摘要:
An RFID reader and/or writer module in an industrial controller (e.g., PLC). The RFID module interfaces internally to the controller for tight integration therewith. The RFID module can also be part of a controller communications framework and as a standalone module with the PLC as a master device, and interact with the RFID module in the same manner as it interacts with other I/O devices connected to the controller. In another aspect, RFID read/write tag technology is incorporated into some or all major PLC and rack components, and utilized for wireless communication both between PLC system components and between the PLC and other devices, locations, and media. The RFID tag can be used to store and exchange electronic keying data, security information, module diagnostics and warranty information, series and revision levels code, I/O configuration data, and, replacement data. Artificial intelligence is also employed.
摘要:
An improved industrial automation system and communication system for implementation therein, and related methods of operation, are described herein. In at least some embodiments, the improved communication system allows communication in the form of messages between modules in different control or enterprise domains. Further, in at least some embodiments, such communications are achieved by providing a communication system including a manufacturing service bus having two internal service busses with a bridge between the internal busses. Also, in at least some embodiments, a methodology of synchronous messaging is employed.
摘要:
The claimed subject matter provides a system and/or method that facilitates utilizing metadata appended to data related to an industrial automation environment with a controller that is associated with a hierarchically structured data model. An interface component can facilitate receipt of data associated with at least one of an instruction set, a configuration, and a collection. An append component can affix metadata to at least one of the instruction set, the configuration, and the collection, wherein the metadata conforms to a hierarchically structured data model.
摘要:
Techniques for system wide analysis of industrial protocol traffic are provided to determine an optimal location of a security device and/or to dynamically and automatically create rules for security devices, communication modules, and/or proxy devices, including replacement devices. Intrusion detection and/or prevention can be provided for an system utilizing mechanisms for an industrial protocol space. Automated configurable security rule combining can maintain a rule set that is simple and manageable. Configuration and maintenance of industrial protocol devices, communication devices, security-enabled devices, security proxies, and intrusion detection and/or prevention can be simplified within unique industrial environment architectures.
摘要:
System(s) and method(s) to increase the accuracy and efficiency of an RFID system is provided. A system includes an RFID component that receives a signal from an RFID reader, and an identifier component that interfaces with the RFID component and identifies the source of the signal. The system further includes a signal strength component that interfaces with the identifier component and measures the strength of the signal. The system can include an environment component that analyzes an operating environment.
摘要:
A distributed database system within an industrial automation environment comprises a plurality of associated programmable logic controllers, wherein each of the programmable logic controllers includes data relating to one of a process and a device. Furthermore, the data within the plurality of programmable logic controllers can conform to a hierarchically structured data model, which, for example, can be based upon ISA S95, ISA S88, OMAC, or any suitable combination thereof. A reception component receives and services a request for data that is located within at least one of the programmable logic controllers.
摘要:
Systems and methods that dynamically generates alarms in real time are disclosed. An interface component receives instructions for generating alarms. A builder component dynamically creates alarms in real time based on instructions received and information stored on a data repository. The information comprises at least one or more of user roles, language spreadsheet and device characteristics. The system can further comprise a publisher component that packages alarms for delivery to web servers and/or another network. A proxy component for implementing the subject invention with legacy controllers is also disclosed.
摘要:
An editor in an industrial automation environment comprises an input component that receives modification data relating to at least one of lifecycle and deployment of an object, the object is associated with a programmable logic controller and configured in accordance with a hierarchically structured data model. An implementation component can implement the modification data with respect to the object. The editor can further comprise a security component that determines that an entity providing the data to the input component is authorized to implement the modification data.
摘要:
A software development tool for an industrial control system is provided. The tool includes one or more identifier components that indicate a portion of a data structure. A macro component maps one or more substitution values indicated by the identifier components into an alternative form of the data structure.
摘要:
Systems and methods that vary multiple data sampling rates, to collect sets of data with different levels of granularity for an industrial system. The data for such industrial system includes sets of data from the “internal” data stream(s) (e.g., history data collected from an industrial unit) and sets of data from an “external” (e.g., traffic data on network services) data stream(s), based in part on the criticality/importance criteria assigned to each collection stage. Each set of data can be assigned its own unique data collection rate. For example, a higher sample rate can be employed when collecting data from the network during an operation stage that is deemed more critical (e.g., dynamic attribution of predetermined importance factors) than the rest of the operation.