Oilfield Review Summer 2002 - Networking with the
Transcription
Oilfield Review Summer 2002 - Networking with the
Networking with the World The infrastructure of wires, cables, antennae, satellites and system software makes possible the rapid communication necessary in today’s business environment. Whether the information is real-time data from a production well or a processed seismic section being discussed simultaneously on two continents, secure networking is essential. Jeff Groner Conoco Inc. Houston, Texas, USA Larry Gutman Michael Halper Franklin Maness Lee Robertson Jim Sullivan Dana Graesser Williams Houston, Texas Trevor Harvey Catherine Robertson BP Aberdeen, Scotland Ian McPherson Aberdeen, Scotland For help in preparation of this article, thanks to Jeffrey T. Buxton, Cara Cejka, Samuel Edwards, Thien B. Nguyen, Natasha Noble, Lee Russell and Robert Sanchez, Silvio Savino, Houston, Texas, USA; and Mark Sambrook, Aberdeen, Scotland. DeXa, DeXa.Badge, DeXa.Net, DeXa.Port, DeXa.Touch, iCenter, myDeXa and SpaceTrack 4000 are marks of Schlumberger. Adobe and Acrobat are registered trademarks of Adobe Systems Incorporated. Microsoft and Windows are registered trademarks of Microsoft Corporation. UNIX is a registered trademark of The Open Group in the United States and other countries. 18 Asset management today requires rapid responses to changing conditions. Enormous quantities of data are captured, transmitted, analyzed and stored, often with each of these activities occurring in a different location around the world. An extensive and sophisticated infrastructure is necessary to transmit these bits and bytes from place to place and to protect information flow from inadvertent or malicious interception. Using satellites, companies can transmit communications and data from virtually anywhere in the world. Secure, private broadband networks can deliver the data in real time, while security tools ensure that the data can be seen and accessed only by those with proper authorization. Most geoscientists, engineers, procurement specialists and planners expect to have information at their fingertips, without worrying about the logistics of having those data provided to them whenever and wherever they need it. An information technology (IT) infrastructure must exist to enable and secure these activities. The Schlumberger DeXa Suite of Services supplies IT solutions that help exploration and production (E&P) companies focus on their core business of finding and extracting hydrocarbons. This article discusses the current state of IT infrastructure technology in the E&P business. A specialized community of interest, the Oil Partnering Network, is part of a service that provides connections worldwide through satellite and fiber-optic links. We discuss network security provided by Schlumberger, including smart cards. A complete IT outsourcing solution designed for Conoco exemplifies these services. Connecting the Reservoir to the World Multiple-site connectivity on a global basis— within a company, with customers and with suppliers—is paramount to linking the right information with the right people, at the right place and at the right time. Extended communications via satellite, wireless and secure, private broadband networks allow access to all pertinent data and information. Such communications are critical for allowing real-time decision-making. This capability means that experts can have the same impact at any remote site as they would have at their home offices, or can do work as efficiently in the home office as they would on a rig. Oilfield Review Summer 2002 400 100 1993 2001 75 300 50 200 25 100 0 Measurement Wireline (per and logging while triple-combo) drilling (per well) Near-well monitoring (per day) Marine seismic (per vessel per day) Gigabytes of data 1985 Megabytes of data With the decreasing size of the industry workforce, connecting to the best expertise becomes increasingly critical. With end-to-end secure connectivity all the way to the data source, the capabilities of both internal and external partners can be fully leveraged in a collaborative but secure electronic environment. The quantity of data in typical E&P activities has grown dramatically within the past two decades (right). A significant infrastructure is needed to transmit, store and manage this information and ensure that it contributes to an operator’s bottom line profit statement. The DeXa.Net Secure Network Connectivity Services solution delivers secure, integrated global connectivity from all users to the data, employing satellite telemetry or fiber-optic links. Satellite communications extend global networks to bring real-time communication capabilities to rigs and other remote locations. Tying this all together requires a network of global scale. Schlumberger has deployed and managed a substantial private global network for nearly two decades in support of its own field operations. That network is now available as a 0 > Rapid growth in industry data. Improved tools, increased data storage on those tools and higher telemetry rates generated an immense increase in the amount of data captured during the period from 1985 to 2001. With the typical tools used in each year, the amount of data acquired while completing the same tasks—measurement and logging while drilling, wireline logging and marine seismic acquisition—increased dramatically. Permanent well monitoring was not available in 1985, but the amount of data available now can reach 100 megabytes each day for a highly instrumented wellbore. 19 secure private network for clients (below). It provides global coverage with bandwidth on demand, which delivers network capacity when and where it is needed. Private channeling and security assure that client data remain confidential. Several service options are available to ensure that the most important data are prioritized for transmission through the network. This type of ubiquitous network connectivity, combined with secure connectivity centers and virtual private networks, enables real-time data collection, real-time analysis and, ultimately, real-time decision-making. Two types of communications contribute to the integrated network. Satellites link remote sites such as rigs, platforms or vessels to centralized earth stations, > Global computing network. The DeXa.Net system links high-speed, high-bandwidth land lines (blue) with global satellite communications. The earth stations (antennae) provide communications almost anywhere in the world. Smaller teleport stations in Algeria and Norway are not shown here. > Marine satellite communications. Rugged design and satellite tracking capability make the DeXa.Net SpaceTrack 4000 very small aperture antenna ideal for any kind of marine vessel. 20 known as teleports; and fiber-optic cables facilitate onshore communications. The DeXa.Net service supplies the SpaceTrack 4000 stabilized antenna for marine applications (bottom left). This very small aperture antenna requires minimal space but is rugged enough for service on semisubmersible, divingsupport and seismic vessels, barges and floating production systems. With a high degree of tracking accuracy, it maintains a lock on a satellite even in rough seas. Companies that operate communications satellites are careful about allowing access to their systems. The SpaceTrack 4000 stabilized antenna, installed by experienced personnel, meets the stringent controls these companies enforce before allowing connection. The E&P business operates in many remote parts of the world where a surface communication infrastructure, such as fiber-optic or traditional telephone lines, does not exist. Yet, rapid communications independent of distance have become imperative in the industry. Satellite linkage is essential for communication to locations such as in the Algerian desert or in deepwater areas off the coast of western Africa. A portfolio of satellites is required to provide global coverage because communications satellites are placed in geosynchronous orbit.1 Managing bandwidth on the right satellites to communicate with all of a company’s locations can be daunting. Schlumberger manages satellite communication and through the DeXa.Net service resells bandwidth in solutions tailored for client needs. About 14 satellites cover strategic E&P provinces worldwide. Teleports located in Aberdeen, Scotland; Stavanger, Norway; Houston, Texas, USA; Sedalia, Colorado, USA; Macaé, Brazil; Lagos, Nigeria; Hassi Messaoud, Algeria, and Singapore provide global coverage. Any location—no matter how remote—can be linked to the data network. Client offices connect to the teleports through fiber-optic networks, and through the Schlumberger DeXa.Net core system, clients obtain a global network connection. The DeXa.Net system provides a turnkey, end-toend communications solution. Secure Private Partnering BP was the primary sponsor of the first Oil Partnering Network (OPNet), established in Aberdeen, Scotland in 1994 to facilitate critical oilfield operations, engineering projects and E&P partner reporting. An OPNet uses several elements of the DeXa.Net solution to offer secure, managed networks for a closed, private community of companies. Oilfield Review Field partners Outsource partners Billing systems Local and international connectivity Secure data network Oil Partnering Network (OPNet) Service companies Field management company or asset group Voice and data Field operator Satellite hubs Commercial and financial-sector services Offshore installation: platform, rig vessel E-mail exchange > Participants in the Aberdeen local private network. The Oil Partnering Network in Aberdeen joins a variety of North Sea stakeholders into a seamless community. UK sector Norwegian sector Forties Cruden Bay Everest Aberdeen Ula No rt h Se a AND Summer 2002 central North Sea. CNSFTC chose Schlumberger as the telecommunications service operator because of the expertise the company had demonstrated in providing offshore communications. OTL Managing Central North Sea Fiber Optics Although land-based communications rates and bandwidth have improved dramatically over the past decade, offshore communications standards have lagged. BP recently laid a fiber-optic cable from Cruden Bay on the Scottish coast to the Forties field in the North Sea about 110 miles [177 km] from Aberdeen (right). The cable extends to Everest field in the UK sector and then to Ula field in the Norwegian sector. Any platform within about 25 miles [40 km] of these platforms can connect to the fiber-optic system by using line-of-sight microwave radio systems. The microwave and cable links expand the telecommunications capacity of these platforms up to 1000 times. The cable supplies high-capacity, high-quality telecommunications to the central North Sea.5 The Central North Sea Fibre Telecommunications Company (CNSFTC), a wholly owned subsidiary of BP, manages this fiber network and resells network capacity to other operators in the SC BP wanted to use OPNet to obtain greater flexibility in communicating with various stakeholders, including equity partners, service companies and suppliers of its North Sea fields (right). The BP goal was to achieve cost savings by reducing infrastructure and moving management of a network to an external provider. At the same time, improved security was a high priority. Real-time intrusion-detection systems scan all traffic 24 hours a day, 7 days a week. This closed-community TCP/IP network is used for critical oilfield operations, engineering projects and reporting to partners.2 For example, real-time drilling or logging information can be transmitted securely from a drilling platform to a company’s offices onshore or to an iCenter collaborative meeting facility.3 Logistical operations can be coordinated more easily, such as ensuring a supply boat or helicopter does not make a trip partially loaded when there are supplies or personnel needing transport. The success of the operation is evident in the growing number of users. When OPNet began on a trial basis in 1994, only five companies were involved. Now, about 100 stakeholders communicate through OPNet. This includes 23 oil and gas operators, 33 engineering companies, 14 drillingrelated companies, 7 logistics and transport companies, about 50 offshore platforms and vessels operated by 14 companies, and 16 IT and bureau services.4 The system has expanded beyond BP fields to include assets of many companies in the United Kingdom sector of the North Sea. Additional OPNets are being established in other parts of the world. The Houston OPNet became operational in December 2001. > Fiber-optic cabling for the central North Sea. A fiber-optic cable connects the BP Aberdeen network to the Forties field, then continues to Everest field and into the Norwegian sector to Ula field. Nearby platforms can access the cable through a microwave link. 1. Satellites placed in geosynchronous orbit remain fixed in location above a point on the Earth’s surface. 2. TCP/IP stands for transmission control protocol/Internet protocol. The transmission control protocol assures a reliable connection between computers connected on the Internet. The Internet protocol controls how the information is broken down into packets and how they should be addressed to reach the destination computer. 3. For information on the iCenter facility: Bosco M, Burgoyne M, Davidson M, Donovan M, Landgren K, Pickavance P, Tushingham K, Wine J, Decatur S, Dufaur S, Ingham J, Lopez G, Madrussa A, Seabrook D, Morán H, Segovia G, Morillo R and Prieto R: “Lifelong Asset Management Using the Web,” Oilfield Review 13, no. 4 (Winter 2001): 42–57. 4. Bureau services include financial and certification companies. 5. For technical details about the central North Sea fiberoptic communications: www.cnsfibre.com. 21 Annual bandwidth cost per Mbit/sec High cost Before fiberoptic cable On-line conditionRadio upgrade, information technology based monitoring simplification, video applications, well monitoring Operators and partners in oil fields can achieve enhanced health, safety and environmental performance, reduced operating costs, increased production and extended field life. Simple changes, such as moving servers onshore, using videoconferencing to reduce offshore visits, and bringing more data to shore for analysis will contribute to delivering these goals. Intelligent well control, process optimization, onshore control room Fiber-optic cable 2 Mbit/sec 8 Mbit/sec 34 Mbit/sec Low cost Projects 155 Mbit/sec Increasing innovation > Bandwidth cost. The cost per megabit of bandwidth to Forties field decreased, and quality and capabilities improved when the fiber-optic cable was installed (blue line). > Smart corporate badge. A high level of security can be put in place by using a smart card with an embedded computer chip. This can be used for physical access to facilities and access to computer systems. Improved communications by fiber cable enable fundamental changes to offshore operations (top). Telephone communications are clear and free from delay. Videoconferencing can be of broadcast quality. Servers onshore are as quick and effective for offshore users as for those onshore. High volumes of data acquired offshore can be made available immediately onshore, allowing more effective remote monitoring of offshore plant and process conditions. In a speech celebrating the 25th anniversary of the Forties field, BP Chairman Lord John 22 Browne said, “Almost unlimited bandwidth will make offshore and onshore a single IT environment—and that will transform the way the North Sea industry works, improving everything from the optimisation of production to family video link-ups for offshore workers.” He continued, “We believe the initial investment, which amounts to $40 million [US] will create great opportunities for operators and service companies, reducing costs, extending field life and enhancing production.”6 Secure Data Access In an information-centric company, capturing and sharing knowledge, experience and information are crucial in creating and building a new-generation corporate digital-asset repository. This repository must be protected—with physical and IT security measures—while still allowing efficient access on demand. Interactions between companies in the E&P industry are worldwide, so a well-designed system has to account for connections that include potentially mischievous or hostile attempts to intrude (see “Protecting the Olympic Gold,” page 24 ). The foundation of this security is integrated physical and network access. A single system authenticates the identification of people for a variety of purposes. The system allows them to enter certain buildings and offices, log on to internal data systems and, finally, authorizes them to see certain applications and data. Once an organization has a solid identity, authentication and authorization system in place, the leverage gained from this security system is powerful. Securing the collaborative community, authorizing access to secure areas or rigs, tracking training and safety certifications and charging meals at the canteen can all be tied to an integrated personal- and data-security system. The DeXa.Badge Identity Management Security Solutions system uses individual smartcard technology to access digital assets and physical premises (left). The smart card provides photographic identification, a physical-access chip and a personal electronic certificate that identifies and authorizes a user. In addition to access security, transactions can be facilitated in the networked community by encrypting documents and digitally signing transactions, enabled by the certificate on the card. The DeXa.Port Network Access Control Security Solutions system guarantees similar strong security for extranets and Web portal applications. In this case, the collaborative community can work across the Internet to share data and conduct transactions in a protected manner. If the data or the transactions are of the highest value, the security levels can be enhanced to include biometric readers, such as fingerprint or retinal scanners, to provide a further level of user Oilfield Review authentication. Thus, in addition to something that you know such as a personal identification number and something that you have such as a smart card, authentication can include a third level: something that identifies you personally, such as a fingerprint. All of these aspects of security are available, but they can provide the secure foundation required for real-time activities only when combined into an integrated security solution. This means that users can access the premises securely, access data securely and access Internet applications securely. The system ensures that only authorized people see the data; that transmitted data cannot be intercepted and read by others; and that transactions performed in the network can be validated and not repudiated after they are enacted.7 Knowing that the information flow and all participants in the transaction chain are secure allows decisions to be made confidently in real time. Breaking Through In December 2001, Conoco took a major step toward a globally consistent IT capability and reduced overall IT costs when it signed a six-year, $300-million outsourcing contract. Schlumberger won the contract because of its flexible, service-oriented approach and global presence, specifically in the many remote locations common to the E&P industry. Using integrated tools and processes, Schlumberger is creating a worldwide IT infrastructure with selfsupport features and a global service model for Conoco. Because Schlumberger understands both the oil field and IT, Conoco management was comfortable outsourcing this key strategic function. At a worldwide Conoco information management (IM) meeting in May 2000, IM managers determined that a common architecture with consistent global service would improve productivity and achieve efficiencies of scale through leveraged resources and assets. Unifying the Conoco IT infrastructure would result in less worker downtime as compatible systems and new applications were introduced. A focus on process and capabilities would increase as individual business unit IT infrastructure issues decreased. Conoco calls the process IT Breakthrough. This new common operating environment is based on global consolidation and standardization through a single IT supplier with a common infrastructure, a unified support structure and integrated tools. Internally, IT Breakthrough goals embrace technology, processes and people. Externally, this means Conoco can display a consistent face Summer 2002 Employee has a PC problem. Employee goes to the myDeXa Self-Support Portal. Employee goes to the Quick Fix tool. Employee goes to the knowledge base. Employee goes to the Tickets tool. Quick Fix attempts to repair problem. Knowledge base searches for the answer or solution. Employee creates his or her own trouble ticket on-line. Problem resolved? Yes No Problem resolved? No Ticket is routed to the Global Service Desk or on-site support for problem resolution. Yes Employee is back on-line. > DeXa.Touch self-support tools. Instead of immediately calling the service desk with a PC problem, a Conoco user can access a full array of support tools through the myDeXa icon. One of those tools, the Self-Support Portal, offers the Quick Fix tool. Within minutes, the employee can fix many problems that, typically, would require the attention of a support analyst. For more difficult problems, an extensive knowledge base is available. If the answer is not in the knowledge base, the user can create a help-desk ticket on-line. to its customers, allowing the company to • decrease the time to market for technical solutions • increase coordinated solutions across business units • increase business flexibility. Getting in Touch For the nearly 20,000 Conoco workers, the restructuring provides focus and multiple avenues for support. No longer will they be limited to IT and help-desk support in their building. Instead, support is offered through the Global Service Desk, giving employees a single point of contact for any IT-related problem or question. Significantly, as a key part of the solution, user communities and IT management teams can proactively identify, resolve and track their own technical problems with self-help tools designed by Schlumberger. Conoco employees throughout the world are getting a new software application on their PCs: the Schlumberger DeXa.Touch Self-Support Portal (SSP), which is fully integrated into the other DeXa.Touch IT Outsourcing service and support systems. This tool, the first of its kind, is setting the standard in the self-support industry. By the end of December 2002, all Conoco users will have the DeXa.Touch SSP on their desktops, accessed through the myDeXa icon. The SSP empowers Conoco PC users and IT management teams to fix their own computer problems quickly and independently, decreasing user downtime and total cost of IT ownership. IT management can focus on strategic business processes rather than on system operations. The SSP enables Conoco employees to use the self-healing tools. These tools are the first line of defense, a quick-and-easy way to troubleshoot and solve everyday PC problems. Conoco employees can fix many application and operating-system problems with just a click of the mouse. In many cases, automated, user-initiated actions can reduce repair times significantly. The goals are to increase the number of problems that can be resolved by the SSP and continue to reduce the cost of IT support. A tool called Quick Fix allows users to repair application and network problems by restoring PCs to a known working condition (above). For example, if someone cannot print an Adobe (continued on page 27) 6. Browne J: “Speech for the Forties Field 25th Anniversary Thursday 7 September 2000,” http://www.bp.com/location_rep/uk/bus_operating/ forties_field/sjb_speech.asp. 7. In computer network security, nonrepudiation is a desirable quality that assures users are allowed access to all resources to which they are authorized. 23 Protecting the Olympic Gold The 2002 Olympic Winter Games in Salt Lake City, Utah, USA were a challenge for network systems security. This worldwide sporting event—often the center of strong national emotions—made it a potential target for computer hackers. Secure event results had to be delivered to the media in real time. Redoing a ski run because of system problems was not an acceptable option. The system had to be fully operational by the opening of the Games on February 8, 2002 (right). SchlumbergerSema designed and operated the Games’ Information Technology Center (ITC) and will do the same for the next three Olympic Games. As systems integrator, SchlumbergerSema coordinated the work of 15 companies and 1350 information technology (IT) experts in the Games’ Technology Consortium. With data centers at each of the 10 sports venues as well as other Games centers, a huge IT infrastructure managed the instantaneous transmission of event results, accreditations, athlete entries, transportation and other key processes. Real-time scoring and background information on the athletes and events were transmitted to broadcast and print media and to the official 2002 Olympic Winter Games Web site at www.saltlake2002.com. SchlumbergerSema was given the task of ensuring data integrity and data security within this infrastructure. The goal was to prevent intruders, whether acting intentionally or by accident, from impacting the smooth running of the Games. Any attempted or successful attacks on the network were to be tracked, allowing the operators to respond quickly and efficiently. In the summer of 2001, SchlumbergerSema began a complete audit of the many elements of the computer system. The survey established every device connected to the system: 225 servers, 5000 personal computers, 145 UNIX computers, 1850 fax machines and copiers, and 1210 printers. The ownership, Internet protocol (IP) address and actual physical location of each device were established. In addition, the security team mapped connections to other enterprises, such as designated terrorist-watch and law-enforcement agencies, tickets.com, the 24 The Ice Sheet Ogden Snowbasin Ski Area Salt Lake City Salt Lake Olympic Square West Valley Rice Eccles Olympic Stadium ITC Utah Olympic Park Park City Mountain Resort Park City Utah E Center Olympic Arena Oval Deer Valley Resort Soldier Hollow Heber Provo Utah, USA The Peaks Ice Arena > Olympic network. The 2002 Olympic Winter Games involved 10 sports venues in Salt Lake City, Utah, USA and in the surrounding Wasatch mountain range. All of the venues were networked to the SchlumbergerSema Information Technology Center (ITC). Olympic Museum in Lausanne, Switzerland, news organizations and other groups that needed to be linked with the system. With this information, three parallel efforts were undertaken to prepare the system— defense in depth, policies and procedures, and network-management and intrusion-detection systems. Defense in depth is a military term, indicating defensive measures that reinforce one another, hiding the defenders’ activities from view and allowing the defenders to respond to an attack quickly and effectively. As a network security strategy, defense in depth uses several forms of defense against intruders rather than relying on a single defensive mechanism. Two principles help effect a defense in depth. The principle of least privilege demands that users, applications and systems should be granted the least privilege possible consistent with accomplishing their tasks. The principle of minimum access demands that any access not explicitly granted must be denied. For example, every connection into the network was linked to the specific device that was attached; only that device could access the system at that connection. The second effort was to establish clear policies and procedures for the enterprise network. SchlumbergerSema drew upon its experience to establish policies for security and network configuration. Protocols were designed for alarm and event management. System requirements changed rapidly with so many entities involved; a change-management policy was imperative. Human intervention as outlined in the policies Oilfield Review and procedures played a critical role in successfully protecting the integrity of Salt Lake 2002 Olympic Winter Games data. The third effort focused on planning, building and deploying the network-management systems (NMS) and intrusion-detection systems (IDS) and response procedures. The system architecture was optimized to deploy the minimum number of intrusion-detection agents, or probe agents, to protect the system (below). These agents are specialized software programs that continuously monitor network traffic. Ideally, all traffic in and out of the system would pass through one point so that one agent could monitor and protect the whole system. Real-world systems are more complex, and the Salt Lake Games system was protected using 35 agents. The software agents prioritized the severity of any attack on the system. This involved a tremendous amount of systems-log analysis. The intrusion-detection system had to distinguish between normal system traffic and anomalies. The network-management system provided systems personnel with a clear response plan for any type of anomaly. In addition to systems operators monitoring the system seven days a Internet Router NMS/IDS enclave Venues UNIX server Firewall Probe agent IDS database server NMS servers Windows server Switch Probe agent Router UNIX server Probe master server Router Router Probe agent UNIX server B2B and B2C links Probe agent UNIX server Remote-access server links > Intrusion detection. Multiple means of access to the computer network made an intrusion-detection system (IDS) critical. Access to the Games and administration network was available from the sporting venues, through the Internet, from remote servers on the internal network and with certain business-to-business (B2B) and business-to-consumer (B2C) servers. Specialized software, termed probe agents, monitored all traffic and generated alerts when unauthorized use was detected. At a special enclave in the SchlumbergerSema Information Technology Center, the network-management system (NMS) monitored all probe agents through redundant systems. One route passed through a probe master server, the other passed through an IDS database server. Network security personnel monitored the NMS at all times throughout the event. Summer 2002 25 week, 24 hours a day, the software defense system could send alerts by pagers and e-mail to response personnel (right). The management and detection systems were tested twice, once in October and again in December. Experts in ethical system-penetration testing attempted to hack into the network during these tests. The vulnerabilities they exposed were corrected. With the three parallel tasks of defense in depth, policies and procedures, and networkmanagement and intrusion-detection systems in place, SchlumbergerSema compiled a global network-operations document (below right). The intent was to provide a manual useful for the 2002 Games, as well as future Olympic Games. Having policies and procedures cataloged has little benefit unless they are followed. SchlumbergerSema provided training for key personnel in other systems organizations, who then trained their groups. As in most enterprises establishing security for the first time, there was resistance from some members of the Games’ community to setting up restrictive policies. They feared such ideas could interfere with the spirit of cooperation and teamwork. The SchlumbergerSema team worked closely with the management teams to dispel such fears and educate them about the reasons for the policies. The SchlumbergerSema team found creative ways to solve problems without compromising security. These efforts improved the level of cooperation and avoided unauthorized attempts to circumvent the policies. The system did come under attack during the Games. The site had many computers available for use by athletes, coaches and other members of the Olympic community. Attempts were made using some of those computers to access inappropriate, pornographic Web sites, which the security system detected. Some national teams tried to add servers to the system to set up Web portals. More serious attacks included virusinfected e-mail sent from outside to internal staff and people trying to hack into servers from outside. Not one attack was successful. The system was not compromised, and the Games had a stable, secure infrastructure that allowed the world to focus on the sporting events. 26 > SchlumbergerSema IT team in the Salt Lake Games Information Technology Center. The computer network was monitored and controlled continuously throughout the 2002 Olympic Winter Games. Establish baseline Develop and deploy defense-in-depth strategy Develop policies and procedures Build and deploy networkmanagement system and intrusion-detection system Compile into global network-operations document Disseminate and educate > Security preparations for the 2002 Olympic Winter Games. Three parallel efforts led to a complete security solution for the Salt Lake Olympic Games. The documentation will be available for the next three Olympic Games, which also will be coordinated by SchlumbergerSema. Oilfield Review how to add a network printer > DeXa.Touch knowledge base for self-support portal. The knowledge base has answers to PC, operating system and application questions. Detailed, step-by-step instructions and illustrated solutions are included for resolving many issues and problems. Custom knowledge bases can be built for a customer’s business with existing content migrated and hosted by the self-support portal. A user can search by key words, error messages or free-form questions, such as the one here: “how to add a network printer.” An optional advanced function offers a fine-tuned search. Browse has an index of the knowledge base content; the user can access both summary and detailed information. Acrobat file, help is a mouse-click away. After logging onto the myDeXa system, the user scrolls to “All Printer Drivers,” and finds the button “Fix Now.” In a few minutes, the self-healing process is finished, as the printer drivers are restored without calling the service desk. What about applications on the hard drive? If an error message indicates Microsoft Word has failed, with a few clicks the user can repair the application immediately. The service desk would be available, but unnecessary in this automated repair solution. SSP administrators create protection schemes and job schedules to define the applications and operating-system settings that will be protected or backed up for a particular set of PC users. The SSP probes the machines to identify all application components that must be protected. A weekly protection run is, for the most part, transparent to users. They may hear the hard drive churning and see a new icon in the bottomright corner of the menu bar. During this process, the software is backing up applications and settings that are used later if a problem occurs. This procedure is automatic, but users can run the protection manually, if necessary. Summer 2002 This system-protection run copies registry keys, settings and drivers; application and system files; executable and INI files; the dynamic link library (DLL); and component object models (COM) in working condition. When there is a failure, self-restoration of a user’s system can be accomplished in fewer than 10 minutes, rather than waiting for a technician who could take a few hours to make a service call. Productivity at Conoco is expected to increase dramatically. Besides Quick Fix, the DeXa.Touch SSP includes the following: • a knowledge base offering support information, organized effectively so users can find answers and solutions to their problems quickly and independently (above) • a directory of the most common PC-related tasks • system information, giving users details about the hardware and software that is installed on their PCs • password-protected management reports, giving service-level agreement information, including outage, error and performance reports, plus system-management and firewallsecurity reports • a global ticketing system, allowing users to submit and view the status of problems that cannot be self-healed. Conoco management understands that it cannot change the habits of its worldwide employees quickly and without effort. The company sponsored an awareness campaign about the self-healing tools, including a Web site. Forty Conoco IM managers held workshops for their employees. Next, myDeXa champions were chosen within each unit to offer expertise as needed. Also, Schlumberger hosted training seminars for all of the business units. Standing By When a Conoco employee has a problem that he or she cannot resolve, a Schlumberger Global Service Desk is the single point of contact for application, desktop, network, connectivity and security issues in any region of the world 24 hours a day, seven days a week. This first-class support has teams covering the globe, each with an in-depth knowledge of Conoco operations. By using this service solution, Conoco is leveraging the Schlumberger worldwide infrastructure of best practices, expertise, tools, technology and processes. Additionally, Conoco no longer has to manage IT human resources, such as recruiting, hiring and training. Time, effort and resources that once were expended on support 27 > Link performance report. Through proactive network monitoring, the Schlumberger Service Management Center is able to produce real-time reports detailing exactly what is occurring on a customer’s network over a given time period; these reports are accessible through the self-support portal at any time. The example shown indicates link load or the percentage of a network segment that is being utilized by traffic. The report also shows response time for network devices at the input and output ends of this particular network segment, tracked by monitoring the amount of time in milliseconds that the devices take to respond back and forth. An IT manager can see network availability for traffic, the volume of traffic going across the network and the load on the network devices managing this traffic. 28 Oilfield Review issues now can be refocused on the core business, allowing Conoco to strengthen its competitive edge. Service personnel are globally linked and their functions integrated through a centralized infrastructure, allowing them to operate as a single, virtual service desk. All support personnel access the same tickets and data through a custom-developed system and workflow for ticket tracking, notifications and metrics collection. When a user calls the service desk, a support analyst collects information and opens a ticket, automatically sending an e-mail to the user. The message has the ticket number, as well as problem details and status of the fix. Each type of supported device—such as a desktop PC, server or network switch—is bound by its own set of service levels. A priority setting is assigned to each issue based on its impact on Conoco business activity. Historically, 90 percent of the calls to Schlumberger Global Service Desks are answered within 120 seconds, the industry standard for these calls; 50 percent of the calls are resolved at first contact. Conoco has contracted six Schlumberger Global Service Desks around the world, including Houston; Ponca City, Oklahoma, USA; Cork, Ireland; Lagos, Nigeria; Dubai, UAE; and Jakarta, Indonesia. Once the service desks are fully operational late in 2002, following a phased-in approach, Schlumberger teams and Conoco employees can discuss problems in English, Spanish, Arabic, German, Swedish, Bahasa Indonesia and Thai; specific languages are contracted for each location. Certified Security The Schlumberger Service Management Center (SMC)—an International Standards Organization (ISO) certified operation—supports the service desk and the self-support portal by providing global, centralized incident reporting, tracking and resolution services. The SMC combines physical, application and operating-system security monitoring in a facility with uninterrupted power and fire protection. Entering the SMC facility requires a special security clearance; entering the more sensitive production-computing facilities requires the most restrictive security clearance. Summer 2002 An identification, authentication and authorization system coupled with facility management is the foundation of escalating levels of secured access to these protected locations. Everyone entering and working in the SMC is monitored by on-site staff and cameras at all times. Throughout each day, SMC staff monitors system performance, data availability, data integrity and viable connectivity, scrutinizing all levels of applications, operating systems and hardware with state-of-the-art monitoring systems set with prescribed alarms. Because human intervention is imperative, the SMC team uses defined response procedures based on alarm levels. Servers are polled at time intervals agreed upon with the customer. If there is a problem, a visual alarm is triggered on a large bank of screens. The on-duty team determines if the problem relates to a network, an operating system, hardware or an application. Corrective procedures include restarting services, file and operating-system maintenance, redirecting services or other systems-administration tasks agreed upon contractually. In addition to connectivity, a default list of conditions, processes and applications are monitored, and if any are outside agreed limits, they will be highlighted on systems-management screens and brought to the team’s attention. Another key element in the security scenario is firewall monitoring. Firewall traffic is logged according to a specific agreement; these logs are kept in a secure server and archived. Once a week, firewall summary reports are sent to the customer by file or over a secure Web connection. These reports include connection statistics for the 40 most frequent source and destination addresses listed by attempted, denied and accepted connections. The team monitors and compiles reports for customer network segments, traffic, connections and routers (previous page). Management and resolution of faults—such as a router failure, a circuit failure, an application failure, a disk-full event, or a performance problem—also are included. Once a fault or problem is detected, SMC staff creates a service ticket and notifies the customer. As with the Global Service Desk, incidents are classified according to the perceived impact on operations. The ticket also includes date and time, a description of the request, diagnostic test results and resolution information. For Conoco and all other Schlumberger customers, the SMC is the ever-present cyber traffic officer, ensuring that information flows securely and without interruption around the globe. As that information begins to flow through a common operating environment, Conoco business units can deploy internal and external solutions quickly and efficiently anytime, anywhere. Well-Connected Companies The DeXa Suite of Services offers companies a new potential for improving their operations. For example, a drilling contractor can connect multiple rigs in a customized worldwide network for real-time communication, data sharing and decision-making. This is particularly attractive for offshore and remote locations, and critical, high-cost wells. Instantaneous access to crucial data and centralized groups of technical experts—whether by secure wireless mobile communications or Internet connections—can speed responses to potential safety problems, such as a well-control incident, or help to optimize drilling performance based on data from other wells being drilled in other areas. Connecting jackups, semisubmersibles and drillships with their respective oil or gas company clients offers secure transmission of confidential information. Connection to suppliers of rig materials can improve the speed and costeffectiveness of supply-chain decisions and simplify procurement practices. Customized smart-card badges can allow secure entry from shore to rig, for example prior to boarding helicopters or boats. An individual’s safety and operational training history can be coded on the badge so that no one boards a rig without the proper certifications. Secure access to restricted areas on the rig can be ensured with smart cards coded for a specific set of card readers. Secure Internet access and Web transactions by rig personnel can be both enabled and monitored. Information is the lifeblood of the oil and gas industry. State-of-the-art information technology services allow operating companies to focus on their core business of finding and producing hydrocarbons. —MAA, BG 29