PLC New Document-1
PLC New Document-1
ELECTRICAL AND ELECTRONICS ENGINEERING DEPARTMENT 1. Programmable Logic Controllers: Programming Methods and
Applications by John R. Hackworth and Frederick D. Hackworth,
DIPLOMA IN ELECTRICAL & ELECTRONICS ENGINEERING
(POWER OPTION) Jr.
2. Programmable Logic Controllers by W. Bolton 4th Edition
INDUSTRIAL PROGRAMMABLE LOGIC CONTROLLER
3. Programmable Controllers: Theory and Implementation by
COURSE OUTLINE L.A. Bryan and E.A. Bryan. 2nd Ed.
1, Introduction to Industrial PLC 8 hrs
· Need for Industrial PLC 4. Industrial Automation by Srinivas Medida Vol. 6
· Types of Industrial PLC 5. Practical SCADA for Industry by David Bailey, Edwin Wright
2. PLC system 15 hrs
6. Industrial Networks for Communication and Control by S.
· Hardware Configuration
· Ladder Logic Programming Djiev,
· External Peripherals
· PLC Maintenance
3
TOPIC 2: PROGRAMMABLE LOGIC CONTROLLER (PLC) - PLCs require shorter installation and commissioning times than do
Introduction hard-wired systems. To modify a control system and the rules that are
- PLC is a unit of hardware used to control and automate industrial to be used, all that is necessary is for an operator to key in a different
processes. It is a micro-computer based controller that uses stored set of instructions. There is no need to rewire.
instructions in programmable memory to implement logic, sequencing, - The result is a flexible, cost effective, system which can be used with
timing, counting and arithmetic functions through digital or analog control systems which vary quite widely in their nature and complexity.
input/output modules, for controlling machines and processes. - PLCs are similar to computers but whereas computers are optimized
- The term logic is used because programming is primarily concerned for calculation and display tasks, PLCs are optimized for control tasks
with implementing logic and switching operation. and the industrial environment.
- The PLC is designed as replacement for the hard-wired relay and - Thus PLCs have specific features suited for industrial control :-
timer logic to be found in traditional control panels, where PLC 1. Rugged and designed to withstand vibrations, temperature,
provides ease and flexibility of control based on programming and humidity and noise
executing logic instructions. 2. Modular plug-in construction, allowing easy replacement or
- A PLC has three main aspects: the inputs and outputs and the control addition of units (e.g. input/output);
program. In figure below, PLC has eight inputs and four outputs. 3. Standard input/output connections and signal levels
- The input is anything that can 4. Have interfacing for inputs and outputs already inside the
sense the status of the controller.
environment and then convert that 5. Easily understood programming language which is primarily
information in to a signal. Often the concerned with logic and switching operations
signal can simply be a voltage that 6. Ease of programming and reprogramming in-plant;
is either on or off. For example, 7. Capable of communicating with other PLCs, computers and
input devices can be proximity intelligent devices;
switches, photoelectric sensors, 8. Competitive in both cost and space occupied with relay and solid-
temperature sensors, push state logic systems.
buttons, or pressure sensors. · These features make programmable controllers highly desirable in a
- The outputs are connected to the devices that need to be controlled wide variety of industrial-plant and process-control situations.
like motors, indicator lights, fans, warning sirens or heating elements.
- Control processes need devices to monitor events or measure PLC Advantages
needed values. These devices are generically called inputs to the · Flexibility: One single PLC can easily run many machines.
PLC. · Correcting Errors: With PLC control, any change in circuit design
- The program uses a set of logical instructions that drives the outputs or sequence is as simple as retyping the logic. Correcting errors in
based on the inputs. PLC is extremely short and cost effective.
· Space Efficient: Today's PLC memory is getting bigger and
The Need for PLCs bigger this means that we can generate more and more contacts,
- Hardwired panels were very time consuming to wire, debug and coils, timers, sequencers, counters and so on. It is possible to
change. The PLCs eliminates much of the hard wiring that was have thousands of contact timers and counters in a single PLC.
associated with conventional relay control circuits. · Low Cost: Prices of PLC vary from few hundreds to few
- PLCs have the great advantage that the same basic controller can be thousands.
used with a wide range of control systems.
4
· Testing: A PLC program can be tested and evaluated in a lab. PLC Hardware
The program can be tested, validated and corrected saving very The structure of a PLC can be divided several parts/components. The
valuable time. main parts are input/output modules, central processing unit, memory and
· Visual observation: When running a PLC program a visual programming terminal.
operation can be seen on the screen. Hence troubleshooting a a) Processor unit or central processing unit (CPU) is the unit
circuit is really quick, easy and simple. containing the microprocessor and this interprets the input signals
and carries out the control actions, according to the program
Typical PLC Applications stored in its memory, communicating the decisions as action
· PLCs are used to operate greenhouse irrigations systems. It can be signals to the outputs.
used to control how often and the amount of water distributed to b) Memory unit is where the program is stored that is to be used for
certain areas. It can control a large amount of valves to certain areas the control action to be exercised by the microprocessor and data
and is flexible as the greenhouse’s needs change. stored from the input for processing and for the output for
outputting.
· PLCs are used for sorting packages on a conveyor by operating a
diverter. A sensor can detect a package type and a series of diverters
can sort them at the end of the belt. But the PLC is flexible, it can be
reprogrammed if and when the sorting task changes or if enhanced
operation is needed.
· PLCs are implemented in a variety of control operations from large to
small. Carwashes are a popular use for PLCs because it involves
intricate use of sensors and motors, but also has the need for
relatively complex logic.
· Lumber mills use PLCs to control the main saw and loading of wood
while various sensors ensure safe operation so that people and
equipment are not harmed
· PLCs can withstand the harsh condition desert conditions while
controlling an oil recovery process. Temperatures can get higher than
120 degrees Fahrenheit in the desert, yet a PLC can read sensors
and control the motors necessary for oil extraction.
PLC Architecture c) Input and output modules – are where the processor receives
There are two types: information from external devices and communicates information
1. Open architecture design allows the system to be connected to external devices. The I/O unit provides the interface between
easily to devices and programs made by other manufacturers. the system and the outside world, allowing for connections to be
2. Closed architecture or proprietary system is one whose design made through I/O channels to input devices such as sensors and
makes it more difficult to connect devices and programs made by output devices such as motors and solenoids. It is also through
other manufacturers. the I/O unit that programs are entered from a program panel.
NOTE: When working with PLC systems that are proprietary in nature you Every I/O point has a unique address which can be used
must be sure that any generic hardware or software you use is
compatible with your particular PLC.
5
d) Input and output (I/O) devices - is collection of physical 1. Arithmetic and Logic Unit (ALU) Which is responsible for data
elements of the control system that either provide or use I/O data. manipulation and carrying out arithmetic operations of addition and
e) Programming device / terminal are used to enter the required subtraction and logic operations of AND, OR, NOT and EXCLUSIVE –
program into the memory of the processor. The program is OR(X-OR) it receives control signals from the control unit telling it to
developed in the device and then transferred to the memory unit carry out these operations
of the PLC. 2. Control Unit – This controls the movement of instruction in and out of
f) Power supply unit is needed to convert the mains A.C voltage to the processor and also controls the operation of ALU. It consists of a
low d.c. voltages necessary for the processor and the circuits in decoder, controls logic circuit and a clock to ensure everything
the input end output interface modules. happens at the correct time. It is also responsible for performing the
g) Rack Assembly: Most medium to large PLC systems are instruction execution cycle.
assembled such that the individual components - CPU, I/O, power
supply - are modules that are held together within a rack. In
smaller PLC systems - all of these components may be contained
in a single housing or "brick" - these smaller systems are
sometimes referred to as "bricks" or "shoebox" PLCs.
h) Communication interface is used to receive and transmit data
on communication network from or to other remote PLC. It is
concurred with such actions as device verification, data
acquisition, synchronization between user applications and
connection management.
6
4. Bus - Buses are the paths used for communication within the PLC. · User program memory – The final area of memory in a PLC is
The information is transmitted in binary form i.e. as a group of bits allocated to the storage of the user program. It is this memory
with a bit being a binary digit of 0 or 1. area that the executive program instructs the micro-processor to
· System bus is used for communication between the I/O ports and examine or ‘scan’ to find the user instructions.
I/O unit. It is a cable which carries data communication between · I/O status memory or I/O image table. A portion of RAM is
the major components of the computer including the allocated for the storage of current I/O status. Every single I/O
microprocessor. module has been assigned to a particular location within the I/O
· Control bus carries the signals relating to the control and co- image table. The location within the input and output image
ordination of the various activities across the computer which can table/map are identified by addresses, each location has its own
be sent from the control unit within the CPU. It informs memory unique address.
devices whether they are to receive data from an input or output
data and to carry out timing signals used to synchronize actions. Memory organization
· Data bus carries the data used in the process carried out by the - This refers to how certain areas of memory in a PLC are utilized.
CPU. It is used for the exchange of data between the processor, Physical addressing is the ability to read data from a specific module
memory and peripherals, and is bidirectional. A micro processor terminal or write information to a specific module terminal.
termed as being 8-bit has an internal data bus which can handle - During the execution of user program, the micro processor scans the
8-bit number. user program and interprets the user command, when information is
· Address bus is used to carry the addresses of memory location. read from a contact or input, it is stored in memory. This portion of
It contains the connection between the microprocessor and memory is the input image table/map which is designated to store
memory that carry the signals relating to the addresses which the this input information. Each input typically has at a minimum, a single
CPU is processing at that time, such as the locations that the CPU bit designated to store its information
is reading from or writing to. Every memory location is given a - Data resulting from logical analysis by the CPU i.e. various output
unique address. device status generated during the execution of user program is
stored in memory labeled as the output image table/map
5. Memory: - There are several memory elements in a PLC system. - From this point, the information is transferred to a designated output
· Executive memory or operating system memory which is read module and then to a particular field device.
only memory (ROM) to give permanent storage for operating
system and fixed data used by the CPU. It is the one that actually Basic PLC Operation
does the scanning in the PLC. · A PLC works by continuously running a
· System memory – in order for the operating system to function, a program that checks the inputs and then
section of the memory is allotted for system administration. As the updates the outputs. The process of the PLC
executive program performs its duties, it often requires a place to running throughout its program is called
store intermediate results and information. A section of RAM scanning. Scanning speed depends on the
(Random Access Memory) is installed for this purpose. program size and execution time.
· Data memory – This is a RAM where information is stored on the · The total time for a PLC to check the inputs,
status of input and output devices and the values of timers and run the program and update the outputs is
counters and other internal devices. Data RAM is sometimes called the cycle time. Typical cycle times are
referred to as data table or register table. 10 ms to 100 ms. Every cycle the inputs are
check and saved to memory.
7
· Then the program is run using the status of the saved inputs. After the 4. Housekeeping – these steps includes communication with
program is done the outputs are updated and the cycle starts again. programming, internal diagnostic activities etc.
Scanning processes
· The PLC’s CPU monitors the status of all inputs. It takes these values
and energizes or de-energizes the outputs according to the ladder
diagram / user program. This is referred to as Scanning. The CPU of
the PLC executes the user program over and over again when it is in
the run mode.
· A scan does not consist of a PLC executing ladder diagram rung by
rung, but instead the PLC performs an I/O and program scan. The I/O
scans transfers data to and from the output and input modules
respectively.
· The information is transferred in the form of bits and stored in image
tables (image maps) are block of memory designated to store the
input and output bit state)
· The input and output is the portion of the PLC that interfaces with the
outside world. The actual bridge between the physical world and
internal world of the PLC is the optical isolation circuitry.
· There are four basic steps in the operation of all PLCs; input scan,
program scan, output scan, and house keeping. These steps
continually take place in a repeating loop.
1. Input scan: During the input scan, the current status of every
input module is stored in the input image (memory) table, bringing
it up-to-date. Thus all the status of the input devices (which in turn
is connected to the input module) is updated in the input memory
table.
2. Program scan: Following the input scan, the CPU enters its user
program execution, or program scan. The execution involves PLC input and output (I/O) devices
starting at the program's first instruction, then moving on to the - Input/output (I/O) is information representing the data that is received
second instruction and carrying out its execution sequence. This from senses elements / devices and the commands that are sent to
continues to the last program instruction. Throughout the user- actuating and indicating devices. The I/O system is collection of
program execution, the CPU continually keeps its output image physical elements of the control system that either provide or use I/O
(memory) table up-to-date. data.
3. Output scan: During program scan, the output modules - The term sensor is used for an input device that provides a usable
themselves are not kept continually up to date. Instead, the entire output in response to a specified physical input. For example, a
output image table is transferred to the output modules during the thermocouple is a sensor which converts a temperature difference
output scan which comes after the program execution. Thus the into an electrical output.
output devices are activated accordingly during the output scan.
8
- The term transducer is generally used for a device that converts a numerical value by an A/D converter. The process of sampling the
signal from one form to a different physical form. Thus sensors are data is not instantaneous, so each sample has a start and stop time.
often transducers, but also other devices can be transducers, e.g. a The time required to acquire the sample is called the sampling time.
motor which converts an electrical input into rotation. A/D converters can only acquire a limited number of samples per
- The number of I/O devices used within a control system is called its second. The time between samples is called the sampling period T,
point count. Thus the total number of digital and analog point is used and the inverse of the sampling period is the sampling frequency (also
to give an indication of the size of a control system. called sampling rate). The sampling time is often much smaller than
- PLC has input and output lines through which is connected to a the sampling period
system it directs. Any electrical signal processing always requires a - Analog output devices respond to a range of output values from the
voltage supply (an active part) and a load (passive part) or vice versa. controller common analog output signals include motor speed, valve
- I/O modules connect "real world" field devices to the controller. They position, air pressure etc. An analog output card will convert a digital
convert the electrical signals used in the field devices into electronic number sent by the CPU to its real world voltage or current. Analog
signals that can be used by the control system, and translate real device data requires significantly more manipulation and processing
world values to IO table values. then digital device data.
- I/O modules communicate with PLC CPU in one of three ways:
1. Backplane - The I/O modules can be located in the same rack or 2. Digital input and output devices
station. Communications then takes place within the rack or - Inputs come from sensors that translate physical phenomena into
across the backplane. digital signal. Thus digital input devices may be either on or off, they
2. Backplane extension - backplane extension modules allow I/O may not hold any other value.
modules to be located in racks or stations which are separated - Common digital field input devices include push buttons, unit switches
from the controller. and photo eyes.
3. Device network - modules can communicate with a controller - Digital output devices are devices which give either on or off.
over a network. Industrial networks are used to interconnect field Common types are relays, motor starter, solenoid valves etc.
level devices with controllers. Common IO networks are FieldBus,
Profibus, and DeviceNet. Examples of inputs and outputs
- There are major types of I/O - Inputs for a PLC come in a few basic varieties the simplest are AC
· Analog – continuous devices that sense and respond to a range and DC inputs. Examples of input devices are:
of values · Proximity switches – use inductance, capacitance or light to
· Digital – binary devices which must be in one of only two states detect an object logically
on or off. · Switches – mechanical mechanisms will open or close electrical
contacts for a logical signal
1. Analog input and output devices · Potentiometer – measures angular position continuously using
- Analog input devices senses continuous parameters common analog resistance.
inputs are pressure, temperature, speed transducers etc. · LVDT (Linear variable differential transformer) – measures
- An analog input card converts a voltage by current leg or signal that linear displacement continuously using magnetic coupling.
can be anywhere from 0 to 20mA) into digitally equivalent number that - Outputs to actuators allow a PLC to cause something to happen in a
can be understood by the CPU. process. Outputs from PLC are often relays, but they can also be solid
- To input an analog voltage (into a PLC or any other computer) the state electronics such as transistors for DC output or TRIACs for AC
continuous voltage value must be sampled and then converted to a
9
outputs. Continuous output requires special output cards with digital to Sourcing and sinking
analog converters. - Sourcing and sinking are used to describe the way in which d.c
- Examples are devices are connected to a PLC and uses d.c currents and voltages.
· Solenoid valves – logical output that can switch a hydraulic or
pneumatic flow 1. Sourcing – When active, current flows from supply, through the use a
· Lights – logical output that can often be powered directly from single supply voltage. With sourcing, using the conventional current
PLC output boards flow direction as from positive to negative, an input device receives
· Motor starters – motors often draw a large amount of current current from the input module i.e. the input module is the source of the
when started, so they require motor starters which are basically current (Fig a)
large relays. - If the current flows from the output module to an output load then the
· Servo motors – a continuous output from the PLC can command output module is referred as to sourcing (fig b)
a variable speed or position.
Output
Module
10
Typical Connections of PLC Types of PLC system
· The PLC sizes are given in terms of program memory size and the
maximum number of I/O points the system can support.
· However to evaluate properly any PLC, consideration is taken for
- . many additional features such as its processor, cycle time, language
facilities, functions expansion capability etc.
1. Small PLC – small and mini PLCs are designed as robust, compact
units which can be mounted on or beside the equipment to be
controlled. They are mainly used to replace hard wired logic relays,
timers, counters etc that control individual items of plant or
machinery, but can also be used to co-ordinate several machines
working in conjunction with each other. Programming is by way of
logic instruction list (mnemonic) or relay ladder diagrams.
2. Medium-sized PLC: - In this range, modular construction
predominates with plug-in modules on rack mounting system or
Back plane system. This allows the simple upgrading or expansion
of the system by fitting additional 1/0 cards into the racks
3. Large PLC - where control is very large numbers of input and
output points is necessary or complex control functions are required,
a large PLC is selected. It is designed for use in large plants or
machines requiring continuous control. They are also employed as
supervisory controllers to monitor and control several other PLCs or
intelligent machines e.g. CNC tools.
12
2. Instruction list – a low level (assemble like) language that is Ladder diagram Language
based on similar instructions list languages found in a wide range - A ladder diagram is a symbolic representation of an electrical circuit.
of today’s PLCs. Thus the symbols utilized closely resemble schematic symbols for
electrical devices.
- This language is a symbolic instruction set that is used to create PLC
programs. The ladder instruction symbols can be formatted to obtain
the desired control logic, which is then entered into memory. Since
this type of instruction set consists of contact symbols, it is also
3. Structured text – A high level text language that encourages referred to as contact symbology
structured programming. It has a language structure (syntax) that - To introduce ladder logic programming, simple switch circuits are
strongly resembles PASCAL and supports a wide range of converted to relay logic and then to PLC ladder logic.
standard functions and operations. For example - The industry trend is toward using the IEC 61131-3 standard, though
IF (Limit_switch1 AND Workpiece_Present) THEN a voluntary standard; individual manufactures here some freedom in
Gate1 :- Open; the implementation.
Gate2 :- Close; - Other PLC manufacturers are Allen-Bradley, Control Logix, Modicon,
ELSE Siemens 57 etc.
Gate1 :- Close;
Gate2 :- Open; Ladder logic symbols
End_IF; 1. The basic ladder logic input symbols are
4. Function block diagram (FBD) –is a graphical language that 1. Normally open (NO) contact: pass power (ON) if
allows the user to program elements (e.g., PLC function blocks) in coil driving the contact is ON (closed)
such a way that they appear to be wired together like electrical 2. Normally closed (NC) contact: pass power (ON)
circuits. It is very useful for expressing the interconnection of if coil driving the contact is off (open)
control system algorithms and logic. 3. Positive transition sensing contact: if condition
before the instruction change from OFF to ON,
this instruction passes power for only one scan
(until rung is scanned again)
4. Negative transition sensing contact: if condition
before this instruction change from ON to OFF,
this instruction passes power for only one scan
(until rung is scarred again)
5. Sequential function chart: A method of programming complex
control systems at a more highly structure level. It is an over view
of the control system, in which the basic building blocks are entire 2. The basic ladder logic coil (output) symbols
program files. 1. Output or coil: if any left-to-right path of
instruction passes power, the output is energized.
If there is no continuous left-to-right path of
instruction passes power, the output is de-
energized.
13
2. Negated coil: if any left-to-right path of inputs - The use combinational logic where the output is purely dependent
passes power, the output is de-energized. If there of the combination of inputs at any instant in time. They use AND, OR,
is no continuous left to right path of instructions NOT, X-OR to create ladder logic. In all the ladder logic, symbols are
passing power the output is energized used for all inputs, outputs and internal memory.
3. Set coil: if any rung bath passes power output is - Vertical lines on the left and right are called the power rails. The
energized and remains contacts are arranged horizontally between the power rails, hence the
energized, even when no rung path pass power term rung.
4. Reset coil: if any rung path passes power output - The main functions of a ladder diagram program are to control outputs
is de-energized and remains de-energized, even and perform functional operations based on input conditions. Ladder
when no rung path passes power. diagrams use rungs to accomplish this control.
- In general, a rung consists of a set of input conditions (represented by
contact instructions) and an output instruction at the end of the rung
(represented by a coil symbol). The contact instructions for a rung
may be referred to as input conditions, rung conditions, or the control
logic
Example 1
Two switches labeled A and B are wired in SERIES controlling a lamp.
Implement this function as PLC ladder logic where the two switches are
- Since the PLC was developed to replace relay logic control system, it separate inputs.
was only natural that initial language closely resembles the diagrams
used to document the relay logic.
- By using this approach, the engineers and technicians using the early
PLC did not need retraining to understand the program.
14
Solution ii) NAND gate
X=A.B
- The PLC ladder logic notation is shortened from the relay wiring
diagram to show only the third line, the relay contacts and coil of the
output relay.
Example 2
Two switches labeled A and B are wired in PARALLEL controlling a
lamps implement this function as PLC ladder logic where the two
switches are separate inputs. iv) XOR gate
Solution
X=A+B
Example 3
Draw a ladder diagram for the NOT, NAND, NOR and XOR gate
i) NOT gate
15
Questions Instruction List
1. Devise a ladder diagram for a system where there has to be no output · This is a low-level language similar to the machine or assembly
when any one of four sensors gives an output, otherwise there is to be language used with microprocessors. This type of language is useful
an output. for small applications, as well as applications that require speed
2. A signal lamp is required to be switched on if a pump is running and optimization of the program or a specific routine in the program
the pressure is satisfactory, or if the lamp test switch is closed. Draw a · This programming method, which can be considered to be the
ladder diagram. entering of a ladder program using text, gives programs which consist
3. Consider a valve which is to be operated to lift a load when a pump is of a series of instructions, each instruction being on a new line. An
running and either the lift switch is operated or a switch operated instruction consists of an operator followed by one of more operands,
indicating that the load has not already been lifted and is at the bottom i.e. the subjects of the operator. In terms of ladder diagrams an
of its lift channel. Devise a ladder diagram. operator may be regarded as a ladder element.
4. An Alarm system is used in conjunction with an automated bottling · Each instruction may either use or change the value stored in a
system in a milk bottling plant. A conveyer belt carries empty bottles memory register.
that are to be filled with milk. The alarm goes off in any of the · There are a lot of instructions used to develop the PLC program. Each
conditions occurs. instruction has a respective function. For this, mnemonic codes are
- Milk tank is empty and bottles are in conveyor belt. used, each code corresponding to an operator/ladder element. The
- There are no bottles in the conveyer and there is milk in the tank. codes used differ to some extent from manufacturer to manufacturer,
- There is milk in the tank and bottles on the conveyor belt but though a standard IEC 1131-3 has been proposed and is being widely
electric power is off. adopted.
- There is no milk in the tank, no bottles on the conveyor belt and
electric power is off. Instruction code mnemonics
i) Write down a Boolean expression for the alarm system.
ii) Implement this system using a PLC ladder diagram.
5. Draw the ladder rungs to represent:
a. Two switches are normally open and both have to be closed
for a motor to operate.
b. Either of two, normally open, switches have to be closed for a
coil to be energized and operate an actuator.
c. A motor is switched on by pressing a spring-return push button
start switch, and the motor remains on until another spring-
return push button stop switch is pressed.
d. A lamp is to be switched on if there is an input from sensor A
or sensor B
e. A light is to come on if there is no input to a sensor.
f. A solenoid valve is to be activated if sensor A gives an input.
16
1. LD - LOAD Instruction: These instructions are use to start a line of
the program. It is used in the first contacts in the normally open
condition (NO). The Execution Conditions of the instruction on the
right will be ON when internal relay (IR) 00000 is ON.
7. OUT - OUTPUT Instruction: These instructions are used for the coil
output. IR 10000 will ON when IR 00000 is ON.
4. AND NOT - AND NOT Instruction: These instructions are used in the
second contact in a normally closed (NC) and in series with previous
contacts. The Execution Conditions of the instruction on the right will
be ON when IR 00000 ON and IR 00001 are OFF.
17
8. END: END instruction has no physical contact device. It is the last
instruction required for completion of a program. If no END instruction,
the program cannot be implemented. For PLC type OMRON -
SYSMAC CQM1H, the instruction FUN 01 is the END instruction.
11. OR LD and AND LD: When both logic block instruction is to be used
in Ladder Diagram, a program must be written from the bottom up to
merge logic blocks. For example, ladder diagram below: Logic block
9. OR LD - BLOCK LOGIC OR Instruction: The OR LD instruction has no of instruction for the last two blocks (blocks b1 and b2 blocks) are
physical contact device. Only a programming tool for solving complex written first and then followed by the first logic block instruction (block
OR function as a series of contacts LD (or LD NOT), in parallel with a a).
series of other contacts.
18
Examples Sequential control
1. A signal lamp is required to be switched on if a pump is running and - This is where the output is dependent not only on the actual inputs but
the pressure is satisfactory, or if the lamp test switch is closed. on the sequence of the previous inputs and outputs (memorizing
events).
- Sequential problems have long been solved using conventional logic
gates as building blocks, but using certain techniques to express and
identify the sequence logic equations that control the system outputs.
- Advanced PLC instructions such as shift registers, sequencers,
master control relays, timers etc are provided to simplify the design
and implementation of sequence systems.
Internal Relay
- In PLCs there are elements that are used to hold data, i.e. bits, and
2. For a valve which is to be operated to lift a load when a pump is behave like relays, being able to be switched on or off and switch
running and either the lift switch is operated or a switch operated other devices on or off. Hence the term internal relay.
indicating that the load has not already been lifted and is at the bottom - Such internal relays do not exist as real-world switching devices but
of its lift channel, Figure shows the ladder program and the related are merely bits in the storage memory that behave in the same way
instruction list. as relays.
- For programming, they can be treated in the same way as an external
relay output and input. Thus inputs to external switches can be used
to give an output from an internal relay.
- This then results in the internal relay contacts being used, in
conjunction with other external input switches to give an output, e.g.
activate a motor.
3. For a system where there has to be no output when any one of four
sensors gives an output, otherwise there is to be an output, Figure
shows the ladder program and the instruction list.
- For the first rung: when input 1 or input 3 is closed and input 2 closed,
then internal relay IR 1 is activated. This results in the contacts IR 1
closing. If input 4 is then activated, there is an output from output 1.
- Such a task might be involved in the automatic lifting of a barrier when
someone approaches from either side. Input 1 and input 3 are inputs
19
from photoelectric sensors that detect the presence of a person, Example
approaching or leaving from either side of the barrier, input 1 being An example of the basic elements of a simple program for use with a fire
activated from one side of it and input 3 from the other. Input 2 is an alarm system is shown. Fire sensors provide inputs to a SET-RESET
enabling switch to enable the system to be closed down. function block so that if one of the sensors is activated the alarm is set
- Thus when input 1 or input 3, and input 2, are activated, there is an and remains set until it is cleared by being reset. When set it sets of the
output from the internal relay 1. This will close the internal relay alarm.
contacts. If input 4, perhaps a limit switch, detects that the barrier is
closed then it is activated and closes. The result is then an output
from Out 1, a motor which lifts the barrier.
- If the limit switch detects that the barrier is already open, the person
having passed through it, then it opens and so output 1 is no longer
energized and a counterweight might then close the barrier.
- The internal relay has enabled two parts of the program to be linked,
one part being the detection of the presence of a person and the
second part the detection of whether the barrier is already up or down Timers
- In many control tasks there is a need to control time. Timers are
SET and RESET devices that count increments of time. PLCs thus have timers as built-
- Another function which is often available is the ability to set and reset in devices. Timers count fractions of seconds or seconds using the
an internal relay. The SET instruction causes the relay to self-hold, i.e. internal CPU clock.
latch. It then remains in that condition until the RESET instruction is - The way the timers work varies from one type of PLC to another. A
received. The term flip-flop is often used. common approach is to consider timers to behave like relays with
- The SET coil is switched on when power is supplied to it and remains coils which when energized result in the closure or opening of
set until it is RESET. The RESET coil is reset to the off state when contacts after some preset time. The timer is thus treated as an output
power is supplied to it and remains off until it is SET. for a rung with control being exercised over pairs of contacts
- SET and RESET instruction will change the status of bit operations elsewhere.
only when the implementation is ON. In the OFF condition, the - The timer compares its current time with the preset time. The output
instructions will not change the bit operation status. of the timer is a logic 0 as long as the current time is less than the
preset time. When the current time is greater than the preset time the
timer output is a logic 1.
- TIMER (TIM) is the instructions that require numbers TIM (N) and the
set value (SV). The range of numbers TIM is from 000 to 511, while
the range of set values for the TIM is 0000 to 9999
- The numbers TIM can not be used twice. When a number has been
used as definer, such as number 000 for instructions on TIM, the
- When the input instruction LD 00000 is ON, SET instruction command number can not be used again.
to ON and always ON regardless of whether the input instruction LD - When a number is defined as the number of
00 000 is ON or OFF. TIM, it can be used as often as required as
- When the inputs instruction LD 00001 is ON, RESET instruction is ON an operator operand in other instructions
and SET instruction will be off. from the command TIMER.
20
Example 1
- Timer is enabled / activated when the execution condition is ON and - Operating condition: When the input (LD 00000) ON, the timer (TIM
will be reset to set value (SV) when the execution condition is OFF. 000) will be activated after 5 seconds and the output (OUT 10000) will
- The set value (SV) of TIMER is the BCD between #0000 to #9999. be ON. While the output (OUT 10001) will be ON as soon as the
For example if TIMER be set 0 – 5 seconds, then the set value is # supply is supplied and will be OFF after 5 seconds. Timer will
0050 continue to be active as long as the input 00000 state is ON.
Example 3
- Operation condition: When the input (LD 00000) is ON, the timer
contact will be activated after 5 seconds. Next the output (OUT
10000) will be ON.
Example 2
· When the input (LD 00000) ON, the timer (TIM 000) will be
activated after 5 seconds. Next the output (OUT 10000) will be
ON. After 3 seconds the output (OUT 10000) ON, the timer (TIM
001) will be activated the next output (OUT 10000) will be OFF
and the timer (TIM 001) will be OFF. When the timer TM001 OFF,
contact TIM 001 (NC) will be ON and the output (OUT 10000) is
ON state. Output (OUT 10000) will continue ON and OFF until the
input (LD 00000) in the OFF state.
21
Question Example 1
Two motors (M1 and M2) are to be controlled as follows: Counter set to count 10. When the input (LD 00,000) is the pulse of ten, a
- When the run switch is operated both motor must run counter will be activated and thus the output (OUT 10000) will be ON.
- After 4 min motor 1 must stop When reset (LD 00,001) ON, a counter will be in original condition
- Motor 2 continues running for another 2 min and stops
- At this point a lamp is switched on
- After a further 90 sec, the lamp goes off and the cycle restarts
- If a stop switch is operated at any time, the system will continue to the
end of the cycle and then stop. Produce the PLC program
Counters
- Counters used in PLCs serve the same function as mechanical
counters. Counters compare an accumulated value to a preset value
to control circuit functions.
- Counter is used to count and store the number of occurrence of an
input signal. Control applications that commonly use counters include
the following:
• Count to a preset value and cause an event to occur
• Cause an event to occur until the count reaches a preset value
- Counters increment/decrement one count each time the input Example 2
transitions from off (logic 0) to on (logic 1).
- Counter (CNT) is the instructions that require numbers TIM/CNT (N)
and the set values (SV). Counter set to count 5. When the
- The range of numbers CNT is from 000 to 511, while the range of set input (LD 00,000) is the pulse of five,
values for the CNT is 0000 to 9999 a counter will be activated and thus
- When a number is defined as the number of CNT, it can be used as the output (OUT 10000) will be ON.
often as required as operator operand in other instructions from the When the output (OUT 10000) ON,
command COUNTER. TIM 001 will be activated after 3
- The counters are reset when a RESET instruction is executed seconds and then the output (OUT 10
001) will be ON. Both the output
(OUT 10000) and (OUT 10 001) will
always be ON until reset (LD 00001)
in the ON state. Reset will return the
counter to its original condition.
22
Questions PLC External peripherals
1. Components pass along a chute and interrupt a light switch which - A peripheral is a device that is connected to a host PLC, but not part
goes low (off) each time it is interrupted. Every time 6 components of it. It expands the host’s capabilities but does not form part of the
have been counted, an eject operation is used to remove the batch core PLC architecture.
and the then it all starts again. - Peripheral devices to the PLC and its I/O base(s) can be anything
Produce a ladder logic diagram to do this operation. The counter is from a host computer and controls console to a motor drive unit or
designated C460 field unit switch.
- Printers end industrial terminals used for programming are also
2. Design a ladder program for an industrial control system that: peripheral devices.
· Count ten objects passing along a conveyor belt; - These external operating devices, with their sometimes harsh and/or
· Closes a deflecting gate when the number has been fast signal characteristics, must be able to interface with the PLC’s
deflected into a carton sensitive microprocessor.
· Allows a time of 5 seconds between the tenth object counted - There are three different types of peripherals:
and closing of the deflector. · Input, used to interact with, or send data to the computer/ PLC
(mouse, keyboard etc)
3. A controlled car park has 4 spaces in the packing lot. Cars are · Output, which provides output to the user from the PLC/computer
detected and allowed to enter into the parking space if available. If NO (Monitors, printers, displays etc)
space a “Full” indicator lamp should be lit, otherwise individual · Storage, which stores data processed by the computer (Hand
indicator lamps should light to show the available parking space. drives, flash drives etc)
Design a PLC ladder diagram of the car parking system; include
comments on every rung. 1. Printers
- In computing, a printer is a peripheral which produces a
4. With the aid of a ladder program and a process control figure, explain representation of an electronic document on physical media such as
how a converter can be used in a machine to direct 6 products to a paper. Many printers are local peripherals connected directly to a
packaging box and 12 products to another box simultaneously. nearby personal computer. Individual printers are often designed to
support both local and network connected users at the same time.
Most Multifunction printers (MFPs) include printing, scanning, and
copying among their many features.
- Printers can be classified by the printer technology they employ, with
many techniques being available as commercial products.
- The choice of print technology has a great effect on the cost of the
printer and cost of operation, speed, quality and permanence of
documents and noise.
- A second aspect of printer technology that is often forgotten is
resistance to alteration: liquid ink, such as from an inkjet head or
fabric ribbon, becomes absorbed by the paper fibers, so documents
printed with liquid ink are more difficult to alter than documents printed
with toner or solid inks, which do not penetrate below the paper
surface.
23
2. Network interface controller (NIC) - The user/programmer interface includes hardware (physical) and
- NIC also known as network interface card, network adaptor is a software (logical) components
computer hardware component that connects a PLC to a computer - It provides a means of
network. · Input, allowing the user to manipulate a system
- It is an expansion card that allows PLC/computers to communicate · Output, allowing the system to indicate the effects of the
over a computer network user’s manipulation.
- The network controller implements the electronic circuitry required to
communicate using a specific physical layer end data link layer Generally, the goal of human-machine interaction engineering is to
standard such as Ethernet, WI-FI or token ring. produce a user interface which makes it easy, efficient, and enjoyable to
- This provides a base for a full network protocol stack, allowing operate a machine in the way which produces the desired result. This
communication among small groups of PLC/computers on the same generally means that the operator needs to provide minimal input to
LAN and large – scale network communication through routable achieve the desired output, and also that the machine minimizes
protocols such as IP. undesired outputs to the human.
- The NIC may use one or more of two techniques to indicate the
availability of packets to transfer. With the increased use of personal computers and the relative decline in
· Polling is where the CPU examines the status of the societal awareness of heavy machinery, the term user interface is
peripheral under program control generally assumed to mean the graphical user interface, while industrial
· Interrupt – driven I/O is where the peripheral alerts the CPU control panel and machinery control design discussions more commonly
that it is ready to transfer data. refer to human-machine interfaces.
and may use one or more of two techniques to transfer packet data:
· Programmed input/output is where the CPU moves the data to or from PLC Systems and safety
the designated peripheral to memory. - An important standard is IEC (International Electro-technical
· Direct memory access is where an intelligent peripheral assumes Commission) 61508: functional safety of electrical/electronic
control of the system bus to access memory directly. This removes programmable electronic safety-related systems.
load from the CPU but requires more logic on the card. In addition, a - In order to provide functional safety of a machine or plant, the safety-
packet buffer on the NIC may not be required and latency can be related protective or control systems must function correctly and when
reduced. a failure occurs it must operate so that the plant or machine is brought
into a safe shut-down state.
3. Programmer interface
- The programmer interface in the industrial design field of human – Fail-safe design
machine interaction, is the space where interaction between human - Safety must be a priority in the design of a PLC system. Thus
and machine occurs. emergency stop buttons and safety guard switches must be hard
- The goal of this interaction is effective operation and control of the wired and not depend on the PLC software for implementation so that
machine on the user’s end, and feedback from the machine which in the situation where there is a failure of the stop switch or PLC, the
aids the operator in making operational decisions. system is automatically safe. The system must be fail-safe.
- Examples of this broad concept of user interfaces include the - Fail-safe design is a method of designing control system such that if
interactive aspects of computer operating systems, hand tools, heavy a critical component in the system fails, the system immediately
machinery operator controls, and process controls. becomes disabled.
24
- Hence, fail-safe design is the procedure or programming to ensure Phases of creating a PLC system
safety of the operator and processes. - This involves fives phases; design, selection and supply,
- Fail-safe design rules of thumb for selecting No or NC devices are as programming, installation, commissioning.
follows: 1. Phase 1 – Design – This is the designing of the system installation
· NO – when wiring switches or sensors that start actions, use which include communication systems. In this stage, it shows all
normally open switches so there is a problem with the switch design basis documents, now the system will be constructed and
the process will not start. commissioning of the same.
· NC – When wiring switches that stop process use normally 2. Phase 2 – Selection and Supply – After the planning phase of the
closed switches so if they fail the process will stop. design, the equipment can be ordered. The first decision is the type of
- The following program, START will override STOP and RUN will controller rack, mini, micro or software based. The decision will
switch on as long as START is pressed. depend on:-
· Number of logical inputs and outputs
· Memory size
· Number of special I/O modules
· Method/techniques of communication – serial and networked
Unsafe start/stop program communication allow the PLC to be programmed and talk to other
PLC
· Availability of programming software and other tools that
determine the programming and debugging
· Scan time – the shorter the scan time the higher the cost.
The process of selecting a PLC follows the following steps
- With a PLC system, a stop signal can be provided by a switch as · Understand the process to be controlled
above · Select the vendor/seller of PLC modules
- This arrangement however is unsafe as an emergency stop because · Plan the ladder logic for the control
if there is fault and the switch cannot be operated, then no stop the
· Count the program instructions and enter the values into the sheet.
system.
- What is required is a system that will still stop if a failure occurs in the
3. Phase 3 – Programming: This stage involves programming the PLC,
stop switch.
depending on the language used. It will also depend on the type of
- The program has the STOP switch as the open contacts. However,
programmer available.
because the hardwired stop switch has normally closed contacts then
i) PLC software for personal computers – Similar to the
the program has the signal to close the program contacts.
specialized programming units, but software runs on a multi-
- Pressing the stop switch
use, user supplied computer. This approach is typically
opens the program
preferred.
contacts and stops the
ii) Hand held units (or integrated) – allow programming PLC
system.
using a calculator type interface. Often done using
mnemonics.
iii) Specialized programming units – effectively a portable
computer that allows graphical editing of the ladder logic,
and fast uploads/downloads/monitoring of the PLC
25
4. Phase 4 – installation 5. Phase 5 - Commissioning
This stage involves installing and placing all components of PLC Commissioning of a PLC system involves
system hardware and software in compliance with the design · Checking that all the cable connection between the PLC and the
document. It entails the following phase/steps: plant being controlled are complete, safe and to the required
i) Panel/cabinet installation – The panel/cabinet installed should specifications and meeting standards.
allow enough space for air circulation. Do not install PLC above · Checking that the incoming power supply matches the voltage
equipment that generate large amount of heat. Do not install the setting for which the PLC is set.
PLC in a panel or cabinet with high voltage equipment. Provide a · Checking that emergency stop buttons work.
clear path for operation and maintenance. · Checking that all protective devices are set to their appropriate trip
ii) Installation of CPU unit and I/O unit – The small PLC must be settings.
installed in the horizontal position for the big PLC before installing; · Checking that all I/O devices are connected to the correct I/O
the units have to be compiled one by one. To build a rack PLC, points and giving the correct signals.
provide back plane (Back plane is a simple device having two · Loading and testing the software.
functions. The first is to provide physical support for units to be
mounted to it. The second is to provide the connectors and Fault finding
electrical pathways necessary for connecting the units mounted to - With any PLC controlled plant, the major faults are likely to be with
it. sensors, actuators and wiring rather than within the PLC itself.
iii) Installing the expansion unit or expansion I/O unit – expansion - Of the fault within the PLC, most likely to be in the I/O channels or
I/O unit are usually attached when amount of I/O devices to be power supply rather than in the CPU
controlled increase its amount over than capabilities of the existing - For example, consider a single output device failing to turn on though
I/O unit or attached when needed to a special need like the output LED is on. If testing of the PLC output voltage indicates
temperature sensor. Insert the expansion I/O units connecting that its normal then the fault might be a wiring fault or a device fault. If
cable into the CPU units or expansion I/O unit expansion checking of the voltage at the device indicates the voltage there is
connector. normal then the fault is the device.
iv) Installing I/O devices – I/O devices are attached at the place has - Many PLCs provide built-in fault analysis procedure which carries out
been determined in the work plan and wiring diagram. For self-testing and display fault codes, with possibly a brief message,
switches are usually attached at the panel while the sensor, which can be translated by looking up the code in a list to give the
solenoid and motor is usually placed at the machine to be source of the fault and possible methods of recovery.
controlled.
v) Wiring and connection – Hanging ducts is used if power cables Fault detection technique
carrying more than 10A 400v or 20A 220V must be run alongside The following are some of the common fault detection techniques used.
the I/O wiring (that is in parallel with it); at least 300mm must be i) Timing checks – The term watching is used for a timing check that is
left between the power cables and the I/O wiring. Ensure proper carried out by the PLC to check that some function has been carried
grounding of all electrical installation. All electrical rack and out within the normal time. If the function is not carried out within the
machine element should be grounded to a central ground bus. normal time, then a fault is assumed to have occurred and the watch
dog timer trips, setting off an alarm and perhaps closing down the
PLC. As part of the internal diagnostic of PLC, watchdog timers are
used to detect for faults.
26
Time check can also be built into the ladder logic program. This is Installation and Maintenance
where additional ladder rungs might included so that when a - The design of programmable controllers includes a number of rugged
function starts, a timer is started. If the function does not complete features that allow PLCs to be installed in almost any industrial
when the timer finishes a fault is signaled. environment.
- System layout is the conscientious approach to placing and
interconnecting components not only to satisfy the application, but
also to ensure that the controller will operate trouble free in its
environment.
- In addition to programmable controller equipment, the system layout
also encompasses the other components that form the total system.
These components include isolation transformers, auxiliary power
supplies, safety control relays, and incoming line noise suppressors.
- Although programmable controllers are tough machines, a little
foresight during their installation will ensure proper system operation.
- In a carefully constructed layout, these components are easy to
access and maintain. Nevertheless, careful installation planning can
increase system productivity and decrease maintenance problems.
ii) Last output set – This technique involves the use of status lamps - The best location for a programmable controller is near the machine
to indicate the last output that has been set during a process or process that it will control, as long as temperature, humidity, and
which has come to a halt. Such lamps are built into the program electrical noise are not problems.
so that as each output occurs a lamp comes on. The lamps on - Placing the controller near the equipment and using remote I/O where
thus indicate which output are occurring. The program has to be possible will minimize wire runs and simplify start-up and maintenance
designed to turn off previous status lamps and turn on a new - Programmable controllers are designed to be easy to maintain, to
status lamp as each new output is turned on. ensure trouble-free operation. Still, several maintenance aspects
iii) Replication – replication check involves duplication i.e. should be considered once the system is in place and operational.
replication, the PLC system. This could mean that the system Certain maintenance measures, if performed periodically, will
repeats every operation twice and if it gets the same result it is minimize the chance of system malfunction.
assumed there is no fault. This procedure can detect transient - Preventive maintenance of programmable controller systems
fault. includes only a few basic procedures, which will greatly reduce the
Alternatively, is to have duplicate PLC systems and compare the failure rate of system components.
results given by the two systems. In the absence of the fault the - Preventive maintenance for the PLC system should be scheduled with
two results should be the same, a fault showing up as a the regular machine or equipment maintenance, so that the
difference. equipment and controller are down for a minimum amount of time.
iv) Expected values checks – Software errors can be detected by - However, the schedule for PLC preventive maintenance depends on
checking whether an expected value is obtained when a specific the controller’s environment—the harsher the environment, the more
input occurs. If the expected value is not obtained then a fault is frequent the maintenance.
assumed to be occurring.
27
- The following are guidelines for preventive measures: 8. Explain why user interface is necessary in PLC’s.
· Periodically clean or replace any filters that have been installed in 9. Explain how fault-finding is carried out in PLC systems.
enclosures at a frequency dependent on the amount of dust in the 10. Explain the operation of the following input devices, stating the form of
area. the signal being sensed and the output: (a) reed switch, (b)
· Do not allow dirt and dust to accumulate on the PLC’s incremental shaft encoder, (c) photoelectric transmissive switch, (d)
components; the central processing unit and I/O system are not diaphragm pressure switch
designed to be dust proof. If dust builds up on heat sinks and 11. Explain how the on-off operation and direction of a d.c. motor can be
electronic circuitry, it can obstruct heat dissipation, causing circuit controlled by switches
malfunction. 12. Explain the continuous updating and the mass input/output copying
· Periodically check the connections to the I/O modules to ensure methods of processing inputs/outputs.
that all plugs, sockets, terminal strips, and modules have good 13. Devise a timing watchdog program to be used to switch off a machine
connections. Also, check that the module is securely installed. if faults occur in any of the systems controlling its actions.
· Ensure that heavy, noise-generating equipment is not located too 14. Devise ladder programs which can be used to:
close to the PLC. · Maintain an output on, even when the input ceases and when
· Make sure that unnecessary items are kept away from the there is a power failure.
equipment inside the enclosure. · Switch on an output for a time of one cycle following a brief input.
· If the PLC system enclosure is in an environment that exhibits · Switch on the power to a set of rungs.
vibration, install a vibration detector that can interface with the 15. Devise ladder programs for systems that will carry out the following
PLC as a preventive measure. This way, the programmable tasks:
controller can monitor high levels of vibration, which can lead to · Switch on an output 5 s after receiving an input and keep it on for
the loosening of connections the duration of that input.
· Switch on an output for the duration of the input and then keep it
Topic Questions on for a further 5 s.
1. Define a programmable Logic Controller (PLC’s). · Switch on an output for 5 s after the start of an input signal
2. State the four steps in the operation of programmable logic controller 16. Devise ladder programs for systems that will carry out the following
(PLC). tasks:
3. Draw a labeled block diagram of the internal architecture of a · Give an output after a photocell sensor has given 10 pulse input
Programmable Logic Controller (PLC) and state the function of each signals as a result of detecting 10 objects passing in front of it.
block. · Give an output when the number of people in a store reaches 100,
4. Define ladder logic control system. there continually being people entering and leaving the store.
5. With the aid of a block diagram, explain how a PLC process input
from the sensors.
6. Describe the following Programmable Logic Controller (PLC) system
styles.
i. Unitary
ii. Modular
iii. Rack Mounting
7. With the aid of a diagram, explain how PLC’s can be used to control
water level in a tank.
28
Topic 3 - SCADA system consist of:
SUPERVISORY CONTROL AND DATA ACQUISITION (SCADA) 1. Remote terminal unit (RTU): They are primarily used to convert
Introduction electronic signals received from field devices into (or from) the
- In modern manufacturing and industrial processes, mining industries, language (known as the communication protocol) used to transmit the
public and private utilities, leisure and security industries telemetry is data over a communication channel.
often needed to connect equipment and systems separated by large - It connects to sensors in the process, converting data to the
distances. supervisory system.
- Control system architecture can range from simple local control to - PLC used as field devices because they are more economical,
highly redundant distributed control. The SCADA system applies to versatile, flexible and configurable than special-purpose RTU’s
facilities that are large enough that a central control system is - RTU gathers data from field devices (pump, valves alarms etc) in
necessary. memory, until the MTU (master terminal unit) initiates a second
- SCADA refers to the combination of telemetry and data acquisition. It command.
encompasses the collecting of the information, transferring it back to
the central site, carrying out any necessary analysis and control and 2. Communication network / system – used to transfer data between
then displaying that information on a number of operator screens or field data interface devices and control units and the computers in the
displays. The required control actions are then conveyed back to the SCADA host computer (MTU)
process. - This is intended to provide the means by which data can be
- SCADA is a widely distributed computerized system primarily used to transferred between the central host computer server and field based
remotely control and monitor the conditions of field based assets from RTU.
a centralized location. - Communication network refers to the equipments needed to transfer
- The PLC is still one of the most widely used control systems in data to and from different sites.
industry. As need to monitor and control more devices in the plant - The medium used can either be cable, telephone or radio
grew, the PLCs were distributed and the systems became more - The way the SCADA system network (topology) is set up can vary
intelligent and smaller in size. PLCs and DCS (distributed control with each system but there must be uninterrupted, bidirectional
systems) are used communication between the MTU and the RTU for a SCADA or data
acquisition system (DAS) to function properly.
Components of a SCADA system - This can be accomplished in various way i.e private wire lines,
- SCADA encompasses the transfer of data between a SCADA central underground cables, telephone radio, modern, microwave dishes,
host computer and number of remote sites (RTU) and the central host satellite and other atmospheric means and many times, system
and the operator termina ls. employ more than one means of communicating to the remote site.
- The figure below shows a generic SCADA system that employs data - Communication systems used for SCADA are often split into two
multiplexing (MUX) between the central host and the RTU. distinct part: WAN and LAN.
- The interface between the two parts is commonly achieved through
some form of multiplexing.
- Multiplexing allows different data streams to share single data link. It
combines communication paths to and from many RTUs into a single
bit stream, usually using Time Division Multiplexing (TDM).
29
- It may itself be a SCADA processing device that manages the local 5. SCADA software
network and not only combines data, but also reduces the amount of - SCADA software can be divided into two types: open and proprietary.
data that be interchanged within the central host. - Proprietary software often is configured for a specific hardware
platform and may not interface with the software or hardware
3. Central computer or master terminal unit (MTU) produced by competing vendors.
- It is defined as the master or heart of a SCADA system and is located - Commercial off-the shelf (COTS)/open software are more flexible,
at the operator’s central control facility. and will interface with different types of hardware and software.
- Most often it is a single computer or a network of computer servers - The focus of proprietary software is on process and control
that provide a man-machine operator interface to the SCADA system. functionality while COTS software emphasizes on compatibility with a
- The computers process the information received from or sent to the variety of equipment and instrumentation.
RTU sites and present it to human operator in a form that the - Software products typically used within a SCADA system are as
operators can work with. follows:-
- Operators terminals are connected to the central host computer by a · Central host computer operating system:- software used
computer network so that the viewing screens end associated data to control the central host computer hardware.
can be displayed for the operator. · Operator terminal operating system – Software used to
- Some examples of the types of display screens offered by most control the central host computer hardware at the operators
systems include: terminal. It contributes to the networking of the central host
· System overview pages displaying the entire system often and operator’s terminal.
summarizing SCADA sites that might be faulty · Applications – They are of two types; central host computer
· Site mimic screens for each individual RTU location showing application and operator terminal applications. These
up to the minut e site information handles transmitted and reception of data to and from the
· Alarm summary pages displayed current alarms and other RTU and central computer. It also provides the GU/ which
types of alarms in which have been acknowledged or not offers mimic screens, alarm pages trend.
· Trend screens enabling the operator to display the behaviour · Communication protocol drives: - required to control the
of a particular variable over time. translation and interpretation of the data between ends of the
communication links in the systems.
4. Human machine interface (HMI)
- It is the apparatus which present process data to a human operator, How does SCADA Work
and through which the human operator controls the process. - SCADA is a computer system for gathering and analyzing real time
- This displays this informati on in an easily understood graphical form, data
a rehives the data recei ved, transmit alarms and permit operator - The ability to monitor the entire control system in real time is
control as required. facilitated by data acquisition including meter reading and checking
- The HMI is essentially a PC system running powerful graphic and status of sensors that are communicated at standard intervals
alarm software programs. depending on the system.
- It is usually linked to the SC ADA system’s database and software - The collected field data is transmitted through a communication
programs, to provide trending, diagnostic data and information network to the master terminal unit which the data is processed.
management. - The MTU monitors and control data from various field devices
(sensor) that are either in close proximity or off site.
30
- Thus in summary, the SCADA system perform the following four iii) USB DAS: The Universal Serial Bus (USB) is a new
functions: standard for connecting P.C to peripheral devices such as
· Data acquisition monitor, DAS.
· Networked data communication
· Data presentation Processing Data from the field
· Control - Data can be of three main types:
i) Analog data (real numbers) which will be trended (placed in
Data acquisition graphs)
- This is the process of sampling signals that measure real world ii) Digital data (ON/OFF) which may have alarms attached to one
physical conditions and converting the resulting samples into digital state or the other
numerical values that can be manipulated by a computer. iii) Pulse data (e.g. counting revolution of a meter) is analog data
- Data acquisition within SCADA system is accomplished first by the normally accumulated or counted such data are treated within the
RTU scanning the field data interface devices connected to the RTU. SCADA operator terminal software displays as analog data and
- The time to perform this task is called the scanning internal. The MTU may be trended.
scans RTU to access data in the process referred to as Polling the - Data from the field are processes to detect alarm conditions, and if
RTU. alarm is predent, it will be displayed on dedicated alarm list on the
- Some systems allow the RTU to transmit field values and alarms to application software running on the central host computer.
the central host without be ing poxxxxx by the central host - Where variables in the field have been changing over time, the
- The components of data acquisition systems include: SCADA system usually offers a trending system where the behaviour
· Sensors that converts physical parameters to electrical signals of a particular variable can be plotted on a GUI screen (graphical user
· Signal conditioning circuitry to convert sensor signals into a interface screen).
form that can be converted to digital values e.g implication,
alternation multiplexing. Tasks in SCADA system
· Analog to digital converters, which converts conditioned signals i) Input/output task – This program is the interface between the
to digital values. control and monitoring system and plant floor.
ii) Alarm task – this manages all alarms by detecting digital alarm
· Data acquisition hardware acts as the interface between the
point and comparing the values of analog alarm points to alarm
computer and the outside world. It primarily functions as a device
thresh hold.
that digitizes incoming signal so that the computer can interpret
NB: SCADA can be seen as a system with many data elements
them.
called points. Each point is a monitor or sensor and there points
can be either soft or hard. Hard data points can be on actual
Types of data acquisition systems (DAS)
monitor; soft point can be application or software calculation.
These depend on type of communication protocol used.
Data elements from hand and soft points are usually always
i) Wireless data acquisition system: consist of one or more
recorded and logged to create a time stamp or history.
wireless transmission se nding data back to a wireless receiver
iii) Trend task: it collects data to be monitored over time.
connected to a remote computer.
iv) Report task – Reports are produced from plant data. These
ii) Serial communication data acquisition system: are good
reports are periodic, event triggered or activated by the operator.
choices when the measurement needs to be made at a location
v) Display task – manages all data to be monitored by the operator
which is distance from computer.
and all control actions requested.
31
Application of SCADA system v) Protection of the plant equipment.
- In essence, SCADA applica tion has two elements:- vi) Safeguarding the environment from a failure of the system.
i) The process/system/machinery needed to be monitored or vii) Enhances reliability and robustness of critical industrial processes.
controlled: - This can take the form of a power plant, water viii) Improved energy savings due to optimization of the plant.
system, network, traffic light system. ix) Improved and quicker receipt of data so that clients can be invoiced
ii) A network of intelligent devices that interfaces with the first system more quickly and accurately.
through sensors and con trol output. This network, which is the x) Government regulations for safety and metering of gas (for royalties &
SCADA system, gives the capability to measure and control tax etc).
specific elements of the first system.
- SCADA systems control are used in the following industries Creating a functional SCADA system
i) Manufacturing: SCADA system manages parts inventories, (i) Phase 1: The DESIGN of the system architecture includes the
regulate industrial automation and robots, and monitor process communication system. Also involved in this initial phase will be any
and quality control. site instrumentation that is not currently in existence, but will be
ii) Traffic signals: SCADA regulates traffic lights, controls traffic flow required to monitor desired parameters. Design stage translate the
and detects out of order signals. design basis document into a system design and document the
iii) Electric power generation, transmission and distribution: design clearly and completely so that it can be constructed properly,
Electric utilities use SCADA system to detect current flow and line commissioned completely, and operated and maintained reliably and
voltage, monitor the operation of circuit breakers, and to take efficiently.
sections of the power grid outline or offline. (ii) Phase 2: The SUPPLY of RTU, communication, and HMI equipment,
iv) Building, facilities and environment: Facility managers use which consists of a PC system and the required powerful graphic and
SCADA to control HVAC, refrigeration units lighting and entry alarm software programs.
systems. (iii) Phase 3: The PROGRAMMING of the communication equipment and
v) Water and Sewage: state and municipal water utilities use the powerful HMI graphic and alarm software programs.
SCADA to monitor and regulate water flow, reservoir levels and (iv) Phase 4: The INSTALLATION of the communication equipment and
pipe pressure. the PC system. The stage involves installing and placing into
vi) Mass transit: transit authorities use SCADA to regulate electricity operation the SCADA system hardware and software in compliance
to subways, trains and trolley buses, to automate traffic signals for with the design documents.
rail system; to track and locate trains and buses; and to control rail (v) Phase 5: The COMMISSIONING of the system, where
road – crossing gates. communication and HMI programming problems are solved, and the
system is proven to the client, and operator training and system
Benefits of SCADA documentation is provided. Commissioning is the formal process of
i) Improved operation of the plant or process resulting in savings due to verifying and documenting that the installed SCADA system complies
optimization of the system. with and performs in accordance with the design intent, as defined in
ii) Reduces the operating and maintenance cost hence maximize the the design documentation
profits.
iii) Maximize productivity, ensure continuous production and increased
productivity of the personnel.
iv) Improved safety of the system due to better information and improved
control.
32
Design approaches/strategies for SCADA system - Control action for each system or subsystem takes place in a local
Local control system controller but the central operator station has complete visibility of the
- It describes a system architecture in which sensors, controllers and status of all systems and the input and output data in each controller,
controlled equipments are within close proximity and the scope of as well as the ability to intervene in the control logic of the local
each controller is limited to a specific system or sub-system. controller if necessary.
- Local controllers are typically capable of accepting inputs from a - In a DSC, data acquisition and control functions are performed by a
supervisory controller to initiate or terminate locally. number of distributed micro-processor-based units, situated near to
- Controlled automatic sequence, or to adjust control set points, but the the devices being controlled or the instrument from which data is
control action itself is determined in the local controller. being gathered.
- Input and output wiring runs are short and less vulnerable to physical
description or electro-magnetic interference.
- The data highway is normally capable of high speed
a) Local b) Centralized
33
User Configurable Open System (UCOS) · I/O Subsystem supporting I/O from all industry standard suppliers.
UCOS is a control system that employs object-oriented techniques at The same logic can be solved to manipulate different I/O
every level of its system architecture. It includes a number of subsystems from different manufacturers without having to change
subsystems which segment the functionality of UCOS. This includes any of the programming or operational parameters of the configured
an Engineering Workstation Subsystem, an Operator Workstation system.
Subsystem, and a Field Control Unit (FCU) Controller Subsystem. The · SCADA Data Server (SDS) for interfacing data from intelligent
subsystems communicate via a Control Network. devices, such as PLCs, Fieldbus technologies, RTUs, PLC I/O, and
· Engineering Workstation (EWS) used for project development. other third-party devices
The EWS is the development tool where control schemes are · Process Historical Archiver (PHA) for storing and retrieving
configured then downloaded to the OWS, FCU, and SDS. The historical data collected by the FCU, SDS or any other intelligent
entire project is configured using a single integrated tool based on device in the system
graphical Windows standards. Graphical techniques are also used · microFCU: is a small, low-powered PLC that executes sequential
to define the logical relationships among the devices in a process and regulatory logic and directly scans onboard I/O. It can replace
area. Project configuration begins by defining the system RTUs at a significant reduction in cost and power consumption –
architecture: workstations, field control units (FCUs), I/O, plus it can provide local intelligent control of devices, which RTUs
networking, etc. Graphical techniques are also used to define the can't do.
logical relationships among the control elements for multiple
devices.
· Operator Workstation (OWS) for operator interface. This is used
to monitor and control the process. It uses the project screens
created during project development and animates them based on
real-time data received from field control units and field data
servers. Authorized operators can monitor detailed activities for
many types of devices and send commands using standard
faceplate command windows and group displays.
· Field Control Unit (FCU) for control logic execution and direct
scanning of I/O. The FCU provides I/O services by monitoring and
controlling I/O across standard networks and data highways. The
FCU can provide simultaneous support for multiple vendors’ I/O and
I/O networks. The variety of platform and form-factor options
supported by the FCU allows incorporation of distributed, distinct
I/O subsystems into common control strategies.
· Control Network. System supports redundant and non-redundant
fiber optic and Ethernet local networks using the TCP/IP networking
protocol for standardized, advanced application connectivity. The
LAN/WAN can be extended to other sites inside or outside the plant
using such remote communications technologies as satellite, radio,
microwave, and dial-up running such standard protocols as TCP/IP,
Modbus, OPC, DDE
34
SCADA SECURITY / ACCESS CONTROL - Implement appropriate authentication mechanisms (e.g. strong
- Access control is the selective restriction to access to a plant/place or authentication) for remote access connections.
other resources. Hence the security access control is the act of - Implement appropriate procedures and assurance mechanisms for
ensuring that an authenticated user accesses only what they are enabling and disabling remote access connections.
authorized to and no more. - Ensure that remote access computers are appropriately secured (e.g.
- SCADA systems are used to control and monitor physical processes, anti-virus, anti- spam and personal firewalls).
however the security of these system is important because
compromise or destruction of these system may impact multiple areas Anti-virus:
of society or industries. - Protect process control systems with anti-virus software on
- It is important to be able to detect possible attacks and respond in an workstations and servers.
appropriate manner in order to minimize the impacts. - Where anti-virus software cannot be deployed other protection
· Protect: Deploying specific protection measures to prevent and measures should be implemented (e.g. gateway anti-virus scanning or
discourage electronic attack against the process control systems. manual media checking)
· Detect: Establishing mechanisms for rapidly identifying actual or
suspected electronic attacks. E-mail and Internet access
· Respond: Undertaking appropriate action in response to - Disable all email and internet access from process control systems.
confirmed security incidents against the process control systems.
System hardening
Defence in Depth - Undertake hardening of process control systems to prevent network
- Where a single protection measure has been deployed to protect a based attacks.
system, there is a risk that if a weakness in that measure is identified - Remove or disable unused services and ports in the operating
and exploited there is effectively no protection provided. systems and applications to prevent unauthorised use.
- No single security measure itself is foolproof as vulnerabilities and - Understand what ports are open and what services and protocols
weaknesses could be identified at any point in time. In order to used by devices (especially embedded devices such as PLCs and
reduce these risks, implementing multiple protection measures in RTUs). This could be established by a port scan in a test
series avoids single points of failure. environment. All unnecessary ports and services should be disabled
- In order to safeguard the process control system from electronic (e.g. embedded web servers).
attacks (e.g. hackers, worms and viruses), it may be insufficient to rely - Ensure all inbuilt system security features are enabled.
on a single firewall, designed to protect the corporate IT network. - Where possible restrict the use of removable media (e.g. CDs, floppy
- A much more effective security model is to build on the benefits of the disks, USB memory sticks etc.) and if possible removable media
corporate firewall with an additional dedicated process control firewall should not be used. Where it is necessary to use removable media
and deploy other protection measures such as anti-virus software and then procedures should be in place to ensure that these are checked
intrusion detection for malware prior to use.
Security patching
- Implement processes for deployment of security patches to process
control systems.
- These processes should be supported by deployment and audit tools.
- The processes should make allowance for vendor certification of
patches, testing of patches prior to deployment and a staged
deployment process to minimize the risk of disruption from the
change.
- Where security patching is not possible or practical, alternative
appropriate protection measures should be considered.
36
Topic 4: INDUSTRIAL COMMUNICATION NETWORK guarantee time synchronization, and real-time deterministic response
in some applications.
Introduction - Industrial networks also ensure that the system sends information
- Industrial communication refers to the wide range of hardware and reliably without errors and securely between nodes on the network.
software products and protocols used to communicate between
standard computer platforms and devices used in industrial Network levels
automation. - The industrial automation systems can be very complex, and it is
- Although a communication circuit can involve only two pieces of usually structured into several hierarchical levels. Each of the
equipment with a circuit between them, the term network typically hierarchical level has an appropriate communication level, which
refers to connecting many devices together to permit sharing of data places different requirements on the communication network.
between devices over a single or redundant circuit. - Industrial networks may be classified in several different categories
- The industrial automation systems are often implemented as an open based on functionality: field-level networks (sensor, actuator or device
distributed architecture with communication over digital buses), control-level networks (control buses) and information-level
communication networks. networks
- It is now common for users connected to a local area network to
communicate with computers or automation devices on other local
area networks via gateways linked by a wide area network.
- As the industrial automation systems becomes large and the number
of automation devices increases, it has become very important for
industrial automation to provide standards which make it possible to
interconnect many different automation devices in a standard way.
- Considerable international standardization efforts have been made in
the area of local area networks. The Open Systems Interconnection
(OSI) standards permit any pair of automation devices to
communicate reliably regardless of the manufacturer.
- By definition, an industrial network requires geographical distribution
of the physical measurement I/O and sensors or functional distribution
of applications. Most industrial networks transfer bits of information
serially.
- Serial data transfer has the advantage of requiring only a limited
number of wires to exchange data between devices. With fewer wires,
we can send information over greater distances. Because industrial
networks work with several devices on the same line, it is easier to
add a new device to existing systems.
- To make all this work, our network must define a set of rules – a
communication protocol -- to determine how information flows on
the network of devices, controllers, PCs, and so on.
- With improved communication protocols, it is now possible to reduce
the time needed for the transfer, ensure better data protection, and
37
- In general, these networks connect smart devices that work
cooperatively in a distributed, time-critical network. They offer higher-
level diagnostic and configuration capabilities generally at the cost of
more intelligence, processing power, and price.
- At their most sophisticated, fieldbus networks work with truly
distributed control among intelligent devices like FOUNDATION
Fieldbus.
- Common networks included in the devicebus and fieldbus classes
include CANOpen, DeviceNet, FOUNDATION Fieldbus, Interbus-S,
LonWorks, Profibus-DP, and SDS.
- Nowadays, the fieldbus is often used for information transfer in the
field level. Due to timing requirements, which have to be strictly
observed in an automation process, the applications in the field level
controllers require cyclic transport functions, which transmit source
information at regular intervals.
- The data representation must be as short as possible in order to
reduce message transfer time on the bus.
Control Level
Field level - At the control level, the information flow mainly consists of the loading
- The lowest level of the automation hierarchy is the field level, which of programs, parameters and data.
includes the field devices such as actuators and sensors. - In processes with short machine idle times and readjustments, this is
- The elementary field devices are sometimes classified as the element done during the production process. In small controllers it may be
sublevel. The task of the devices in the field level is to transfer data necessary to load subroutines during one manufacturing cycle.
between the manufactured product and the technical process. - This determines the timing requirements. It can be divided into two:
- The data may be both binary and analogue. Measured values may be cell and area sublevels.
available for a short period of time or over a long period of time. For
the field level communication, parallel, multi-wire cables, and serial i) Cell sublevel:
interfaces such as the 20mA current loop has been widely used from - For the cell level operations, machine synchronizations and event
the past. handlings may require short response times on the bus. These real-
- The serial communication standards such as RS232C, RS422, and time requirements are not compatible with time excessive transfers of
RS485 are most commonly used protocols together with the parallel application programs, thus making adaptable message segmentation
communication standard IEEE488. necessary.
- Those point-to-point communication methods have evolved to the bus - In order to achieve the communication requirements in this level, local
communication network to cope with the cabling cost and to achieve a area networks have been used as the communication network. After
high quality communication. the introduction of the CIM concept and the DCCS concept, many
- Field-level industrial networks are a large category, distinguished by companies developed their proprietary networks for the cell level of an
characteristics such as message size and response time. automation system.
38
- The Ethernet together with TCP/IP (transmission control - With respect to management Information System Communication in
protocol/internet protocol) was accepted as a de facto standard for automated system, there are three types of networks used:
this level, though it cannot provide a true real-time communication. o Local Area Network (LAN)
- Many efforts have been made for the standardization of the o Wide Area Network (WAN)
communication network for the cell level. o Metropolitan area network (MAN)
- The IEEE standard networks based on the OSI layered architecture
were developed and the Mini-MAP network was developed to realize 1) Local Area Network (LAN)
a standard communication between various devices from different - These types of networks connect network devices over a relatively
vendors. Some fieldbuses can also be used for this level. short distance.
- Quite often, a networked office building, home or school contains a
ii) Area sublevel: single LAN although it is normal to come across a building that
- The area level consists of cells combined into groups. Cells are contains a few small LANs.
designed with an application-oriented functionality. - On a few occasions, a LAN may also span over a group of nearby
- By the area level controllers or process operators, the controlling and buildings. Such networks are usually owned by one organization.
intervening functions are made such as the setting of production - It interconnects computers and filed devices/peripherals over a
targets, machine startup and shutdown, and emergency activities. common medium so users might share access to host computers,
database, files, applications and peripherals.
- Control-level networks are typically used for peer-to-peer networks - The following characteristics differentiate one LAN from another
between controllers such as programmable logic controllers (PLCs), o Topology – The geometric arrangement of devices on the
distributed control systems (DCS), and computer systems used for network e.g. star, ring etc.
human-machine interface (HMI), historical archiving, and supervisory o Protocols – The rules and encoding specifications for sending
control. data. The protocol also determines whether the network uses
- Control buses are used to coordinate and synchronize control peer to peer or client/server architecture.
between production units and manufacturing cells. o Medium/media – Devices can be connected by twisted pain
- Typically, ControlNet, PROFIBUS-FMS and (formerly) MAP are used wire, coaxial cable, or fibre optic cables. Some networks do
as the industrial networks for controller buses. without connecting media instead communicate through radio
- In addition, we can frequently use Ethernet with TCP/IP as a controller waves.
bus to connect upper-level control devices and computers.
2) Wide Area Network (WAN)
Information level - WAN is a data communication network that covers a relatively broad
- The information level is the top level of a plant or an industrial geographical area and often uses transmission facilities provided by
automation system. common carriers e.g telephone companies.
- The plant level controller gathers the management information from - WAN technologies generally function at the lower layers of the OSI
the area levels, and manages the whole automation system. reference model (Open system Interconnection) the physical layer,
- At the information level there exist large scale networks, e.g. Ethernet data link layer and network layer.
WANs for factory planning and management information exchange. - It’s used to connect LANs and other types of networks together so
- Ethernet networks are used as a gateway to connect other industrial that users and computers in one location can communicate with users
networks. and computers in other location.
39
- LANs are connected to a WAN through a device referred to as a 1. The TCP/IP model
router. In IP networking, both the LAN and WAN addresses are - TCP/IP is the de facto global standard for the Internet (network) and
maintained by the router. host–to–host (transport) layer implementation of internet work
- Most WANs exist under distributed or collective ownership and applications because of the popularity of the Internet.
management and unlike the LANs, are not necessarily owned by one - The TCP/IP (Transmission Control Protocol / Internet) is a layer
organization. protocol where it defines 4 layers’
40
iv) Network layer d) Topology and network design: the type of network topologies to be
- It’s main function is to connect host and devices using some protocol used and which part of the network in the routes going to be
so that data or IP packet can transmit over it. placed, where the switches will be used etc.
41
- It is required when communication must span multiple networks – example commonly used protocols or HTTP( for web browsing), FTP
interconnecting. (or file transfer)
- HTTP – Hyper text transfer protocol – permits applications such as
iv) Transport layer browser to upload and download web pages.
- This layer is concerned with the variable transmission of messages
sent between two host computers.
- It is responsible for the end to end communication control. This is
different from the data link layer which only concerned with the
transmission of frames.
- A message usually requires many – frames to be sent before the
complete message can be received.
- This requires fragmenting the message into many pieces to be re-
assembled at the other end. Missing fragments must be re-sent. The
transport layer addresses this issue.
- Other functions are:-
o Multiplexing and de-multiplexing
o Error control mechanism on end to end basis
o Flow control – regulate flow of information
o Connection establishment / release.
v) Session layer
- The layer is concerned with the establishment and termination of
communication sessions between processors in host computers.
- It also ensures that the data transfer starts from where it breaks,
keeping it transparent to the end user.
42
- Any communication system that is based on the OSI seven layer has - Several characteristics and functions in the data link layer are key to
high flexibility and compatibility with product from different vendors. the distributed real time control capabilities of fieldbus.
- However OSI system is often too complex for network architecture a) The data link layer is based on a token passing protocol.
hence has a considerable overhead in both the communication and b) The link active scheduler (LAS) is a centralized device that acts as
the processing. the arbitrator of the bus.
c) The LAS executes a schedule that makes possible deterministic
communication.
d) The LAS distributes time to the network to permit all devices to
share the same sense of time.
- The user application layer defines blocks that represent the functions
and data available in a device.
- Rather than interface to a device through a set of commands as
commonly used with communication protocols, fieldbus user interacts
with device through a set of blocks that define device capabilities in a
standardized way.
- The data link layer has important aspect which is medium access
control.
43
Polling - If the channels sensed ‘idle’ then the station is permitted to transmit.
- The access method most often used in master/slave protocols is Once the channel is clear a station sends a signal telling all other
polling. stations not to transmit, and then sends its packet.
- In polling, the master interrogates, or polls, each station (slave) in
sequence to see if it has data to transmit. The master sends a b) Token passing protocol
message to a specific slave and waits a fixed amount of time for the - With this approach, each participant to the network is guaranteed
slave to respond. some time to transmit a message on a permission basis.
- The slave should respond by sending either data or a short message - This permission occurs when a participant receives the one token that
saying that it has no data to send. If the slave does not respond within exist in the network (token is a small frame)
the allotted time, the master assumes that the slave is dead and - The token is passed from one participant to another in a circular
continues polling the other slaves. fashion in what is called logical ring.
- Interslave communication in a master/slave configuration is inefficient, - Once a participant receives the token, the participant must initiate a
since polling requires that data first be sent to the master and then to transmission or pair the token to the next participant in an orderly
the receiving slave. fashion.
- Since master/slave configurations use this technique, polling is often - The token is usually passed from one participant to another with the
referred to as the master/slave access method. highest address regardless of the next participant’s physical location.
- The participant with the highest address will pair the token to a
Carrier Sense, Multiple Access (CSMA) participant with the lowest address.
- The basic media access method that uses first-come-first served - It’s not necessary to have one master to hand out the token.
principle. - Participant could be peer to one another and simply agree that they
- It is probabilistic media access control (MAC) protocol in which a node will not possess the token for more time than previously agreed.
verifies the absence other traffic before transmitting on a shared - Token passing networks are deterministic, which means that its
transmission medium, such as an electrical bus or a band of the possible to calculate the maximum time that will pair before any end
electromagnetic spectrum. station will be capable of transmitting.
- It is based on the principle sense before transmitting or ‘listen before - Token ring networks are ideal for application, in which delays must be
talk’. predictable and robust network operation is important.
- CSMA/CD performance by terminating transmission as soon as a - Factory automation environment are examples of such applications.
collision detected, thus shortening the time required before a retry can
be attempted.
- This method handles collision as they occur, but if the bus is
constantly busy, collision can occur so often that performance drops
drastically. Thus this method works well as long as the network does
not have an excessive amount of traffic.
- CSMA/CA collision avoidance – is used to improve the performance
by attempting to be less ‘greedy’ on the channel.
- If the channel is sensed busy before transmission then the
transmission is differed for a random interval.
44
Physical layer Standard Conductor Connection Transmission Maximum Typical
Physical layer is concerned with transmitting raw bits over a designation type speed distance application
communication channel. RS – 232 Copper Point to 265 kbps 15m Laptop
M/C with point comp to
Types of medium a pin PLC
connector
Medium can be classified into two categories
RS – 485 Copper Multi-drop 10 mbps 1000m PLC to field
a) Guided media – means that signals is guided by the presence of UTP or devices
physical media i.e signals are under control and remains in the STD
physical wire e.g copper wire CAT 5 Copper Multi-drop 100 mbps Depends PLC to PLC
b) Unguided media – means that there is no physical path for the UTP or on
signal to propagate. This is done through electromagnetic waves. STD protocol
RG 6 Copper Multi-drop 5 mbps 1000m PLC to PLC
Communication links coax video
In a network nodes are connected through links. Single Point to 1 Gbps 50km No typical
The communication through links can be classified as mode point applications
i) Simplex – communication can take place only in one direction fibre
e.g radio, T.V Multi- Point to 1 Gbps 1000m PLC to
mode point control
ii) Half duplex – communication can take place in one direction
fibre Room and
at a time. Suppose node A and B are connected, then half PLC to PLC
duplex communication means that at a time data can flow from
A to B or from B to A but not simultaneously. In guided transmission media, two kind of materials used:
iii) Full duplex – communication can take place simultaneously in I) Copper – twisted pair
both direction mobile phone. Coaxial fibre
II) Optical fibre
Links can be further classified as
i) Point the point – in this communication only two nodes are Twisted pair
connected to each other side and non else. - Twisted pair cabling is a type of wiring in which two conductors of a
ii) Multipoint – It is a kind of shaving communication in which single circuit are twisted together for the purposes of canceling out
signals can be received by all nodes. This is also called electromagnetic interference (EMI) from external sources.
broadcast. - The wires are twisted together in a helical form and the purpose of
twisting is to reduce crosstalk interference between neighbouring
Media standard pairs.
Industry standard for communications media define both the physical and - Twisted pair is much cheaper than coaxial cable but it is susceptible
electrical (or optical) characteristics of both the conductors and the to noise and electromagnetic inference and attenuation is large.
connectors used to mate them to communication ports. - When electrical current flow through a wire, it creates a small, circular
magnetic field around the wire.
Some common network conductor, physical standards and then - When two wires in an electrical circuit are placed close together, their
characteristics are listed below:- magnetic fields are the exact, opposite of each other.
45
- Thus the two magnetic fields cancel each other out. They also cancel vi) Category 5e (CAT 5e) – category 5 enhanced used in network
out any outside magnetic fields. Twisting the wires can enhance this running at speeds up to 1000 mbps (1Gbps) in category 6 (CAT 6) –
cancellation effect. consist of four pairs of 24 American wire gauge (AWG) copper wire.
- Twisted pair can be further classified into two categories: It provides lower crosstalk, a higher signal to noise ratio, and are
o Unshielded twisted pair (UTP) suitable for 10 GBASE – T (10- Gigabit Ethernet)
o Shielded Twisted Pair (STP) vii) Category 6 (CAT 6) patch cable is normally terminated in 8P8C
module connectors (RJ 45).
Category Speed Use
47
perpendicular (i.e transverse) to the propagation direction of the Single mode fibre
beam. - It supports one confined transverse mode by which light can
- Transverse modes occur because of boundary condition imposed on propagate along the fibre.
the wave by the wave guide. - They are used for most communication links longer than 200 metres
- Fiber optic cables offer the following advantages over other types of single modem fibre is used in many applications when data is sent at
transmission media: multi-frequent (WDM – wave division multiplexing)
o Light signals are impervious to interference from EMI or electrical - So only one cable is needed.
crosstalk
o Light signals do not interfere with other signals
o Optical fibers have a much wider, flatter bandwidth than coaxial
cables and equalization of the signals is not required
o The fiber has a much lower attenuation, so signals can be
transmitted much further than with coaxial or twisted pair cable Multimode fibre
before amplification is necessary - Multimode fibre supports many propagation path end generally have a
o Optical fiber cables do not conduct electricity and so eliminate larger diameter core.
problems of ground loops, lightning damage and electrical shock - It is used for short distance communication links or for application
o Fiber optic cables are generally much thinner and lighter than when high power must be transmitted.
copper cables - As each mode travels at its own propagation velocity, multimode fibre
o Fiber optic cables have greater data security than copper cables suffers from modal dispersion which limits the maximum length a
signal can be transmitted through it.
- Fibres which support only a single mode are called single mode fibre - There are two types:
while fibres which support many propagation paths or transverse i) Step Index multimode
modes are called multimode fibre. ii) Graded Index multimode
48
- In a step index multimode fibre, rags of light are guided along the fibre Some of limitations are: can create interference with
core by total internal reflection. communication devices, susceptible to eavesdropping.
- Rays that meet the core-cladding boundary at a high angle, greater b) Terrestrial microwave – two antennae are used for
than the critical angle for these boundaries are completely reflected. communication. A focused beam emerges from an antennae and
is received by the other antenna, provided that antenna’s should
ii) Graded Index multimode fibre be facing each other with no obstacle in between due to curvature
- An optical fibre whose core has a refractive index that decreases with of earth terrestrial microwave can be used fro long distance
increasing radial distance from the fibre axis which causes light rays communication with high bandwidth.
to follow sinusoidal path down the fibre. Terrestrial microwave communication uses Earth-based
- The resulting curved paths reduce multipath dispersion because high transmitters and receivers resembling satellite dishes. Terrestrial
angle rays pass more through the lower index periphery of the core, microwaves are in the low-gigahertz range, which limits all
rather than the high – index centre. communications to line-of-sight. Relay stations are spaced
- The idea index profile is very close to a parabolic relationship between approximately 48 km (30 mi) apart.
the index and the distance from the axis. c) Satellites – satellite acts as a switch in sky. On earth VSAT (very
small aperture terminal) are used to transmit and receive data
Wireless media from satellite. Satellites communicate via microwave radio waves,
- Wireless media carry electromagnetic signal at radio and microwave which are not deflected by the Earth's atmosphere. The satellites
frequencies that represent the binary digits of data communications. are stationed in space, typically in geosynchronous orbit
- Wireless networks are useful for the following situation: 35,400 km (22,000 mi) above the equator. These Earth-orbiting
o Spaces where cabling would be impossible or inconvenient systems are capable of receiving and relaying voice, data, and TV
o Temporary installations. signals.
- Transmission and reception are achieved using an antenna d) Cellular radio technology: defined cellular service areas around
transmitter sends out the EM signal into the medium. Receiver picks a radio transreceiver and computerized control. It uses several
up the signal from the surrounding medium. radio communications technologies. The systems divide the
- Directional Transmission – Transmitter sends out a focused EM region covered into multiple geographic areas. Each area has a
beam. Transmitter end receiver antennae must be carefully aligned. low-power transmitter or radio relay antenna device to relay calls
It is more suitable for higher frequency signal. from one area to the next area.
- Omni directional transmission – Transmitted signals spread out in all e) Infrared communication: can transmit signals for small
directions. It may be received by many antennae distances, typically no more than 10 meters. In most cases, line-
- There are several ways of transmission of-sight propagation is used, which limits the physical positioning
a) Radio – This is effective for short ranges and is in expensive and of communicating devices.
easy to install. Depending on frequency radio offers different
bandwidth. Wireless local area networks use a high-frequency Types of wireless network
radio technology similar to digital cellular and a low-frequency - The IEEE and telecommunication industry standard for wireless data
radio technology. Wireless LANs use spread spectrum technology communications cover both the data link and physical layers.
to enable communication between multiple devices in a limited - For common data communication standards that apply to wireless
area. IEEE 802.11 defines a common flavor of open-standards media are:-
wireless radio-wave technology known as Wifi. 1. Standard IEEE 802.11- Commonly referred to as Wi-Fi, is a wireless
LAN (WLAN) technology that uses a contention or non deterministic
49
system with a carrier sense multiple access / collision avoidance
(CSMA/CA) media access process Standard Max Speed Typical Range
2. Standard IEEE 802:15 – Wireless Personnel Area Network (WPAN) 802.11a 54 Mbps 50 m
standard, commonly known as “Bluetooth’ uses a device pairing
process to communicate over distances from 1 to 10 metres. 802.11b 11 Mbps 100m
3. Standard IEEE 802.16 – Commonly known as WiMAX (Worldwide
Interoperability for Microwave Access) uses a joint to multipoint 802.11g 54 Mbps 100m
topology to provide wireless broadband access. 802.11n 100 Mbps 100m +
4. Global System for Mobile Communication (GSM) – includes
physical layer specification that enable the implementation of the layer
2 general packet radio service (GPRS) protocol to provide data Advantages of wireless networks:
transfer over mobile cellular telephoning network. · Mobility - access can be available throughout industry or
organization. More and more businesses are also offering free
The physical layer specification are applied to areas that include – WiFi access ("Hot spots").
- Data to radio encoding · Fast setup - If your computer has a wireless adapter, locating a
- Frequency and power transmission wireless network can be as simple or will connect automatically to
- Signal reception and decoding networks within range.
- Antenna design and construction · Cost - Setting up a wireless network can be much more cost
effective than buying and installing cables.
Wireless LAN · Expandability - Adding new nodes to a wireless network is as
- A Common wireless data implementation is enabling devices to easy as turning the node on (as long as you do not exceed the
wirelessly connect via a LAN. maximum number of devices).
- In general, a wireless LAN requires the following network devices:- Disadvantages of wireless networks:
a) Wireless access point (WAP) – concentrates the wireless · Security – susceptible to security breach. Protect sensitive data
signals from users and connects usually through a copper cable, with backups, isolated private networks, strong encryption and
to the existing copper based network infrastructure such as passwords, and monitor network access traffic to and from
Ethernet. wireless network.
b) Wireless NIC adapter – provides wireless communication · Interference - Because wireless networks use radio signals and
capability to each network host. similar techniques for transmission, they are susceptible to
- There are a number of WLAN Ethernet-based standards used: interference from lights and electronic devices.
o IEEE 802:11a - Operates in the 5 GHZ frequency band at · Inconsistent connections - Because of the interference caused
speed of up to 54 mbps. It covers smaller areas and less by electrical devices and/or items blocking the path of
penetrating building structures. transmission, wireless connections are not nearly as stable as
o IEEE 802:11b - operates in the 2.4 GHZ frequency band at those through a dedicated cable.
speed of up to 11mbps. It has longer range and able to · Speed - The transmission speed of wireless networks is
penetrate building structures. improving; however, faster options (such as gigabit Ethernet) are
o IEEE 802.11n – operates in 2.4 GHz frequency band ac data available via cables.
rates 100 to 210 mbps with distance range of 70m.
50
LOCAL AREA NETWORKS (LAN) hardware and software, to allow them to exchange information and
- LAN interconnects computer and devices over a common medium so cooperate.
users share access to host computers, databases, files, applications - Topology which is a pattern of interconnection among nodes
and peripheral. influences a networks cost and performance.
- The following characteristics differentiate one LAN from another. - There are several topologies used:
o Topology o Point to point topology
o Protocol o Bus topology
o Media o Star topology
- The four primary devices used in LAN are: o Ring topology
o Hubs o Mesh topology
o Bridges
o Switches 1. Star topology
o Routers It is a physical topology in which a multiple nodes are connected to a
- There devices operates on the following layers: central component known as Hub. Signals are transmitted and
o OSI layer 1 (physical) – Hubs, repeaters. Hubs are considered received through the hub. The hub may actually be a file server,
to be multi-port repeaters central computer that contains a centralized file and control system
o OSI layer 2 (data link) bridges switches with all its nodes attached directly to the server.
o OSI layer 3 (network) – routers.
- LAN transmits in three modes
i) Unicast – a single packet is sent from the source to a destination on a
network. The source node addresses the packet by using the network
address of the destination node.
ii) Multi-cast – A single packet is copied and forwarded to a specific
subset of nodes on the network. The source node addresses the
packet by using a multicast address. The packet is then sent to the
network, which makes copies of the packet and sends a copy to each
segment with a node that is part of the multicast address. Advantages
iii) Broadcast. This is the term used to describe communication where a - Network runs even if one host fails
piece of information is sent from one joint to all other points. In this - More suitable for larger network
case there is just one sender, but the information is sent to all - It is easier to add or remove nodes, and to modify the cable layout
connected receivers. Broadcast transmission is supported on most - Network administration and error detection is easier because is
LANS and may be used to send the same message to all computers isolated to central node.
on the LAN.
Disadvantages
LAN Topologies - Installation costs are high because each node needs to be connected
- A network topology is the basic design of a computer network. to the central switch
- Networking is a collection of computers or other hardware devices - If the hub fails the entire network fails
that are connected together either physically or logically, using special - Broadcasting and multicasting is not easy.
51
2. Bus topology In a ring topology, the network signal is passed through each network
Bus consists of a single cable called a backbone that connects all card of each device and passed on to the net device
workstation on the network using a single line.
All transmissions must pass through each of the connected devices to
complete the desired request.
Each workstation has its own individual signal that identifies it and
allows for the requested data to be returned to the correct originator
Advantages Advantages
- Has minimum cable requirement
- Broadcasting and multicasting is much simpler
- It is simple and flexible - Each node can regenerate the signal
- Broadcasting and multicasting is simple since you just need to send
- It is easy to extend a bus topology by adding or removing nodes from
out one message.
a bus
- Least expensive since less amount of cabling is required and no - The message can be automatically acknowledged.
network switches are required.
Disadvantages
- Failure of one node brings the whole network down
Disadvantages
- Diagnosis/troubleshooting (fault isolation is difficult)
- Limited in size and speed
- Adding or removing nodes disrupts the network
- There can be a security problem, since every node may see every
message – even those that are not destined for it , sniffing is easier
- Diagnosis / troubleshooting (fault-isolation), can be difficult, since the Mesh topology
This is a topology where each node must not only capture and
fault can be anywhere along the bus.
disseminate its own data but also serve as a relay for other nodes i.e it
- There is no automatic acknowledgment of messages, since messages
must collaborate the propagate the data in the network.
get absorbed at the end of the bus and do not return to the sender.
A mesh network whose nodes are all connected to each other is a fully
- The bus cable can be a bottleneck when network traffic gets heavy.
This is because nodes can spend much of their time trying to access connected network.
the network.
Advantages
- Point to point line configuration makes identification and isolation of
iv) Ring topology - All the nodes in a ring network are connected in a
faults easy.
closed circle of cable messages that are transmitted travel around the
- Network can be easily expanded
ring until they reach the computer that they are addressed to the signal
being refreshed by each node. - If one node fails, other continue to work
52
- It is more secure ii) Bridges
- A bridge is a device that connects two or more local area network or
Disadvantages two or more segments of the same network.
- Quite expensive due to cabling and installation cost is high. - Bridge connects two networks (e.g 10 BASET Ethernet and Local
Tank Connection) so that they can share information with each other.
LAN Network devices - In addition to connecting networks, they filter information so that
- These devices interconnect individual computers and ensure that they network traffic intended for one portion of the network does not
communicate efficiently. congest the rest of network.
- Network interfaces, hubs, bridges, switches, routers and firewalls - Bridges may consist either standalone hardware devices or of
work together in a number of ways to create these different kinds of software running on a client or server.
network roadways. - Like switches, bridges learn the MAC addresses of all connected
clients, servers and peripherals and associate each address with a
The functions of network devices are: bridge port (network connection).
- To regulate the speed at which the network information travels - When a bridge (or switch) receives an incoming frame, it opens and
- To manage the flow of traffic, opening, closing or directing it to reads its destination MAC address.
specific streets as the need arises. - If the port that will receive the frame is different from the port
- To help protect sensitive information within the network. connected to the sender, the bridge drops the frame.
- If the bridge cannot determine which port is associated with a
Network Interface card (NIC) destination address, it passes the frame along to all ports.
- This is a chipset on PCB that provide physical access from the node
to the LAN medium.
- Its responsible for fragmenting the data transmission and formatting
the data packets with the necessary header and trailer.
- It function at the lower two layers of OSI model, that is both an OSI
layer 1 (physical layer) and layer 2 (data link layer) device, as it
provides physical access to a networking medium and provides a low-
level addressing system through the use of MAC addresses. It allows
users to connect to each other either by using cables or wirelessly
- It contains a microprocessor that can relieve the attached device of
some routine.
.
Hubs
- This is a small box that gathers the signal from each individual device
optionally amplifies each signal and then sends the signal out to all
other connected devices.
- Amplification helps to ensure that devices on the network receive
variable information. Hubs are also called concentrators or repeaters.
53
- They come in various sizes, 12 port or 24 port etc. All the client, Routers
servers and peripherals connected to a hub (or to a set of - Like bridges, routers are devices whose primary purpose is to connect
interconnected hubs) share the bandwidth (data delivery capacity) of two or more networks and to filter network signals so that only desired
that network. information travels between them.
- They form a single collision domain – on area of an Ethernet network - Routers regulate network traffic more precisely and are aware of
in which data sent to or from a device may potentially collide with the many possible paths across the network and can choose the best one
data from other devices. for each data packet to travel.
- They operate primarily by examining incoming data for its network
iv) Switches routing and transport information.
- Like a hub, an Ethernet switch is a device that gathers the signals - This information includes the source and destination network routing
from devices that are connected to it, and then regenerates a new addresses.
copy of each signal. - Routers can be programmed to prevent information from being sent to
- Switches are more powerful than hubs and can substantially increase or received from certain networks or computers based on all or part of
the network performance their network routing addresses.
- Most common switches operate by learning the MAC addresses of all
connected clients, servers and peripheral and associating each
address with one of its ports.
- When a switch receives an incoming signal it creates a temporary
circuit between the sender and receiver.
- The temporary circuit provides two important benefits.
o The circuit allows the sender and receiver momentarily to
exchange information without intrusion from other devices on
the network.
o The circuit ensures the information travels directly between the
communicating computers.
- The switch installed should be compatible with physical network and
data link protocols.
54
vi) Multiplexers regenerates a strong signal of the same value without noise. This
- Multiplexers (mux) acts as both concentrators and contention devices process enhances the signal quality.
that enable multiple relatively low speed terminal devices to share a - Repeaters are spaced at approximately the same intervals as
single high capacity circuit (physical path) between two points in a amplifiers.
network. - Because repeaters work with the actual physical signal, and do not
attempt to interpret the data being transmitted, they operate on the
vii) Modems physical layer, the first layer of
- These are devices that allow digital data signals to be transmitted the OSI model.
across an analogue link.
- Modem stand for Modulator Demodulator, and it changes signal to an
analogue frequency and send this tone across the analogue link.
- At the other end, another modem receives the signal and converts it
back to digital.
55
o A firewall is a convenient platform for several internet functions - The user contacts the gateway using TCP/IP application and the
that are not security related. gateway asks the user for the name of the remote hot to be accessed.
- However firewalls have their limitations including:- - It works on the application level of the TCP/IP stack and may intercept
o It cannot protect against attacks that by passes the firewall all packets traveling to or from an application.
o It may not protect fully against internal threats such as a - They block other packets (usually dropping them without
disgruntled employee. acknowledgement to the sender)
o An improperly secured wireless LAN may be accessed from - It functions by determining whether a process should accept any
outside the organization. given connection. It accomplishes their function by hooking into
- A firewall may act as a packet filter. It can operate as a positive filter, socket cause to filter the connection between the application layer and
allowing passing only packets that meet specific criteria or as a the lower layer of the OSI model.
negative fitter, rejecting any packet that meets certain criteria. - It work much as like a packet filter but application filters apply filtering
rules (allow/block) on a per process basis instead of filtering
Types of firewalls connections on a per port basis.
1. Packet filtering firewalls - The major advantages of these fire walls are:
- It applies a set of rules to each incoming and outgoing IP packet and o It is more secure than packet filters
then forwards or discards the packet. It is typically configured to filter o It is easy to log and audit all incoming traffic at the application
packets going in both direction (from and to the internal network) level.
- It generally falls into two subcategories; stateful and stateless. - However the disadvantage is:
- Stateful firewalls maintain context about active section, and use that o The additional processing overhead on each connection.
state information to speed packet processing. If a packet does not
watch on existing connection, it will be evaluated according to the 3) Proxies
ruleset for new connections. - A proxy server may act as firewall by responding to put packets
- Stateless firewalls require less memory and can be faster for simple (connection requests) in the manner of an application, while blocking
filters that require less time to filter them to look up a session. other packets.
- The major advantage of packet filtering firewalls is its simplicity. Also, - It is a gateway from one network to another for a specific network
packet filters typically are transparent to user end are very fast.. application in the sense that it functions as a proxy on behalf of the
- However packet filtering firewall has the following weaknesses:- network user.
o Most do not support advanced user authentication schemes - Proxies make tampering with an internal system from the external
o It is vulnerable to attacks and exploits that take advantage of network more difficult and misuse of one internal system would not
problems within the TCP/IP specification and protocol stack necessarily cause a security breach exploitable from outside the
such as network layer address spoofing. firewall.
o It is susceptible to security breaches caused by improper
configuration.
o It does not examine upper layer data, hence it cannot prevent
attacks that employ application
56
57
Protocols and standards
- Protocol is a kind of agreement about the exchange of information in a Type of transmission lines unbalanced Differential Differential
distributed system. It is a set of rules that two or more devices must Max number of drivers 1 1 32
follow if they are to communicate with each other. Max number of receivers 1 10 32
- Protocol includes everything from the meaning of data to the voltage Max cable length (m) 15m 1.5km 1.2km
levels on connection wires. Max data rate 20kbps 10mbps 10mbps
- A network protocol defines how a network will handle the following
problems and tasks: i) Rs 232
o communication line errors - The RS-232 interface standard (officially called TIA-232) defines the
o flow control (to keep buffers from overflowing) electrical and mechanical details of the interface between Data
o access by multiple devices Terminal Equipment (DTE) and Data Communications Equipment
o failure detection (DCE), which employ serial binary data interchange.
o data translation - The current version of the standard refers to DCE as Data Circuit-
o interpretation of messages terminating Equipment.
- Networking standards can be classified as proprietary, open or de
facto
o Proprietary standards are owned by one particular
organization.
o If that organization has sufficient market clout and the industry
lacks alternative to its standard, it may be adopted the whole
industry, becoming a de facto standard.
o Open standard are not owned by any one – they are created
by neutral organizations to ensure that compatible products - Its used for many purposes such as connecting mouse, printer as well
can be designed and developed by many different companies. as industrial instrumentation
- RS – 232 is limited to point to point connections between pc serial
Serial Interface Standards ports and devices.
- Many devices used in industrial applications use EIA standards RS – - The RS-232 standard consists of three major parts, which define:
232, RS 422 or RS 485 to connect to computers and to one another. • Electrical signal characteristics
- The EIA RS–XXX standard specifies only the electrical characteristics • Mechanical characteristics of the interface
– not the software protocol • Functional description of the interchange circuits
- The whole purpose of a serial interface is to provide a single path for - The standard defines a logic and voltage between -3v and -25v and a
data transmission wirelessly or a over a cable. logic 0 as a voltage level between +3V and +25v
- Serial interfaces can be used to provide standardized logic levels from - Many RS 232 connections are one-way or simplex However, using
transmitter to receiver, define transmission medium and connectors the special signaling and control voltages available, this way or half
and specify timing and data rates. duplex operation is possible.
- The definition of logic levels, medium and connectors is part of layer 1 - The two connected devices alternate transmitting and receiving
of OSI model (physical layer) while data handling is part of MAC layer operations.
or layer 2(Data link layer) - The central signal in the interface defines the protocol for transmitting
and receiving data.
58
- These signals tie the two communicating devices when they are busy, (ii) RS – 422 (EIA – 422)
transmitting, ready and receiving. - It is similar to RS 232, and can be programmed in the same way. This
- The transmitting device is the DTE (devices that are either the source is a technical standard that specified electrical characteristics of a
or destination of data frames) such as computer, work station. digital signaling circuit.
- The receiving device is the DCE (device that receive and forward - Differential signaling can transmit data at rates as high as 10 mbps
frames across the network) – such as printer, modem, interface card. along a cable of 1500m.
- The control signal used on the common nine-pin connector are:- - The advantage offered by this standard includes the differential
a) Data carrier detect (DCD) – the DCE tells the DTE it is receiving a receiver, a differential driver and high data rates.
valid input signal (Pin 1) - However RS 422 cannot implement a truly multipoint communication
b) Data set ready (DSR) – The DCE tells the DTE it is connected and network such as with RS 485, but one driver can be connected to up
ready to receive (pin 6) to ten receivers.
c) Received data (RD): This is the actual signal received from DTE
(Pin 2). (iii) RS 485 (TIA 485)
d) Request to send (RTS) – This signal from the DTE tells the DCE it - It defines not only a single device to device interface but also a
is ready to transmit (pin 7) communication bus that can be used to form simple networks of
e) Signal ground:- This is the common ground connection for all multiple devices.
signals (pin 5) - It specifies differential signaling on two lines rather than single ended
f) Transmit data (TD) – This is the transmitted signal from the DTE with a voltage referenced to ground
(pin 3) - A logic is a level greater than -200mv and a logic O is a level greater
g) Data terminal ready (DTR) – This line is from the DTE to the DCE than +200 mv
indicating readiness to send or receive data (pin 4) - The standard transmission medium is twisted-pair cable of 22 or 24
h) Clear to send (CTS) – This line from the DCE tells the DTE it is AWG solid wire. Two lines are minimum but reference wire can be
ready to receive data (pin 8) used.
i) Ring indicator (R1) – This line was used in order modem - Four wire can be used if full duplex operation is desired.
connection but it is not used anymore (pin 9) - Maximum cable length is defined as 1.2 km at maximum data rate of
100mbps
- A common configuration is bus network topology with multiple drops
or connections.
- The standard species a maximum of 32 drivers (transmitters) and 32
receivers.
- Line drivers are disconnected from the line when not transmitting. All
receivers are fully connected and the bus line is terminated in a load
matching resistance.
59
- Common equipment include low-speed modems, industrial control - The use of fibre Ethernet reduces the problem of electrical noise and
equipment like PLC, computer, numerical controlled (CNC) machine provides electrical isolation to prevent equipment damage.
tools, robots, embedded control computers, medical instrument and - Some industrial networks emphasis deterministic delivery of
equipment and embedded controller development systems. transmitted data, whereas Ethernet used collision detection which
- The RS 485 – Interface is also widely used in industrial applications made transport time for individual data packets difficult to estimate
where higher speeds and longer distances are needed. with increasing network traffic.
- It is used in the same type of equipment as defined for the RS 232 - In addition to physical compatibility and low level transport protocols a
interface puts devices like point of sale (pos) terminal, metering practical industrial Ethernet system must also provide interoperability
instruments, and large special automated machines. of high levels of the OSI model.
- An industrial network use network switches to segment a large system
Ethernet into logical sub-networks, divided by address, protocol or application.
- The term refers to the family of LAN module covered by the IEEE - Using network switches allows the network to be broken up into many
802.3 standard that defines what is the CSMA/CIS protocol small collision domains.
- The Ethernet standards comprise several wiring and signaling - This reduces the risk of a faulty or misconfigured device generating
variants of the OSI physical layer in the use with Ethernet. excess network traffic.
- Three data rates are defined for operation over optical fibre and
twisted-pair cables. Benefits of industry-standard networks
o 10 BASE – T Ethernet - Modern control and business systems require open, digital
o Fast Ethernet (100 BASE – T Ethernet) communications.
o Gigabit Ethernet 1000 BASE-T Ethernet - Industrial networks replace conventional point-to-point RS-232, RS-
- The protocol has the following characteristics: 485, and 4-20 mA wiring between existing measurement devices and
o Easy to understand, implement, manage and maintain automation systems with an all-digital, 2-way communication network.
o Allows low cost network implementation - Industrial networking technology offers several major improvements
o Provides extensive topologies flexibility for network installation over existing systems.
o Guarantees successful, interconnection and operation of - With industry-standard networks, we can select the right instrument
standard – compliant products, regardless of manufacture and system for the job regardless of the control system manufacturer.
- Twisted-pair Ethernet standards are such that the majority of cables - Other benefits include:
can be wired ‘straight through’ pin1 to pin1 pin 2 to pin 2 and so on, o Reduced wiring -- resulting in lower overall installation and
but others may need to be wired in the ‘crossover’ form (receive to maintenance costs
transmit and transmit to receive) o Intelligent devices -- leading to higher performance and
increased functionality such as advanced diagnostics
Industrial Ethernet o Distributed control -- with intelligent devices providing the
- This refers to the use of standard Ethernet protocols with rugged flexibility to apply control either centrally or distributed for
connectors and extended temperature switches in an industrial improved performance and reliability
environment for automation or process control. o Simplified wiring of a new installation, resulting in fewer,
- Components used in plant process areas must be designed to work in simpler drawings and overall reduced control system
harsh environment of temperature extremes, humidity and vibration engineering costs
that exceeds the ranges for information technology equipment o Lower installation costs for wiring, marshalling, and junction
intended for installation in controlled environment. boxes
60
61
I/O BUS NETWORKS - The basic function of an I/O bus network is to communicate
- I/O bus networks allow PLCs to communicate with I/O devices in a information with, as well as supply power to, the field devices that are
manner similar to how local area networks let supervisory PLCs connected to the bus.
communicate with individual PLCs. - In an I/O bus network, the PLC drives the field devices directly,
- This configuration decentralizes control in the PLC system, yielding without the use of I/O modules; therefore, the PLC connects to and
larger and faster control systems. communicates with each field I/O device according to the bus’s
- The topology, or physical architecture, of an I/O bus network follows protocol.
the bus or extended bus (tree) configuration, which lets field devices - In essence, PLCs connect with I/O bus networks in a manner similar
(e.g., limit, photoelectric, and proximity switches) connect directly to to the way they connect with remote I/O, except that PLCs in an I/O
either a PLC or to a local area network bus. bus use an I/O bus network scanner.
- Remember that a bus is simply a collection of lines that transmit data - An I/O bus network scanner reads and writes to each field device
and/or power. Figure illustrates a typical connection between a PLC, a address, as well as decodes the information contained in the network
local area network, and an I/O bus network information packet.
- A large, tree topology bus network (i.e., a network with many
branches) may have up to 2048 or more connected discrete field
devices.
- The field devices that connect to I/O bus networks contain intelligence
in the form of microprocessors or other circuits). These devices
communicate not only the ON/OFF state of input and output controls,
but also diagnostic information about their operating states.
- I/O bus networks can be separated into two different categories—one
that deals with low-level devices that are typical of discrete
manufacturing operations and another that handles high-level devices
found in process industries.
- These bus network categories are:
• Device bus networks
• Process bus networks
- Device bus networks interface with low-level information devices
(e.g., push buttons, limit switches, etc.), which primarily transmit data
relating to the state of the device (ON/OFF) and its operational status
(e.g., operating OK). These networks generally process only a few
bits to several bytes of data at a time.
- Process bus networks, on the other hand, connect with high-level
information devices (e.g., smart process valves, flow meters, etc.),
which are typically used in process control applications. Process bus
networks handle large amounts of data (several hundred bytes),
consisting of information about the process, as well as the field
devices themselves.
62
- The majority of devices used in process bus networks are analog, - This is the reason why some manufacturers specify that their analog
while most devices used in device bus networks are discrete. products are compatible with Profibus, Fieldbus, or another type of
- However, device bus networks sometimes include analog devices, protocol communication scheme.
such as thermocouples and variable speed drives that transmit only a
few bytes of information.
- Device bus networks that include discrete devices, as well as small
analog devices, are called byte-wide bus networks. These networks
can transfer between 1 and 50 or more bytes of data at a time.
- Device bus networks that only interface with discrete devices are
called bit-wide bus networks. Bit-wide networks transfer less than 8
bits of data from simple discrete devices over relatively short
distances.
63
- The de facto standards for low-end, bit-wide device bus networks - Each interbus sensor loop system can act as a single station on an
include Seriplex, developed by Square D, and ASI (Actuator Sensor interbus-S network, on the sensor loop can be connected directly to a
Interface), a standard developed by a consortium of European controller or master.
companies. - Interbus–S devices are usually implemented with a special ASIC
- Again, this is why I/O bus network and field device manufacturers will (application specific integrated circuit).
specify compatibility with a particular protocol (e.g., ASI, Seriplex,
InterBus-S, SDS, or DeviceNet) even though no official protocol ii) CANbus networks
standard exists. - CANbus networks are byte-wide device bus networks based on the
widely used CAN electronic chip technology, which is used inside
1. Byte-Wide Device Bus Networks automobiles to control internal components, such as brakes and other
- The most common byte-wide device bus networks are based on the systems.
InterBusS network and the CANbus network. - A CANbus network is an open protocol system featuring variable
length messages (up to 8 bytes), nondestructive arbitration, and
i) InterBus-S advanced error management. A four-wire cable plus shield— two
- InterBus-S is a sensor/actuator device bus network that connects wires for power, two for signal transmission, and a “fifth” shield wire—
discrete and analog field devices to a PLC or computer (soft PLC) via provides the communication link with field devices.
a ring network configuration. - This communication can either be master/slave or peer to peer. The
- The InterBusS has built-in I/O interfaces in its 256 possible node speed of the network (data transmission rate) depends on the length
components, which also include terminal block connections for easy of the trunk cable.
I/O interfacing.
- This network can handle up to 4096 field I/O devices (depending on
the configuration) at a speed of 500 kbaud with cyclic redundancy
check (CRC) error detection.
- A PLC or computer in an InterBus-S network communicates with the
bus in a master/slave method via a host controller or module.
- The topology of the network is a ring, with data being sequentially
shifted from point to point on the ring under the control of a network
master.
- Each device is the ring acts as a shift register, transmitting and
receiving data simultaneously at 500 KHz.
- The actual serial data transmission between stations conforms to RS-
485.
- Interbus–S (interbus–S remote Bus) has also been extended to
include a sub-protocol called interbus – sensor loop (or interbus–S
local Bus). - The DeviceNet byte-wide network can support 64 nodes and a
- This subprotocol provides an alternate physical layer, with a single maximum of 2048 field I/O devices.
twisted pair carrying power and data on the same lines and a - The SDS network can also support 64 nodes; however, this number
reduction in the minimum size of the shift register in each station from increases to 126 addressable locations when multiport I/O interfaces
16 to 4 bits. are used to multiplex the nodes.
64
- Using a 4-to-1 multiport I/O interface module, an SDS network can - Because an SDS network can transmit many bytes of information in
connect to up to 126 nonintelligent I/O devices in any combination of the form of variable length messages, it can also support many
inputs and outputs. intelligent devices that can translate one, two, or more bytes of
- This multiport interface to nonintelligent field devices contains a slave information from the network into 16 or 32 bits of ON/OFF information.
CAN chip inside the interface, which provides status information about - An example of this type of intelligent device is a solenoid valve
the nodes connected to the interface. manifold.
- In a DeviceNet network, the PLC connects to the field devices in a - This kind of manifold can have up to 16 connections, thereby
trunkline configuration, with either single drops off the trunk or receiving 16 bits (two bytes) of data from the network and controlling
branched drops through multiport interfaces at the device locations. the status of 16 valve outputs.
- However, this device uses only one address of the 126 possible
addresses. Thus, in this configuration, the SDS network can actually
connect to more than just 126 addressable devices.
- The CANbus device bus network uses three of the ISO layers and
defines both the media access control method and the physical
signaling of the network, while providing cyclic redundancy check
(CRC) error detection.
- The media access control function determines when each device on
the bus will be enabled.
65
- These 124 inputs and output devices can be connected to up to 31 ii) InterBus Loop Bit-Wide Device Bus Network
nodes in either a tree, star, or ring topology. The I/O devices connect - The InterBus Loop from Phoenix Contact Inc. is another bit-wide
to the PLC or personal computer via the bus through a host controller device bus network used to interface a PLC with simple sensor and
interface. actuator devices.
- It provides a two-wire, non-twisted cable for interconnection of - The InterBus Loop uses a power and communications technology
devices. Devices may draw current from the two wires for powering called PowerCom to send the InterBus-S protocol signal through the
circuitry, and data communications are modulated on top of the power supply wires (i.e., the protocol is modulated onto the power
nominal d.c level at a bit rate of 167KHZ, under control of the master. supply lines).
One single parity bit per station is used for error detection. - This reduces the number of cables required by the network to only
- The maximum cable length is 100 meters (330 ft) from the master two conductors, which carry both the power and communication
controller. signals to the field devices.
- The ASI network protocol is based on the ASI protocol chip, thus the - Since the InterBus-S and InterBus Loop networks use the same
I/O devices connected to this type of network must contain this chip. protocol, they can communicate with each other via an InterBus Loop
- Typical ASI-compatible devices include proximity switches, limit terminal module.
switches, photoelectric sensors, and standard off-the-shelf field - The InterBus Loop connects to the bus terminal module, located in the
devices. InterBus-S network, which attaches to the field devices via two wires.
- However, in an application using an off-the-shelf device, the ASI chip - An InterBus Loop network can also interface with non-intelligent, off -
is located in the node (i.e., an intelligent node with a slave ASI chip), the-shelf devices by means of module interfaces containing an
instead of in the device. intelligent slave network chip.
- Figure below illustrates an I/O bus network that uses both the ASI bit-
wide network and the byte-wide CANbus network. Note that the ASI iii) Seriplex Bit-Wide Device Bus Network.
network connects to the byte-wide CANbus network through a - The Seriplex device bus network can connect up to 510 field devices
gateway. to a PLC in either a master/slave or peer-to-peer configuration.
- The Seriplex network is based on the application specific
integrated circuit, or ASIC chip, which must be present in all I/O field
devices that connect to the network.
- I/O devices that do not have the ASIC chip embedded in their circuitry
(i.e., off-the-shelf devices) can connect to the network via a Seriplex
I/O module interface that contains a slave ASIC chip.
- The ASIC I/O interface contains 32 built-in Boolean logic function
used to create logic that will provide the communication,
addressability, and intelligence necessary to control the field devices
connected to the network bus.
- A Seriplex network can span distances of up to 5,000 feet in a star,
loop, tree, or multidrop configuration.
- This bit-wide bus network can also operate without a host controller.
Unlike the ASI network, the Seriplex device bus network can interface
with analog I/O devices; however, the digitized analog signal is read
or written one bit at a time in each scan cycle
66
Process Bus Network i) Fieldbus Process Bus Network
- A process bus network is a high-level, open, digital communication - The Fieldbus process bus network from the Fieldbus Foundation (FF)
network used to connect analog field devices to a control system. is a digital, serial, multiport, two-way communication system that
- It is used in process applications, where the analog input/output connects field equipment, such as intelligent sensors and actuators,
sensors and actuators respond slower than those in discrete bus with controllers, such as PLCs.
applications (device bus networks). - This process bus network offers the desirable features inherent in 4–
- The size of the information packets delivered to and from these 20 mA analog systems, such as:
analog field devices is large, due to the nature of the information • a standard physical wiring interface
being collected at the process level. • bus-powered devices on a single pair of wires
- The two most commonly used process bus network protocols are • intrinsic safety options
Fieldbus and Profibus. - However, the Fieldbus network technology offers the following
- Although these network protocols can transmit data at a speed of 1 to additional advantages:
2 megabits/sec, their response time is considered slow to medium • reduced wiring due to multidrop devices
because of the large amount of information that is transferred. • Compatibility among Fieldbus equipment
- Nevertheless, this speed is adequate for process applications, • reduced control room space requirements
because analog processes do not respond instantaneously, as • Digital communication reliability
discrete controls do.
- Process bus networks can transmit enormous amounts of information Fieldbus Protocol
to a PLC system, thus greatly enhancing the operation of a plant or - The Fieldbus network protocol is based on three layers of the ISO’s
process. seven-layer model. These three layers are layer 1 (physical interface),
- For example, a smart, process bus–compatible motor starter can layer 2 (data link), and layer 7 (application).
provide information about the amount of current being pulled by the - It has optimized the OSI architecture for process control by removing
motor, so that, if current requirements increase or a locked-rotor the middle layers that are generally associated with non-time critical
current situation occurs, the system can alert the operator and avoid a applications such as file transfer.
potential motor failure in a critical production line. - The section comprising layers 2 and 7 of the model are referred to as
- Implementation of this type of system without a process bus network the Fieldbus communication stack.
would be too costly and cumbersome because of the amount of wire - In addition to the ISO’s model, Fieldbus adds an extra layer on top of
runs necessary to transmit this type of process data. the application layer called the user layer.
- Process bus networks will eventually replace the commonly used - This user layer provides several key functions, which are function
analog networks, which are based on the 4–20 mA standard for blocks, device description services, and system management.
analog devices.
- This will provide greater accuracy and repeatability in process Physical Layer (Layer 1)
applications, as well as add bidirectional communication between the - The physical layer of the Fieldbus process bus network conforms with
field devices and the controller (e.g., PLC). A PLC or computer the ISA SP50 and IEC 1152-2 standards.
communicates with a process bus network through a host controller - These standards specify the type of wire that can be used in this type
interface module using either Fieldbus or Profibus protocol format. of network, as well as how fast data can move through the network.
- Block transfer instructions relay information between the PLC and the - Moreover, these standards define the number of field devices that can
process bus processor. The process bus processor is generally be on the bus at different network speeds, with or without being
inserted inside the rack enclosure of the PLC. powered from the bus with intrinsic safety (IS).
67
- Intrinsically safe equipment and wiring does not emit enough thermal - The application layer contains the Fieldbus messaging
or electrical energy to ignite materials in the surrounding atmosphere. specification (FMS) standard, which encodes and decodes
- Thus, intrinsically safe devices are suitable for use in hazardous commands from the user layer, Fieldbus’s additional 8th layer.
environments(e.g., those containing hydrogen or acetylene). - The FMS is based on the Profibus process bus standard. Layer 7 also
- The Fieldbus has two speeds—a low speed of 31.25 kbaud, referred contains an object dictionary, which allows Fieldbus network data to
to as H1, and a high speed of 1 Mbaud or 2.5 Mbaud (depending on be retrieved by either tag name or index record
the mode—AC current or DC voltage mode), called H2.
- At a speed of 31.25 kbaud, the physical layer of the Fieldbus process User Layer (Layer 8)
network can support existing 4–20 mA wiring. - The user layer implements the Fieldbus network’s distributed control
- This increases cost-effectiveness when upgrading a plant or process’s strategy.
network communication scheme. At this H1 speed, the Fieldbus - It contains three key elements, which are function blocks, device
network can also support intrinsically safe network segments with description services, and system management.
bus-powered devices. - The user layer, a vital segment of the Fieldbus network, also defines
the software model for user interaction with the network system.
- Function Blocks: are encapsulated control functions that allow the
performance of input/output operations, such as analog inputs, analog
outputs, PID control, discrete inputs/outputs, signal selectors, manual
loaders, bias/gain stations, and ratio stations. The function block
capabilities of Fieldbus networks allow Fieldbus-compatible devices to
be programmed with blocks containing any of the instructions
available in the system. Through these function blocks, users can
configure control algorithms and implement them directly through field
devices.
- Device Description Services. Device descriptions (DD) are Fieldbus
software mechanisms that let a host obtain message information,
such as vendor name, available function blocks, and diagnostic
capabilities, from field devices. Device descriptions can be thought of
as “drivers” for field devices connected to the network, meaning that
they allow the device to communicate with the host and the network.
All devices connected to a Fieldbus process network must have a
Communication Stack (Layers 2 and 7) device description. When a new field device is added to the network,
- The communication stack portion of the Fieldbus process bus network the host must be supplied with its device description.
consists of layer 2 (the data link layer) and layer 7 (the application - System Manager. The system management portion of the user layer
layer). schedules the execution of function blocks at precisely defined
- The data link layer controls the transmission of messages onto the intervals. It also controls the communication of all the Fieldbus
Fieldbus through the physical layer. network parameters used by the function blocks. Moreover, the
- It manages access to the bus through a link active scheduler, which system manager automatically assigns field device addresses.
is a deterministic, centralized bus transmission regulator based on
IEC and ISA standards.
68
Profibus Process Bus Network
- Profibus (PROcess FIeld BUS) is a digital process bus network
capable of communicating information between a master controller (or
host) and an intelligent, slave process field device, as well as from
one host to another.
- Profibus actually consists of three intercompatible networks with
different protocols designed to serve distinctive application
requirements. The three types of Profibus networks are: Profibus-
FMS, Profibus-DP and Profibus-PA
- Profibus-FMS network is the universal solution for communicating
between the upper level, the cell level, and the field device level of the
Profibus hierarchy.
- Cell level control occurs at individual (or cell) areas, which exercise
the actual control during production. The controllers at the cell level
must communicate with other supervisory systems.
- The Profibus-FMS utilizes the Fieldbus message specification
(FMS) to execute its extensive communication tasks between
hierarchical levels.
- This communication is performed through cyclic or acyclic messages
at medium transmission speeds.
- Profibus-DP (Decentralized Peripherals) network is a
performance-optimized version of the Profibus network. It is designed
to handle time-critical communications between devices in factory
automation systems. - In broadcast communication, an active station sends an unconfirmed
- The Profibus-DP is a suitable replacement for 24-V parallel and 4–20 message to all other stations.
mA wiring interfaces. - Any of these stations (including both masters and slaves) can take
- Profibus-PA (Process Automation) network is the process this information. In multicast communication, an active station sends
automation version of the Profibus network. It provides bus-powered an unconfirmed message to a particular group of master or slave
stations and intrinsic safety according to the transmission stations.
specifications of the IEC 1158-2 standard. The Profibus-PA network - The physical layer or layer 1, of the ISO model defines the network’s
has device description and function block capabilities, along with field transmission medium and the physical bus interface.
device interoperability. - The Profibus network adheres to the EIA RS-485 standard, which
- Profibus-PA is designed for use in an explosion / hazardous areas. uses a two-conductor, twisted-pair wire bus with optional shielding.
The physical layer (cable) allows power to be delivered over the bus - The maximum number of stations or device nodes per segment is 32
to field instruments, while limiting current flows so that explosive without repeaters and 127 with repeaters.
conditions are not created, even if a malfunction occurs. - The network transmission speed is selectable from 9.6 kbaud to 12
- Profibus networks support both peer-to-peer and multipeer Mbaud, depending on the distance and cable type. Without repeaters,
communication in either broadcast or multicast configurations. the maximum bus length is 100 m at 12 Mbaud.
- The type of connector used is a 9-pin, D-sub connector.
69
Modbus Network 4 to 20 mA Current Loop
- It is a serial communication protocol published by Modicons for use - The 4 to 20 mA current loop is a widely used method for transferring
with its PLCs. information from one station (the transmitter) to another station (the
- Simple and robust, it has since become a de facto standard receiver). Therefore, this system allows for only two stations.
communication protocol, and it is now commonly available means of - A typical current loop system assigns a sensing range (e.g., 0 to
connecting electronic devices. 100°C) to the current range between 4 and 20 mA.
- The main reasons for the use of modbus in the industrial environment - A loop exists (i.e., two wires) between the transmitter and receiver.
are: - The transmitter can impress a certain current in the loop (using a
- Developed with industrial application in mind controlled current source) so that the receiver can measure the
- Openly published and royalty free current in the loop (e.g., by placing a small resistor in series with the
- Easy to deploy and maintain loop and measuring the voltage drop across the resistor).
- Moves raw bits or words without placing many instructions. - After measuring the current, the receiver can then determine the
- It allows for communication between many (approx 240) devices present level of the sensed signal within the defined sensing range.
connected to the same network. - This method uses current signaling, instead of voltage signaling, and
- It is used to connect a supervisory computer with a remote terminal therefore is relatively unaffected by potential differences between the
unit (RTU) in SCADA systems. transmitter and the receiver.
- A Modbus command contains the modbus address of the device it is - This is similar to the benefit of differential (voltage) signaling, which
intended for. All modbus commands contain checking information, also requires two wires.
ensuring that a command arrives undamaged. - Another characteristic of this method is that it is not primarily digital in
- The basic modbus command can instruct an RTU to change a value nature, as many other sensor communication systems are.
in one of its registers, control or read an 1/0 port as well as command - The measured value can vary continuously in the range of 4-20 mA,
the device to send back one or more values contained in its registers. and therefore can easily represent an analog sensing range, rather
- Modbus Messaging protocol is an Application layer (OSI layer 7) than a set of digital signals. Also, the signal is continuously variable
protocol that provides client/server communication between devices and available.
connected to different types of buses or networks. - Another characteristic of this method is that the integrity of the loop
- The Modbus Messaging protocol is only a protocol and does not imply can be verified.
any specific hardware implementation. Also note that the Modbus - As long as the loop is unbroken and the transmitter is in good working
Messaging protocol used with Modbus Serial is the same one used order, the current in the loop should never fall below 4 mA.
with Modbus Plus and Modbus TCP. - If the current approaches 0 mA, then the receiver can determine that
- Modbus messaging is based on a client/server model and employs a fault exists — perhaps a broken cable.
the following messages: - These systems are widely used in various process control industries
- Modbus requests, i.e. the messages sent on the network by the (e.g., oil refining) for connecting sensors (transmitters) with control
clients to initiate transactions. These serve as indications of the computers.
requested services on the server side - Because one station is always the transmitter and one station is
- Modbus responses, i.e. the response messages sent by the always the receiver, this is a unidirectional, half duplex communication
servers. These serve as confirmations on the client side. system.
- Modbus (or to be more exact; the Modbus Messaging protocol) is just
a protocol, Modbus Plus is a complete system with a predefined
medium and Physical layer (OSI layer 1) implementation.
70
HART (Highway Addressable Remote Transducer) - The digital signal is made up of two frequencies— 1,200 Hz and 2,200
- The HART system (and its associated protocol) was originally Hz representing bits 1 and 0, respectively.
developed by Rosemount and is regarded as an open standard, - Sine waves of these two frequencies are superimposed on the direct
available to all manufacturers. current (dc) analog signal cables to provide simultaneous analog and
- Its main advantage is that it enables the retention of the existing 4- digital communications.
20mA instrumentation cabling whilst using, simultaneously, the same - Because the average value of the 1200/2400Hz sine wave
wires to carry digital information superimposed on the analog signal. superimposed on the 4-20mA signal (FSK signal) is always zero,
- HART is a hybrid analog and digital system, as opposed to most field hence, the 4-20mA analog information is not affected.
bus systems, that are purely digital. - The HART FSK signaling enables two-way digital communication and
- HART products generally fall into one of three categories: field makes it possible for additional information beyond just the normal
devices, host systems, and communication support hardware. process variable to be communicated to or from a smart field
· Field devices include transmitters, valves, and controllers. There instrument.
are HART transmitters for almost any standard process - The HART protocol communicates at 1200 bits per second without
measurement including pressure, temperature, level, flow, and interrupting the 4-20mA signal and allows a host application (master)
analytical (pH, ORP, density). to get two or more digital updates per second from a field device.
· Host systems range from small handheld communicators to PC - A minimum loop impedance of 230 W is required for communication.
based maintenance management software to large scale
distributed control systems.
· Communication support hardware includes simple single loop
modems as well as an assortment of multiplexers that allow a host
system to communicate with a large number of field devices.
- It uses a Frequency Shift Keying (FSK) technique based on the Bell
202 standard.
- HART can be used in either one of the two network configuration :
· Point-to-point mode
· Multi-drop mode
- The HART protocol has two formats for digital transmission of data:
· Poll/response mode
· Burst (broadcast) mode
- HART follows the basic Open Systems Interconnection (OSI)
reference model. The OSI model describes the structure and
elements of a communication system. The HART protocol uses a
reduced OSI model, implementing only layers 1, 2 and 7
71
HART Networks - All process values are transmitted digitally. In multidrop mode, all field
- HART devices can operate in one of two network configurations— device polling addresses are >0, and the current through each device
point-to-point or multidrop. is fixed to a minimum value (typically 4 mA).
- The connection can be in form of: - Thus, setting the smart device polling address to a number greater
- In conjunction with the 4-20mA current signal in point-to- than zero implies a multi-drop loop.
point mode, - Obviously the 4-20mA concept only applies to a loop with a single
- in conjunction with other field devices in multi-drop mode transducer; hence for a multi-drop configuration the smart device sets
- in point-to-point mode with only one field device its analog output to a constant 4mA and communicates only digitally.
broadcasting in burst mode
i) Point-To-Point:
- In point-to-point mode, the traditional 4–20 mA signal is used to
communicate one process variable, while additional process
variables, configuration parameters, and other device data are
transferred digitally using the HART protocol.
- The 4–20 mA analog signal is not affected by the HART signal and
can be used for control in the normal way.
- The HART communication digital signal gives access to secondary
variables and other data that can be used for operations,
commissioning, maintenance, and diagnostic purposes
Communication Modes
- The HART protocol can be used in various modes for communicating
information to/from smart field instruments and central control or
monitoring equipment
- These protocols are: Poll/response mode and Burst (broadcast)
mode.
72
controller (PLC), or a personal computer (PC). The secondary master HART Commands
can be a handheld terminal or another PC. - The HART command set provides uniform and consistent
- Slave devices include transmitters, actuators, and controllers that communication for all field devices.
respond to commands from the primary or secondary master. - Layer 7, the Application layer, consists of three classes of HART
- This mode, allows digital information from the slave device to be commands: Universal, Common Practice, and Device Specific
updated twice per second in the master. The 4-20 mA analog signals - Host applications may implement any of the necessary commands for
are continuous and can still carry the primary variable for control. a particular application.
i) Universal
- All devices using the HART protocol must recognize and support the
universal commands.
- Universal commands provide access to information useful in normal
operations (e.g., read primary variable and units).
ii) Common Practice
- Common practice commands provide functions implemented by
many, but not necessarily all, HART communication devices.
iii) Device Specific
- Device-specific commands represent functions that are unique to
each field device.
- These commands access setup and calibration information, as well as
information about the construction of the device. Information on
device-specific commands is available from device manufacturers.
ii) Burst Mode (Broadcast mode)
- This mode is an optional communication mode.
- In burst mode, the master instructs the slave device to continuously
broadcast a standard HART reply message (e.g., the value of the
process variable).
- The master receives the message at the higher rate until it instructs
the slave to stop bursting.
- This mode frees the master from having to send repeated command
requests to get updated process variable information
- Data update rates of 3-4 per second are typical with “burst” mode
communication and will vary with the chosen command. Burst mode
should be used only in single slave device networks.
73
Benefits of HART Communication
- The HART protocol is a powerful communication technology used to
exploit the full potential of digital field devices.
- Preserving the traditional 4–20 mA signal, the HART protocol extends
system capabilities for two-way digital communication with smart field
instruments.
- The HART protocol offers the best solution for smart field device
communications and has the widest base of support of any field
device protocol worldwide.
- More instruments are available with the HART protocol than any other
digital communications technology.
- Almost any process application can be addressed by one of the
products offered by HART instrument suppliers.
- Unlike other digital communication technologies, the HART protocol
provides a unique communication solution that is backward
compatible with the installed base of instrumentation in use today.
- This backward compatibility ensures that investments in existing
cabling and current control strategies will remain secure well into the
future.
- Other benefits include:
- Improved plant operations: HART-communicating devices
provide accurate information that helps improve the efficiency of
plant operations. During normal operation, device operational
values can be easily monitored or modified remotely.
- Operational flexibility: The HART protocol allows two masters
(primary and secondary) to communicate with slave devices and
provide additional operational flexibility. A permanently connected
host system can be used simultaneously, while a handheld
terminal or PC controller is communicating with a field device
- Instrumentation investment protection:. HART field instruments
protect the investment (existing plants and processes e.g. wiring,
analog controllers, smart instrumentation) by providing compatible
products with enhanced digital capabilities. These enhanced
capabilities can be used incrementally.
- Digital communication: A digital device provides advantages
such as improved accuracy and stability. The HART protocol
enhances the capabilities of digital instruments by providing
communication access and networking.
74
TOPIC 5: CALIBRATION SYSTEM International standards
Calibration - International standards are devices designed and constructed to the
- Calibration is the act or result of quantitative comparison between a specifications of an international forum.
known standard and the output of the measuring system. - They represent the units of measurements of various physical
- If the output-input response of the system is linear, then a single- quantities to the highest possible accuracy that is attainable by the
point calibration is sufficient. use of advanced techniques of production and measurement
- However, if the system response is non-linear, then a set of technology.
known standard inputs to the measuring system are employed for - These standards are maintained by the International Bureau of
calibrating the corresponding outputs of the system. Weights and Measures at Sevres, France. For example, the
- This refers to the act of evaluating and adjusting the precision and International Prototype kilogram, wavelength of Kr86 orange-red lamp
accuracy of measurement equipment. and cesium clock are the international standards for mass, length and
- Instrument calibration is intended to eliminate or reduce bias in an time, respectively.
instrument's readings over a range for all continuous values. - However, these standards are not available to an ordinary user for
· Precision is the degree to which repeated measurements under purposes of day-to-day comparisons and calibrations.
unchanged conditions show the same result
· Accuracy is the degree of closeness of measurements of a Primary standards
quantity to its actual true value. - Primary standards are devices maintained by standards
- In general use, calibration is often regarded as including the process organizations / national laboratories in different parts of the world.
of adjusting the output or indication on a measurement instrument to - These devices represent the fundamental and derived quantities and
agree with value of the applied standard, within a specified accuracy. are calibrated independently by absolute measurements.
- There are three main reasons for having instruments calibrated: - These are the most precise and accurate physical standards, which
1. To ensure readings from an instrument are consistent with other are derived from international standards.
measurements. - They specify the most stringent conditions and are used only at rare
2. To determine the accuracy of the instrument readings. intervals for comparison with secondary standards.
3. To establish the reliability of the instrument i.e. that it can be - One of the main functions of maintaining primary standards is to
trusted. calibrate / check and certify secondary reference standards.
- Calibration is carried out by agencies of the metrological service, - Like international standards, these standards also are not easily
using reference standards and base standards. available to an ordinary user of instruments for verification / calibration
- Governmental calibration is obligatory for measuring devices used in of working standards. These standards are not portable.
reporting material value, for government tests and expert
examinations, and for recording national and international sports Secondary standards
records, and also for calibration of the original base standards. - Secondary standards are basic reference standards employed by
- All other measuring devices are calibrated by the appropriate industrial measurement laboratories.
departments. - These are derived from primary standards. They are portable and are
often used as national standards.
Calibration Standards - They are less precise than primary standards but are still very precise.
- Calibration Standards of measurements can be classified according to - They are used at rare intervals to calibrate tertiary and working
their function and type of application as: standards. These are maintained by the concerned laboratory.
75
- One of the important functions of an industrial laboratory is the · Periodic calibration, which is conducted during use or storage of
maintenance and periodic calibration of secondary standards against a device;
primary standards of the national standards laboratory / organization. · Special calibration, which results from the need for immediate
- In addition, secondary standards are freely available to the ordinary verification of the good condition of a device; and
user of instruments for checking and calibration of working standards. · Inspection calibration, which is performed during metrological
inspections of enterprises, supply centers, warehouses, and
Working standards commercial organizations.
- These are high-accuracy devices that are commercially available and
are duly checked and certified against either the primary or Calibration Concepts
secondary standards. - There are two fundamental operations involved in calibrating any
- For example, a standard cell and a standard resistor are the working instrument:
standards of voltage and resistance, respectively. · Testing the instrument to determine its performance,
- Working standards are very widely used for calibrating general · Adjusting the instrument to perform within specification.
laboratory instruments, for carrying out comparison measurements or - Testing the instrument requires collecting sufficient data to calculate
for checking the quality (range of accuracy) of industrial products. the instrument's operating errors.
- This is typically accomplished by performing a multiple point test
Calibration Procedure procedure that includes the following steps.
- The process of calibration involves the estimation of uncertainty · Using a process variable simulator that matches the input type
between the values indicated by the measuring instrument and the of the instrument, set a known input to the instrument.
true value of the input. · Using an accurate calibrator, read the actual (or reference)
- Calibration may be called for: value of this input.
· a new instrument
· Read the instrument's interpretation of the value by using an
· after an instrument has been repaired or modified
accurate calibrator to measure the instrument output.
· when a specified time period has elapsed
- By repeating this process for a series of different input values, you
· when a specified usage (operating hours) has elapsed
can collect sufficient data to determine the instrument's accuracy.
· before and/or after a critical measurement
- Depending upon the intended calibration goals and the error
· after an event, for example
calculations desired, the test procedure may require from 5 to 21 input
o after an instrument has had a shock, vibration, or has been
points.
exposed to an adverse condition which potentially may
- The first test that is conducted on an instrument before any
have put it out of calibration or damage it
adjustments are made is called the As-Found test.
o sudden changes in weather
- If the accuracy calculations from the As-Found data are not within the
· whenever observations appear questionable or instrument
specifications for the instrument, then it must be adjusted.
indications do not match the output of surrogate instruments
- Adjustment is the process of manipulating some part of the
· As specified by a requirement, e.g., customer specification,
instrument so that its input to output relationship is within
instrument manufacturer recommendation.
specification. For conventional instruments, this may be zero and
- There are four types of calibration:
span screws.
· Primary calibration, which is performed when a measuring - For HART instruments, this normally requires the use of a
device is put into circulation from production or returned from communicator (handheld or PC) to convey specific information to the
repair; instrument.
76
- After adjusting the instrument, a second multiple point test is required difficult error to measure since it requires great care in the collection
to characterize the instrument and verify that it is within specification of data, and it typically requires at least 9 data points to develop
over the defined operating range. This is called the As-Left test. reasonable curves for the calculations. Thus a technician must
collect at least five data point traversing in one direction, followed
Error Calculations by at least four more in the opposite direction, so that each leg has
- Error calculations are the principal analysis performed on the As- five points, including the inflection point.
Found and As-Left test data. · If any of these errors is greater than or equal to the desired accuracy
- There are several different types of error calculations, most of which for a test, then the instrument has failed and must be adjusted.
are defined in the publication "Process Instrumentation Terminology".
- They are usually expressed in terms of the percent of ideal span Hand-Held Device
which is defined as: - This is a mobile/portable device which is a small, handheld computing
% span = (reading - low range) / (high range - low range) x 100 device, typically having a display screen with touch input and/or a
- The first step in the data analysis is to convert the engineering unit miniature keyboard and weighing less than 0.91kg.
values for input and output into percent of span. Then for each point, - A handheld computing device has an operating system (OS), and can
calculate the error, which is the deviation of the actual output from the run various types of application software.
expected output. - Most handheld devices can also be equipped with Wi-Fi, Bluetooth,
· The Maximum error is the most common value used to evaluate and GPS capabilities that can allow connections to the Internet and
an instrument's performance. If a computer program is not used to other Bluetooth-capable devices, such as an automobile or a
analyze the test data, it is often the only error considered and is microphone headset.
taken to be the largest deviation from the ideal output. - It delivers messages and performance data to the operator and is
By itself, the maximum error does not give a complete indication of used to support installation, configuration, provisioning, calibration
an instrument's performance. With the availability of computer and maintenance and network performance.
software to facilitate calculations, other error values are gaining
popularity including zero error, span error, linearity error, and Advantages of handheld calibration
hysteresis error. · No process interruption
· Zero error is defined as the error of a device when the input is at o The main advantage of handheld calibration over other traditional
the lower range value. methods is that it allows meter verifications to be carried out
· Span error is defined as the difference between the actual span directly in the process without additional costs for removal of the
and the ideal span, expressed as a percentage of the ideal span. instrument or process interruptions.
· Linearity error is a measure of how close the error of the o As a result, downtime is minimized and critical processes can be
instrument over its operating range approaches a straight line. verified and optimized efficiently.
Unfortunately, there are three different methods used to calculate o By supporting and facilitating regular on-site verification, handheld
this, resulting in an independent linearity, a terminal based linearity, equipment helps users to quickly diagnose any failures and to
and a zero based linearity. In practice, it is best to choose one swiftly remedy the situation.
method and apply it consistently. Note that the calculation of
linearity error is also greatly facilitated by a curve fit of the error · Time and cost savings
data. o Device verification using handheld equipment requires a
· Hysteresis error is a measure of the dependence of the output at a maximum of 15-30 minutes per instrument.
given input value upon the prior history of the input. This is the most
77
o The device does not need to be sent away to the calibration - Handheld equipment allows electronic verification and calibration in
centre and production can, therefore, resume faster than with any situations where inline calibration is essential but mobile rigs may be
other method. impractical.
o After the process has been completed, the direct uploading of the - Internal procedures or official requirements and conformity reasons
device parameters avoids time-consuming configuration. might also stipulate that certain instruments must be checked more
o This method helps achieve optimum availability of plant frequently than others to verify that they are working correctly in the
equipment. process.
o The production does not need to be suspended resulting in
considerable savings. Calibrating a Conventional Instrument
o What’s more, frequent test functions allow costly calibration cycles - For a conventional 4-20 mA instrument, a multiple point test that
to be extended. stimulates the input and measures the output is sufficient to
characterize the overall accuracy of the transmitter.
· Complete on-site verification - The normal calibration adjustment involves setting only the zero value
o Handheld electronic verification not only checks the accuracy of and the span value, since there is effectively only one adjustable
the device under test, but also performs a complete check of the operation between the input and output as illustrated below.
entire measurement chain.
78
- In order to do a calibration of a HART device, a traceable metrological
reference device is needed, which can be a handheld calibrator
- Configuration means using the digital communication protocol as a
way to change settings inside the field device from the device or from
a remote location.
- Configuration can be done with a PC and configuration software or a
handheld communicator.
- It is important to remember that although a communicator can be
used for configuration and checking diagnostic information, it cannot
be used for metrological calibration to check the measurement (PV)
accuracy of a field device.
- Configuring parameters of a HART transmitter with a communicator is
not metrological calibration and does not assure accuracy.
- For a real metrological calibration, a traceable reference standard is
always needed.
- Calibration procedure for a HART instrument is significantly different
than for a conventional instrument. The specific calibration
requirements depend upon the application.
- If the application uses the digital representation of the process
variable for monitoring or control, then the sensor input section must
be explicitly tested and adjusted.
- Note that this reading is completely independent of the milliamp
output, and has nothing to do with the zero or span settings.
- The PV as read via HART communication continues to be accurate
even when it is outside the assigned output range.
- If the current loop output is not used (that is the transmitter is used as
a digital only device), then the input section calibration is all that is
required.
- If the application uses the milliamp output, then the output section
must be explicitly tested and calibrated.
- Note that this calibration is independent of the input section, and
again, has nothing to do with the zero and span settings.
- If there is a desire to validate the overall performance of a HART
transmitter, run a Zero and Span test just like a conventional
instrument.
- However, passing this test does not necessarily indicate that the
transmitter is operating correctly.
79