Emerson claims industry first with wireless conductivity transmitter
15 Oct 2009
London - Emerson Process Management has expanded its Smart Wireless analytical field instrument solutions with the release of what it says is the industry's first WirelessHART contacting conductivity transmitter. The Rosemount Analytical Model 6081-C device is an addition to the recently introduced model 6081-P wireless pH/ORP transmitter.
Industrial conductivity measurement is used in control in applications where measuring and controlling the conductivity of chemical concentration allows effective scrubber performance, where detecting leakage of cooling water from jackets or heat exchangers into processes allows contamination to be avoided, or where leakage of the process into the cooling water enables fouling or corrosion to be avoided. It is valuable for equipment protection as well, such as its use for monitoring boiler feedwater and permeate, to ensure pure mineral-free water, which is important for protecting condensers, heaters, pumps, piping, boilers, and turbines that produce power.
Wireless technology is ideal for conductivity applications that are too difficult to reach, too dangerous to access, or too costly to perform with a wired transmitter. Emerson says its new devic complies with the WirelessHART communications standard, so making it fully compatible with other wireless devices.
In addition to its wireless capability, the transmitter is compatible with both two-electrode and new four-electrode sensors, and with Emerson’s AMS Suite predictive maintenance software. It offers a measurement span from 0 to 600,000 µS/cm, which makes it ideal for a wide range of industries and applications.
According to Emerson, advanced diagnostics allow real-time monitoring of sensor condition for maintenance scheduling, while local device keypad access permits setup, configuration and trouble-shooting in situ and quick start menus enable in-process deployment within one minute. Security issues are covered by Emerson’s five level security implementation, which includes encryption, authentication, verification, anti-jamming and key management.