Industrial Networks & Fieldbus in SCADA Systems Projects
How industrial networks & fieldbus are selected, sized, and integrated in scada systems projects.
Industrial Networks & Fieldbus in SCADA Systems Projects
Industrial networks and fieldbus systems are the communications backbone of modern SCADA projects. They connect PLCs, remote I/O, drives, analyzers, protection devices, gateways, historians, and operator interfaces into a deterministic, diagnosable, and secure control architecture. In practice, selecting this component category is not only a protocol choice; it is a project decision that affects panel layout, cable engineering, latency, redundancy, cybersecurity, FAT/SAT scope, and long-term maintainability.
How the network layer is selected
The first step is to define the control architecture and traffic profile. A small pump station with a few remote I/O drops may be well served by Modbus TCP or PROFINET RT, while a high-availability process plant with drives, safety, and time-critical interlocks may require EtherNet/IP with CIP Sync, PROFINET with MRP, or a segmented TCP/IP architecture using managed switches and VLANs. For legacy brownfield integration, Modbus RTU, Profibus DP, or CAN-based gateways often remain necessary.
The selection is driven by:
- Determinism and update rate: cyclic I/O scan times, motion or drive synchronization, and alarm latency.
- Topology: star, ring, line, or hybrid; required redundancy and mean time to repair.
- Interoperability: PLC, SCADA, and third-party device support, including OPC UA gateways.
- Environmental constraints: EMC, temperature, vibration, and cabinet space.
- Cybersecurity: segmentation, authentication, logging, and remote access controls per IEC 62443 principles.
For European projects, the design should align with the Machinery Directive / Machinery Regulation transition context, the Low Voltage and EMC directives, and IEC 60204-1 for machine electrical equipment. Network components are not selected in isolation; they must fit the overall safety and control system architecture, including the Functional Safety lifecycle when safety PLCs or safety networks are used.
Sizing the network for performance and resilience
Unlike power circuits, network sizing is about bandwidth, packet load, and fault tolerance. A common engineering check is to estimate total cyclic traffic and keep utilization comfortably below saturation. For a single segment, a simplified load estimate is:
$$U = \frac{\sum (S_i \times f_i)}{B} \times 100\%$$
where $S_i$ is the average frame size in bits, $f_i$ is the frame frequency in frames per second, and $B$ is link bandwidth in bits per second. In industrial practice, engineers usually target far less than theoretical capacity to preserve margin for diagnostics, bursts, and broadcast traffic.
As a rule of thumb, design Ethernet control networks with headroom for:
- 20–30% spare bandwidth for growth and commissioning overhead;
- managed switch uplinks sized for aggregate traffic, not just nominal device rates;
- redundant paths where uptime requirements justify the cost;
- separate OT and IT zones where data historians, MES, and remote access are involved.
For ring redundancy, technologies such as MRP in PROFINET, DLR in EtherNet/IP, or vendor-specific fast-recovery schemes can improve availability. However, ring design must be verified against the required recovery time and the behavior of all nodes, especially legacy gateways and unmanaged devices.
Integration inside panels and plant architecture
Industrial networks must be integrated at the cabinet level with attention to EMC, segregation, grounding, and maintainability. IEC 60204-1 and IEC 61439 principles guide the arrangement of control equipment, while IEC 61000 series considerations influence cable routing and shielding. Ethernet and fieldbus cables should be separated from power conductors, VFD output cables, and contactor wiring to reduce noise coupling.
Typical integration elements include:
- Managed industrial switches from families such as Siemens Scalance, Phoenix Contact FL SWITCH, Hirschmann BOBCAT/RS, Cisco IE, Rockwell Stratix, or Moxa.
- Protocol gateways for Modbus RTU/TCP, Profibus, CANopen, EtherCAT, and serial devices.
- Optical media converters or fiber switches for long distances and EMI-prone routes.
- Industrial firewalls and remote access appliances for segmentation and secure support paths.
Panel builders should ensure proper shield termination, correct RJ45/M12 connector selection, and clear labeling of network ports and VLANs. If the project includes safety-related communications, confirm that the chosen network supports the required safety protocol and that the safety function is validated according to IEC 61508 or IEC 62061, as applicable.
Comparison table for common network choices
| Technology | Typical use | Strengths | Watch-outs |
|---|---|---|---|
| PROFINET | PLC, remote I/O, drives | Strong Siemens ecosystem, diagnostics, MRP redundancy | Requires disciplined switch configuration and device compatibility |
| EtherNet/IP | Discrete and process control, Rockwell-centric plants | Broad vendor base, CIP integration, DLR options | Traffic planning needed for busy networks |
| Modbus TCP | Simple SCADA integration, meters, utilities | Easy commissioning, widely supported | Limited native diagnostics and determinism |
| Profibus DP / Modbus RTU | Brownfield and legacy field devices | Robust for existing plants, long installed base | Lower bandwidth; gateway dependence |
Testing and commissioning requirements
Network testing in SCADA projects should not be limited to “ping checks.” The FAT and SAT should verify addressing, naming, redundancy behavior, time synchronization, alarm propagation, and recovery after power loss. Where applicable, test the system with real traffic loads and failure scenarios such as switch reboot, cable break, and device replacement.
Relevant standards and practices include IEC 62443 for OT security requirements, especially segmentation and access control concepts, and ISA-95 for enterprise-control integration boundaries. If the project includes safety functions or machinery control, ensure the network does not compromise the validation of the safety-related control system. For utility or critical infrastructure projects, additional cybersecurity obligations may arise under NIS2-driven governance and incident handling processes.
A practical test list should include:
- IP plan, subnetting, and device naming verification.
- Protocol conformance and correct data mapping in the SCADA tag database.
- Redundancy switchover timing and alarm continuity.
- EMC resilience checks in the installed cabinet and field routes.
- Backup/restore of switch configurations, PLC programs, and firewall rules.
- User access, logging, and remote support validation.
Procurement and vendor-family considerations
Procurement teams should specify not only protocol support but also lifecycle support, firmware governance, spare parts availability, and regional service coverage. Vendor families commonly encountered in SCADA projects include Siemens, Rockwell Automation, Schneider Electric, Phoenix Contact, Hirschmann, Moxa, Cisco Industrial Ethernet, and Weidmüller. Selection should be based on standards compliance, support for industrial diagnostics, and compatibility with the project’s preferred PLC and SCADA stack.
In the specification, define the required managed switch features, supported redundancy protocol, port count, fiber/copper mix, environmental rating, and cybersecurity baseline. This reduces variation during bidding and helps ensure that the network layer is engineered as part of the complete control system, not treated as an afterthought.
For SCADA projects, the best industrial network is the one that is simple to maintain, resilient to faults, secure by design, and fully testable from FAT through site acceptance. If you are planning a new plant network or modernizing a brownfield OT backbone, discuss the project with us via /contact.
Other components for SCADA Systems
Other services using Industrial Networks & Fieldbus
Frequently asked questions
What industrial network architecture is best for a SCADA project that includes remote I/O, PLCs, drives, and operator stations across multiple panels?
For most SCADA projects, a segmented Ethernet-based architecture with managed switches, industrial VLANs, and ring redundancy is preferred because it supports deterministic traffic separation and easier maintenance. In European projects, the design should align with IEC 62443 for network segmentation and security zones, and IEC 61784-3 where functional safety over industrial communication is required.
When should Profibus DP still be used in new SCADA installations instead of switching everything to Industrial Ethernet?
Profibus DP is still used when a project must integrate legacy PLCs, remote I/O, or drives that already have a proven Profibus base and the lifecycle cost of replacement is not justified. The physical layer and installation practices should follow IEC 61158 and IEC 61784, while new greenfield designs often favor PROFINET or EtherNet/IP for easier integration and diagnostics.
How do you decide between PROFINET, Modbus TCP, and EtherNet/IP for a multinational SCADA project?
The choice usually depends on installed base, vendor ecosystem, and required diagnostics rather than raw bandwidth, since all three can support SCADA data exchange effectively. For European compliance-focused projects, PROFINET is often preferred in Siemens-heavy environments, Modbus TCP is common for simple interoperability, and EtherNet/IP is widely used in Rockwell-centric plants; all should be implemented with IEC 61158/61784 communication profiles and documented network addressing.
What are the key cable and shielding rules for fieldbus and industrial Ethernet in electrical panels and site installations?
Use the cable type specified by the protocol vendor and keep data cables separated from power conductors to minimize EMI and crosstalk, especially in VFD-rich panels. Shield termination, grounding, and segregation should be designed in line with IEC 60204-1 and IEC 60364, with panel wiring practices also reflecting EN 60204-1 for machinery installations.
How should a SCADA system handle redundancy for industrial networks in critical process or utility applications?
Critical SCADA networks typically use redundant switches, dual power supplies, ring protocols, or dual-homed controllers to avoid single points of failure. The redundancy strategy should be validated against the process availability target and documented under IEC 62443-2-1 for operational requirements, while safety-related communication must remain separate and compliant with IEC 61508 or IEC 61784-3 where applicable.
What is the correct way to integrate fieldbus devices from different vendors into one SCADA project without creating support problems?
Use open protocol gateways or native protocol support only where the device function is well defined, and standardize the integration layer with a clear tag naming, alarm mapping, and diagnostics strategy. Interoperability should be checked against the relevant IEC 61158/61784 protocol profile, and acceptance testing should verify device behavior, timeout handling, and fail-safe states before FAT and SAT.
What cybersecurity measures are expected for industrial networks in modern SCADA projects?
At minimum, implement network segmentation, role-based access control, secure remote access, and logging for all engineering and operator interfaces. For global projects with European compliance focus, IEC 62443 is the primary reference for zones and conduits, and many owners also align with ISA/IEC 62443 requirements for patch management, account control, and security levels.
How should FAT and SAT be structured for industrial network and fieldbus scope in a SCADA project?
FAT should verify topology, addressing, redundancy switchover, protocol diagnostics, and alarm behavior using simulated field devices or protocol analyzers, while SAT should confirm real cable routing, grounding, device comms, and recovery after power loss. The test plan should reference project specifications and applicable standards such as IEC 61158, IEC 61784, and IEC 62443, with evidence retained for commissioning and handover.