Remote - Spring 2016 - (Page 23)
Feature Article
Key Elements to Designing an IoT Network for Remote Monitoring
Jason Wilson, Vice President, Business Development
Ingenu
The power, reach and availability of the Internet of Things (IoT) is enabling a host of remote network deployments. Industries
such as energy, oil and gas, agriculture and others are utilizing remote devices to provide usage data, report faults or outages,
and streamline processes, while reducing maintenance and operating costs. Applications never before imagined are now
made possible as a result of the inherent capabilities of the IoT.
When deploying a remote IoT network, a number of factors should be considered:
*
The network should provide the coverage to access the greatest number of remote devices per network access point
*
The network should be robust, reliable and secure
*
The network and IoT-enabled devices on it should be able to operate for decades without upgrades or maintenance
*
Affordability is also an important factor in covering remote assets
*
The network should be scalable with the capacity to allow for future growth and addition of new applications
Coverage is perhaps the most difficult element to address when implementing
a remote IoT network. The benefits of remote monitoring can be negated if the
network is unable to reach assets at the edge. Therefore, the fundamental design of the network should be able to cover as many devices as possible with
minimal infrastructure investment. For example, WellAware, a data company in
the oil and gas industry, deployed a remote network to control its digital oilfield
assets (see page 24). The network was designed so that each individual network access point (AP) was able to provide reliable coverage to thousands of
end-point devices, spanning hundreds of square miles. This coverage allowed
WellAware to accurately collect valuable data from its remote sensors which, in
turn, enabled intelligent analytics for enhanced oilfield operation.
For remote locations, network security is as imperative as the physical protection of the remote assets themselves. Every
transaction on the network must be secured from end-point to AP to backhaul to head-end system. In fact, SCADA (supervisory control and data acquisition) systems, commonly used in energy applications, realized a more than 31 percent increase
in cyber attacks from 2013 to 2014, according to the Dell 2015 Security Annual Report. As such, to protect the network from
being compromised, it should be built with the same security characteristics as enterprise networks, including: mutual authentication, message confidentiality, device anonymity, secure multicasts and authentic firmware upgrades-all based on current
approved security standards.
Longevity is not always the first consideration when deploying a network, but is conceivably the most crucial when calculating
return on the network investment. End-point devices deployed in the field should be able to operate for decades without the
need for service. A majority of remote applications transmit less than one megabyte of data per month, so current advances in
low-power operation and battery technology enable devices to operate for 10 to even 20 years following installation, and the
network should operate with the same life span as the devices it supports. Case in point, there are millions of perfectly good
IoT devices currently operating on 2G and 3G cellular networks that are now faced with obsolescence as they must make way
for new networks-a pattern which will surely be repeated with the next network upgrade.
Remote monitoring is specifically designed to lessen or even eliminate the need for physical examination and servicing of
assets. So, a remote monitoring network should be specifically designed as it was intended to be used. A network built for
machines, for instance, requires far less infrastructure than a cellular or satellite network because it is only supporting lowpower transmission of data between machines. It does not need to maintain voice, video or other high-bandwidth applications,
so it does not need the associated infrastructure or upkeep. Therefore, a purpose-built machine network provides exclusive
machine connectivity at a significantly lower investment in capital and resources over the life of the network.
Finally, a remote network should be able to grow with the needs of the applications that it serves. A scalable network should
be designed to leverage the initial network investment by increasing the capacity of devices it powers. For example, a network
that monitors oil pressure could potentially expand to add temperature and humidity or even motion-sensing capabilities, without the need for additional infrastructure.
Please see Ingenu contnied on page 26
Remote Site & Equipment Management \ Spring 2016
23
Table of Contents for the Digital Edition of Remote - Spring 2016
Editor's Choice
Driving Real-Time Insight in the Oil and Gas Industry
One Network to Rule Them All
Rolls-Royce Power Systems Protection Underground Data Center
Going Beyond Compliance: Using NERC CIP v5 as a Catalyst for a Greater Security Strategy
Different Hardware Platforms, Same HMI Software
Satellite Communications: Extending the Reach of Your Monitoring and Control Footprint
Key Elements to Designing an IoT Network for Remote Monitoring
4G LTE Versus Wi-Fi Versus Bluetooth: What Every Aspiring IoT Entrepreneur Needs to Know
SCADA
Networking
Security
Onsite Power
Industry News
Remote - Spring 2016
https://www.nxtbook.com/nxtbooks/webcom/remote_2016winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2016fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2016
https://www.nxtbook.com/nxtbooks/webcom/remote_2016spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2015fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2015m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2015spring
https://www.nxtbook.com/nxtbooks/webcom/remote_industrialnetworking2014
https://www.nxtbook.com/nxtbooks/webcom/remote_2014fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2014m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2014spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2013winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2013m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2013fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2013summer
https://www.nxtbook.com/nxtbooks/webcom/remote_2013spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2012winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2012m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2012fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2012summer
https://www.nxtbook.com/nxtbooks/webcom/remote_2012scada
https://www.nxtbook.com/nxtbooks/webcom/remote_2012spring
https://www.nxtbook.com/nxtbooks/webcom/remote_201112
https://www.nxtbook.com/nxtbooks/webcom/remote_201110
https://www.nxtbook.com/nxtbooks/webcom/remote_201108
https://www.nxtbookmedia.com