0% found this document useful (0 votes)
21 views35 pages

Unit 5 IOT

The document discusses the Internet of Things (IoT) applications and case studies, focusing on Cisco IoT System and IBM Watson IoT Platform. It highlights Cisco's six-pillar approach for IoT solutions, emphasizing network connectivity, fog computing, security, data analytics, management, and application enablement. Additionally, it covers advancements in manufacturing through IoT, including connected manufacturing, automation, and the Converged Plantwide Ethernet (CPwE) reference model for industrial applications.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views35 pages

Unit 5 IOT

The document discusses the Internet of Things (IoT) applications and case studies, focusing on Cisco IoT System and IBM Watson IoT Platform. It highlights Cisco's six-pillar approach for IoT solutions, emphasizing network connectivity, fog computing, security, data analytics, management, and application enablement. Additionally, it covers advancements in manufacturing through IoT, including connected manufacturing, automation, and the Converged Plantwide Ethernet (CPwE) reference model for industrial applications.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 35

lOMoARcPSD|52203584

Internet of things 5

Internet - Of -Things (Pondicherry University)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by Training and Placeme -Amalapuram ([email protected])
lOMoARcPSD|52203584

UNIT 5
CASE STUDIES/INDUSTRIAL APPLICATIONS 9
Cisco IoT system - IBM Watson IoT platform – Manufacturing - Converged Plant wide
Ethernet Model (CPwE) – Power Utility Industry – Grid Blocks Reference Model - Smart
and Connected Cities: Layered architecture, Smart Lighting, Smart Parking Architecture and
Smart Traffic Control
5.1 Cisco IoT System
The Cisco® IoT System defines a set of products and technologies for creating IoT solutions
from cloud platform to fog platform, the Cisco IoT System follows a system approach which
provides a good security, low costs, and introduces more innovation. Its products and
technologies are engineered for the manufacturing, oil and gas, utilities, transportation,
mining, and public sector industries. There are pillars of technology introduced for the
CISCO Iot systems namely Cisco Fog Computing; Network Connectivity; Physical and
Cyber security; Data Analytics; Management and Automation; and Application Platform.

fig.5.1Cisco IoT System


Cisco System reduces the complexity of the management which is deployed as large scale.
The devices and objects connected, and provide improvements in business using data
analytics platform at the network's edge. Cisco believes that 50 billion devices and objects
will be connected to the Internet by 2020. Due to the digitization, companies and cities have
started deploying Internet of Things applications. Digitization is complex. Customers are
connecting devices and objects –to converging unrelated networks. The connections can be
realized through the data analytics application. Customers still need set of application which
provides a strong security based intelligent applications to promote the business activities in a
better way. The security should not be sacrificed in the data centre and the cloud
environment.

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

The new Cisco® IoT System addresses the complexity of digitization with an infrastructure
that is designed to manage large scale systems of diverse endpoints and platforms, and the
data deluge they create. The new Cisco IoT System designed six technology elements or
‘pillars' combined together as an architecture which help to reduce the complexities of
digitization. Cisco further introduced 15 new Internet of Things products within the six pillars
designed.
5.1.1Six-Pillar Approach for Cisco IoT System
The six pillars of the new Cisco IoT System are as follows:
1. Network Connectivity: This pillar ensures the property of routing, switching, and
wireless activity in the IoT products available in various form factors.
2. Fog Computing: ‘Fog' is a distributed computing infrastructure for the Internet of
Things (IoT) which has the data analytics applications - to the ‘edge' of networks
collecting huge amount of data. Customers begin to analyze and manage data from
their places, and they derive decisions. Cisco defines that IoT-created data will be
processed in the fog environment. Over 25 of Cisco's network products are enabled
with Cisco's fog computing or edge data processing platform.
3. Security: This pillar ensures security for the IoT System. The cyber security and
physical security is supported by these system provide the benefits and to improve the
protection of both physical and digital systems of IoT. Cisco's IP surveillance
products allow all the users to monitor control and detect the IT and Operational
Technology (OT) attacks. Trust security and the cyber security are enhanced.
4. Data Analytics: The data from the sensors and the smart objects is analysed and
manipulated by the help of this layer. Cisco IoT System provides a standard
infrastructure to implement analytics .Connected Analytics™ Portfolio and third party
analytics software can also be implemented.
5. Management and Automation: The End points has perfect automation features due
to this pillar. IoT System automation helpd in enhanced security, control and support
for various functions. Easy-to-use management system is been developed for the user
control.
6. Application Enablement Platform: this pillar helps the user to deploy their own
application in the iot system. Set of APIs for industries and cities is provided; third-
party vendors can even design their application.
Cisco introduces more than 15 new IoT products
5.1.2Network Connectivity Highlights
IE5000: factory-level manufacturing and cities.
IW3702: Wireless access point for connected mass transit systems and city Wi-Fi.
IR 809, IR 829 series: industrial routers with Wi-Fi ,4G/LTE module..

Physical and Cyber Security


360° 5MP & 720p IP cameras: These high-quality cameras for environments and Features
include 360° view .Camera applications include audio detection, sensor aggregation.

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

Data Analytics
Fog Data Services allow operators to monitor and take actions o based on data flow in the
IoT environment (data-in-motion). It resides on the IOx platform so users can integrate
custom policies with applications.
Management and Automation
IoT Field Network Director: This software allows operators to monitor and customize IoT
network infrastructure for industrial operations. Fog Director allows central management of
multiple applications running at the edge. Management platform gives control for the
administrator’s l of application settings.
5.2 IBM Watson IoT platform

The IBM Watson IoT Platform is a hub for connecting various devices, gateways, and
applications for different types of IoT solutions. REST and MQTT are the application layer
protocols used by the devices and gateways. The processing of events and many tasks are
performed by these protocols. The IBM Watson IoT Platform is the IBM Cloud platform
(formerly IBM Bluemix), which is based on Cloud Foundry and Kubernetes.

Let's review the pertinent features of this platform.

Features

In this section, we will discuss the following main features of the IBM Watson IoT
Platform:

• Dashboard
• Devices, gateways, and applications,
• Security

Dashboard
First screen that you will view when you access the IBM Watson IoT Platform. This
dashboard can be a combination a number of boards and cards, offering
several visualization options for your IoT solution:

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

fig 5.2 dashboard

Explore the boards and cards available in this screen to get familiar with the interface.

Devices, gateways, and applications


One of the feature in the platform is device management control. This feature makes it
possible to create and remove devices, gateways, applications, and device types. It allows
us to check and trigger actions to the device, such as a firmware upgrade request or reset:

fig 5.3 browse devices in dashboard


You can also create API keys so that your applications can connect to the IoT organization
and interact with the other components of the solution.

Security
The security aspects of a solution using the IoT Platform are also designed in Watson. This
might include creating framework or rules for the usage of device connections, white and
black lists for the device's IP address. The number of users to manage the IoT solutions can
be allowed permission or can be blocked from the IoT organization.

IBM Watson has two plans:

 IBM Watson IoT platform Lite: free lightweight environment.


 IBM Watson connections and analytics service capacity 1 and capacity 2: fully
managed saas IoT platform for analytics management.
 Watson Iot platform standard: free data transfer limit and edge data analysed.
 Watson IoT Platform advances security: Advanced risk and security management.

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

5.3 Manufacturing:

There is a great advancement in the field of manufacturing industries in terms of


automation and digitization

5.3.1An Introduction to connected manufacturing:

The industries started to automate their manufacturing process r the production, and this
termed as the industry modernization process. The machines will be connected and the data
would be gathered. The below topics depicts about the digital disruption in the field of
manufacturing with respect t Iot technologies

Data driven manufacturing: overall machines are connected together and data from the
machines are analysed t o know the effectiveness of the machines (OEE-overall equipments
efficiency).OEE metrics gives details of the productivity.

OT and IT convergence: Operation technology and information technology work together


under single roof of the networking of the manufacturing industry

Improved technology with lower costs: The technology improvements have made the
costs to be less for incorporating the connected machines

Machine builder OEMs focused on new priorities: Original equipment manufacturers are
facing problems due to the development of new cloud service called machine as a service
(MaaS).cloud environment monitors the machines and they are controlled remotely.

An IoT Strategy for Connected Manufacturing:

Initially which was available as hardware, now it is available as software. Similarly all the
machine control operation is available in the form of the human machine interface with the
help of cloud service. Using Software is cost efficient for controlling the machine than
using the hardware. Certain machines are deployed with the artificial intelligence approach
which handles the faults by itself. Software analytics plays a role in this kind of machines
.Robotics and Artificial intelligence will automate the production process and it will be able
t self diagnose the problem. Two types of manufacturing. Discrete manufacturing process
deals with the production of computers and hand tools. Process manufacturing deals with
the production of cement and chemicals.

Business Improvements Driven Through IoT:

Manufacturing industries quality is measured by the six sigma which provides the defect
free products. Six sigma has so many standards for the quality improvement. Improvements
can be in terms of reducing downtime

Architecture for the connected factory:

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

Industrial automation and control system has joined with IT application to provide
analytical tools to monitor the operations.CPwE are an architectural framework which
deploys the service to IACS devices to promote business enterprises.

Industrial automation and control system:

For the communication process of IACS the communication protocols are needed. Ethernet
and IP are used for the communication process.IACS reference model is used to have
control over the manufacturing process. The network and security functions are carried out
by this model. Functional model involves the various levels in terms of different zones.
Zones are safety zone, manufacturing zone, demilitarized zone and enterprise zone.

fig.5.4: ISA99/IEC-62443 IACS Logical framework based on Purdue model for


control hierarchy

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

fig5.5: Different levels

Safety zone:

In case of emergency IACS can opt for the shut down if there is any malicious event
occurring in the system .It is hard wired and air-gapped in the network

Manufacturing zone:

It has two zones namely cell/area zone (levels 0 to 2) and site level manufacturing (termed
as level3)

Cell/area zone: It represents the machine area in plant. It has controller and devices for the
control of the environment. This zone depicts the three levels of activity

Level 0: It involves the sensors and actuators which performs movements in the operation
of driving a motor.(Distributed I/O)

Level 1: This process involves operation of distributed control system where live process
comes into effect.(Programmable Automation Controller)

Level 2: Run time monitoring is performed to control the workstations(HMI)

Level 3: This is a large manufacturing zone with various applications of SCADA and
reporting systems.

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

Demilitarized zone (DMZ): Security of the local machines are ensured protecting it from
unauthorized activities in the network

Enterprise Zone: This involves the enterprise networking functions and email systems
related to traditional IT Systems.

5.4 The Converged Plantwide Ethernet (CPwE) Reference Model

Cisco and Rockwell automation developed the Converged Plant wide Ethernet (CPwE)
Design to provide an Ethernet and IP-networking based architecture for industrial
applications. CPwE applies to multiple industries. It is specifically designed to improve
their Industrial Automation and Control System (IACS) networks with standard Ethernet
and IP networking technologies.

fig 5.6 :High level view of CPwE Architecture with Three Different Cell/Area Zone
Ethernet topologies.

The above figure depicts the CPwE architecture. The cell area zone has the levels 0 to
2.This era contains the devices Distributed I/O ,Programmable automation controller and

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

the HMI human machine interface. The devices communicate with the help of Ethernet
standards, it follows various topologies like star, bus and ring.

Devices in the cell/Area zone is hardened against electrostatic discharge and there is a
distribution switch which is placed in between the manufacturing zone(industrial zone) and
the cell/area zone. Industrial zone has the core switches that routes the network connectivity
and focus on the network infrastructure. The next layer is the demilitarized zone, manages
the traffic between the other zones. Demilitarized zone has the firewall feature which
provides the complete security to the plant. Final zone is the enterprise zone where your
data centres and enterprise resource planning applications are maintained.

CPwE Resilent Network Design:

Resilient network supports various features such as

Availability: LAN topology design plays vital role in IACS applications. It elaborates about
the network availability and the distance between the devices. Physical path should be
considered for the topology design

Predictable performance: predictable traffic requirements should be met for the real time
applications

Fast network reconvergence: If there is any failure in the network, the network should be
designed in such a way it should recover and should possess minimal jitter

Industrial Protocol support: the protocols support is needed for the IACS functioning to full
fill the industrial requirements.

The communications which require network resiliency are controller to HMI, controller to
input/output, controller to controller, controller to motor control centres. Network resilience
technologies are flex link, cross stack Ethernet channel. Flex link has the dual link if one
link fails the other will continue the process of work and it helps in the load balancing. A
company which manufactures motor cycle, machine data was brought into the dashboard by
the Ethernet network which helped the employees on the plant floor. New machines were
introduced online with the help of this Ethernet and CPwE decreased the machine
downtime in real environment

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

Fig.5.7 cisco and Rockwell product CPwE

Applications and Services Supported

The CPwE primarily supports IACS networks and their integration into the overall
enterprise network. As noted earlier, IACS is a term that is meant to cover a large range of
applications across multiple industries; Distributed Control Systems (DCS), Supervisory
Control and Data Acquisition (SCADA), Programmable Automation and Logic Controllers
(ACS devices, such as robots, sensors, actuator, and drives

 Human machine interfaces (HMIs) that provide visual status reports and control
of the IACS
 Controllers such as programmable automation controllers (PACs) and the
distributed control system (DCS)
 Higher-level plant systems, including the manufacturing execution system
(MES) and historians

CPwE Solution Benefits

Manufacturers can realize the following operational benefits of the CPwE solution:

 Enables and simplifies convergence of the IACS network with enterprise networks.
 Enables remote access for engineers, partners, and IACS equipment vendors for
diagnostics and maintenance.
 Increases efficiency and response time .
 Help reduce risk, increase plant uptime and improve Overall Equipment
Effectiveness (OEE)..
 Integrates more quickly advances in networking technology that come from

CPwE Solution Features

IACS network environments have evolved over the years, driven by a number of key design
features. Defines the following seven key features that manufacturers expect as best
practices:

• Industrial characteristics
• Interconnectivity and interoperability
• Real-time communication, determinism, and performance
• Availability
• Security
• Manageability
• Scalability

Resilient Ethernet Protocol:

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

 Resilient Ethernet protocol is used by the cell /area zone.


 This protocol controls many ports and ensures no loops in the bridges are formed.
 REP is similar to spanning tree protocol but the number of devices is not fixed.
 REP Connects the more number of devices.
 REP supports the ring topology.

Fig.5.8.REP

REP segment has a master switch which has control over the full ring. Master has the REP
control, location of the edges and an alternate port. Alternate port helps if there is a broken
format in the REP segment. The failure in the ring will be solved by the alternate port and it
will enable the communication to proceed without any error. Notification messages are sent
if there are link failures in the Ethernet ring and repair mechanism is processed
immediately.G.8032 has similarities to REP and supports multitier ladder topology.REP
reduces the downtime cost and improves the throughput productivity.

Business Value of Resiliency in converged networks

Resilience has good impact on the business for the manufacturers because it has enhanced
production .It provide good network visibility to the plants.

CPwE Wireless:

These kinds of networks are deployed to manage hand held devices and the automated
guided vehicles. Location based sensors and tags are used in the plant floor

CPwE Wireless network architecture

Wi Fi networks utilizes the radio frequencies, it has a problem of interference and coverage
issues. Design of Wi Fi networks requires periodic monitoring to check bandwidth,
throughput and reliability. Each access point must know when to share the data in the air.
There are few wireless technologies like time sensitive networking, Wireless HART or
ISA100.11a.the problem with these wireless technology is that it has less bandwidth than
the Wi Fi.WLAN has to be combined with the IACS for the manufacturing process .LAN
controller is the centralised one which controls all the access points in the plant floor .It

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

will have a feature of self healing mechanism. Access points or nodes have the autonomous
features deployment.

Fig 5.9: wireless architecture in a factory

Fixed position devices: The device has a static operational location it is alternative to
wired connection. It involves the condition monitoring and environmental monitoring

Nomadic devices: operates from one place and shut down at another location. New
connection will be established in the relocation place.eg: portable equipment.

Operational relocation devices: In the coverage zone the devices changes its position
during the operation state. Eg: rotary platforms, overhead cranes

Real time location system:

Wi fi based location tracking system is involved in the plant devices. RFID tags attached to
the machines or vehicles inside the plant.RSSI received signal strength indicator measures
the power of the incoming signal.RFID tags uses the small battery power.nRTLS stands
Near Real time Location System. This system tracks managers and production of the plant.
Eg: airplane manufacturers. RFID tags helped them to reduce time to locate airplane
parts.RTLS assists managers to monitor the production, track the inventory and to improve
the efficiency.

5.5 Power Utility Industry:


Utilities: utilities are the essentials of day today life. Daily utilities may be gas, water and
electric power. With the help of electric power we enjoy many aspects of life, without
power the life would be dark.
Introduction to Power Utility Industry:
Power is generated and it is been given to our homes. Power industry has three phases of
operation they are generation, transmission and distribution.

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

Generation: power is produced from coal mines. Nuclear power plants and hydroelectric
plants. High voltage generated is transmitted by transmission lines.
Transmission: aerial lines and submarine cables are used for transmission of electricity.
Electricity will be transmitted to the substations from the main station.
Distribution: from the substation the power is being transmitted to the transformers. These
transformers supply low voltage power to the homes.

Fig 5.10: stages in power utility network.


IT/OT Divide in Utilities:
Utility OT networks had the feature of remote dials or indicators to know about the meter
readings. From the control room they were able to collect the readings from the sensor.
Nowadays power grid control is used. Introduction of Ethernet reduced the cost of grid by
behemoth sized mainframe in glass walled control room.OT systems started using the IP
communications. Advanced metering infrastructure was developed with the IPV6
Functionality incorporated with millions of nodes. This kind of infrastructure utilizes the
smart meter. There were certain questions related to the network resiliency, security and
redundancy how the OT and IT networks manage together.OT engineers master themselves
in the IP related issues and IT engineers work on the OT core features. Smart grid employs
the good electricity to us with the help of ICT.(Information and Communication
Technology).All industries are focused on delivering OT services to the IT systems.

5.6 The Grid blocks Reference Model:


The Cisco Grid Blocks reference model divides the electrical power communications
infrastructure into 11 logical tiers, which support networking the entire power delivery chain
and define interaction across the tiers. It involves the smart grid technologies. It supports tiers
that owned and managed by different utility entities, and maintaining the network
convergence and interoperability between them. Following Figure depicts the tiered approach
of the reference model

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

Fig 5.11 Grid block reference model

The diagram tells about entire power generation process, transmission, substations and
distribution features of the grid.

Benefits:

 incremental improvements can be made to the grid


 helps in integrating new and old technology
 Uses IP and reduces the cost.
 reduces the operational and capital costs
 modernization of grids can be done

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

5.6.1 GridBlocks: A 1 1-Tiered Reference Architecture:

This architecture has 11 tiers which is the entire power delivery supply chain. Grid is
owned by different division of the same power company. All combined together forms the
overall converged network architecture. This tiers-based model facilitates segmentation of
all capabilities and functional areas within a single, converged architecture. The tiers, from
the bottom to the top of Figure 1, include:

The Prosumer tier: Prosumer tier (combining the concepts of energy producer and
consumer) encompasses all outer elements that impact the grid. This tier includes devices and
systems that are not part of the utility infrastructure, but which interact with the utility. The
power is generated from the solar (distributed energy sources). The networks manage the
distributed generation, storage, responsive loads in residences or commercial/industrial areas.
Distribution tier— at the distribution level of power delivery to the customers—this has
been initiated between primary distribution substations and end users and it takes place in two
levels:

 Distribution Level 2 Tier—The lower Level 2 tier is composed of purpose-built


networks that operate at what is often viewed as the “last mile” or neighbourhood area
network (NAN) level. These networks may service smart metering, distribution
automation, or public infrastructure for electric vehicle charging.
 Distribution Level 1 Tier—The upper Level 1 distribution tier supports multiple
services that integrate the various Level 2 tier networks and provide backhaul
connectivity to control centres using the system control tier. Primary distribution
substations distribute intelligence directly. This tier also provides peer-to-peer
connectivity for field area networks (FANs).
Substation Tier— This layer includes all internal substation networks. Transmission
substations have high voltages (115kv) and it transmits to the other distribution stations. The
power from the distribution station goes as 25 kv to the end users. These can have wide-
ranging requirements, from relatively uncomplicated secondary stations to complex primary
substations that provide critical low latency functions such as teleprotection. Within the
networks consists from of many buses namely system, process, and multi-service. These
distributions involve the field area network.
System Control Tier—This tier includes all of the wide area networks (WANs) that connect
substations with each other and with control centres. Their high-end performance
requirements can be stringent in terms of latency and burst response. Flexibility is needed due
to the geographical challenges. System control tier networks provide connection to SCADA
devices, event messaging and also provides teleprotection at substation.
Intra-Control Center/Intra-Data Center Tier—
This tier deals with networks inside utility data centres and control centres. Both are at the
same logical tier level, but control centres have very different requirements for security and
connection to real-time systems. Data centres provide enterprise data application. Control

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

system deals with the real time systems and grid. The transmission, monitoring is done on the
substations and it involves both the operation of IT and OT.
Utility Tier—This tier is the home ground for the enterprise networks. It acts as connection
between link control centres and enterprise network. Security for this control centres are
provided by the firewall. Utilities operate on multiple control centers and campuses across a
wide geographic area. Metro and regional networks are included in this tier.
Balancing Tier—This tier includes networks that connect generation operators and
independent power producers with balancing authorities, and balancing authorities with each
other. One may produce excessive power and the other may produce less, balancing
authorities may distributed energy resources and balance the load. If the electricity demand
and power supply fall out of balance, balancing tier contacts the third party vendors and
collaborate for the need of the grid
Interchange Tier— The networks at this tier connect regional reliability coordinators with
transmission operators and power producers, and wholesale electricity markets with market
operators, providers, retailers, and traders. The electricity may be exchanged for gas and oil
with the other traders.Utilility operators buy and sell electricity.
Trans-Regional or Trans-National Tier—This tier includes networks that connect
synchronous grids for power interchange, as well as emerging national or even continental
networks for grid monitoring, inter-tie power flow management, and renewable energy
markets. This deal about the utilities of different countries and their region grids. The below
figure explain about the continental grid of Europe and North America.

fig.5.12: Interconnection of north American Electric Power Grid

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

fig5.13: synchronous Electrical grid of continental Europe.


WAMCS Tier—This tier encompasses the networks of power management units (PMUs)
known as Wide Area Measurement and Control Systems (WAMCS), Wide Area
Measurement Systems (WAMS), or Wide Area Measurement, Protection, and Control
System (WAMPACS). This tier connects to entities at other tier levels, through special
network arrangements. In cases of wide area, low-latency networking, the owner of the
network may not necessarily be one of the entities using it to share PMU data.
each grid block has the following features
 Primary substation grid block
 system control grid block
 field area network grid block
The Primary substation grid block and substation automation:
Power industry has the power to connect devices and control through telecommunication.
IOT is considered to be the future level.
SCADA: Through the SCADA the remote devices are controlled by the central server.
SCADA plays a important role in substation it controls the data acquisition of the remote
devices which is called as remote terminal units, programmable logic controller and
intelligent electronic devices. Master slave operation is carried out. SCADA master is the
server and the remote devices are termed as the SCADA slaves.WAN networks made
SCADA to connect to the remote terminal units.SCADA master is being placed at the
substation. SCADA uses three protocols namely Modbus, IEC 60870-5, and distributed
Network protocol (DNP3)

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

FIG.5.14: SCADA in substation.

IEC 61850 Modernization of substation Communication Standards

To modernize the services of substation IEC technical committee 57(TC57) developed the
IEC 61850 standard. Serial links are replaced by the Ethernet and IP .It is cheap.

IEC61850 Station bus:

There are three levels of substation namely, station level, bay level and process level. There
are two bus namely station bus and process bus. The station bus acts as a interface between
the station level and the bay level. Station level communicates with the IED. The bay level
devices deal with the high voltage devices and it is linked with the two buses station bus to
manage SCADA and process bus for the gear operations and the transformer functions.

There are three traffic classes

 Manufacturing Message Specification:MMS supports client server communication


over IP
 Generic Object Oriented Substation Event: it is a multicast communication for the
power measurements
 Sampled Values: This traffic carries voltage and current samples.

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

Synchrophasors are time synchronized electrical numbers to monitor phase and


power

Fig.5.15. substation Automation Hierarchy

IEC 61850 Process bus: This bus is helpful in measuring the quality of the electric power.
Current transformers, potential transformers, and data acquisition. It checks the overall
functioning of the grid. Process level devices communicate by means of the Ethernet.

Migration to IEC 61850: IEC 61850 is good standard of communication for the substation
architecture. Legacy RTU combine with the IEC 61850 to perform substation functions.IEC
61850 will rule the substation OT networks.

Network Resiliency Protocols in the substation:

Network Resiliency protocol was designed by the IEC. It describes about two another
protocol namely parallel Redundancy Protocol and high availability seamless Redundancy.
These two protocols are used in the substations.

Parallel Redundancy Protocol:

PRP is given by the IEC; it is an automation network where there is no loss of frame during
the network transfer. It works based on the dual VLAN ring if there is any failure the other
will compensate the failure. The feature is termed as dual redundant Ethernet networks.PRP
switch acts as red box (Redundancy box)

fig.5.16 with PRP and without PRP.

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

High availability seamless Redundancy: This protocol works by the parallel network
segments. It is similar to PRP.PRP can be deployed in any kind of topology ,HSR can be
deployed using ring topology.HSR red box sends the duplicate copies in the ring but in the
opposite direction.

System control grid block : The substation WAN

WAN is used for interconnecting substations and the control centre .Teleprotection requires
proper WAN design to avoid the problems of jitter and latency. Protection is mechanism to
avoid the abnormal conditions.Teleprotection indicates the information transported over
networks. Connection between the transmission substation and the primary distribution
substation

Defining Teleprotection:

Teleprotection is defined in two ways .they are distance protection and current differential
protection. The communication is carried out between the relays.

Distance protection: This finds the inacceptable variations in the circuit. If there is change
in the threshold automatically relay determines the fault in the line. The fault will be
identified and recovered. Concept is based on the impedance of the circuit. The impedance
measured differs from the expected impedance we can identify the fault and restore it.

Current Differential (87L) Protection:

This compares the current value with the two distant relays of different substations.
Differential protection requires the timing synchronizations between the substations. There
are two types of synchronizations, GPS based synchronization, and channel based
synchronization. Relays are connected back to back by the time division multiplexing
circuits.

Designing a WAN for Teleprotection:

All networks migrate to multipurpose packet networks such as MPLS .It is multitenant and
provides multiservice. IETF and ITU joined together to produce the MPLS-transport profile
which has automatic protection switch and OAM(operations, administration and
Management).MPLS –TE traffic engineering was developed to dynamically allocate label
switch path. This has a feature called call admission control (CAC).One more variant of
MPLS IS Flex LSP

Field Area Network (FAN) Grid block:

Last mile distribution grid is called as the field area network. This works with the co
operation of neighbourhood area network with additional field area router.FAN networks
provides pervasive monitoring. It controls the utilities between the distribution substation

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

and the end user. Multiservice is provided by the FAN. The following figure depicts the
field area router and the

Fig 5.17: multiservice grid

The above mentioned multiservice grid provides advanced metering infrastructure and
distribution automation.

Advantages of FAN:

 Highly secure
 scalable
 stable and resilient
 support for legacy systems
 flexible backhaul action

Advanced metering Infrastructure:

Smart meters are a microprocessor based sensors and controllers which provides two way
communications with enhanced security and authentication features. For every minute the
power consumption is recorded and it is updated by the web portal. Smart meters are
installed at the user’s place to capture the utility information and transmit it to the power
company. The consumer can see the latest and accurate billing and utility information
whereas power companies can improve customer satisfaction by providing flexible payment
options. This can also help in reducing losses and theft of electricity.

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

FIG.5.18.:KwH METER

Distribution Automation:

Substation is automated by the network connectivity of distribution network .devices are


automated in the network. A improves the quality of the grid. This measures the fault in the
grid. There are few systems associated with the FAN-DA they are

Distribution SCADA systems: Automation of the electrical grid

Fault location, ioslation and service restoration: it is used to identify the problem and to self
rectify it.

Integrated volt/VAR control (IVVC): monitor and control the voltage levels during peak
times

SMART GRID

The smart meters are connected to a smart grid. The smart grid helps in identifying, areas
which uses more power or areas which is using less power. This information can be used to
manage power generation stations with respect to the usage scenario. Smart grids can also
help with real-time identification and correction of faults in the grid using IoT.

Smart grid security considerations:

FAN security has the following principles

 access control
 data integrity and confidentiality
 threat detection and mitigation
 Device and platform physical integrity.

Future of smart Grid:

Renewable energy is gaining importance. Distributed energy resources with the renewable
energy become a challenging environment for the grid. Electric cars may require large

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

power from the grid in the coming days. The DC power has to b converted into AC power
,it requires inverter and meters to track the usage of power in the grid.

5.7 Smart and Connected cities:

Our world population lives mostly in cities, rapid growth takes place in the smart cities
infrastructure. Cities growth contributes more to the economic development of the country.
There are few things to be addressed namely Iot strategies for Smarter Cities, smart city IoT
architecture, smart city security architecture and smart city use case examples.

An IoT strategy for smarter cities:

ICT infrastructure relays a foundation for the smart cities. The quality of life in the cities is
increased by the information and the communication technology. Smart city is technology
evolved from the internet of things.

Vertical IoT Needs for smarter cities: The needs include the sensors which help gathering
information, data analytics which analyses the data intelligently to make decisions. Smart
mobile devices are again integrated to the smart environment in the smart cities. Smart
cities combine with use cases of business and it generates more benefit.

Smart buildings: these buildings can reduce the energy consumption, heating, ventilation
and air-conditioning (HVAC) is practised. By using smart buildings $100 billion can be
saved

Gas monitoring: utility is managed by measuring the meter. This gives information that
uses the particular utility. If there is any failure or any abnormal events happening the alert
message will be issued immediately to the central authority. This saves around $69 billion

Smart parking: you can find your nearest parking space in a city.Muncipalities can request
for the demand based pricing from the users. This saves $41 billion

Water management: smart water system management deals with the water meters which
give information about the usage of water .It can detect the leakage of waters, level of water
in tanks; you can control the flow of water.etc.This saves around $39 billion

Road pricing: real time traffic data is obtained from the roads and traffic is re routed
according to the data. This enables automatic payment for vehicles which saves $18 billion.

Smart cities can make use of the water management, smart meter, smart parking, and gas
monitoring to improve the return of investment. This influences more on economic impact.

5.8 Smart City IoT Architecture:

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

It has four layers namely street layer, city layer, data center layer and the services layer.
The data is collected at the street layer and passed on to the city layer and it is connected to
the data center layer where your data is analysed , manipulated and processed for sending
to the services layer and its application. The services are provided to the user from the
service layer. Normalized language and open API are used in this infrastructure

Street layer:

This layer has sensors and devices which collects data. Sensor senses the physical world
and collect data around us. There are many sensors namely magnetic sensor, air quality
sensor, video camera, lighting camera and device counters.

 magnetic sensors senses the parking event of car or truck


 video camera is used to sense the traffic of the vehicles
 air quality sensor can measure the amount of gas pollutant in that particular area
 lighting controller to monitor and adjust light based on the environment condition
 device counters gives the exact number of vehicles, devices in the particular area

Choosing a sensor depends on the application we deploy .sensors should be deployed in the
inaccessible place. Sensors are battery operated devices and provides energy efficient
system. Sensors can send data with minimum delay. It can send data to the central system
with some time interval maintained. Analytics is performed on the data collected from the
sensors at the edge. Video sensors may record the data about the faces, data collection and
storage is an important .various communication protocols are used in the devices for the
transfer of data between the layers.LoraWAN is been utilized by the smart city sensors.
Many sensors come with their gateway which allows them to communicate on their own.Iot
network infrastructure is the base for the smart city.

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

fig.5.19. Smart City Architecture:


City Layer: network routers, switches are deployed in the city layer which helps in routing
the data to the next layer. It acts like a transport layer which transmits the data between the
devices and the data centers.missed data or loss in the packet may be identified by the alert
message or the status report. Resiliency is ensured by the resilient Ethernet protocol.
Data centre layer: The data collected is processed in the data center.Data during traffic is
collected and processed in the data centres, based on the information obtained it will regulate
the traffic and the street light in that area. It helps in reducing the traffic congestion. Data is
being stored in the rented containers. We can extend the service of the containers based on
the need. Cloud is considered to be the base for the storage, virtualization and data analytical
processing. Real time data of the city is maintained at the data centers.cloud can handle the
huge amount of data for processing. The cloud layer (i.e) data centre is deployed in three
ways, infrastructure as a service, software as a service and platform as a service. Few data is
processed at the edges when it is obtained from the multiple sensors and it is sent for storage
in the data centres.
Service Layer:
Applications in the service layer provide visibilities to the user. The data collected has to be
visualized by the end user based n the needs of the users and their particular specific use
cases. Based on the data available we can arrive at different solutions for example with the
help of traffic data u can reroute the vehicles, u can insist the users to go for other modes of
transport if there are much traffic in roads, or u can instruct the railway to increase the
number of trains as there is traffic congestion in roads. The same data can help in the
different use case scenario problems. Service layer can provide cross domain benefits

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

On premises vs. cloud:


On premises deals with traditional networks. The data can be stored in the traditional network
or the cloud. Cloud has been associated with the security risk. Laws should protect the
physical location of data .city will start with the traditional network and later it would be
deployed in the cloud. Hybrid methodology would be followed. Few data would be stored
locally and some amount of data is shared to the cloud where analytics is performed on the
data which is on cloud

Fig.5.20 smart city of sterlite tech


5.8.1 Smart city security architecture:
Data security is important concern in smart city structure. It involves the city relevant data of
the public. It is very essential to preserve the data citizen’s data from the hackers. If parking
sensor data is given to private he may sell the data to insurance company. So it is necessary to
protect the sensitive data collected by the smart city application. Security should be
maintained from start sensing layer till the end of the service layer. Security protocols should
be utilized on all layers. Hijacking the traffic sensors and sending false signals may result in
dangerous events. So security mechanism should be added to the smart city requirements.
Public key infrastructure and protocols should be installed in sensors .authentication and
authorization should be done at all levels. The data in the cloud should be protected. Mutual
transport layer security (Mtls) feature provides the authentication function and OAuth
provides restricted access to the users.
the security in the network layer(city layer) is provided by the

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

 Firewall : located at the edge ,provides access control and provides remote access to
the data center
 VLAN: prevents intruders during data transmission
 Encryption: helps to prohibit data tampering and eavesdropping. Data would be
encrypted no hacker would get access to data.

fig.5.21: security in smart city


Smart City Use Case Examples:
The common applications used in smart city are

 connected street lighting


 smart parking
 smart traffic control
5.9 Connected Street Lighting:
To reduce the lighting expenses and reduce the investment cost we can go for smart street
lighting. Light emitting diode technology consumes less energy and it can be produce bright
light than the traditional system and it has good life span.LED is adapted for smart city use
cases. The price of LED is less and it provides a better solution for smart lighting. A modern
network system uses LED for dynamic controlling of lights in the smart cities. Smart lighting
is playing a pivotal role, unlocking the power of the IoT and smart building applications.
Lighting is necessary throughout all buildings It is necessary for collecting data on what is
happening in the building at specific time. Sensors are embedded in the system making each
light point a data node on the network.

driving adoption of smart lighting systems is due to the following reasons

 Energy and operational savings


 Building Efficiencies
 Occupant Health and Well-Being.

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

 Smart Cities – Smart buildings are the building blocks of smart cities.
Architectural elements

Fig:5.22 key elements of smart lighting


A smart lighting solution has different type of devices, systems and network types.
Devices contains sensors, actuators, and advanced algorithms .The algorithms operate on
devices, or can run directly in the cloud stored as a web service to send command
messages to execute the different control actions. Several algorithms for smart lighting
helps in tuning the colour based on the real-time condition. Advances in smart lighting
systems that can help human circadian rhythms to improve mood and concentration of
users. Above fig shows key elements for smart lighting systems.

Lighting network can support different topologies such as a ring, star, line tree, bus, mesh
or a hybrid arrangement to provide a high degree of reliability. The network management
can be controlled by local or remote procedure. Wired or wireless communication
interfaces can be deployed for IoT ecosystem for lighting. Common wired
communication interfaces use 0-10V, RS485, DALI, DMX, LON, KNX, BACnet, power
line and Ethernet protocols.
Sensors for smart lighting platforms
Smart lighting system has different working sensor technologies and communication
interfaces. The modern IoT lighting platforms aim to control lighting depending on
changes in the environment with a wide range of digital sensors. Below fig shows
different sensor types to implement in such systems.

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

fig 5.23: sensors for smart lighting

fig 5.24: smart street light management system.


Street lighting architecture:

It is a light management application developed to control street lights in the smart city
structure. Device IoT Gateway acts as a interface between the application and light. From
the Application the instruction is passed to the cloud ,then to the gateway, gateway finally
transmits the instructions to the street light. The operator or the cloud can set the
automated schedule for the lights to glow. Many protocol like zigbee, 802.15.4 g are used
for connectivity.LED lights are embedded with sensors which can measure the motion,
pressure and humidity. Certain sensors can sense the amount of pollutants. The lighting
levels can be increased or decreased based on the no of vehicles detected .If any dangers
it can alert by police by smart message .the above fig depicts a sample street light
management system.

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

5.10 Smart Parking:


Finding a parking space for cars in a city is real problem across the globe. The problem
arises due to the congested traffic in the cities. This problem can be solved by the smart
parking system.
There are few problems associated with drivers searching for the parking s

 pollution is increased
 motorist gets frustrated
 increases traffic accidents
In India, free parking space management is still a problem. Traditional parking
management systems use sensors and other communication module; it does not provide
solution for both open and closed parking space. Mobile applications are used to find a
parking slot using GPS. searching a place to park vehicles in populated area would waste
time and consumes fuel for the human .certain Mobile app are available which would
allow the users to register for the service in a particular destination and estimated arrival
time is specified, app need to find the free parking space and send the location to the user.
User makes the online payment to book the parking slot. the below fig, depicts the
architecture of smart parking system.

fig 5.25: smart parking

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

Infra-Red (IR) sensors are deployed that will find the number of parking slots, Number
of free and booked slots are graphically displayed in LCD screen, WIFI module is used
for communication between mobile app and sensors. The below figure shows a detecting
of empty parking slot and communicating used Wi-Fi to Arduino.

fig.5.26: using aurdino and Wi Fi to detect free slot

fig.5.27: another example of smart parking

There are various sensors used in smart parking namely magnetic sensors, video based
sensors, radar based sensors. These sensors are placed on the ground of the parking spot.
The zigbee or wifi or LoRa WAN network is used for connection to the gateway. The
data is sent from the gateway to the cloud. Smart mobile applications are used to assist in
smart parking system.

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

5.11 Smart Traffic Control

Traffic is one of the important consideration in any city infrastructure. Traffic leads to
many problems like accidents, pollution and frustration. Smart traffic could eradicate few
problems related to traffic congestion or frustration.
Smart Traffic Management
Smart traffic management is a system which controls and monitors the city traffic. It uses
sensors and traffic signals to monitor, control and respond to traffic conditions. Centrally
managed sensors and traffic signals are found on the city’s main roads.
The aim of smart traffic management systems:

• congestion is reduced by improving traffic flow


• traffic is prioritized based on real-time changes in traffic environment
• pollution is considerable reduced by avoiding traffic jams
• traffic incident response time is immediately reported by creating a more
effective system to monitor and manage traffic incidents
 Smart Traffic Control System Components
Smart traffic control systems generally use three devices:

• A central control system


• Smart traffic lights
• Cameras and queue detectors
The cameras and queue detectors inform the control system of real-time traffic conditions
on busy city roads. Every two seconds, the control system checks whether it is necessary
to adjust traffic light activity. A smart traffic control system immediately adapts and
adjusts to improve punctuality of buses, reduce the number of queuing vehicles .Smart
traffic lights minimize inefficiencies such as traffic jams or vehicles waiting at empty
intersections. A network of smart traffic lights can identify patterns in traffic conditions
and update their signals in real time.
Smart traffic signals improve traffic flow by:

• Congestion is detected:.
• Synchronize traffic light activity.
• Traffic lights glow based on real-time traffic conditions.
• Updating and informs drivers of their speeds
• Prioritize the transport during any kind of emergency
Big Data And IoT Make Traffic Management Even Smarter
A city contains big data and the Internet of Things (IoT) as portion of its smart traffic
system. IoT represents the smart, connected devices like sensors, vehicle-mounted
information systems, and smart mobile phones. These devices transfer information via the

Downloaded by Training and Placeme -Amalapuram ([email protected])


lOMoARcPSD|52203584

internet to a central cloud or data centre for analysis of the data. Big data analysts are
analyzing the data, and they assist in controlling the traffic management and flow.

Citizen traffic applications, enforcement applications ,Traffic Ops Center


Platform
Cloud analytics ,API Integration
Real Time Buffer or meta data and video stream
Vehicle counting(eg:no of cars),traffic-onboard analytics
fig 5.28.Smart city Traffic Architecture
First onboard analysis is done for example it counts the number of vehicles travelling in
the particular lane. The data is recorded and stored by the real time buffering unit. The
video is recorded and data is sent to the upper layers by the network .analysis of data is
done and it which vehicle is moving in wrong direction. The data analysed is integrated
with the application programming interface. The end service is provided to the user by
certain service apps.
Smart Traffic Application:Application will take immediate action according to the
traffic flow. Many applications share the information with drivers so that he can reroute
if there is any congestion .These kind of application provide drivers with better driving
experience.

Downloaded by Training and Placeme -Amalapuram ([email protected])

You might also like