Exelon Smart Grid Multi-Service Communications Architecture Do Doug Mc McGi Ginnis
4/ 4/5/ 5/13
Exelon Smart Grid Multi-Service Communications Architecture Do - - PowerPoint PPT Presentation
Exelon Smart Grid Multi-Service Communications Architecture Do Doug Mc McGi Ginnis 4/ 4/5/ 5/13 Smart Grid (Generation 1) Grid Automation is not a new concept SCADA/AMR functions have been around for years Smart Grid is the embodiment
Exelon Smart Grid Multi-Service Communications Architecture Do Doug Mc McGi Ginnis
4/ 4/5/ 5/13
2
Smart Grid (Generation 1)
Grid Automation is not a new concept
Smart Grid is the embodiment and convergence of a standardized framework
Application requirements will drive communications technologies to their current limits
availability
3
Smart Grid Journey
3
Multi Tier Smart Grid Communications Strategy Finalized PECO Sensus Decision ComEd introduced the Intelligent Grid concept ComEd SB1652 Begins
2008 2009 2010 2011 2007 2012
Substation Communication Architecture Standard
ComEd AMI SSN Pilot PECO ARRA Award ComEd ALU Tier 2 Pilot Multiservice Network build Start of 360 miles of fiber build PECO Network Complete
4
Smart Grid Communications Strategy
4
Bus Req
Strategy
Standards
Do it
5 5
Communication Design Principles
Security
version of NERC CIP requirements
Co Converge ged Co Communications
will be logically isolated (tunneled)
Interoperable
Privately o y owned c communicat ations
all aspects of the technology.
No
Sin ingle P Poin
ilure (Self Healing)
incorporated to form a “self healing” architecture. Communications
6
Security Processes – Defense In Depth
6
platform, network and application elements including but not limited to:
monitoring, alerting, notification (LMAN)
networks via the SGSM Command Center and PECO’s cyber security operations
7
Defense-in-depth approach requires that relationships between network resources and network users be implemented within a controlled, scalable, and granular system of permissions and access controls that goes beyond simple network segmentation: Security monitoring and incident management activities across SGSM Implemented layers of security controls to authenticate network devices and users accessing SGSM information systems Firewalls with stateful packet inspection and intrusion detection technologies Implement encryption throughout the network to ensure confidentiality and integrity Multi-service architecture consisting of multiple application and network-layer services utilizing a common transport medium while maintaining appropriate separation within common communications backhaul elements (e.g., frequency and physical separation of AMI & DA transceivers, self-healing network elements, etc.)
7
Defense-in-Depth Overview - CIA
8
Risk Management
Security control selection is dependent upon organizational decisions based on criteria for risk acceptance, treatment options, and the general risk management approach applied throughout the CSMS
large scale deployments.
actions taken:
incident management, field network OTA firmware update, and encryption management
and corrective actions implemented. SGSM risks and issues are tracked to closure via HPQC
specifications
Program risk management model, to assess security risks and render decisions based on the cyber security plan, relevant standards and best practices, and business/operational priorities
8
9
Functional AMI & DA Architecture
9
10
Defense-in-Depth - Architecture
10
11
Multi-Service Communications Architecture Emerges
Requirements
the Smart Grid strategy and associated application portfolio
infrastructure and be scalable to accommodate future growth
Convergence & Alignment
poorly, is not monitored and lacks Carrier SLA’s
Architecture Framework
11
12
Multi-Tiered Transport Technologies
12
Communication
13 13
14
Architectural Multiservice Framework
Substat ation S Service P Portfolio – 7 application groups have been identified
14
1 to 5 MB/Sec (depending video rates)
15
Substation Communications Architecture
enterprise service)
respective VLAN’s
Substa tati tion LAN
Substa tati tion WAN
communications
Relay ay Protection Telepr protec ecti tion
15
16
Substation LAN – WAN Architecture
16
Telemetry CIP Telemetry Field DA Enterprise Security AMI
SCADA Enterprise Security AMI/RNI
Gigabit Ethernet
VRF Tunnels Network Core Substation
Firewall Router Core Router Firewall Switch Switch
VLAN extended to switch per Application
Ethernet based devices AMI TGB DA TGB VoIP Camera CardReader RTU Work Station
17
Substation Logical Architecture
17
18 18
PECO High level Network Design
19
WiMax Failover Redundancy
19
CCC (7750c12) 133 LC3(7750c12) 134 BaseStation1 Lombard (7705) BaseStation2 Lisle (7705) Sub Station1 Butterfield (7705) Sub Station2 Glen Ellyn (7705) Jmux Jmux Jmux Jmux Jmux Jmux 6855 CPE 6855 CPE CPE CPE CPE CPE CPE CPE 3G 3G 3G 3G 3G 3G 3G 3G
Vlan 101,201 Vlan 102,202 Vlan 101 Vlan 201 Vlan 102 Vlan 202 Vlan 101 Vlan 201 Vlan 102 Vlan 202 1/1/1 1/2/1 1/1/7 1/1/7 1/1/1 1/2/1 1/1/1 1/2/1 1/1/1 1/2/1 1/1/1 1/2/1 1/1/1 1/2/1 1/3/1 1/4/1 1/3/1 1/4/1 1/1/2 1/2/2 1/1/2 1/2/2Sonet
WiMax
1/5/1 1/5/120
Security Architecture
20
21
Tier 2 Backhaul Architecture
Bridge the FAN with Tier 1
Application Traffic Considerations
WiMax Technology – 3.65 GHz Spectrum (802.16.e)
21
22
Substation IP Enablement
IP/Ethernet to support legacy & new technology for Smart Grid application protocols and Migrate legacy serial based devices to IP/Ethernet
SONET infrastructure when IP/Ethernet not viable
Remove legacy ATT & Verizon communications circuits
22
23
Smart Grid Evolution
23
Evolving Business Requirements Application Data Appetite Network Utilization Demand
Business Analytics
Polling Frequency
Network Saturation
24
Smart Grid G2
24
Increased Network Demand RF Technology Improvements
Conv nvergence FA FAN
Current Technology limited bandwidth
Broadband Spectrum
Got Spectrum?
25
Spectrum
25
Broadband Spectrum critical to the future of the Smart Grid 10-20MHz would be nice
Broadband not readily available to Utilities
Creative Alignments – Assistance not likely from FCC/NTIA
26
26
27
Technology Details Multi Protocol Label Switching (MPLS)
– Layer 3 multipoint VPNs; referred to as Virtual Private Routed Networks (VPRNs) – Layer 2 multipoint VPNs, or VPLSs is a layer 2 multipoint VPN that allows multiple sites to be connected in a single bridged domain over a managed IP/MPLS network. All substations in a VPLS instance appear to be on the same LAN network. VPLS uses an Ethernet interface and allows flexible service provisioning.
switched routers
to reserve resources across a network to support integrated services
27
28
Spectrum Evaluation Frequencies
Requirements
700Mhz 900Mhz 2.3Ghz 3.65GHZ 5.8Ghz 6-11Ghz Risk High High High Medium Low Low Cost Low Low High Low Low High Coverage Excellent Adequate Good Good Good Excellent Equipment Availability Limited Good Growing Growing Good Good Licensed √ √ √ No No √ Unlicensed No √ No √ √ No Lightly No No No √ No No Availability – PECO area √ √ √ √ √ √ Point-to-Point No No No No √ √ Point-to-Multi Point √ √ √ √ No No
Overall Ranking 2 6 5 1 3 4
Ranking: 1 high - 6 low 28