Honeywell WNMNCM9 Multinode 802.11 Radio User Manual WN02 100

Honeywell International Inc. Multinode 802.11 Radio WN02 100

User Manual 2

  Honeywell Wireless   Honeywell Wireless Planning Guide WN02-100: Draft No. 1 Field Trial 2/07    Field Trial Draft Honeywell Confidential & Proprietary This work contains valuable, confidential and proprietary information. Disclosure, use or reproduction outside of Honeywell Inc. is prohibited except as authorized in writing. This unpublished work is protected by the laws of the United States and other countries.
 ii    Honeywell Wireless Planning Guide   RField Trial   Honeywell Confidential & Proprietary  2/07 Notices and Trademarks  Copyright 2007 by Honeywell International Inc. Release Field Trial  February 2007  While this information is presented in good faith and believed to be accurate, Honeywell disclaims the implied warranties of merchantability and fitness for a particular purpose and makes no express warranties except as may be stated in its written agreement with and for its customers. In no event is Honeywell liable to anyone for any indirect, special or consequential damages. The information and specifications in this document are subject to change without notice. Honeywell, PlantScape, Experion PKS, and TotalPlant are registered trademarks of Honeywell International Inc. Other brand or product names are trademarks of their respective owners.         Honeywell International Process Solutions 2500 West Union Hills Phoenix, AZ  85027 1-800 343-0228
 RField Trial     Honeywell Wireless Planning Guide  iii 2/07  Honeywell Confidential & Proprietary   About This Document Describe the purpose of the document. Example: This document describes how to install and configure the Experion Station-TPS (ES-T) and Experion Server TPS (ESVT) nodes. The nodes become full members in Experion PKS as well as connect directly to the TPN (TotalPlant Network). Release Information  Document Name  Document ID  Release Number  Publication Date Honeywell Wireless Planning Guide - WN02  WN02-100: Draft No. 1 Field Trial  2/07  References The following list identifies all documents that may be sources of reference for material discussed in this publication.  Document Title   Contacts World Wide Web The following Honeywell web sites may be of interest to Process Solutions customers.  Honeywell Organization  WWW Address (URL) Corporate  http://www.honeywell.com Honeywell Process Solutions  http://hpsweb.honeywell.com
 Contacts iv    Honeywell Wireless Planning Guide   RField Trial   Honeywell Confidential & Proprietary  2/07 Telephone Contact us by telephone at the numbers listed below.  Location Organization  Phone United States and Canada  Honeywell IAC Solution Support Center  1-800-822-7673 Europe Honeywell TAC-EMEA +32-2-728-2704 Pacific  Honeywell Global TAC - Pacific  1300-300-4822  (toll free within Australia) +61-8-9362-9559  (outside Australia) India  Honeywell Global TAC - India  +91-20-2682-2458 Korea  Honeywell Global TAC - Korea  +82-2-799-6317 People’s Republic of China Honeywell Global TAC - China  +86-10-8458-3280 ext. 361 Singapore  Honeywell Global TAC - South East Asia  +65-6580-3500 Taiwan  Honeywell Global TAC - Taiwan  +886-7-323-5900 Japan  Honeywell Global TAC - Japan +81-3-5440-1303 Elsewhere  Call your nearest Honeywell office.
 Symbol Definitions RField Trial    Honeywell Wireless Planning Guide  v 2/07  Honeywell Confidential & Proprietary  Symbol Definitions The following table lists those symbols used in this document to denote certain conditions.  Symbol Definition     CAUTION: Indicates a potentially hazardous situation which, if not avoided, may result in minor or moderate injury. It may also be used to alert against unsafe practices.  CAUTION symbol on the equipment refers the user to the product manual for additional information. The symbol appears next to required information in the manual.     WARNING: Indicates a potentially hazardous situation, which, if not avoided, could result in serious injury or death. WARNING symbol on the equipment refers the user to the product manual for additional information. The symbol appears next to required information in the manual.     WARNING, Risk of electrical shock: Potential shock hazard where HAZARDOUS LIVE voltages greater than 30 Vrms, 42.4 Vpeak, or 60 VDC may be accessible.     ESD HAZARD: Danger of an electro-static discharge to which equipment may be sensitive. Observe precautions for handling electrostatic sensitive devices.
 RField Trial     Honeywell Wireless Planning Guide  vii 2/07  Honeywell Confidential & Proprietary   Contents 1. ABOUT THIS GUIDE....................................................................13 1.1 Intended audience......................................................................................... 13 1.2 How to use this guide...................................................................................13 1.3 Related documents.......................................................................................13 2. HONEYWELL WIRELESS OVERVIEW.......................................15 2.1 Key Features and benefits ...........................................................................15 2.2 About Honeywell Wireless Services ...........................................................15 2.3 Wireless system overview............................................................................15 2.4 Wireless components...................................................................................15 2.5 Wireless Server Tools (software package).................................................16 2.6 About the Key Server Node.......................................................................... 16 2.7 Wireless Installation Overview ....................................................................16 2.8 For more information.................................................................................... 17 Current standards for wireless in automation and control environment................................17 About ISA SP-100................................................................................................................17 Honeywell references...........................................................................................................17 3. WIRELESS SITE PLANNING ......................................................19 3.1 Site survey tasks........................................................................................... 19 3.2 Site considerations....................................................................................... 19 3.3 Radio Frequency Survey..............................................................................19 3.4 Hazardous Location requirements..............................................................19 3.5 Wireless Device Placement..........................................................................19 3.6 Key Server and Authentication Device.......................................................20 3.7 Wireless installation requirements .............................................................20
Contents Symbol Definitions viii    Honeywell Wireless Planning Guide   RField Trial   Honeywell Confidential & Proprietary  2/07 4. WIRELESS NETWORK PLANNING ........................................... 21 4.1 Network planning guidelines........................................................................21 4.2 Wireless network architecture topology examples....................................21 4.3 Wireless network redundancy requirements and implementation ..........21 4.4 About the Network Analysis Tool ................................................................21 5. WIRELESS SECURITY PLANNING............................................ 23 5.1 Security planning checklist..........................................................................23 5.2 Network protection: protected against deliberate attack or human error by: 23 5.3 Industrial Wireless Security Features .........................................................23 5.4 About device authentication.........................................................................23 5.5 About security keys.......................................................................................23 5.6 About the Key Server ....................................................................................23 5.7 Wireless Security Requirements..................................................................24 5.8 Secure Wireless Architecture.......................................................................24 5.9 Mitigating wireless security threats.............................................................24 6. ABOUT WIRELESS COMMUNICATIONS .................................. 25 6.1 Communication for a wireless network infrastructure..............................25 6.2 Industrial Wireless network is developed as a multi-use wireless network. 25 6.3 Wireless Primary Protocols..........................................................................25 6.4 Wi-Fi and Gateway protocols .......................................................................25 6.5 IP addressing iNodes ....................................................................................25 6.6 Wireless Data Access....................................................................................26 6.7 Monitoring Data Access................................................................................26 6.8 Control Data Access......................................................................................26
Contents Symbol Definitions RField Trial    Honeywell Wireless Planning Guide  ix 2/07  Honeywell Confidential & Proprietary 7. WIRELESS MAINTENANCE PLANNING....................................27 7.1 Pre-configuring local access to field devices for an emergency (...........27 7.2 Device Power Failure Recovery and Authentication - references ........... 27 7.3 Device Replacement and Authentication - references.............................. 27 7.4 List of references for each of the Wireless components..........................27
Contents Tables x    Honeywell Wireless Planning Guide   RField Trial   Honeywell Confidential & Proprietary  2/07 Tables Error! No table of figures entries found.
Contents Figures RField Trial    Honeywell Wireless Planning Guide  xi 2/07  Honeywell Confidential & Proprietary Figures Error! No table of figures entries found.
 RField Trial     Honeywell Wireless Planning Guide  13 2/07  Honeywell Confidential & Proprietary   1.  About this Guide 1.1 Intended audience • Defined users •  Prerequisite skills (knowledge of Open Standard protocols like MODBUS and OPC, basic knowledge of wireless system and techniques, basic knowledge of security protocols such as boot strapping, establishing a secure session) 1.2  How to use this guide 1.3  Related documents  •  Provide references to other Knowledge Builder documents that contain related topics and supporting information for this guide.  •  List other sources if applicable
 RField Trial     Honeywell Wireless Planning Guide  15 2/07  Honeywell Confidential & Proprietary   2.  Honeywell Wireless Overview  (Honeywell is Making Industrial Wireless Real Presentation) (Wireless Infrastructure & Tools System Requirements & Functional Solutions) 2.1  Key Features and benefits •  State of the Art Security System - WPA2, AES-based, Device Authentication •  Reliable Communications – High Speed Mesh, Tolerant Sensor Radio •  Good Power Management – Designed for ~10 Year Sensor Battery Life (Rain or Shine) •  Open – Via PKS Advantage Program •  Multi-speed Monitoring – 1 Second Latency •  Multi-functional – Integrated 802.11 Network for Handhelds & Sensors •  Scalable – Start Small (1 Gateway & 1 Sensor) and Grow •  Global Solution – 2.4 GHz Based •  Quality of Service – Provides Optimized Performance •  Multi-protocol – Universal Wireless – Connects to Any System •  Control Ready – Redundant, Managed Message Routes 2.2  About Honeywell Wireless Services •  Provides site assessments and implementation for wireless. 2.3 Wireless system overview •  Show complete system with callouts to major components and subsystems (each of which is explained in subsequent sections) All the devices and infrastructure required to communicate wireless information back to and through a single WSG (inclusive of configuration tools and devices) or WSG redundant pair (Wireless Infrastructure & Tools System Requirements & Functional Solutions)  •  Wireless sensors and actuators •  Wireless network infrastructure nodes or iNodes •  Wireless system gateways •  Wireless device configuration tools 2.4 Wireless components Describe each component and it’s purpose: •  Wireless Configuration Node (Key server, directory server)
2. Honeywell Wireless Overview 2.5. Wireless Server Tools (software package) 16    Honeywell Wireless Planning Guide   RField Trial   Honeywell Confidential & Proprietary  2/07 • Authentication Device • OPC Server • iNode • WSG node • Mesh network • Sensor/actuator nodes • Wireless Builder for commissioning 2.5  Wireless Server Tools (software package)  •  XP or 2003 Server PC platform is required to run the software •  Wireless Builder to configure and troubleshoot the devices and gateways  •  Key Server and associated UI to commission devices and manage network security  •  Directory Server for automatic wireless address assignment  •  Network Diagnostic Tool for network troubleshooting and network maintenance (developed by 3eTI)  •  OPC Server to provide open access to all device data  •  (Tentative) Data Collection Tool and associated UI for maintaining a history of network performance and displaying long-term network statistics 2.6  About the Key Server Node •  Importance of maintaining high security for Key Server: Compromise of the Key Server jeopardizes the security of the entire network, it is vital that such scenarios are prevented. The communications to the Key Server must be over a secure channel. •  Availability: System depends on Key Server. The Key Server should be able to handle all requests and should have minimum latency. •  Maintenance: Physical access to the Key Server should be limited and must be secure. See Wireless System Implementation and Administration Guide for additional information. 2.7  Wireless Installation Overview (similar to what is in the Getting Started Guide) •  Install and configure Wireless software •  Configure Authentication Device •  Configure mesh network (configure INodes and Wireless System Gateways and authenticate) •  Configure wireless field devices (power up, authenticate) • Commission wireless devices into Wireless Builder
2. Honeywell Wireless Overview 2.8. For more information RField Trial    Honeywell Wireless Planning Guide  17 2/07  Honeywell Confidential & Proprietary 2.8  For more information Current standards for wireless in automation and control environment. •  Reference table of resources for wireless implementation in the automation and control environment. About ISA SP-100 Instrumentation, Systems and Automation Society’s (ISA) SP-100 initiative defines a set of standards and recommends best practices for implementing wireless systems in the automation and control environment.  Wireless usage classifications Honeywell references •  Preparing for Industrial Wireless Whitepaper
 RField Trial     Honeywell Wireless Planning Guide  19 2/07  Honeywell Confidential & Proprietary   3.  Wireless Site Planning 3.1  Site survey tasks Checklist of items that are usually considered when performing a site survey 3.2 Site considerations •  Site environmental considerations • Throughput considerations • Coverage area • Mobility requirements 3.3 Radio Frequency Survey •  Required before installation •  Determine area of coverage, line of sight, physical and transient barriers •  Determine antenna and access point selection and location based on application and protocol standard selection • Determine wired network access and power access requirements for antenna and access points 3.4  Hazardous Location requirements  - all electrical equipment installed within a hazardous location must utilize one, or a combination of, the following protection techniques: •  Intrinsic Safety (Division 1 or 2; Zone 0, 1 or 2) •  Explosionproof (Division 1 or 2; Zone 1 or 2) •  Purged and Pressurized (Division 1 or 2; Zone 1 or 2) •  Powder Filled (Zone 1 or 2) •  Oil Immersion (Zone 1 or 2) •  Increased Safety (Zone 1 or 2) •  Encapsulation (Zone 1 or 2) •  Nonincendive / Nonsparking (Division 2; Zone 2) Note: Verify necessity of section. If it is necessary, each wireless device manual also needs to specify any location requirements.  3.5 Wireless Device Placement •  Inode (environment, antenna placement, grounding)
3. Wireless Site Planning 3.6. Key Server and Authentication Device 20    Honeywell Wireless Planning Guide   RField Trial   Honeywell Confidential & Proprietary  2/07 •  WSG (environment, antenna placement, grounding) •  Wireless field devices (environment, antenna placement, grounding) 3.6  Key Server and Authentication Device •  Security and location  •  Restricting access to the Key Server and the Authentication Device 3.7  Wireless installation requirements •  All wireless devices must be installed by trained personnel (see Hardware Engineering for wording). •  Wireless standards & compliance (references)
 RField Trial     Honeywell Wireless Planning Guide  21 2/07  Honeywell Confidential & Proprietary   4.  Wireless Network Planning 4.1  Network planning guidelines 4.2  Wireless network architecture topology examples  (Wireless Field Trial Presentation) •  Minimum system  • Maximum system 4.3  Wireless network redundancy requirements and implementation 4.4  About the Network Analysis Tool •  Similar to Ethernet Sniffer, handheld  •  Uses and purpose (refer to tool documentation for operating instructions) – checklist of items
 RField Trial     Honeywell Wireless Planning Guide  23 2/07  Honeywell Confidential & Proprietary   5.  Wireless Security Planning 5.1 Security planning checklist 5.2  Network protection: protected against deliberate attack or human error by: •  Provable device identity •  Authorization of communications relationships, usually by automatic derivation from configuration database • Automatic key management •  Inference, logging & reporting of possible attack 5.3  Industrial Wireless Security Features • Authentication device  • Security Keys • Key Server 5.4  About device authentication •  Adding nodes to the wireless network requires device authentication.  •  No device that has not been properly authenticated can join the Wireless network.  •  Rule applies to all wireless devices, iNodes and gateways 5.5  About security keys  - security architecture depends on 3 types of keys •  Bootstrap Key (BK): Initial key used only for deployment, transmitted “in the clear” over short-range medium (IR) – per node •  Key Encryption Key (KEK): Protected key used to identify trusted nodes and for key distribution – per node •  Session Key (SK): Periodically updated key used for normal secure operations - per communicating pair, or per communicating group 5.6  About the Key Server •  The Key Server is the center of trust.  All nodes trusted by the Key server are also trusted by any other node in the network  •  If the key server is compromised then the entire system is compromised
5. Wireless Security Planning 5.7. Wireless Security Requirements 24    Honeywell Wireless Planning Guide   RField Trial   Honeywell Confidential & Proprietary  2/07 5.7  Wireless Security Requirements • Confidentiality (prevent eavesdropping) •  Integrity (prevent injection of false/tampered data) •  Source authentication (securely identify senders and receivers) •  Replay protection (prevent injection of pre-recorded data) •  Resistance to denial-of-service attacks 5.8  Secure Wireless Architecture •  Topology diagram of secure system 5.9  Mitigating wireless security threats •  Eavesdropping (Initial keys are transmitted out of band.  Following keys are encrypted. •  Spoofing (Authentication device (AD) attests to validity of new device.  An authenticated message validates the Key Server.) • Man-in-the-middle (Authenticated messages – source is known.) •  Subverted manufacturing/distribution (No keys available at manufacturing time, address modification threats by statistical inspection especially for high-security sites). •  Human threat factors (Simple deployment mechanism, automated key updates, high-security sites establish stringent procedures with cross checks, and audit compliance).
 RField Trial     Honeywell Wireless Planning Guide  25 2/07  Honeywell Confidential & Proprietary   6. About Wireless Communications  (Wireless Infrastructure & Tools System Requirements & Functional Solutions)  6.1  Communication for a wireless network infrastructure •  Open system communications supported by the wireless network infrastructure falls into two categories (Communication with control system for data access, Communication with controllers for control) •  Data access applications use OPC for data access. •  Controllers that need wireless data use Modbus. 6.2  Industrial Wireless network is developed as a multi-use wireless network.  It allows different types of wireless devices to share the same infrastructure. The system can be used in one of the three modes depending on the installation •  Sensor network mode •  Wireless worker mode  • Mixed mode 6.3 Wireless Primary Protocols •  IP addressing with the subnets or IP address ranges set up (large supernetted addresses vs. smaller supernetted addresses vs. Single class “C” subnets) depending on Customer PCN policies.  •  Honeywell’s Mesh Network is meant to plug-in to some other DCS or application and should follow IP addressing rules of the application (or DCS)  Any meaningful DCS policy should work for Honeywell’s Mesh Network. 6.4  Wi-Fi and Gateway protocols •  CDA (Honeywell proprietary protocol for populating the OPC Server database) • SNMP • HTTPS  •  Sensor/actuator nodes communicate with iNode using FHSS radio link.  6.5  IP addressing iNodes •  Fixed addressing is preferred for the iNOdes.  •  Need to make sure that the same node always gets the same address whenever it is rebooted.
6. About Wireless Communications 6.6. Wireless Data Access 26    Honeywell Wireless Planning Guide   RField Trial   Honeywell Confidential & Proprietary  2/07 •  During iNode or gateway replacement, the replacement box needs to get the same IP address as the box being replaced. 6.6  Wireless Data Access Wireless sensor data can be accessed for two main purposes – to provide information and to participate in automatic control scheme. Non-EPKS approach to solve these two needs is based on OPC for data access and Modbus for control. While it is possible to use Modbus for data access as well, it is not recommended since only a small subset of wireless data is exposed via Modbus while full access to all device parameters is possible via OPC. 6.7  Monitoring Data Access OPC is de facto standard for SCADA communications. Wireless network relies on OPC to provide open system communication pipe to the wireless sensor data. The concept is illustrated on the following figure: OPC Server PC also known as Wireless Configuration and OPC Server node is an integral part of the data access solution. OPC Server is collecting wireless device data from gateways using native EPKS CDA protocol. The data is then accessible to any OPC client application via standard OPC DA protocol. In addition to OPC DA for data access, OPC A&E implementation provides wireless alarms directly to OPC A&E compatible alarm clients. Wireless alarms and events are mapped into OPC without any loss of richness of the device alarming. Note that OPC server does not reside on the gateway. Current OPC technology makes it virtually impossible to implement it in an embedded environment. Future OPC UA technology may allow moving OPC server function down to the gateway. 6.8  Control Data Access When wireless data is used for control, the open system access protocol of choice is Modbus. Two flavors of Modbus are supported by the wireless gateway – serial and TCP. Serial Modbus protocol is suitable for older controllers while Modbus TCP can be used by new generation of controllers. Modbus server is implemented directly in the wireless gateway as shown on the following figure: Only a small subset of wireless data is exposed via Modbus protocol. It includes PV of every transducer block with associated PV status and device status bit string. Modbus register mapping is flexible and configurable by the configuration tool.
 RField Trial     Honeywell Wireless Planning Guide  27 2/07  Honeywell Confidential & Proprietary   7. Wireless Maintenance Planning 7.1  Pre-configuring local access to field devices for an emergency ( Honeywell – Intel Wireless Update Presentation) • Purpose of • Restrictions •  Reference to actual procedure 7.2  Device Power Failure Recovery and Authentication - references 7.3  Device Replacement and Authentication - references 7.4  List of references for each of the Wireless components
    Honeywell International Process Solutions 2500 West Union Hills Phoenix, AZ  85027

Navigation menu