摘要:
The present invention relates to a system and methodology providing a virtual “namespace” architecture between client and server components in an industrial automation environment, wherein the namespace can be a structured store of logical names, instances and definitions, together with access and modification components. An Active Directory Service Interface (ADSI) family can be employed, for example, to navigate and access the namespace structure and contents. The present invention employs the concept of a “service” to encapsulate server-side behavior accessed through the namespace. Thus, logical names can be utilized to decouple client components from the physical location and implementation of server components. Some services, known as “basic services”, may ignore the logical container structure exposed by an area model in a namespace. By contrast, services which utilize an area context and a set of named service items to interact with clients can be referred to as “namespace extensions.” Further, services known as “context services” may use the area model to scope and control accesses, yet not employ a service item namespace organized by the area model.
摘要:
The present invention relates to a system and methodology providing automation services in a distributed industrial controller environment. In one aspect of the present invention, a data access service is provided that includes, sending and receiving data to and from a data access service namespace operative in the distributed controller environment. In another aspect of the present invention, an alarming service is provided wherein data values are monitored in a server component according to predetermined conditions configured by a user or other entity. If the data values are determined to be outside of boundaries as defined by the predetermined conditions, an alarm can be communicated to a plurality of other components cooperating in the distributed environment.
摘要:
An object can be used in an industrial control configuration in relation to performing a function or task. Matching can occur such that an object with operational requirements can bind with a host that has capabilities that meet those operational requirements—matching can occur automatically as well as through user operation. Once matched, different functionality can be presented to a user pertaining to the object. To assist the user, the object can include external references, logic, local or private data, as well as others in addition to resources. To facilitate operation, capabilities and resources can be published in a directory that can be accessed by different entities—sometimes with security constraints in order to protect configuration integrity. Likewise, a subscription system can be employed such that when a change to a related entity is made, a notice can transfer to related entities and operation can alter based upon the change.
摘要:
An object can be used in an industrial control configuration in relation to performing a function or task. Matching can occur such that an object with operational requirements can bind with a host that has capabilities that meet those operational requirements—matching can occur automatically as well as through user operation. Once matched, different functionality can be presented to a user pertaining to the object. To assist the user, the object can include external references, logic, local or private data, as well as others in addition to resources. To facilitate operation, capabilities and resources can be published in a directory that can be accessed by different entities—sometimes with security constraints in order to protect configuration integrity. Likewise, a subscription system can be employed such that when a change to a related entity is made, a notice can transfer to related entities and operation can alter based upon the change.
摘要:
An object can be used in an industrial control configuration in relation to performing a function or task. Matching can occur such that an object with operational requirements can bind with a host that has capabilities that meet those operational requirements—matching can occur automatically as well as through user operation. Once matched, different functionality can be presented to a user pertaining to the object. To assist the user, the object can include external references, logic, local or private data, as well as others in addition to resources. To facilitate operation, capabilities and resources can be published in a directory that can be accessed by different entities—sometimes with security constraints in order to protect configuration integrity. Likewise, a subscription system can be employed such that when a change to a related entity is made, a notice can transfer to related entities and operation can alter based upon the change.
摘要:
An object can be used in an industrial control configuration in relation to performing a function or task. Matching can occur such that an object with operational requirements can bind with a host that has capabilities that meet those operational requirements—matching can occur automatically as well as through user operation. Once matched, different functionality can be presented to a user pertaining to the object. To assist the user, the object can include external references, logic, local or private data, as well as others in addition to resources. To facilitate operation, capabilities and resources can be published in a directory that can be accessed by different entities—sometimes with security constraints in order to protect configuration integrity. Likewise, a subscription system can be employed such that when a change to a related entity is made, a notice can transfer to related entities and operation can alter based upon the change.
摘要:
An object can be used in an industrial control configuration in relation to performing a function or task. Matching can occur such that an object with operational requirements can bind with a host that has capabilities that meet those operational requirements—matching can occur automatically as well as through user operation. Once matched, different functionality can be presented to a user pertaining to the object. To assist the user, the object can include external references, logic, local or private data, as well as others in addition to resources. To facilitate operation, capabilities and resources can be published in a directory that can be accessed by different entities—sometimes with security constraints in order to protect configuration integrity. Likewise, a subscription system can be employed such that when a change to a related entity is made, a notice can transfer to related entities and operation can alter based upon the change.
摘要:
An object can be used in an industrial control configuration in relation to performing a function or task. Matching can occur such that an object with operational requirements can bind with a host that has capabilities that meet those operational requirements—matching can occur automatically as well as through user operation. Once matched, different functionality can be presented to a user pertaining to the object. To assist the user, the object can include external references, logic, local or private data, as well as others in addition to resources. To facilitate operation, capabilities and resources can be published in a directory that can be accessed by different entities—sometimes with security constraints in order to protect configuration integrity. Likewise, a subscription system can be employed such that when a change to a related entity is made, a notice can transfer to related entities and operation can alter based upon the change.
摘要:
The present invention relates to a system and methodology providing a multi-protocol data exchange between client and server components in an industrial automation environment. According to one aspect of the present invention, an industrial control system is provided that includes a server application operative to exchange data with an industrial controller. A server component associated with the server application is adapted to communicate via a plurality of protocols to facilitate the data exchange. A host component exposes objects in the server component, wherein the objects can be employed to communicate via a shared memory protocol according to a local operating environment. In addition, the objects can be adapted to communicate via a multicast protocol in accordance with a remote operating environment.
摘要:
Systems and methods are provided for issuing unique identification credentials to a plurality of devices, and their constituent components, in an industrial control system. Identification credentials are granted by an identification authority and conveyed to each of the credentialed devices and/or component through an identity token. The identification credentials include (1) a unique device identifier, (2) an identification authority component identifier, and (3) an indication of the location of the identification authority component. To secure the issued credentials, such credentials are encrypted and the identification token can be embedded with biometrics features. Identification credentials provide for the following prominent features: (i) Secure access to a device form a client and (ii) determination a topology of a set of credentialed devices in an industrial control system. The topology is network agnostic and facilitates organizational modeling of processes in the industrial control system.