Introduction
International Society of Automation.
Designed mainly for large scale industrial complexes and plants.
More than 1 billion devices use ISA 100.11A
ISA 100.11A is designed to support native and tunneled application layers.
Various transport services, including 'reliable', 'best effort', 'real-time' are offered.
network and transport layers are based on TCP or UDP / IPv6.
Data link layer support mesh routing and Frequency hopping.
Physical and MAC layers are based on IEEE 802.15.4
Topologies allowed are :
International Society of Automation.
Designed mainly for large scale industrial complexes and plants.
More than 1 billion devices use ISA 100.11A
ISA 100.11A is designed to support native and tunneled application layers.
Various transport services, including 'reliable', 'best effort', 'real-time' are offered.
network and transport layers are based on TCP or UDP / IPv6.
Data link layer support mesh routing and Frequency hopping.
Physical and MAC layers are based on IEEE 802.15.4
Topologies allowed are :
- Star/tree
- Mesh
- Radio link
- ISA over Ethernet
- Field buses
Application Support Layer delivers communications services to user and management processes.
It can pass objects (method, attributes) natively within the ISA 100.11A protocol.
A tunneling mode is available to allow legacy data through the ISA.11A network.
* RD=routing device
* NRD=Non-routing device
*H=Handheld device
*B=backbone device
Features
It can pass objects (method, attributes) natively within the ISA 100.11A protocol.
A tunneling mode is available to allow legacy data through the ISA.11A network.
* RD=routing device
* NRD=Non-routing device
*H=Handheld device
*B=backbone device
Features
- Flexibility
- Support for multiple protocols
- Use of open standards
- Support for multiple applications
- Reliability (error detection, channel hopping)
- Determinism (TDMA, QoS support)
- Security
Security
- Security is fully built-in to the standard.
- Authentication and confidentiality services are independently available.
- A network security manager manages and distributes keys
- Twin data security steps in each node:
- data link layer encrypts each hop.
- Transport layer secures peer-to-peer communications.
No comments:
Post a Comment