Previous Page  98 / 160 Next Page
Information
Show Menu
Previous Page 98 / 160 Next Page
Page Background

March

2017

HYDROCARBON

ENGINEERING

96

right network security in place to ensure safe, reliable,

encrypted communications. This helps to maintain system

integrity, conceal data from unauthorised parties, and

authenticate user action.

Ensuring secure communications

Each production plant will have its own security policies

and network protection in the form of firewalls, proxy

servers and addressing schemes, so any remote monitoring

solution must support a customer’s desired level of

security, providing granular user rights control and offering

auditing and tracking capabilities. Additionally, if a remote

service offering requires changes to an operator’s network

protection, it will likely fail to gain acceptance. Therefore,

it is important to ensure that any solution contemplated is

highly flexible and able to:

„

Support the way a customer’s IT organisation manages

security operations, policies, or procedures.

„

Adhere to accepted industry standards.

„

Control user access in compliance with established

security models.

Excessive care must be taken to ensure that no

sensitive customer data collected in the data set is

delivered to the third party monitoring enterprise.

Policies must be established to guide the types of actions

that can be performed on the device, such as data

collection and software updates, as well as establish

when they can be performed. Additionally, service

providers must only gather the data necessary to monitor,

diagnose and troubleshoot the equipment in question to

avoid security breaches. Under no circumstances should

this data be transferred, sold or disclosed to unauthorised

third parties.

Furthermore, the enterprise system should create a full

audit trail that documents every activity and event from

intelligent devices and remote support users. The audit log

contains information about user interactions within the

system and machines. All logged data should not be

removed from the system in order to maintain a complete

record of who carried out what, when, and against which

devices. True two-way communication protected by a

robust audit trail can help ensure a secure and successful

remote service monitoring experience.

Conclusion

As long as security is handled well, intelligent load cells are

the future of the automated weighing technology that

enables safe, profitable processing in industries such as oil

and gas. Continuous load cell monitoring via on-board

microprocessors converts analogue signals so that they are

transferred digitally, without signal loss and the attendant

potential for inaccuracy. Perhaps most importantly,

minute-to-minute data capture about load-cell

performance allows decline, or outright failure, to be

identified and corrected quickly, often via remote servicing.

With the excellent quality enhancing capabilities

offered by intelligent weighing sensors, accuracy is all but

ensured. The ultimate benefits are overall improvements in

quality and productivity that not only protect margins but

enhance profits in the Industry 4.0 age.

Figure 5.

Cloud-based remote services make

maintenance easy and reduce downtime.

Figure 6.

Weighing terminals provide diagnostic

information for predictive maintenance to the

operator and can simultaneously forward them to a

remote service provider.

Figure 4.

Intelligent load cells detect faults

immediately. A message can be sent to the control

centre, a production manager’s smartphone or an

external service provider for remote maintenance.