• Title/Summary/Keyword: industrial control networks

Search Result 218, Processing Time 0.026 seconds

Design of Multi-protocol IED for Networked Control System of Multi-Induction Motor in Industrial Fields

  • Hong, Won-Pyo
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.26 no.10
    • /
    • pp.60-71
    • /
    • 2012
  • This paper proposes a new design and implementation of multi-protocol IED for networked control system of multi-induction motor in industrial fields. The experimental multi-induction motor based multi-protocol IED of Modbus/LonTalks/TCP/IP module is designed and fabricated. This article addresses issues in architecture of LonWorks/Ethernet sever, embedded processors architecture for converting Modbus protocol to LonTalks protocol, integrating preconfigured software, and Internet technologies. It is also verified that the multi-induction motor control and monitoring system using LonWorks/Ethernet server have available, interoperable, reliable performance characteristics from the experimental results, especially, the seamless integration of TCP/IP networks with control networks allows access to any control point from anywhere. Thus, the results provide available technical data for remote distributed motor control system of industrial field or building microgrid with LonWorks BAS.

Dynamic Yield Improvement Model Using Neural Networks (신경망을 이용한 동적 수율 개선 모형)

  • Jung, Hyun-Chul;Kang, Chang-Wook;Kang, Hae-Woon
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.32 no.2
    • /
    • pp.132-139
    • /
    • 2009
  • Yield is a very important measure that can expresses simply for productivity and performance of company. So, yield is used widely in many industries nowadays. With the development of the information technology and online based real-time process monitoring technology, many industries operate the production lines that are developed into automation system. In these production lines, the product structures are very complexity and variety. So, there are many multi-variate processes that need to be monitored with many quality characteristics and associated process variables at the same time. These situations have made it possible to obtain super-large manufacturing process data sets. However, there are many difficulties with finding the cause of process variation or useful information in the high capacity database. In order to solve this problem, neural networks technique is a favorite technique that predicts the yield of process for process control. This paper uses a neural networks technique for improvement and maintenance of yield in manufacturing process. The purpose of this paper is to model the prediction of a sub process that has much effect to improve yields in total manufacturing process and the prediction of adjustment values of this sub process. These informations feedback into the process and the process is adjusted. Also, we show that the proposed model is useful to the manufacturing process through the case study.

Topology Characteristics and Generation Models of Scale-Free Networks

  • Lee, Kang Won;Lee, Ji Hwan
    • Journal of information and communication convergence engineering
    • /
    • v.19 no.4
    • /
    • pp.205-213
    • /
    • 2021
  • The properties of a scale-free network are little known; its node degree following a power-law distribution is among its few known properties. By selecting real-field scale-free networks from a network dataset and comparing them to other networks, such as random and non-scale-free networks, the topology characteristics of scale-free networks are identified. The assortative coefficient is identified as a key metric of a scale-free network. It is also identified that most scale-free networks have negative assortative coefficients. Traditional generation models of scale-free networks are evaluated based on the identified topology characteristics. Most representative models, such as BA and Holme&Kim, are not effective in generating real-field scale-free networks. A link-rewiring method is suggested that can control the assortative coefficient while preserving the node degree sequence. Our analysis reveals that it is possible to effectively reproduce the assortative coefficients of real-field scale-free networks through link-rewiring.

Internet-Based Control and Monitoring System Using LonWorks Fieldbus for HVAC Application

  • Hong, Won-Pyo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1205-1210
    • /
    • 2004
  • The 4-20mA analog signal used in the various industrial fields to interface sensor in distributed process control has been replaced with relatively simple digital networks, called "fieldbus, and recently by Ethernet. Significant advances in Internet and computer technology have made it possible to develop an Internet based control, monitoring, and operation scheduling system for heating, ventilation and air-conditioning (HVAC) systems. The seamless integration of data networks with control networks allows access to any control point from anywhere. Field compatible field devices become so-called "smart" devices, capable of executing simple control, diagnostic and maintenance functions and providing bidirectional serial communication to higher level controller. The most important HVAC of BAS has received nationwide attention because of higher portion of more than 40% in building sector energy use and limited resources. This paper presents the Internet-based monitoring and control architecture and development of LonWorks control modules for AHU (air handling units) of HVAC in viewpoint of configuring BAS network. This article addresses issues in architecture section, electronics, embedded processors and software, and internet technologies.

  • PDF

Implementation of abnormal behavior detection system based packet analysis for industrial control system security (산업 제어 시스템 보안을 위한 패킷 분석 기반 비정상행위 탐지 시스템 구현)

  • Kim, Hyun-Seok;Park, Dong-Gue
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.47-56
    • /
    • 2018
  • National-scale industrial control systems for gas, electric power, water processing, nuclear power, and traffic control systems increasingly use open networks and open standards protocols based on advanced information and communications technologies. The frequency of cyberattacks increases steadily because of the use of open networks and open standards protocols, but follow-up actions are limited. Therefore, the application of security solutions to an industrial control system is very important. However, it is not possible to apply security solutions to a real system because of the characteristics of industrial control systems. And a security system that can detect attacks without affecting the existing system is imperative. Therefore, in this paper, we propose an intrusion detection system based on packet analysis that can detect anomalous behaviors without affecting the industrial control system, and we verify the effectiveness of the proposed intrusion detection system by applying it in a test bed simulating a real environment.

CFP Scheduling for Real-Time Service and Energy Efficiency in the Industrial Applications of IEEE 802.15.4

  • Ding, Yuemin;Hong, Seung Ho
    • Journal of Communications and Networks
    • /
    • v.15 no.1
    • /
    • pp.87-101
    • /
    • 2013
  • In industrial applications, sensor networks have to satisfy specified time requirements of exchanged messages. IEEE 802.15.4 defines the communication protocol of the physical and medium access control layers for wireless sensor networks, which support real-time transmission through guaranteed time slots (GTSs). In order to improve the performance of IEEE 802.15.4 in industrial applications, this paper proposes a new traffic scheduling algorithm for GTS. This algorithm concentrates on time-critical industrial periodic messages and determines the values of network and node parameters for GTS. It guarantees real-time requirements of periodic messages for industrial automation systems up to the order of tens to hundreds of milliseconds depending on the traffic condition of the network system. A series of simulation results are obtained to examine the validity of the scheduling algorithm proposed in this study. The simulation results show that this scheduling algorithm not only guarantees real-time requirements for periodic message but also improves the scalability, bandwidth utilization, and energy efficiency of the network with a slight modification of the existing IEEE 802.15.4 protocol.

An End-to-End QoS Control Method for Heterogeneous Networks (이종 망을 위한 종단간 QoS 제어 방안)

  • Lee, Jong-Chan;Lee, Gi-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.10
    • /
    • pp.2715-2720
    • /
    • 2009
  • Supporting Quality of Service (QoS) for multimedia services in heterogeneous mobile networks is a part of key issue for Three Generation Evolution (3GE) development. A QoS management structure needs to guarantee the QoS of moving users based on an end-to-end negotiation to support the seamless service when MT is moving between the heterogeneous networks. We propose an end-to-end negotiation method based on SLA(Service Level Agreement). For this aim, the SLA control and algorithm for supporting MT's QoS is considered. Simulation is focused on the average delay and packet loss rate, and the results show that our proposed method provides mobile terminals with the optimal performance.

Energy-efficient Low-delay TDMA Scheduling Algorithm for Industrial Wireless Mesh Networks

  • Zuo, Yun;Ling, Zhihao;Liu, Luming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.10
    • /
    • pp.2509-2528
    • /
    • 2012
  • Time division multiple access (TDMA) is a widely used media access control (MAC) technique that can provide collision-free and reliable communications, save energy and bound the delay of packets. In TDMA, energy saving is usually achieved by switching the nodes' radio off when such nodes are not engaged. However, the frequent switching of the radio's state not only wastes energy, but also increases end-to-end delay. To achieve high energy efficiency and low delay, as well as to further minimize the number of time slots, a multi-objective TDMA scheduling problem for industrial wireless mesh networks is presented. A hybrid algorithm that combines genetic algorithm (GA) and simulated annealing (SA) algorithm is then proposed to solve the TDMA scheduling problem effectively. A number of critical techniques are also adopted to reduce energy consumption and to shorten end-to-end delay further. Simulation results with different kinds of networks demonstrate that the proposed algorithm outperforms traditional scheduling algorithms in terms of addressing the problems of energy consumption and end-to-end delay, thus satisfying the demands of industrial wireless mesh networks.

STRIDE-based threat modeling and DREAD evaluation for the distributed control system in the oil refinery

  • Kyoung Ho Kim;Kyounggon Kim;Huy Kang Kim
    • ETRI Journal
    • /
    • v.44 no.6
    • /
    • pp.991-1003
    • /
    • 2022
  • Industrial control systems (ICSs) used to be operated in closed networks, that is, separated physically from the Internet and corporate networks, and independent protocols were used for each manufacturer. Thus, their operation was relatively safe from cyberattacks. However, with advances in recent technologies, such as big data and internet of things, companies have been trying to use data generated from the ICS environment to improve production yield and minimize process downtime. Thus, ICSs are being connected to the internet or corporate networks. These changes have increased the frequency of attacks on ICSs. Despite this increased cybersecurity risk, research on ICS security remains insufficient. In this paper, we analyze threats in detail using STRIDE threat analysis modeling and DREAD evaluation for distributed control systems, a type of ICSs, based on our work experience as cybersecurity specialists at a refinery. Furthermore, we verify the validity of threats identified using STRIDE through case studies of major ICS cybersecurity incidents: Stuxnet, BlackEnergy 3, and Triton. Finally, we present countermeasures and strategies to improve risk assessment of identified threats.