QRCode of WhatsApp
Call us 24/7+86 18559620468

What is ICS?

Industrial Control System (ICS): Core Components, Architecture, and Protocols

GE IS420YAICS1B Analog I/O Pack for Mark VIe Series

ICS taxonomy and building blocks

  • Programmable Logic Controller (PLC)
    • What it does: Runs control logic for machines and processes with a fixed scan cycle.
    • Key data point: Typical scan time is 10–50 ms, so logic must be simple and predictable.
    • How to use well: Keep I/O local when possible. Keep logic modular (ladder, function blocks, structured text). Avoid long communications in the scan.
  • Remote Terminal Unit (RTU)
    • What it does: Serves remote sites like pipelines or substations with telemetry and control.
    • Why it fits: Handles low bandwidth and harsh weather; can run on battery or solar.
    • Tip: Use store-and-forward and time stamps to handle link outages.
  • Distributed Control System (DCS)
    • What it does: Manages large continuous processes with centralized engineering tools.
    • Why it fits: Tight loop control, integrated HMI and historian, and uniform change control.
    • Tip: Use built-in high-availability options for controllers, servers, and networks.
  • Supervisory Control and Data Acquisition (SCADA)
    • What it does: Supervises many remote assets; edge PLCs/RTUs do the actual control.
    • Why it fits: Scales over wide areas and varied links (cellular, microwave, leased lines).
    • Tip: Event-driven polling and exception reporting reduce bandwidth.
  • Safety Instrumented System (SIS)
    • What it does: Brings the process to a safe state on demand (e.g., emergency shutdown).
    • Standards: Design and proof testing use SIL targets per IEC 61508/61511.
    • Tip: Keep SIS logic and networks independent from basic control to avoid common-cause failures.
  • Human-Machine Interface (HMI)
    • What it does: Shows live data, alarms, trends, and lets operators set points.
    • Good practice: Use high-contrast displays, limit alarm floods, and support situational awareness.
  • Historian
    • What it does: Stores time-series data for KPIs, analysis, and compliance.
    • Key data point: Common rates are 1–10 Hz and higher; use exception- and compression-based storage.
    • Tip: Include quality flags, engineering units, and accurate time stamps.
  • Field elements
    • Sensors: Pressure, temperature, flow, level, vibration.
    • Actuators: Valves, motors, variable frequency drives.
    • Instrumentation links: 4–20 mA loops, HART, FOUNDATION Fieldbus, PROFIBUS PA.

Reference architectures: Purdue Model, zones, and conduits

  • Purdue Enterprise Reference Architecture (ISA‑95)
    • Level 0/1: Instruments, drives, and basic control.
    • Level 2: Area supervisory control, HMIs, engineering workstations.
    • Level 3: Site operations like historians and MES.
    • Level 3.5: Industrial DMZ to buffer OT from IT.
    • Level 4/5: Enterprise IT and cloud apps.
  • Zones and conduits (ISA/IEC 62443)
    • Why: Group assets with similar risk into zones; control traffic between zones with conduits.
    • How: Only allow needed ports and protocols. Document each data flow and owner.
  • Industrial DMZ (Level 3.5)
    • What to place here: Patch servers, AV update relays, file transfer brokers, and replicated historians.
    • Rule: No direct IT-to-Level 2 connections. Use one-way services and brokers in the DMZ (NIST SP 800‑82).
  • Unidirectional gateways (data diodes)
    • Why: Enforce one-way data out of OT when inbound risk is unacceptable.
    • Use case: Historian replication to enterprise; no inbound sessions allowed.
  • Remote access patterns
    • Use jump servers with MFA, time-bound approval, just-in-time accounts, and session recording.
    • Broker vendor access; avoid direct VPNs into Level 2.
    • Log all activity; disable access when the work order ends.
  • Network redundancy and determinism
    • Topologies: Rings with fast recovery; for zero-time switchover, use PRP or HSR per IEC 62439‑3.
    • Segmentation: Separate control, safety, and supervisory networks; enforce QoS for critical traffic.
  • Time synchronization
    • Use IEEE 1588 Precision Time Protocol (PTP) with grandmasters and boundary clocks.
    • Key data point: Sub‑microsecond alignment supports sequence-of-events and fast interlocks.
    • Tip: Protect PTP from spoofing; restrict GM changes and isolate timing domains.

Industrial protocols and data modeling

  • Modbus (Serial/TCP)
    • What: Simple register map, very common.
    • Security: No auth or encryption by default; use only in trusted segments or wrap in secure tunnels.
    • Use when: You need basic data moves with legacy devices.
  • DNP3 (Serial/TCP)
    • What: Utility-focused with event buffers and time stamps.
    • Security: DNP3 Secure Authentication adds challenge‑response to reduce spoofing.
    • Use when: You need reliable telemetry over poor links.
  • IEC 60870‑5‑104 and IEC 61850 (power systems)
    • IEC 61850: Uses MMS for client/server; GOOSE and Sampled Values for fast peer‑to‑peer.
    • Why: GOOSE and SV support sub‑millisecond messaging for protection schemes.
    • Tip: Align with PTP; isolate GOOSE/SV on engineered VLANs with strict QoS.
  • PROFINET and EtherNet/IP (CIP)
    • What: Industrial Ethernet for real-time control.
    • Performance: Classes range from soft RT to isochronous RT for motion with precise timing.
    • Use when: You need synchronized drives and deterministic control.
  • OPC UA
    • What: Vendor‑neutral information modeling with built‑in security (X.509 certs, encryption, user auth).
    • Scalability: Pub/Sub options over UDP or MQTT for many subscribers.
    • Tip: Manage certificate lifecycle; pin trust stores; use secure endpoints only.
  • Instrumentation buses
    • HART: Digital over 4–20 mA for device config and diagnostics.
    • FOUNDATION Fieldbus/PROFIBUS PA: Rich device data and function blocks over a shared bus.
  • Data modeling and historian best practices
    • Tag naming: Use structured names (Area_Unit_Loop_Param) to ease queries and alarms.
    • Units and ranges: Store engineering units, safe ranges, and scaling with the tag.
    • Quality and time: Keep quality flags (good/bad/uncertain) and source time stamps.
    • Compression: Use deadbands to cut storage without losing trends; validate against process needs.
    • Sampling: Match to process dynamics—fast loops may need >10 Hz; slow assets can be 1 Hz or event-based.
    • Access control: Expose read-only mirrors to IT via DMZ; keep write paths inside OT.
    • Reference patterns: Follow NIST SP 800‑82 for approved ports, proxies, and historian replication.

How to choose the right building block

  • Continuous processes (refining, power): Favor DCS for tight loop control and integrated safety; add SIS per IEC 61511.
  • Batch (pharma, food): Use PLCs with batch engines in SCADA/MES; ensure recipe version control.
  • Discrete (assembly, packaging): Use PLCs with real-time Ethernet for motion; consider OPC UA for higher-level coordination.
  • Remote assets (pipelines, water): Use RTUs with DNP3 or IEC 60870‑5‑104; design for low power and intermittent links.

Why architecture and protocols matter

  • Safety and uptime: Deterministic cycles and protected zones reduce process upsets and hazards.
  • Data trust: Time-aligned, modeled data improves KPIs and root-cause analysis.
  • Security by design: Zoning and conduits per ISA/IEC 62443 and patterns in NIST SP 800‑82 lower attack paths without blocking needed work.

Search for products

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Back to Top
Product has been added to your cart