WirelessHART: Applying Wireless Technology in Real-Time Industrial Process Control
read more
Citations
Industrial Internet of Things: Challenges, Opportunities, and Directions
Implementing smart factory of Industrie 4.0: an outlook
A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities
Cyber–Physical Systems: A Perspective at the Centennial
A survey of intrusion detection in Internet of Things
References
Wireless sensor networks: a survey
A survey on sensor networks
An Energy-Efficient MAC Protocol for Wireless Sensor Networks
An energy-efficient MAC protocol for wireless sensor networks
A survey on routing protocols for wireless sensor networks
Related Papers (5)
Industrial Wireless Sensor Networks: Challenges, Design Principles, and Technical Approaches
Frequently Asked Questions (9)
Q2. What are the future works mentioned in the paper "Wirelesshart: applying wireless technology in real-time industrial process control" ?
For future work, the authors will build a full-featured WirelessHART prototype. Another avenue of future work is the network manager. The authors believe the scheduling algorithms can be vastly different depending on the optimization goal.
Q3. What is the purpose of the session table?
The session table is central in the design as all the endto-end communication in WirelessHART is built upon the concept of secure session.
Q4. How many blocks of data can be processed in the TsTXAckDelay period?
Given the relatively slow data transmission rate (250kbps), the authors may only need to process one block of data in the TsTXAckDelay period, regardless of the message length.
Q5. What is the function of the superframe table and link table?
The superframe table and link table store communication configurations created by the network manager; the neighbor table is a list of neighbor nodes that the device can reach directly and the graph table is used to collaborate with the network layer and record routing information.
Q6. What are the key types used to generate MICs on the MAC layer?
Four types of keys are defined in the security architecture:• Public Keys which are used to generate MICs on the MAC layer by the joining devices.•
Q7. How can the authors change the prescaler of the timer?
By changing the internal prescaler of the TPM module, the authors can change the clock frequency of the timer as follows:ftimerclock = fbusclock prescalerCurrently, the prescaler is set to 16.
Q8. What is the basic structure of a typical wirelessHART network?
As shown in Figure 4, the basic elements of a typical WirelessHART network include: (1) Field Devices that are attached to the plant process, (2) Handheld which is a portable WirelessHART-enabled computer used to configure devices, run diagnostics, and perform calibrations, (3) A gateway that connects host applications with field devices, and (4) A network manager that is responsible for configuring the network, scheduling and managing communication between WirelessHART devices.
Q9. What is the purpose of the routing device?
As the packet is routed, each routing device utilizes the next network device address in the list to determine the next hop until the destination device is reached.