scholarly journals Reconfiguration algorithms for high precision communications in time sensitive networks: Time-aware shaper configuration with IEEE 802.1Qcc

2021 ◽  
Vol 2 (1) ◽  
pp. 13-34
Author(s):  
Hesham ElBakoury ◽  
Martin Reisslein ◽  
Akhilesh S. Thyagaturu ◽  
Venkatraman Balasubramanian ◽  
Ahmed Nasrallah

As new networking paradigms emerge for different networking applications, e.g., cyber-physical systems, and different services are handled under a converged data link technology, e.g., Ethernet, certain applications with mission critical traffic cannot coexist on the same physical networking infrastructure using traditional Ethernet packet-switched networking protocols. The IEEE 802.1Q Time Sensitive Networking (TSN) Task Group is developing protocol standards to provide deterministic properties, i.e., eliminates non-deterministic delays, on Ethernet based packet-switched networks. In particular, the IEEE 802.1Qcc, centralized management and control, and the IEEE 802.1Qbv, Time-Aware Shaper (TAS), can be used to manage and control Scheduled Traffic (ST) streams with periodic properties along with Best-Effort (BE) traffic on the same network infrastructure. We investigate the effects of using the IEEE 802.1Qcc management protocol to accurately and precisely configure TAS enabled switches (with transmission windows governed by Gate Control Lists (GCLs) with Gate Control Entries (GCEs)) ensuring ultra-low bounded latency, zero packet loss, and minimal jitter for ST TSN traffic. We examine both a centralized network/distributed user model (hybrid model) and a fully-distributed (decentralized) 802.1Qcc model on a typical industrial control network with the goal of maximizing the number of ST streams.

Author(s):  
Chong Zou ◽  
Puzhen Gao ◽  
Wei Pan ◽  
Zheng Yang ◽  
Xianbing Chen

We preliminarily designed a power tracking and control system using single-chip computers and industrial control computer in the electric heating simulated power loop. The system is an innovational design based on the proven simulated nuclear power loop, with increased techniques of step-less power regulation system and modeling nuclear feedback effect correctional programs. We promoted both hardware and software designs of this power tracking and control system in this paper. It used single-chip computers as the core control chips and an industrial control computer as the additional correctional program and record carrier. The process and implementation of the control software are presented, which is designed as a fuzzy theoretical nonlinear system. In order to ensure the subsequent updates, the access interface of the system is open for following correctional programs, including the correctional program of void fraction effect, temperature effect, hysteresis effect and heat power distribution effect. Taken hysteresis effect correctional program as an example, we use an offset tic-tac clock replacing the inherent tic-tac clock in different devices of the system in order to reduce the hysteresis effect of measuring and corresponding errors. We also put out a preliminary analysis of the accurate synchronization for the system at the end of the paper.


2014 ◽  
Vol 687-691 ◽  
pp. 3102-3105
Author(s):  
Qin Zhang

Integration with Internet is the development tendency of industrial control network, and embedded Internet technique is the key of implementation. By analyzing field bus Technology and combining actual demand, the paper proposes dial-up high-density programmable logic device solution of remote embedded measurement and control equipment. For the purpose of implementing reuse of design modules and upgrading requirement, the paper systematically expounds top-down hierarchy design method for implementing functional module division. According to the difference of implementation complexity because of the difference of functions, the paper finally analyzes the characteristics and applications of programmable device, and proposes the improvement direction.


2014 ◽  
Vol 1044-1045 ◽  
pp. 755-758
Author(s):  
Xin Hui Yang

This paper provides a design for a PLC-based, variable-frequency governing, pressure-constant, automatic water-supply control system. This design is based on the current situations at the water supply plants found in small and medium cities in China. In this control system, the pressure signal across the pipe network is acquired by pressure sensors and then transmitted to PID modules in the PLC in order to control switching between pump motors. At the same time, the PLC is connected with a personal computer for industrial control purposes. On this computer, monitoring and control software has been installed in order to monitor and control the pressure-constant water-supply system on a real-time basis.


Energies ◽  
2019 ◽  
Vol 12 (13) ◽  
pp. 2598
Author(s):  
Asif Iqbal ◽  
Farhan Mahmood ◽  
Mathias Ekstedt

In today’s connected world, there is a tendency of connectivity even in the sectors which conventionally have been not so connected in the past, such as power systems substations. Substations have seen considerable digitalization of the grid hence, providing much more available insights than before. This has all been possible due to connectivity, digitalization and automation of the power grids. Interestingly, this also means that anybody can access such critical infrastructures from a remote location and gone are the days of physical barriers. The power of connectivity and control makes it a much more challenging task to protect critical industrial control systems. This capability comes at a price, in this case, increasing the risk of potential cyber threats to substations. With all such potential risks, it is important that they can be traced back and attributed to any potential threats to their roots. It is extremely important for a forensic investigation to get credible evidence of any cyber-attack as required by the Daubert standard. Hence, to be able to identify and capture digital artifacts as a result of different attacks, in this paper, the authors have implemented and improvised a forensic testbed by implementing a sandboxing technique in the context of real time-hardware-in-the-loop setup. Newer experiments have been added by emulating the cyber-attacks on WAMPAC applications, and collecting and analyzing captured artifacts. Further, using sandboxing for the first time in such a setup has proven helpful.


ATZ worldwide ◽  
2016 ◽  
Vol 118 (9) ◽  
pp. 64-69 ◽  
Author(s):  
Christian Götte ◽  
Martin Keller ◽  
Carsten Haß ◽  
Torsten Bertram

2016 ◽  
Vol 64 (4) ◽  
Author(s):  
Rafael Priego ◽  
Aintzane Armentia ◽  
Elisabet Estévez ◽  
Marga Marcos

AbstractThe Industrie 4.0 initiative emphasizes the consistent digitalization and linking of all productive units, including the definition of industrial control systems. This work proposes a model-based approach to develop Industrial Process Measurement and Control Systems. It uses modern software technologies but software complexity is wrapped using the notation, syntax and semantics of the field. It is UML modeling tool independent, due to the definition of domain profiles. It is also PLC programming tool independent, as the software architecture is generated following the PLCopen XML standard.


Energies ◽  
2021 ◽  
Vol 15 (1) ◽  
pp. 218
Author(s):  
Mohammed Alghassab

Monitoring and control systems in the energy sector are specialized information structures that are not governed by the same information technology standards as the rest of the world’s information systems. Such industrial control systems are also used to handle important infrastructures, including smart grids, oil and gas facilities, nuclear power plants, water management systems, and so on. Industry equipment is handled by systems connected to the internet, either via wireless or cable connectivity, in the present digital age. Further, the system must work without fail, with the system’s availability rate being of paramount importance. Furthermore, to certify that the system is not subject to a cyber-attack, the entire system must be safeguarded against cyber security vulnerabilities, threats, and hazards. In addition, the article looks at and evaluates cyber security evaluations for industrial control systems, as well as their possible impact on the accessibility of industrial control system operations in the energy sector. This research work discovers that the hesitant fuzzy-based method of the Analytic Hierarchy Process (AHP) and the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) is an operational procedure for estimating industrial control system cyber security assessments by understanding the numerous characteristics and their impacts on cyber security industrial control systems. The author evaluated the outputs of six distinct projects to determine the quality of the outcomes and their sensitivity. According to the results of the robustness analysis, alternative 1 shows the utmost effective cybersecurity project for the industrial control system. This research work will be a conclusive reference for highly secure and managed monitoring and control systems.


Sign in / Sign up

Export Citation Format

Share Document