Fig 1 - uploaded by Aloysius Mok
Content may be subject to copyright.
The architecture of HART communication protocol

The architecture of HART communication protocol

Source publication
Article
Full-text available
WirelessHART TM was released in September 2007 and became IEC standard in April 2010 (IEC 62591). It is the first open wireless communication standard specifically designed for real-time process control applications. It is designed to the same standard as its wired counterpart for reliability and interoperability. To ensure the compliance with the...

Contexts in source publication

Context 1
... standard is specifically targeted to solve these problems and provide a complete solution for real-time process control applications. Figure 1 illustrates the architecture of the HART protocol according to the OSI 7-layer communication model. As a part of the HART protocol, the architecture of WirelessHART protocol is shown on the right side of Fig. 1. ...
Context 2
... standard is specifically targeted to solve these problems and provide a complete solution for real-time process control applications. Figure 1 illustrates the architecture of the HART protocol according to the OSI 7-layer communication model. As a part of the HART protocol, the architecture of WirelessHART protocol is shown on the right side of Fig. 1. At the very bottom of the protocol, WirelessHART adopts IEEE 802. 15.42006 [17] as the physical layer. On top of that, WirelessHART defines its own time-synchronized data link layer. Some no- table features of WirelessHART data link layer include strict 10ms time slot, network wide time synchronization, channel hopping, channel ...
Context 3
... receiver has the capability of capturing data on 16 WirelessHART channels simultaneously and at a speed of up to 1000 messages per second. As shown in Figure 10, Wi-Analys consists of a radio receiver box at the center front and a software suite running on a workstation. ...
Context 4
... intelligence is built-in to decipher the messages so that enciphered fields could be shown in plain text. Figure 11 demonstrates a screen capture of Wi-Analys display and readers can refer to [28] which has the same picture in higher resolution. The figure shows a partial segment of the DUT joining the network. ...
Context 5
... figure shows a partial segment of the DUT joining the network. We observe that in Figure 11 channel hopping is in effect and recorded in the channel column. We could also see that the application layer messages, i.e., HART commands and responses are displayed in plain text. ...
Context 6
... overview of the join sequence of a WirelessHART device is shown in Figure 12. Wi-HTest plays the role of the Gateway and has partial functionalities of the Network Manager. ...
Context 7
... then begins acquiring the bandwidth and communication resources required to publish process data and events as dictated by its configuration. Figure 11 demonstrates the message segment of a DUT joining the network. To make the figure more compact, we removed most of the advertisement messages from the Wi- Analys log. ...
Context 8
... keeps the information in the advisement messages from any device it could hear from. Once the DUT has heard from Wi-HTest and decides to join, it sends out the join request message, which is shown as message number 732 in Figure 11. The join request contains the device information that is enciphered with the join key. ...
Context 9
... join request contains the device information that is enciphered with the join key. In Figure 11, Wi-Analys deciphers the message and displays the device information in the network payload column. Wi-HTest uses the join key for decryption and verifies the correctness of the join request. ...
Context 10
... is a standard device join process and Algorithm 1 in the Appendix shows the detailed test script for this test case. Figure 11 does show that the DUT constructs the join request and various response messages with correct command payloads and uses proper keys for network layer and MAC layer encryption and decryption. However, this is not sufficient to assert that the DUT has completely passed the device join compliance test. ...
Context 11
... claim that the DUT is fully compliant to the WirelessHART standard, the timing between the data request message and the corresponding ACK must be carefully measured. As we have shown in [3], Figure 13 depicts the specific timing requirement inside a WirelessHART time slot (10ms) and a receiver must acknowledge a packet within TsTxAckDelay time units after the end of the current message. This duration could vary within ±100µs as is defined by the data link layer specification. ...
Context 12
... Delete all existing superframes on the DUT. Figure 14 demonstrates a partial message segment of the superframe management test. Readers are referred to [29] for the complete test results captured by Wi-Analys. ...
Context 13
... are referred to [29] for the complete test results captured by Wi-Analys. In Figure 14, the Gateway tries to add a new superframe to the DUT using command 965 in message number 41149. According to the command payload, the ID of this superframe is 04. ...
Context 14
... source routing the routing path is defined in the network header of the message. A routing device simply forwards the message to the next device in the path. Fig. 15 shows the data request messages from the Network Manager and the Gateway to the DUT, and the corresponding response messages from the ...
Context 15
... main function of a sensor in a process plant is to periodically publish process value to the Host. In this test case the DUT is preconfigured to publish Command 48 every 8 seconds. After the session and links with the Gateway is configured, the DUT sends Command 799 to the Network Manager asking for the bandwidth to publish (Packet 895 in Fig. 16, forwarded in Packet 906). Since the Network Manager has already configured it, it simply replies with the route information in Packet 912 which is forwarded in Packet ...
Context 16
... DUT then sends out the first burst data in Packet 945, forwarded in Packet 949. About 8 seconds later (Refer to the second column Elapsed Time in Fig. 16) the next burst data is sent out in Packet 971, forwarded in Packet 974. This periodic data publishing will continue until the Gateway explicitly stops it by sending corresponding commands to the DUT. ...
Context 17
... this test case we shut down the VD1 after the DUT has begun publishing data. Fig. 17 shows that the DUT reported Command 788 (Path Down Alarm of the VD1) to the Network Manager (Packet 5070 forwarded in Packet 5077). Note that before the report the DUT sends message to the VD1 twice in packets 5062 and 5069, neither of them is acknowledged. Fig. 17 also shows the reporting of Command 780 (Report Neighbor Health List) ...
Context 18
... this test case we shut down the VD1 after the DUT has begun publishing data. Fig. 17 shows that the DUT reported Command 788 (Path Down Alarm of the VD1) to the Network Manager (Packet 5070 forwarded in Packet 5077). Note that before the report the DUT sends message to the VD1 twice in packets 5062 and 5069, neither of them is acknowledged. Fig. 17 also shows the reporting of Command 780 (Report Neighbor Health List) from the DUT in Packet 5057. It is interesting to see that the VD2 forwarded it (Packet 5066) after it has received a burst data from the DUT (Packet 5063). Fig. 18 shows what happens after Command 788 is received. The Network Manager sends a message to the DUT ...
Context 19
... the report the DUT sends message to the VD1 twice in packets 5062 and 5069, neither of them is acknowledged. Fig. 17 also shows the reporting of Command 780 (Report Neighbor Health List) from the DUT in Packet 5057. It is interesting to see that the VD2 forwarded it (Packet 5066) after it has received a burst data from the DUT (Packet 5063). Fig. 18 shows what happens after Command 788 is received. The Network Manager sends a message to the DUT (Packet Fig. 18. A segment of message sequence in the network reconfiguration 5080 forwarded in Packet 5083). The message contains: delet- ing the graph edge to the VD1 (Command 970), removing two links to the VD1 (Command 968), and adding ...
Context 20
... Fig. 17 also shows the reporting of Command 780 (Report Neighbor Health List) from the DUT in Packet 5057. It is interesting to see that the VD2 forwarded it (Packet 5066) after it has received a burst data from the DUT (Packet 5063). Fig. 18 shows what happens after Command 788 is received. The Network Manager sends a message to the DUT (Packet Fig. 18. A segment of message sequence in the network reconfiguration 5080 forwarded in Packet 5083). The message contains: delet- ing the graph edge to the VD1 (Command 970), removing two links to the VD1 (Command 968), and adding two extra links to the VD2 (Command 967). The DUT responses it in Packet 5086 to notify the Network Manager that ...

Similar publications

Conference Paper
Full-text available
Web Services Description Language (WSDL) is an XML-based specification for describing the functionalities provided by web services [1], and widely-adopted in the IT industry. However, the message types defined in WSDL for interoperation are insufficient when describe complex data (such as, geodata) by using conventional data types in many applicati...
Conference Paper
Full-text available
This paper proposes a SPIRIT framework supporting model-based systems engineering (MBSE) tool-chain development of advanced cyber-physical systems (CPS) with emphasis on tool integration, process management, automated verification and validation. The core features of the developed MBSE tool-chain include domain-specific modeling to describe CPS dev...
Conference Paper
Full-text available
In Industry 4.0 independent entities shall interoperate to allow flexible and customized production. To assure the parties that individual components are secured to interoperate, we investigate automated standard compliance. The standard compliance is defined based on given sets of security and safety requirements from which are derived measurable...
Article
Full-text available
Orchestration allows the construction of more and more complex Web Services (WS) by featuring interoperability between highly distributed and het-erogeneous web-based services. While Business Process Execution Language for Web Services (WS-BPEL) is the widely accepted standard for designing Web Ser-vice compositions, it is critical to formally anal...
Article
Full-text available
The aim of CONNECT is to achieve universal interoperability between heterogeneous Networked Systems. For this, the non-functional properties required at each side of the connection going to be established, which we refer to by the one inclusive term "CONNECTability", must be fulfilled. In Deliverable D5.1 we conceived the conceptual models at the f...

Citations

... Some wireless network simulation and emulation platforms such as NS-2 [14], NS-3 [9], OPNET [42], MATLAB (TrueTime) [43,44], and Wi-HTest [45] have been used for WirelessHART studies and testing. These simulators, however, were not designed for WirelessHART control application. ...
Article
Full-text available
The emergence of wireless technologies such as WirelessHART and ISA100 Wireless for deployment at industrial process plants has urged the need for research and development in wireless control. This is in view of the fact that the recent application is mainly in monitoring domain due to lack of confidence in control aspect. WirelessHART has an edge over its counterpart as it is based on the successful Wired HART protocol with over 30 million devices as of 2009. Recent works on control have primarily focused on maintaining the traditional PID control structure which is proven not adequate for the wireless environment. In contrast, Internal Model Control (IMC), a promising technique for delay compensation, disturbance rejection and setpoint tracking has not been investigated in the context of WirelessHART. Therefore, this paper discusses the control design using IMC approach with a focus on wireless processes. The simulation and experimental results using real-time WirelessHART hardware-in-the-loop simulator (WH-HILS) indicate that the proposed approach is more robust to delay variation of the network than the PID.
Article
Full-text available
Smart home is a residence with several electrical and electronic appliances that are capable of communicating with each other and can be controlled remotely from any room in the home or from any location in the world using the internet through a technology called Internet of Things (IoT). Easy control of home appliances/devices and energy management has been the main goal that leads to the invention of smart homes. However, most of the systems developed for these homes are either complex or could not manage Energy wastage efficiently incurring more electricity bills. In this work, an intelligent energy management system that is based on feed forward Artificial Neural Network (ANN) is proposed. The systemwill be trained with the data ofoccupant's interaction with the appliances over a period of time. It monitors and computes the power consumption in the home over a period of time and takes intelligent control of the appliances for the occupant based on what it learnt and alerts them whenever such control is taken for them to either accept or reject. Proposed evaluation will be based onspecificity, sensitivity and accuracy of the ANN model and response time of the communication between the intelligent system and the occupant in different network conditions. Large scale integration of the proposed system into smart homeswill provide an economical smart home.