摘要:
Example methods and apparatus to manage module run sequences in a process control environment are disclosed. A disclosed example method includes receiving a module including a plurality of function blocks, receiving an indication of a subset of the plurality of function blocks, and receiving an indication of a first sequence of execution for the subset, wherein the first sequence of execution is different than a second sequence of execution associated with the module. The example method also includes associating the subset with a run sequence identifier, and associating the run sequence identifier with a trigger condition.
摘要:
Example methods and apparatus to manage module run sequences in a process control environment are disclosed. A disclosed example method includes receiving a module including a plurality of function blocks, receiving an indication of a subset of the plurality of function blocks, and receiving an indication of a first sequence of execution for the subset, wherein the first sequence of execution is different than a second sequence of execution associated with the module. The example method also includes associating the subset with a run sequence identifier, and associating the run sequence identifier with a trigger condition.
摘要:
Example methods and systems to verify a communication path between a field device and a process controller in a process control system are disclosed. A disclosed example method includes transmitting via a first wireless communication path to a first portion of a process control system associated with one of the field device or the process controller, a command signal from a verification controller. In response to receiving the command signal in the first portion of the process control system, transmitting a verification signal via a first wired communication path from the first portion of the process control system to a second portion of the process control system associated with the other one of the field device or the process controller. Then, in response to receiving the verification signal in the second portion of the process control system, transmitting a reception signal via a second wireless communication path from the second portion of the process control system to the verification controller and in response to receiving the verification signal in the verification controller, verifying the communication path between the field device and the process controller.
摘要:
Example methods, apparatus and articles of manufacture to replace field devices in process control systems are disclosed. A disclosed example method includes recording, at a first process controller of a process control system, configuration data sent from a configuration subsystem of the process control system to a first field device to commission the first field device, detecting, at a second process controller of the process control system, replacement of the first field device with a second field device, and sending the recorded configuration data from the second process controller to the second field device when the replacement is detected to commission the second field device.
摘要:
Methods and apparatus to upgrade and provide control redundancy in process plants are disclosed. An example disclosed method to upgrade software for a control device of a process control system comprises instantiating a replacement component of the software, copying state data from an existing component to the replacement component, and changing the replacement component to an active mode when a first state of the replacement component matches a second state of the existing component.
摘要:
Example methods, apparatus and articles of manufacture to replace field devices in process control systems are disclosed. A disclosed example method includes recording, at a first process controller of a process control system, configuration data sent from a configuration subsystem of the process control system to a first field device to commission the first field device, detecting, at a second process controller of the process control system, replacement of the first field device with a second field device, and sending the recorded configuration data from the second process controller to the second field device when the replacement is detected to commission the second field device.
摘要:
Example methods and systems to verify a communication path between a field device and a process controller in a process control system are disclosed. A disclosed example method includes transmitting via a first wireless communication path to a first portion of a process control system associated with one of the field device or the process controller, a command signal from a verification controller. In response to receiving the command signal in the first portion of the process control system, transmitting a verification signal via a first wired communication path from the first portion of the process control system to a second portion of the process control system associated with the other one of the field device or the process controller. Then, in response to receiving the verification signal in the second portion of the process control system, transmitting a reception signal via a second wireless communication path from the second portion of the process control system to the verification controller and in response to receiving the verification signal in the verification controller, verifying the communication path between the field device and the process controller.
摘要:
A Unified Threat Management System (UTMS) for securing network traffic in a process control system may comprise network devices configured to receive network traffic related to the process control system and including a ruleset received from an external source. The ruleset may include one or more rules defining a condition to accept or deny the network traffic received at the network device. The state of the network device may be integrated into the process control system as a process control object or variable, thus allowing the state and other UTMS and component network device parameters and variables to be displayed to an operator at a workstation within a graphical process control system environment. The network devices may also communicate with a perpetual service that proactively supplies the devices with rulesets to meet the latest security threats, threat patterns, and control system vulnerabilities found or predicted to exist within the network.
摘要:
Example methods and apparatus to conceal portions of a visual object diagram in a process control system are disclosed. A disclosed example method includes receiving a selection to conceal a first functional block within a visual object diagram, wherein the first functional block is associated with a first view parameter, determining a link from a process control parameter within the first functional block to a first intersection within a second functional block within the visual object diagram, wherein the link is associated with a second view parameter, coupling the first view parameter and the second view parameter to the first intersection, and concealing the link and the first functional block.
摘要:
An example customized documentation generation apparatus is disclosed that generates documents relevant to a software update/upgrade of a particular process control system. A notes instrumentation module instruments general release notes for at least one of an update or an upgrade of a process control system to correlate the release notes with a general process control system configuration to produce instrumented notes. An upgrade assessment module determines configuration information for a particular process control system to provide default filter settings. An items of interest filter applies the default filter settings for the particular process control system to the instrumented notes to filter the instrumented notes and produce custom release notes for the particular process control system. The custom release notes are provided to a user to alert the user regarding potential effects of the update/upgrade on the particular process control system.