Chen / Nixon / Mok | WirelessHART(TM) | E-Book | www2.sack.de
E-Book

E-Book, Englisch, 276 Seiten

Chen / Nixon / Mok WirelessHART(TM)

Real-Time Mesh Network for Industrial Automation
1. Auflage 2010
ISBN: 978-1-4419-6047-4
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark

Real-Time Mesh Network for Industrial Automation

E-Book, Englisch, 276 Seiten

ISBN: 978-1-4419-6047-4
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark



The process control industry has seen generations of technology advancement, from pneumatic communication to electrical communication to electronic c- munication, from centralized control to distributed control. At the center of today's distributed control systems are operator workstations. These operator wo- stations provide the connection between those overseeing and running plant operations to the process itself. With each new generation of products the operator workstation has become increasingly more intelligent. Newer applications provide advanced alarming, control, and diagnostics. Behind all of these applications are smarter devices. These smart devices provide greater process insight, reduce en- neering costs, and contribute to improving the overall operational performance of the plant. Smart devices include advanced diagnostics that can report the health of the device and in many cases, the health of the process that the device is connected to. It is not uncommon for smart devices to include diagnostics that can detect plugged lines, burner flame instability, agitator loss, wet gas, orifice wear, leaks, and cavitations. These devices tell the user how well they are operating and when they need maintenance. Improvements in sensor technology and diagnostics have lead to a large variety of smart devices. So how do users connect the capabilities of these smart devices to their existing control system infrastructures? The answer is wireless. Wireless technology has matured to the point that it now can be safely applied in industrial control, monitor, and asset management applications.

Chen / Nixon / Mok WirelessHART(TM) jetzt bestellen!

Weitere Infos & Material


1;Acknowledgements;6
2;Table of Contents;7
3;Table of Figures;13
4;List of Tables;15
5;Introduction;16
6;PART I WirelessHART in a Nutshell;20
6.1;Chapter 1 Overview;22
6.1.1;1.1 About the HART Standard;22
6.1.2;1.2 About the WirelessHART Standard;23
6.1.3;1.3 The Layers;26
6.1.4;1.4 A Simple Example;31
6.2;Chapter 2 Physical Layer;34
6.2.1;2.1 Physical Layer Services;35
6.2.1.1;2.1.1 Message SPs;35
6.2.1.2;2.1.2 Management SPs;35
6.3;Chapter 3 Data Link Layer;37
6.3.1;3.1 Data Link Layer Services;38
6.3.1.1;3.1.1 Message SPs;38
6.3.1.2;3.1.2 Management SPs;39
6.3.2;3.2 Logical Link Control;41
6.3.2.1;3.2.1 The DLPDU;41
6.3.2.2;3.2.2 DLPDU Types;42
6.3.2.3;3.2.3 DLPDU Priority and Flow Control;42
6.3.2.4;3.2.4 Error Detection Coding and Security;43
6.3.3;3.3 Media Access Control;43
6.3.3.1;3.3.1 Slot Timing;43
6.3.3.2;3.3.2 Communication Tables and Buffers;45
6.3.3.3;3.3.3 Link Scheduling;45
6.4;Chapter 4 Network Layer and Transport Layer;46
6.4.1;4.1 Overview;46
6.4.1.1;4.1.1 Communication Traffic;46
6.4.1.2;4.1.2 Routing;47
6.4.1.3;4.1.3 Security;48
6.4.2;4.2 Network Layer Services;49
6.4.2.1;4.2.1 Network Layer Message SPs;49
6.4.2.2;4.2.2 Network Layer Management Services;50
6.4.3;4.3 Network Layer Specification;51
6.4.3.1;4.3.1 Network Layer PDUs;51
6.4.3.1.1;4.3.1.2 Security Sub-Layer;53
6.4.3.1.2;4.3.1.3 Payload;54
6.4.3.2;4.3.2 Transport Layer PDU;54
6.5;Chapter 5 Application Layer;56
6.5.1;5.1 Application Layer Interface;56
6.5.2;5.2 Dynamic and Device Variables;61
6.5.3;5.3 Host Conformance Classifications;61
6.6;Chapter 6 WirelessHART Network;62
6.6.1;6.1 Field Devices;63
6.6.1.1;6.1.1 General Requirements;63
6.6.1.2;6.1.2 Maintenance Port;63
6.6.1.3;6.1.3 WirelessHART Device Interface;64
6.6.2;6.2 Router Device;65
6.6.3;6.3 Adapter;65
6.6.4;6.4 Handheld;66
6.6.5;6.5 Gateway and Access Point;67
6.6.5.1;6.5.1 General Requirements;67
6.6.5.2;6.5.2 Gateway Model;68
6.6.6;6.6 Network Manager and Security Manager;72
6.6.6.1;6.6.1 Core Network Functions;72
6.6.6.2;6.6.2 Network Manager Requirements;75
6.6.6.3;6.6.3 Scheduling;77
7;PART II WirelessHART in Depth;79
7.1;Chapter 7 An Example;80
7.1.1;7.1 Network Management and Host Request;81
7.1.2;7.2 Process Measurement;84
7.1.3;7.3 Scheduling Example – Single Hop;85
7.1.4;7.4 Scheduling Example – Multiple Hop;86
7.2;Chapter 8 Discourses on the Stack;88
7.2.1;8.1 Physical Layer;88
7.2.1.1;8.1.1 Physical Channel and Maximum Bandwidth;88
7.2.1.2;8.1.2 Packet Length versus Reliability;89
7.2.1.3;8.1.3 Channel Hopping;89
7.2.1.4;8.1.4 Health Report;90
7.2.2;8.2 Data Link Layer;91
7.2.2.1;8.2.1 Timeslot;91
7.2.2.2;8.2.2 Links;93
7.2.2.3;8.2.3 Synchronization;94
7.2.2.4;8.2.4 Keep Alive Interval;95
7.2.2.5;8.2.5 Clock Drift and Precision;97
7.2.2.6;8.2.6 Broadcast Messages;97
7.2.3;8.3 Network and Transport Layer;98
7.2.3.1;8.3.1 Session and Transport Table, Who Owns Who?;98
7.2.3.2;8.3.2 The Security Layer;99
7.2.3.3;8.3.3 Broadcast and Response;99
7.2.3.4;8.3.4 Block Data Transfer;99
7.2.3.5;8.3.5 Transport Type Codes;100
7.2.4;8.4 Application Layer;100
7.2.4.1;8.4.1 Commands and Messages;100
7.2.4.2;8.4.2 Wireless verses Wired Command Formats;101
7.2.4.3;8.4.3 Some Interesting Commands;102
7.2.4.4;8.4.4 Burst Data and Delayed Response;103
7.2.5;8.5 Topics that Cross Layers;104
7.2.5.1;8.5.1 The Encryption Algorithm;104
7.2.5.1.1;8.5.1.1 Symbol Definitions;104
7.2.5.1.2;8.5.1.2 The Encryption Algorithm;105
7.2.5.1.3;8.5.1.3 The Encryption Algorithm at the Data Link Layer;106
7.2.5.1.4;8.5.1.4 The Encryption Algorithm at the Network Layer;107
7.2.5.1.5;8.5.1.5 The Lifetime of an Encryption Key;110
7.2.5.1.6;8.5.1.6 Incremental Execution;110
7.2.5.1.7;8.5.1.7 Hardware Acceleration;112
7.2.5.2;8.5.2 Message Life Time;112
7.2.5.3;8.5.3 Retry;113
7.2.5.4;8.5.4 MSB and LSB, Big Endian and Small Endian;114
7.2.5.5;8.5.5 Short Address and Long Address;115
7.2.5.6;8.5.6 Nonce Counter and Sequence Numbers;115
7.2.5.6.1;8.5.6.1 The IEEE 802.15.4 Data Sequence Number;115
7.2.5.6.2;8.5.6.2 The Nonce Counter;116
7.2.5.6.3;8.5.6.3 The WirelessHART Sequence Number;117
7.2.5.7;8.6 Other Topics;119
7.2.5.8;8.5.7 Timestamp and ASN Time;118
7.2.5.9;8.5.8 Master and Slave;118
7.2.5.10;8.5.9 Broadcast and Unicast;119
7.2.6;8.6 Other Topics;119
7.2.6.1;8.6.1 Memory Footprint;119
7.2.6.2;8.6.2 Key Change;120
7.2.6.3;8.6.2.1 Network Key at the Data Link Layer;121
7.2.6.4;8.6.2.2 Session Key at the Network Layer;121
7.3;Chapter 9 Discourses on the Mesh Network;122
7.3.1;9.1 The Birth of a WirelessHART Mesh;122
7.3.2;9.2 Device Life Cycle in the Network;122
7.3.2.1;9.2.1 Pre-configure the New Device;123
7.3.2.2;9.2.2 Network Device Advertise;123
7.3.2.3;9.2.3 New Device Synchronize;124
7.3.2.4;9.2.4 Join Request;125
7.3.2.5;9.2.5 Join Reply;126
7.3.2.6;9.2.6 More Configurations;127
7.3.2.7;9.2.7 Keep in the Network;128
7.3.2.8;9.2.8 Disconnect;128
7.3.2.9;9.2.9 Rejoin;128
7.3.3;9.3 Routing;129
7.3.3.1;9.3.1 Source Routing;129
7.3.3.2;9.3.2 Graph Routing;129
7.3.3.3;9.3.3 Mixed Routing;130
7.3.3.4;9.3.4 Superframe Routing;131
7.3.3.5;9.3.5 Proxy Routing;132
7.3.3.6;9.3.6 Broadcast Routing;133
7.3.4;9.4 Communication with the Host;134
7.3.5;9.5. Network Management;135
7.3.5.1;9.5.1 Superframe Lengths;135
7.3.5.2;9.5.2 Allocating Bandwidth for the Host Application;135
7.3.5.3;9.5.3 Some Comments;136
7.3.6;9.6 Redundancy;137
7.3.6.1;9.6.1 Device Redundancy;137
7.3.6.2;9.6.2 Path Redundancy;138
7.3.6.2.1;9.6.2.1 The Issue;138
7.3.6.2.2;9.6.2.2 A Possible Solution;140
7.3.6.2.3;9.6.2.3 An Alternative Solution;141
7.3.6.2.4;9.6.3 Broadcast Redundancy;142
7.3.7;9.7 Scalability;142
7.3.8;9.8 Low Power Mode and Battery Life;142
7.3.9;9.9 Interoperability and Interchangeability;144
7.3.10;9.10 Unwanted Access to a WirelessHART Mesh;144
7.3.10.1;9.10.1 Jamming;144
7.3.10.2;9.10.2 Key Discovery;146
7.4;Chapter 10 Discourses in General;147
7.4.1;10.1 The WirelessHART Standard and the ISO OSI Standard;147
7.4.2;10.2 Radio Basics;149
7.4.2.1;10.2.1 Radio Basics;149
7.4.2.1.1;10.2.1.1 Electromagnetic Wave;149
7.4.2.1.2;10.2.1.2 Transmit and Receive;149
7.4.2.1.3;10.2.1.3 Transmission Space;150
7.4.2.1.4;10.2.1.4 Encoding and Modulation;151
7.4.2.2;10.2.2 Spread Spectrum Modulation;152
7.4.2.2.1;10.2.2.1 DSSS;152
7.4.2.2.2;10.2.2.2 FHSS;152
7.4.2.2.3;10.2.2.3 What the WirelessHART Standard Uses;153
7.4.2.3;10.2.3 Media Access Control;153
7.4.2.3.1;10.2.3.1 Simplex and Duplex;153
7.4.2.3.2;10.2.3.2 CSMA and CSMA-CA;153
7.4.2.3.3;10.2.3.3 TDMA;154
7.4.2.3.4;10.2.3.4 ARQ;154
7.4.2.3.5;10.2.3.5 What the WirelessHART Standard Uses;154
7.4.2.4;10.2.4 The Reason for 2.4GHz Band;155
7.4.3;10.3 Why Centralized Control;155
7.4.4;10.4 Field Survey;157
7.4.5;10.5 The WirelessHART Standard and the IEEE 802.15.4 Standard;158
7.4.5.1;10.5.1 WirelessHART Values in IEEE 802.15.4 Header Fields;158
7.4.5.2;10.5.2 The Security Method;159
7.4.5.3;10.5.3 Maximum MAC Payload;160
7.4.5.4;10.5.4 Other Comparisons;160
7.4.5.5;10.5.5 Some Added Benefits with the IEEE 802.15.4 Standard;161
7.4.5.6;10.5.6 Beacon;161
7.4.5.7;10.5.7 Configure IEEE 802.15.4 Stack for WirelessHART Stack;163
7.4.6;10.6 Coexistence;164
7.4.6.1;10.6.1 The IEEE 802.15.4 Standard;165
7.4.6.2;10.6.2 The IEEE 802.11 Standard;165
7.4.6.3;10.6.3 Other Standards;167
7.4.6.4;10.6.4 Coexistence Test Scenarios;167
7.4.7;10.7 The HART Standard and Other Fieldbthus Standards;168
7.4.8;10.8 What the WirelessHART Standard Does Not;169
7.4.9;10.9 Security and Reliability;169
7.4.10;10.10 Do I Need to Know All These to Use WirelsssHART Technology?;170
8;PART III WirelessHART in Practice;171
8.1;Chapter 11 Test and Diagnostic Tools;172
8.1.1;11.1 The Wi-Analys Tool;173
8.1.2;11.2 The Wi-HTest Tool;176
8.1.2.1;11.2.1 WirelessHART Test Specification and Test Scripts;177
8.1.2.2;11.2.2 Wi-HTest Architecture;179
8.1.2.2.1;11.2.2.1 Overview;179
8.1.2.2.2;11.2.2.2 Host Architecture;180
8.1.2.2.3;11.2.2.3 RF Interface Design;183
8.1.3;11.3 The Post Process Suite;186
8.2;Chapter 12 A Fast Approach to Equip a HART Device with WirelessHART Capability;187
8.2.1;12.1 The WirelessHART Adapter;187
8.2.2;12.2 A WirelessHART Adapterlite;187
8.3;Chapter 13 Development Recommendations;189
8.3.1;13.1 OS or No OS;189
8.3.2;13.2 Timestamping Incoming Messages;190
8.3.3;13.3 Realizing Network Layers in the Stack;190
8.3.4;13.4 API between Adjacent Network Layers in the Stack;191
8.3.5;13.5 A Timer Module;191
8.3.5.1;13.5.1 Timeslots in the WirelessHART Standard;192
8.3.5.2;13.5.2 Standard-Conscious Timer Module;192
8.3.6;13.6 Hardware Considerations;195
8.3.7;13.7 Miscellaneous Comments;196
8.4;Chapter 14 Deployment Recommendations;199
8.4.1;14.1 Scope the Network;199
8.4.2;14.2 Design the Network;199
8.4.3;14.3 Deploy the Network;201
8.4.4;14.4 More Comments;203
9;PART IV WirelessHART in the Bigger Picture;205
9.1;Chapter 15 Why WirelessHART;206
9.1.1;15.1 The WirelessHART Standard Is Based on Proven Solutions;206
9.1.2;15.2 The WirelessHART Standard Embraces the Best Technology;207
9.1.3;15.3 The WirelessHART Standard Has an Easy Adoption Path;208
9.2;Chapter 16 Wireless and Real-Time Industrial Process Control;211
9.2.1;16.1 Challenges of Wireless Control;211
9.2.1.1;16.1.1 Process Control Networks and their Wireless Counterparts;212
9.2.1.2;16.1.2 Process Control with Sensor Networks;214
9.2.2;16.2 Improving PID Control with Unreliable Communications;218
9.2.2.1;16.2.1 The Control Loop;219
9.2.2.2;16.2.2 The Standard PID Algorithm;219
9.2.2.2.1;16.2.2.1 Input Communication Lost;221
9.2.2.2.2;16.2.2.2 Output Communication Lost;221
9.2.2.2.3;16.2.2.3 Both Input and Output Communication Lost;222
9.2.2.3;16.2.3 The Enhanced PID Algorithm;222
9.2.2.4;16.2.4 Experiments and Results;224
9.2.2.4.1;16.2.4.1 Experimental Setup;224
9.2.2.4.2;16.2.4.2 Reliable Communications;225
9.2.2.4.3;16.2.4.3 Unreliable Communications;226
9.2.2.5;16.2.5 Active Traffic Reduction to Increase Battery Life;229
9.2.2.5.1;16.2.6 Comments;230
9.3;Chapter 17 Research in Real-Time WirelessMesh Networks;232
9.3.1;17.1 Real-Time Systems;232
9.3.2;17.2 Selected Topics;233
9.4;Chapter 18 Future of Wireless and theWirelessHART Standard;236
9.4.1;18.1 Wireless Sensor Network in Process Automation;236
9.4.1.1;18.1.1 Wireless Mesh Applications;236
9.4.1.2;18.1.2 Wireless Products;237
9.4.2;18.2 Location Awareness;239
9.4.2.1;18.2.1 Location Awareness Techniques;239
9.4.2.1.1;18.2.1.1 Theoretical Principles of Localization;239
9.4.2.1.2;18.2.1.2 Properties of Location Techniques;240
9.4.2.1.3;18.2.1.3 Localization Techniques;241
9.4.2.2;18.2.2 A WirelessHART Location-Determination Application;241
9.4.3;18.3 Cyber-Physical Systems and WirelessHART Systems;243
9.4.4;18.4 What’s next for the WirelessHART Standard?;248
9.4.4.1;18.4.1 Discrete Devices and Values;250
9.4.4.2;18.4.2 Location;251
9.4.4.3;18.4.3 Handhelds;251
9.4.4.4;18.4.4 Public/Private Key for Handheld;252
9.4.4.5;18.4.5 Control over Wireless;252
10;PART V Appendices;253
10.1;Chapter 19 Attribute and Field Values;254
10.1.1;19.1 Comments on Message Field Values;254
10.1.2;19.2 WirelessHART Message Fields;255
10.2;Chapter 20 Symbols and Abbreviations;259
10.3;Chapter 21 Definitions;263
10.4;Chapter 22 References;273
10.4.1;22.1 HART 7 Protocol Specifications;273
10.4.2;22.2 Related HART Documents;274
10.4.3;22.3 Related Documents Cited by HART;274
10.4.4;22.4 Other References;275
11;Index;279



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.