End users to benefit from wireless standards committee work


More than twenty companies from around the world have responded to a call for proposals from ISA's Wireless Systems for Automation standards committee. The committee is holding a preliminary proposal review meeting Sept. 11-15 at ISA in Research Triangle Park, NC.

The ISA-SP100 committee is establishing standards, recommended practices, technical reports and related information to define procedures for implementing wireless systems in the automation and control environment, with a focus on the field level. Guidance is directed towards those responsible for the complete life cycle and will apply to users, system integrators, practitioners, and control systems manufacturers and vendors.

Two working groups of ISA-SP100 simultaneously issued calls for proposals to provide input to the committee and to encourage a variety of industry experts to participate in the process. The CFP process solicited input to help solve critical issues associated with the deployment of wireless technology for industrial automation. The variety of responses ensures that end users will have their needs met by the standard, ISA said.

"We're thrilled with the responses that we've gotten, because innovative ideas and full participation from a wide variety of vendors will provide industrial end users with the long-term solutions they are seeking," said Pat Kinney, co-chair of ISA-SP100.11. "We're trying to create a standard that will satisfy the global industrial community."

The call for proposals was preceded by a call for end users to participate in a use-case effort, allowing them to describe their specific industrial wireless application requirements. The use-case studies will provide real-world input to the committee's working groups. End users can provide additional input by filling out an online survey at www.isa.org/SP100survey .

"End user input helps us to define and validate the technical requirements for the standard and ensure that the proposals we've received do meet the needs of the end user," said Rick Enns, co-chair of ISA-SP100.14.

No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Learn how to create value with re-use; gain productivity with lean automation and connectivity, and optimize panel design and construction.
Machine design tips: Pneumatic or electric; Software upgrades; Ethernet advantages; Additive manufacturing; Engineering Leaders; Product exclusives: PLC, HMI, IO
Industrial wireless cyber security: More complex than black and white; IIoT at the I/O level; Process modeling; Cyber security research
Robotic advances: Software, form factors; System-based ROI; Embedded control; MES and information integration; SCADA and cyber security; Position sensor; Controller, I/O module
Learn how Industry 4.0 adds supply chain efficiency, optimizes pricing, improves quality, and more.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

Drilling for Big Data: Managing the flow of information; Big data drilldown series: Challenge and opportunity; OT to IT: Creating a circle of improvement; Industry loses best workers, again
Pipeline vulnerabilities? Securing hydrocarbon transit; Predictive analytics hit the mainstream; Dirty pipelines decrease flow, production—pig your line; Ensuring pipeline physical and cyber security
Cyber security attack: The threat is real; Hacking O&G control systems: Understanding the cyber risk; The active cyber defense cycle