Whether your next project involves a retrofit, upgrade, or expansion, odds are high that some level of data acquisition and automated control will be required in this connected age. In many cases, connecting to an existing network will benefit your organization’s ability to operate, manage, and maintain these new additions. To get there, data may need to be translated between protocols, parsed down, and prioritized to ensure crucial information is not lost among the flood of new data coming in.
Although planning such an expansion is not as simple as running an Ethernet cable to the new system, plugging it in, and walking away, having early engagement and alignment between all parties involved in the installation will expedite the process and help drive a predictable outcome. Lack of proactive coordination and ownership of the process will increase risk of encountering incompatibilities at the most inopportune times, resulting in additional costs and schedule delays. The topics detailed below are intended to help your team navigate this process and hopefully benefit all parties involved from the shop floor to the corporate office.
Topics to consider:
1. Understanding Operational NeedsDefining the operational needs early creates a strong foundation for the entire network expansion. These needs can then be passed on to vendors and subcontractors as requirements within their scope and aid in the selection and cost forecasting during the bid cycle. To assist in determining what data is the priority, map the data using this criteria:
Existing control and IT infrastructure plays a key role in the consideration of new network additions. Early internal investigations to the modifications required will contribute to accuracy of project cost estimates and identification of parallel activities to complete before the commissioning of the new system.
Adding networked systems, while beneficial to production, may expose your network to vulnerabilities that can disrupt or lead to theft of data records that may include intellectual property if left unprotected. These vulnerabilities typically occur through local interfaces or through wired/wireless remote support com ports that are becoming more common offerings. The following countermeasures are recommended, but implementation may vary based on individual risk assessments.
Where practical, it can be advantageous to select systems that are easily integrated into the existing network by utilizing protocols, products, and services that already exist at your site. Leveraging resources familiar with a product line or protocol can expedite implementation and training. And though it may seem like using the same protocol will be “plug and play” from first glance, unforeseen challenges may still lurk beneath the surface:
Another option is to use bridging devices/software to act as a “Rosetta Stone”, translating one protocol language to another. These bridges are particularly useful when your preferred site protocol is not the new system vendor’s standard offering and may be more cost effective than requesting “an engineered solution”. While there are more and more products available to bridge systems with different communication protocols, some caveats remain:
Conclusion
Similar to any plant expansion project, proactive planning and alignment in the early phases of a project requiring an expansion of the control network can help minimize hidden costs, schedule delays, and drive predictable project outcomes.
Contact us to learn more about how the Day & Zimmermann team can help plan, design, and execute your next control network expansion!