• Title/Summary/Keyword: Industrial control network

Search Result 745, Processing Time 0.027 seconds

Performance Analysis and Improvement of RS485 Based Low Speed and Multi-Node CSMA/CD for Control Network System (RS485 기반 다수 노드 제어용 저속통신망에서의 CSMA/CD 기법 적용 및 성능 개선 방안)

  • Kim, Min Ki;Choi, Yong Wo;Park, Dong Chan;Kim, Suk Chan
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.20 no.1
    • /
    • pp.27-35
    • /
    • 2015
  • In this paper, we suggested a RS485 based CSMA/CD protocol that is available in low speed multi-node networks such as industry control communication network and home network etc. The suggested protocol was compared to widely used Master-Slave protocol, Modbus. We modeled realistic control network and showed that the average delay and throughput performance were significantly improved in the different transmission rates.

Ethernet with Virtual Polling Algorithm for real-Time Industrial Communication Network (실시간 산업용 네트워크를 위한 가상 폴링 기반 이더넷 구현)

  • Kim, T. J.;Lee, K. C;Lee, S.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2001.04a
    • /
    • pp.602-605
    • /
    • 2001
  • This paper focus on a method to use Ethernet Network for Industrial Communication Network. Ethernet use the CSMA/CD MAC(Medium Access Control) Protocol at the Data-Link Layer, Which isn't suit for Industrial Communication Network requiring Real-Time Communication, periodic data processing, critical data processing characteristics. In this paper we proposed the Virtual Polling Algorithm at the Application Layer will be solution of using the Ethernet Network for the Industrial Communication Network, Proposed Algorithm terminate the Collision in the network thus Delay Time is reduced and Real-Time Communication will be implemented.

  • PDF

Performance Analysis of Wired/Wireless Hybrid Network based on Common Industrial Protocol (Common Industrial Protocol 기반의 유무선 하이브리드 네트워크에 관한 성능 분석)

  • Jung, Ji-Won;Lee, Seung-Ki;Kim, Dong-Sung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.11
    • /
    • pp.1119-1127
    • /
    • 2007
  • This paper is concerned with a performance analysis using a wired/wireless hybrid network based on Common Industrial Protocol(CIP). For the performance analysis, the data transmission time, average end-to-end delay and throughput between DeviceNet and the wireless devices are investigated. The experimental results show the performance in terms of the polling/COS service time of CIP based hybrid network.

Position Control of Motor for Yard Crane Drive Using Lonworks network (LonWorks네트워크를 이용한 야드 크레인 구동용 전동기 위치제어)

  • 전태원;최명규;김동식;김홍근;노희철
    • The Transactions of the Korean Institute of Electrical Engineers B
    • /
    • v.50 no.1
    • /
    • pp.37-44
    • /
    • 2001
  • This paper describes the position control method in yard crane drive system using Lonworks network, which is a leading industrial control network. The network is composed of host computer and three motor drive systems for both gantry and trolley position controls of both gantry and trolley are controlled with the simulator of yard crane, the size of which is about 1/10 with the real yard crane.

  • PDF

Study on the Security R&R of OT-IT for Control System Network Boundaries (제어 네트워크 경계에 대한 OT-IT 책임 역할 연구)

  • WOO, Young Han;Kwon, Hun Yeong
    • Journal of Information Technology Services
    • /
    • v.19 no.5
    • /
    • pp.33-47
    • /
    • 2020
  • In recent years, due to the demand for operating efficiency and cost reduction of industrial facilities, remote access via the Internet is expanding. the control network accelerates from network separation to network connection due to the development of IIoT (Industrial Internet of Things) technology. Transition of control network is a new opportunity, but concerns about cybersecurity are also growing. Therefore, manufacturers must reflect security compliance and standards in consideration of the Internet connection environment, and enterprises must newly recognize the connection area of the control network as a security management target. In this study, the core target of the control system security threat is defined as the network boundary, and issues regarding the security architecture configuration for the boundary and the role & responsibility of the working organization are covered. Enterprises do not integrate the design organization with the operation organization after go-live, and are not consistently reflecting security considerations from design to operation. At this point, the expansion of the control network is a big transition that calls for the establishment of a responsible organization and reinforcement of the role of the network boundary area where there is a concern about lack of management. Thus, through the organization of the facility network and the analysis of the roles between each organization, an static perspective and difference in perception were derived. In addition, standards and guidelines required for reinforcing network boundary security were studied to address essential operational standards that required the Internet connection of the control network. This study will help establish a network boundary management system that should be considered at the enterprise level in the future.

Performance Analysis of Switched Ethernets with Different Topologies for Industrial Communications (공장자동화를 위한 토폴로지에 따른 스위칭 이더넷의 성능분석)

  • Kim, Myung-Kyun;Park, Zin-Won
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.99-108
    • /
    • 2004
  • In this paper, the performance of switched ethernet networks with different topologies as an industrial control networks is analyzed. The switched ethernet eliminated data collisions on the network and can be used to transmit real-time data. While the amount of data on the network is small compared to the computer networks, the industrial control networks require the real-time data delivery. In this paper, we analyze and compare the network performance of switched ethernet networks with linear and tree topologies whether they satisfy the real-time data delivery requirement needed to be used as the industrial control networks.

Performance Evaluation of Switched Ethernet for Real-time Industrial Communication (실시간 산업용 통신을 위한 Switched Ethernet의 성능 평가)

  • Kim, D. H.;Lee, K. C.;Lee, S.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2002.05a
    • /
    • pp.491-494
    • /
    • 2002
  • The real-time industrial network often referred to as fieldbus, is an important element for building automated manufacturing systems. Thus, in order to satisfy the real-time requirements of field devices such as sensors, actuators, and controllers. numerous standard organizations and vendors have developed various fieldbus protocols such as Profibus, WorldFIP and Foundation Fieldbus. However, the application of fieldbus has been limited due to the high cost of hardware and the difficulty in interfacing with multi-vendor products. In order to solve these problems, the computer network technology, especially Ethernet (IEEE 802.3), is being adopted lo the industrial environment. The crucial technical obstacle for Ethernet is that its non-deterministic behavior makes it inadequate for industrial applications where real-time data such as control command and alarm signal hale to be delivered within a certain time limit. Recently, the development of switched Ethernet shows a very promising prospect for industrial application due to the elimination of uncertainties in the network operation resulting in much improved performance. This paper focuses on the application of the switched Ethernet for industrial comm unications.

  • PDF

Obstacle Avoidance Algorithm for a Network-based Autonomous Mobile Robot

  • Sohn, Sook-Yung;Kim, Hong-Ryeol;Kim, Dae-Won;Kim, Hong-Seok;Lee, Ho-Gil
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.831-833
    • /
    • 2004
  • In this paper, an obstacle avoidance algorithm is proposed for a network-based robot considering network delay by distribution. The proposed algorithm is based on the VFH(Vector Field Histogram) algorithm, and for the network-based robot system, in which it is assumed robot localization information is transmitted through network communication. In this paper, target vector for the VFH algorithm is estimated through the robot localization information and the measurement of its delay by distribution. The delay measurement is performed by time-stamp method. To synchronize all local clocks of the nodes distributed on the network, a global clock synchronization method is adopted. With the delay measurement, the robot localization estimation is performed by calculating the kinematics of the robot. The validation of the proposed algorithm is performed through the performance comparison of the obstacle avoidance between the proposed algorithm and the existing VFH algorithm on the network-based autonomous mobile robot.

  • PDF

The development of industrial secure L2 switch and introduction example for management and security improvement of supervisory control network in purification plant (정수장 감시제어망의 관리와 보안개선을 위한 산업용 보안 L2스위치 개발 및 적용사례)

  • Kim, Yunha;Yu, Chool;Oh, Eun;Kim, Chanmoon;Park, Ikdong;Kim, Yongseong;Choi, Hyunju
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.33 no.5
    • /
    • pp.329-339
    • /
    • 2019
  • Recently, the advancement of information and communication technology(ICT) is expanding the connectivity through Internet of Things(IoT), and the media of connection is also expanding from wire/cable transmission to broadband wireless communication, which has significantly improved mobility. This hyperconnectivity has become a key element of the fourth industrial revolution, whereas the supervisory control network of purification plants in korea is operated as a communication network separated from the outside, thereby lagging in terms of connectivity. This is considered the best way to ensure security, and thus there is hardly any consideration of establishing alternatives to operate an efficient and stable communication network. Moreover, security for management of a commercialized communication network and network management solution may be accompanied by immense costs, making it more difficult to make new attempts. Therefore, to improve the conditions for the current supervisory control network of purification plants, this study developed a industrial security L2 switch that supports modbus TCP(Transmission Control Protocol) communication and encryption function of the transmission section. As a result, the communication security performance improved significantly, and the cost for implementing the network management system using Historical Trend and information of HMI(Human Machine Interface) could be reduced by approximately KRW 200 million. The results of this study may be applied to systems for gas, electricity and social safety nets that are infrastructure communication networks that are similar to purification plants.

A Study on a Internet Remote Control and Monitoring System using a Microprocessor Embedded Controller (마이크로프로세서를 이용한 인터넷 원격감시제어 시스템에 관한 연구)

  • 서인호;유영호
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.25 no.4
    • /
    • pp.869-879
    • /
    • 2001
  • Serial communications such as RS-232C or RS-485 have been used to control and monitor the industrial plants for a long in cooperating with a computer or microprocessor. In recent years a great deal of effort has been made to achieve these control and monitoring through Internet network. This paper proposes a microprocessor system to implement remote control and monitoring system through Internet network. The proposed system uses NE2000 compatible NIC for data link and physical layer to access Internet network The microprocessor employed in the system plays a role of interfacing NE2000 compatible NIC interpreting protocols above link layer, controlling and monitoring industrial plants simultaneously. This paper also shows MMI and experimental results which control and monitor two power plants on the computer monitor with a mouse remotely to verify the proposed.

  • PDF