Preface to the Second Edition |
|
xxi | |
|
Chapter 1 Data Communication |
|
|
1 | (24) |
|
|
1 | (1) |
|
1.2 Comparison Between Digital and Analog Communication |
|
|
1 | (1) |
|
|
2 | (1) |
|
1.3.1 Main Characteristics |
|
|
3 | (1) |
|
|
3 | (1) |
|
1.5 Data Transfer Characteristics |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
5 | (4) |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
1.9 Power Spectral Density |
|
|
10 | (1) |
|
1.10 Transmission Impairments |
|
|
10 | (1) |
|
1.11 Data Rate and Bandwidth Relationship |
|
|
11 | (1) |
|
|
12 | (5) |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
1.12.6 Variable Data Rate |
|
|
15 | (1) |
|
1.12.7 Multilevel Multiplexing |
|
|
16 | (1) |
|
1.12.8 Multislot Multiplexing |
|
|
16 | (1) |
|
1.12.9 Pulse Stuffing Multiplexing |
|
|
17 | (1) |
|
|
17 | (4) |
|
|
18 | (1) |
|
1.13.2 Frequency Hopping Spread Spectrum (FHSS) |
|
|
18 | (1) |
|
1.13.3 Direct Sequence Spread Spectrum (DSSS) |
|
|
19 | (1) |
|
1.13.4 Comparison between FHSS and DSSS |
|
|
19 | (1) |
|
1.13.5 Advantages of Spread Spectrum |
|
|
20 | (1) |
|
|
21 | (4) |
|
|
21 | (1) |
|
1.14.2 Characteristics of a Line Code |
|
|
22 | (1) |
|
|
22 | (3) |
|
|
25 | (10) |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
2.4 Data Communication Standards and Organizations |
|
|
27 | (1) |
|
|
27 | (4) |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
32 | (1) |
|
2.8 Classification of Networks |
|
|
33 | (1) |
|
2.9 Interconnection of Networks |
|
|
33 | (2) |
|
|
35 | (18) |
|
|
35 | (1) |
|
3.2 A Three Layered Model |
|
|
35 | (2) |
|
|
37 | (8) |
|
|
40 | (1) |
|
|
40 | (1) |
|
|
41 | (1) |
|
|
42 | (1) |
|
|
43 | (1) |
|
|
44 | (1) |
|
|
44 | (1) |
|
3.4 TCP/IP Protocol Suite |
|
|
45 | (8) |
|
|
45 | (1) |
|
3.4.2 Protocol Architecture |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
48 | (2) |
|
|
50 | (1) |
|
3.4.4 PDUs in Architecture |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
52 | (1) |
|
|
52 | (1) |
|
|
52 | (1) |
|
|
52 | (1) |
|
Chapter 4 Networks in Process Automation |
|
|
53 | (10) |
|
|
53 | (1) |
|
4.2 Communication Hierarchy in Factory Automation |
|
|
53 | (2) |
|
|
55 | (4) |
|
|
56 | (1) |
|
4.3.2 Network and Protocol Standards |
|
|
57 | (1) |
|
|
58 | (1) |
|
4.4 The OSI Reference Model |
|
|
59 | (1) |
|
4.5 Networking at I/O and Field Levels |
|
|
60 | (2) |
|
4.6 Networking at Control Level |
|
|
62 | (1) |
|
4.7 Networking at Enterprise/Management Level |
|
|
62 | (1) |
|
|
63 | (12) |
|
|
63 | (5) |
|
|
65 | (1) |
|
5.1.2 Architectural Progress |
|
|
65 | (1) |
|
|
66 | (1) |
|
5.1.4 Expanded Network View |
|
|
67 | (1) |
|
|
68 | (3) |
|
|
69 | (1) |
|
|
70 | (1) |
|
5.2.3 Tree (Chicken foot) |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
72 | (3) |
|
Chapter 6 Highway Addressable Remote Transducer (HART) |
|
|
75 | (14) |
|
|
75 | (1) |
|
6.2 Evolution and Adaptation of Hart Protocol |
|
|
76 | (1) |
|
6.3 Hart and Smart Devices |
|
|
76 | (1) |
|
6.4 Hart Encoding and Waveform |
|
|
77 | (1) |
|
|
77 | (1) |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
79 | (1) |
|
|
80 | (1) |
|
6.10 Field Device Calibration |
|
|
81 | (1) |
|
6.11 Hart Communication Layers |
|
|
82 | (2) |
|
|
82 | (1) |
|
|
83 | (1) |
|
|
84 | (1) |
|
6.12 Installation and Guidelines for Hart Networks |
|
|
84 | (1) |
|
|
85 | (1) |
|
6.14 Application in Control Systems |
|
|
85 | (1) |
|
6.15 Application in SCADA |
|
|
86 | (1) |
|
|
86 | (3) |
|
Chapter 7 Foundation Fieldbus |
|
|
89 | (30) |
|
|
89 | (1) |
|
7.2 Definition and Features |
|
|
89 | (1) |
|
7.3 Foundation Fieldbus Data Types |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
91 | (2) |
|
7.7.1 Interoperability of Subsystems |
|
|
92 | (1) |
|
|
92 | (1) |
|
|
92 | (1) |
|
|
93 | (1) |
|
7.8 The Communication Process |
|
|
93 | (10) |
|
7.8.1 OSI Reference Model |
|
|
94 | (1) |
|
|
94 | (1) |
|
|
94 | (1) |
|
7.8.3.1 Manchester Coding |
|
|
95 | (1) |
|
|
95 | (1) |
|
|
96 | (1) |
|
7.8.4.1 Medium Access Control (MAC) |
|
|
97 | (1) |
|
|
97 | (1) |
|
7.8.4.3 Link Active Scheduler and Device Types |
|
|
97 | (4) |
|
|
101 | (1) |
|
7.8.5.1 Fieldbus Access Sublayer |
|
|
101 | (2) |
|
7.8.5.2 Fieldbus Message Specification |
|
|
103 | (1) |
|
7.9 Technology of Foundation Fieldbus |
|
|
103 | (7) |
|
7.9.1 User Application Blocks |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
7.9.3.1 Function Block Library |
|
|
105 | (1) |
|
7.9.3.2 Function Block Scheduling |
|
|
106 | (1) |
|
7.9.3.3 Application Clock Distribution |
|
|
107 | (1) |
|
7.9.3.4 Macrocycle and Elementary Cycle |
|
|
107 | (1) |
|
7.9.3.5 Device Address Assignment |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
109 | (1) |
|
|
110 | (1) |
|
7.10 Linking and Scheduling of Blocks |
|
|
110 | (1) |
|
|
111 | (2) |
|
7.11.1 Device Description (DD) |
|
|
111 | (1) |
|
7.11.2 Device Description Language (DDL) |
|
|
111 | (1) |
|
|
112 | (1) |
|
|
112 | (1) |
|
|
112 | (1) |
|
|
113 | (1) |
|
7.11.7 Device Identification |
|
|
113 | (1) |
|
|
113 | (4) |
|
7.12.1 Host Level Redundancy |
|
|
114 | (1) |
|
7.12.1.1 Media Redundancy |
|
|
114 | (1) |
|
7.12.1.2 Network Redundancy |
|
|
115 | (1) |
|
|
116 | (1) |
|
7.12.3 Transmitter Redundancy |
|
|
117 | (1) |
|
|
117 | (1) |
|
7.14 System Configuration |
|
|
117 | (2) |
|
|
118 | (1) |
|
7.14.2 Device Configuration |
|
|
118 | (1) |
|
|
119 | (26) |
|
|
119 | (1) |
|
|
119 | (1) |
|
8.3 Transmission Technology |
|
|
120 | (2) |
|
8.4 Communication Protocols |
|
|
122 | (1) |
|
|
123 | (1) |
|
8.6 PROFIBUS in Automation |
|
|
123 | (1) |
|
8.7 OSI Model of PROFIBUS Protocol Stack |
|
|
124 | (1) |
|
8.8 PROFIBUS DP Characteristics |
|
|
124 | (9) |
|
|
126 | (1) |
|
8.8.1.1 Diagnostic Functions |
|
|
126 | (1) |
|
8.8.1.2 Synchronization and Freeze Mode |
|
|
126 | (1) |
|
8.8.1.3 System Configuration |
|
|
126 | (1) |
|
|
126 | (1) |
|
8.8.1.5 Token Passing Characteristics |
|
|
127 | (1) |
|
|
127 | (1) |
|
8.8.2.1 Cyclic and Acyclic Communication |
|
|
127 | (2) |
|
|
129 | (1) |
|
8.8.3.1 Slave-to-Slave Communication |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
130 | (1) |
|
8.8.3.4 Upload and Download |
|
|
130 | (1) |
|
|
130 | (1) |
|
8.8.4 Communication Profile |
|
|
131 | (1) |
|
|
131 | (1) |
|
8.8.5.1 Transmission Speed vs. Segment Lengths |
|
|
132 | (1) |
|
|
132 | (1) |
|
8.9 PROFIBUS PA Characteristics |
|
|
133 | (6) |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
137 | (1) |
|
|
137 | (1) |
|
8.9.3.4 Device Management Block |
|
|
137 | (2) |
|
8.10 Network Configuration |
|
|
139 | (1) |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
141 | (1) |
|
|
142 | (1) |
|
8.16 PROFIBUS International |
|
|
142 | (1) |
|
8.17 Foundation Fieldbus and PROFIBUS--A Comparison |
|
|
143 | (2) |
|
Chapter 9 Modbus and Modbus Plus |
|
|
145 | (12) |
|
|
145 | (1) |
|
|
146 | (1) |
|
|
147 | (1) |
|
9.4 Communication Transactions |
|
|
147 | (3) |
|
9.4.1 Master-Slave and Broadcast Communication |
|
|
148 | (1) |
|
9.4.2 Query-Response Cycle |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
150 | (1) |
|
9.4.2.4 Error Check Field |
|
|
150 | (1) |
|
9.5 Protocol Description: PDU and ADU |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
152 | (1) |
|
|
152 | (1) |
|
9.9 Introduction to Modbus Plus |
|
|
153 | (1) |
|
|
154 | (1) |
|
9.11 Networking Modbus Plus |
|
|
155 | (2) |
|
|
157 | (6) |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
158 | (1) |
|
10.3.1 Speed vs. Bus Length |
|
|
158 | (1) |
|
|
158 | (1) |
|
|
159 | (1) |
|
|
159 | (3) |
|
|
162 | (1) |
|
10.7 Types of Errors and Error States |
|
|
162 | (1) |
|
|
163 | (6) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
166 | (1) |
|
11.8 Power Supply and Cables |
|
|
167 | (1) |
|
|
167 | (2) |
|
|
169 | (6) |
|
|
169 | (1) |
|
|
169 | (1) |
|
|
169 | (1) |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
172 | (1) |
|
12.9 Modulation Technique |
|
|
173 | (2) |
|
|
175 | (4) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
|
177 | (2) |
|
|
179 | (10) |
|
|
179 | (1) |
|
|
179 | (1) |
|
|
180 | (2) |
|
|
182 | (2) |
|
|
184 | (5) |
|
|
184 | (1) |
|
|
184 | (3) |
|
|
187 | (2) |
|
|
189 | (12) |
|
|
189 | (1) |
|
|
189 | (1) |
|
15.3 Producer-Consumer Model |
|
|
189 | (1) |
|
|
190 | (2) |
|
15.5 Controlnet Configuration |
|
|
192 | (1) |
|
|
192 | (1) |
|
|
193 | (1) |
|
15.8 Network Access Mechanism |
|
|
194 | (4) |
|
15.9 Network and Transport Layer |
|
|
198 | (1) |
|
|
199 | (1) |
|
|
200 | (1) |
|
Chapter 16 Common Industrial Protocol |
|
|
201 | (12) |
|
|
201 | (1) |
|
|
202 | (1) |
|
16.3 Family of CIP Networks |
|
|
202 | (1) |
|
|
202 | (3) |
|
|
204 | (1) |
|
16.4.1.1 Required Objects |
|
|
204 | (1) |
|
16.4.1.2 Optional Objects |
|
|
204 | (1) |
|
16.4.1.3 Application Objects |
|
|
204 | (1) |
|
16.4.1.4 Vendor-Specific Objects |
|
|
205 | (1) |
|
16.4.2 A Typical Device Object Model |
|
|
205 | (1) |
|
16.5 CIP Messaging Protocols |
|
|
205 | (5) |
|
16.5.1 Implicit and Explicit Messaging Connections |
|
|
205 | (5) |
|
16.6 CIP Application Layer Enhancements |
|
|
210 | (1) |
|
|
210 | (1) |
|
|
210 | (1) |
|
|
210 | (1) |
|
16.7 Network Independence of CIP Safety |
|
|
210 | (1) |
|
|
211 | (2) |
|
Chapter 17 Ethernet and Ethernet/IP |
|
|
213 | (12) |
|
17.1 Introduction to Ethernet |
|
|
213 | (2) |
|
17.1.1 Different Generations of Ethernet |
|
|
213 | (1) |
|
17.1.2 Frame Format and Length |
|
|
213 | (2) |
|
|
215 | (1) |
|
17.3 Evolution of Real-Time Fieldbuses |
|
|
215 | (1) |
|
17.4 Real-Time Deterministic Fieldbus Realization |
|
|
216 | (1) |
|
17.5 Introduction to Ethernet/IP |
|
|
217 | (1) |
|
|
218 | (1) |
|
17.7 Ethernet/IP Layer Model |
|
|
218 | (1) |
|
17.8 Producer-Consumer Model |
|
|
219 | (1) |
|
17.9 Infrastructure For Ethernet/IP Applications |
|
|
219 | (1) |
|
17.10 Characterization of Ethernet/IP Traffic |
|
|
220 | (1) |
|
17.11 Coexistence of Ethernet/IP with CIP |
|
|
220 | (1) |
|
17.12 Message Prioritization in Ehernet/IP |
|
|
221 | (4) |
|
|
225 | (12) |
|
|
225 | (1) |
|
|
225 | (1) |
|
18.3 Ethernet-Based Working of Ethercat |
|
|
226 | (2) |
|
|
228 | (1) |
|
|
228 | (2) |
|
|
230 | (1) |
|
|
230 | (2) |
|
18.8 Fieldbus Memory Management Unit |
|
|
232 | (1) |
|
18.9 Safety Over Ethercat |
|
|
233 | (2) |
|
|
235 | (1) |
|
|
235 | (2) |
|
|
237 | (14) |
|
|
237 | (1) |
|
|
237 | (1) |
|
|
238 | (1) |
|
19.4 Configuration of Communication Cycle |
|
|
238 | (1) |
|
|
239 | (3) |
|
19.6 Communication Mechanism |
|
|
242 | (1) |
|
19.7 Hard and Soft Master |
|
|
242 | (1) |
|
|
242 | (2) |
|
19.9 Peer-To-Peer Communication |
|
|
244 | (1) |
|
19.10 Coexistence of Ethernet and TCP/IP Protocols |
|
|
244 | (2) |
|
19.11 Fieldbus Integration |
|
|
246 | (1) |
|
19.12 Sercos vs. Ethercat |
|
|
246 | (1) |
|
|
247 | (4) |
|
Chapter 20 Ethernet Powerlink |
|
|
251 | (6) |
|
|
251 | (1) |
|
|
252 | (1) |
|
20.3 Powerlink Architecture |
|
|
252 | (1) |
|
|
253 | (1) |
|
|
254 | (1) |
|
|
254 | (1) |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
256 | (1) |
|
|
257 | (8) |
|
|
257 | (1) |
|
|
257 | (1) |
|
|
257 | (1) |
|
21.4 Real-Time Communication--Hard and Soft Real Time |
|
|
258 | (1) |
|
21.5 Realization of Faster Operation |
|
|
259 | (1) |
|
|
260 | (2) |
|
21.7 Time Sensitive Networking (TSN) |
|
|
262 | (1) |
|
|
262 | (3) |
|
Chapter 22 Intrinsically Safe Fieldbus Systems |
|
|
265 | (12) |
|
|
265 | (1) |
|
|
265 | (1) |
|
22.3 Hazardous Area Classification |
|
|
266 | (1) |
|
22.3.1 Division Classification System |
|
|
266 | (1) |
|
22.3.2 Zone Classification System |
|
|
266 | (1) |
|
22.4 Explosion Protection Types |
|
|
266 | (1) |
|
22.5 Intrinsic Safety in Fieldbud Systems |
|
|
267 | (2) |
|
|
269 | (1) |
|
|
270 | (1) |
|
22.8 Redundant Fisco Model |
|
|
271 | (1) |
|
22.9 Multi Drop Fisco Model |
|
|
272 | (1) |
|
|
272 | (1) |
|
|
273 | (2) |
|
22.12 Performance Summary |
|
|
275 | (1) |
|
|
276 | (1) |
|
Chapter 23 Wiring, Installation, and Commissioning |
|
|
277 | (26) |
|
|
277 | (1) |
|
|
277 | (2) |
|
|
278 | (1) |
|
23.2.2 Device Commissioning |
|
|
279 | (1) |
|
23.3 Building a Fieldbus Network |
|
|
279 | (9) |
|
23.3.1 Multi Fieldbus Devices |
|
|
280 | (1) |
|
23.3.2 Expanding the Network |
|
|
281 | (1) |
|
23.3.2.1 Network Interface Cards (NICs) |
|
|
282 | (1) |
|
|
283 | (1) |
|
|
283 | (2) |
|
|
285 | (1) |
|
|
286 | (1) |
|
|
287 | (1) |
|
|
288 | (1) |
|
23.3.2.8 Routers vs. Gateways |
|
|
288 | (1) |
|
23.4 Powering the Fieldbus Devices |
|
|
288 | (1) |
|
|
289 | (1) |
|
|
290 | (1) |
|
23.7 Number of Spurs and Devices per Segment |
|
|
291 | (1) |
|
|
291 | (1) |
|
|
292 | (1) |
|
|
292 | (2) |
|
|
294 | (1) |
|
23.12 Communication Signals |
|
|
294 | (3) |
|
23.13 Device Commissining |
|
|
297 | (1) |
|
23.13.1 Foundation Fieldbus Device Commissioning |
|
|
297 | (1) |
|
23.13.2 Profibus PA Fieldbus Device Commissioning |
|
|
298 | (1) |
|
|
298 | (1) |
|
23.15 Addressing Via Ethernet |
|
|
298 | (1) |
|
|
299 | (1) |
|
23.16.1 IEEE Ethernet Standards |
|
|
299 | (1) |
|
|
299 | (1) |
|
|
300 | (1) |
|
|
301 | (1) |
|
|
302 | (1) |
|
23.19 Manual IP Configuration |
|
|
302 | (1) |
|
23.20 Automatic IP Configuration |
|
|
302 | (1) |
|
Chapter 24 Wireless Sensor Networks |
|
|
303 | (14) |
|
|
303 | (1) |
|
24.2 Wired versus Wireless: A Comparison |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
304 | (2) |
|
|
306 | (1) |
|
24.6 A Network of Sensors |
|
|
307 | (1) |
|
24.7 Features ot a Wireless Sensor Network |
|
|
308 | (1) |
|
24.8 Challenges in a Wireless Sensor Network |
|
|
308 | (1) |
|
24.9 Connectivity Constraints into Internet |
|
|
308 | (1) |
|
|
309 | (2) |
|
|
311 | (2) |
|
24.12 Conventional, Fieldbus, and Wireless Network Architecture: A Comparison |
|
|
313 | (1) |
|
24.13 Protocols in Wireless Sensor Networks |
|
|
313 | (2) |
|
|
315 | (2) |
|
Chapter 25 Wireless HART (WHART) |
|
|
317 | (26) |
|
|
317 | (1) |
|
|
318 | (1) |
|
25.3 WHART Network Architecture |
|
|
319 | (1) |
|
|
319 | (5) |
|
|
319 | (1) |
|
|
320 | (2) |
|
|
322 | (1) |
|
|
323 | (1) |
|
|
324 | (1) |
|
|
324 | (3) |
|
|
325 | (1) |
|
|
326 | (1) |
|
|
326 | (1) |
|
|
327 | (1) |
|
|
327 | (1) |
|
25.7 Coexistence Techniques |
|
|
327 | (2) |
|
|
328 | (1) |
|
|
328 | (1) |
|
25.7.3 Low Power Transmission |
|
|
329 | (1) |
|
25.7.4 Blacklisting and Channel Assessment |
|
|
329 | (1) |
|
|
329 | (1) |
|
25.8 Time Synchronized Mesh Protocol (TSMP) |
|
|
329 | (1) |
|
|
330 | (2) |
|
25.9.1 OSI Layer Based Security in HART and WHART |
|
|
330 | (1) |
|
25.9.2 End-To-End Security |
|
|
330 | (1) |
|
|
331 | (1) |
|
25.9.3.1 Security Control Byte |
|
|
332 | (1) |
|
25.9.3.2 Message Integrity Code (MIC) |
|
|
332 | (1) |
|
|
332 | (4) |
|
|
332 | (1) |
|
|
333 | (1) |
|
|
333 | (1) |
|
|
334 | (1) |
|
|
334 | (1) |
|
|
334 | (1) |
|
|
334 | (1) |
|
|
335 | (1) |
|
|
335 | (1) |
|
|
335 | (1) |
|
25.10.11 Selective Fordwarding Attack |
|
|
336 | (1) |
|
25.10.12 Desynchronization |
|
|
336 | (1) |
|
|
336 | (2) |
|
25.11.1 Redundancy in WSN |
|
|
336 | (1) |
|
25.11.2 Redundancy at Network Access Points |
|
|
337 | (1) |
|
25.11.3 Redundancy at Gateway, Network Manager, and Security Manager |
|
|
337 | (1) |
|
25.12 Security Keys in WHART |
|
|
338 | (1) |
|
|
338 | (1) |
|
|
339 | (1) |
|
|
339 | (1) |
|
|
339 | (1) |
|
|
339 | (1) |
|
|
339 | (2) |
|
|
340 | (1) |
|
|
340 | (1) |
|
|
340 | (1) |
|
|
340 | (1) |
|
|
341 | (1) |
|
|
341 | (1) |
|
25.14 WHART Network Formation |
|
|
341 | (1) |
|
25.15 HART and WHART--A Comparison |
|
|
341 | (1) |
|
25.16 HART and WHART--Integration |
|
|
341 | (2) |
|
|
343 | (30) |
|
|
343 | (1) |
|
|
343 | (1) |
|
26.3 ISA100 Working Group |
|
|
344 | (1) |
|
|
344 | (1) |
|
|
344 | (1) |
|
26.6 System Configuration |
|
|
344 | (1) |
|
26.7 Convergence Between ISA 100.11A and WHART |
|
|
345 | (1) |
|
|
346 | (1) |
|
|
346 | (5) |
|
26.9.1 Differences With WHART |
|
|
348 | (1) |
|
26.9.2 Routing Ability of Devices |
|
|
348 | (1) |
|
|
349 | (1) |
|
26.9.4 Provisioning Device |
|
|
349 | (1) |
|
|
349 | (1) |
|
26.9.6 Device Management Data Flow |
|
|
349 | (1) |
|
26.9.7 System Management Architecture |
|
|
350 | (1) |
|
26.9.8 System Management Application Process |
|
|
350 | (1) |
|
26.10 Comparison Between ISA 100.11A and WHART Protocol Stacks |
|
|
351 | (1) |
|
|
352 | (1) |
|
|
352 | (4) |
|
26.12.1 Protocol Data Unit |
|
|
352 | (1) |
|
26.12.2 Coexistence Issues in DLL |
|
|
352 | (1) |
|
|
353 | (1) |
|
26.12.2.2 Collision Avoidance |
|
|
354 | (1) |
|
26.12.2.3 Frequency Diversity |
|
|
354 | (1) |
|
26.12.2.4 Spectrum Management |
|
|
355 | (1) |
|
|
355 | (1) |
|
26.12.4 Neighborhood Discovery |
|
|
355 | (1) |
|
26.12.5 DLL Characteristics |
|
|
356 | (1) |
|
|
356 | (2) |
|
|
357 | (1) |
|
|
357 | (1) |
|
26.13.3 Data Flow between Two Subnets |
|
|
357 | (1) |
|
|
358 | (1) |
|
26.14.1 Protocol Data Unit |
|
|
358 | (1) |
|
|
359 | (1) |
|
26.14.3 Session and Contract |
|
|
359 | (1) |
|
|
359 | (3) |
|
|
360 | (1) |
|
26.15.2 Protocol Data Unit |
|
|
360 | (1) |
|
26.15.3 Communication Model |
|
|
360 | (1) |
|
26.15.4 Objects, Their Addressing, and Merits |
|
|
360 | (2) |
|
|
362 | (1) |
|
26.15.5.1 Gateway Service Access Point |
|
|
362 | (1) |
|
|
362 | (2) |
|
26.16.1 Joining by Symmetric Key--A Comparison Between ISA100.11A and WHART |
|
|
362 | (1) |
|
26.16.1.1 Protection of Join Messages |
|
|
362 | (2) |
|
26.16.1.2 Key Agreement and Distribution |
|
|
364 | (1) |
|
|
364 | (1) |
|
26.16.2.1 Security Policy |
|
|
364 | (1) |
|
26.17 Provisioning Overview |
|
|
364 | (3) |
|
|
365 | (1) |
|
26.17.2 Configuration Bits |
|
|
365 | (1) |
|
26.17.3 Requirements for Joining |
|
|
366 | (1) |
|
26.18 Data Delivery Reliability |
|
|
367 | (1) |
|
|
367 | (1) |
|
26.20 Communications in ISA100.11A |
|
|
367 | (3) |
|
26.21 ISA11.11A and WHART--A Comparison |
|
|
370 | (1) |
|
|
371 | (2) |
Index |
|
373 | |