You are on page 1of 17

GE's Intelligent Platforms business & CISCO Systems Inc.

Architecting a Robust
Manufacturing Network
for the Internet of Things
Network Reference Architecture

The Internet of Things (IoT) is creating disruptive opportunities


that will define a new set of winners and losers in the
industrial space. This white paper provides guidance to
chief information officers and associated technologists
for implementing network security and designing a robust
manufacturing network for the Industrial Internet using the
GE-Cisco Joint Network Reference Architecture.

August 2015
Contents
03 Abstract
03 The forces of change
03 Pace of change
03 Opportunity for competitive agility
04 The IoT and II

05 The GE-Cisco Joint Network Reference Architecture


05 Why GE and Cisco are providing this capability
05 Enterprise-class networks with industrial-class form factors
06 Performance, scale and manageability
06 Network segmentation
07 Firewall, IPS, and data diodes
09 Identity networking
11 Encryption
11 IP address reuse
12 Wireless services
12 Location services
13 RF integrity
13 Wireless security
13 Rich media services, compute and cloud

14 Conclusion
15 Glossary
17 Further Reading
17 Contacts

Table of Figures
05 Figure 1: Overall Plant Network Architecture
07 Figure 2: Plant Network Segmentation
08 Figure 3: Plant Network Security Logical Architecture
09 Figure 4: Plant Network Security Virtualization
10 Figure 5: Plant Network Dynamic Port Provisioning
11 Figure 6: Plant Network Physical Architecture
12 Figure 7: Plant Network Wireless Architecture

2 Architecting a Robust Manufacturing Network for the Internet of Things


Abstract Opportunity for
The Internet of Things (IoT) is creating disruptive opportunities competitive agility
that will define a new set of winners and losers in the Consider the opportunity for competitive
industrial space. This white paper provides guidance to agility as:
chief information officers and associated technologists • Previously unconnected devices become
for implementing network security and designing a robust connected to each other in machine-
to-machine (M2M) networks and to
manufacturing network for the Industrial Internet using the enterprise reporting and predictive
GE-Cisco Joint Network Reference Architecture. analytics, providing unprecedented real-
time feedback on product performance,
This white paper proposes an approach to networks in service and maintenance;

manufacturing environments, introduces recommended • IT hardware needs are reduced as


virtualization removes the need
architectures, describes the components of a sound to deploy physically separate
industrial network and highlights areas for special attention, networks while still achieving a high-
as well as illustrates ancillary benefits when deploying performance and secure environment
such architectures. for manufacturing mission-critical plant
floor applications;
• IT maintenance overheads are reduced
as manufacturing applications move to
private and public cloud;
• These new insights are now shared
across the enterprise to enable more
than just control, but also can help
The forces of change • Hospitality—Airbnb exercises
boost yield, performance, quality and
underutilized assets to turn homes
The maturing of the Industrial Internet and reduce waste;
into hotels.
the rapid connectivity of devices to internal • And business decisions can be made
networks and the Internet are creating • Transportation—Uber circumvents
a regulated cab industry. quickly by analyzing vast data farms,
fundamental change and significant making actionable data available to the
opportunities for manufacturers. These user’s device of choice.
changes are resulting in the increased Similar forces are impacting
need for improved connectivity, network manufacturing. Take, for example, For manufacturers, these insights
security and management capabilities. the flattening of networks. Social enable a cycle of continuous plant
networks provide instantaneous insight improvements for:
into customer sentiment, allowing • Shortening warranty investigation time
Pace of change manufacturers to get a jump on • Cutting work-in-process inventory
Change is happening at orders of product changes. Natural disasters and
magnitude faster than it did 10 years geopolitical unrest can shift logistics • Reducing manufacturing costs
ago. Startups can develop a product on networks overnight, forcing rapid reactions • Improving product cycle times
the back of a credit card and go viral in manufacturing planning.
• Decreasing rework and scrap
overnight. Traditional industries have been Similarly, the networks that move data
turned upside down, creating a new set of • Reducing uncertainty in the supply chain
within your manufacturing environment
winners and losers. Consider the following are flattening as Internet Protocol is Leading manufacturers have already
examples: brought to the control interface and realized the benefits of real-time,
• Retail—Amazon threatens brick-and- embedded in “smart instruments.” The shop-floor-to-business systems
mortar establishments. flattening of the manufacturing network connectivity through
creates opportunities for a more inclusive • Common skill sets across information
• Advertising—Google alters Madison
and responsive plant. technology (IT) and operations
Avenue with targeted web advertising.
technology (OT) technicians

3 Architecting a Robust Manufacturing Network for the Internet of Things


• Secure data flow between the plant the IoT with network changes, enabling etc.) and unplanned downtime.
floor and the cloud dramatic simplification and cost Additionally, system startup can
• Real-time plant floor visibility to reduction for network connectivity. create huge demands on networks
enterprise planning tools Not least are new forecasts regarding as devices come back online and
the IoT opportunity. GE estimates that the resynchronize data, resulting in sluggish
• Reduced downtime with proactive and performance. The GE and Cisco
preemptive maintenance planning Industrial Internet has the potential to
add between $10 trillion and $15 trillion approach includes high-performance
• Manufacturing agility that makes a to global GDP over the next 20 years, and networking technology coupled with
“lot size of 1” achievable Cisco increased its forecast to $19 trillion “store and forward” resynchronization
for the economic value created by 2020. of data, enabling just the “missing time”
• Insight and control over energy
data to be synchronized, rather than
and utilities in real time All of this creates tremendous everything from time zero. GE’s software
• Visibility and control of remote facilities opportunities for business while supports high-availability hardware,
and resources introducing new challenges for CIOs: hot standby and mirroring techniques
• Device proliferation—Ten years ago, to prevent data loss for mission-critical
CIOs could oversee policies, which applications. This provides high levels
The IoT and II provided a reasonable level of control of data reliability and increased read
The Internet of Things (IoT) is a concept over who and what approved devices performance.
in which everyday objects have network were connected to their networks. With • Isolation—Most manufacturing floors
connectivity, allowing them to send and the proliferation of smartphones and are broken up by process and further
receive data. tablets, CIOs have needed to administer into cells and zones. Isolation is
The Industrial Internet (II) refers to the “bring your own device” (BYOD) sometimes considered to be a substitute
integration of complex physical machinery policies to enable greater productivity. for security, but isolated (unconnected)
with networked sensors and software. The Additionally, IoT technology will connect machines can neither be remotely
Industrial Internet draws together fields more devices and sensors than ever to administered nor monitored. Nor can
such as machine learning, big data, the both the manufacturing and enterprise they provide valuable data to higher-
Internet of Things, machine-to-machine networks. Cisco offers wireless network lever manufacturing systems. The
communication and cyber-physical and security technologies to address the GE and Cisco approach is to connect
systems to consume data from machines, above needs. all these pieces together on a single
analyze it in real time and use it to adjust • Security—Building separate networks network that allows for flexibility of
operations. and “air gapping” are not solutions retooling a plant floor, collecting data
In simple terms, the IoT is the “idea” to security challenges, with Stuxnet and administering an optimized process,
and the II is the “plumbing” that makes being a primary example of how these while at the same time providing logical
the IoT work. methods fail. Obscurity makes an segmentation of systems.
attack only more difficult for the novice • Mobility—The mobile revolution in
Growth in connected devices is widely hacker. Furthermore, the sophistication
predicted to be enormous with estimates the consumer and enterprise space is
of attacks has increased and merely quickly finding its way onto the shop
ranging from 30 billion to 50 billion devices installing firewalls is not sufficient. Real
connected by 2020. There are a number floor. Flexible communication is an
security comes from consistent policy important aspect of mobility. There has
of reasons for this growth, including the and controls, collection of security data
following factors: been a longstanding need for voice
at every level of a system, constant communication using push-to-talk
• The price of sensors, processors and examination of the data, and diligent (PTT) radio systems combined with
networking has dropped to a point that reaction to signs of trouble, Utilizing cell phones. Another need is remote
makes it economically viable. the common/converged network access or virtual access to your plant
• Wi-Fi is now widely deployed and and security architecture discussed operational systems and analytics from
it is now relatively easy to add new later in this paper enables common anywhere. Additionally, the industry is
networked devices in the home and in policy, ubiquitous data collection, and introducing a variety of devices to act
the office, as well as on the shop floor. multiple levels and methods of security as remote or virtual HMIs. Finally, video
enforcement. from portable devices is increasing.
• The new version of the Internet Protocol
• System recovery—Even if a The network must accommodate
IPv6 enables an almost-limitless number
manufacturing network is designed for and provide services for all these
of devices to be connected to networks.
zero downtime, the systems connected applications. Cisco and GE provide
• Major providers Cisco, IBM, GE and to it may go offline. This can be both solutions to support mobile devices and
Amazon have put their weight behind planned (system upgrades, additions, mobility for manufacturing.

4 Architecting a Robust Manufacturing Network for the Internet of Things


The GE-Cisco Joint
Network Reference Architecture
Why GE and Cisco are resources to provide an end-to-end enterprise from a simple sensor to cloud-
solution from the machine interface hosted business, analytics and logistics
providing this capability to the cloud. systems. This architecture is not dissimilar
GE possesses deep knowledge of controls to an enterprise campus model (see
and manufacturing applications. Cisco Cisco Enterprise Campus 3.0 Architecture
has unparalleled experience in networks, Enterprise-class networks design guide), with the primary distinction
network and system security, and with industrial-class form being that a plant-wide network must be
collaboration. With more factory assets ruggedized and support differentiated
connected to the network, an increase in
factors access for processes and tools not seen
data being collected from manufacturing Figure 1 shows a high-level network in the enterprise. Ethernet and Wi-Fi
processes, and the emergence of architecture for manufacturing. Note offer standardized connectivity to allow
collaboration technology onto the the myriad of systems that require all components of the manufacturing
plant floor, GE and Cisco are combining connectivity in a modern manufacturing enterprise to communicate.

Predictive
Analytics Plant Server Room

Enterprise Field Agent


Historian
Public /Private WAN
Cloud
Plant MES Biz Apps
Fleet
Management

Plant Historian Identity Server


Supply Chain

Legend
DCS VLAN
Carpeted
(Perdue Level 1) Security Space Ethernet
Plant/Site
PAN VLAN Firewall/IPS
(Perdue Level 2) Core Network
Data Diode
Operator/DMZ VLAN Carpeted
(Perdue Level 3) Space Wi-Fi
Biz Systems VLAN
(Perdue Level 4)

Office Worker VLAN

UC VLAN

Plant-Wide Network (Ethernet & Wi-Fi)

FAN
OPC, Admin PC Env Operator Corporate BYOD UC
FAN DCS DCS Sensor Edge HMI or Cell/Zone PC or PC or PC or
I/O I/O Mesh Compute Control Historian Devices
SCADA Handheld Pwr Mgmt Handheld Handheld Handheld

Figure 1: Overall Plant Network Architecture

5 Architecting a Robust Manufacturing Network for the Internet of Things


The ubiquity and capabilities of Ethernet Furthermore, Cisco has an enormous • Industrial big data collection
make it possible to collect information in worldwide partner (systems integrator, and management—GE’s historian is
unprecedented volumes and to connect VAR) community, and has certified tens of designed to manage huge volumes
processes that were previously isolated/ thousands of engineers and technicians in of very fast data needed for data
un-instrumented. The network is a key the configuration and operation of Cisco aggregation from SCADA and the
enabler of big data. Cisco has long been the products. Therefore, OT managers no longer provisioning of data for advanced
world’s leading Ethernet switching company need to struggle to find experts in specialized equipment analytics
and now offers enterprise-class network network technologies as they do today. • MES / MIS—Where the shop floor
capabilities in industrial form factors. Some of the capabilities Cisco offers to meets the business systems and
The Cisco Industrial Ethernet family of provide scalable, high-performance plant where time-series data is combined
switches (IE2000, IE3000, IE4000, and networks include the following: with transactional data to provide
IE5000) extend the proven Cisco Catalyst • Time sensitive networking (TSN) (future operational context
technologies prevalent in enterprise capability)—Scheduled Ethernet for • Remote monitoring and diagnostics
networks to industrial networks. These time-sensitive control loops (RM&D)—For which GE provides class-
switches provide superior security, leading managed and on-site solutions
video and voice services to industrial • Routing / layer-3 switching—Allows
applications. They are easy to manage, hierarchical scaling and segmentation In general, there are three inflection
resilient, and enhanced through support of for truly huge industrial networks points where huge value is created when
industry protocols. The series offers IP20-, • Access control—Provides treatment of deploying these GE technologies:
IP30- or IP67-certified form factors for traffic based on attributes like source, • Automating machine operation through
deployment in the simplest to destination address or protocol types the deployment of GE control and
harshest environments. among other attributes HMI/SCADA
Similarly, Cisco brings Wi-Fi leadership to • Precision Time Protocol (PTP)— • Connecting these subsystems with the
support mobility in industrial applications. Machine clock synchronization across a historian to provide an unified view of
Cisco offers both traditional and network to the μsec or sub-μsec range, the shop floor
ruggedized IEEE 802.11 access points (APs), supporting measurement and control • Connection with business systems
all running on the same OS within the systems such as ERP, PLM and EAM to deliver
same administrative domain. APs can be
Additionally, to ease network bandwidth operational context
deployed in lightweight (controller-based,
utilization, GE’s industrial software uses Most manufacturing floors are broken up
CAPWAP) or autonomous (stand-alone)
exception-based reporting and client-side by process. There are clear differences
mode. Standard wireless LAN, mesh,
data compression. between discrete, batch and continuous
sensor network (IEEE 802.15.4) and bridged
architectures are all supported. processes and how the segmentation
of the network may take place. Network
Network segmentation segmentation and zone segmentation
Performance, scale The throughput increase provided by do not necessarily need to align yet, for
Ethernet allows multiple traffic types administrative or technological reasons, a
and manageability to share the same “pipe” while being cell or zone cannot be limitless in size. The
Traditional bus-based industrial networks segmented for the GE portfolio, operating network must be built using sophisticated
such as PROFIBUS and DeviceNet have at each level for: feature-rich equipment to provide flexible
limited throughput and supported segmentation options, limit overhead to
• Control—Using GE programmable logic
topologies. Also, troubleshooting such protect control traffic and provide secure
controllers (PLC) and human-machine
networks can be complex. A standards- connectivity between segments.
interfaces (HMI) that have μsec needs
based Cisco switching network supports
and have uptime requirements critical to
topological flexibility, multi-gigabit or
shop-floor operations
multi-terabit throughput, and common
tools (commercial off-the-shelf-software) • Supervision—Class-leading GE
for administration, ensuring customers supervisory control and data acquisition
are ready for increased data collection on (SCADA) systems that are designed to
the plant floor. To a GE Software customer, meet the demanding needs of operators
this means reliable and predictable in a production environment
performance across the shop floor and
business systems.

6 Architecting a Robust Manufacturing Network for the Internet of Things


Predictive
Analytics Plant Server Room

Enterprise Field Agent


Historian
Public /Private WAN
Cloud
Plant MES Biz Apps
Fleet
Management

Plant Historian Identity Server


Supply Chain

Legend
DCS VLAN
Carpeted
(Perdue Level 1) Security Space Ethernet
Plant/Site
PAN VLAN Firewall/IPS
(Perdue Level 2) Core Network
Data Diode
Operator/DMZ VLAN Carpeted
(Perdue Level 3) Space Wi-Fi
Biz Systems VLAN
(Perdue Level 4)

Office Worker VLAN

UC VLAN

Plant-Wide Network (Ethernet & Wi-Fi)

FAN
OPC, Admin PC Env Operator Corporate BYOD UC
FAN DCS DCS Sensor Edge HMI or Cell/Zone PC or PC or PC or
I/O I/O Mesh Compute Control Historian Devices
SCADA Handheld Pwr Mgmt Handheld Handheld Handheld

Figure 2: Plant Network Segmentation

Figure 2 highlights how the plant Firewall, IPS The Cisco ASA firewall protects against
architecture can be logically segmented advanced threats while reducing
to address operational, regulatory and and data diodes complexity and cost. The ASA also
security concerns. By utilizing VLANs, Boundary protection is a requirement integrates Sourcefire IPS to deliver
differentiated services can be applied for a converged manufacturing network. integrated threat defense across the entire
to equipment of common capability. For OT teams typically desire isolation attack continuum, including “out-of-the-
example, equipment belonging to the between cells/zones/stages of the box” support for common protocols used
same Perdue Level 1 group would be manufacturing floor, whether as a security by GE devices, and is extensible to support
connected to the same VLAN plant-wide. or operational boundary. However, custom industrial protocol definitions. The
“East-West” communication among the isolation cannot accommodate the need ASA can be deployed in a stand-alone
members of this group is guaranteed, to collect, aggregate, analyze and utilize configuration—with separate boxes at
while “North-South” communication can manufacturing data for business and every layer—as shown in figure 3. The
be restricted through various methods logistics needs. Using firewalls and other ASAs protect and limit traffic between
(detailed later). security appliances provides connectivity manufacturing VLANs.
while at the same time protecting
manufacturing assets.

7 Architecting a Robust Manufacturing Network for the Internet of Things


UC Corp. BYOD
Devices PC or PC or
Legend Mobile Mobile

DCS VLAN
(Perdue Level 1)
PAN VLAN
(Perdue Level 2)

Operator/DMZ VLAN
(Perdue Level 3)

Biz Systems VLAN


(Perdue Level 4) Identity Biz Apps
Server
Office Worker VLAN

UC VLAN

Data Diode

Cisco ASA Firewall


Operator
GE GE Cell/Zone PC or
Cisco FirePOWER IPS Historian MES Historian Handheld

Manufacturing Cell 1 Manufacturing Cell 2

OPC, Admin OPC, Admin


Edge Edge
HMI & PC or FAN HMI & PC or FAN
Compute Compute
SCADA Handheld SCADA Handheld

Machine DCS DCS Sensor Machine DCS DCS Sensor


Data I/O I/O Mesh Data I/O I/O Mesh

Figure 3: Plant Network Security Logical Architecture

The ASA can also be deployed in multiple firewall appliance trunked into the core
context modes, as shown in figure 4. In switches as shown in figures 1 and 2.
this model, an ASA appliance is logically There are some manufacturing use
separated into multiple virtual firewall/ cases that require data diodes to
IPS instances. Each virtual instance has its guarantee one-way data transfer (from
own independent configuration and has no the machine to higher-level software).
awareness of or dependence on any other Whereas neither Cisco nor GE make data
firewall or IPS instance running on the diodes, our reference network model for
same hardware. Using multiple contexts, manufacturing certainly supports them, as
it is possible to use a single high-scale ASA seen in figures 3 and 4.

8 Architecting a Robust Manufacturing Network for the Internet of Things


Legend UC VLAN Office Worker
VLAN
DCS VLAN
(Perdue Level 1)
PAN VLAN
(Perdue Level 2)

Operator/DMZ VLAN Security Virtual Context 3


(Perdue Level 3)

Biz Systems VLAN


(Perdue Level 4)

Office Worker VLAN


Biz Systems
VLAN
UC VLAN

Cisco FirePOWER IPS Security Virtual Context 2

Cisco ASA Firewall


Operator/DMZ
Data Diode VLAN

Security Virtual Context 1

PAN VLAN PAN VLAN


Cell 1 Cell 2

DCS VLAN DCS VLAN


Cell 1 Cell 2

Figure 4: Plant Network Security Virtualization

Identity networking The technician’s system should be Identity Services Engine (ISE) and 802.1X
recognized as unauthorized to connect on network infrastructure, differentiated,
Modern plant operations require to any port on the network other than identity-based connectivity can be
identifying the right person on the right the service port for the machine. achieved.
device on the right network at the right
time. Service access ports for machines Conversely, an administrator using a ISE provides a rules-based, attribute-
are an example of this. When a technician corporate-owned computer, up to date driven policy model for creating flexible
enters the plant to fix a problem, the on all security software and using the and business-relevant access control
technician’s PC should not be given correct credentials, should be allowed policies. It provides the ability to create
unfettered access to the network — just to to connect to any network (wired or via fine-grained policies by pulling attributes
the machine in question. Wi-Fi) and access any system. Using Cisco from predefined dictionaries.

9 Architecting a Robust Manufacturing Network for the Internet of Things


Legend
Future State
DCS VLAN Integration between Factory ISE Policy
(Perdue Level 1) Management Platforms and ISE User Sally on PC > Office VLAN
to pass definitions of factory Device Type = CiscoAP > Wireless MGMT VLAN
PAN VLAN devices into appropriate MACAddr = ::::74:CE > PAN VLAN
(Perdue Level 2) security classification. MACAddr = ::::AF:03 > DCS VLAN
Operator/DMZ VLAN
(Perdue Level 3)
Factory
Biz Systems VLAN Operations ISE
(Perdue Level 4)

Office Worker VLAN

UC VLAN

VLAN Trunk

Factory Operations

ISE

IE Switch

Machine/Process

User
Sensor Engineer AP PLC
::::74:CE (Sally) ::::AF:03
WAP

Nexus 9K

Figure 5: Plant Network Dynamic Port Provisioning

These sources include information about The example in figure 5 shows how ISE can For example, Sally the Engineer may
user and endpoint identity (e.g., GE PLCs), be used to provide differentiated access be assigned to the Office VLAN using
role-based security, posture validation, on a plant floor. The ISE configuration her PC, but may be assigned to the PAN
authentication protocols, location or other has user Sally the Engineer assigned to VLAN when connecting via Wi-Fi using a
external attributes from Active Directory, the Office VLAN based on her credentials corporate-controlled handheld device on
LDAP, RADIUS, RSA OTP and certificate and devices used, while the GE PLC with the shop floor.
authorities. GE Software products MAC address :::AF:03 is assigned to the
feature S95-standard data models with DCS VLAN. As users / devices attempt to
the ability to identify accessibility to connect, ISE is consulted and the network
equipment, certification requirements, infrastructure assigns VLANs accordingly.
and system / capability access. A Furthermore, ISE can be configured for
manufacturing enterprise could use these conditional connectivity.
data models as a baseline reference for its
ISE policy.

10 Architecting a Robust Manufacturing Network for the Internet of Things


Server Room Access
Legend
DCS VLAN
(Perdue Level 1)
PAN VLAN
(Perdue Level 2)

Operator/DMZ VLAN
(Perdue Level 3) Network Core
Biz Systems VLAN
(Perdue Level 4)

Office Worker VLAN

UC VLAN

VLAN Trunk

Switch

IE Switch

WLC5508

ASA Firewall

Machine/Process

User
Office/Carpeted Space Leaf Architecture Shop Floor Standard Leaf Architecture

Video

Surveillance

WAP
Shop Floor Ring or Linear Chain Topology
Nexus 9K

Figure 6: Plant Network Physical Architecture

Encryption support DNS/DHCP (e.g., devices where Chain Topology” may have the identical
the IP address is set through dip switches). hard-coded IP address. They may have
Data encryption is a good practice in most In other cases, the traditional convention both been put on this VLAN during a
industries, but is mandated in regulatory- dictates that hard-coded IP addresses are retooling of the shop floor. Normally,
controlled environments such as more reliable because they do not require the IP address conflict would cause
U.S. Export Control. There are multiple upper-level services. communication challenges or failures
methods for encrypting data at rest (OS- to both machines, but administrators
level encrypted volumes for example). Until DNS / DHCP is considered robust
enough for industrial applications, can enable the L2 NAT feature on the
Similarly, data in flight can be encrypted IE switches to have one or both of the
through multiple methods. Cisco offers administrators must design around their
absence. Figure 6 shows a more detailed machines translated to a new address to
link-layer, hop-by-hop encryption (e.g., resolve conflicts and ease deployment of
MACsec for Ethernet or WPA for wireless), physical-level representation of the plant
network described in figures 1 through the GE control system more quickly.
as well as end-to-end encryption (e.g.,
IPSEC VPN). IPSEC is particularly useful for 4. The overall architecture is spine-leaf Similarly, both the DCS VLAN and the PAN
long-haul (WAN) data integrity to address or collapsed-core, with traditional Cisco VLAN may be using the same subnet for
regulatory and corporate policy needs. switches servicing office space and Cisco historical reasons at a particular factory.
Industrial Ethernet (IE) switches on the For example, both may be 192.168.1.0/24
plant floor. network. Again, using NAT on the
IP address reuse As described earlier, VLANs for common network infrastructure can translate the
processes / capabilities span the entire subnet to a new address range if
In industrial networks, the task of
infrastructure. The machine on the DCS necessary. Another method, connected
assigning and reassigning IP addresses
VLAN in the “Shop Floor Standard Star routing, can also be employed to work
can be very cumbersome, as few industrial
Topology” and the machine on the DCS around the overlapping range problem.
applications use DNS or DHCP. In some
cases, equipment is literally too old to VLAN in the “Shop Floor Ring or Linear

11 Architecting a Robust Manufacturing Network for the Internet of Things


Server Room Access
Legend
MSE location services,
DCS VLAN including active RFID tracking
(Perdue Level 1)
PAN VLAN
(Perdue Level 2)

Operator/DMZ VLAN Network Core


(Perdue Level 3)

Biz Systems VLAN


(Perdue Level 4)

Office Worker VLAN


CAPWAP
UC VLAN Tunnels

VLAN Trunk

Switch

IE Switch

WLC5508

ASA Firewall

Machine/Process

User Office/Carpeted Space Leaf Architecture Shop Floor Standard Leaf Architecture

Video Shop Floor Ring or Linear Chain Topology

Surveillance AP Group 1 “Office” AP Group 2 “Shop”

WAP

Nexus 9K

Figure 7: Plant Network Wireless Architecture

Wireless services Location services a warning or emergency in the plant.


WLC/MSE APIs can also be used to
Wi-Fi to the plant floor is enabling mobile There are multiple ways in which WLC and integrate with GE and third-party apps to
access to GE HMI interfaces and MES MSE provide location-specific services for notify an operator to service a machine,
applications. This new flexibility introduces manufacturing. WLC AP Groups allow for and provide a map of the route to the
access and security issues similar to wired a single wireless administrative domain machine. Using active Radio Frequency
networks. Figure 7 shows how wireless with common Service Set Identifiers (SSIDs) Identification (RFID) technology, WLC/MSE
services are overlaid on the plant network and features, but restrict which VLANs services can pinpoint the location of tools
model. For ease of deployment, Wireless may exist upon which access points in the (e.g., a forklift) or inventory items (e.g.,
LAN Controllers (WLCs) are commonly network. In figure 7, two AP Groups—one a pallet or barrel of raw materials) that
used. Cisco WLCs support system-wide for office space APs and another for shop have an RFID tag affixed. Similarly, users/
functions and deliver centralized wireless floor APs—are utilized to assign only those operators/technicians can be tracked
policy, management and security. Wireless VLANs that belong within each area. In the on the plant floor based on the beacons
Intrusion Prevention System (wIPS) figure, the Operator, UC, and Office VLANs from their Wi-Fi-enabled devices for
capabilities and quality of service (QoS) for are allowed in the “Office” AP Group while safety or compliance reasons. Within
voice and video are also enabled by the the Operator, DCS, and PAN VLANs are the GE portfolio, real-time operational
WLC. Additionally, the WLC feeds telemetry allowed on the “Shop” AP Group. Working intelligence (RtOI) is able to identify the
data to the Cisco Mobility Services Engine in concert with ISE, the WLC gives the location of equipment and people and
(MSE). The MSE primarily provides location flexibility to authorize only specific users provide a personalized experience based
services and helps organizations increase on specific devices in specific locations to on who you are, where you are and what
visibility into the network, customize access specific VLANs. equipment is within your proximity.
location-based mobile capabilities and
WLC plus MSE can provide location-
strengthen security.
based mobile services, such as pushing
mobile alerts to an iOS device based on

12 Architecting a Robust Manufacturing Network for the Internet of Things


RF integrity Wireless security Rich media services,
As handheld and mobile devices become In addition to providing authentication compute and cloud
more pervasive in manufacturing, and link encryption as stated above, Cisco By building an intelligent, converged
availability of a stable, reliable, high- Wireless LAN systems offer a number plant network as described in this paper,
performing Wi-Fi network is paramount. of other security capabilities at each IT/OT professionals enable more than
Cisco provides RF integrity in several component level. Cisco APs with Cisco just the manufacturing processes and
important ways: CleanAir® technology are equipped with machines. They are building a platform
• Interference detection—A Cisco silicon-based intelligence to allow for on which additional technologies for
Wi-Fi network “listens” for potential Layer 1 threat detection of attacks that manufacturing can be deployed, including
interference sources (e.g., a microwave may come from non-802.11 sources, video analytics, factory collaboration,
oven) and can alert the administrator such as video cameras or RF jammers. edge compute for real-time analytics
and pinpoint the location of the APs intelligently process over-the-air traffic (Cisco IoX), unified computing systems
interference. to a large library of wireless intrusion (UCS) and the service exchange platform
• Intelligent channel selection—The attacks and anomalies to determine (SXP). While a detailed discussion on these
system automatically selects the best whether the network is being attacked technologies is beyond the scope of this
channel per access point to maximize or impersonation is in progress. APs relay paper, numerous resources about them
coverage based on interference and information such as the MAC address of are available at cisco.com
overlapping Wi-Fi networks. the victim and attacker, received signal
strength indication (RSSI) and time of
• Heat maps—A visual representation attack to the WLC. The WLC generates
of the RF environment using Cisco’s traps to the network management system
wireless management tool. Heat maps when security events such as rogue
allow administrators to reposition APs access points are detected or an attack
for better coverage. is in progress, as well as mitigates rogue
• Automatic signal strength threats as defined by the rogue policy.
adjustment—In the event of an AP The MSE then correlates security events
failure, remaining APs automatically by eliminating duplicate security events
adjust their channels and signal strength and computing an x,y location for all
in an attempt to cover the RF “hole” until valid clients, clients connected to rogue
the failed AP is replaced. access points, attackers and non-802.11
• Antenna design—An antenna gives interferers. The administrator then
a wireless system three fundamental uses the location data generated to do
properties: gain, direction and forensics and/or physically remove the
polarization. Cisco offers several different threat from the area.
antennas that vary these properties
in order to provide the right coverage
pattern for a specific application.

13 Architecting a Robust Manufacturing Network for the Internet of Things


Conclusion
The Industrial Internet of Things is creating disruptive opportunities that will define a
new set of winners and losers. Together, GE and Cisco offer customers a world-class
manufacturing portfolio that is unrivaled in its ability to feature both a proven global
track record as well as Internet of Things technical leadership.
With the GE-Cisco joint architecture, manufacturers can confidently deploy a next-
generation system that is scalable and secure — enabling higher productivity for each
employee and greater efficiency for each process. It helps manufacturers achieve the
critical goals of reducing WIP, cycle times and waste.
In today’s connected world, manufacturers can gain a competitive advantage by driving
insight and intelligence closer to the machines with the GE and Cisco approach, making
the manufacturing plant more integral to the operations of the enterprise.

14 Architecting a Robust Manufacturing Network for the Internet of Things


Glossary
802.11 IEC monitor networks for malicious activity
An IEEE specification for WLANs International Electrotechnical
Commission—an organization for IPSEC
802.15.4 the preparation and publication of Internet Protocol Security—a set of
An IEEE specification for LR-WPANs international standards for all electrical, IETF protocols for authenticating and
electronic and related technologies encryption network traffic
802.1X
An IEEE specification for network IEEE ISE
authentication Institute of Electrical and Electronics Identity Services Engine—a Cisco product
Engineers—organization that develops that enables the creation and enforcement
ANSI of security and access policies for endpoint
standards for the computer and
American National Standards Institute— devices
electronics industry
an organization promoting and facilitating
voluntary consensus standards IETF IT
Internet Engineering Task Force— information technology
AP
defines Internet protocol standards
Access point—the network device users LAN
connect to in Wi-Fi II local area network—a system that
Industrial Internet connects devices within a facility
ASA
Adaptive Security Appliance—a family of IoT LR-WPAN
network security devices from Cisco that Internet of Things low-rate wireless personal area
provide firewall, IPS and VPN capabilities network—an IEEE low-power, low-rate
IoX wireless transmission standard
BYOD An edge computing platform built into
bring your own device some Cisco network devices M2M
machine to machine
CAPWAP IP
Control and Provisioning of Wireless Internet Protocol—the primary MACsec
Access Points—IETF standard for the protocol/framework used in Internet Media Access Control Security—industry-
wireless control protocol utilized by WLCs communication standard link security method defined in
IEEE 802.1AE
DCS IP20
distributed control system Ingress Protection Rating 20—rating for MES
physical intrusion and moisture protection manufacturing execution system
DMZ
defined in international standard ANSI/IEC
demilitarized zone—a network segment MSE
60529
that is logically or physically separated Mobility Services Engine—a Cisco platform
from the internal network IP30 that uses Wi-Fi to increase visibility into
Ingress Protection Rating 30—rating the network, deploy location-based mobile
Ethernet services, and strengthen security
for physical intrusion and moisture
A wired link-layer networking protocol
protection defined in international
defined by IEEE 802.3 standards NAT
standard ANSI/IEC 60529
network address translation—the
firewall process of translating one IP address or
IP67
A device that controls/limits/blocks block to another for security or address
Ingress Protection Rating 67—rating
traffic flow between different reuse purposes
for physical intrusion and moisture
networks/segments
protection defined in international
OT
HMI standard ANSI/IEC 60529
operations technology
human-machine interface
IPS
Intrusion Prevention System—devices that

15 Architecting a Robust Manufacturing Network for the Internet of Things


Glossary (continued)
PAN SXP Wi-Fi
personal area network—wireless Service Exchange Platform— wireless local area network (WLAN)
technology intended to connect devices a comprehensive cloud solution for technology based on IEEE 802.11
within a very limited range delivering business process and standards
automation as a service in both Enterprise
PTP B2B and Marketplace Exchange settings WIP
Precision Time Protocol—a time work in progress—all materials and
synchronization protocol defined by TSN in-process goods in a production process
IEEE 1588 standard Time-sensitive Networking—a set of
standards developed by the IEEE 802.1 wIPS
QoS working group for time synchronization Wireless Intrusion Prevention System
quality of service—the capability of a and scheduled delivery of network traffic
network to provide better service to WLAN
selected network traffic types over others UCS wireless local area network
Universal Compute System—an (x86)
RF WLC
architecture server platform that unites
radio frequency Wireless LAN Controller—a device that
compute, network, storage access, and
provides centralized administration,
virtualization into a cohesive system
RFID control, visibility and security for
Radio Frequency Identification— VAR enterprise-scale Wi-Fi networks
a technology that utilizes electronic tags value-added reseller
with unique wireless identities WPA
VLAN Wi-Fi Protected Access—a security method
RSSI virtual local area network—a logical for authenticating users and encryption
Received Signal Strength Indicator— grouping of devices into the same Layer2 wireless networks
a measurement of the power in a domain within a single network device or
received radio signal across a network system
SSIDs VPN
Service Set Identifier—the name assigned virtual private network—a trusted/secure
to a Wi-Fi network connection between entities across a
less-trusted network
switch
An Ethernet device that connect
computers, printers servers and other
devices within a building or campus

16 Architecting a Robust Manufacturing Network for the Internet of Things


Further Reading
GE-Cisco partnership:
ge.com/digital/partners/cisco
GE Industrial Internet:
ge.com/digital/industrial-internet
Cisco Internet of Things:
cisco.com/go/iot

Contacts
GE: ge.com/digital/contact
Cisco: cisco.com/go/offices

Imagination at work

GE Intelligent Platforms, Inc. is a subsidiary of the General Electric Company. The GE brand and logo are trademarks of the General Electric Company.
© 2015 GE Intelligent Platforms, Inc. Microsoft, Windows and Excel are registered trademarks of Microsoft Corporation. PCI Express is a registered
trademark of PCI-SIG. CompactPCI is a registered trademark of the PCI Industrial Computer Manufacturers Group. ExpressCard is a trademark of
PCMCIA. All other trademarks are the property of their respective owners.
IND029-R102313

You might also like