Smart Grid: Field Area Network Multi-Service Architecture and BC Hydro Case Study
Smart Grid: Field Area Network Multi-Service Architecture and BC Hydro Case Study
Smart Grid: Field Area Network Multi-Service Architecture and BC Hydro Case Study
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 1
Cisco Connected Energy
Renewable
Smart
Energy
Energy
Markets
Smart
Grid
the
energy network
pla�orm
Industrial
U�lity
Opera�ons
Smart
Buildings
Smart
Homes
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Cisco GridBlocks™
Reference Model
§ Describes the power delivery chain
§ Architectures detail networking each
of the eleven tiers in this model
§ Results in a complete end-to-end
architecture for converged power
delivery chain communications
§ Framework for
‒ Integrating legacy devices
‒ Using existing products in new ways
‒ Integrating new ecosystem partners
‒ Developing new products and services
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Field Area Network Applications
Micro Genera�on
EV Charging Sta�on
Advanced
Transmission
and
Distribu�on
Substa�ons
C&I
Services:
Metering
Metering
Demand
Response
Infrastructure
Generic
Connected
Grid
Router
2010
and
Telemetry
Connected
Grid
Switches
2520
Business
Area
Network
Applications
Industrial
/
Commercial
customers
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Cisco Field Area Network Vision
Enable pervasive monitoring and control of energy distribution networks to enhance
energy delivery and build a low carbon society.
DG DA AMI
Business Business Business
Application
1 Application
2 ApplicationN
Software,
Business Business Business
Application Application Application
#1 #2 #N
Application Infrastructure
Services
Converged Network
Network Existing
Infrastructure
Existing
Infrastructure
Existing
Infrastructure
Devices
dedicated dedicated dedicated
devices devices devices
AMI
Cisco Connected Grid
Head-‐end
CG-‐NMS
Security and Network
Management
Substa�on 2G/3G/LTE
WAN
Tier
Ethernet,
Cisco Connected Grid
WiMAX
Router 1000 Series
NAN
Tier
Cisco Connected Grid
Endpoint
RF
Mesh
Protec�on
and
Neighborhood
Area
Network
Control
Networks
Work
Force
Automa�on
AMI
Metering
/
Transformer
Distribu�on
EV
Charging
Direct
Load
Gas
/
Water
Meters
Distributed
SCADA
Protec�on
and
Direct
Connect
HAN
Gateway
Monitoring
Automa�on
Infrastructure
Control
Genera�on
Control
Network
AMI
Meters
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Open Standards Reference Model
IEEE
DNS, NTP, ANSI C12.19/C12.22 IEC 61850 IEC 60870 DNP MODBUS
HTTPS/CoAP 1888
SSH,… DLMS COSEM
TCP/UDP
Functionality Functionality
Comm. Network Layer
Network
O Standardization at all levels to ensure interoperability and reduce technology risk for utilities
O Enables common application layer services over various wired and wireless communication
technologies
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
902-928 MHz RF Mesh
IEEE 802.15.4g Smart Utility Network (SUN)
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Worldwide RFID UHF Map*
Europe
865,6 – 867,6 MHz
North America
United States, Canada,
China
China Korea
Korea
Mexico, Puerto Rico 910– 914 MHz
902 – 928 MHz Turkey 840,5 – 844,5 MHz
865,6 – 867,6 MHz 920,5 – 925,5 MHz
Japan
Japan
Iran 952– 955 MHz
865 – 868 MHz
Taiwan
Taiwan
Thailand
Thailand 922– 928 MHz
Israel 920– 925 MHz
915– 917 MHz
Hong Kong
Hong Kong
United Arab
United Arab 865 – 868 MHz
920 – 925 MHz
Emirates
865,6 – 867,6 MHz
India
India
865 – 867 MHz
Malaysia
Malaysia Vietnam
Vietnam
South
South America
America 919 – 923 MHz
866 – 869 MHz
Argentina, Chile,
Argentina, Chile, 920 – 925 MHz
Costa Rica,
Costa Rica,
Dominican Republic,
Dominican Republic,
Singapore
Singapore New
New Zealand
Zealand
Peru, Uruguay
Peru, Uruguay 864 – 868 MHz
866 – 869 MHz
902 – 928 MHz
Brazil 920 – 925 MHz
902 – 907,5 MHz
915 – 928 MHz
Australia
Australia
920 – 926 MHz
South
South Africa
Africa
865,6 – 867,6 MHz
915,4 – 919 MHz
* Data based on GS1 EPCglobal dated 5 Jan 2009. Accuracy not guaranteed. Subject to change.
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
What is 6LoWPAN
§ IETF WG – IPv6 over Low power Wireless Personal Area Networks
‒ Adaptation layer for IPv6 over IEEE 802.15.4
‒ Also adopted by IEEE P1901.2 PLC, Bluetooth Low Energy, DECT Ultra Low
Energy (ULE)
§ Header Compression Format for IPv6 Datagrams in 6LoWPAN Networks
‒ Before 15.4g, 15.4 only supports 127 bytes frame size
‒ Even if 15.4g enables larger frame size, bandwidth optimization is still required
‒ RFC 6282 obsoletes RFC 4944
§ Fragmentation
‒ on IPv6, fragmentation is handled on end-nodes or by Layer 2
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Low Power and Lossy Networks (LLNs)
§ Networks made up of many embedded devices with limited power,
memory, and processing resources.
‒ Such as smart meters, actuators, relays, sensors, etc
§ Can be interconnected by a variety of data links, such as
‒ IEEE 802.15.4, IEEE P1901.2 PLC, Bluetooth, IEEE 802.11ah, DECT LE, etc.
§ LLNs have at least 5 distinguishing characteristics requiring a specific IP
routing protocol to be designed
‒ LLNs operate with a hard, very small bound on state.
‒ In most cases, LLN optimize for saving energy – new routing metric needed
‒ Typical traffic patterns are not simply Unicast flows (e.g. in some cases most if not all
traffic can be point to multipoint).
‒ In most cases, LLNs will be employed over link layers with restricted frame-sizes, thus a
routing protocol for LLNs should be specifically adapted for such link layers
‒ LLN routing protocols have to be very careful when trading off efficiency for generality;
many LLN nodes do not have resources to waste.
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
IETF RoLL WG
§ IETF WG Formed in Jan 2008 and already re-chartered
‒ http://www.ietf.org/html.charters/roll-charter.html
‒ Co-chairs: JP Vasseur (Cisco), David Culler (UC Berkeley)
§ Mission: To define routing solutions for LLNs
§ First, documented the Use Cases and Applications requirements
‒ RFC 5548 – Urban (include Smart Metering)
‒ RFC 5673 – Industrial
‒ RFC 5826 – Home Automation
‒ RFC 5867 – Building Automation
§ Then, selected and specified the routing protocol for LLNs
‒ IPv6 Routing Protocol for LLNs (RPL) adopted as WG document from several
proposals
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
RPL Implementation
SCEP
O Rou�ng
protocol
for
Low
CG-Mesh nodes:
implement RPL non-storing
Power
and
Lossy
Networks
mode
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
IETF RoLL documents
Published RFCs:
§ RFC 6206: The Trickle Algorithm
§ RFC 6550: RPL – IPv6 Routing Protocol for Low-Power and Lossy Networks
§ RFC 6551: Routing Metrics Used for Path Calculation in LLNs
§ RFC 6552: Objective Function Zero for RPL
§ RFC 6553: RPL Option for Carrying RPL Information in Data-Plane Datagrams
§ RFC 6554: An IPv6 Routing Header for Source Routing with RPL
Additional Drafts:
§ draft-ietf-roll-trickle-mcast: Multicast Forwarding Using Trickle
§ draft-ietf-roll-minrank-hysteresis: The Minimum Rank with Hysteresis OF
§ draft-ietf-roll-p2p-rpl: Reactive Discovery of P2P Routes in LLNs
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Multicasting in CG-Mesh
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
CoAP (Constrained Application Protocol)
Client Server Client Server
§ IETF CoRE WG | | | |
| CON tid=47 | | CON tid=53 |
§ Device constraints | GET /foo | | GET /baz |
+---------------->| +---------------->|
‒ Microcontrollers | | | |
| ACK tid=47 | | ACK tid=53 |
‒ Limited RAM and ROM | 200 "<temp... | | 404 "Not... |
|<----------------+ |<----------------+
§ Network Constraints | | | |
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Standards Timeline
Standard Term Source Description Status
RPL (Routing Protocol for Low- IETF ROLL WG Routing protocol under completion in Approved March 2011
Power and Lossy Networks) (Standard) IETF ROLL RFCs published
IETF 6LoWPAN WG Adaptation layer for IPv6 over IEEE Approved March 2011
6LoWPAN (RFC 6282)
(Standard) 802.15.4 links RFC Published Sep. 2011
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Cisco 1000 Series Connected Grid Routers
o Meets
IEC
61850-‐3
and
IEEE1613
standards
o Integrated
security
for
NERC/CIP
compliance
o Modular
chassis,
2-‐4
Slots,
rugged
modules
o Gigabit
fiber
and/or
copper
Ethernet
WAN
o Integrated
Serial
ports
o Connected
Grid
Intelligence
Based
on
Connected
Grid
Opera�ng
System
(CG-‐OS)
O Flexible
infrastructure
to
host
lightweight
3rd
party
applica�ons
Cer�ficate-‐based
iden�ty
Quality
of
Service
No
moving
parts
Remote
diagnos�c
tools
802.1x
Access
Control
Segmenta�on
&
Priori�za�on
of
IEC
61850-‐3,
IEEE
1613
Comprehensive
Network
&
Control
&
DA
traffic
Security
Management
AMI/DA
Mesh
Security
Industrial
grade
components
SCADA
protocol
transla�on
Device
Manager
for
field
IPSec
VPN
Automa�c
failover
from
DC
to
AC
PS
technicians
(indoor
model)
Industry
standard
CLI
Automa�c
failover
from
AC
to
ba�ery
(outdoor
model)
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Cisco 1240 Connected Grid Router
Outdoor Model (Pole Mounted)
GPS
Antenna
Ba�ery
Backup
4 Module Slots
§ Estimated Dimensions: 30.5 cm (H) x 20.3 cm (W) x 19 cm (D) = 12” (H) x 8.0” (W) x 7.5” (D
§ Antennas shown above are optional; can be deployed with external antennas
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Cisco 1120 Connected Grid Router
Indoor Model (Din-Rail Mounted)
Fiber
WAN
2
Ethernet
Switch
2GE
Serial
Console
&
GE
SFP
WAN,
6FE
RS-‐232,
Alarm
ports
RS-‐485
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
CGR 1000 Modules
WAN
Modules
2G/3G
Module:
i)
GSM,
GPRS,
EDGE,
UMTS,
HSPA+
ii)
CDMA
WiMAX
(802.16e):
1.8,
2.3,
3.65
GHz
bands
NAN
(Meter
side)
Modules
902-‐928
MHz
RF
(802.15.4g/e)
§ WAN and NAN will be interchangeable between outdoor and indoor
models of CGR 1000 Series platforms
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Connected Grid Network Management
End-to-End Monitoring and Control
The Connected Grid NMS Solution
provides grid operators
O Scalable, Utility Ops communication
management
O Enterprise-class visibility for up to 10M
endpoints
O Secure network commissioning,
monitoring and life cycle management
via well-defined interfaces
O Integration with Utility Operations and
Enterprise Bus
Ethernet
Security functionality
O X.509 Certificate based Authentication / Authorization
O Command set (user role), DAP-id, visit parameters digitally signed by Utility CA: Role Based Access Control
O Logging of commands issued, user-id, time stamps, visit parameters (for audit records): Accounting
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Connected Grid Network & Security Management
Enabling Connected Grid & Operational Transformation
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Connected Grid Network Management System
GIS Visualization Framework
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Connected Grid Network & Security Management
# Function CG NMS Capabilities (Release 1)
1 Secure Zero Touch Deployment Field Area Routers and Itron Meters/Comm module
2 Asset Visualization (on GIS) Grouping, Template based Configuration & Role based Access Control
9 High Avail & Scalability 10M AMI Meter AMI or up to 50K FAR Backhaul Network
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
FAN Topology: Wide Area Network (WAN)
OpenWay
CE
Cisco
CG-‐NMS
SCADA
NTP
source
AAA,
DNS,
Grid
DHCPv6
Services
State
Directory
DB DB Services
Cer�ficate
Historian
Authority
OMS DMS
Broad
WAN
Data
Integrity
and
technologies:
Cellular
Privacy:
IPSec
encryp�on
Public IP Infrastructure
over
WAN
backhaul
Private IP Infrastructure (GPRS/3G/LTE,
CDMA),
Network owned and operated by service Network owned and operated by the Utility WiMax,
Fiber/Ethernet
provider
DB
NTP Appliance: acts as AAA,
DNS,
Stratum 1 timing source DHCPv6
Services
IPAM, DHCPv6 and DNS: IPv4/IPv6
address allocation and naming: scale up to
Directory
Cer�ficate
10M+ endpoints
Services
Authority
Active Directory(AD) & Certificate AAA Server: scalable, high-performance
Authority (CA): for user & device policy system for authentication, user
identity management along with CA for access, and administrator access; ECC
certificate management Supports support for meters
Cryptography: ECC keys for certificate-
based authentication Public or Private IPv4/IPv6
LAN
IP Infrastructure IPv4/IPv6 Load Balancer: fronts
the Cisco CG-NMS and MDMS
Firewall + IPS Appliance: system - allows scaling across
primary firewall for securing the millions of meters
head-end infrastructure; optional
Locally
connected
use of IPS module
Neighborhood DA
devices
(Ethernet
/
Serial*)
Secure
handheld
with
u�lity
Area Network
technician
RF Mesh
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Connected Grid Security Principles
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Access Control
Purpose: Ensure that only authorized personnel are accessing the network and valid devices are
part of the grid network
Tools: Role-Based Access Control with i) username and passwords ii) X.509 certificate based
identities; RADIUS and TACACS+ protocols for Authentication, Authorization and Accounting (AAA)
for users and devices; Network Admission Control (NAC)
§ Authenticating and authorizing field technicians or operations center staff before they can view or
configure devices, track changes made (RBAC)
§ Authenticating every device and application connected to the grid—routers, switches, servers,
workstations, IEDs, reclosers
§ Mutually authenticating meters, field area routers and head-end systems used for smart metering
—relying on strong certificate based identities
§ Posture-assessing laptops, workstations, servers to detect any viruses or worms before allowing
access to the network, forcing remediation such as installing software patches or updating anti-
virus database
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Secure
Device
Iden�ty
via
Digital
Cer�ficates
Control
Center,
SCADA
Security
Services
AMI
Head-‐End
Data
Center,
Enterprise
Directory
Services
Apps
SCADA
Intrusion
SIEM
Cer�ficate
Authority
Preven�on
HES
OMS
DMS
MDM
DB
Access
Control
NMS
NAN
Mobile
Serial + Ethernet (RF
or
PLC
Mesh)
Wired or Wireless
Workforce
Distribution Tier—L2
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Network
Admission
Control
Access Control
Posture
Assessment
and
Remedia�on
(Patch
Management,
AV
Version)
An�-‐Virus
and
An�-‐Malware
Protec�on
Control
Center,
SCADA
Security
Services
AMI
Head-‐End
Data
Center,
Enterprise
Directory
Services
Apps
SCADA
Iden�ty
SIEM
Cer�ficate
Authority
Services
Engine
HES
OMS
DMS
MDM
DB
Access
Control
NMS
Public
or
System Control Tier
Public
Private
or
WAN
Private
WAN
Distribution Tier—L1
NAN
NAN
Mobile
Serial + Ethernet (RF
oor
r
PPLC
(RF
LC
M
Mesh)
esh)
Wired or Wireless
Workforce
Distribution Tier—L2
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Data Confidentiality and Privacy
Purpose: Ensure data privacy and data integrity for customer data and data integrity and
confidentiality for technical data belonging to the utility
Tools: X.509 Certificate, IPSec with flexible VPN architectures, link-layer and application layer
encryption mechanisms, scalable crypto key management
§ Secure generation and storage of encryption keys on all devices—meters, routers, application
servers such as AMI Head End, NMS
§ Encrypting all data traversing using IPSec over public networks between substations and control
center or between substations
§ Link-layer (mesh) encryption of data from meters to the field area routers and network layer
encryption from FAR to AMI Head End (IPSec)
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Secure
Storage
for
Encryp�on
Keys
Control
Center,
SCADA
Security
Services
AMI
Head-‐End
Data
Center,
Enterprise
Directory
Services
Apps
SCADA
SIEM
Intrusion
Cer�ficate
Authority
Preven�on
HES
OMS
DMS
MDM
DB
Access
Control
NMS
Private WAN
Distribution Tier—L1
NAN
Serial + Ethernet (RF
or
PLC
Mesh)
Wired or Wireless
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Secure
Storage
for
Encryp�on
Keys
Secure
Encryp�on
Keys
Control
Center,
SCADA
Security
Services
AMI
Head-‐End
Data
Center,
Enterprise
Directory
Services
Apps
SCADA
SIEM
Intrusion
Cer�ficate
Authority
Preven�on
HES
OMS
DMS
MDM
DB
Access
Control
NMS
Distribution Tier—L1
NAN
Serial + Ethernet (RF
or
PLC
Mesh)
Wired or Wireless
Mobile
Workforce
Distribution Tier—L2
Smart Meters
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Threat Detection and Mitigation
Purpose: Protect critical assets against cyber attacks and insider threats
Tools: VRF and VLAN, access lists, Firewall and Intrusion Prevention (on routers and appliances),
device logs, SIEM
§ Logically segment and separate traffic—AMI vs. DA vs. mobile workforce
§ Deploy firewalls to protect critical assets and create a layered network based on stricter
restrictions with increasing security levels
§ Detect network intrusions through use of IPS at critical points in the network. (Optional) customize
with SCADA IPS signatures
§ Collect logs across devices, meters, application and correlate with IPS events to identify security
incidents with SIEM, take mitigation steps
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Network
Segmenta�on
of
Users
and
Devices
Control
Center,
SCADA
Security
Services
AMI
Head-‐End
Data
Center,
Enterprise
Directory
Services
Apps
SCADA
SIEM
Intrusion
Cer�ficate
Authority
Preven�on
HES
DMS
OMS
MDM
DB
Access
Control
NMS
Distribution Tier—L1
NAN
Mobile
Serial + Ethernet (RF
or
PLC
Mesh)
Wired or Wireless
Workforce
Distribution Tier—L2
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Time-‐Stamped
Logs
Across
Devices
Control
Center,
SCADA
Security
Services
AMI
Head-‐End
Data
Center,
Enterprise
Directory
Services
Apps
SCADA
SIEM
Intrusion
Cer�ficate
Authority
Preven�on
HES
DMS
OMS
MDM
DB
Access
Control
NMS
Distribution Tier—L1
NAN
Serial + Ethernet (RF
or
PLC
Mesh)
Wired or Wireless
Distribution Tier—L2
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Device and Platform Integrity
Purpose: Ensure that devices and meters are cannot be compromised easily and are resistant to
cyber attacks
§ Tamper-resistant design for meters and devices, trigger alerts on physical tampering, maintain
local audit trail for all sensitive events
§ Validate the authenticity and integrity of firmware upgraded on meters, routers and devices and
software patches on grid applications
§ Use of rate-limiting and other throttling mechanisms against DoS attacks
§ Secure code development lifecycle including strong practices around publishing security
vulnerabilities, releasing workarounds
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Digitally
Signed
Commands
From
Head-‐End
System
(HES)
to
Meters
Control
Center,
SCADA
Security
Services
AMI
Head-‐End
Data
Center,
Enterprise
Apps
SCADA
Directory
Services
Intrusion
SIEM
Distribution Tier—L1
Mobile
Workforce
NAN
(RF
or
PLC
Mesh)
Serial + Ethernet Wired or Wireless
Distribution Tier—L2
Smart Meters
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Alliance built on strength
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
BC Hydro Smart Meter Case Study
Agenda
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
The BC Hydro System
§ Power Generation
‒ 41 dam sites, 30 Hydro facilities,
9 thermal units
§ Transmission
‒ 18,000 KM of transmission lines
(about 11,250 miles)
‒ 260 substations, 22,000 steel towers
‒ One control center
‒ Interconnections to the US and Alberta
§ Distribution
‒ 56,000 KM of distribution lines
(about 35,000 miles)
‒ About 900K poles and 300K transformers
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Why the Need to Modernize?
Key Drivers
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Thomas Edison vs. Alexander Graham Bell
§ Would Graham Bell recognize what to do with an iPhone today?
§ Would Thomas Edison recognize the equipment used in a power grid?
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Why the Need to Modernize?
Reduction of Power Theft
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
“If there’s anything that will have a single dramatic
effect on public safety issues due to grow-ops in
the province of British Columbia, it will be the
installation of Smart Meters.”
Chief Len Garis
Surrey Fire Chief
Program Scope
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
BC Hydro
Customer Portal
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Program Scope
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
What Makes BC Hydro so Unique?
Comparison of World-Wide Smart Meter Deployments
38,000,000 50,000,000
10,800,000
4,600,000
450,000
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
Agenda
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
A Two Phase Deployment
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
Key Design Requirements
Basic SMI System Requirements
1. Scalability:
‒ Need to support 2 million IPv6 Smart Meters
2. Wireless Backhaul Flexibility:
‒ Field Area Routers will be mounted on pole tops
‒ Must support flexible wireless backhaul (3G, WiMax, and Satellite)
3. Throughput Requirements:
‒ Meter reads only generate a few Kb of data traffic
‒ Periodic polling and software upgrades will require higher data capabilities
‒ Support for multi-service (meters plus other Distribution Automation devices)
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
Key Design Requirements
Basic SMI System Requirements
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Key Design Requirements
Distribution / Feeder Automation Support
Feeder Meter
Smart Meters
Transformer Meter
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
The High Level
Architecture of Phase 1
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
The SMI Access Layer Design
O CGR has uplink options (3G,
WiMax, or Satellite).
O CGR has an IPSec encrypted GRE
tunnel to ASRs 1006 router in
Tunnel Aggregation layer
O ASR is not restricted to any
particular backhaul – any of these
are acceptable (any CGR can
access any ASR).
O Meters form a RPL WPAN Mesh
and register with the CGR.
Design target is 2,000 meters per
CGR mesh.
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
The SMI Tunnel Aggregation Layer Design
500 CGRs are homed to each ASR 1006
O Each ASR 1006 is a hub router for
500 Field Area Routers (hub and
spoke design).
O Notice that the CGRs are single-
homed back to an ASR 1006.
‒ The ASR 1006 is used because of
scalability for this solution, and it’s
inherent redundancy (dual RPs, ESP,
Power Supplies.
‒ The final design requires each CGR
to dual home with second a GRE/
IPSec tunnel to a remote DR site.
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
The SMI Distribution Layer Design
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
Agenda
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
Building the Network for Scalability and
Resiliency - Challenges
1. Network Resiliency:
‒ Need to support 2 million IPv6 endpoints and 1,700 access routers
‒ Network is required to support Distribution/Feeder Automation
on the Smart Grid
‒ Support for physical network redundancy
2. Choosing and Tweaking the Right Routing Protocols:
‒ Not all IGPs are suited to every network topology
‒ Must support the “flappy” nature of wireless backhaul networks
3. Engineering the network for fast convergence and stability
‒ Addressing network failure detection
‒ Choosing the right IGP timers
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
Physical Redundancy Necessitates an
Dynamic Routing Protocol § Future use of a DR site
ASR Tunnel required a dynamic routing
Aggregation Layer protocol to be used.
Routers
§ If no DR is used, then all
CGRs can utilize a default
static route through the
GRE/IPSec tunnels to the
SMI network.
§ Which protocol to choose?
§ OSPF?
§ EIGRP?
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
IPv6 Routing at the Access / Aggregation Layer
Each ASR 1K runs a separate OSPF process
OSPF Totally
Stubby Areas OSPF Totally
Stubby Areas
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Why OSPF?
§ Traditionally, OSPF is rarely used in hub and spoke environments:
‒ OSPF, like IS-IS, is a Link State IGP
‒ Uses the concept of Link State Advertisement (LSA) flooding to update
adjacent routers of a topology change.
‒ When an LSA is flooded, every router in the area receives a copy of the LSA,
and must recalculate it’s shortest path first (SPF) topology.
‒ This can be problematic in wireless backhaul networks that tend to flap and
lose a lot packets.
§ Other protocols are better suited to hub and spoke topologies, but also
have drawbacks:
‒ Protocols like EIGRP are not an open standard, and in this case was not an
option for BC Hydro.
‒ eBGP to each CGR would have worked, but is not supported in CGOS.
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
Some Questions about OSPF Needed to be
Answered . . .
§ How many spokes per hub could we support?
§ How many CGRs should be used per OSPF area?
§ Would OSPF be stable in a lossy, flapping wireless network?
§ How could we limit LSA flooding, and in turn SPF recalculations on
the ASRs, and the CGRs?
§ Scaling to these kinds of numbers has never been done before.
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
Testing Methodology
Testing conducted in Brussels TAC FAST Team Labs, February 2012
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
Testing Results – ASR Performance
Test Results Showing ASR Performance once OSPF is First Enabled
CPU
were learned in just over
1 minute
§ 1000 CGRs were
completely functional
with IPSec in about 180
seconds.
CPU
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
Testing Results – Simulating a Network Flap
Test Results Showing ASR Performance during a network flap
CPU
50%
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
Results Summary
§ ASR and CGR are powerful enough to support OSPF of handling this
hub and spoke topology in a wireless network.
§ Use 4 areas per ASR, 500 spokes per ASR
§ Tuning of OSPF LSA and SPF timers is required:
‒ Allows network to still converge while thousands of LSA are being flooded
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
Two Useful Features to Promote Stability
§ Interface Dampening (facing toward core)
‒ A flapping interface can be very bad for routing protocols (causes needless
LSA flapping)
‒ Interface Dampening allows IOS to assign an increasing “penalty” to an
interface as it continues to flap (similar to BGP dampening)
§ Carrier Delay
‒ Deafult is 2 seconds – this is a delay in letting the routing process know the
interface has gone down, reducing the convergence time.
interface GigabitEthernet a/b/c
dampening
description <description>
carrier-delay 0
negotiation auto
ip address <address> <mask>
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
Routing at the Distribution Layer
Static Routes:
ASA Firewalls O Default route northbound
O Summarized routes SMI southbound
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
Agenda
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Zero
Touch Deployment (ZTD) Components
1. ASR Router at head end: Network infrastructure to terminate CGR IPSec
tunnel and provide a routing path to Utility DC where application are hosted.
2. Backhaul network: access network used to transport IPSec traffic between
the CGR and the Head-end.
3. CG-NMS:
‒ Provision most of the CGR configuration once the CGR is connected to the network
‒ Manage the CGR once fully registered
4. Provisioning Server: acts as a proxy on-behalf of the CG-NMS during CGR
tunnel provisioning process. Allows CG-NMS to remain hidden in the DC.
5. DHCP Server: provide IP addresses to CG-NMS when building CGR
configuration
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Phase 1: Factory Config
§ Phase 1 Happens in Itron facility where all the CGR's arrive once
manufactured by Cisco
§ Minimum configuration is done so the CGR can trigger its registration
process once deployed in the field:
‒ WAN interface configuration
‒ Utility CA Truspoint (Trustpoint for BC Hydro’s CA Server)
‒ Copy / paste of BC Hydro’s Utility certificate
‒ NTP / Clock / Timezone configuration
‒ Call-home configuration so the CGR can contact the PS automatically
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Phase 2: Tunnel provisioning
1. Once deployed on the pole, CGR will activate its WAN interface.
2. Once it received an IP address from the backhaul SP it will
trigger the SCEP enrollment to get its LDevID certificate
3. After receiving its certificate (called LDevID), it will contact the
Provisioning Server via HTTPS to get its tunnel configuration.
4. PS will proxy the request to CG-NMS which will generate the
tunnel configuration.
5. The new configuration is pushed back to the CGR via the PS.
6. CG-NMS will also generate and pushe the tunnel configuration
for the ASR1k which will terminate the CGR IPSec tunnel.
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Zero Touch Deployment – Simple Certificate
Enrollment Process (SCEP)
Data Center 1
DMZ
Certificate Registration
Authority 4 Authority ASR
Headend
Router WAN
Backhaul
CGR1000
2 5
<meter-list>
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Phase 3: Final registration
1. CGR now is able to establish the IPSec tunnel with the ASR 1K
2. Once the tunnel UP, CGR contacts CG-NMS directly and will
register itself
3. CGR is fully registered and monitored by CG-NMS
4. Meters can now reach the Itron Collection Engine
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
SCEP Enrollment Process
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
Example of Tunnel Template Generated by CGNMS
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
Template-Driven Router Configuration
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
Agenda
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
Summary of Data Center Components
Application Type Element Purpose
Each Meter exists in LDAP as an entity, and
Directory Services LDAP
will need to authenticate to the network
Provides IPv6 address to all meters, and to
DHCP Infoblox
network tunnel endpoints (ASRs and CGRs)
Certificate Authority MS CA Issues certificates to the meters and CGRs
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
Network Management Solution Overview
Oracle DB Server
§ CG-NMS resides in the
data center, and is typically CG-NMS
fronted by a load balancer
Load Balancer
(ACE 4710 or module) NB-API
ASR
§ CG-NMS has a web and
application front end, and
uses an Oracle DB on the Net Admin
backend.
§ CG-NMS manages both the
Provisioning
CGRs and the meters Server
themselves CGR
CGR
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
CG-NMS Monitoring
Managing the CGRs via the GPS Location Function
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
Monitoring the Mesh Endpoints
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
Using CG-NMS for Firmware Upgrades
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
Summary
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 93
Complete Your Online
Session Evaluation
§ Give us your feedback and you
could win fabulous prizes.
Winners announced daily.
§ Receive 20 Passport points for each
session evaluation you complete.
§ Complete your session evaluation
online now (open a browser through
our wireless network to access our Don’t forget to activate your
portal) or visit one of the Internet Cisco Live Virtual account for access to
all session material, communities, and
stations throughout the Convention
on-demand and live activities throughout
Center. the year. Activate your account at the
Cisco booth in the World of Solutions or visit
www.ciscolive.com.
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
Presentation_ID © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public