WirelessHART(TM) (eBook)

Real-Time Mesh Network for Industrial Automation
eBook Download: PDF
2010 | 2010
XXII, 276 Seiten
Springer US (Verlag)
978-1-4419-6047-4 (ISBN)

Lese- und Medienproben

WirelessHART(TM) -  Deji Chen,  Aloysius Mok,  Mark Nixon
Systemvoraussetzungen
96,29 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
The process control industry has seen generations of technology advancement, from pneumatic communication to electrical communication to electronic c- munication, from centralized control to distributed control. At the center of today's distributed control systems are operator workstations. These operator wo- stations provide the connection between those overseeing and running plant operations to the process itself. With each new generation of products the operator workstation has become increasingly more intelligent. Newer applications provide advanced alarming, control, and diagnostics. Behind all of these applications are smarter devices. These smart devices provide greater process insight, reduce en- neering costs, and contribute to improving the overall operational performance of the plant. Smart devices include advanced diagnostics that can report the health of the device and in many cases, the health of the process that the device is connected to. It is not uncommon for smart devices to include diagnostics that can detect plugged lines, burner flame instability, agitator loss, wet gas, orifice wear, leaks, and cavitations. These devices tell the user how well they are operating and when they need maintenance. Improvements in sensor technology and diagnostics have lead to a large variety of smart devices. So how do users connect the capabilities of these smart devices to their existing control system infrastructures? The answer is wireless. Wireless technology has matured to the point that it now can be safely applied in industrial control, monitor, and asset management applications.
The process control industry has seen generations of technology advancement, from pneumatic communication to electrical communication to electronic c- munication, from centralized control to distributed control. At the center of today's distributed control systems are operator workstations. These operator wo- stations provide the connection between those overseeing and running plant operations to the process itself. With each new generation of products the operator workstation has become increasingly more intelligent. Newer applications provide advanced alarming, control, and diagnostics. Behind all of these applications are smarter devices. These smart devices provide greater process insight, reduce en- neering costs, and contribute to improving the overall operational performance of the plant. Smart devices include advanced diagnostics that can report the health of the device and in many cases, the health of the process that the device is connected to. It is not uncommon for smart devices to include diagnostics that can detect plugged lines, burner flame instability, agitator loss, wet gas, orifice wear, leaks, and cavitations. These devices tell the user how well they are operating and when they need maintenance. Improvements in sensor technology and diagnostics have lead to a large variety of smart devices. So how do users connect the capabilities of these smart devices to their existing control system infrastructures? The answer is wireless. Wireless technology has matured to the point that it now can be safely applied in industrial control, monitor, and asset management applications.

Acknowledgements 6
Table of Contents 7
Table of Figures 13
List of Tables 15
Introduction 16
PART I WirelessHART in a Nutshell 20
Chapter 1 Overview 22
1.1 About the HART Standard 22
1.2 About the WirelessHART Standard 23
1.3 The Layers 26
1.4 A Simple Example 31
Chapter 2 Physical Layer 34
2.1 Physical Layer Services 35
2.1.1 Message SPs 35
2.1.2 Management SPs 35
Chapter 3 Data Link Layer 37
3.1 Data Link Layer Services 38
3.1.1 Message SPs 38
3.1.2 Management SPs 39
3.2 Logical Link Control 41
3.2.1 The DLPDU 41
3.2.2 DLPDU Types 42
3.2.3 DLPDU Priority and Flow Control 42
3.2.4 Error Detection Coding and Security 43
3.3 Media Access Control 43
3.3.1 Slot Timing 43
3.3.2 Communication Tables and Buffers 45
3.3.3 Link Scheduling 45
Chapter 4 Network Layer and Transport Layer 46
4.1 Overview 46
4.1.1 Communication Traffic 46
4.1.2 Routing 47
4.1.3 Security 48
4.2 Network Layer Services 49
4.2.1 Network Layer Message SPs 49
4.2.2 Network Layer Management Services 50
4.3 Network Layer Specification 51
4.3.1 Network Layer PDUs 51
4.3.1.2 Security Sub-Layer 53
4.3.1.3 Payload 54
4.3.2 Transport Layer PDU 54
Chapter 5 Application Layer 56
5.1 Application Layer Interface 56
5.2 Dynamic and Device Variables 61
5.3 Host Conformance Classifications 61
Chapter 6 WirelessHART Network 62
6.1 Field Devices 63
6.1.1 General Requirements 63
6.1.2 Maintenance Port 63
6.1.3 WirelessHART Device Interface 64
6.2 Router Device 65
6.3 Adapter 65
6.4 Handheld 66
6.5 Gateway and Access Point 67
6.5.1 General Requirements 67
6.5.2 Gateway Model 68
6.6 Network Manager and Security Manager 72
6.6.1 Core Network Functions 72
6.6.2 Network Manager Requirements 75
6.6.3 Scheduling 77
PART II WirelessHART in Depth 79
Chapter 7 An Example 80
7.1 Network Management and Host Request 81
7.2 Process Measurement 84
7.3 Scheduling Example – Single Hop 85
7.4 Scheduling Example – Multiple Hop 86
Chapter 8 Discourses on the Stack 88
8.1 Physical Layer 88
8.1.1 Physical Channel and Maximum Bandwidth 88
8.1.2 Packet Length versus Reliability 89
8.1.3 Channel Hopping 89
8.1.4 Health Report 90
8.2 Data Link Layer 91
8.2.1 Timeslot 91
8.2.2 Links 93
8.2.3 Synchronization 94
8.2.4 Keep Alive Interval 95
8.2.5 Clock Drift and Precision 97
8.2.6 Broadcast Messages 97
8.3 Network and Transport Layer 98
8.3.1 Session and Transport Table, Who Owns Who? 98
8.3.2 The Security Layer 99
8.3.3 Broadcast and Response 99
8.3.4 Block Data Transfer 99
8.3.5 Transport Type Codes 100
8.4 Application Layer 100
8.4.1 Commands and Messages 100
8.4.2 Wireless verses Wired Command Formats 101
8.4.3 Some Interesting Commands 102
8.4.4 Burst Data and Delayed Response 103
8.5 Topics that Cross Layers 104
8.5.1 The Encryption Algorithm 104
8.5.1.1 Symbol Definitions 104
8.5.1.2 The Encryption Algorithm 105
8.5.1.3 The Encryption Algorithm at the Data Link Layer 106
8.5.1.4 The Encryption Algorithm at the Network Layer 107
8.5.1.5 The Lifetime of an Encryption Key 110
8.5.1.6 Incremental Execution 110
8.5.1.7 Hardware Acceleration 112
8.5.2 Message Life Time 112
8.5.3 Retry 113
8.5.4 MSB and LSB, Big Endian and Small Endian 114
8.5.5 Short Address and Long Address 115
8.5.6 Nonce Counter and Sequence Numbers 115
8.5.6.1 The IEEE 802.15.4 Data Sequence Number 115
8.5.6.2 The Nonce Counter 116
8.5.6.3 The WirelessHART Sequence Number 117
8.6 Other Topics 119
8.5.7 Timestamp and ASN Time 118
8.5.8 Master and Slave 118
8.5.9 Broadcast and Unicast 119
8.6 Other Topics 119
8.6.1 Memory Footprint 119
8.6.2 Key Change 120
8.6.2.1 Network Key at the Data Link Layer 121
8.6.2.2 Session Key at the Network Layer 121
Chapter 9 Discourses on the Mesh Network 122
9.1 The Birth of a WirelessHART Mesh 122
9.2 Device Life Cycle in the Network 122
9.2.1 Pre-configure the New Device 123
9.2.2 Network Device Advertise 123
9.2.3 New Device Synchronize 124
9.2.4 Join Request 125
9.2.5 Join Reply 126
9.2.6 More Configurations 127
9.2.7 Keep in the Network 128
9.2.8 Disconnect 128
9.2.9 Rejoin 128
9.3 Routing 129
9.3.1 Source Routing 129
9.3.2 Graph Routing 129
9.3.3 Mixed Routing 130
9.3.4 Superframe Routing 131
9.3.5 Proxy Routing 132
9.3.6 Broadcast Routing 133
9.4 Communication with the Host 134
9.5. Network Management 135
9.5.1 Superframe Lengths 135
9.5.2 Allocating Bandwidth for the Host Application 135
9.5.3 Some Comments 136
9.6 Redundancy 137
9.6.1 Device Redundancy 137
9.6.2 Path Redundancy 138
9.6.2.1 The Issue 138
9.6.2.2 A Possible Solution 140
9.6.2.3 An Alternative Solution 141
9.6.3 Broadcast Redundancy 142
9.7 Scalability 142
9.8 Low Power Mode and Battery Life 142
9.9 Interoperability and Interchangeability 144
9.10 Unwanted Access to a WirelessHART Mesh 144
9.10.1 Jamming 144
9.10.2 Key Discovery 146
Chapter 10 Discourses in General 147
10.1 The WirelessHART Standard and the ISO OSI Standard 147
10.2 Radio Basics 149
10.2.1 Radio Basics 149
10.2.1.1 Electromagnetic Wave 149
10.2.1.2 Transmit and Receive 149
10.2.1.3 Transmission Space 150
10.2.1.4 Encoding and Modulation 151
10.2.2 Spread Spectrum Modulation 152
10.2.2.1 DSSS 152
10.2.2.2 FHSS 152
10.2.2.3 What the WirelessHART Standard Uses 153
10.2.3 Media Access Control 153
10.2.3.1 Simplex and Duplex 153
10.2.3.2 CSMA and CSMA-CA 153
10.2.3.3 TDMA 154
10.2.3.4 ARQ 154
10.2.3.5 What the WirelessHART Standard Uses 154
10.2.4 The Reason for 2.4GHz Band 155
10.3 Why Centralized Control 155
10.4 Field Survey 157
10.5 The WirelessHART Standard and the IEEE 802.15.4 Standard 158
10.5.1 WirelessHART Values in IEEE 802.15.4 Header Fields 158
10.5.2 The Security Method 159
10.5.3 Maximum MAC Payload 160
10.5.4 Other Comparisons 160
10.5.5 Some Added Benefits with the IEEE 802.15.4 Standard 161
10.5.6 Beacon 161
10.5.7 Configure IEEE 802.15.4 Stack for WirelessHART Stack 163
10.6 Coexistence 164
10.6.1 The IEEE 802.15.4 Standard 165
10.6.2 The IEEE 802.11 Standard 165
10.6.3 Other Standards 167
10.6.4 Coexistence Test Scenarios 167
10.7 The HART Standard and Other Fieldbthus Standards 168
10.8 What the WirelessHART Standard Does Not 169
10.9 Security and Reliability 169
10.10 Do I Need to Know All These to Use WirelsssHART Technology? 170
PART III WirelessHART in Practice 171
Chapter 11 Test and Diagnostic Tools 172
11.1 The Wi-Analys Tool 173
11.2 The Wi-HTest Tool 176
11.2.1 WirelessHART Test Specification and Test Scripts 177
11.2.2 Wi-HTest Architecture 179
11.2.2.1 Overview 179
11.2.2.2 Host Architecture 180
11.2.2.3 RF Interface Design 183
11.3 The Post Process Suite 186
Chapter 12 A Fast Approach to Equip a HART Device with WirelessHART Capability 187
12.1 The WirelessHART Adapter 187
12.2 A WirelessHART Adapterlite 187
Chapter 13 Development Recommendations 189
13.1 OS or No OS 189
13.2 Timestamping Incoming Messages 190
13.3 Realizing Network Layers in the Stack 190
13.4 API between Adjacent Network Layers in the Stack 191
13.5 A Timer Module 191
13.5.1 Timeslots in the WirelessHART Standard 192
13.5.2 Standard-Conscious Timer Module 192
13.6 Hardware Considerations 195
13.7 Miscellaneous Comments 196
Chapter 14 Deployment Recommendations 199
14.1 Scope the Network 199
14.2 Design the Network 199
14.3 Deploy the Network 201
14.4 More Comments 203
PART IV WirelessHART in the Bigger Picture 205
Chapter 15 Why WirelessHART 206
15.1 The WirelessHART Standard Is Based on Proven Solutions 206
15.2 The WirelessHART Standard Embraces the Best Technology 207
15.3 The WirelessHART Standard Has an Easy Adoption Path 208
Chapter 16 Wireless and Real-Time Industrial Process Control 211
16.1 Challenges of Wireless Control 211
16.1.1 Process Control Networks and their Wireless Counterparts 212
16.1.2 Process Control with Sensor Networks 214
16.2 Improving PID Control with Unreliable Communications 218
16.2.1 The Control Loop 219
16.2.2 The Standard PID Algorithm 219
16.2.2.1 Input Communication Lost 221
16.2.2.2 Output Communication Lost 221
16.2.2.3 Both Input and Output Communication Lost 222
16.2.3 The Enhanced PID Algorithm 222
16.2.4 Experiments and Results 224
16.2.4.1 Experimental Setup 224
16.2.4.2 Reliable Communications 225
16.2.4.3 Unreliable Communications 226
16.2.5 Active Traffic Reduction to Increase Battery Life 229
16.2.6 Comments 230
Chapter 17 Research in Real-Time WirelessMesh Networks 232
17.1 Real-Time Systems 232
17.2 Selected Topics 233
Chapter 18 Future of Wireless and theWirelessHART Standard 236
18.1 Wireless Sensor Network in Process Automation 236
18.1.1 Wireless Mesh Applications 236
18.1.2 Wireless Products 237
18.2 Location Awareness 239
18.2.1 Location Awareness Techniques 239
18.2.1.1 Theoretical Principles of Localization 239
18.2.1.2 Properties of Location Techniques 240
18.2.1.3 Localization Techniques 241
18.2.2 A WirelessHART Location-Determination Application 241
18.3 Cyber-Physical Systems and WirelessHART Systems 243
18.4 What’s next for the WirelessHART Standard? 248
18.4.1 Discrete Devices and Values 250
18.4.2 Location 251
18.4.3 Handhelds 251
18.4.4 Public/Private Key for Handheld 252
18.4.5 Control over Wireless 252
PART V Appendices 253
Chapter 19 Attribute and Field Values 254
19.1 Comments on Message Field Values 254
19.2 WirelessHART Message Fields 255
Chapter 20 Symbols and Abbreviations 259
Chapter 21 Definitions 263
Chapter 22 References 273
22.1 HART 7 Protocol Specifications 273
22.2 Related HART Documents 274
22.3 Related Documents Cited by HART 274
22.4 Other References 275
Index 279

Erscheint lt. Verlag 6.4.2010
Zusatzinfo XXII, 276 p.
Verlagsort New York
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Netzwerke
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Technik Bauwesen
Technik Elektrotechnik / Energietechnik
Technik Maschinenbau
Technik Nachrichtentechnik
Schlagworte Automation • Control • control system • currentjm • cutting • HART • IEEE 802.15.4 • Industrial Process • ISO OSI • mesh network • Network • PDU • Process Control • Routing • Stack • superframe • Symbol • WirelessHART
ISBN-10 1-4419-6047-3 / 1441960473
ISBN-13 978-1-4419-6047-4 / 9781441960474
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 4,9 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
der Praxis-Guide für Künstliche Intelligenz in Unternehmen - Chancen …

von Thomas R. Köhler; Julia Finkeissen

eBook Download (2024)
Campus Verlag
38,99
Wie du KI richtig nutzt - schreiben, recherchieren, Bilder erstellen, …

von Rainer Hattenhauer

eBook Download (2023)
Rheinwerk Computing (Verlag)
24,90