How wireless networks are changing industrial environments
No interference, security
Because IEEE 802.15.4 is a PAN standard, it operates independently of other common wireless LAN technologies such as Bluetooth, Wi-Fi, and cordless phones. Even though they may be operating in the same 2.4 Ghz spectrum range, this means there is no exchange of information or other interaction between a PAN and the LAN, eliminating the need for corporate IT department involvement.
To ensure secure communications links, IEEE 802.15.4 radios can be set up to require registration with their network monitors. This registration or “pairing” process takes less than five seconds and needs to be performed only once to establish the linkage. Once a device and its monitor have been paired, the two exchange information as long as both have power.
IEEE 802.15.4 security techniques are part of the pairing process. When registration is activated, the monitor provides the switch with several pieces of information. The first is the monitor’s individual 16-bit network identification number, which the monitor selects at power-up to avoid conflict with other networks in the vicinity. The second is a unique 16-bit address for the wireless devices, which the monitor creates. The third piece of data is a 128-bit encryption key that the pair will use to encode future communications. Once the information is exchanged, the switch and monitor use it to address and encode the signals they exchange.
Once established, the pairing is maintained even if the monitor loses power or a battery is replaced in the switch. This ensures a self-healing network and simplifies system maintenance. The monitor can automatically re-establish any dropped link to a registered switch. Replacement or reconfiguration of the devices is performed through a clearing and repairing process.
The combination of addressing and encryption helps to ensure the uniqueness and security of each wireless device’s channel. No two monitors or switches will have the same network address, so the monitors and the sensors/switches will not respond to signals originating from other networks. This means a monitor will not confuse signals within its network, and switches will not respond to signals intended for other switches.
Even if an addressing error occurs somewhere, the network will not react to the erroneous signal because the encryption keys for decoding the message will not match. The use of encryption further ensures that no unregistered node can successfully insert erroneous signals into a network or decode signals from a network, making the network secure from eavesdropping and hacking.
Less cost, greater flexibility
Using an 802.15.4 radio network to connect switches and sensors to a central controller frees industrial and manufacturing equipment developers and users from many of the costs and restrictions of wired solutions. It also expands the range of possible uses and placement of monitoring devices, making it easier and faster to reconfigure the factory floor for new product designs. As a result, the commissioning and lifetime cost of the network drops, while significantly increasing reliability and integrity.
When plant managers evaluate the advantages and drawbacks of wired versus wireless networks, they need to consider cost savings, maintenance issues, ease of installation and configurability, uptime, and security. In many cases, installing a new wireless network is less expensive in hard costs and installation time than trying to replace a faulty or existing wired network. IEEE 802.15.4 based wireless networks have proven themselves reliable, robust, and cost effective for a wide range of industrial, warehousing, and facility applications.
- Todd Hanson is with Honeywell Sensing and Control (S&C). Edited by Mark T. Hoske, content manager, CFE Media, Control Engineering, Plant Engineering, and Consulting-Specifying Engineer, mhoske(at)cfemedia.com.
Case Study Database
Get more exposure for your case study by uploading it to the Control Engineering case study database, where end-users can identify relevant solutions and explore what the experts are doing to effectively implement a variety of technology and productivity related projects.
These case studies provide examples of how knowledgeable solution providers have used technology, processes and people to create effective and successful implementations in real-world situations. Case studies can be completed by filling out a simple online form where you can outline the project title, abstract, and full story in 1500 words or less; upload photos, videos and a logo.
Click here to visit the Case Study Database and upload your case study.