Reduce congestion and energy use, and improve operational performance with a 21st century rail network.
Communications systems, security systems, electro-mechanical and BMS, information systems and business applications—it’s a web of rail network subsystems all required to keep railways moving forward and passengers safe.
Sorting out the benefits from the challenges
Rail operators face the very real challenge of rapidly changing technology. Trying to keep up to avoid obsolescence can break the budget. However, choosing a solution that is scalable and can easily adopt new devices into the evolving network is key.
At a recent visit to a metro rail network control room, the staff shared with me, the huge array of data that is now available to them. The Internet of Things (IoT) devices, and sensors, provide information on everything from speed, temperature and mechanical anomalies, to the number of rail cars waiting at a station. The sheer volume of data, applications and devices across all the subsystems was mind boggling, to say the least.
While subsystems connected within an IoT network provide a host of benefits including, reducing congestion and energy use, and improving operational performance, they also open up potential challenges. In a poorly designed network, a compromised IoT device can open up a gateway to the rest of the network, as well as to other subsystems. An interruption on a non-critical network, such as passenger Wi-Fi, may seem like an inconvenience when in fact it may be a cyber attack permeating the entire network. With systems today supporting 100,000’s of connected devices, the need for security has never been greater.
A well designed network, with built-in security measures, can reduce the risk of successful cyber attacks. A security strategy such as IoT enablement, separates and secures specific devices or a group of devices on a network. For example, each key subsystem, such as ticketing or video surveillance, is relegated to a different virtual network container so in the event that one subsystem is compromised, the whole network is not impacted. This approach is essential to maintaining security. A physical network with multiple virtual networks which means there are no back doors into the network. A network management system with a single dashboard can also help simplify operations while keeping the network safe and secure.
Latest Blogs

Six steps to student success with digital transformation
An end-to-end digital transformation strategy creates a path to deliver a truly student-centric learning experience in all aspects of campus life.

A campus community delivers student success
With the right approach, digital transformation can create a campus community that puts students at the centre of their education and empowers success.

Digital transformation paves a path to success in education
Education has changed forever. Digital transformation offers an avenue to achieve positive outcomes and when students succeed, schools succeed.

Data sovereignty starts with knowing the end-to-end solution
As the need for data sovereignty accelerates, solutions must ensure data is managed and stored according to regulations.