Backhaul architecture model for secured connectivity over untrusted or trusted networks
A new ISA technical report, developed in collaboration with the Fieldbus Foundation (FF), provides a common framework enabling multiple industrial communication protocols to run over a shared wireless backhaul network in process automation systems.
ISA-TR100.15.01-2012, Backhaul Architecture Model: Secured Connectivity over Untrusted or Trusted Networks, presents an architecture model for interconnecting automation system elements over untrusted backhaul networks. The focus is on the wireless physical layer, but is not limited to wireless.
ISA100 Working Group 15, Wireless Backhaul Networks, was established to develop standards and technical reports to address one or more dedicated or shared wireless backhaul(s) to support technologies running multiple applications. A common interest arose when FF end-user members identified the wireless backhaul as critical in supporting implementation of FF’s wireless high-speed Ethernet (HSE) backhaul included in Foundation for remote operations management (ROM) technology.
ISA100 WG15 co-chair Dr. Penny Chen of Yokogawa said of the ensuing collaboration, “Working together, dedicated engineers have developed a solution meeting industry requirements for a wireless backhaul transport network to facilitate interoperability, end-to-end security, and end-to-end quality of service in industrial wireless installations.”
A primary goal was to create an architecture model that insulates the industrial control system elements from the variety of protocols and interfaces associated with various backhaul technologies and providers. Conversely, the architecture model is also intended to insulate backhaul providers from many of the technical issues associated with specific industrial control systems vendors, protocols, and interfaces.
The generalized architecture model describes elements and interfaces associated with using backhaul services. The resulting model and vocabulary provide a common framework by which industrial control system vendor, user, and backhaul provider communities can better communicate and collaborate.
Foundation for ROM was designed to enable fieldbus connectivity to remote I/O and the leading industrial wireless protocols. According to WG15 co-chair David Glanzer of FF, it is the first successful integration of ISA-100.11a, WirelessHART, wired HART, and wired H1 protocols into a single standard environment without sacrificing the diagnostic capabilities of existing wireless devices. Instead, these capabilities are mapped into the Foundation block structure to provide a standard environment for data management and quality, eliminating techniques that are highly customized and much more costly to maintain throughout the plant lifecycle.
Foundation for ROM provides a way to bring large concentrations of discrete and analog field I/O back to the control room using HSE communication, Glanzer said. It also employs electronic device description language (EDDL) and function blocks to ensure interoperability with Foundation for ROM devices. This is essential in improving integration of critical functional areas, including machinery health monitoring, safety interlocks, fire and gas detection systems, and video surveillance.
For information about viewing or obtaining ISA-TR100.15.01, visit www.isa.org/findstandards, select “100” from the first drop-down list, and scroll down.
To learn more about Foundation for ROM, visit www.fieldbus.org and select the ROM navigation button, or call 1-512-794-8890.
Also recently published by ISA: