摘要:
An industrial control system provides I/O modules with web-servers and dual protocol ports so that product information stored in the I/O modules can be served over the same network interface used by the industrial control system to any Internet ready browser.
摘要:
Systems and methods are provided for communicating with control objects according to a singular and unified address space. In one aspect, an industrial communications system is provided. The system includes a global address protocol that can be employed to communicate with local or remote networks. An industrial protocol is adapted to interface with the global address protocol, where a network component communicates with one or more control components via the industrial protocol and in accordance with an address supplied by the global address protocol.
摘要:
Various embodiments are described in connection with auto-detection capabilities of a device in an industrial environment. The device can behave differently in a secured environment than it would in an unsecured environment. If in a secured environment, the device can obtain an auto configuration policy to control the device's security configuration from a security authority, for example. The device can configure itself based on the policy. Both secured-by-default and open-by-default can be supported based on the environment. According to some embodiments, needed security domain specific knowledge can be reduced, which increases the number of maintenance personnel that can add or replace a device in a secured system.
摘要:
Systems and methods are provided for communications across multiple networks in a substantially transparent and seamless manner. In one aspect, an industrial automation system is provided. The system includes a communications component to facilitate communications in an industrial controller network, where the communications component can include a protocol encapsulation component, a network services interface, or a protocol converter to process multiple network protocols. A controller component employs at least one network protocol to communicate with at least one other network protocol via the communications component. Also, the communications component can include multiple communications stacks to facilitate communications with the multiple network protocols.
摘要:
The invention includes a method and apparatus for use with a system including networked resources where communication between resources is via a dual packet protocol wherein a first protocol includes a frame that specifies a destination device/resource and a data field and the second protocol specifies a final destination device/resource and includes a data field and where the second packets are encapsulated in the first protocol packet frames the method including the steps of specifying access control information for resources, for each first protocol packet transmitted on the network, intercepting the first protocol packet prior to the first protocol destination resource, examining at least a subset of the additional embedded packet information to identify at least one of the intermediate path resources and the final destination resource, identifying the access control information associated with the identified at least one of the intermediate path resources and the final destination resource and restricting transmission of the first protocol packet as a function of the identified access control information.
摘要:
The subject invention provides systems and methods that facilitate accessing and management of information (e.g., instructions, executables, classes, objects . . . ) associated with a control system. The systems and methods enable a control system entity the ability to leverage functionality of another control system entity, for example, to employ a service and/or execute an application within an execution environment of the other control system entity. Other capabilities include, but are not limited to, installing and uninstalling, registering and deregistering, loading and/or unloading instructions, commencing, pausing and terminating instruction execution, passing parameters and variables to instructions, modifying, overriding instructions and removing instructions, reliable messages, files, executables, classes, data structures, schema, objects, services, notifications, behaviors, alerts, etc. Optionally, a security mechanism can be utilized to determine the scope of access to the control system entity and/or instructions, applications, and services therein.
摘要:
An industrial control system includes a central controller having a memory containing programmable data including operating programs for operating the controller, control program for controlling an industrial process, and configuration data configuring values used by the operating program and control program. The central controller is designed to control multiple devices also having memory holding programmable data including operating programs and configuration data. A program is executable by the central controller that causes the central controller to identify memories distributed through the industrial control system having programmable data and collect the programmable data from the memories. Accordingly, the collected programmable data may be used to substantially recreate operation of the industrial control system in a second industrial control system having another central controller substantially identical to the industrial controller and multiple devices connected to the central controller.
摘要:
A system that facilitates enhanced security with respect to an industrial automation environment comprises a legacy device that is existent within an industrial automation system and a central access authority that provides access rules to a proxy. The proxy receives an access request directed to the legacy device and determines whether the access request is permitted based at least in part upon characteristics of the access request and the access rules provided by the central access authority.
摘要:
A method and apparatus for use with a component assembly that forms part of an enterprise and at least one processor, the processor programmed to perform at least one diagnostic process on the assembly and to at least periodically perform at least one summary process on the assembly, the method for commencing the at least one summary process and comprising the steps of specifying at least one triggering relationship between at least a first enterprise user and the assembly that is to initiate the at least one summary process, determining when the at least one triggering relationship occurs and, when the at least one triggering relationship occurs, causing the processor to perform the at least one summary process.
摘要:
The present invention relates to systems and methods that employ scalable vector graphics (SVG) to view and effectuate an industrial device from a remote Web interface. The systems and methods can be utilized to retrieve an SVG XML markup language-based file associated with the device and execute the SVG file via basic ASCII drawing commands. Thus, a faceplate of an industrial device and/or other device-related information can be represented via SVG syntax and stored with the device. A user can employ a Web browser from a remote location (e.g., via a Web client) to retrieve the SVG file, wherein the file can be loaded within the Web browser and/or an open source software package. The SVG file can be executed to render an interactive graphical faceplate that can depict LEDs, alphanumeric displays, inputs/output, etc., trending mechanisms (e.g., graphs, charts, etc.), and capabilities to load parameters.