Does SP100 WANT to accomodate WirelessHART?

Oct. 2, 2007
That appears to be the real issue. Several of the most technical members of the committee have explained that they believe that it is relatively minor impact on ISA100 to accommodate WirelessHART. "I am not hearing anybody suggesting that SP100 should be adopting WirelessHART without any changes. The only option that's worth considering," Manges said, "is that ISA100 somehow accommodate WirelessHART despite the lack of backbone routing." Dick Caro said, "But if the ISA100 network has backbone ...
That appears to be the real issue. Several of the most technical members of the committee have explained that they believe that it is relatively minor impact on ISA100 to accommodate WirelessHART. "I am not hearing anybody suggesting that SP100 should be adopting WirelessHART without any changes. The only option that's worth considering," Manges said, "is that ISA100 somehow accommodate WirelessHART despite the lack of backbone routing." Dick Caro said, "But if the ISA100 network has backbone routing, and there are WirelessHART devices in the network, those devices would neither know or care."

Sponsored Recommendations

IEC 62443 4-1 Cyber Certification – Why ML 3 is So Important

The IEC 62443 Security for Industrial Automation and Control Systems - Part 4-1: Secure Product Development Lifecycle Requirements help increase resilience for control systems...

Multi-Server SCADA Maintenance Made Easy

See how the intuitive VTScada Services Page ensures your multi-server SCADA application remains operational and resilient, even when performing regular server maintenance.

Your Industrial Historical Database Should be Designed for SCADA

VTScada's Chief Software Architect discusses how VTScada's purpose-built SCADA historian has created a paradigm shift in industry expectations for industrial redundancy and performance...

Linux and SCADA – What You May Not Have Considered

There’s a lot to keep in mind when considering the Linux® Operating System for critical SCADA systems. See how the Linux security model compares to Windows® and Mac OS®.