The Great Kanduski: Best Practices in Industrial Networking
I was fortunate enough to be able to participate and speak at the “68th Annual Instrumentation Symposium for the Process Industries” January 22-24 at Texas A&M University in College Station, Texas.
With the increasing use of Ethernet in the plant environment it is always a good idea to have the tools at hand to help you better understand your network and what is connected to it. This is obviously important not only for configuration, operations and maintenance, but also for security...
I recently came across an interesting link regarding EtherCAT that provides the filters and some analysis of just how the EtherCAT packets are formed including full description of the registers for the EtherCAT Slave Controller and the text content of the individual registers/values.
Consistent with the globalization of products, similar trends are happening in the world of standards, where standards are being harmonized across boundaries through organizations such as IEC and ISO but also between these two organizations as well.
I recently presented a webinar cosponsored by ISA and CooperBussman’s Brian Cunningham on the above topic entitled “Staying Connected – Why Network Management Matters” based on the following abstract:
A number of manufacturers make field sensor networks that use protocols other than WirelessHART or ISA100.11a and in fact have been on the market for a number of years and in a wide range of form factors.
Who do you go to when you've got an industrial networking problem that you can't solve on your own?
The ISA100 Wireless Compliance Institute (WCI) www.isa100wci.org announced the November 13, 2012 completion of the interoperability trial to verify its Generic Client Interface (GCI) specification. The GCI is an important component of the ISA100.11a architecture as it defines many of the requirements for ANSI/ISA-100.11a based gateways.
IDC Technology is hosting a conference and two half-day workshops in Edmonton later this month with workshops presented by both Paul Gruhn on Safety system and John Cusimano on "Assessing the Security of Industrial Control Systems Using Threat Modeling" Tuesday November 27.
After quietly disappearing from your radar at the end of April to join a global manufacturing company I am pleased to say that after that did not work out as planned Walt Boyes was kind enough to ask me to resume this blog so “The Great Kanduski” is back.