摘要:
The present invention relates to a system and methodology facilitating flexible resource distribution in an industrial control environment. A query component is provided to determine one or more system resources from a networked industrial controller system, wherein the resources can include listings of applications, configurations, variable settings, and performance capabilities associated with a controller. Upon receiving available resource listings from various control devices, a distribution component can update the devices based in part on the resource listings and according to various criteria. A configuration component can be utilized in the controller system to provide network updates of controller parameters and to facilitate automated protocol selections when interacting with out-of-network devices. An analysis component can interact with the query, distribution, and configuration components to support higher-level decision-making in the resource distribution and allocation process.
摘要:
The present invention relates to a system and methodology facilitating flexible resource distribution in an industrial control environment. A query component is provided to determine one or more system resources from a networked industrial controller system, wherein the resources can include listings of applications, configurations, variable settings, and performance capabilities associated with a controller. Upon receiving available resource listings from various control devices, a distribution component can update the devices based in part on the resource listings and according to various criteria. A configuration component can be utilized in the controller system to provide network updates of controller parameters and to facilitate automated protocol selections when interacting with out-of-network devices. An analysis component can interact with the query, distribution, and configuration components to support higher-level decision-making in the resource distribution and allocation process.
摘要:
The present invention relates to a system and methodology facilitating network security and data access in an industrial control environment. An industrial control system is provided that includes an industrial controller to communicate with a network. At least one security layer can be configured in the industrial controller, wherein the security layer can be associated with one or more security components to control and/or restrict data access to the controller. An operating system manages the security layer in accordance with a processor to limit or mitigate communications from the network based upon the configured security layer or layers.
摘要:
The present invention relates to a system and methodology facilitating network security and data access in an industrial control environment. An industrial control system is provided that includes an industrial controller to communicate with a network. At least one security layer can be configured in the industrial controller, wherein the security layer can be associated with one or more security components to control and/or restrict data access to the controller. An operating system manages the security layer in accordance with a processor to limit or mitigate communications from the network based upon the configured security layer or layers.
摘要:
The present invention relates to a system and methodology facilitating network security and data access in an industrial control environment. An industrial control system is provided that includes an industrial controller to communicate with a network. At least one security layer can be configured in the industrial controller, wherein the security layer can be associated with one or more security components to control and/or restrict data access to the controller. An operating system manages the security layer in accordance with a processor to limit or mitigate communications from the network based upon the configured security layer or layers.
摘要:
A method for detecting and preventing the use of duplicate IP addresses is provided. The method involves sending ARP probes onto a network to determine whether an IP address that a device desires to employ is a duplicate IP address. The method further involves determining whether a probing entity is connected to an active network before identifying a potentially duplicate IP address as a non-duplicate IP address.