The present invention is related to the field of wireless networking. More particularly, the present invention relates to the integration of wireless networking and traditional wired communication systems.
Modern industrial control and monitoring systems make use of a blend of a number of different systems. These systems may include a variety of sensors (pressure, temperature, vibration), actuators, controllers, cameras, etc. To integrate the systems, layers of communication, data, and control protocols have been developed. One example that has been used in some applications is the Purdue model, which defines several different network levels for a system, with each level having a different format and type of communication, and further with varying levels of abstraction.
To facilitate such systems, a typical approach has been to provide a separate controller or control module for each different subsystem at the lowest network level. Each controller communicates with one or more sensors or control devices that operate to monitor or control an industrial system. This set of controllers may be connected to an Ethernet or other collective communication network allowing for controller input/output and sensor data to be communicated thereon. Above this base network is a hardwired network control system or supervisory control, which may also include a distributed control system.
By separating the distributed control system from the sensing and control network by a firewall/switch, the security of the plant may be ensured. Yet another network, sometimes termed a business-level local area network, is coupled to the distributed control system at yet a higher level. As the networks go to higher levels, the computation and analysis, particularly using advanced and/or third party applications, becomes more complex and abstract. However, reliability and security may be reduced at the higher levels.
A challenge in this environment is to provide efficient methods, systems and devices that allow for expansion and updating of older systems.
The present invention in various illustrative examples includes methods, devices and/or systems for integrating multiple communication systems including multiple wireless communication protocols into a single system. In an illustrative example, a communication system includes a device adapted to communicate via first and second wireless communication protocols. The illustrative system may further include a local area network or other wired sub-network, with the device adapted for first and second protocols also being adapted to operate using the local area network or other wired sub-network.
The following detailed description should be read with reference to the drawings. The drawings, which are not necessarily to scale, depict illustrative embodiments and are not intended to limit the scope of the invention.
As used herein, the term “wireless” communication indicates the transmission of data via an ambient medium, for example, air. A non-wireless communication includes a communication achieved by transmission of data via a physical conduit, channel, or other defined communication path over solid media. Examples of such defined communication paths for non-wireless communication include copper or other conductive wires, optical fibers, coaxial and other cables, and any of a plethora of other known (or to be developed) communication or transmission lines. No specific structure is implied by either term (wireless or non-wireless), nor is the use of a particular band of frequencies, wavelengths, bit rates, or modulation protocol implied.
One aspect of the present invention is the recognition that new and evolving technologies create a difficulty of redundancy in certain communication networks. In earlier generations, with wired industrial control and monitoring systems, a central location and central limitation of movement for higher level devices made sense. For example, early personal computers, even those that were considered “portable,” really were not reasonably portable, or sufficiently powerful, for use within an industrial facility, however, recently developed small, lightweight, but powerful handheld devices provide new capabilities.
With this evolution in mobile wireless computing devices, powerful mobile communication devices have become more available. There are various types of wireless devices that may be used in an industrial control and monitoring system. For example, Honeywell has developed its XYR 5000 base radio systems that operate at what may be considered levels 0 and/or 1 of the Purdue model. Meanwhile, various groups have collaborated to create numerous standards for wireless communication including those promulgated under IEEE 802.11 and other commercial protocols. For example, one may now use such systems as IntelaTrac® (an 802.11 system), Blackberry® or Bluetooth® to communicate with handheld devices. Some such handheld devices have been developed with sufficient durability to allow their practical use in dusty, hot, cold, damp and high-vibration environments, making them amenable to industrial use.
In an illustrative embodiment, a network backbone is provided by the use of one or more devices having wireless communications capability including programming allowing for communication using various wireless communication protocols. More particularly, such a backbone device may be adapted to communicate in several of the 802.11 protocols. Further, this backbone device may include processing capability allowing it to segregate the networks with which it communicates, preserving the security of a lower level system while allowing the versatility of the higher level system. Alternatively, the backbone device may generally operate to segregate the networks with which it operates, while also having functionality as a gateway device between first and second wireless communication systems.
A next layer is shown as second layer LAN 20, and includes workstation computers 22 that may provide supervisory control features as well as, if desired, some limited use of third party advanced applications as well. More importantly, the second layer LAN 20 may include distributed control stations and servers 22. One function of the second layer LAN 20 may be to provide a graphical user interface for those in charge of controlling and monitoring the plant. In addition to the workstation computers 22, this second layer LAN 20 may be coupled to a wireless access point 24 that enables the use of so-called mobile workers 28 and other portable wireless devices 26. Some brand names for wireless worker solutions may include IntelaTrac, WebPad, and/or Trakker, though it should be understood that other existing (and to be developed) portable wireless devices may be included at this level.
The second layer LAN 20 may be referred to as a plant control network. The second layer LAN 20 may be, for example, a fault tolerant Ethernet. The use of a fault tolerant Ethernet for the plant control network increases the security and safety of the plant itself by assuring that at least some critical systems (such as emergency detection, control, annunciation, and/or response) are fault tolerant.
A lowest layer is shown as third layer LAN 30 and may include controllers 32. The communications in the third layer LAN 30 generally may comprise sensor data and controller input/output queries and commands. The controllers 32 may be wired to a number of devices shown generally at 34. The devices 34 may include various sensors, detectors, or the like to allow monitoring of an industrial plant. The devices 34 may further include such actuators (such as valves, conveyance apparatuses, burners, vents, etc.) as are used in a given industrial facility to enable management and control over operations. Different controllers 32 may be directed to different parts of a plants operation (for example, separate controllers 32 may be coupled to sensors/actuators for systems such as material conveyance, material processing, heating/cooling, power, or emergency systems, etc.) and/or to different types of plant operations (for example, pressure sensors for a particular system may be coupled to one controller 32, while actuators for that system may be coupled to a separate controller 32).
Also shown in
In the illustrative system, switches are shown at 40, 50 to illustrate the separation of each LAN 10, 20, 30, from other layers. The data transmitted on each LAN 10, 20, 30 may be distinct as well. The switches 40, 50 selectively allow access between the network layers shown, for example, for the purpose of extracting information or providing control signals. The switches 40, 50 also provide security, preventing unauthorized access to lower layers of the network, and also isolating the lower network layers from the upper network layers in case, for example, there is a virus event, denial of service, or other fault or failure at a higher network level.
Each of the sensors and/or actuators is dedicated to one of the controllers 32 on the third layer LAN 30. If the base radio 36 is hardwired to the third layer LAN, the base radio 36 may act as the dedicated controller for the sensors/actuators that are in communication with the base radio 36. The result is that any access to data from the lower layers occurs by first sending requests for data transmissions through switch 50, addressed to the appropriate controller 32. The request then waits in queue (if necessary) for the appropriate controller 32 to generate a response.
In some embodiments, the cameras 134 and/or sensors 136 may be considered leaf nodes in a wireless network having leaf nodes and infrastructure nodes 132, as described in copending U.S. patent application Ser. No. 10/870,295, entitled WIRELESS COMMUNICATION SYSTEM WITH CHANNEL HOPPING AND REDUNDANT CONNECTIVITY, filed Jun. 17, 2004, and copending U.S. patent application Ser. No. 10/905,971, entitled WIRELESS ROUTING SYSTEMS AND METHODS, filed Jan. 28, 2005, which are each incorporated herein by reference.
In other embodiments, the devices shown at 132 are simply network radios that operate to provide the backbone for the distributed network, without requiring a specific leaf node and infrastructure node configuration as set forth in these copending patent applications. These network radios, in some embodiments, may be adapted for communicating using a plurality of protocols, including at least first and second wireless communication protocols. By providing multiple protocols on the same backbone, redundancy with the existing systems can be avoided. Specifically, where N devices may be needed for a single network to cover a given area, if two networks that are incompatible area provided, 2*N devices would be needed, assuming that devices in the networks have similar capabilities. Using a backbone having multiple-protocol capability can reduce the number of needed devices. Further, as computing capacity increases in the future, restrictions related to the ability of individual communications devices to handle a given load may, simply put, go away.
In the embodiment of
In some embodiments, the gateways 130 and/or I-nodes 132 may take a form as described in copending U.S. patent application Ser. No. 11/161,565, entitled INTEGRATED INFRASTRUCTURE SUPPORTING MULTIPLE WIRELESS DEVICES, filed on Aug. 8, 2005, the disclosure of which is incorporated by reference.
While certain existing “gateway” nodes or access points are adapted to provide communication between a wired network or Ethernet and a mobile device, some illustrative embodiments take the concept farther by integrating additional communication modes. At least some illustrative embodiments will achieve synergies within an overall system by integrating a plurality of communication types. This may include the omission/elimination of redundant gateway or network nodes.
In the illustrative embodiment shown in
As noted at 208, the gateway node, INode, or network radio may include the function blocks for performing wireless functions in addition to cache circuitry/capability, security, and other peer-to-peer functionality. In some embodiments, the inclusion of multiple wireless protocols calls for additional processing steps for the device 200. For example, messages being exchanged on a first network may be segregated from those exchanged on a second network, calling for tiered addressing as set forth in copending U.S. patent application Ser. No. 11/161,565, entitled INTEGRATED INFRASTRUCTURE SUPPORTING MULTIPLE WIRELESS DEVICES, which is incorporated herein by reference. For another example, security may be provided by filtering received messages in accordance with protocols for the network to which such commands are addressed. This may be so for messages communicated within one network as well as for messages addressed from one network to a second network.
Because the first and second networks may have different levels of security, a message received from one network that is addressed to the other may be subjected to differing levels of security screening depending upon which direction it is going. For example, a message M directed from high security network A to low security network B may undergo a simple frame check sequence (FCS) security check and then be allowed to switch networks, with any attendant format change due to the shift in networks. For example, if network A is a ZigBee protocol network, while network B is a Bluetooth network, the message format, frequency, etc. may be modified. The device 200 may include look-up tables or function blocks with instruction sets for performing such modifications.
Continuing the example, if a message N is directed from low security network B to high security network A, additional security screening may be performed on the message N in addition to the FCS. For example, the addressing of the message N may be compared to tables for authorized senders and/or to determine whether the message N is properly addressed to a device on network A. The message contents may be screened for content (i.e. virus checked) as well.
In some embodiments where multiple tiered networks are involved, the device 200 may operate to allow unidirectional access between networks. For example, access from one network to another may be allowed by the device 200, while access going the other direction is blocked. This may allow a central device (i.e. switches 140, 150 in
In yet another illustrative embodiment, the multiple, tiered networks are treated in completely segregated manner by distributed network radios. Specifically, some messages received by the device 200 may be identified as belonging to one network and may be directed for further communication within that network, while other messages directed to a different network are directed differently. In this manner, security remains generally uncompromised.
The gateway(s) 320 communicates with one or more I-nodes or network radios 322, which may, in turn, communicate with various devices 324, 326 as before. In the illustrative embodiment of
The illustrative embodiment also shows the controller network 330 as including controller(s) 332 that are coupled to other, hardwired sensors 334. In some embodiments, the use of the gateway(s) 320 and/or I-nodes/network radios 322 to wirelessly communicate with not only devices that form part of the plant control network but also with devices that fall into the lower level controller network makes it possible to entirely omit the controller network and/or replace it. In such an embodiment, the wireless network including the wireless sensors 328, I-nodes/network radios 322 and gateway(s) 320 may be configured to treat the communications using the sensors 328 separately from other communications carried by the wireless network.
In some embodiments, rather than communicating directly with the XYR-enabled sensors/actuators 328, the I-nodes/network radios 322 and/or gateways 320 may communicate with an XYR-enabled base radio in either a wired or wireless fashion. While XYR-enabled devices are shown and described, it should be understood that the sensors 328 may take a number of different forms and use various protocols.
The illustrative embodiment of
The standard configuration form may include various operations. In some embodiments, the standard configuration form is provided to allow various third parties to build units (monitoring equipment, control equipment, sensors, cameras, etc.) that accept input information via a standard configuration form. These third party units may be considered distributed units for use in the system, and may also allow definition of the types of outputs they will provide, as well as how the distributed unit will respond to directions from other devices in the system. The standard configuration form may allow various parameters to be selected and set including, for example, the form and type of data to be captured, the form and type of data to be reported out, frequency and timing of data transmission.
The standard configuration form may also receive selected data from a distributed device and may define the type and amount of data to be provided, and the acceptable range and response expected for the distributed device. For example, a characterization trend for the device output, the type of device providing output, actuator information, failsafe and other control data, and the like may be provided. In another example, the standard configuration form may allow the distributed device to provide indicators of its status. In summary, the standard configuration form may be adapted to allow a distributed device to identify itself and its available parameters and capabilities to the rest of the network, and also allows another device in the network to direct operation of the distributed device.
If so desired, the standard configuration may also be used for wired devices. In this manner, each device in the system may be treated the same, regardless of its position and the manner used to couple any given device to the rest of the system.
The standard configuration form may also be used to direct calibration steps and maintenance steps. For example, some sensors and actuators are adapted for periodic maintenance steps. When wireless distributed devices are used, especially portable devices, the inclusion/use of batteries in the distributed devices creates a need for periodic estimation of remaining battery life, or at least current battery status. The standard configuration form may provide a data entry features allowing a distributed device to indicate its desired periodic maintenance and/or calibration schedules, as well as allowing the results of such calibration or maintenance to be reported to the rest of the system.
The illustrative embodiment in
In the embodiment of
The use of the wireless backbone provided by the gateways 420 and I-nodes/network radios 422 provides several forms of improvement. The inclusion of separate gateways/access points for multiple systems is avoided, reducing installation costs and complexity. Further, communications along the various networks in use can be more easily coordinated because the same backbone is used, potentially reducing noise and interference effects. Communication loads may be considered and, if overly reliant on one or a few nodes, redistributed, to potentially improve reliability, efficiency, and flexibility. If desired, redundant connectivity may be achieved as well, for example, as set forth in copending U.S. patent application Ser. No. 10/870,295, entitled WIRELESS COMMUNICATION SYSTEM WITH CHANNEL HOPPING AND REDUNDANT CONNECTIVITY, filed Jun. 17, 2004, and copending U.S. patent application Ser. No. 10/905,971, entitled WIRELESS ROUTING SYSTEMS AND METHODS, filed Jan. 28, 2005, which are each incorporated herein by reference.
A separate LAN may also be served by gateway 506, which may couple to a network operating on any of the illustrative levels (business LAN, a process control LAN, or a controller LAN), though it is shown in communication with a wired controller, thereby operating at the lowest tier LAN. Various devices are shown in communication with the network radios 508 including mobile worker devices 514, other handhelds, sensors taking an XYR form 516, and even a third party devices shown at 510 which may be, for example, a programmable logic controller. The embodiment of
The firewall functionality suggested for the gateway 502 may also be performed by the first tier gateway 504. While messages at various levels and in various virtual LANs may be exchanged by the gateways 502, 504, 506 and the network radios 508, whenever one of these devices performs base-station functionality, firewall protection may be provided to prevent unauthorized or undesired access into a LAN. A base-station functionality may include the translation of a message in a first LAN into a message into a second LAN, in other words, access of the second LAN by the first LAN.
Those skilled in the art will recognize that the present invention may be manifested in a variety of forms other than the specific embodiments described and contemplated herein. Accordingly, departures in form and detail may be made without departing from the scope and spirit of the present invention as described in the appended claims.
Number | Name | Date | Kind |
---|---|---|---|
3643183 | Geffe | Feb 1972 | A |
3715693 | Fletcher et al. | Feb 1973 | A |
3758885 | Voorman et al. | Sep 1973 | A |
4264874 | Young | Apr 1981 | A |
4529947 | Biard et al. | Jul 1985 | A |
4614945 | Brunius et al. | Sep 1986 | A |
4812785 | Pauker | Mar 1989 | A |
4843638 | Walters | Jun 1989 | A |
5392003 | Nag et al. | Feb 1995 | A |
5428602 | Kemppainen | Jun 1995 | A |
5428637 | Oliva, Jr. et al. | Jun 1995 | A |
5430409 | Buck et al. | Jul 1995 | A |
5438329 | Gastouniotis | Aug 1995 | A |
5451898 | Johnson | Sep 1995 | A |
5481259 | Bane | Jan 1996 | A |
5642071 | Sevenhans et al. | Jun 1997 | A |
5659303 | Adair, Jr. | Aug 1997 | A |
5726603 | Chawla et al. | Mar 1998 | A |
5767664 | Price | Jun 1998 | A |
5809013 | Kackman | Sep 1998 | A |
5847623 | Hadjichristos | Dec 1998 | A |
5960344 | Mahany | Sep 1999 | A |
5963650 | Simionescu et al. | Oct 1999 | A |
6052600 | Fette et al. | Apr 2000 | A |
6058137 | Partyka | May 2000 | A |
6091715 | Vucetic et al. | Jul 2000 | A |
6175860 | Gaucher | Jan 2001 | B1 |
6353846 | Fleeson | Mar 2002 | B1 |
6366622 | Brown et al. | Apr 2002 | B1 |
6396612 | Bjorndahl | May 2002 | B1 |
6414963 | Gemar | Jul 2002 | B1 |
6624750 | Marman et al. | Sep 2003 | B1 |
6659947 | Carter et al. | Dec 2003 | B1 |
6768901 | Osborn et al. | Jul 2004 | B1 |
6785255 | Sastri et al. | Aug 2004 | B2 |
6823181 | Kohno et al. | Nov 2004 | B1 |
6836506 | Anderson | Dec 2004 | B2 |
6901066 | Helgeson | May 2005 | B1 |
20020011923 | Cunningham et al. | Jan 2002 | A1 |
20020085622 | Dhar et al. | Jul 2002 | A1 |
20020141479 | Garcia-Luna-Aceves et al. | Oct 2002 | A1 |
20030050062 | Chen et al. | Mar 2003 | A1 |
20030053555 | McCorkle et al. | Mar 2003 | A1 |
20030063585 | Younis et al. | Apr 2003 | A1 |
20030104816 | Duplessis et al. | Jun 2003 | A1 |
20030151513 | Herrmann et al. | Aug 2003 | A1 |
20030198280 | Wang et al. | Oct 2003 | A1 |
20040077352 | Mahany | Apr 2004 | A1 |
20040125775 | Rios | Jul 2004 | A1 |
20040210766 | Kroselberg | Oct 2004 | A1 |
20040253996 | Chen et al. | Dec 2004 | A1 |
20050255892 | Wong et al. | Nov 2005 | A1 |
20050281215 | Budampati et al. | Dec 2005 | A1 |
20060035650 | Amberny et al. | Feb 2006 | A1 |
20060133414 | Luoma et al. | Jun 2006 | A1 |
20060171346 | Kolavennu et al. | Aug 2006 | A1 |
20060174102 | Smith et al. | Aug 2006 | A1 |
Number | Date | Country |
---|---|---|
673184 | Feb 1990 | CH |
4344172 | Jun 1995 | DE |
0607562 | Jul 1994 | EP |
0893931 | Jan 1999 | EP |
1492272 | Dec 2004 | EP |
0070527 | Nov 2000 | WO |
0227640 | Apr 2002 | WO |
03007162 | Jan 2003 | WO |
03102705 | Dec 2003 | WO |
2005029810 | Mar 2005 | WO |
Number | Date | Country | |
---|---|---|---|
20070155423 A1 | Jul 2007 | US |