Preface |
|
xiii | |
Preambles |
|
xv | |
Acknowledgments |
|
xxiii | |
Editorial Board |
|
xxv | |
Editors |
|
xxvii | |
Contributors |
|
xxxi | |
|
PART I Technical Principles |
|
|
|
|
1 | (1) |
|
|
|
|
|
|
|
Vertical and Horizontal Communication |
|
|
|
Dynamic Behavior of Services and Protocols |
|
|
|
Extensions, Benefits, and Discussion |
|
|
|
|
|
|
2 | (1) |
|
|
|
|
|
1 | (1) |
|
|
1 | (6) |
|
|
|
Cable Types and Operational Characteristics |
|
|
|
Single-Ended and Differential Transmission |
|
|
|
Simplex and Duplex Communication Bit Encoding |
|
|
|
|
|
Data Transmission Utilizing Existing Cable Infrastructure |
|
|
|
|
7 | (4) |
|
|
|
|
|
Transmitters and Receivers |
|
|
|
Multiplexing Implementations and Standards |
|
|
|
|
11 | (6) |
|
|
|
|
|
|
|
|
|
Realizations and Standards |
|
|
|
|
17 | |
|
|
3 | (1) |
|
|
|
|
1 | (1) |
|
3.2 Full-Duplex Media Access |
|
|
2 | (1) |
|
3.3 Synchronous Access Arbitration Concepts |
|
|
3 | (1) |
|
Static Timeslot Mechanisms |
|
|
|
Dynamic Timeslot Mechanisms |
|
|
|
3.4 Statistic Access Arbitration Concepts |
|
|
3 | (1) |
|
|
|
|
|
|
|
3.5 Carrier Sense Mechanisms with Exponential Backoff |
|
|
4 | (2) |
|
Using Collision Detection |
|
|
|
Using Collision Avoidance |
|
|
|
|
|
|
|
3.6 Other Media Access Issues |
|
|
6 | (1) |
|
|
|
|
|
|
|
|
|
|
7 | |
|
4 Routing in Wireless Networks |
|
|
4 | (1) |
|
|
|
|
1 | (3) |
|
4.2 Routing Protocols and Classification |
|
|
4 | (1) |
|
4.3 Routing Protocol Families for Ad Hoc Networks |
|
|
5 | (1) |
|
Proactive Routing Protocols |
|
|
|
Reactive Routing Protocols |
|
|
|
4.4 Routing Protocol Families for Wireless Sensor Networks |
|
|
6 | (1) |
|
|
|
Hierarchical Routing Protocols |
|
|
|
Location-Based Routing Protocols |
|
|
|
4.5 Summary of the Main Routing Protocols in Wireless Networks |
|
|
7 | (6) |
|
Optimized Link-State Routing Protocol |
|
|
|
Topology Dissemination Based on Reverse Path Forwarding |
|
|
|
Dynamic Source Routing Protocol |
|
|
|
Ad Hoc On-Demand Distance Vector Routing Protocol |
|
|
|
Dynamic MANET On-Demand Routing Protocol |
|
|
|
Sensor Protocols for Information via Negotiation |
|
|
|
Low Energy Adaptive Clustering Hierarchy |
|
|
|
Geographic Adaptive Fidelity |
|
|
|
|
13 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
14 | |
|
5 Profiles and Interoperability |
|
|
5 | (1) |
|
|
|
5.1 Interoperating Components |
|
|
1 | (3) |
|
5.2 Application of Profiles |
|
|
4 | (2) |
|
Function Blocks of IEC 61499 |
|
|
|
Functional Profiles in LON |
|
|
|
Logical Nodes of the IEC 61850 |
|
|
|
5.3 Achieving Interoperability |
|
|
6 | (1) |
|
|
7 | |
|
6 Industrial Wireless Sensor Networks |
|
|
6 | (1) |
|
|
|
|
2 | (1) |
|
|
|
|
|
Industrial Process Automation |
|
|
|
|
|
|
|
|
|
6.2 Standardization Activities |
|
|
3 | (2) |
|
|
|
|
|
|
|
Bluetooth and Bluetooth Low Energy |
|
|
|
|
|
|
5 | (1) |
|
|
6 | (1) |
|
6.5 Design Principles and Technical Approaches |
|
|
7 | (5) |
|
|
|
|
|
System Architecture and Protocol Design |
|
|
|
6.6 Conclusions and Future Work |
|
|
12 | (1) |
|
|
13 | |
|
|
7 | (1) |
|
|
|
|
|
|
1 | (3) |
|
|
|
|
|
Ad Hoc Network Characteristic |
|
|
|
|
|
|
4 | (4) |
|
|
|
|
|
|
|
|
|
7.3 Performance Evaluation |
|
|
8 | (1) |
|
7.4 Challenges and Issues |
|
|
9 | (2) |
|
|
|
|
|
Topology and Connectivity |
|
|
|
|
|
|
11 | |
|
8 Radio Frequency Identification |
|
|
8 | (1) |
|
|
|
|
|
2 | (1) |
|
|
3 | (1) |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
8.9 Innovation verus Hi-Tech |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
8 | (2) |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
13 | (1) |
|
8.18 Supply Chain Management |
|
|
13 | (1) |
|
8.19 International Standard |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
8.22 Hands-Free Bar Code System |
|
|
16 | (1) |
|
|
16 | (2) |
|
|
18 | (1) |
|
|
18 | (2) |
|
|
20 | (1) |
|
8.27 Historical Development |
|
|
20 | (1) |
|
8.28 Privacy Infringement |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
23 | (1) |
|
8.32 Innovative Applications |
|
|
23 | (3) |
|
8.33 Nonionization Radiation |
|
|
26 | (1) |
|
8.34 Era of Artificial Perception |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
29 | |
|
9 RFID Technology and Its Industrial Applications |
|
|
9 | (1) |
|
|
|
|
|
1 | (1) |
|
|
2 | (2) |
|
|
|
|
|
|
|
|
|
9.3 Item Tracking and Tracing |
|
|
4 | (4) |
|
|
|
|
|
|
|
Hospital Equipment Tracking |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8 | (2) |
|
Family Access to Babies in Neonatal Car |
|
|
|
|
|
|
10 | (2) |
|
|
|
|
|
Secure Passports and Visas |
|
|
|
|
|
|
12 | (1) |
|
|
12 | |
|
10 Ultralow-Power Wireless Communication |
|
|
10 | (1) |
|
|
|
|
|
1 | (1) |
|
|
2 | (2) |
|
|
|
|
|
10.3 Communication Protocol Approaches |
|
|
4 | (2) |
|
10.4 Application Layer Approaches |
|
|
6 | (2) |
|
10.5 Conclusion and Open Topics |
|
|
8 | (1) |
|
|
9 | (2) |
|
11 Industrial Strength Wireless Multimedia Sensor Network Technology |
|
|
11 | (1) |
|
|
|
|
|
1 | (1) |
|
11.2 Wireless Sensor Network |
|
|
2 | (2) |
|
|
|
Wireless Multimedia Sensor Networks |
|
|
|
|
4 | (2) |
|
Single-Tier Flat Architecture |
|
|
|
Single-Tier Clustered Architecture |
|
|
|
|
|
|
6 | (2) |
|
Low-Resolution WMSN Motes |
|
|
|
Medium-Resolution WMSN Motes |
|
|
|
High-Resolution WMSN Motes |
|
|
|
11.5 Applications of WMSNs |
|
|
8 | (2) |
|
|
|
|
|
|
|
|
|
|
|
11.6 WMSNs' Technical Challenges |
|
|
10 | (2) |
|
WMSN Application-Specific QoS Requirement |
|
|
|
Scalable and Flexible Architectures and Protocols to Support Heterogeneous Applications |
|
|
|
|
|
Localized Processing and Data Fusion |
|
|
|
|
|
Reliability and Fault Tolerance |
|
|
|
|
|
Integration with IP and Various Other Wireless Technologies |
|
|
|
|
12 | (1) |
|
|
12 | (1) |
|
12 A Survey of Wireless Sensor Networks for Industrial Applications |
|
|
12 | (1) |
|
|
|
|
1 | (1) |
|
12.2 Wireless Sensor Network Basics |
|
|
2 | (1) |
|
|
|
Wireless Sensor Network Stack |
|
|
|
12.3 Motivation and Drivers for Wireless Instrumentation |
|
|
3 | (1) |
|
12.4 Industrial Applications and Requirements |
|
|
4 | (2) |
|
|
|
Reliable Network Performance |
|
|
|
|
|
Friendly Coexistence with Wireless Local Area Networks |
|
|
|
|
|
Operation in Harsh and Hazardous Environments |
|
|
|
12.5 Technology Survey and Evaluation |
|
|
6 | (3) |
|
|
|
|
|
|
|
|
|
Coexistence in the 2.4 GHz Band |
|
|
|
|
9 | (1) |
|
|
9 | (1) |
|
|
9 | (4) |
|
|
13 | (1) |
|
|
|
|
|
1 | (1) |
|
13.2 Historical Background |
|
|
2 | (2) |
|
13.3 Network Interconnections |
|
|
4 | (3) |
|
|
7 | (1) |
|
13.5 Security Aspects in Vertical Integration |
|
|
8 | (2) |
|
13.6 Trends in Vertical Integration |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
12 | (2) |
|
14 Multimedia Service Convergence |
|
|
14 | (1) |
|
|
|
1 | (1) |
|
|
2 | (1) |
|
Computer Telephony Integration |
|
|
|
Voice over Internet Protocol |
|
|
|
Interactive Voice Response Telecom |
|
|
|
14.3 Service-Oriented Architecture |
|
|
3 | (2) |
|
Service Meta Architectures |
|
|
|
|
5 | (1) |
|
14.5 Multimedia Convergence Using Service Architecture |
|
|
5 | (6) |
|
|
|
MC2 Interact Reconfigurable Convergence Architecture |
|
|
|
|
|
|
11 | (1) |
|
|
12 | (3) |
|
15 Virtual Automation Networks |
|
|
15 | (1) |
|
|
|
|
1 | (2) |
|
15.2 Virtual Automation Network: Basics |
|
|
3 | (4) |
|
|
|
|
|
|
|
15.3 Name-Based Addressing and Routing, Runtime Tunnel Establishment |
|
|
7 | (2) |
|
15.4 Maintenance of the Runtime Tunnel Based on Quality-of-Service Monitoring and Provider Switching |
|
|
9 | (2) |
|
15.5 VAN Telecontrol Profile |
|
|
11 | (2) |
|
|
13 | (1) |
|
|
14 | (2) |
|
16 Industrial Agent Technology |
|
|
16 | (1) |
|
|
|
|
|
|
1 | (1) |
|
16.2 Agents and Multi-Agent Systems |
|
|
2 | (4) |
|
Intelligent Agents Definition |
|
|
|
|
|
|
|
Self-Organization and Emergence |
|
|
|
|
|
Holonic Multi-Agent Systems |
|
|
|
How Agents Can Be Implemented |
|
|
|
16.3 Agents and Multi-Agent Systems in Industry |
|
|
6 | (1) |
|
|
6 | (6) |
|
|
|
|
|
|
|
Challenges of Industrial Agents' Usage |
|
|
|
Other Application Areas in Brief |
|
|
|
16.5 Agents and Multi-Agent Systems in Industry: Conclusions |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
13 | (4) |
|
|
17 | (1) |
|
|
|
|
17.1 Introduction on Real-Time Systems |
|
|
1 | (3) |
|
|
|
Real-Time Constraints Characterization |
|
|
|
Typical Application Domains |
|
|
|
Real-Time Scheduling and Relevant Metrics |
|
|
|
17.2 Real-Time Communication |
|
|
4 | (3) |
|
Deterministic vs. Statistical Communication |
|
|
|
Best Effort vs. Guaranteed Service |
|
|
|
|
|
Analytical Methods to Assess Performance of Real-Time Networks |
|
|
|
17.3 Design Paradigms for Real-Time Systems |
|
|
7 | (2) |
|
Centralized vs. Distributed Architectures |
|
|
|
Composability and Scalability |
|
|
|
Time-Triggered vs. Event-Triggered Systems |
|
|
|
Comparison of the Real-Time Support Provided by Notable Approaches |
|
|
|
17.4 Design Challenges in Real-Time Industrial Communication Systems |
|
|
9 | (1) |
|
|
|
Real-Time and Flexibility |
|
|
|
Offering Real-Time Support to Wireless Communication |
|
|
|
|
10 | (8) |
|
18 Clock Synchronization in Distributed Systems |
|
|
18 | (1) |
|
|
|
|
1 | (1) |
|
18.2 Precision Time Protocol |
|
|
1 | (1) |
|
18.3 IEEE 1588 System Model |
|
|
2 | (1) |
|
18.4 Service Access Points |
|
|
3 | (1) |
|
|
3 | (1) |
|
|
4 | (1) |
|
18.7 Precision Time Protocol, IEEE 1588-2008 (PTPv2) |
|
|
5 | (1) |
|
18.8 Network Time Protocol |
|
|
6 | (1) |
|
18.9 Network Time Protocol Strata |
|
|
7 | (1) |
|
18.10 Architecture, Protocol, and Algorithms |
|
|
8 | (1) |
|
18.11 NTP Clock Synchronization Hardware Requirements |
|
|
8 | (1) |
|
18.12 Synchronization Algorithms of NTP |
|
|
8 | (2) |
|
|
10 | (9) |
|
|
19 | (1) |
|
|
|
|
|
|
1 | (2) |
|
19.2 Relationship with Information Security Topics |
|
|
3 | (1) |
|
19.3 Quality of Service for IP Networks |
|
|
4 | (7) |
|
Integrated Services (IntServ) Model |
|
|
|
Differentiated Services (DiffServ) Model |
|
|
|
Classification and Marking |
|
|
|
Queuing and Congestion Management |
|
|
|
19.4 Special Considerations for Managing the Quality of Service |
|
|
11 | (3) |
|
|
|
High Availability Solutions for the Routers |
|
|
|
|
14 | (6) |
|
|
20 | (1) |
|
|
|
|
|
|
|
1 | (1) |
|
20.2 Mutual Concepts in Control and in Communications |
|
|
2 | (1) |
|
20.3 Architecture of Networked-Based Control |
|
|
2 | (4) |
|
|
|
20.4 Network Effects in Control Performance |
|
|
6 | (1) |
|
|
6 | (1) |
|
Design Constraints in the Network Side |
|
|
|
Design Constraints in the Control Side |
|
|
|
Network and Control Co-Design |
|
|
|
|
7 | (1) |
|
|
8 | (13) |
|
|
21 | (1) |
|
|
|
|
1 | (1) |
|
21.2 The Meaning of Safety |
|
|
1 | (1) |
|
|
2 | (2) |
|
Overview of Safety Standards |
|
|
|
|
|
21.4 The Safety Lifecycle and Safety Methods |
|
|
4 | (4) |
|
|
|
|
|
|
|
|
|
|
|
21.5 Safety Approach for Industrial Communication System |
|
|
8 | (7) |
|
Overview of Safety-Related Systems |
|
|
|
|
|
|
|
|
15 | (1) |
|
|
15 | (7) |
|
22 Security in Industrial Communication Systems |
|
|
22 | (1) |
|
|
|
22.1 Introduction to Security in Industrial Communication |
|
|
1 | (2) |
|
22.2 Planned Approach to Security: Defense in Depth |
|
|
3 | (1) |
|
22.3 Security Measures to Counteract Network Attacks |
|
|
4 | (5) |
|
|
|
|
|
|
|
DoS Prevention and Detection |
|
|
|
22.4 Security Measures to Counteract Device Attacks |
|
|
9 | (3) |
|
Protected Hardware and Security Token |
|
|
|
Secure Software Environments |
|
|
|
22.5 State of the Art in Automation Systems |
|
|
12 | (3) |
|
Security in Building Automation Systems |
|
|
|
Security in Industrial Communication |
|
|
|
Security in IP-Based Networks |
|
|
|
Security in Wireless Communication Systems |
|
|
|
22.6 Outlook and Conclusion |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
16 | (7) |
|
23 Secure Communication Using Chaos Synchronization |
|
|
23 | (1) |
|
|
|
|
1 | (1) |
|
23.2 Chaos Synchronization |
|
|
2 | (6) |
|
Feedback Control for Chaos Synchronization via Partial States |
|
|
|
Adaptive Control for Chaos Synchronization via Partial States |
|
|
|
Impulsive Control for Chaos Synchronization via Partial States |
|
|
|
Practical Impulsive Synchronization of Chaotic Systems with Parametric Uncertainty and Mismatch |
|
|
|
23.3 Secure Communication Using Chaos Synchronization |
|
|
8 | (5) |
|
Secure Communication Schema |
|
|
|
|
|
|
|
Synchronization Time Estimation |
|
|
|
|
|
|
13 | (11) |
|
PART II Application-Specific Areas |
|
|
|
24 Embedded Networks in Civilian Aircraft Avionics Systems |
|
|
24 | (1) |
|
|
|
|
|
1 | (1) |
|
24.2 Avionics Systems Evolution and ARINC Context |
|
|
2 | (1) |
|
24.3 Classic Avionics and ARINC 429 |
|
|
3 | (1) |
|
24.4 Integrated Modular Avionics |
|
|
4 | (1) |
|
24.5 ARINC 629 Multiplexed Data Bus |
|
|
5 | (2) |
|
|
|
|
|
24.6 ARINC 664: Avionics Full-Duplex Ethernet |
|
|
7 | (6) |
|
Full-Duplex Switched Ethernet |
|
|
|
|
|
|
|
|
|
Network Redundancy for Safety and Fault Tolerance |
|
|
|
24.7 AFDX End-to-End Delay Analysis |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
15 | (10) |
|
|
25 | (1) |
|
|
|
|
1 | (2) |
|
25.2 Structures and Models of Batch Manufacturing Systems |
|
|
3 | (5) |
|
|
|
|
|
|
|
|
|
|
|
Classification of Process Cells |
|
|
|
Tasks and Functions of a Batch Management and Operation System |
|
|
|
Integration of Batch Management and Operation System with Other Information Systems |
|
|
|
25.3 Currently Applied Communication Systems |
|
|
8 | (1) |
|
25.4 Upcoming Requirements of Distributed Process Automation |
|
|
8 | (2) |
|
25.5 Industrial Ethernet as the "Silver Bullet" for Future Process Automation Communication Needs |
|
|
10 | (1) |
|
|
11 | (15) |
|
26 Building and Home Automation |
|
|
26 | (1) |
|
|
|
|
|
|
1 | (1) |
|
|
1 | (7) |
|
|
|
|
|
Technologies and Integration Aspects |
|
|
|
|
|
|
8 | (5) |
|
|
|
Technologies and Integration Aspects |
|
|
|
|
|
26.4 Outlook and Further Challenges |
|
|
13 | (1) |
|
|
14 | (13) |
|
|
27 | (1) |
|
|
|
|
|
1 | (3) |
|
27.2 Multimedia Compression: A Review |
|
|
4 | (4) |
|
|
|
|
|
|
|
27.3 Industrial Multimedia Applications |
|
|
8 | (1) |
|
|
|
Computer Vision Applications |
|
|
|
|
9 | (2) |
|
|
|
|
|
|
11 | (1) |
|
|
11 | (1) |
|
|
11 | (17) |
|
28 Industrial Wireless Communications Security (IWCS)/C42 |
|
|
28 | (1) |
|
|
|
|
1 | (1) |
|
28.2 Wireless LAN Security |
|
|
2 | (4) |
|
Security Issues/Attacks on WiFi |
|
|
|
|
|
|
|
|
6 | (2) |
|
|
8 | (1) |
|
|
8 | (21) |
|
29 Protocols in Power Generation |
|
|
29 | (1) |
|
|
|
|
1 | (1) |
|
29.2 Power Plant Automation Systems and Intra-Plant Communications |
|
|
2 | (2) |
|
Example of Nuclear Power Plant Automation |
|
|
|
Systems Safety Requirements and System Classifications (IEC 61226, FIA, FIB, F2) |
|
|
|
29.3 Power Plant Information Systems and Extra-Plant Communications |
|
|
4 | (3) |
|
|
|
Distributed Energy Resource Model |
|
|
|
|
7 | (1) |
|
|
7 | (23) |
|
30 Communications in Medical Applications |
|
|
30 | (1) |
|
|
|
|
|
|
1 | (1) |
|
|
2 | (2) |
|
|
4 | (1) |
|
|
5 | (4) |
|
|
|
|
|
|
|
|
|
|
|
Nonindustrial Technologies |
|
|
|
|
9 | (3) |
|
|
|
|
|
30.6 Issues and Challenges |
|
|
12 | (2) |
|
|
|
|
|
|
|
|
|
|
14 | (17) |
|
|
|
31 Controller Area Network |
|
|
31 | (1) |
|
|
|
|
1 | (1) |
|
31.2 CAN Technology Basics |
|
|
2 | (4) |
|
|
|
|
|
Detecting and Signaling Errors |
|
|
|
|
|
31.3 CAN-Based Upper Layer Protocols |
|
|
6 | (6) |
|
|
|
|
|
|
|
|
|
|
12 | (2) |
|
Consequences of Faults at the Node Level |
|
|
|
|
14 | (1) |
|
|
14 | (18) |
|
|
32 | (1) |
|
|
|
|
1 | (1) |
|
32.2 Physical Transmissions |
|
|
2 | (3) |
|
|
|
|
|
|
|
|
5 | (2) |
|
|
|
|
|
|
|
|
7 | (2) |
|
DP-Master Class 1 Controllers |
|
|
|
DP-Master Class 2 Engineering Stations |
|
|
|
|
|
|
|
32.5 Cyclic Data Exchange: MSO---Relation |
|
|
9 | (1) |
|
|
|
Initialization and Supervision of the Relation |
|
|
|
Status of the Controller and Fail-Safe Functionality |
|
|
|
Diagnostics of the Field-Device |
|
|
|
|
|
Synchronization of the Applications |
|
|
|
32.6 Acyclic Data Exchange: MS1/MS2 Relations |
|
|
10 | (2) |
|
|
|
Device Model including Identification and Maintenance |
|
|
|
|
|
|
|
32.7 Application Profiles |
|
|
12 | (1) |
|
|
12 | (21) |
|
|
33 | (1) |
|
|
|
|
1 | (1) |
|
|
2 | (5) |
|
|
7 | (1) |
|
33.4 Performance Evaluation |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
9 | (25) |
|
|
34 | (1) |
|
|
|
|
1 | (1) |
|
|
2 | (1) |
|
|
2 | (4) |
|
Transmission of Cyclic Traffic |
|
|
|
|
|
Transmission of Asynchronous Traffic |
|
|
|
|
6 | (1) |
|
34.5 Timing Properties of WorldFIP Networks |
|
|
7 | (11) |
|
Concept of Producer/Distributor/Consumer |
|
|
|
|
|
|
|
WorldFIP Aperiodic Buffer Transfers |
|
|
|
Setting the WorldFIP BAT: Rate Monotonic Approach |
|
|
|
|
18 | (17) |
|
|
35 | (1) |
|
|
|
|
|
1 | (1) |
|
35.2 Foundation Fieldbus Overview |
|
|
1 | (1) |
|
|
2 | (1) |
|
35.4 Drivers (DD, EDDL, and FDT/DTM) |
|
|
3 | (1) |
|
|
3 | (1) |
|
|
4 | (1) |
|
35.7 FFPS---Fieldbus Power Supplies |
|
|
5 | (1) |
|
35.8 Installation of Segment in Safe Areas |
|
|
6 | (1) |
|
35.9 Installation of Segments in Classified Areas |
|
|
7 | (1) |
|
FISCO---Fieldbus Intrinsically Safe COncept |
|
|
|
High-Energy Trunk--Fieldbus Barrier Solution |
|
|
|
35.10 Project Documentation |
|
|
8 | (1) |
|
35.11 Installations and Commissioning |
|
|
8 | (2) |
|
|
10 | (1) |
|
|
10 | (26) |
|
|
36 | (1) |
|
|
|
|
1 | (1) |
|
36.2 Modbus Interaction and Data Models |
|
|
1 | (2) |
|
36.3 Modbus Protocol Architecture |
|
|
3 | (1) |
|
36.4 Modbus Application Layer |
|
|
4 | (4) |
|
|
|
|
|
|
|
|
|
|
8 | (4) |
|
|
|
|
|
|
|
|
|
|
|
|
12 | (1) |
|
|
|
|
13 | (2) |
|
|
15 | (1) |
|
|
16 | (21) |
|
|
37 | (1) |
|
|
|
|
1 | (1) |
|
|
2 | (3) |
|
|
|
What Does Industrial Mean? |
|
|
|
Classification of Industrial Ethernet Solutions |
|
|
|
37.3 Standardized Solutions of IEC 61158 and IEC 61784 |
|
|
5 | (4) |
|
|
|
Foundation Fieldbus High-Speed Ethernet |
|
|
|
|
|
"Exotic Solutions": EPA, Tenet, Vnet/IP, PNET on IP |
|
|
|
37.4 Features of Major Industrial Ethernet Solutions |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
10 | (28) |
|
|
38 | (1) |
|
|
|
|
|
1 | (1) |
|
|
1 | (1) |
|
38.3 Communication Protocol |
|
|
2 | (3) |
|
|
|
|
5 | (2) |
|
|
|
|
|
|
7 | (1) |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
|
|
10 | (29) |
|
|
39 | (1) |
|
|
|
|
|
|
1 | (1) |
|
|
1 | (2) |
|
|
3 | (1) |
|
39.4 Network Configurations |
|
|
4 | (1) |
|
|
5 | (2) |
|
|
|
|
|
|
7 | (1) |
|
|
|
39.7 Performance Analysis |
|
|
8 | (2) |
|
|
|
|
|
|
|
|
|
|
10 | (30) |
|
|
40 | (1) |
|
|
|
|
|
1 | (4) |
|
Device Classes in PROFINET IO |
|
|
|
|
|
|
|
|
|
|
5 | (3) |
|
|
|
|
|
|
|
|
|
|
|
40.3 IRT Communication in PROFINET IO |
|
|
8 | (3) |
|
Flexible Communication Based on RT_CLASS_2 (Orange Interval) |
|
|
|
Communication Based on RT_CLASS_3 (Red Interval) |
|
|
|
Cycle Duration and Constrains |
|
|
|
40.4 Engineering and Commissioning |
|
|
11 | (3) |
|
|
|
|
|
|
|
Neighborhood and Topology Detection |
|
|
|
|
|
40.5 Integration of Fieldbus Systems and Web Applications |
|
|
14 | (1) |
|
|
|
|
|
|
15 | (1) |
|
|
15 | (26) |
|
|
41 | (1) |
|
|
|
|
|
|
1 | (1) |
|
|
1 | (3) |
|
|
4 | (3) |
|
|
|
|
|
|
|
Transport and Session Layer |
|
|
|
Application and Presentation Layer |
|
|
|
41.4 The Application Layer Programming Model |
|
|
7 | (1) |
|
41.5 Function Block-Based Design and System Integration |
|
|
8 | (3) |
|
41.6 Network Design Tools |
|
|
11 | (1) |
|
41.7 Automatic Design Approaches |
|
|
12 | (1) |
|
|
13 | (29) |
|
|
42 | (1) |
|
|
|
|
|
42.1 Introduction and Overview |
|
|
1 | (1) |
|
42.2 Medium-Independent Layers |
|
|
2 | (3) |
|
42.3 Medium-Dependent Layers |
|
|
5 | (1) |
|
42.4 Runtime Interworking |
|
|
6 | (5) |
|
|
11 | (1) |
|
|
12 | (1) |
|
42.7 Conclusion and Outlook |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
13 | (30) |
|
43 Protocols of the Time-Triggered Architecture: TTP, TTEthernet, TTP/A |
|
|
43 | (1) |
|
|
|
|
1 | (1) |
|
43.2 The Time-Triggered Paradigm |
|
|
2 | (1) |
|
|
|
Flow Control and Temporal Firewall |
|
|
|
43.3 Time-Triggered Communication |
|
|
3 | (1) |
|
43.4 Time-Triggered Protocol (TTP) |
|
|
4 | (1) |
|
Fault Hypothesis and Fault Handling |
|
|
|
|
|
|
|
43.5 Time-Triggered Ethernet |
|
|
5 | (2) |
|
|
|
|
|
|
|
Fault-Tolerant TTEthernet Configuration |
|
|
|
|
|
|
7 | (4) |
|
|
|
The Three Interfaces of a Smart Transducer |
|
|
|
|
|
|
11 | (1) |
|
|
11 | (33) |
|
|
44 | (1) |
|
|
|
|
1 | (1) |
|
|
1 | (3) |
|
|
|
|
|
|
|
|
|
|
4 | (1) |
|
|
|
|
|
|
|
44.4 System Design Considerations |
|
|
5 | (2) |
|
|
|
|
|
|
7 | (38) |
|
|
45 | (1) |
|
|
|
|
|
1 | (1) |
|
45.2 LIN History and Versions |
|
|
2 | (1) |
|
45.3 Communication Concept |
|
|
3 | (1) |
|
|
3 | (3) |
|
|
|
|
|
|
6 | (4) |
|
|
|
|
|
|
|
|
|
|
|
|
|
Time-Triggered Data Transmission |
|
|
|
|
|
|
|
45.6 Network and Status Management |
|
|
10 | (1) |
|
45.7 Transport Layer Protocol |
|
|
11 | (1) |
|
|
12 | (1) |
|
45.9 Relationship between SAE J2602 and LIN2.0 |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
13 | (33) |
|
|
46 | (1) |
|
|
|
|
|
1 | (2) |
|
Standardization Framework |
|
|
|
|
|
46.2 Profisafe Communication |
|
|
3 | (8) |
|
Error-Detection Requirements |
|
|
|
Error Types and Safeguards |
|
|
|
Cyclic/Acyclic Communication |
|
|
|
|
|
Virtual Consecutive Number |
|
|
|
|
|
Code Name for Sender/Receiver |
|
|
|
|
|
Detected Safety Data Failures |
|
|
|
|
11 | (3) |
|
Power Supplies and Electrical Safety |
|
|
|
|
|
|
|
Wireless Transmission and Security |
|
|
|
|
|
|
14 | (1) |
|
|
14 | (33) |
|
|
47 | (1) |
|
|
|
|
|
1 | (1) |
|
47.2 The General SafetyLon Concept |
|
|
1 | (1) |
|
47.3 The Safety-Related Lifecycle |
|
|
2 | (2) |
|
|
4 | (3) |
|
47.5 The Safety-Related Firmware |
|
|
7 | (3) |
|
|
10 | (3) |
|
|
13 | (1) |
|
|
13 | (35) |
|
48 Wireless Local Area Networks |
|
|
48 | (1) |
|
|
|
|
|
|
1 | (1) |
|
|
2 | (1) |
|
|
2 | (1) |
|
|
|
|
|
48.4 Medium Access Control |
|
|
3 | (5) |
|
Distributed Coordination Function |
|
|
|
Point Coordination Function Enhanced Distributed Channel Access |
|
|
|
HCF Controlled Channel Access |
|
|
|
Direct Link Protocol and Block ACK |
|
|
|
48.5 Limitations of DCF and HCF for QoS Support in Industrial Environments |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
9 | (2) |
|
Mechanisms on the AP Side |
|
|
|
Mechanisms on the Client Side |
|
|
|
|
11 | (1) |
|
|
11 | (38) |
|
|
49 | (1) |
|
|
|
|
|
1 | (2) |
|
History and Technical Background |
|
|
|
|
|
49.2 Bluetooth Core Architecture Blocks |
|
|
3 | (3) |
|
|
|
|
|
|
|
|
|
Baseband Resource Manager |
|
|
|
|
|
|
|
|
|
|
|
49.3 Bluetooth Protocol Stack |
|
|
6 | (1) |
|
|
7 | (2) |
|
Four Bluetooth General Profiles |
|
|
|
Bluetooth General Profiles |
|
|
|
49.5 Competitive Technologies |
|
|
9 | (1) |
|
49.6 Future of the Bluetooth Technology: Challenges |
|
|
10 | (1) |
|
|
11 | (39) |
|
|
50 | (1) |
|
|
|
|
|
|
1 | (1) |
|
50.2 ZigBee and Mesh Networks |
|
|
1 | (1) |
|
50.3 ZigBee in the Context of Other Wireless Networks |
|
|
2 | (1) |
|
|
2 | (1) |
|
|
3 | (5) |
|
|
|
|
|
|
|
|
|
50.6 Development and Industrial Applications |
|
|
8 | (2) |
|
ZigBee Development Platforms |
|
|
|
|
|
|
10 | (1) |
|
|
10 | (41) |
|
51 6LoWPAN: IP for Wireless Sensor Networks and Smart Cooperating Objects |
|
|
51 | (1) |
|
|
|
|
1 | (1) |
|
51.2 Why IP in WSN and For Smart Cooperating Objects? |
|
|
1 | (2) |
|
IP as Open Standard Protocol Instead of Proprietary Protocols |
|
|
|
IP Routers Instead of Complex Gateways |
|
|
|
Use of Already Existing Protocols, Tools, and Applications |
|
|
|
New Architectural Styles like Service-Oriented Architectures |
|
|
|
IP Support in Operating Systems |
|
|
|
Lessons Learned From Maintaining the Internet |
|
|
|
51.3 Introduction in 802.15.4 |
|
|
3 | (2) |
|
51.4 802.15.4 and 6LoWPAN |
|
|
5 | (2) |
|
|
7 | (7) |
|
Address Autoconfiguration |
|
|
|
Frame Types and Fragmentation |
|
|
|
|
|
Broadcast and Multicast Address Mapping |
|
|
|
|
|
|
|
Summary of Frame Types and Compression Schemes |
|
|
|
|
|
|
14 | (1) |
|
|
14 | (38) |
|
|
52 | (1) |
|
|
|
|
|
1 | (2) |
|
52.2 The WiMAX Broadband Technology |
|
|
3 | (1) |
|
Backhaul/Access Network Applications |
|
|
|
Relationship with Other Wireless Technologies |
|
|
|
|
|
|
4 | (2) |
|
MAC Layer/Data Link Layer |
|
|
|
PHYsical Layer. WiMAX Equipment |
|
|
|
52.4 The WiMAX Forum and Working Groups |
|
|
6 | (1) |
|
52.5 Integration with Other Networks |
|
|
6 | (2) |
|
|
|
|
|
|
8 | (1) |
|
|
8 | (45) |
|
53 WirelessHART, ISA100.11a, and OCARI |
|
|
53 | (1) |
|
|
|
|
1 | (1) |
|
|
2 | (6) |
|
The WirelessHART Physical Layer |
|
|
|
The WirelessHART Data Link Layer |
|
|
|
|
|
The WirelessHART Network Layer and Topologies |
|
|
|
The WirelessHART Upper Layers |
|
|
|
|
8 | (2) |
|
The ISA100.11a Physical Layer |
|
|
|
The ISA100.11a Data Link Layer |
|
|
|
|
|
The ISA100.11a Network Layer and Topologies |
|
|
|
The ISA100.11a Upper Layers |
|
|
|
|
10 | (3) |
|
|
|
|
|
Network Layer and Topologies |
|
|
|
|
|
53.5 Coexistence of the Three Protocols |
|
|
13 | (2) |
|
53.6 Example of Platform Providers |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
16 | (38) |
|
54 Wireless Communication Standards |
|
|
54 | (1) |
|
|
|
1 | (1) |
|
54.2 A Wireless Standards Taxonomy |
|
|
2 | (1) |
|
|
2 | (4) |
|
|
6 | (1) |
|
|
6 | (49) |
|
55 Communication Aspects of IEC 61499 Architecture |
|
|
55 | (1) |
|
|
|
|
|
1 | (2) |
|
55.2 Illustrative Example |
|
|
3 | (4) |
|
55.3 Logic Encapsulated in Basic FB |
|
|
7 | (1) |
|
|
7 | (2) |
|
|
9 | (1) |
|
|
10 | (1) |
|
55.7 Communication Using Services of Internet Protocol Suite |
|
|
10 | (3) |
|
55.8 Adding Distribution and Communication to the Sample System |
|
|
13 | (2) |
|
55.9 Internals of Communication FBs: Modbus |
|
|
15 | (2) |
|
55.10 Communication via the CIP |
|
|
17 | (2) |
|
55.11 Impact of Communication Semantics on Application Behavior |
|
|
19 | (1) |
|
55.12 Failures in Distributed Applications |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
21 | (35) |
|
|
56 | (1) |
|
|
|
|
1 | (1) |
|
56.2 Application of Internet Technologies in Industry |
|
|
2 | (1) |
|
|
3 | (5) |
|
Transport and Communication Related Technologies |
|
|
|
Technologies for Information Description and Presentation |
|
|
|
Technologies for Server-Side and Client-Side Functions |
|
|
|
56.4 Application Examples |
|
|
8 | (4) |
|
|
|
Browser-Based Applications |
|
|
|
Machine-Machine Communication Using Web Services |
|
|
|
56.5 Conclusions and Outlook |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
13 | (44) |
|
|
57 | (1) |
|
|
|
|
1 | (1) |
|
57.2 Overview of OPC UA System Architecture |
|
|
2 | (3) |
|
UA Client Application Architecture |
|
|
|
|
|
57.3 Overview of UA AddressSpace |
|
|
5 | (2) |
|
57.4 Overview of UA Services |
|
|
7 | (3) |
|
|
|
|
|
SecureChannel Service Set |
|
|
|
|
|
NodeManagement Service Set |
|
|
|
|
|
|
|
|
|
|
|
MonitoredItem Service Set |
|
|
|
|
|
57.5 Implementations and Products |
|
|
10 | (1) |
|
|
10 | (1) |
|
|
10 | (48) |
|
|
58 | (1) |
|
|
58.1 Requirements for SCADA Data Collection in Electric Power and Other Industries |
|
|
1 | (2) |
|
58.2 Features Common to IEC 60870-5 and DNP3: Data Typing, Report by Exception, Error Recovery |
|
|
3 | (2) |
|
58.3 Differentiation between IEC 60870-5 and DNP3 Operating Philosophy, Message Formatting, Efficiency, TCP/IP Transport |
|
|
5 | (4) |
|
|
9 | (50) |
|
59 IEC 61850 for Distributed Energy Resources |
|
|
59 | (1) |
|
|
|
|
|
1 | (1) |
|
|
1 | (2) |
|
59.3 Modeling the Automation Functions |
|
|
3 | (1) |
|
59.4 Communication Services |
|
|
4 | (3) |
|
Client/Server Communication |
|
|
|
|
|
Transmission of Sampled Analog Values |
|
|
|
|
|
59.5 Modeling with System Configuration Language |
|
|
7 | (1) |
|
59.6 Different Types of DER |
|
|
8 | (2) |
|
|
|
|
|
Other Specific Types of Distributed Energy Resources |
|
|
|
|
10 | (50) |
|
PART IV Internet Programming |
|
|
|
60 User Datagram Protocol---UDP |
|
|
60 | (1) |
|
|
|
|
1 | (1) |
|
|
1 | (7) |
|
|
|
|
|
Connectionless Service--Flow and Error Control |
|
|
|
|
8 | (2) |
|
|
10 | (51) |
|
61 Transmission Control Protocol---TCP |
|
|
61 | (1) |
|
|
|
|
1 | (2) |
|
|
3 | (11) |
|
|
|
|
|
|
|
Maintaining the Open Connection |
|
|
|
Flow Control and Sliding Window Protocol |
|
|
|
|
|
|
|
|
|
|
|
|
14 | (1) |
|
|
14 | (3) |
|
|
17 | (45) |
|
62 Development of Interactive Web Pages |
|
|
62 | (1) |
|
|
|
1 | (1) |
|
|
2 | (1) |
|
|
|
|
3 | (4) |
|
|
|
|
|
|
|
|
|
|
|
$_GET and $_POST function |
|
|
|
|
7 | (3) |
|
|
|
|
|
|
|
62.5 Creating Dynamic Web Sites Using PHP and MySQL |
|
|
10 | (4) |
|
|
|
|
|
|
|
|
|
Insert, Update and Delete queries |
|
|
|
|
14 | (49) |
|
63 Interactive Web Site Design Using Python Script |
|
|
63 | (1) |
|
|
|
|
1 | (1) |
|
|
|
|
|
63.2 Software Installation |
|
|
2 | (1) |
|
63.3 Database-Driven Web Site Design |
|
|
2 | (5) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
7 | (1) |
|
|
8 | (56) |
|
64 Running Software over Internet |
|
|
64 | (1) |
|
|
|
|
|
1 | (1) |
|
64.2 Most Commonly Used Network Programming Tools |
|
|
2 | (3) |
|
Hypertext Markup Language |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
5 | (6) |
|
Neural Network Trainer through Computer Networks |
|
|
|
|
|
SPICE-Based Circuit Analysis Using Web Pages |
|
|
|
64.4 Summary and Conclusion |
|
|
11 | (1) |
|
|
11 | (54) |
|
65 Semantic Web Services for Manufacturing Industry |
|
|
65 | (1) |
|
|
|
|
1 | (2) |
|
|
3 | (1) |
|
|
3 | (6) |
|
Ontology-Driven Architecture |
|
|
|
Multisite Issues and Rapid Reconfigurability |
|
|
|
Customizations of Product and Materials Flow Monitoring |
|
|
|
|
|
Data, Process and Timing Consistency and Conformance |
|
|
|
Customer-Centered Design through the Concept of Customer Value |
|
|
|
|
9 | (1) |
|
|
10 | (56) |
|
66 Automatic Data Mining on Internet by Using PERL Scripting Language |
|
|
66 | (1) |
|
|
|
|
1 | (3) |
|
|
|
|
|
|
|
|
4 | (4) |
|
Extract E-Mail Addresses from Excel Files |
|
|
|
Extract Data from PDF Files |
|
|
|
Extract Paper Information from IEEE XPLORE |
|
|
|
List Papers Only in a Specific Subject from TIE Webpage |
|
|
|
Using PERL with Google Scholar in Searching Data |
|
|
|
66.3 Summary and Conclusion |
|
|
8 | (1) |
|
|
9 | (58) |
|
|
|
67 Trends and Challenges for Industrial Communication Systems |
|
|
67 | (1) |
|
|
|
1 | (1) |
|
67.2 Ubiquitous Global Connectivity and Digital Identity |
|
|
1 | (1) |
|
67.3 Vertical Integration |
|
|
2 | (1) |
|
67.4 Hybrid Local Networks and Quality of Service |
|
|
2 | (1) |
|
|
3 | (1) |
|
67.6 Scalability in Hardware and Software |
|
|
4 | (1) |
|
|
5 | (63) |
|
68 Processing Data in Complex Communication Systems |
|
|
68 | |
|
|
|
|
|
1 | (1) |
|
68.2 An Archetype for Future Automation |
|
|
2 | (1) |
|
68.3 Bottom-Up versus Top-Down Design: Behavioristic Model versus Functional Model |
|
|
2 | (2) |
|
68.4 Automated Methods for Sensor and Actuator Systems |
|
|
4 | (1) |
|
68.5 The Diagnostic System |
|
|
4 | (3) |
|
|
|
Statistical Generative Models |
|
|
|
|
|
|
|
68.6 Intelligent Surveillance Systems |
|
|
7 | (2) |
|
|
|
68.7 The Human Mind as an Archetype for Cognitive Automation |
|
|
9 | (1) |
|
Perception in Automation: A Historic Overview |
|
|
|
|
10 | |
Index |
|
1 | |