Direct integration of OPC UA Pub/Sub UDP communication into the TwinCAT 3 runtime paves the way for straightforward configuration of publishers and subscribers, as well as exchange of data in realtime.
With a new extension of the OPC UA specification, which Beckhoff played a prominent role in helping to develop, the publisher/subscriber principle is being introduced into the established and standardised OPC UA communication protocol. Through the early integration of the Pub/Sub UDP extension, Beckhoff has emerged once again as an early adopter of OPC technologies.
One particular advantage is the much simplified configuration resulting from direct integration into the TwinCAT 3 engineering environment. Communication is initiated directly from the TwinCAT 3 runtime, creating a deterministic and therefore real-time-capable communication channel via OPC UA.
Advantages of publisher/subscriber communication
Conventional client/server applications are decoupled from one another in publisher/subscriber-based data communication and no longer need to ‘know’ each other. The publisher simply sends its data, as a UDP multicast in this case, to a multicast group. The subscribers receive the data by subscribing to the multicast group instead of the actual device.
These advantages can be utilised in all areas of machine design, plant engineering and building automation technology. This is especially true in M2M scenarios within machine networks, for example, in small manufacturing systems as well as complex machines and buildings.
According to the current roadmap for the OPC UA specification, this extension is expected to be finalised by the OPC Foundation in early 2017. Accordingly, Beckhoff plans a timely product release in TwinCAT 3.
Transforming pulp and paper with automation and digitalisation ABB South Africa
IT in Manufacturing
The pulp and paper industry in South Africa is undergoing a significant transformation from traditional manual processes to embracing automation technologies. Automation in pulp and paper mills aims to improve various production stages, from raw material preparation to final product creation.
Read more...Protecting industrial networks with resilient defence RJ Connect
IT in Manufacturing
Network security is no longer just about preventing hacking or data breaches. For operational technology networks, resilient defence and consistent uptime are crucial. They are the core tenets that underpin Moxa’s guarded uptime and resilient defence (GUARD).
Read more...PC-based control for a food capsule and pod packaging machine Beckhoff Automation
Editor's Choice
For TME, a machine builder specialising in the packaging of powdered foods, Beckhoff’s PC-based control technology offers unlimited opportunities when it comes to performance and innovative capacity in terms of flexibility, scalability and openness.
Read more...The metaverse is now: are you ready to reimagine your business?
IT in Manufacturing
The convergence of the digital and physical worlds, driven by spatial computing and the metaverse, is rapidly reshaping business landscapes. This transformation extends beyond the mere novelty of virtual reality headsets and augmented reality filters, signalling a fundamental shift in how organisations operate, collaborate and innovate.
Read more...AI and cyber security: South Africa’s next battleground
IT in Manufacturing
Artificial intelligence is rapidly becoming a double-edged sword in the world of cybersecurity. In South Africa, where cybercrime is on the rise, AI presents both an opportunity and a threat.Artificial intelligence is rapidly becoming a double-edged sword in the world of cybersecurity. In South Africa, where cybercrime is on the rise, AI presents both an opportunity and a threat.
Read more...Addressing the cooling needs of the modern data centre Schneider Electric South Africa
IT in Manufacturing
The rise in hardware density in data centres is gaining speed and is largely driven by the demands of artificial intelligence and machine learning, requiring more powerful servers and specialised hardware.
Read more...South Africa’s next cyber security frontier
IT in Manufacturing
AI-powered agents are rapidly transforming how South African businesses operate, from chatbots managing customer inquiries to automated systems processing financial transactions. While these AI-driven assistants increase efficiency and reduce operational costs, they also present a new, and often underestimated, cybersecurity challenge: identity management.