Daniel E. Capano is senior project manager, Gannett Fleming Engineers and Architects, P.C. and a Control Engineering Editorial Advisory Board member. Courtesy: Daniel E. Capano

Daniel E. Capano

Articles

Automation August 14, 2021

Making the case for full automation

Opinion: It is in everyone's best interests to move to full automation, particularly for publicly-owned facilities. Experiences running large spinning equipment in a dangerous and unhealthy environment led to exploring ways to reduce, if not eliminate, human involvement in the process.

By Daniel E. Capano
Cybersecurity April 29, 2021

Throwback Attack: Lessons from the Aurora vulnerability

A government-sponsored test on whether a cyberattack could inflict real-world physical damage has had major repercussions to this day. See eight steps on how to mitigate a potential cyberattack against your industrial control systems (ICSs).

By Daniel E. Capano
Process Instrumentation and Sensors March 3, 2020

How to select, apply process sensors

When specifying process sensors, several common factors need to be considered such as the operating environment, mounting options and cable connections.

By Daniel E. Capano
Wireless January 8, 2020

Industrial wireless selection and implementation

Industrial wireless networks require a lot of planning and preparation because there are many elements that can hamper or interfere with manufacturing operations.

By Daniel E. Capano
Cybersecurity November 6, 2019

The human asset in cybersecurity

Cybersecurity education: Human hacking, the compromise of human assets, is often the first step in a cybersecurity breach, even if or when technical systems are secure. Help coworkers and those in your supply chain to avoid being the entry point for attack. Learn attack methods, five attack types and five prevention techniques.

By Daniel E. Capano
Cybersecurity July 11, 2019

Understand the cyber-attack lifecycle

A cyber kill chain provides a model for understanding the lifecycle of a cyber attack and helps those involved with critical infrastructure improve cybersecurity policies, technologies, training, and industrial control system (ICS) design. Learn 8 steps of one model.

By Daniel E. Capano
Process Instrumentation and Sensors March 1, 2019

The art and science of solids level measurement

Experience is required to properly design and apply solids handling systems. Accurately measuring the quantity of solids in a tank or silo is crucial to product management, custody control, and transfer.

By Daniel E. Capano
Industrial Networking September 6, 2017

Putting wireless sensor networks to work

As wireless sensor networks become more reliable, their applications continue to grow.

By Daniel E. Capano
Cybersecurity December 27, 2015

The case for open standard wireless networks

Proprietary wireless systems and local area networks (LANs), while still in use, are being whittled away in spite of the time and expense many companies have invested into them in favor of open standard wireless networks.

By Daniel E. Capano
Cybersecurity December 20, 2015

Open standard wireless systems

There are a number of open standard wireless systems in use including Bluetooth, Z-Wave, ZigBee, Worldwide interoperability for microwave access (WiMAX), ISA 100.11, and wireless highway addressable remote transducer (WiHART). Each technology has its own specific advantages for particular industries.

By Daniel E. Capano
Cybersecurity December 13, 2015

Understanding RFI and EMI’s effects

A troublesome offshoot of radio frequency (RF) technology is radio frequency and electromagnetic interference, or RFI and EMI, respectively. EMI, in particular, can be a real challenge for users on the plant floor because of its impacts on WLAN technology.

By Daniel E. Capano
Cybersecurity December 4, 2015

WLAN troubleshooting best practices

Because no system is ever perfect, a user’s wireless local area network (WLAN) will shut down. Understanding how and why this happened is important, and there are some fundamental steps the user can take to get things back on track.

By Daniel E. Capano
Cybersecurity November 20, 2015

Wireless intrusion detection and protection systems

Keeping your wireless network safe from attack requires vigilance—and the right software strategy.

By Daniel E. Capano
Cybersecurity September 18, 2015

Integrating a wireless LAN into an existing wired LAN

As wireless local area networks (WLANs) become more ubiquitous, it is clear that necessary expansions of existing wired networks will be either extended—or replaced—by WLANs, and companies and users will need to adapt to the ensuing changes.

By Daniel E. Capano
Cybersecurity September 10, 2015

Choosing between single and multi-channel architecture

Wireless tutorial: Depending upon what topology is being used, single-channel architectures (SCAs) or multi-channel architectures (MCAs) use multiple repeating channels in a set pattern should be considered for channelization.

By Daniel E. Capano
Cybersecurity September 3, 2015

Virtual and physical WLAN site surveys

Wireless tutorial: Virtual and physical site surveys allow the designer to anticipate and plan for several factors for designing a network that will meet the client’s expectations in different ways.

By Daniel E. Capano
Wireless August 26, 2015

WLAN design preparation and needs analysis

A client’s needs and requirements for designing a wireless local area network (WLAN) should not be overlooked; performing a needs analysis will allow the designer to manage the client’s expectations and avoid misunderstandings and liability.

By Daniel E. Capano
Wireless August 12, 2015

WLAN design basics and wireless network considerations

Designing a reliable, secure, and available wireless network requires considering many factors. Rational planning and design, based on a thorough preliminary evaluation, can ensure that a wireless local area network (WLAN) will work the first time and allow ease of expansion without disruption.

By Daniel E. Capano
Wireless August 4, 2015

Seven best practices for wireless cyber security

A good, solid understanding of effective cyber security is needed to protect information in a world where wireless communications are standard can have long-reaching effects on a personal and professional level. Note the following seven tips for wireless cyber security and link to more details on each.

By Daniel E. Capano
Wireless July 31, 2015

IEEE 802.11ah, energy efficiency, extended battery life for wireless devices

Wireless tutorial: The addition of power saving algorithms to the IEEE 802.11ah standard is designed to allow associated devices to run for weeks or even years without a battery replacement. The standard specifies traffic information map (TIM) and non-TIM as two modes of power saving.

By Daniel E. Capano
Wireless July 23, 2015

Wi-Fi standard designed for large-scale sensor, IoT applications

The IEEE’s new sub GHz Wi-Fi standard, 802.11ah, is designed for large-scale sensor and Internet of Things (IoT) applications and is designed for large areas containing a vast number of client devices that typically rely on battery power and low bandwidth applications such as sensor networks.

By Daniel E. Capano
Cybersecurity May 19, 2015

Wireless security tutorial: Wireless intrusion detection systems and wireless attacks

How to lower wireless cyber security risk: A wireless intrusion detection system (WIDS) is a software algorithm designed to monitor the wireless network for intruders and protect the network from attacks like social engineering, Denial of Service (DoS), man-in-the-middle (MIM), and other attacks designed to compromise a network’s security. Watch for these four social engineering cyber security hacks that can threaten wireless and wired networks.

By Daniel E. Capano
Cybersecurity April 30, 2015

Wireless security: Cryptology basics, fundamentals

Cryptology consists of two parts: cryptography, which is the science of encryption algorithms and their use; and cryptanalysis, the science of deriving encryption keys or otherwise decrypting a message by the study of the encrypted message. This industrial wireless technology tutorial explains the basics of cryptology.

By Daniel E. Capano
Process Safety April 26, 2015

Wireless security: Extensible authentication protocols

EAP is an authentication framework that specifies methods of secure key distribution and usage for the mutual authentication of a client (supplicant) and an authenticator, which is usually a wireless access point (AP). Wireless security tools can lower risk of cyber security intrusion. See EAP chart.

By Daniel E. Capano
Cybersecurity April 15, 2015

Wireless security: Port-based security, EAP, AKM

Tutorial on cyber security for wireless networks: Authentication and key management (AKM) is the term used to describe the process of IEEE 802.1X/EAP authentication and subsequent encryption key generation and is a major component of extensible authentication protocols (EAP) and IEEE 802.1X. Each time a client associates or re-associates, the entire AKM process must occur, which results in an extremely secure and robust wireless network. Learn the 4-way authentication handshake.

By Daniel E. Capano
Cybersecurity April 8, 2015

Wireless security: IEEE 802.11 and CCMP/AES

Tutorial: The wireless adoption rate is growing, making security a greater concern. The IEEE 802.11i task group has developed advanced methods of securing wireless networks like counter mode with cipher-block chaining message authentication protocol (CCMP) and the advanced encryption standard (AES). See 5 keys in IEEE 802.11i.

By Daniel E. Capano
Cybersecurity April 4, 2015

Wireless security legacy, background

Tutorial: Wireless security has come a long way from open system authentication (OSA) and some of the other building blocks like wired equivalent privacy (WEP) and temporal key integrity protocols (TKIPs). Understanding past network security, or the lack of it, can help with network security for today and in the future.

By Daniel E. Capano
Cybersecurity March 19, 2015

Wireless security basics

Wireless security tutorial: Wireless has become the communications medium of choice for many people and applications. However, without effective data security, wireless technology could not grow and people would still be reliant on wired systems along with the cost and inconvenience associated with them. Industries and businesses want to prevent intellectual property and production from being compromised. Learn about digital authentication, authorization, and accounting.

By Daniel E. Capano
Wireless March 12, 2015

Case studies: Wireless remote monitoring

Application Update: Two case studies examine using wireless communications to connect a flowmeter to a control system at the Wards Island Water Pollution Control Plant and to connect emergency showers at two Monroe County Pure Waters facilities. Online extra: Hear the March 10 webcast (archived): Integrating wireless into an industrial Ethernet application.

By Daniel E. Capano
Data Acquisition, DAQ March 10, 2015

Project details: Integrating wireless with wastewater

More project details: Industrial wireless network with new supervisory control and data acquisition (SCADA) system is part of a 5-year, $47 million capital improvement plan formed and approved by the Stamford Water Pollution Control Authority. Project specification criteria include equipment reliability and capabilities, availability, ease of management, and conformance to open standards. Learn more details about the project.

By Daniel E. Capano
Wireless February 27, 2015

Quality of service in wireless communication

A means of prioritizing voice and video data to address latency issues and provide good quality of service (QoS) is needed when transmitting voice or video data over a wireless medium.

By Daniel E. Capano
Wireless February 18, 2015

Carrier sense multiple access with collision avoidance

Carrier sense multiple access with collision avoidance (CSMA/CA) is the term for the several methods used in WLANs to avoid collisions, which uses distributed control function (DCF), the mandatory access method in IEEE 802.11 communications.

By Daniel E. Capano
Wireless February 1, 2015

Carrier sense multiple access with collision detection

Wireless tutorial: Carrier sense multiple access with collision detection (CSMA/CD) is a logical and temporary connection used in wired networks to allow two transmitting stations to achieve error-free communication across the shared medium.

By Daniel E. Capano
Wireless January 15, 2015

Medium arbitration helps prevent wireless interference

Industrial wireless tutorial: Medium arbitration, or medium contention, is the collection of methods used to ensure that all users can use the medium in a shared manner without interference. Understand these concepts to prevent wireless interference.

By Daniel E. Capano
Wireless December 31, 2014

Modulation techniques

Industrial Wireless Tutorials: Modulation is the process by which the bits comprising the transmitted data are converted to the voltage levels that will be mixed with the carrier, amplified, and sent to the antenna; it is a conversion and mixing of raw data with a carrier wave that is oscillating at the channel center frequency.

By Daniel E. Capano
Wireless December 26, 2014

Characteristics of IEEE 802.11n and 802.11ac deliver same performance for one quarter the cost of wired systems

Industrial Wireless Tutorials: IEEE 802.11n and the newest amendment, 802.11ac, are viable contenders for the future of networking due to their speed and reliability. Wireless technology can achieve the same results for about 25% of the cost and provide speed, reliability, and increased range of coverage over comparable wired systems.

By Daniel E. Capano
Wireless December 19, 2014

Understanding modulation and coding schemes

Industrial Wireless Tutorials: Modulation and coding schemes (MCS) are used to determine the data rate of a wireless connection using high-throughput orthogonal frequency division multiplexing (HT-OFDM).

By Daniel E. Capano
Wireless December 5, 2014

OFDM: Orthogonal frequency division multiplexing

Industrial Wireless Tutorials: OFDM is not actually a spread spectrum technology; it is a specialized form of multiplexing. OFDM multiplexes data onto 52 orthogonal subcarriers using one of several modulation techniques.

By Daniel E. Capano
Wireless November 26, 2014

MIMO and spatial multiplexing

Industrial Wireless Tutorials: Multiple in, multiple out (MIMO) is a technology taking advantage of an wireless access point's (AP's) multiple radio arrangement to use multipath and increase system reliability and performance.

By Daniel E. Capano
Wireless November 19, 2014

Propagation revisited: Wireless multipath

Industrial Wireless Tutorials: Multipath occurs when a radio frequency (RF) signal travels over many different paths between the transmitter and receiver, arriving at different times at the receiver, which is a particular problem for WLANs. Know the 4 signal conditions of multipath.

By Daniel E. Capano
Wireless November 12, 2014

WLAN architectures

Industrial Wireless Tutorials: Data planes in a wireless network allow designers to properly design and specify a WLAN using the segregation of roles as a framework by which the several different network topologies are implemented.

By Daniel E. Capano
Wireless October 27, 2014

The management, control, and data planes

Industrial Wireless Tutorials: Data planes in a wireless network allow designers to properly design and specify a WLAN using the segregation of roles as a framework by which the several different network topologies are implemented.

By Daniel E. Capano
Wireless October 21, 2014

More Wi-Fi terms and definitions

Industrial wireless tutorials: We've recently received correspondence asking about several terms that were left out of our previous article dealing with Wi-Fi terms. Following are several terms for which a definition was specifically requested by a reader. Thanks for writing in.

By Daniel E. Capano
Cybersecurity October 20, 2014

WLAN topologies

Industrial Wireless Tutorials: WLANs vary in the way communication is achieved and maintained including a basic service set, an extended service set, a mesh topology, and an ad hoc network. Learn how WLAN topologies and designs affect wireless performance.

By Daniel E. Capano
Wireless October 6, 2014

WLAN devices

Industrial wireless tutorials: WLAN devices are generally classified as being either infrastructure or client devices, and understanding how access points work and what their purpose is regardless of your WLAN device is important when working from a fixed or mobile location.

By Daniel E. Capano
Wireless September 24, 2014

Wi-Fi acronyms, wireless buzzwords, WLAN nomenclature, wireless terms

Industrial wireless tutorials: WLANs (wireless local area networks) have a language, an “alphabet soup” of acronyms and buzzwords designed to facilitate deeper discussions of the technology used. Learning the industrial wireless language (wireless glossary of terms) helps in understanding wireless technologies.

By Daniel E. Capano
Wireless September 18, 2014

Wi-Fi and the OSI model

Industrial wireless tutorials: The Open Systems Interconnection (OSI) model is a conceptual model used to organize the various functions of data communications by segregating the distinct functions into a seven-layer model from the Physical layer. Learn how the OSI model relates to industrial wireless communications.

By Daniel E. Capano
Wireless August 29, 2014

Wi-Fi standards

Industrial wireless tutorials: Understand the IEEE Wi-Fi standards, what each standard provides, benefits of standardization, and Wi-Fi Alliance device certification.

By Daniel E. Capano
Wireless August 27, 2014

Wireless propagation fundamentals

Industrial wireless tutorials: Understanding wireless propagation fundamentals will help you understand what can happen to a wireless signal and how that can influence wireless signal reliability. See 6 diagrams to illustrate wireless propagation. Learn the 4 results of multipath.

By Daniel E. Capano
Wireless August 25, 2014

Radio math

Industrial wireless tutorials: Learn how to determine a link budget, that is, how much power is needed to effectively transmit data over a reliable radio link. See the decibel (dBm) and milliwatt (mW) conversion table.

By Daniel E. Capano
Wireless August 2, 2014

Antenna basics, antenna types, antenna functions

Industrial wireless tutorials: What you need to know about industrial antennas, antenna functions, and antenna capabilities.

By Daniel E. Capano
Wireless July 16, 2014

Wi-Fi Spectrum: ISM, U-NII, FCC Rules

Industrial wireless tutorials, Wi-Fi explanation: Wi-Fi is part of the 12 industrial, scientific, and medical (ISM) bands. Newer Wi-Fi standards allow for the bonding of multiple channels to allow up to 160 MHz wide channel combinations for faster data rates, multiple transceivers, and a theoretical throughput of up to 7 GBPS when the latest ratified Wi-Fi amendment, IEEE 802.11ac, is fully implemented.

By Daniel E. Capano
Wireless July 8, 2014

Comparative modulation: Spread spectrum modulation terms and definitions for wireless networking

Industrial wireless tutorials: Modulation is, simply put, a mixing of the carrier wave with the data to be transmitted; analog or digital signals are combined with a carrier producing a hybrid signal, which is then demodulated at the receiver. This is the underlying theory behind all modulation-demodulation schemes. See the terms and definitions for related wireless networking acronyms.

By Daniel E. Capano
Wireless July 7, 2014

Radio frequency basics

Industrial wireless tutorials: Any radio frequency (RF) discussion quickly expands to the entire technology surrounding the generation and propagation of a radio signal or wave. Here’s what you need to know.

By Daniel E. Capano
Wireless June 19, 2014

What is wireless?

Industrial wireless tutorials: Wireless communication, unlike wired, relies an unbounded medium to transfer information. Wireless local area networks (WLANs) use electromagnetic radiation to transmit information between nodes without wires (a bounded, physical medium).

By Daniel E. Capano
Wireless June 17, 2014

Wireless for stationary applications: Answers to webcast questions

Daniel E. Capano answers some Control Engineering wireless webcast questions below that the June 10 webcast didn’t have time to address at the end.

By Daniel E. Capano
Wireless June 10, 2014

The wireless revolution

Industrial Wireless Tutorials: Everything will be connected to everything else, wirelessly. Ethernet began wirelessly, and the Internet of things will benefit from wireless expansion, especially IEEE 802.11 wireless standards. The wireless spectrum is worth billions of dollars and will help create even more value. See related webcast.

By Daniel E. Capano