23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

SafetyLon 47-3<br />

is linked to the safety-related firmware and the output is another binary. Such a binary is flashed into a<br />

node and must reside unchanged in the node. A change of the binary in the field is explicitly not allowed<br />

and requires safe tools for development.<br />

After making the node ready for operation, they are installed in the field and standard tools are used<br />

to setup a network. The next step is to configure the nodes, so that a safety-related application can be<br />

performed. The following parameters are required to configure SafetyLon.<br />

• Safe address (node): Each node is assigned a safe address to prevent a node from masquerade.<br />

The safe address identifies a SafetyLon uniquely so that parameters are sent to the intended node.<br />

• Binding* parameters: This allows exchange of a safety-related data.<br />

• SafetyLon user-application identifier: Each user-application gets a unique ID. According to the<br />

ID it is possible to get detailed information on the functionality and the set of safety-related data<br />

points to be configured.<br />

The parameters are transferred to the corresponding node in a three-step process:<br />

1. The management unit sends a request to a node. The node returns its safe address and a transaction<br />

ID. The management unit verifies the safe address.<br />

2. The management unit uses the safe address and the transaction to send the configuration parameter<br />

to the node. The node stores the configuration parameter temporarily, reads the data back<br />

and returns it to the management unit.<br />

3. The management unit checks if the sent and received data are equal. If so, it sends a request to the<br />

node to store the parameter permanently and use it for <strong>communication</strong> purpose.<br />

Following a successful configuration (idle mode as shown in Figure 47.1), the nodes have to be commissioned<br />

in order to get them ready for performing safety-related applications [3]. First, the configuration<br />

parameters are validated. This refers to checking if the nodes used in the safety-related application<br />

perform as expected (test mode). In case of a successful validation, the user has to confirm it (pre-run<br />

and wait mode). Next, the nodes are waiting to be activated. Such a mode is implemented to allow a<br />

coordinated start-up of a network. In run mode, the node performs its functionality according to the<br />

safety-related firmware and SafetyLon user-application. In that mode, the safety-related data transfer<br />

among the nodes is handled.<br />

The mode is left in two cases: first, if a safety-critical failure has occurred. Then the safe mode is<br />

entered. In case of a recoverable failure, the node leaves the safe mode, otherwise the node remains in<br />

that state until an operator checks the failure cause.<br />

DSF<br />

compared<br />

Test<br />

Idle<br />

Modification finished<br />

DSF compared<br />

Operator<br />

confirmation<br />

Modify<br />

Safe<br />

Communication<br />

failure solved<br />

Failure<br />

detection<br />

Modification<br />

of data<br />

Run<br />

Operator<br />

confirmation<br />

Pre-run<br />

Device reset<br />

Operator<br />

confirmation<br />

Device reset or<br />

PC confirmation<br />

Wait<br />

FIGURE 47.1<br />

Safety-related overall state diagram.<br />

* Binding means that a logic connection between two or among many network variables is established.<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!