Applied Sciences: Future Industrial Networks in Process Automation: Goals, Challenges, and Future Directions
Applied Sciences: Future Industrial Networks in Process Automation: Goals, Challenges, and Future Directions
Applied Sciences: Future Industrial Networks in Process Automation: Goals, Challenges, and Future Directions
sciences
Article
Future Industrial Networks in Process Automation:
Goals, Challenges, and Future Directions
Johan Åkerberg 1, *, Johan Furunäs Åkesson 2 , Jorgen Gade 3 , Maryam Vahabi 1,3 , Mats Björkman 1 ,
Mehrzad Lavassani 1,4 , Rahul Nandkumar Gore 1 , Thomas Lindh 5 and Xiaolin Jiang 3
1 Division of Networked and Embedded Systems, Mälardalen University, 721 23 Västerås, Sweden;
[email protected] (M.V.); [email protected] (M.B.); [email protected] (M.L.);
[email protected] (R.N.G.)
2 Westermo Network Technologies AB, 721 30 Västerås, Sweden; [email protected]
3 ABB AB Corporate Research, 721 78 Västerås, Sweden; [email protected] (J.G.);
[email protected] (X.J.)
4 Division of Industrial Systems, RISE-Research Institutes of Sweden, 852 33 Sundsvall, Sweden
5 Iggesund Paperboard, 825 80 Iggesund, Sweden; [email protected]
* Correspondence: [email protected]
Abstract: There are many initiatives and technologies working towards implementing factories of
the future. One consensus is that the classical hierarchical automation system design needs to be
flattened while supporting the functionality of both Operation Technology (OT) and Information
Citation: Åkerberg, J.; Furunäs Technology (IT) within the same network infrastructure. To achieve the goal of IT/OT convergence
Åkesson, J.; Gade, J.; Vahabi, M.; in process automation, an evolutionary transition is preferred. Challenges are foreseen during the
Björkman, M.; Lavassani, M.; transition, mainly caused by the traditional automation architecture, and the main challenge is to
Nandkumar Gore, R.; Lindh, T.; identify the gap between the current and future network architectures. To address the challenges,
Jiang, X. Future Industrial Networks in this paper, we describe one desired future scenario for process automation and carry out traffic
in Process Automation: Goals,
measurements from a pulp and paper mill. The measured traffic is further analyzed, which reveals
Challenges, and Future Directions.
representative traffic characteristics in the process automation. Finally, the key challenges and future
Appl. Sci. 2021, 11, 3345. https://
directions towards a system architecture for factories of the future are presented.
doi.org/10.3390/app11083345
network infrastructures in one maintenance task with the latest technologies. In order
to benefit and increase the probability of adaption in the installed base, e.g., brown-field
installations, a stepwise introduction would be beneficial. The COVID-19 pandemic has
further pushed the need for stepwise upgrades due to the fact that all personnel cannot be
on-site, thus, many need to solve their daily tasks remotely.
Figure 1. The traditional and hierarchical automation pyramid that has been the de facto standard
for three decades.
As the traditional automation pyramid serves its purpose with respect to safety, fault
containment, and enforcing traffic types into dedicated levels in order to meet requirements
such as availability, deterministic behavior, and high throughput, the integration of new
high-level functionality is hard to achieve. New functionality that requires (new) informa-
tion from the factory floor imposes certain challenges. This is mainly because the networks
at the lowest levels have real-time requirements, and in order to guarantee deterministic
behavior, other unrestricted traffic is typically not allowed, or not even possible.
The desired network architecture design that accommodates both IT and OT traffic
on the same platform is illustrated in Figure 2, where a single bus is shared by different
services on time-stringent OT network components (e.g., Field Communication Interface
(FCI), dedicated I/O devices, Centralized Network Configuration (CNC), Human Machine
Interface (HMI)) and IT network entities (e.g., Enterprise Resource Planning (ERP), Man-
ufacturing Execution Systems (MES)). In fact, customers aim at increasing operational
efficiency by decreasing downtime, providing interoperability for the best of the breed, and
increasing flexibility and portability. This can be further translated into collapsing multiple
one-purpose networks that carry dedicated protocols into one general purpose network
that can accommodate both IT and OT traffic in the same infrastructure.
However, this imposes new challenges and ways of working when deploying con-
verged networks. Especially, priorities, Quality of Service (QoS) levels, as well as avoidance
of bottleneck links have to be carefully handled, since all traffic classes and traffic types
need to coexist while meeting the sum of all requirements to have a sustainable production
plant. This task may be difficult even in a green-field scenario, where the latest technology
can be installed and commissioned without previous systems that impose constraints.
In the brown-field scenario, it is even more challenging, as one may not know what traffic
exists and where or how close to the capacity ceiling the network is. Having actual traffic
performance from actual installations will guide the research in the green-field scenario
and is essential in brown-field scenarios. By ensuring the overall network performance, it
would be possible to enable new services and business opportunities by unlocking stranded
information and letting, for example, mobile operators and maintenance personnel have
access to relevant information from the converged network. This is not an easy task in
Appl. Sci. 2021, 11, 3345 3 of 15
itself. However, the Return-on-Investments (RoI) of the installed base has to be considered
as well to enable a step-by-step transition towards the future industrial networks.
Cloud
Firewall
Firewall
Real-time Network
Dedicated
FCI Controller
I/O Wireless AP
Figure 5. Traffic flows from one of the paperboard machines during recording hours.
with a fluctuating network load are more difficult to classify in this way, as they might
contain both periodic and aperiodic traffic. Those VLANs require a more in-depth analysis
in order to be classified correctly. As previously mentioned, the control networks should
have predictable network utilization over time. Figure 7 illustrates this expected behavior
with a limited range in both packet size and the number of packets per second, as well as
the contribution of different protocols in the VLAN.
In Figure 8, the number of packets and the amount of data transmitted in the server
network (VLAN-F) is shown as well as the distribution of different protocols. In this VLAN,
it can be observed that both the number of transmitted packets and the average size of
the payload vary over time. However, from the lower part of the figure, it can be seen
that approximately 2000 packets per second is a base-load, with occasional traffic peaks.
This behavior could be explained by the fact that the operator stations are subscribing
for periodic status updates with a limited variation in packet size, from connectivity
servers. The periodic updates would then serve as the base-load in the server network.
The variations are then an aggregate of the various protocol types shown on the right-hand
side. An example of sporadic traffic is when the operators change the process views on
their screens to a different section of the process. This change causes traffic bursts due
to requests to start and stop subscriptions of information corresponding to the previous
and new process view. Another example can be when the operators transmit and receive
production data to the Manufacturing Execution System (MES) or other information to
file servers or similar. Generally, this sporadic traffic has a larger packet payload, shown
in Figure 8.
Figure 6. Traffic per Virtual Local Area Network (VLAN); illustrated in logarithmic scale.
Figure 7. Traffic between AC800Ms and Connectivity Servers in VLAN-G. The pie chart shows the proportion of consumed
bandwidth by various communication protocols.
Appl. Sci. 2021, 11, 3345 7 of 15
Figure 8. Traffic between the connectivity servers and operator and engineering stations in VLAN-F. The pie chart shows
the proportion of consumed bandwidth by various communication protocols.
Knowing about the diversity of OT network traffic, the main challenge would be
finding appropriate methods to accommodate OT traffic together with unforeseeable IT
network traffic in the same network while still guaranteeing real-time property for process
automation applications. The following section will discuss possible technology enablers
that aim to achieve such a goal.
3.1. TSN
TSN is a set of IEEE 802 Ethernet substandards that have been developed by the
Time-Sensitive Networking task group of the IEEE 802.1 working group [12] with the aim
to enable deterministic real-time communication over Ethernet. TSN achieves determinism
over Ethernet using a set of tools that can be partitioned into four main domains of (i) time
synchronization, (ii) bounded low latency, (iii) ultra reliability, and (iv) resource dedication.
Table 1 lists a number of standards developed in each of these four domains. Time
synchronization deals with timing and synchronization; in other words, it provides the
network with synchronized clocks. 802.1AS-Rev is the main standard in this domain.
The Bounded low latency domain is responsible for the determinism, which guarantees
data availability at the expected time by applying different scheduling and forwarding
techniques. The Ultrareliability domain targets the reliability of the system, and focuses
on the errors, faults, and redundancy techniques to keep the system dependable. The
Resource dedication and application programming interface (API) domain enables the
high-level planning and configuration required to allow systemwide feature capabilities in
heterogeneous networks.
Table 1. A short list of IEEE Time-Sensitive Networking (TSN) Standards. API—application pro-
gramming interface.
The ongoing work on TSN promises hard real-time capabilities. It is also claimed that
TSN can reserve the bandwidth exactly according to the application latency requirement
and consequently enables the convergence of different networks into one common network
that transmits time-sensitive control data together with best-effort data and data with soft
real-time requirements. Although this can be seen as a real game-changer for real-time
automation applications, it is still unclear how to efficiently select a set of TSN Standards
and tune the relevant settings.
In order to derive and develop technical solutions that will enable a transition towards
an information-centric architecture, we need to consider how the process industries are
established and evolving to stay profitable and competitive. The most obvious scenario that
comes to mind is when a brand new production site is built. In this scenario, the automation
system providers are competing with their latest and most advanced products and system
solutions that solve the site owner’s needs. This is referred to as a green-field installation.
Another scenario in process automation, probably the most common scenario, where the
Appl. Sci. 2021, 11, 3345 9 of 15
company is long-time established with one or more large-scale production sites. Those
established companies are most often either modernizing or extending their production
capacities or product ranges. In this scenario, there is already a large installed base of
automation equipment, as well as existing network infrastructures, in place. This is referred
to as a brown-field installation. Based on the two scenarios described above, one can
identify the need for a technology migration path in order to achieve the desired market
penetration to justify technology investments. In fact, the transition from the de-facto
hierarchical system architecture is essential for business and technology success.
Standardization of communication protocols used in hierarchical industrial systems is
a critical issue. Today’s control systems widely use Profinet and OPC Unified Architecture
(OPC UA) to meet the communication requirements of different levels. OPC UA has its
strengths in vertical communication between devices of different levels and controller-to-
controller communication at the control level. At the same time, Profinet meets all the
communication requirements in the field network. Today’s network only allows Profinet
as the real-time capable protocol (besides TCP/IP-based traffic). TSN will make it possible
to converge different communication means by simultaneously running multiple real-
time-capable protocols in a single convergent network. The IEC/IEEE 60802 TSN Industry
Automation profile proposes flattening of networks so that Profinet and OPC UA to operate
on the same network physical layer along with IT data communication such as cloud and
video. With TSN integration, the field-level device data and diagnostic information can
be collected by controllers from the field network using Profinet over TSN. OPC UA over
TSN can deliver the aggregated information to higher-level systems such as ERP, MES
and cloud to make informed decisions.
To achieve a flattened network architecture, the network infrastructure needs to cope
with the aggregated traffic while preserving the requirement of each traffic flow. As the
primary goal of process industries is to produce goods, all the functions are required to
operate flawlessly with high availability. If one function fails, the most common scenario
is that the process cannot continue to operate. This implies that the requirements and
characteristics of different types of traffic flows needs to be studied in relation to other
traffic. Furthermore, a high-level classification of various traffic flows can be done by
grouping them into different traffic types. The traffic types can then be mapped to network
functionality that enables the desired characteristics.
Table 3. Traffic mapping [13]. TC: traffic class, CT: cut-through, RS: reservation scheduling, M: mandatory, O: optional, C: conditional, R:
recommended, T : time-based, R : rate-based, *: end devices.
Types 802.1Q TC 802.1Qbv 802.1AS-rev CT 802.1CB 802.1Qbu 802.1Qci 802.1Qav RS
Isochronous M 6 M M O O MT M
Cyclic-Option: Strict Priority M 5 O R MR M
Cyclic-Option: Scheduled Traffic M 5 M M O MR M
Events-Control M 4 O O MR M
Events, Alarms, and Operator Commands M 3 M O MR O* M
Configuration and Diagnostics M 2 O MR M
Network Control M 7 C C
Video, Audio, and Voice M 1 O MT R M
Best Effort M 0 O
4. Evolution Challenges
This section focuses on main evolution challenges including engineering guidelines,
tools, security, reliability, and time-synchronization issues and describes the real-time
challenges in distributed systems. We also elaborate on possible directions for research in
the area of IT/OT convergence.
The existing OT and IT security approaches and policies [14,15] will need to be adapted to
embrace these new IoT security challenges. One important direction is the authorization
management that assigns the different access levels to only access the necessary data from
the OT domain. From the device perspective, smart industrial devices have much smaller
footprints of computing power and operating systems. The convention in the traditional
automation network assumes that no software or patches are needed once installed, which
leaves them to be an important attack surface that is vulnerable to new types of malware
or denial of service attacks.
4.6. Synchronization
Synchronization of industrial devices and systems with adequate accuracy and pre-
cision is an essential part of monitoring and control functions of automation systems.
Different synchronization requirements per application, harsh environment, and nondeter-
ministic networks make the synchronization in industrial systems challenging.
With TSN, the IEEE802.1AS standard is introduced. The revision of this standard,
IEEE802.1AS-rev, is under discussion. It is envisioned to provide fault tolerance and
highly accurate time synchronization. The green-field installations would get benefited
by implementing this feature-rich synchronization profile. However, the comprehensive
functional and security performance of a new profile in the industrial environment has
yet to be assessed.
In the case of brown-field installations, the automation systems typically require one
to a few thousands of milliseconds of synchronization accuracy for most of their applica-
tions. Since the TSN networks operate at the synchronization accuracy of nanoseconds
order, integrating legacy industrial devices to the TSN network and thereby achieving
deterministic data delivery of critical messages is technically challenging.
5. Research Directions
Among the discussed challenges above, the engineering guideline for brown-field
is the most important research question since it is the base for all the other functionali-
ties to build upon. Though each brown-field site also varies from each other in terms of
applications and end devices, it is adequate to derive guidelines with basic functionality
to achieve IT/OT integration in process automation together with the flexibility to tune
parameters in each site. An important aspect of the guidelines is to address engineering
of the network performance, i.e., performance analysis models and diagnosis methods
for the design of a scalable and reliable network that can detect errors and identify bot-
Appl. Sci. 2021, 11, 3345 13 of 15
tlenecks. This process requires broad knowledge about the various services and traffics
accommodated in the IT/OT network by learning their relevant parameters and important
Key Performance Indicators (KPIs). The direct challenge here would be that a green-field
that can evolve and adapt various TSN methods does not have any initial traffic to be
investigated. Therefore, studying brown-field traffic is the closest path to understand the
required performance criteria for various traffic types to provide the network performance
engineering guidelines of IT/OT networks. Along with the guidelines design, security
issues and solutions should come along, as the network structure and functionalities affect
the security performance and the security solutions in turn affect the network performance.
Another important research topic is the engineering tool, which is the key to bootstrap the
system and maintain smooth operation during the production phase. Reliability is also
important for control networks, and single-point failure protection should be considered
besides network redundancy. For the cases that require distributed real-time systems, both
configuration and synchronization are also essential, and distributed real-time system
configuration requires more domain expertise besides general solutions.
Related Works
As discussed earlier, modeling network traffic to identify network structure and data
flow characteristics can be seen as a prerequisite of network evolution. In this regard, there
exist many research works in the IoT domain, many notably considered intrusion and
anomaly detection [18–23], but very few have focused on the profiling network traffic of
industrial networks. Authors in [20] introduce communication models of various industrial
networks based on traffic profiling by applying probabilistic modeling on network traffic,
considering both periodic and aperiodic communication. However, the complexity of the
model demands a new round of learning with any configuration changes. Markov chain
model is employed in [19] to learn the regularity of packet flows by considering each packet
as a state.
An anomaly-based intrusion detection system that uses fuzzy logic to assess whether
malicious activity is taking place on a network is presented in [23]. The system consists
of a network data collector that reads raw network packets and stores them on a disk.
A network data processor then performs data mining on the collected packets, and finally,
the observed value is used as an input to the fuzzy analyzer.
Many research papers have reviewed different aspects of IEEE TSN standards [24–26].
A comprehensive survey of queuing and scheduling mechanisms for supporting large-
scale deterministic networks was discussed in [25], followed by the most recent research
work [26] that presents a comprehensive survey of TSN standards and research studies
addressing networking mechanisms for ultra-low-latency applications, such as in industrial
control. Instead, the authors in [24] provide an extensive overview of the different fault-
resilience concepts for IEEE 802.1 TSN networks.
Many research works have been conducted targeting a specific feature of IEEE TSN
standards, including fault tolerance [27–29], traffic planning and shaping [30–33], and time
synchronization [26,34]. However, it is important to mention that in this section, we only
highlighted some selected references and did not intend to present an exhaustive survey of
the broad and vast TSN research domain.
6. Conclusions
There is an increasing need to bridge the gap between the IT and OT networks in
the process industry to take the next leap in productivity and innovation. Our case study
at a typical process automation factory is a first step to provide the characteristics of OT
traffic and aims to inspire more research and standardization work towards the IT/OT
convergence for process automation. Due to the variety of process automation scenarios
as well as the underlying network topology, applications, and communication protocols
used, more case studies should be taken to reveal the comprehensive traffic characteristics
in process automation. TSN is one promising technology towards collapsing the networks.
Appl. Sci. 2021, 11, 3345 14 of 15
However, in order to deploy TSN in large-scale production facilities, many challenges need
to be addressed beforehand. Specifically, further research in the areas of efficient engineer-
ing, security, automatic tool support, traffic modeling and profiling, and online monitoring
are necessary. Moreover, it is crucial to preserve the performance and characteristics of
the distributed real-time systems that are required for process automation. We appeal
for more research efforts on deriving engineering guidelines for brown-field, including
network performance analysis, as it is the base upon which to add other functionalities
and eventually integrate IT and OT systems.
References
1. Bader, S.R.; Maleshkova, M.; Lohmann, S. Structuring Reference Architectures for the Industrial Internet of Things. Future Internet
2019, 11, 151. [CrossRef]
2. Trunzer, E.; Calà, A.; Leitão, P.; Gepp, M.; Kinghorst, J.; Lüder, A.; Schauerte, H.; Reifferscheid, M.; Vogel-Heuser, B. System
architectures for Industrie 4.0 applications. Prod. Eng. 2019, 13, 247–257. [CrossRef]
3. Colombo, A.W.; Karnouskos, S.; Kaynak, O.; Shi, Y.; Yin, S. Industrial cyberphysical systems: A backbone of the fourth industrial
revolution. IEEE Ind. Electron. Mag. 2017, 11, 6–16. [CrossRef]
4. Wollschlaeger, M.; Sauter, T.; Jasperneite, J. The future of industrial communication: Automation networks in the era of the
internet of things and industry 4.0. IEEE Ind. Electron. Mag. 2017, 11, 17–27. [CrossRef]
5. González, I.; Calderón, A.J.; Figueiredo, J.; Sousa, J. A literature survey on open platform communications (OPC) applied to
advanced industrial environments. Electronics 2019, 8, 510. [CrossRef]
6. Givehchi, O.; Landsdorf, K.; Simoens, P.; Colombo, A.W. Interoperability for industrial cyber-physical systems: An approach for
legacy systems. IEEE Trans. Ind. Inform. 2017, 13, 3370–3378. [CrossRef]
7. Lu,Y.; Riddick, F.; Ivezic, N. The paradigm shift in smart manufacturing system architecture. In IFIP Advances in Information and
Communication Technology, Proceedings of the IFIP International Conference on Advances in Production Management Systems, Iguassu
Falls, Brazil, 3–7 September 2016; Springer: Cham, Switzerland, 2016; pp. 767–776.
8. Ditzel, G.A.; Didier, P. Time sensitive network (TSN) protocols and use in Ethernet/IP systems. In Proceedings of the ODVA
Industry Conference & 17th Annual Meeting, Nuremberg, Germany, 15 October 2015; pp. 1–24.
9. Bonomi, F.; Milito, R.; Zhu, J.; Addepalli, S. Fog computing and its role in the internet of things. In Proceedings of the First
Edition of the MCC Workshop on Mobile Cloud Computing, Helsinki, Finland, 13–17 August 2012; pp. 13–16.
10. Zhao, K.; Ge, L. A survey on the internet of things security. In Proceedings of the 2013 Ninth International Conference on
Computational Intelligence and Security, Leshan, China, 14–15 December 2013; pp. 663–667.
11. Sadeghi, A.R.; Wachsmann, C.; Waidner, M. Security and privacy challenges in industrial internet of things. In Proceedings of the
2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), San Francisco, CA, USA, 8–12 June 2015; pp. 1–6.
12. Time-Sensitive Networking Task Group. Available online: https://www.ieee802.org/1/pages/tsn.html (accessed on 25 March 2021).
13. Industrial Internet Consortium. Time Sensitive Networks for Flexible Manufacturing Testbed Characterization and Mapping of
Converged Traffic Types. Available online: https://www.iiconsortium.org/pdf (accessed on 25 March 2021).
14. Knapp, E.D.; Langill, J.T. Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other
Industrial Control Systems; Syngress: Burlington, MA, USA, 2014.
15. IEC. International Electrotechnical Commission, Industrial Communication Networks—Network and System Security—Part 1-1: Terminol-
ogy, Concepts and Models, IEC/TS 62443-1-1 ed1.0; IEC: Geneva, Switzerland, 2009.
16. Kleineberg, O.; Fröhlich, P.; Heffernan, D. Fault-tolerant audio and video bridging (AVB) ethernet: A novel method for redundant
stream registration configuration. In Proceedings of the 2012 IEEE 17th International Conference on Emerging Technologies &
Factory Automation. Krakow, Poland, 17–21 September 2012; pp. 1–8.
17. Erciyes, K. Distributed real-time systems. In Distributed Real-Time Systems; Springer: Berlin/Heidelberg, Germany, 2019; pp. 41–62.
Appl. Sci. 2021, 11, 3345 15 of 15