Category Archives: WirelessHART Blog

Is WirelessHART fast enough for control?

At the Achema show last month, a friend working on the trade-show floor for one of the major suppliers came to me deeply puzzled. On one of his panels, a DCS is connected to a positioner and is able to … Continue reading

Posted in WirelessHART, WirelessHART Blog | Comments Off

Why are WirelessHART devices slow to join the network?

It takes years for devices to join the network. Well, I am exaggerating a bit. It takes minutes. But if you are a technician in the field and wait for the device to show up on the Gateway, it does … Continue reading

Posted in WirelessHART, WirelessHART Blog | Comments Off

The “Key” to WirelessHART

When a new device wants to join a WirelessHART network, it begins by listening. It listens for advertisements to join the network broadcast by devices already in the network. These broadcasts contain the channel map identifying channels used by the … Continue reading

Posted in Security:, WirelessHART Blog | Leave a comment

Keeping WirelessHART conversations private

We join our gallant hero, W. L. Hart, as he enters the high-tech den of thieves run by The Manager. As the door opened, Hart found himself confronted by a beautiful brunette with long hair and a short dress. “The … Continue reading

Posted in Security:, WirelessHART Blog | Leave a comment

Leaving a WirelessHART network

“The name is Hart, W. L. Hart. I have to get out of here. How do I do it?” Our adventurous hero was addressing the ally he had found in this high tech den of thieves. She was blonde, tall, … Continue reading

Posted in Security:, WirelessHART Blog | Leave a comment

Neighbor Discovery in WirelessHART

When devices want to join a WirelessHART network, they begin by listening for advertisements to join the network. Since the protocol utilizes channel hopping, the device while spend some time listening on each of the various channels. With an advertisement … Continue reading

Posted in Security:, WirelessHART Blog | Leave a comment

How WirelessHART handles path failure?

The WirelessHART protocol provides redundancy to secure against path failure. A device forwards a message according to the two-byte graph ID embedded in the message. The graphs are created by the network manager and stored in each device. Graph routing … Continue reading

Posted in Security:, WirelessHART Blog | Leave a comment

Maintaining security by changing network keys in WirelessHART

Security is built in to all WirelessHART transmissions. All data is encrypted at both the data link layer and the transport layer. Using 126-bit AES encryption at multiple layers and routinely changing the keys makes a WirelessHART network a tough … Continue reading

Posted in Security:, WirelessHART Blog | Leave a comment

Is a Smart Device really smart?

In this nineth installment of our technical discussion of the WirelessHART protocol, we look at the smart devices which make-up the nodes of the industrial network and ask the question “Is a smart device really smart?” How smart is your … Continue reading

Posted in Scenarios:, WirelessHART Blog | Leave a comment

What does the WirelessHART network manager do?

Does the WirelessHART network manager serve as a brain, computing and manipulating data as it passes through the network? Or is the network manager more like a conductor, orchestrating the harmonious flow of information? In this tenth installment of our … Continue reading

Posted in Scenarios:, WirelessHART Blog | Leave a comment