This application has subject matter related to co-pending application Ser. No. 16/459,264 entitled “CONTROLLER APPLICATION MODULE ORCHESTRATOR” that was filed on Jul. 1, 2019.
Disclosed embodiments relate to process controllers for process control systems.
In deployments of conventional process control systems, also known as process automation systems, the entity which is hosting the control function and responsible for the related control calculations (such as proportional integral differential (PID) control calculations) is typically an embedded computer device/platform, typically described as being a process “controller.” One example of a commercially available embedded controller is the C300 controller provided by Honeywell International.
Each controller comprises computing hardware generally including at least one processor or other computing device, and an associated memory. What is referred to herein as a “controller platform” comprises one controller or a pair of controllers in the case of a redundant controller, where the controller platform hosts in memory a control software “application module” (AM), such as the commercially available EXPERION control execution environment (CEE), also marketed by Honeywell International Inc. Each “controller platform” communicates in a level above with at least one server over a plant-wide network, and with levels below typically through an input/output (I/O) network to I/O devices, then to field devices comprising sensors and actuators that control a portion of the processing equipment in the plant.
In order to ensure a high level of control system availability, the controllers in a process control system are typically deployed in a scheme which provides hardware redundancy, specifically two controller platforms deployed to do the job of only one, specifically a “primary” controller which is actively executing the process control mission and a “backup” controller which is on standby, being ready to assume the control mission if there is a failure of the primary controller. Upon the failure of a primary controller in a redundant controller pair controller platform, non-redundant operation using the backup controller continues until a repair or replacement is made to the primary controller to restore the controller redundancy in the controller platform. The AMs are conventionally deployed in a ratio of 1:1 with the controller platforms. This means each controller platform, whether redundant or not, always hosts only one AM.
All of the controllers 110, 120, and 130 generally utilize only one specific hardware architecture, such as a PowerQUICC processor from Freescale Semiconductor or ARM processors (that were previously called an advanced reduced instruction set computer (RISC) processor). PowerQUICC and ARM processors have architectures that typically require fewer transistors than those with a complex instruction set computing (CISC) architecture, such as X86 processors from Intel Corporation found in most personal computers that have an X86 architecture. Accordingly, controllers principally due to utilizing relatively low cost and low power consumption processors, such as PowerQUICC or ARM processors, provide recognized advantages over processors such as those having an X86 architecture. “X86” as used herein and as generally used in the computing arts refers to any processor compatible with an instruction set referred to as the X86 instruction set, that currently utilizes a 32-bit processor and operating system (OS).
A dedicated (fixed) AM is stored (resides) in one of the respective memories 172 of each of the controller platforms. This is shown as AM 141 in memory 172 of controller 111 that provides an AM, and AM 142 which is analogous to AM 141 that provides an AM for the primary controller 121 and a backup AM that is a backup of the AM 141 stored in local memory for the redundant controller 122, and AM 143 provides an AM for controller 130 which can be AM for only a primary controller, or an AM for a primary controller and backup AM for a redundant controller.
The controller platforms 110, 120, 130 are each shown coupled by an I/O network shown as an ‘I/O network’ 140 for controlling a portion of the processing equipment 160 shown coupled through I/O devices 145 to field devices 150 that comprise sensors and actuators. There is also shown a plant-wide network 170 (e.g., such as an Ethernet network) between the controller platforms 110, 120, 130 and the server 180, and at least one Human-Machine Interface (HMI) 185 associated with the server 180.
When redundant controllers shown as redundant controller 110 and 120 are configured as in the process control system 100 shown in
This Summary is provided to introduce a brief selection of disclosed concepts in a simplified form that are further described below in the Detailed Description including the drawings provided. This Summary is not intended to limit the claimed subject matter's scope.
Disclosed embodiments recognize that a conventional process control system with AMs deployed in a dedicated (or fixed) 1:1 ratio to controller platforms, such as in the conventional process control system 100 shown in
This Disclosure recognizes with newer process control system designs, with modern information technology (IT) concepts such as virtualization and containerization, coupled with specific design adaptations for those technologies relevant to control technology deployments available, AMs can be deployed to controller platforms in a more flexible manner as compared to conventionally always being fixed 1:1 with the controller platforms. Specifically, using a disclosed CAMO, the AMs are made available to any of the controller platforms in the controller pool so that the CAMO determines which specific controller has sufficient spare capacity to host and run the AM, and the AM is then deployed by the CAMO to that particular controller. The AM deployment flexibility to any of the controller platforms in the controller pool provides process control system advantages including allowing multiple AMs to run on one controller platform so that the user does not always need to add hardware when they expand the process control system.
Furthermore, disclosed AM deployment provides flexibility as to which of the controllers in the controller platform the AMs are run on. This can be a significant advantage being over the life expectancy of a plant which runs continuously, because there may be a need to add additional AMs to the set of existing/running AMs on a fixed set of controller platforms, and in order to host the new AMs, or the existing set of AMs needs to be rebalanced to better distribute the load on the available processor and memory resources of existing controller platforms.
Disclosed aspects also include aspects that enable the AMs to be deployed on controllers which conventionally can only utilize a single hardware architecture to now be able to also utilize controllers having 2 or more different hardware architectures, such as the PowerQUICC or ARM architecture used in C300 controllers, and also the X86 architecture. As used herein the term “different hardware architecture” also includes, for example, two or more generations of PowerQUICC or ARM processors, as well as two more generations of the X86 architecture. While PowerQUICC or ARM has the advantages described above, controllers using such processors typically have lower capacity in terms of central processing unit (CPU), memory and flash as they are typically designed with industrial parts to support deployment in harsh environments. The X86 architecture controllers typically comprise commercial off-the-shelf (COTS) hardware, which have capacity that is several magnitudes greater. This disclosed ability to utilize two more different hardware architectures enables a process control system including a controller pool including first type controllers having a first hardware architecture and an I/O pool to be extensible by being able to also utilize second type controller(s) having a second hardware architecture, thus further reducing the chance of loss by the process control system of the control mission.
As noted above the controllers having the first hardware architecture can comprise controllers utilizing a PowerQUICC or an ARM architecture, and the second hardware architecture can comprise a COTS controller platform, such as a platform that may utilize the X86 architecture. Through enabling translation, transfer and synchronization of AM state and value information disclosed herein, controller platforms having a different controller hardware architecture, referred to herein as second type controllers, such as COTS controllers, are capable of hosting the same AMs as the controllers referred to herein as first type controllers having the first hardware architecture.
One disclosed embodiment comprises a method comprising providing a process control system configured for running a process comprising a plurality of controller platforms including controllers comprising computing hardware and memory including first type controllers having a first hardware architecture and at least one second type controller including computing hardware and memory having a second hardware architecture different from the first type controllers coupled to one another by a redundancy network, where the controllers are configured for providing at least one controller pool. A plurality of primary AMs are coupled to the plurality controller platforms by a plant-wide network. There may also be controllers outside the controller pool, where any of the primary AMs can be deployed to controllers in the controller pool or outside the controller pool. The controller platforms are coupled by an I/O mesh network to I/O devices to provide an I/O pool coupled to field devices, that are coupled to processing equipment.
States and values are transferred from at least one of the primary AMs running on one of the first type controllers to a backup AM stored in a memory of the second type controller. This state and value transfer can further comprise translating the primary AM's current state and data information into a hardware architecture independent data format, so that the transferring comprises sending the hardware architecture independent format state and data information to the second type controller, where the second type controller can then perform a second translation comprising translating the hardware architecture independent data format information into a data format compatible with the second hardware architecture.
An alternative transfer mechanism can be to have a first hardware architecture (PowerQUICC or AIM) emulation layer provided on the second type controller (e.g., X86 hardware architecture) that emulates the first hardware architecture (e.g., having a PowerQUICC or ARM architecture), so that the state and data information transferred from the primary AM received in a memory accessible by the second type controller remains in a data format compatible with the first type controller (e.g., PowerQUICC or the ARM) architecture. In this case there is a translation performed by the emulation layer when the state and data information is accessed. There may also be an additional translation used to ensure that the state and data information from the primary AM is modified in a way so that is not specific to a particular version of the AM software before storing the backup AM in the memory accessible by the second type controller.
To ensure that the state and data information received from the primary AM is modified in a way so that is not specific to a particular version of the AM software before storing the backup AM, translation may still be utilized for specific memory addresses embedded within the state even with an emulation layer. This is because the exact location in memory where the state and data information is stored could be different between the two controllers especially when the controller hosting the primary AM and the controller hosting the secondary AM, and which has the second hardware architecture, may have significantly different memory capacities. A single controller with the second hardware architecture (e.g. X86) may host backup AMs for primary AMs from multiple other controllers having the first hardware architecture.
The backup AM is then extended to the second type controller by deploying the backup AM there. Switching is then performed to utilize the second type controller as an active controller while continuing to run the process.
Disclosed embodiments are described with reference to the attached figures, wherein like reference numerals are used throughout the figures to designate similar or equivalent elements. The figures are not drawn to scale and they are provided merely to illustrate certain disclosed aspects. Several disclosed aspects are described below with reference to example applications for illustration. It should be understood that numerous specific details, relationships, and methods are set forth to provide a full understanding of the disclosed embodiments.
Disclosed embodiments are described with reference to the attached figures, wherein like reference numerals are used throughout the figures to designate similar or equivalent elements. The figures are not drawn to scale and they are provided merely to illustrate certain disclosed aspects. Several disclosed aspects are described below with reference to example applications for illustration. It should be understood that numerous specific details, relationships, and methods are set forth to provide a full understanding of the disclosed embodiments.
As used herein an industrial process facility runs an industrial process involving a tangible material that disclosed embodiments apply. For example, oil and gas, chemical, beverage, pharmaceutical, pulp and paper manufacturing, petroleum processes, electrical, and water. An industrial process facility is distinct from a data processing system that only performs data manipulations.
The controller platforms in the respective first and second controller pools 210 and 260 are shown coupled to one another by a first redundancy network 225 and a second redundancy network 235. Each redundancy network 225, 235 has a sufficient speed for time synchronization and coordination for the respective controller platforms in the first controller pool 210, and for the controller platforms in the second controller pool 260.
The controller pools 210, 260 form an extensible set of hosts that provide resources. These controller pools 210, 260 are extensible because the total controller capacity can be increased by adding additional controllers that have the second hardware architecture that is different from the first hardware architecture. Each of the AMs shown as primary AMs 231, 232, on the other hand, is a software workload that is deployed to the controller pool. When a specific AM is redundant by creating a backup AM, it is then made up of two separate software workloads, a primary AM and a backup AM. Regarding the synchronization provided by the redundancy networks 225, 235, in order for a primary and backup AM in a controller platform to stay synchronized, the primary AM needs to send state and value data to the backup AM as it runs, so that the backup AM ‘knows’ exactly the state and values of the process to be able to take over for the primary AM at any time if it needs to.
Regarding controller pools, although shown in
The controller pool 260 includes controller 261, controller 262 and controller N shown as controller 263. The controllers have the first hardware architecture comprise computing hardware 171 having associated memory 172. Through disclosed translation and synchronization of AM state information, the second type controllers 218, 219 having the second hardware architecture also including computing hardware and associated memory, can join either of the controller pools 210, 260 that enables backing up the controllers having the first hardware architecture in the controller pool(s). After disclosed translation and synchronization of AM states and values, the second type controller(s) having the second hardware architecture, comprising second type controllers 218, 219 shown as COTS controllers, due to having a backup AM with the same states and values is able to assume the ‘primary’ AM's role and associated control mission should a fault occur on any of the first type controllers having the first hardware architecture.
The AMs in process control system 200 are shown as first AMs 231 associated with the first controller pool 210 and a second AMs 232 associated with the second controller pool 260. A plant-wide network shown as 170 (such as an Ethernet network) couples together the controllers in the respective controller pools 210 and 260, the CAMO 240a-c, and the AMs 231 and 232.
The CAMO 240a-c is configured to dynamically deploy to the AMs in each of the AMs 231, 232 to the computing platforms in their respective controller pools 210, 260, or when there is insufficient computing capacity in the controller pools 210, 260 to deploy AMs after disclosed AM state and value translation to the second type controllers 218 or 219. The CAMO 240a-c generally receives inputs to monitor plant topology and computing hardware and memory resources, and in the event of a controller failure the CAMO 240a-c automatically, or with optional user interaction, can perform functions such as to restore a new backup AM on a controller platform, a redundant backup controller on a controller platform, or a second type controllers 218, 219 having a second hardware architecture shown as COTS controllers. The CAMO can provide other responsibilities such as providing information to the user when deploying new AMs to allow the user to decide where AMs run by default, or which would allow the CAMO to make that decision.
The CAMO may be stored in any memory in the process control system 200, including a distributed arrangement with CAMO portions 240a, 240b within the controller pools 210, 260 shown in
The AMs 231 and 232 generally comprise a software ‘container’ for a control software application. The AMs which control software applications can be internally developed software (such as the Honeywell EXPERION CEE, or other advanced applications), or 3rd party applications. AMs can be inherently redundancy aware/capable (as is the case with the EXPERION CEE), or a conventional application that is not designed for redundancy.
The process control system 200 includes an I/O mesh network 240, connected between the controller pools 210, 260 and the I/O devices 245. The IO mesh network 240 is needed because the job of a controller is to process input data that comes from inputs including sensor inputs, and to make intelligent decisions about how to change the outputs that are coupled to actuators in order to govern the process itself, where the controllers communicate directly with the I/O devices 245. Although shown serving two controller pools 210 and 260, the I/O mesh network 240 can serve one controller pool, or three or more controller pools, or controllers outside of a controller pool.
Each controller pool 210 and 260 is thus a flexible pool of controller resources, for hosting a set AMs shown, that can be dynamically managed by a CAMO shown distributed as 240a and 240b in the first and second controller pools 210, 260, and a portion 240c outside of the controller pools 210, 260. In
Upon the failure of a controller in a controller pool 210, 260, typically due to a hardware component failure, any primary AMs that were running inside of it will switchover to their backup AM running on another controller in the controller pool which resumes control albeit non-redundant after the failure. Any backup AMs running on that failing controller will cease to run, leaving their primary AM running elsewhere on the controller pool running, unaffected, but temporarily non-redundant. A new backup AM can be brought up automatically by the CAMO, with this new backup AM restoring the overall process control system 200 availability relatively quickly.
A disclosed CAMO for network control systems thus deploys AMs in a more flexible manner to the controller platforms. Deployment can be based on the preference of the user, including automatically, manually, or a mix of automatic and manual-based on the nature of the AM or failure scenario, mapping AMs to controllers in controller pools in one the following example non 1:1 ways.
As noted above the respective controllers in a controller pool 210, 260 besides sharing AMs are backed-up by at least one second type controller 218, 219 having a second hardware architecture shown as COTS controllers. Through disclosed translation and synchronization of AM state information, the second type controllers 218, 219 can join the controller pool, that enables backing up the first type controllers having the first hardware architecture in the controller pools 210, 260, after translation of the AM states and values, the controller(s) having the second hardware architecture due to having a backup AM being able to assume the ‘primary’ AM role and associated control mission should a fault occur on any of the first type controllers in the controller pools 210, 260 having the first hardware architecture.
Disclosed aspects also include a method to provide a controller backup with controllers having a second hardware architecture for controllers in a controller pool having a first hardware architecture.
The method 300 comprises step 301 comprising providing a process control system 200 configured for running a process comprising a plurality of controller platforms including first type controllers having a first hardware architecture and at least one second type controller having a second hardware architecture that is different from the first hardware architecture controllers coupled to one another by a redundancy network 225, 235 for providing a controller pool (210, 260), an AMs 231, 232 comprising a plurality of AMs coupled to the plurality of controller platforms by a plant-wide network 170. As noted above, in the process control system there may also be controllers outside the controller pool besides second type controllers 218, 219, where the AMs can be deployed by the CAMO 240a, 240b, 240c to any of these controllers. The plurality of controller platforms are coupled by an I/O mesh network 240 to I/O devices to provide an I/O pool 245 coupled to field devices 150 that are coupled to processing equipment 160.
Step 302 comprises transferring states and values from at least one of the AMs running on one of the first type controllers to a memory accessible by the second type controller to store a backup AM. Step 303 comprises extending synchronization to a first of the second type controllers. Synchronization as described above refers to redundancy synchronization, whereby the state and data of the second type controller and at least one of the first type controllers are synchronized so that the second type controller is kept ready to take over as the active controller upon failure of one of the first type controllers, where this synchronization is needed to maintain redundancy.
With a disclosed CAMO and a controller pool, the redundancy is no longer for the entire controller, but rather for the AMs running on it. Accordingly, on the first type controllers in the case of a redundant controller arrangement in one example, one can have two AMs, one of which is a primary AM with a backup AM on a different controller (of the same or different hardware type) and the second AM can be a backup AM for an AM on a third controller that can be the same hardware type or a different hardware type. This is a significant difference between a disclosed CAMO-based controller pool vs a traditional 1:1 redundancy, where for traditional 1:1 redundancy there is only always one AM per controller, and the redundancy role (primary vs backup) of the AM and that of the controller are one and the same.
As noted above it is the CAMO that can provide the orchestration capability including synchronization to deploy the AMs to controllers in the network including the backup AMs. Step 304 comprises switching to utilize the second type controller by deploying the backup AM as an active controller while continuing to run the process.
Disclosed embodiments are further illustrated by the following specific Examples, which should not be construed as limiting the scope or content of this Disclosure in any way.
Disclosed methods are generally implemented by:
1. Extending the capability to run AMs, such as CEE or other software applications, on second type controllers having a second hardware architecture (such as COTS controllers) as compared to the first type controllers having the first hardware architecture.
2. Extending the CAMO functionality, both off-line and during run-time, to have awareness of the controllers having the second hardware architecture hosting AM(s) to gain the state value information needed to provide the awareness provided through a combination of provisioning/configuration and, given that, some automated discovery, and to exploit these second hardware architecture type controller(s) hosting AM(s) as backup resources when sufficient resources are no longer available on the first computing hardware type controllers, such as due to a node failure. An example node failure scenario can be when a controller node fails, and the primary applications and state and value information are then transferred to its hot backups, being another controller in the controller pool, but there may be insufficient controller resources at any particular time available to support new secondary workloads on the remaining controllers in the controller pool(s).
3. Extending the synchronization mechanism and failover mechanism to allow synchronization to second type controllers having a second hardware architecture, and failover from the failed first type controller having the first hardware architecture to a second type controller having the second hardware architecture when a controller node having the first hardware architecture running a primary workload fails. One can extend or modify the synchronization mechanism and failover mechanism by 1) allowing AMs on the first type controllers in the controller pool(s) to establish a redundancy relationship with AMs on second type controller(s) having the second hardware architecture type, provided all necessary capabilities required to host that AM including a backup AM are provided.
Also, as the first type controllers in the controller pool(s) having the first hardware architecture type are repaired/replaced, and thus sufficient compute capability is restored to the controller pool to have all primary functions and secondary functions of the AMs return to these first type controllers, then have the workload can be transferred back from the second type controllers back to one or more of the first type controllers in the controller pool. Such a transfer back can be user commanded. Being manually commanded enables operator control to what happens and when, and also allows observation of a direct cause and effect phenomena, which if it fails, is easily recognized and can be quickly addressed. Although a manual commanded controller transfer is generally performed, the transfer back from the second type controller to first type controllers can also be an automated transfer enabled by an authorization by the operator, or instead be fully automatic without any operator authorization.
Disclosed embodiments can be applied to generally any process control system. For example, for oil refining, chemical processing, or power generation.
While various disclosed embodiments have been described above, it should be understood that they have been presented by way of example only, and not limitation. Numerous changes to the subject matter disclosed herein can be made in accordance with this Disclosure without departing from the spirit or scope of this Disclosure. In addition, while a particular feature may have been disclosed with respect to only one of several implementations, such feature may be combined with one or more other features of the other implementations as may be desired and advantageous for any given or particular application.
Number | Name | Date | Kind |
---|---|---|---|
4133027 | Hogan | Jan 1979 | A |
4888726 | Struger et al. | Dec 1989 | A |
4958270 | McLaughlin et al. | Sep 1990 | A |
5088021 | McLaughlin et al. | Feb 1992 | A |
5361198 | Harmon et al. | Nov 1994 | A |
5432927 | Grote et al. | Jul 1995 | A |
5546301 | Agrawl et al. | Aug 1996 | A |
5933347 | Cook et al. | Aug 1999 | A |
5963448 | Flood et al. | Oct 1999 | A |
6008985 | Lake et al. | Dec 1999 | A |
6088679 | Barkley | Jul 2000 | A |
6138049 | McLaughlin et al. | Oct 2000 | A |
6170044 | McLaughlin et al. | Jan 2001 | B1 |
6272386 | McLaughlin et al. | Aug 2001 | B1 |
6442663 | Sun | Aug 2002 | B1 |
6560330 | Gabriel | May 2003 | B2 |
7237148 | Czajkowski et al. | Jun 2007 | B2 |
7313448 | Detrich et al. | Dec 2007 | B2 |
7434047 | Sharma | Oct 2008 | B2 |
7436797 | Shepard et al. | Oct 2008 | B2 |
7515972 | Kumar et al. | Apr 2009 | B2 |
7555752 | Groot et al. | Jun 2009 | B2 |
7577575 | Donner et al. | Aug 2009 | B1 |
7630777 | Rudnick et al. | Dec 2009 | B2 |
8280530 | Kase | Oct 2012 | B2 |
8570922 | Pratt, Jr. et al. | Oct 2013 | B2 |
8676219 | Pratt, Jr. et al. | Mar 2014 | B2 |
8948067 | Chernoguzov et al. | Feb 2015 | B2 |
9128479 | Reichard et al. | Sep 2015 | B2 |
9665089 | Schreder et al. | May 2017 | B2 |
9843624 | Taaghot | Dec 2017 | B1 |
9875207 | Lv et al. | Jan 2018 | B2 |
9935828 | Tal et al. | Apr 2018 | B2 |
9873346 | McLaughlin et al. | May 2018 | B2 |
9990286 | McLaughlin et al. | Jun 2018 | B1 |
10175682 | Peake et al. | Jan 2019 | B2 |
10176606 | Jammikunta et al. | Jan 2019 | B2 |
10178177 | McLaughlin et al. | Jan 2019 | B2 |
10237712 | Gopalakrishnan et al. | Mar 2019 | B2 |
10296515 | Nikhra et al. | May 2019 | B2 |
10348704 | Figueira | Jul 2019 | B2 |
10354343 | Bodanapu et al. | Jul 2019 | B2 |
10441832 | Trivelpiece et al. | Oct 2019 | B1 |
10565046 | Tran et al. | Feb 2020 | B2 |
10997113 | Reineke et al. | May 2021 | B1 |
11036656 | Mclaughlin et al. | Jun 2021 | B2 |
20030028538 | Eikenbery | Feb 2003 | A1 |
20040158713 | Aneweer et al. | Aug 2004 | A1 |
20040233237 | Randow | Nov 2004 | A1 |
20050022065 | Dixon | Jan 2005 | A1 |
20050022078 | Subramanian | Jan 2005 | A1 |
20050276233 | Shepard et al. | Dec 2005 | A1 |
20060130021 | Plum et al. | Jun 2006 | A1 |
20060236198 | Lintz et al. | Oct 2006 | A1 |
20070100472 | Johnson et al. | May 2007 | A1 |
20080015714 | Rudnick et al. | Jan 2008 | A1 |
20080074998 | Becker et al. | Mar 2008 | A1 |
20080120125 | Chavez | May 2008 | A1 |
20090031403 | Huang | Jan 2009 | A1 |
20090222654 | Hum | Sep 2009 | A1 |
20100064137 | Mcgrew et al. | Mar 2010 | A1 |
20100271989 | Chernoguzov et al. | Oct 2010 | A1 |
20100315298 | Biswas et al. | Dec 2010 | A1 |
20110178611 | Daraiseh et al. | Jul 2011 | A1 |
20110258433 | Pulini et al. | Oct 2011 | A1 |
20120076007 | Nelson | Mar 2012 | A1 |
20120078391 | Zornio et al. | Mar 2012 | A1 |
20120117416 | Mclaughlin | May 2012 | A1 |
20120300420 | Muldowney et al. | Nov 2012 | A1 |
20130268799 | Mestery et al. | Oct 2013 | A1 |
20140032366 | Spitz et al. | Jan 2014 | A1 |
20140068579 | Dawson et al. | Mar 2014 | A1 |
20140173246 | Sandstrom | Jun 2014 | A1 |
20140173336 | Bennah | Jun 2014 | A1 |
20140245077 | Kanso et al. | Aug 2014 | A1 |
20140298091 | Carlen et al. | Oct 2014 | A1 |
20150018977 | Law et al. | Jan 2015 | A1 |
20150019191 | Maturana et al. | Jan 2015 | A1 |
20150149767 | Oualha et al. | May 2015 | A1 |
20150154136 | Markovic et al. | Jun 2015 | A1 |
20150215300 | Buonacuore et al. | Jul 2015 | A1 |
20150278144 | McLaughlin et al. | Oct 2015 | A1 |
20150323910 | McLaughlin et al. | Nov 2015 | A1 |
20150341364 | Basso et al. | Nov 2015 | A1 |
20150378356 | Hefeeda et al. | Dec 2015 | A1 |
20160062350 | Prall et al. | Mar 2016 | A1 |
20160103431 | Ganapathi | Apr 2016 | A1 |
20160139999 | Gabler et al. | May 2016 | A1 |
20160299497 | McLaughlin | Oct 2016 | A1 |
20160320759 | Macha et al. | Nov 2016 | A1 |
20160327923 | Papenbreer et al. | Nov 2016 | A1 |
20170126404 | Unagami et al. | May 2017 | A1 |
20170185055 | Nakajima et al. | Jun 2017 | A1 |
20170199515 | Bhat et al. | Jul 2017 | A1 |
20170228225 | Rachlin | Aug 2017 | A1 |
20170277607 | Samii et al. | Sep 2017 | A1 |
20170300024 | Nixon et al. | Oct 2017 | A1 |
20170359222 | Dutta et al. | Dec 2017 | A1 |
20180046487 | Matters et al. | Feb 2018 | A1 |
20180121843 | Connely, IV | May 2018 | A1 |
20180259923 | De et al. | Sep 2018 | A1 |
20180299873 | Chauvet et al. | Oct 2018 | A1 |
20180321662 | Nixon et al. | Nov 2018 | A1 |
20180324609 | Diancin | Nov 2018 | A1 |
20180364673 | Van et al. | Dec 2018 | A1 |
20190042378 | Wouhaybi et al. | Feb 2019 | A1 |
20190050342 | Drayton | Feb 2019 | A1 |
20190056719 | Ong | Feb 2019 | A1 |
20190102226 | Caldato et al. | Apr 2019 | A1 |
20190104437 | Bartfai-Walcott et al. | Apr 2019 | A1 |
20190140989 | Wise et al. | May 2019 | A1 |
20190174207 | Cella et al. | Jun 2019 | A1 |
20190179678 | Banerjee et al. | Jun 2019 | A1 |
20190245716 | Coombes et al. | Aug 2019 | A1 |
20190274084 | Daniels et al. | Sep 2019 | A1 |
20190324874 | Gill et al. | Oct 2019 | A1 |
20190340269 | Biernat et al. | Nov 2019 | A1 |
20190370118 | Salapura et al. | Dec 2019 | A1 |
20200012569 | Natanzon et al. | Jan 2020 | A1 |
20200026575 | Guim et al. | Jan 2020 | A1 |
20200029086 | Zou et al. | Jan 2020 | A1 |
20200103861 | Flood | Apr 2020 | A1 |
20200104153 | Shibayama et al. | Apr 2020 | A1 |
20200127411 | Pakimo et al. | Apr 2020 | A1 |
20200136943 | Banyai et al. | Apr 2020 | A1 |
20200236162 | Bouzon et al. | Jul 2020 | A1 |
20200253067 | Pakimo et al. | Aug 2020 | A1 |
20200310394 | Wouhaybi | Oct 2020 | A1 |
20200313960 | Rosa-Bian et al. | Oct 2020 | A1 |
20200319623 | McLaughlin et al. | Oct 2020 | A1 |
20200333765 | Biernat et al. | Oct 2020 | A1 |
20210096759 | Thakkilapati et al. | Apr 2021 | A1 |
20210152495 | Craig et al. | May 2021 | A1 |
20220138335 | Rachlin | May 2022 | A1 |
Number | Date | Country |
---|---|---|
103354190 | Oct 2013 | CN |
104241972 | Dec 2014 | CN |
109522051 | Mar 2019 | CN |
0416891 | Mar 1991 | EP |
2184903 | May 2010 | EP |
3789834 | Mar 2021 | EP |
2404261 | Jan 2005 | GB |
9423367 | Oct 1994 | WO |
PCTUS9403707 | Oct 1994 | WO |
2011041413 | Apr 2011 | WO |
2015169352 | Nov 2015 | WO |
2017064560 | Apr 2017 | WO |
2019227401 | Dec 2019 | WO |
Entry |
---|
Wikipedia, “DNA Rail”; Retrieved from “https://en.wikipedia.org/w/index.php?title=DIN_rail&oldid=946791884”, Retrieved on: Sep. 23, 2020 (4 pages total). |
“Everything You Need To Know About DIN Rails”, RS Components, downloaded Apr. 21, 2020, https://uk.rs-online.com Retrieved on: Sep. 23, 2020 (5 pages total). |
Honeywell, High-Performance Process Manager Planning, HP02-500, Release 530, CE Compliant, Revision 05—Mar. 20, 1998 (330 pages total). |
Arnold Offner, “Din-Rail in the Electrical Control Cabinet and Junction Box”, Presented on Nov. 12, 2008 at the IEEE SC2 Committee Meeting in Tucson, Arizona. (13 pages total). |
“DeltaV™ Virtualization—High Availability and Disaster Recover”, DeltaV Distributed Control System, Whitepaper, Emerson Process Management, Oct. 2014 (10 pages total). |
“Experion CEE-based Controllers and I/O Overview, Doc # EP03-290-400, Release # 400”, Jul. 2010, Version 1.0 (retrieved from https://www.nexinstrument.com/assets/images/pdf/TK-PR.pdf on Sep. 4, 2020) (43 pages total). |
Australian Examination Report dated Sep. 1, 2022, issued in connection with corresponding AU application No. 2021229183 (3 pages total). |
European Examination Report dated Feb. 11, 2022, issued in connection with corresponding EP Application No. 20165415.9 (10 pages total). |
Extended European Search Report dated Jul. 9, 2021 for corresponding EP Application No. 21164736.7 (8 pages total). |
Extended European Search Report dated Aug. 20, 2021, issued in connection with corresponding European Patent Application No. 21165382.9 (10 pages total). |
Extended European Search Report dated Jul. 27, 2020, issued in connection with corresponding European Patent Application No. 20165416.7 (9 pages total). |
Extended European Search Report dated Jun. 29, 2021, issued in connection with corresponding European Patent Application No. 21156993.4 (8 pages total). |
Extended European Search Report dated Nov. 18, 2021, issued in connection with corresponding European Patent Application No. 21177860.1 (8 pages total). |
Extended European Search Report dated Oct. 23, 2020, issued in connection with corresponding European Patent Application No. 20180113.1 (8 pages total). |
Extended European Search Report dated Sep. 21, 2021, issued in connection with corresponding European Patent Application No. 21164739.1 (8 pages total). |
Indian Examination Report dated Feb. 14, 2022; issued in connection with corresponding Indian Application No. 202114012845 (7 pages total). |
Indian Examination Report dated Feb. 7, 2022; issued in connection with corresponding Indian Application No. 202114013519 (6 pages total). |
Cheatham, Jason A., John M. Emmert, and Stan Baumgart. “A survey of fault tolerant methodologies for FPGAs.” ACM Transactions on Design Automation of Electronic Systems (TODAES) 11, No. 2 (2006): 501-533. (Year: 2006) (33 pages total). |
T. Panhofer and M. Delvai, “Self-Healing Circuits for Space-Applications,” 2007 International Conference on Field Programmable Logic and Applications, Amsterdam, Netherlands, 2007, pp. 505-506, doi: 10.1109/FPL.2007.4380701. (Year: 2007) (2 pages total). |
M. R. Boesen, J. Madsen and D. Keymeulen, “Autonomous distributed self-organizing and self-healing hardware architecture—The eDNA concept,” 2011 Aerospace Conference, Big Sky, MT, USA, 2011, pp. 1-13, doi: 10.1109/ AERO.2011.5747476. (Year: 2011) (13 pages total). |
C Popa and A. Stan, “A self-healing single core architecture using dynamically reconfigurable devices,” 2012 16th International Conference on System Theory, Control and Computing (ICSTCC), Sinaia, Romania, 2012, pp. 1-6. (Year: 2012) (6 pages total). |
G. D. Mois, M. Hulea, S. Folea and L. Miclea, “Self-healing capabilities through wireless reconfiguration of FPGAs,” 2011 9th East-West Design & Test Symposium (EWDTS), Sevastopol, Ukraine, 2011, pp. 22-27, doi: 10.1109/ EWDTS.2011.6116410. (Year: 2011) (6 pages total). |
M. Balaz and S. Kristofik, “Generic Self Repair Architecture with Multiple Fault Handling Capability,” 2015 Euromicro Conference on Digital System Design, Madeira, Portugal, 2015, pp. 197-204, doi: 10.1109/DSD.2015.118. (Year: 2015) (8pages total). |
Yu-jen Huang, Da-ming Chang and Jin-fu Li, “A Built-In Redundancy-Analysis Scheme for Self-Repairable RAMs with Two-Level Redundancy,” 2006 21st IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, Arlington, VA, USA, 2006, pp. 362-370, doi: 10.1109/DFT.2006.6. (Year: 2006) (9 pages total). |
Indian Examination Report dated Apr. 11, 2022, issued in connection with corresponding Indian Application No. 202114041005 (8 pages total). |
Extended European Search Report dated Mar. 10, 2022 issued in connection with corresponding EP Application No. 21195635.4 (18 pages total). |
Extended European Search Report dated Mar. 21, 2022 issued in connection with corresponding EP Application No. 21205397.9 (9 pages total). |
Number | Date | Country | |
---|---|---|---|
20210302927 A1 | Sep 2021 | US |