Industrial Evolution – Lessons Learned Industrial Evolution – Lessons Learned 3 Years of PI Hosting 30 Servers Deployed Simon Wright President, Industrial.

Slides:



Advertisements
Similar presentations
Network Systems Sales LLC
Advertisements

Handheld Contact Wireless syncing ACT! Blackberry and Windows Mobile 5/6.
Ed Duguid with subject: MACE Cloud
MUNIS Platform Migration Project WELCOME. Agenda Introductions Tyler Cloud Overview Munis New Features Questions.
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Empowering Business in Real Time. © Copyright 2009, OSIsoft Inc. All rights Reserved. Virtualization and HA PI Systems: Three strategies to keep your PI.
Compliance on Demand. Introduction ComplianceKeeper is a web-based Licensing and Learning Management System (LLMS), that allows users to manage all Company,
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Hosted Exchange 2010 Enterprise Grade and Collaboration Solutions for Small and Medium Businesses Web Site:
June 23rd, 2009Inflectra Proprietary InformationPage: 1 SpiraTest/Plan/Team Deployment Considerations How to deploy for high-availability and strategies.
Cold Fusion High Availability “Taking It To The Next Level” Presenter: Jason Baker, Digital North Date:
Firewall Configuration Strategies
Monitoring a Pipeline and Sharing Data with Key Customers How to do this when you own the pipeline but do not operate it!! Bert Stipelcovich IT Manager.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Course 201 – Administration, Content Inspection and SSL VPN
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Effectively Explaining the Cloud to Your Colleagues.
Treasury in the Cloud Bob Stark – Vice President, Strategy September 17, 2014.
Barracuda Load Balancer Server Availability and Scalability.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
Chapter 7: Using Windows Servers to Share Information.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada Lecture Outline eCommerce Highlights of Electronic Business 2-1.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
Web Authoring Rico Yu. Ch.11 Web Posting and Web Hosting Web Host Types of Web Host Web Posting.
SODA Archiving October 2013
70-411: Administering Windows Server 2012
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
ProTRAQ™ Vendor-Managed Inventory
Chapter 6 of the Executive Guide manual Technology.
PI on a Mini-PC PI on a Mini-PC Remote Data Collection with Intelligence Roland Heersink Industrial Evolution Chuck Wells OSIsoft.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
OSIsoft User Conference Monterey, March 2002 Tank-to-Boardroom: Inventory Management Comes of Age! A web service strategy featuring OSIsoft Technologies.
The ProactiveWatch Monitoring Service. Are These Problems For You? Your business gets disrupted when your IT environment has issues Your employee and.
Generic Routing Encapsulation GRE  GRE is an OSI Layer 3 tunneling protocol: Encapsulates a wide variety of protocol packet types inside.
OSIsoft User Conference Monterey, March 2002 Collaborative Manufacturing Haldor Topsøe Using PI to Improve Diesel Hydrotreater Performance & Summary of.
OSIsoft User Conference Monterey, March 2002 PI ICE Deployment Industrial Evolution’s Experience with PI ICE Implementations Roland Heersink, CEO Sylvain.
Archiving Solutions Software vs. Hosted vs. Appliance Based.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
IT in Business Issues in Information Technology Lecture – 13.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
Network Infrastructure Microsoft Windows 2003 Network Infrastructure MCSE Study Guide for Exam
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
August Video Management Software ViconNet Enterprise Video Management Software Hybrid DVR Kollector Strike Kollector Force Plug & Play NVR HDExpress.
Data Hosting and Security Overview January, 2011.
Internet of Things. Creating Our Future Together.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Chapter 6: Securing the Cloud
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Securing the Network Perimeter with ISA 2004
Virtual Private Networks (VPN)
Virtual Private Network
Ron Carovano Manager, Business Development F5 Networks
Designing IIS Security (IIS – Internet Information Service)
Topic 12: Virtual Private Networks
STATEL an easy way to transfer data
Presentation transcript:

Industrial Evolution – Lessons Learned Industrial Evolution – Lessons Learned 3 Years of PI Hosting 30 Servers Deployed Simon Wright President, Industrial Evolution

Industrial Evolution – Lessons Learned What we set out to do What we actually do Some statistics Architecture How we use PI System software Security! Security! Why our services are used 3 case studies Summary of lessons learned

Industrial Evolution – Lessons Learned History Lesson

Industrial Evolution – Lessons Learned What We Set Out to Do – March 2000 Main funding by OSIsoft Service offerings AnyWhere & AnyTime – Web access to PI data outside firewall BestInClass – Hosted applications integrated with PI data WorldsBest – Remote consulting by 3 rd parties using PI IndustryBest – Benchmarking one plant vs another Introduced at OSI Users Conference 2000 Focus on value - no “PI-in-the-sky”!

Industrial Evolution – Lessons Learned What We Actually Do – May 2003 Now at OSIsoft Users Conference 2003 Strong, strategic partnership with OSIsoft Service offerings AnyWhere & AnyTime BestInClass WorldsBest IndustryBest 60% 10% 30% In progress And… We added ProTRAQ & ChemLogix VMI!

Industrial Evolution – Lessons Learned Plus… We Got PI in the Sky Buy More PI…

Industrial Evolution – Lessons Learned Secure Communication Link Management : Wireless Access Vendors : Inventory Management Experts : Remote Consulting Suppliers : Remote Support Industrial Evolution Customer Secure Data Sharing

Industrial Evolution – Lessons Learned Sample Projects

Industrial Evolution – Lessons Learned Data Center Architecture Development Network Test Network Dedicated Network Shared Network Internet Web Servers PI Servers Mail Servers PI-API Servers PI Servers App Servers Dot.Net Servers ICE Servers ACE Servers Test Web Servers Development Servers Public Private Firewall

Industrial Evolution – Lessons Learned Service Statistics Data collection >35 source locations (>250 with ChemLogix) >800 events/second >100,000 data streams total Users & displays >250 user accounts created >650 ICE dashboards >4,000 web parts >500 other web displays Data forwarding ~5,000 data points forwarded to others Application Hosting ~15 live applications System ~30 servers >99.9% up-time Penetration >70 companies served (>300 with ChemLogix)

Industrial Evolution – Lessons Learned How We Use PI – I PI is at the heart of all our service offerings Data received multiple ways: PI-to-PI PI interface (for PHD, IP.21, WW, etc.) Modem connection FTP transfer parser Manual entry Calculation & application results Data stored in PI MDB used for structure SDK for.NET & other application data I/O PE’s for simple calcs ACE for applications (e.g. ProTRAQ) ProcessBook for display authoring ICE for Web displays OLEDB provider

Industrial Evolution – Lessons Learned How We Use PI – II IT Monitor for server & network monitoring Bandwidth Usage Server CPU, Memory Usage and Disk Space PI attributes (Archived and Snapshot events, PI-PE) Network availability Web server usage and availability Key application processes

Industrial Evolution – Lessons Learned Source Database Integrity Data Transfer Security Data Center Security User Access Security Security!

Industrial Evolution – Lessons Learned Source Database Integrity Objective Ensure the source database and its associated servers and networks cannot be harmed Solution Deny users direct access through firewall to networks or PI System Create replica database containing values to be shared Synchronize source database with replica database through single secure “tunnel” out through firewall Allow users to only access the replica database

Industrial Evolution – Lessons Learned Source Transfer Security Objective Install secure interface to local data source Establish single communication channel through firewall Ensure communications cannot be intercepted Solution PI-to-PI (or PI-to-”Other”) interface PI point-level security Branch office VPN using IPSec to complaint gateways or VPN appliances 3DES encryption MD5 or SHA1 authentication Shared access lists

Industrial Evolution – Lessons Learned Data Center Security - I Objective Safeguard data and systems against physical intrusion Protect data and systems from loss Solution Dedicated data center 24 x 7 building guard Key-pad entry & intrusion detection Heat & smoke detection Server room temperature tracking Back-up process & off-site storage Personnel contract terms

Industrial Evolution – Lessons Learned Data Center Security - II Objective Safeguard data and networks against hackers Solution Firewall Windows 2000 IIS security PI security Anti-virus detection Abnormal usage monitoring

Industrial Evolution – Lessons Learned

Data Center Security - III Objective Guarantee data integrity Maintain system availability Solution Redundant systems Load balancing Clustered servers with auto-failover Automatic data recovery after communications failure Performance monitoring PI security

Industrial Evolution – Lessons Learned User Access Security Objective Ensure data only gets to those authorized and in the form intended Solution Verifiable UserID and Password Renewal process Windows authentication Proprietary security layer Optional – Digital certification Optional – Physical tokens SSL encrypted communications

Industrial Evolution – Lessons Learned Case Study I – Remote Monitoring by 3 rd Party Consultant Requirements 3 rd party access to customer’s PI data Integration with software application Remote access Industrial Evolution solution $2-3,000 in labor (application integration) No hardware; No software ~$1,000 per month service fees Alternative approach ~$100,000+ (mainly labor & hardware) Install in-house PI System Request customer build duplicate PI System in DMZ Establish VPN & PI-to-PI Who pays? Who maintains? Whose expertise?

Industrial Evolution – Lessons Learned Requirements 3 rd party access to manufacturer’s PI System Personalized access privileges for each partner Industrial Evolution solution $5-10,000 in labor (new displays & reports) No hardware, No software ~$1,000 per month service fees Alternative approach ~$100,000+ (mainly labor & hardware) Build duplicate PI System in DMZ Support and maintain 3 rd party access Support 3 rd party users Case Study II – Manufacturer Shares Data with 3 Partners

Industrial Evolution – Lessons Learned Requirements Scheduler wishes to replenish inventory before customer runs out Salesman wants opportunity to sell up Company needs access to inventory data from each customer site Industrial Evolution solution <$1,000 in labor No software Field hardware – as required (depends what exists) ~$ per location per month service fee Alternative approach ~$30,000 (mainly labor & system hardware) Field hardware – as required (same in both cases) Case Study III – Data Collection from 5 Customer Tanks

Industrial Evolution – Lessons Learned Summary of Lessons Learned - I PI performance is “as-advertized” – second to none Interfaces robust and performant Communication across the Web consume minimal bandwidth Security is customers’ #1 concern We treat it as our #1 priority We have invested significantly to avoid, detect, defeat and recover from intrusion Concerns over attacks exaggerated We have experienced 0 hack attempts in 3 years; (We have to hack ourselves to test systems) In the same period, 5 mailed articles were lost in transit Availability We have invested significantly to ensure availability Weakest point is the ISP

Industrial Evolution – Lessons Learned Summary of Lessons Learned - II Latest products from OSIsoft are strong We are at the leading edge of field testing When to use Industrial Evolution? Not for Web visualization of your own PI data – buy PI-ICE When you want to share your PI data with your customers, suppliers, or partners When you wish to have access to real-time data from your customers, suppliers or partners Services are competitive for any scale of collaboration 1 tag – e.g. level on a tank 30,000 tags – e.g. pipeline meter information It does not make sense to build a system and try and support it that relies on multiple connections to multiple parties – who pays? who is responsible for what?