Abstract:
A control arrangement for controlling an electronic device, is provided. The control arrangement comprises: an inner controller being coupled to the electronic device and being configured for generating at least one control signal for controlling the electronic device depending on at least one instruction signal from an outer controller; and a smart controller coupled to the inner controller and being configured for providing at least one substitute instruction signal for controlling the electronic device to the inner controller if an abnormality related to a signal traffic between the inner controller and the outer controller is detected.
Abstract:
To determine system settings for an industrial system, digital twin data of a digital twin of the industrial system is retrieved. System simulations of the industrial system are performed based on the digital twin data to explore candidate system settings for the industrial system prior to application of one of the candidate system settings to the industrial system. At least one optimization objective or at least one constraint used in the system simulations is changed while the system simulations are being performed on an ongoing basis. The results of the system simulations are used to identify one of the candidate system settings for application to the industrial system.
Abstract:
The present invention discloses a method of transmitting time-critical messages in an OSI layer 2 network tunnel from a first TED in a first substation to a second IED in a second substation over a WAN, wherein each of the first and second substation comprises an edge IED and is associated with a substation LAN, wherein each of the time-critical messages comprises message parameters. The method comprises the steps of: a) creating a translation table comprising corresponding values of the message parameters, between the LANs and the WAN, b) defining a virtual FED in the second substation using the translated values of the message parameters, to impersonate the first IED, c) translating the message parameters according to the translation table, by the edge IED of the first and second substation, d) forwarding the time-critical messages from the first IED in the first substation to the WAN, and e) receiving the time-critical messages by the second IED in the second substation from the WAN.
Abstract:
The invention relates to a method and system for detecting and mitigating cabling issues with devices connected in industrial redundant networks. An agent runs on each device and generates information about traffic received at the corresponding device. The agent running on a node generates indicators of traffic received at each port, and error rates for traffic at each port. The agent running on a switch generates information about switch misconfiguration by collecting device identifiers for each port of the switch. The agents send the information to a network manager, which determines switch misconfigurations and wrong cabling from the received information. The network manager also mitigates cabling issues by sending a signal to the affected device(s) or sending a communication to mitigate the issue.
Abstract:
To commission an industrial automation control system, IACS, a computing device generates commands to automatically set or verify a security configuration of the IACS. The commands are generated by the computing device based on a machine-readable security baseline, and, optionally, based on a machine-readable configuration file of the IACS.
Abstract:
A method for automatically improving security of a network system includes: collecting security relevant information from network devices of the network system, the security relevant information including security settings and operational information of the network devices; analyzing the security relevant information for determining weak security settings of a network device, the weak security settings being not necessary for a regular operation of the network system; determining hardened security settings for the network devices based on the weak security settings, the hardened security settings restricting a possible operation of the network device but allow a regular operation of the network system; and applying the hardened security settings to the network device.
Abstract:
A method includes transmitting time-critical messages in an OSI layer 2 network tunnel from a first IED in a first substation to a second IED in a second substation over a WAN, wherein each of the first and second substation comprises an edge IED and is associated with a substation LAN, wherein each of the time-critical messages comprises message parameters. The method includes: creating a translation table comprising corresponding values of the message parameters, between the LANs and the WAN; defining a virtual IED in the second substation using the translated values of the message parameters, to impersonate the first IED; translating the message parameters according to the translation table, by the edge IED of the first and second substation; forwarding the time-critical messages from the first IED in the first substation to the WAN; and receiving the time-critical messages by the second IED in the second substation from the WAN.
Abstract:
A method for automatically providing a time signal to containers in an operating system level virtualization or to virtual machines, the method including: —creating a pool of clocks; executing one or more containers in an operating system level virtualization or one or more virtual machines running on an executing hardware device; allocating one or more clocks of the pool of clocks to client containers in the one or more containers or to client virtual machines of the one or more virtual machines, thereby obtaining allocated clocks allocated to the client containers or the client virtual machines; wherein each of the allocated clocks provides a time signal in a time domain to at least one of the client containers or to at least one of the client virtual machines.
Abstract:
The invention relates to a method and system for detecting and mitigating cabling issues with devices connected in industrial redundant networks. An agent runs on each device and generates information about traffic received at the corresponding device. The agent running on a node generates indicators of traffic received at each port, and error rates for traffic at each port. The agent running on a switch generates information about switch misconfiguration by collecting device identifiers for each port of the switch. The agents send the information to a network manager, which determines switch misconfigurations and wrong cabling from the received information. The network manager also mitigates cabling issues by sending a signal to the affected device(s) or sending a communication to mitigate the issue.
Abstract:
A method for automatically improving security of a network system includes: collecting security relevant information from network devices of the network system, the security relevant information including security settings and operational information of the network devices; analyzing the security relevant information for determining weak security settings of a network device, the weak security settings being not necessary for a regular operation of the network system; determining hardened security settings for the network devices based on the weak security settings, the hardened security settings restricting a possible operation of the network device but allow a regular operation of the network system; and applying the hardened security settings to the network device.