Interface, even if
the corresponding applications are running in the same DCN.
Figure 7 illustrates the communications route, through the different parts of an O-PAS
conformant system, when the accessed field data is on the local DCN.
Layer-F Applications/Configuration
Layer-I Application
Data Access Route (Local)
Layer-L Application/Services
Layer-O Application/Services
Field Terminations
Figure 8 illustrates the communication route, through the different parts of an O-PAS
conformant system, when the field data is not on the local DCN. Components in the DCN (or
other conformant component) provide the services and contain the information to determine the
location of the data.
Layer-F Application/Configuration
Distributed Control Node (DCN)
Layer-I Application
Data Access
Data Access
Layer-O Application/Services
6 System Security
O-PAS conformant components will enable the development of secure systems, but no O-PAS
interface standard can guarantee comprehensive security. It is the responsibility of the system
owners to develop the continuous process of assessment of security threats, implementation of
countermeasures, validation of the countermeasures, and correction of the system to prevent or
reduce the impact of the risk. (See ANSI/ISA-62443-1-1 for information about Industrial
Automation Control Systems security.)
The platform-independent application interface specifications for Layer-I, Layer-L, and Layer-O
are planned for a future version of the O-PAS Standard. The interfaces identified here are
included to illustrate the eventual platform-independent applications and interchangeability
capabilities of a system built from O-PAS conformant components. The interfaces shown in
Figure 9 in black text are in Version 2.0, and the interfaces in gray text are planned for a future
version to support platform-independent Layer-I and Layer-L applications. Figure 9 is an
extension to Figure 5.
Layer-F Applications/Configuration
O-PAS
Connectivity
Other O-PAS Framework Layer-I Applications
Interface+
Conformant Connectivity Application Configuration Security
Components Framework Services Information Services
Software Interface Interface Interface
O-PAS Interface
Connectivity
Framework Layer-L Applications/Services
Interface+
Platform
Service
Interface
DCP Networking
Physical Interface Layer-O Applications/Services
OCF Networking
Field Terminations
Infrastructure
The interf aces shown have the f ollowing meanings:
• Interf aces with “+” are network interf aces provided using OCF f unctionality
• Interf aces with solid lines indicate sof tware interf aces
• Interf aces with dashed lines and solid black circles indicate physical interf aces
The platform-independent application interfaces will define the APIs that are available to
applications. The purpose of the interfaces is to allow applications to be platform-independent,
commonly configured, and commonly managed.
The platform-independent application interfaces will specify the complete interface between
platform-independent application software and the underlying platform and libraries. The
interface definitions will include the syntax and semantics of the programmatic interface and all
necessary protocol and data structure definitions.
The seven additional planned interfaces for platform-independent applications are illustrated in
Figure 10. Applications may also be consumers of services from proprietary systems; however,
using these services would prevent platform independence if the proprietary services are not
available on the target platforms.
Security
Management
Services
Security
Management
Interface
Layer-F Applications/Configuration
Layer-I Applications
Connectivity Application Configuration Security
Framework Services Information Services
Software Interface Interface Interface
Interface
Layer-L Applications/Services
Platform
Service
Interface
Layer-O Applications/Services
Platform I/O
Physical Interface
Field Terminations
• Interf aces with solid lines indicate sof tware interf aces
• Interf aces with dashed lines and solid black circles indicate physical
interf aces
Figure 11 illustrates all of the Version 2.0 and planned future software interfaces to be defined in
the O-PAS Standard:
Layer-F import/export formats define the interfaces to external tools used to create and
manage applications and configurations
Layer-F download/upload methods define the interfaces to DCNs and OCIs used to
manage O-PAS conformant components
Layer-F download/upload formats define the standard data used in DCNs and OCIs to
configure O-PAS conformant components
Layer-F applications will usually be run by a Layer-I application
Layer-I applications are consumers of Layer-L applications and services and associated
data
Layer-I applications may also be consumers of services and data from proprietary systems
Layer-L applications and services are providers of services and associated data to
applications and external management tools
Layer-L applications and services are consumers of services and associated data from the
Layer-O applications and services and from external management tools
Layer-L applications and services may also be consumers of other services and data as
needed
Layer-O applications and services are providers of services and associated data
Layer-O applications and services are consumers of services and associated data from the
physical infrastructure and external management tools
Layer-O applications and services may also be consumers of services and data from
proprietary systems
Layer-F Application/Configuration
Layer-I Application
Connectivity Application Configuration Security
Framework Services Information Services
Software Interface Interface Interface Consumer of other services as needed
Interface
Layer-L Applications/Services
O-PAS
Connectivity Platform
Framework Services
Interface Interface Consumer of other services as needed
The services to be provided by the Security Management Interface are planned to be defined in a
future version of the O-PAS Standard.
The services to be provided by the Security Services Interface are planned to be defined in a
future version of the O-PAS Standard.
The services to be provided by the Connectivity Framework Software Interface are planned to be
defined in a future version of the O-PAS Standard.
The services to be provided by the Application Services Interface are planned to be defined in a
future version of the O-PAS Standard.
The services to be provided by the Configuration Information Interface are planned to be defined
in a future version of the O-PAS Standard.
Figure 12 illustrates a possible use of the configuration interfaces, with an internal data store that
is used to hold the configuration information, making it available to both configuration
management tools and to applications.
Layer-F Configuration
Import/Export Used by Management
Format Services
Layer-F
Download/Upload
Format
Configuration
Management
Interface
Layer-I Application
Configuration
Information
Interface
The services to be provided by the Platform Services Interface are planned to be defined in a
future version of the O-PAS Standard.
The Platform I/O Physical Interface is a specification of the hardware interface to connect
physical I/O signals to a DCN. It will also be a specification of the hardware interface to connect
DCNs with and without I/O into a physical frame or backplane with power and network
connections.
The specification of the Platform I/O Physical Interface is planned to be defined in a future
version of the O-PAS Standard.
Platform profiles are used to identify different types of physical infrastructure, from fixed-size,
weight, and power modules that can fit into an O-PAS framework or backplane, to general-
purpose PCs and servers with standard Ethernet connections.
The planned Platform I/O Physical Interface will define the following items:
I/O termination standards, such that a standard removable terminal assembly will be
usable with any O-PAS conformant I/O module
DCN form factor, such as SWaP requirements and heat duty
DCN mounting structures, with power and network connections
DCN I/O standard types
A Use-Cases
This appendix defines various example system structures that could be built using O-PAS
components. The list is not meant to be all-inclusive, and is only intended to illustrate the range
of possible structures that can be supported. The figures do not show the external management
tools that would be used to configure and support the system.
APP APP
DCN
DCN
DCN
AI/AO/DI/DO
Twisted Pair
APP APP
DCN
DCN
DCN
APP
DCN
PLC
AI/AO/DI/DO
Twisted Pair
APP APP
DCN
DCN
DCN
APP
DCN
OCI
PLC
PLC
AI/AO/DI/DO
Twisted Pair
APP APP
DCN
DCN
DCN
DCN
APP
DCN
Field
DCS Networks
AI/AO/DI/DO
Twisted Pair
Virtual Virtual
DCN DCN
Application Application
Application Application
APP
DCN
DCN
DCN
DCN
DCN
OCI
Machinery Safety
PLC
DCS Monitoring Systems
AI/AO/DI/DO
Twisted Pair, …
analyzers, machinery monitoring, field networks, safety systems, and electrical systems) all have
embedded OCI functionality and the ability to run applications, and an ACP is added to run
applications that may be too large to run in the gateways or I/O DCNs.
Virtual Virtual
DCN DCN
Application Application
Application Application
DCN
Application Application
Application Application
Business Platform communicates
APP to OPA Apps running in a DCF
using Ethernet, not the OCF
DCN
DCN
Essentially this could be an I/O termination node, a data storage node, or a DCN with embedded
functionality that does not include the capability for running Layer-F applications. Figure 20
illustrates an integrated platform-dependent O-PAS conformant component. It would be able to
send and receive information (configuration definitions, service requests, service responses,
etc.), support system management functions, and support the minimum application management
functions for an embedded internal application.
• Interf aces with solid lines indicate sof tware interf aces
• Interf aces with dashed lines and solid black circles indicate physical interf aces
This example also has the capability of executing platform-dependent applications, but does not
have the capability of supporting platform-independent applications.
Essentially this is a DCN with fixed control code execution capability, such as a dedicated
function block controller, or a device that has the capability to run downloaded Layer-F
applications. This concept is illustrated in Figure 21, where the configuration information
includes a function block program, and a platform-dependent application provides a function
block execution environment.
• Interf aces with solid lines indicate sof tware interf aces
• Interf aces with dashed lines and solid black circles indicate physical interf aces
For the purposes of the O-PAS Standard, an application is considered a program and associated
configuration information and data. The term “application” has different meaning for the
different roles of the O-PAS Standard. Often, what is an application to one role (e.g., system
integrator) is viewed as just configuration or data by another role (e.g., software supplier).
For example, a system integrator would define a function block application using the IEC
61131-3 Structured Text (ST) language and associated configuration information. The supplier
of the function block 61131–3 program execution application would consider the system
integrator information just configuration and data that the Layer-I function block execution
application uses.
Figure 22 illustrates an example of the layers of applications and programs using the example
above. The top level is intrinsically portable, because there is no recompilation required to
execute companion specification applications on different DCNs. The middle layers could be
portable if they only use the services of the lower levels, but may require recompilation based on
the physical platform profile.
Figure 23 illustrates application layering, using a typical IT set of tools. In this example the top
level is a Java® program, represented as Java Byte Code and associated configuration and data.
In the next level down, a Java Virtual Machine (JVM) executes the Java Byte Code, using
Layer-L services. The Layer-L services components use the services of the underlying platform
implemented as a UNIX® O/S provided by the platform supplier.
UEFI Hardware
BOOT
BIOS Processor Memory Peripherals Network Interface
Derived from information provided by IIC – IISF (Industrial Internet Security Forum)
C Rationale
In order to provide a stable architecture which meets the requirement for a multiple decade life-
time, the architecture is defined to realize the quality attributes described below.
C.1 Interoperability
Interoperability is defined as the ability of two or more systems or components to exchange
information and to use the information that has been exchanged (ISO/IEC/IEEE 24765:2017). It
is achieved in the Technical Architecture through the OCF and associated information models
defined in the Layer-F import/export and download/upload formats.
These formats define an interface and follow a set of international standards for Manufacturing
Operations Management and Control – Level 2 and 3 information exchanges, as defined in IEC
62264-3.
C.2 Modularity
Modularity is defined by the degree to which a system or computer program is composed of
discrete components such that a change to one component has minimal impact on other
components (ISO/IEC/IEEE 24765:2017). This is achieved using DCNs as the modular
architecture components:
The architecture is defined such that DCNs can be replaced with equivalent DCNs,
without impacting the operation of other components
The DCN architecture includes the virtual DCNs and platform-independent applications;
this allows applications to be changed and moved without impact on other components
The concept of “profiles” is used to define DCNs as the components of modularity, such
that components with the same profiles from different vendors have the same minimal
functionality
The DCN architecture is defined such that components can be replaced with equivalent
conformant components, without impacting other parts of the system
C.4 Scalability
Scalability is defined as the degree to which a system can have its capacities adjusted to meet
system requirements. This is achieved through the ability to change the number of DCNs (scale
out) and the ability to increase the capacity of individual DCNs (scale up), without any changes
to the architecture and minimal impact on other components.
C.5 Portability
Portability is defined as the ease with which a system or component can be transferred from one
hardware or software environment to another (ISO/IEC/IEEE 24765:2017). In this document,
portability is defined as platform-independence. It is achieved through the Layer-F import/export
and download/upload format specifications.
D Abbreviations
Index
ACP ...................................................... 6 Layer-F import/export ........................ 13
ANSI/ISA 62443 standards .................. 9 Layer-I applications ............................. 8
application ............................................ 7 Layer-L applications ............................ 8
Application Management Interface .... 14 Layer-O applications ............................ 8
Application Services Interface ........... 23 maintainability ..................................... 1
applications......................................... 34 MRP ..................................................... 9
business functions................................. 9 OCF ............................................ 5, 6, 16
components......................................... 10 OCI ................................................... 5, 8
concept diagram ................................... 5 OT data center ...................................... 9
Configuration Information Interface .. 23 Platform I/O Physical Interface .......... 24
Configuration Management Interface . 14 Platform Services Interface ................ 24
conformance ......................................... 2 platform-dependent applications ........ 25
Connectivity Framework Interface ..... 14 platform-independent interfaces ......... 19
Connectivity Framework Software PLC ...................................................... 5
Interface ......................................... 23 PLM ..................................................... 9
DCN ................................................. 5, 6 process automation ............................... 2
DCS ...................................................... 5 reliability .............................................. 1
ERP ...................................................... 9 resilience .............................................. 1
FILO ..................................................... 7 safety .................................................... 1
gateway ................................................ 6 scalability ............................................. 2
IIC ...................................................... 35 SCM ..................................................... 9
interfaces ...................................... 10, 11 security ........................................... 2, 18
interfaces, planned .............................. 22 Security Management Interface ......... 22
interoperability ..................................... 2 Security Services Interface ................. 23
JVM .................................................... 34 SWaP.................................................. 24
Layer-F applications ............................. 8 System Management Interface ........... 14
Layer-F download/upload .................. 13 Technical Architecture ......................... 1
Layer-F formats .................................. 13 UML ................................................... 11