Friday, November 9, 2007

Moving To Condition-Based Maintenance (CBM)

The Evolution of Maintenance

One of the major tenants of Reliability Centered Maintenance (RCM) is that enterprises should apply maintenance strategies to assets depending on the asset’s importance to the enterprise’s mission and its inherent reliability. Maintenance strategies have evolved over time as organizations have sought to assure high asset reliability and availability with a reasonable maintenance investment. A major challenge for any maintenance organization is to apply the appropriate maintenance strategy to each individual asset so that the organization’s overall goals and objectives can be attained at minimal cost.

First -- “Run-to-failure”. The most basic maintenance strategy available is “run to failure” in which an asset is operated until it fails or breaks. Then it is repaired with reactive or corrective maintenance which may involve repair or replacement. This is still an appropriate maintenance strategy for many non-critical assets.

Second -- “Preventive”. However, some asset failures have expensive and far-reaching consequences. These failures can shut down entire production lines, make buildings unusable, or even cause injuries or fatalities. Organizations place an imperative on avoiding these types of failures. Thus, a different maintenance strategy evolved to accomplish the objective of avoiding asset failures – preventive maintenance. The idea of preventive maintenance is look at the failure history of an asset, and to conduct maintenance to “fix” it before there is a meaningful probability of its failing in the first place. In this manner, a preventive maintenance strategy prevents an asset from failing.

Because the preventive maintenance program for each asset is different and all preventive maintenance needs to be performed on an exact schedule to be effective, Computerized Maintenance Management Systems (CMMS) were developed to help manage this complexity. Preventive maintenance is a core activity of many maintenance organizations today, and it does keep assets operating reliability and performing well.

Preventive maintenance works because it delivers high asset availability and minimizes unscheduled downtime. For those assets critical to operations, preventive maintenance avoids the severe consequences that asset failure can cause.

Unfortunately, the benefits of preventive maintenance come at a price. By its very nature, preventive maintenance means that maintenance is being performed more often than is necessary. Since maintenance consumes both labor and parts, this strategy has a measureable cost of “over-maintenance.” Additionally, preventive maintenance often requires that assets be taken off-line during servicing, incurring a cost to the organization for this downtime and lost capacity. Finally, more frequent maintenance involves more frequent intrusions into the equipment, which itself increases the chance of asset or system failures.

Finally, “Condition-based Maintenance”. Because preventive maintenance is expensive, and because enterprises are increasingly pressured to reduce their costs, organizations are developing a new type of maintenance strategy. Under this strategy, the condition of the asset is monitored regularly until it begins to give evidence of deteriorating performance or incipient failure. Maintenance is then performed “just-in-time” to prevent asset failure.
The promise of this new strategy – predictive maintenance or condition-based maintenance – is that the overall costs of maintenance can be reduced while providing the high asset availability and performance that preventive maintenance delivers. The current wave of innovation in asset maintenance today is developing predictive or condition-based maintenance strategies.


Condition-Based Maintenance Is Growing

Condition-based or predictive maintenance can help lower maintenance costs even compared to a sophisticated preventive maintenance approach. Condition-based maintenance uses real-time information on asset conditions to identify when maintenance is necessary, allowing maintenance to be deferred until needed. Savings comes not just from consuming less labor and parts in maintenance, but also from incurring less downtime and creating less frequent infant mortality.

There is an important but poorly defined difference between predictive maintenance and condition-based maintenance. Predictive maintenance is generally triggered by analysis of equipment condition data that is gathered periodically and manually. Most equipment vibration analysis and lubrication analysis, for example, is conducted on a scheduled basis to identify deteriorating conditions that require maintenance. This contrasts with condition-based maintenance in which equipment condition data is collected continuously and analyzed in real-time. Condition-based maintenance is still a relatively new approach, but is used more frequently on critical equipment in process industries such as refineries and power plants.

There are a number of factors that have limited the adoption of condition-based maintenance besides the fact that it is a relatively new strategy. Most of the equipment that could be subject to condition-based maintenance is not currently instrumented. Data on equipment condition cannot be collected without installing sensors on the equipment along with a means of collecting the sensor data. Even when equipment is properly instrumented to track operating parameters that could identify incipient failure, the sensors are not connected into a data collection network that allows real-time monitoring. These instruments or sensors usually provide local displays or store readings in data loggers, and data is collected from them by technicians that visit the equipment periodically. Such manual data collection is expensive, subject to error, and not always timely.

Even when equipment is instrumented and connected to a central monitoring point, this is often not sufficient for adopting condition-based maintenance. Usually equipment is monitored in this manner as part of a production, process or building control system. These automation systems track equipment and process parameters that are needed to monitor and control the equipment. These parameters are usually not the ones that monitor potential equipment failure modes and that identify a need for maintenance. For a pump driven by an electric motor, for instance, an automation system will usually track flow rates, upstream and downstream pressures, and motor RPMs. Condition-based maintenance would instead require monitoring bearing temperatures, vibration signatures, and motor current draw. Most automation systems do not track the necessary parameters for implementing condition-based maintenance.


Enabling Condition-Based Maintenance

The prospects for condition-based maintenance are improving rapidly, however. Condition-based maintenance is being enabled by several advances, but especially by advances in networking technology. Many business processes and employees have become much more productive and efficient over the last decade as they have become connected to information resources and each other by the spread of the Internet and related networking technologies. While people have become connected, machines and other assets have not yet been brought into networks.

But that is changing as the pervasive Internet is branching out to connect a wide range of equipment and devices. Because the cost of retrofitting wire to connect these devices is prohibitively expensive, wireless technologies are the growing method for making these connections. In particular, wireless sensor networks are a new technology that is connecting machines and other devices in a broad range of applications. This phenomenon is becoming a significant enabler of condition-based maintenance.


Wireless sensor networking is a relatively new technology that is designed to connect machines through the Internet the same way that WiFi has been broadly adopted to connect laptops and other computing devices. Aleier’s sister company, Cirronet, makes a wide range of wireless sensor networking equipment that differs in communication range, sensor connections, battery life and prices to address the requirements of many applications. This capability is becoming more broadly available as Cirronet and the other companies that provide wireless sensor networking solutions continue to refine and reduce the costs of their products.


Implementing Condition-Based Maintenance


Computerized Maintenance Management Systems, or CMMS’s, are the well-established application tool that has been used to plan and manage the maintenance function in organizations of all sizes. Over the past decade, Enterprise Asset Management (EAM) systems have been built on this maintenance foundation to help organizations manage all of the operational activities of managing assets over their complete life cycle, from their design, procurement and commissioning all the way through their retirement and disposal.


Enterprise Asset Management applications deliver a number of benefits to an organization when they are fully utilized. Of course, they help lower maintenance costs by making maintenance personnel and the parts inventory more productive. But they also help enterprises to improve the availability and performance of those assets, and to better achieve the primary mission those assets are intended to perform.


An Enterprise Asset Management application also helps reduce the need for asset investment in the long run. One of the ways that an EAM helps minimize long-term asset investment and improve maintenance productivity is by enabling enterprises to implement the correct maintenance strategy for each asset. The EAM system assists organizations in deciding which assets deserve the investment in condition-based maintenance; require the attention of preventive maintenance, and those that should be operated as “run to failure.” The EAM then implements and manages the appropriate strategy for each asset, including condition-based maintenance.


The Aleier FM1j Enterprise Asset Management application includes condition-based maintenance capabilities. FM1j collects and stores equipment condition data, regardless of how that data is captured. The system then analyzes the data as it is received, using an appropriate predictive algorithm or rule, to identify when the equipment requires maintenance. Finally FM1j creates an appropriate response, which usually means creating a workorder to perform the desired maintenance activity on the equipment.


A rule, or a set of rules, defines the triggers that determine a need for condition-based maintenance. Rules can be simple or complex, depending on the failure modes of the equipment. They can include exceeding a threshold value, exceeding that threshold for an extended time, exhibiting an excessive rate of change in a reading, reaching an excessive difference between the readings of two sensors, and so on. FM1j also allows a range of responses to be pre-defined, including sending alerts or automatically turning off equipment in addition to generating a traditional maintenance workorder. Aleier’s EAM has a rich set of capabilities to help organizations implement condition-based maintenance strategies across a broad spectrum of equipment.


The Future of Asset Management

Enterprises now have more options to assure the availability and continued performance of their assets while minimizing the costs to keep them in service. These organizations can choose the appropriate maintenance strategy for each asset, depending on how critical it is to operations, how frequently it fails, and its ability to be automatically and continuously monitored. New technologies are enabling enterprises to improve the management of their assets, including the ability to employ condition-based maintenance on more of their equipment. New technologies are a primary enabler of condition-based maintenance, which is the latest major innovation in the area of asset management.

Thursday, May 10, 2007

M2M Magazine 20 Questions on Sensor Networking

For a special supplement in the summer of 2007, M2M Magazine posed to suppliers the most commonly asked questions about sensor networking. Below are their 20 questions about selecting and deploying sensor-network technology, together with my responses.

You can download the M2M Magazine, with their official summarized answers to the 20 questions, at www.specialtypub.com/m2m/sensors/ (after registering).

-----

PART 1: BUSINESS QUESTIONS

1. Bottomline
Are sensor networks beyond their experimental phase and does the technology really work?
Wireless sensor networks do accomplish their goal of providing low cost telemetry data connections in situations where several points within an area need to be connected. They work. But they are wireless technologies, and like cellular phones and wireless LANs, they do not provide connectivity anywhere and everywhere all the time. Just as people have learned how to deal with the nuances of wireless propagation with cellular and LANs, so they will learn how to work with the coverage capabilities of wireless sensor networks.

2. Cost
What determines the total cost of a typical sensor-network deployment?
Actually, with wireless sensor networking, the costs of the radios and modules have gotten so low that the wireless technology is no longer the major cost driver in practical deployments. The other major costs in deployment are of the sensors and sensor technology, the packaging and connectors, and the labor costs of deployment and installation. When retrofitting installations in existing environments, the overall wireless solution cost is still substantially lower than the cost of retrofitting wiring in most applications.

3. Time
What usually determines the amount of time required to deploy a sensor network?
Deploying, commissioning and tuning a wireless sensor network does take a greater level of effort and a higher level of expertise today than is desirable. Some of this effort is in the planning and preparation phase, in choosing the appropriate wireless networking technology and the appropriate topology for the application, which differ widely in the density of desired connection points and the RF propagation environment. Even with planning, most wireless sensor network applications require some tuning activity after initial deployment, to adjust routing logic, router placement, etc., to get the network to perform its best.

4. Scalability
How much does the cost and complexity of a sensor network increase with the number of nodes?
The systems solutions to very large wireless sensor network deployments are still evolving. It appears that using a single uniform mesh networking topology for very large deployments may be impractical for most applications. But there are many other system solutions for these situations, including segmenting the coverage area into multiple independent networks, using different tiers of wireless sensor networking technology for end node and routing connections, and using different technologies altogether, like 802.11, for backbone configurations. RFM/Cirronet has employed all of these approaches in large network deployments, depending on the application’s requirements.

5. Management
What is required to manage a sensor network on a daily basis?
A properly designed and deployed wireless sensor network does not need to be “managed” on a daily basis. It does need to be monitored, however. It should monitor itself and only report the exception conditions that indicate problems.

6. Troubleshooting
Who is typically responsible for fixing problems with a sensor network after deployment?
Once a network is deployed and configured, there are two major types of problems that need to be fixed with wireless sensor networks. One type is relatively simple operational problems, like broken nodes, low batteries or loss of power, etc. These can be repaired by a local technician with a modest amount of training. The other type of problem is more complicated – fundamental changes in the RF environment (e.g., interference, obstructions) and changes in the application influencing network traffic load (e.g., more frequent problems to report, increased monitoring of some nodes). These problems require more experienced and sophisticated analysis to identify and resolve, and today this usually requires the supplier’s field application engineer to be involved.

7. Interface
How is sensor data usually presented to the end user?
Wireless sensor networks are usually agnostic about how the data is presented once it moves off the network. Typically today, the data either goes into a specialized application, or it is incorporated into an existing enterprise application such as an industrial automation system or an asset management system. Exiting applications already have an approach for presenting data from a wide variety of sources, including from sensor networks. Over time, the trend is to present less “data” to end users, but rather to turn that data into information, which is instead presented to end users. Existing enterprise applications perform this function and will increasingly be the destination for data from wireless sensor networks.

8. Integration
How can companies integrate sensor data with other business systems?
In general, wireless sensor networks provide data in binary formats identified by device level network addresses and with a limited amount of pre-processing or conditioning. Only industrial automation systems can accept data in this way and make sense of it. Most business systems require data to be provided in pre-processed formats with virtual identifiers to link to existing databases. At present there is significant architectural competition over where sensor data should be converted to make it usable to most business systems – by the sensor network itself, by the business systems themselves, or in independent gateway devices. Wherever this conversion is going to occur, it will need to be built since it does not currently exist in any of these alternative locations.

9. Duration
How should adopters approach a temporary installation compared to a permanent one?
In general, there is not much difference in what is required to get a temporary installation to work compared to a permanent one. A temporary installation may have less demanding packaging requirements, or not require the capability for battery replacement in the field.

10. ROI
What are the best ways to measure return-on-investment for a sensor network?
The return on investment for a wireless sensor network is driven by the value of the information that it enables to be connected. Consequently, the return on investment is driven by the overall benefits of the application. The information either helps improve overall business productivity, improves the quality of business operations in a meaningful way, or reduces operating costs, or some combination of these benefits. These benefits have to significantly exceed the cost of developing and deploying the application, of which the wireless sensor networking technology is just a component.

-----

PART 2: TECHNOLOGY QUESTIONS

1. Resources
What level of technical skill is required to set up and maintain a sensor network?
Today, setting up a wireless sensor network requires a high degree of expertise, relative to what generally exists in most user IT or operations departments. Over time, suppliers will automate the network setup process more, and will provide better tools to perform the functions that cannot be automated. And over time, end users will become more familiar with the technology and more experienced in deploying it. This is exactly what happened over time with Ethernet and with wireless LANs, and history will repeat itself with wireless sensor networks.

2. Setup
How is a sensor network installed and activated?
Installing a wireless sensor network is somewhat of an art, and somewhat of a trial and error process because radio propagation is indeterminate inside the structures where most of these networks are deployed. Some basic steps for installing a sensor network are:
1. Identify the locations where the end nodes need to be deployed to attach to the remote sensors or equipment. Doing this on a floor plan is essential.
2. Identify the probable locations where routing nodes need to be deployed, if the end nodes do not route or if the density and topology of the end nodes are not sufficient to establish a mesh.
3. Select a location for the base station or master node, which will usually need to be at a location that can be attached to a computer or communications network.
4. Install, activate and bind nodes to the network, one by one. Start with the nodes closest to the base station, and assure they have communication with the base station. Then install, activate and bind the next furthest nodes away from the base station, and assure that they have communication with previously installed nodes (preferably more than one). Continue installing outward from the base station until all nodes are operating and actively communicating within the network.
5. Tune the network. Make sure every node has multiple potential paths of communication, and install additional routers if necessary. If high node density is causing congestion and latency, turn off routing capabilities in some of the nodes in the congestion area.


3. Logistics
What are the range limits and physical limitations of a sensor network?
A wireless sensor network is fundamentally a radio network, and its operation is subject to the same laws of physics that govern all radio communications. As such, the maximum range between a transmitter and receiver is the power of the transmitter and the sensitivity of the receiver. For wireless sensor networks, transmitter power is ultimately limited by the regulations for unlicensed radios. More practically, transmitter power tends to be limited by cost concerns (more powerful transmitters cost more) and battery life concerns. Receiver sensitivity is fundamentally a function of the radio design, but there is limited variation in this factor among single chip, integrated circuit radios that are used in sensor networks.

Limitations on the range between nodes in wireless sensor networks are also caused by signal obstructions, interfering emitters and self-interference (i.e., multipath interference) in the environment around the transmitter and receiver. Typically, the maximum range between nodes within a structure will be 1/3 to ¼ of the normal free space, line-of-sight range between nodes.


4. Power
What should an adopter understand about power requirements and battery life?
Battery life trades off against some important system design parameters. Using a node for routing, so that it’s receiver must be active continuously or most of the time, will significantly degrade battery life. Establishing a network topology with long distances between nodes, so that higher powered radios are required, will degrade battery life. Using a transmitter to send messages frequently, and to send them at high data rates, will also tend to degrade battery life. The maximum battery life is achieved when the node “sleeps” most of the time, does not route messages for other nodes, and only transmits data infrequently (preferably alerts, alarms or exception messages).

5. Security
How can an adopter make sure its sensor-network data is secure?
Data security within a wireless sensor network is achieved by investing in additional node cost and complexity to add encryption. Faced with this trade-off, most users quickly realize that encrypting a temperature reading that is sent once every 15 minutes is not worth the investment and management complexity required. Very few of the individual sensor data points considered for wireless communication are that valuable or sensitive in themselves. Users with such sensitive data will usually choose wired connections, as they have in the past.

6. Reliability
What steps should an adopter take to ensure reliability of the network?
Wireless sensor networks are inherently more reliable, if deployed correctly so that a mesh topology is achieved among the nodes. Most real-world applications do not require a high density of end nodes mounted at monitored devices, relative to the useful communications range of the nodes, so higher reliability is usually achieved by installing a higher density of routing nodes.

7. Infrastructure
How can a company leverage its existing network infrastructure when deploying a sensor network?
Wireless sensor networks should only provide the last hundred feet of connection to sensors or instrumented devices. These networks should always be designed to connect to the organization’s existing network infrastructure as directly as possible, whether that network is a wireless LAN, a wired Ethernet, or a wired fieldbus network. These networks will usually already provide a connection to the target application for the data.

8. Hardware
What criteria should adopters use for selecting a hardware platform?
A wireless sensor network is a system consisting of radio platform (hardware) and the networking logic and protocol that controls the radio (hardware). Adopters can only select systems, not hardware platforms or software protocols independently.

Having said that, the most important consideration that an adopter should use to select a wireless sensor network system is to meet the needs of the application. Applications differ greatly on several important dimensions – amount and frequency of data to be communicated, number of end nodes in the network, average and maximum range between nodes, use of mains or battery power, static or changeable/mobile nodes, and RF environment (e.g., obstructions, interference). And wireless sensor network platforms also differ widely in their capabilities and performance. The adopter must identify the wireless sensor networks that can adequately serve the needs of the application. Alternatives are irrelevant is they don’t work.

The next most important consideration is the cost of the system solution. This includes not just the cost of the platform itself, but the cost of installation, integration with the rest of the application, impact on sensor cost, and similar system considerations. Another important criterion should be the support of the platform provider, because most first time adopters will be heavily reliant on that support.


9. Intelligence
When should a sensor network have distributed processing capability?
All networks, not just wireless sensor networks, should have distributed processing capability. Always. The overall trend in communications is for intelligence to be driven to the edge of the network, usually to improve the robustness of the overall application and to make more efficient use of shared communications bandwidth. As the costs of distributed processing resources (i.e., processing, memory) continue to plummet, this trend will also extend to wireless sensor networks to achieve the same architectural benefits.

10 (a). Standards
What should adopters understand about the standards associated with sensor networking?
Adopters should understand that there are still not any really effective standards for wireless sensor networks for most applications (see 10(c) below).

10 (b). More Standards
Which proprietary protocols should adopters avoid?
The best wireless sensor networking protocol for an adopter should be the one that best fits the requirements of the adopter’s application, whether it is a “standard” or proprietary. None of the “standard” protocols in this field, real or imagined, can best serve all potential uses of wireless sensor networking. Adopters should avoid wireless sensor network protocols that do not fulfill their application’s requirements. When trying to solve any specific connectivity application, standard protocols are not inherently good and proprietary protocols are not inherently bad. Their value is entirely dependent on their ability to solve any specific set of application needs.

10 (c). More Standards
What standards should be added to or removed from this list?

- 6lowpan - This “standard” is currently in the “imagining” stage and is not available in a commercial product.
- HART - The Wireless HART version of this “standard” is currently in the “imagining” stage and is not available in a commercial product.
- IEEE 802.15.4 – This is a standard – of a point-to-point radio platform. This standard does not provide mesh networking, and therefore does not qualify as a wireless sensor network.
- SP-100 - This “standard” is currently in the “imagining” stage and is not available in a commercial product.
- TinyOS – This is not a standard, but an open source reference platform that several suppliers have started with and adapted to create a proprietary wireless sensor network. No two suppliers’ TinyOS implementations can interoperate.
- Wibree – I have never heard of this “standard,” and I am active in the industry. I suspect it is still in the imagination stage.
- ZigBee - This is a real standard and is currently available in commercial products. But this standard does not provide the vendor interoperability and vendor substitutability that users expect from a standard. It requires network profiles and application profiles, which are very application specific and are still largely undefined in the standard. For most applications, users are resorting to proprietary profiles, and therefore their ZigBee implementations have all the characteristics of a proprietary protocol.
- Z-Wave – This is the proprietary wireless sensor networking protocol of Zensys, and it has been designed to function very well in home automation applications. A large number of device manufacturers buy this technology from Zensys, so it appears to the casual observer as if it is broadly adopted. But it is no more a standard than the Windows operating system is a standard.