You are on page 1of 4

Digitalization

requires networks.
And therefore Network Management Systems.

The challenge of complex networks


There is a growing recognition at man- After all, the demand for end-to-end
agement levels around the world that connectivity means an increase in
data is a fundamental resource for both the numbers of communication
boosting competitiveness and achiev- participants and the volume of data.
ing lasting success in the industry. It’s In other words, the networks are
thus no surprise that the progress of growing more and more complex. And
the digital transformation in all sectors this of course means that there is also
has become unstoppable, regardless an increasing demand for efficient
of company size. But anyone aiming to network management. As a trailblazer
take full advantage of the potential for the digital transformation in indus-
offered by digital data needs the ap- try, Siemens is constantly working to
propriate networks: powerful, secure, drive progress forward in this area, to
with high-availability and ideally easy achieve solutions that fit the needs of
to configure and monitor. a digital world.

1 | Digitalization requires networks


Transparency despite complexity Minimize downtimes
As industrial networks grow more and Even if the statistics show that only a After all, if networks are to operate
more complex, it will be increasingly small proportion of malfunctions and smoothly for the long term, hardware
important for operators to ensure outages are caused by network com- and configuration changes must be
maximum transparency: knowing ponents like switches, a worst-case coordinated – in accordance with the
which components are being used scenario can never be entirely ruled firmware policy and the specific char-
where, and how they function, is a out. And if it happens, the cost-effi- acteristics of the industry in question.
vital prerequisite for efficient network cient solution is to locate and fix the Take the process industry, for exam-
management and essential for data source of the error as swiftly as possi- ple: To avoid the risk of claims for
security and availability. That’s why a ble. An NMS makes this possible, compensation, systems are approved
contemporary Network Management along with error prevention: tracing by the technical inspection authority
System (NMS) should be user-friendly potential future problems and taking TÜV. That’s why updates to software
and offer the opportunity of monitor- preventive action before any damage versions tend to be infrequent. The
ing all network components at a occurs. This way, everything stays on opposite is the case with the manufac-
glance and managing them with mini- the network at all times, and the risk turing industry, power supply, and
mum effort – 24/7, regardless of ven- of an unscheduled outage is kept to a public infrastructure, where in princi-
dor and regardless of the number of minimum. ple only the latest software is utilized,
nodes, which will certainly continue to since the operators’ security guidelines
increase as the digital transformation Ensure availability insist that the latest updates must be
progresses. It also explains why scala- used at all times.
The component landscape in any giv-
bility is so important: NMS solutions
en network tends to be non-uniform, In any case, coordinating all the assets
must be capable of growing along
not only because network components in a network is highly demanding,
with the network. In addition, scalable
represent a range of hardware catego- which is why there are many tools on
systems offer the major advantage
ries, usually from more than one man- the market that promise to help. In
that businesses do not have to invest
ufacturer but also because there are most cases, however, these are stan-
in a complete solution right at the out-
often major differences in terms of the dalone solutions that are not an inte-
set; they can begin with a small-scale
existing software configuration and gral part of an end-to-end NMS. But
solution and expand it over time.
the way it is distributed. It is very im- that is precisely where the demand
Northbound interfaces are important in
portant to document these factors. lies: for an end-to-end NMS solution
this regard: NMS solutions must support
the connection of networks to state-
of-the-art cloud solutions, for example
MindSphere, the cloud-based, open IoT
operating system from Siemens.
There is a long list of requirements
that a future-proof NMS must satisfy.
The result, however, is that it can also
offer a wealth of benefits.

2 | Digitalization requires networks


Fault Accounting Performance Security

that keeps the documentation of the The knowledge gained in this way FCAPS stands for:
entire inventory up to date at all times, makes it possible to assess the perfor-
• Fault Management: Identify, save,
records all the relevant network com- mance of the facilities and make
report, and solve any error status
ponents, adds new hardware and soft- planned improvements by putting ap-
that occur
ware, and modifies existing systems. propriate actions in place.
Preferably with just the push of a but- • Configuration Management:
ton. Minimize cyber risks Record and manage all components
that must be monitored
Given the importance of industrial net-
User management • Accounting Management:
works for corporate performance as a
Network expansion is usually accom- whole, successfully protecting them Record network usage
panied by an increase in the number against potential cyber threats must • Performance Management:
of participants. That means informa- be given top priority. The list of poten- Gather performance data and main-
tion on all aspects of how the network tial sources of risk is a long one. Crimi- tain statistics
resources are used is also increasingly nal attacks by hackers, unauthorized
• Security Management:
important: who used which resource, access, or physical and electronic sab-
Authenticate users and authorize
when, and for how long? An NMS otage: all these incidents can poten-
access and usage
must provide robust answers to these tially result in huge losses, and every
questions and make it possible to allo- effort must be made to avoid them. A
cate roles and tasks through the issue functioning NMS plays a key role here, The trend toward digitalization and
of authorizations. The possibility of too: It ensures maximum data security, Industrie 4.0 highlights the impor-
providing the various users with spe- and its protective measures include all tance of having a powerful and fu-
cific rights rules out the possibility of components involved in the communi- ture-proof NMS – especially with re-
abuse of access authorizations at the cation process. To this end, an NMS gard to the functions described in the
network configuration stage. saves all access data for device au- FCAPS model. What’s more, Siemens
thentication, like user IDs and pass- has set itself the goal of utilizing its
Optimize performance words, logs all operator actions, and innovations to adapt the concept of
ensures central administration of all network management to meet the
The performance of a network directly needs of automation and further opti-
security functions.
affects the quality of business process- mize it.
es and thus a company’s competitive-
The NMS of the future
ness. That’s why it is tremendously im-
portant to make constant improvements For an NMS to achieve all of the
to general network performance using above, it must perform all the associ-
a sophisticated NMS: to maximize ated functional tasks. The corner-
throughput, avoid bottlenecks, and stones of state-of-the-art network
identify potential risks. The objective in management are defined by FCAPS, a
all cases is to achieve maximum perfor- model created by the ISO (Internation-
mance gains. The first step involves al Organization for Standardization).
determining and analyzing network
capacity utilization. This means gath-
ering and evaluating vast amounts of
statistical data.

3| Digitalization requires networks


Published by
Siemens AG 2018

Process Industries and Drives


P.O. Box 48 48
90026 Nürnberg
Germany

Subject to changes and errors. The information give


in this document only contains general descriptions
and/or performance features which may not always
specifically reflect those described, or which may
undergo modification in the course of further
development of the products. The requested perfo
mancefeatures are binding only when they are
expressly agreed upon in the concluded contract.
Security information
In order to protect plants, systems, machines and
networks against cyber threats, it is necessary to
implement – and continuously maintain – a holistic,
state-of-the-art industrial security concept. Siemens’
products and solutions only form one element of
such a concept.
Customer is responsible to prevent unauthorized
access to its plants, systems, machines and networks.
Systems, machines and components should only be
connected to the enterprise network or the internet
if and to the extent necessary and with appropriate
security measures (e.g. use of firewalls and network
segmentation) in place.
Additionally, Siemens’ guidance on appropriate
security measures should be taken into account.
For more information about industrial security,
please visit
www.siemens.com/industrialsecurity
Siemens’ products and solutions undergo continuous
development to make them more secure. Siemens
strongly recommends to apply product updates as
soon as available and to always use the latest product
versions. Use of product versions that are no longer
supported, and failure to apply latest updates may
increase customer’s exposure to cyber threats.
To stay informed about product updates, subscribe
to the Siemens Industrial Security RSS Feed under
http://www.siemens.com/
industrialsecurity
All other designations in this document may represent trademarks
whose use by third parties for their own purposes may violate the
proprietary rights of the owner.
More informationen:
www.siemens.com/network-management

You might also like