PLC Topic Three 5
PLC Topic Three 5
Introduction
- In modern manufacturing and industrial processes, mining industries, public and private
utilities, leisure and security industries telemetry is often needed to connect equipment and
systems separated by large distances.
- Control system architecture can range from simple local control to highly redundant distributed
control. The SCADA system applies to facilities that are large enough that a central control
system is necessary.
- SCADA refers to the combination of telemetry and data acquisition. It encompasses the
collecting of the information, transferring it back to the central site, carrying out any necessary
analysis and control and then displaying that information on a number of operator screens or
displays. The required control actions are then conveyed back to the process.
- SCADA is a widely distributed computerized system primarily used to remotely control and
monitor the conditions of field based assets from a centralized location.
- The PLC is still one of the most widely used control systems in industry. As need to monitor
and control more devices in the plant grew, the PLCs were distributed and the systems
became more intelligent and smaller in size. PLCs and DCS (distributed control systems) are
used
2. Communication network / system – used to transfer data between field data interface
devices and control units and the computers in the SCADA host computer (MTU)
- This is intended to provide the means by which data can be transferred between the central
host computer server and field based RTU.
- Communication network refers to the equipments needed to transfer data to and from different
sites.
- The medium used can either be cable, telephone or radio
- The way the SCADA system network (topology) is set up can vary with each system but there
must be uninterrupted, bidirectional communication between the MTU and the RTU for a
SCADA or data acquisition system (DAS) to function properly.
- This can be accomplished in various way i.e private wire lines, underground cables, telephone
radio, modern, microwave dishes, satellite and other atmospheric means and many times,
system employ more than one means of communicating to the remote site.
- Communication systems used for SCADA are often split into two distinct part: WAN and LAN.
- The interface between the two parts is commonly achieved through some form of multiplexing.
- Multiplexing allows different data streams to share single data link. It combines communication
paths to and from many RTUs into a single bit stream, usually using Time Division Multiplexing
(TDM).
- It may itself be a SCADA processing device that manages the local network and not only
combines data, but also reduces the amount of data that be interchanged within the central
host.
5. SCADA software
- SCADA software can be divided into two types: open and proprietary.
- Proprietary software often is configured for a specific hardware platform and may not
interface with the software or hardware produced by competing vendors.
- Commercial off-the shelf (COTS)/open software are more flexible, and will interface with
different types of hardware and software.
- The focus of proprietary software is on process and control functionality while COTS software
emphasizes on compatibility with a variety of equipment and instrumentation.
- Software products typically used within a SCADA system are as follows:-
Central host computer operating system:- software used to control the central
host computer hardware.
Operator terminal operating system – Software used to control the central host
computer hardware at the operators terminal. It contributes to the networking of the
central host and operator’s terminal.
Applications – They are of two types; central host computer application and
operator terminal applications. These handles transmitted and reception of data to
and from the RTU and central computer. It also provides the GU/ which offers mimic
screens, alarm pages trend.
Communication protocol drives: - required to control the translation and
interpretation of the data between ends of the communication links in the systems.
Data acquisition
- This is the process of sampling signals that measure real world physical conditions and
converting the resulting samples into digital numerical values that can be manipulated by a
computer.
- Data acquisition within SCADA system is accomplished first by the RTU scanning the field
data interface devices connected to the RTU.
- The time to perform this task is called the scanning internal. The MTU scans RTU to access
data in the process referred to as polling the RTU.
- Some systems allow the RTU to transmit field values and alarms to the central host without
being processed by the central host.
- The components of data acquisition systems include:
Sensors that converts physical parameters to electrical signals
Signal conditioning circuitry to convert sensor signals into a form that can be converted
to digital values e.g implication, alternation multiplexing.
Analog to digital converters, which converts conditioned signals to digital values.
Data acquisition hardware acts as the interface between the computer and the outside
world. It primarily functions as a device that digitizes incoming signal so that the computer
can interpret them.
Benefits of SCADA
i) Improved operation of the plant or process resulting in savings due to optimization of the
system.
ii) Reduces the operating and maintenance cost hence maximize the profits.
iii) Maximize productivity, ensure continuous production and increased productivity of the
personnel.
iv) Improved safety of the system due to better information and improved control.
v) Protection of the plant equipment.
vi) Safeguarding the environment from a failure of the system.
vii) Enhances reliability and robustness of critical industrial processes.
viii) Improved energy savings due to optimization of the plant.
ix) Improved and quicker receipt of data so that clients can be invoiced more quickly and
accurately.
x) Government regulations for safety and metering of gas (for royalties & tax etc).
a) Local b) Centralized
Defence in Depth
- Where a single protection measure has been deployed to protect a system, there is a risk that
if a weakness in that measure is identified and exploited there is effectively no protection
provided.
- No single security measure itself is foolproof as vulnerabilities and weaknesses could be
identified at any point in time. In order to reduce these risks, implementing multiple protection
measures in series avoids single points of failure.
- In order to safeguard the process control system from electronic attacks (e.g. hackers, worms
and viruses), it may be insufficient to rely on a single firewall, designed to protect the corporate
IT network.
- A much more effective security model is to build on the benefits of the corporate firewall with
an additional dedicated process control firewall and deploy other protection measures such
as anti-virus software and intrusion detection
Remote access
- Maintain an inventory of all remote access connections and types (e.g. virtual private network
or modems).
- Ensure that a valid business justification exists for all remote access connections and keep
remote connections to a minimum.
- Implement appropriate authentication mechanisms (e.g. strong authentication) for remote
access connections.
- Implement appropriate procedures and assurance mechanisms for enabling and disabling
remote access connections.
- Ensure that remote access computers are appropriately secured (e.g. anti-virus, anti- spam
and personal firewalls).
Anti-virus:
- Protect process control systems with anti-virus software on workstations and servers.
- Where anti-virus software cannot be deployed other protection measures should be
implemented (e.g. gateway anti-virus scanning or manual media checking)
System hardening
- Undertake hardening of process control systems to prevent network based attacks.
- Remove or disable unused services and ports in the operating systems and applications to
prevent unauthorized use.
- Understand what ports are open and what services and protocols used by devices (especially
embedded devices such as PLCs and RTUs). This could be established by a port scan in a
test environment. All unnecessary ports and services should be disabled (e.g. embedded web
servers).
- Ensure all inbuilt system security features are enabled.
- Where possible restrict the use of removable media (e.g. CDs, floppy disks, USB memory
sticks etc.) and if possible removable media should not be used. Where it is necessary to use
removable media then procedures should be in place to ensure that these are checked for
malware prior to use.
Physical security
- Deploy physical security protection measures to protect process control systems and
associated networking equipment from physical attack and local unauthorized access.
- A combination of protection measures is likely to be required which could include, drive locks,
tamper proof casing, secure server rooms, access control systems and CCTV.
Security patching
- Implement processes for deployment of security patches to process control systems.
- These processes should be supported by deployment and audit tools.
- The processes should make allowance for vendor certification of patches, testing of patches
prior to deployment and a staged deployment process to minimize the risk of disruption from
the change.
- Where security patching is not possible or practical, alternative appropriate protection
measures should be considered.
Introduction
- Industrial communication refers to the wide range of hardware and software products and
protocols used to communicate between standard computer platforms and devices used in
industrial automation.
- Although a communication circuit can involve only two pieces of equipment with a circuit
between them, the term network typically refers to connecting many devices together to permit
sharing of data between devices over a single or redundant circuit.
- The industrial automation systems are often implemented as an open distributed architecture
with communication over digital communication networks.
- It is now common for users connected to a local area network to communicate with computers
or automation devices on other local area networks via gateways linked by a wide area
network.
- As the industrial automation systems becomes large and the number of automation devices
increases, it has become very important for industrial automation to provide standards which
make it possible to interconnect many different automation devices in a standard way.
- Considerable international standardization efforts have been made in the area of local area
networks. The Open Systems Interconnection (OSI) standards permit any pair of automation
devices to communicate reliably regardless of the manufacturer.
- By definition, an industrial network requires geographical distribution of the physical
measurement I/O and sensors or functional distribution of applications. Most industrial
networks transfer bits of information serially.
- Serial data transfer has the advantage of requiring only a limited number of wires to exchange
data between devices. With fewer wires, we can send information over greater distances.
Because industrial networks work with several devices on the same line, it is easier to add a
new device to existing systems.
- To make all this work, our network must define a set of rules – a communication protocol -
- to determine how information flows on the network of devices, controllers, PCs, and so on.
- With improved communication protocols, it is now possible to reduce the time needed for the
transfer, ensure better data protection, and guarantee time synchronization, and real-time
deterministic response in some applications.
- Industrial networks also ensure that the system sends information reliably without errors and
securely between nodes on the network.
Network levels
- The industrial automation systems can be very complex, and it is usually structured into
several hierarchical levels. Each of the hierarchical level has an appropriate communication
level, which places different requirements on the communication network.
- Industrial networks may be classified in several different categories based on functionality:
field-level networks (sensor, actuator or device buses), control-level networks (control buses)
and information-level networks
Field level
- The lowest level of the automation hierarchy is the field level, which includes the field devices
such as actuators and sensors.
- The elementary field devices are sometimes classified as the element sublevel. The task of
the devices in the field level is to transfer data between the manufactured product and the
technical process.
- The data may be both binary and analogue. Measured values may be available for a short
period of time or over a long period of time. For the field level communication, parallel, multi-
wire cables, and serial interfaces such as the 20mA current loop has been widely used from
the past.
- The serial communication standards such as RS232C, RS422, and RS485 are most
commonly used protocols together with the parallel communication standard IEEE488.
- Those point-to-point communication methods have evolved to the bus communication
network to cope with the cabling cost and to achieve a high quality communication.
- Field-level industrial networks are a large category, distinguished by characteristics such as
message size and response time.
- In general, these networks connect smart devices that work cooperatively in a distributed,
time-critical network. They offer higher-level diagnostic and configuration capabilities
generally at the cost of more intelligence, processing power, and price.
- At their most sophisticated, fieldbus networks work with truly distributed control among
intelligent devices like FOUNDATION Fieldbus.
- Common networks included in the devicebus and fieldbus classes include CANOpen,
DeviceNet, FOUNDATION Fieldbus, Interbus-S, LonWorks, Profibus-DP, and SDS.
- Nowadays, the fieldbus is often used for information transfer in the field level. Due to timing
requirements, which have to be strictly observed in an automation process, the applications
in the field level controllers require cyclic transport functions, which transmit source
information at regular intervals.
- The data representation must be as short as possible in order to reduce message transfer
time on the bus.
Control Level
- At the control level, the information flow mainly consists of the loading of programs,
parameters and data.
- In processes with short machine idle times and readjustments, this is done during the
production process. In small controllers it may be necessary to load subroutines during one
manufacturing cycle.
- This determines the timing requirements. It can be divided into two: cell and area sublevels.
i) Cell sublevel:
- For the cell level operations, machine synchronizations and event handlings may require short
response times on the bus. These real-time requirements are not compatible with time
excessive transfers of application programs, thus making adaptable message segmentation
necessary.
- In order to achieve the communication requirements in this level, local area networks have
been used as the communication network. After the introduction of the CIM concept and the
DCCS concept, many companies developed their proprietary networks for the cell level of an
automation system.
- The Ethernet together with TCP/IP (transmission control protocol/internet protocol) was
accepted as a de facto standard for this level, though it cannot provide a true real-time
communication.
- Many efforts have been made for the standardization of the communication network for the
cell level.
- The IEEE standard networks based on the OSI layered architecture were developed and the
Mini-MAP network was developed to realize a standard communication between various
devices from different vendors. Some fieldbuses can also be used for this level.
- Control-level networks are typically used for peer-to-peer networks between controllers such
as programmable logic controllers (PLCs), distributed control systems (DCS), and computer
systems used for human-machine interface (HMI), historical archiving, and supervisory
control.
- Control buses are used to coordinate and synchronize control between production units and
manufacturing cells.
- Typically, ControlNet, PROFIBUS-FMS and (formerly) MAP are used as the industrial
networks for controller buses.
- In addition, we can frequently use Ethernet with TCP/IP as a controller bus to connect upper-
level control devices and computers.
Information level
- The information level is the top level of a plant or an industrial automation system.
- The plant level controller gathers the management information from the area levels, and
manages the whole automation system.
- At the information level there exist large scale networks, e.g. Ethernet WANs for factory
planning and management information exchange.
- Ethernet networks are used as a gateway to connect other industrial networks.
- With respect to management Information System Communication in automated system, there
are three types of networks used:
o Local Area Network (LAN)
o Wide Area Network (WAN)
o Metropolitan area network (MAN)
Networks Models/Layers
- Network model defines a set of network layer and how they interact. There are several
different network models depending on what organization/industry want.
- The most important are:
i) The TCP / IP model
ii) OSI network model
1. The TCP/IP model
- TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication
language or protocol of the Internet. It can also be used as a communications protocol in a
private network (either an intranet or an extranet).
- TCP/IP is the de facto global standard for the Internet (network) and host–to–host (transport)
layer implementation of internet work applications because of the popularity of the Internet.
- The TCP/IP (Transmission Control Protocol / Internet) is a layer protocol where it defines 4
layers’
i) Physical layer
- This is the lowest layer which describes the way actual data in the form of symbols that are
sent over a medium such as copper wire or fibre optic cabling. Item like signal level symbol
representation and connector pinout are defined at this layer. The main functions are
a) Hardware specification – the details of the physical cables, network interface cards,
wireless radios etc are part of this layer.
b) Encoding and signaling – How are the bits encoded in the medium is also decided by
this layer.
c) Data transmission and reception: the transfer of each bit of data and assures the
transmission of each bit with a high probability.
d) Topology and network design: the type of network topologies to be used and which part
of the network in the routes going to be placed, where the switches will be used etc.
v) Session layer
- The layer is concerned with the establishment and termination of communication sessions
between processors in host computers.
- It also ensures that the data transfer starts from where it breaks, keeping it transparent to the
end user.
- Strictly speaking, a network requires only layers 1, 2, and 7 of the protocol model to operate.
- In fact, many device bus networks use only these three layers. The other layers are added
only as more services are required (e.g., error-free delivery, routing, session control, data
conversion, etc.).
- Most of today’s local area networks contain all or most of the OSI layers to allow connection
to other networks and devices.
Advantages:
• It provides wide variety of choice.
• It does not depend or rely on a specific computer system.
• It interprets the product functionality at each-stage.
• It encrypts the data for security purpose.
• It is easy to add multiple-network models.
Disadvantages:
• Many applications do not require/need the data integrity, which is provided by OSI-model.
• In order to fast set up OSI requires agreement between three-parties: users & service
provider.
• Complex.
• This model is not adapted at all to telecommunication applications on computer.
3. Field bus model
- Due to complexity of the OSI model, modification has been done on the industrial networks,
where only three layers are left.
- The resulting fieldbus is referred to as a 3 – layer architecture. These layers are:-
o Application layer
o Data link layer
o Physical layer
- Several characteristics and functions in the data link layer are key to the distributed real time
control capabilities of fieldbus.
a) The data link layer is based on a token passing protocol.
b) The Link Active Scheduler (LAS) is a centralized device that acts as the arbitrator of the
bus.
c) The LAS executes a schedule that makes possible deterministic communication.
d) The LAS distributes time to the network to permit all devices to share the same sense of
time.
- The user application layer defines blocks that represent the functions and data available in a
device.
- Rather than interface to a device through a set of commands as commonly used with
communication protocols, fieldbus user interacts with device through a set of blocks that
define device capabilities in a standardized way.
- The data link layer has important aspect which is medium access control.
Physical layer
Physical layer is concerned with transmitting raw bits over a communication channel.
Types of medium
Medium can be classified into two categories
a) Guided media – means that signals is guided by the presence of physical media i.e.
signals are under control and remains in the physical wire e.g. copper wire
b) Unguided media – means that there is no physical path for the signal to propagate. This
is done through electromagnetic waves.
Communication links
In a network nodes are connected through links.
The communication through links can be classified as
i) Simplex – communication can take place only in one direction e.g. radio, T.V
ii) Half duplex – communication can take place in one direction at a time. Suppose node
A and B are connected, then half duplex communication means that at a time data can
flow from A to B or from B to A but not simultaneously.
iii) Full duplex – communication can take place simultaneously in both direction mobile
phone.
Media standard
Industry standard for communications media define both the physical and electrical (or optical)
characteristics of both the conductors and the connectors used to mate them to communication
ports.
Some common network conductor, physical standards and then characteristics are listed below:-
Twisted pair
- Twisted pair cabling is a type of wiring in which two conductors of a single circuit are twisted
together for the purposes of canceling out electromagnetic interference (EMI) from external
sources.
- The wires are twisted together in a helical form and the purpose of twisting is to reduce
crosstalk interference between neighbouring pairs.
- Twisted pair is much cheaper than coaxial cable but it is susceptible to noise and
electromagnetic inference and attenuation is large.
- When electrical current flow through a wire, it creates a small, circular magnetic field around
the wire.
- When two wires in an electrical circuit are placed close together, their magnetic fields are the
exact, opposite of each other.
- Thus the two magnetic fields cancel each other out. They also cancel out any outside
magnetic fields. Twisting the wires can enhance this cancellation effect.
- Twisted pair can be further classified into two categories:
o Unshielded twisted pair (UTP)
o Shielded Twisted Pair (STP)
Connectors use either T568A or T568B pin assignment, although performance is comparable
provided both ends of a cable are the same. RJ45 or 8P8C connector is clipped from left to right
with the plastic latching tab facing away from the viewer. (8P8C – eight positions, eight
conductors)
Optical fibre
- It’s a glass or plastic fibre designed to guide light along its length. The optic fiber therefore
acts as a conduit (or wave-guide) for pulses of light generated by a light source.
- The light source is typically either an injection laser diode (ILD) or LED operating at
wavelengths of 0.85, 1.2 or 1.5 µm (micrometers). The optic fiber is coated with a protective
colored sheath to provide stability and allow easy identification.
- Fibre optics is widely used in fibre optic communication, which permits transmission over
longer distance and at higher data rates.
- Light is kept in the core of the optical fibre by total interval reflection. This causes the fibre to
act as a wave guide.
- A transverse mode of a beam of electromagnetic radiation in a particular intensity pattern of
radiation measure in a plane perpendicular (i.e transverse) to the propagation direction of the
beam.
- Transverse modes occur because of boundary condition imposed on the wave by the wave
guide.
- Fiber optic cables offer the following advantages over other types of transmission media:
o Light signals are impervious to interference from EMI or electrical crosstalk
o Light signals do not interfere with other signals
o Optical fibers have a much wider, flatter bandwidth than coaxial cables and equalization
of the signals is not required
o The fiber has a much lower attenuation, so signals can be transmitted much further than
with coaxial or twisted pair cable before amplification is necessary
o Optical fiber cables do not conduct electricity and so eliminate problems of ground loops,
lightning damage and electrical shock
o Fiber optic cables are generally much thinner and lighter than copper cables
o Fiber optic cables have greater data security than copper cables
- Fibres which support only a single mode are called single mode fibre while fibres which
support many propagation paths or transverse modes are called multimode fibre.
Multimode fibre
- Multimode fibre supports many propagation path end generally have a larger diameter core.
- It is used for short distance communication links or for application when high power must be
transmitted.
- As each mode travels at its own propagation velocity, multimode fibre suffers from modal
dispersion which limits the maximum length a signal can be transmitted through it.
- There are two types:
i) Step Index multimode
ii) Graded Index multimode
i) Step Index Multimode fibre
- A refractive index profile characterized by a uniform refractive index within the core or a sharp
decrease in refractive Index at the core – clad interface.
- In a step index multimode fibre, rags of light are guided along the fibre core by total internal
reflection.
- Rays that meet the core-cladding boundary at a high angle, greater than the critical angle for
these boundaries are completely reflected.
Wireless media
- Wireless media carry electromagnetic signal at radio and microwave frequencies that
represent the binary digits of data communications.
- Wireless networks are useful for the following situation:
o Spaces where cabling would be impossible or inconvenient
o Temporary installations.
- Transmission and reception are achieved using an antenna transmitter sends out the EM
signal into the medium. Receiver picks up the signal from the surrounding medium.
- Directional Transmission – Transmitter sends out a focused EM beam. Transmitter end
receiver antennae must be carefully aligned. It is more suitable for higher frequency signal.
- Omni directional transmission – Transmitted signals spread out in all directions. It may be
received by many antennae
- There are several ways of transmission
a) Radio – This is effective for short ranges and is in expensive and easy to install.
Depending on frequency radio offers different bandwidth. Wireless local area networks
use a high-frequency radio technology similar to digital cellular and a low-frequency radio
technology. Wireless LANs use spread spectrum technology to enable communication
between multiple devices in a limited area. IEEE 802.11 defines a common flavor of open-
standards wireless radio-wave technology known as Wifi.
Some of limitations are: can create interference with communication devices, susceptible
to eavesdropping.
b) Terrestrial microwave – two antennae are used for communication. A focused beam
emerges from an antennae and is received by the other antenna, provided that antenna’s
should be facing each other with no obstacle in between due to curvature of earth
terrestrial microwave can be used fro long distance communication with high bandwidth.
Terrestrial microwave communication uses Earth-based transmitters and receivers
resembling satellite dishes. Terrestrial microwaves are in the low-gigahertz range, which
limits all communications to line-of-sight. Relay stations are spaced approximately 48 km
(30 mi) apart.
c) Satellites – satellite acts as a switch in sky. On earth VSAT (very small aperture terminal)
are used to transmit and receive data from satellite. Satellites communicate via microwave
radio waves, which are not deflected by the Earth's atmosphere. The satellites are
stationed in space, typically in geosynchronous orbit 35,400 km (22,000 mi) above the
equator. These Earth-orbiting systems are capable of receiving and relaying voice, data,
and TV signals.
d) Cellular radio technology: defined cellular service areas around a radio transreceiver
and computerized control. It uses several radio communications technologies. The
systems divide the region covered into multiple geographic areas. Each area has a low-
power transmitter or radio relay antenna device to relay calls from one area to the next
area.
e) Infrared communication: can transmit signals for small distances, typically no more than
10 meters. In most cases, line-of-sight propagation is used, which limits the physical
positioning of communicating devices.
Wireless LAN
- A Common wireless data implementation is enabling devices to wirelessly connect via a LAN.
- In general, a wireless LAN requires the following network devices:-
a) Wireless access point (WAP) – concentrates the wireless signals from users and
connects usually through a copper cable, to the existing copper based network
infrastructure such as Ethernet.
b) Wireless NIC adapter – provides wireless communication capability to each network host.
- There are a number of WLAN Ethernet-based standards used:
o IEEE 802:11a - Operates in the 5 GHZ frequency band at speed of up to 54 mbps. It
covers smaller areas and less penetrating building structures.
o IEEE 802:11b - operates in the 2.4 GHZ frequency band at speed of up to 11mbps. It
has longer range and able to penetrate building structures.
o IEEE 802.11n – operates in 2.4 GHz frequency band ac data rates 100 to 210 mbps
with distance range of 70m.
Standard Max Speed Typical Range
802.11a 54 Mbps 50 m
802.11b 11 Mbps 100m
802.11g 54 Mbps 100m
802.11n 100 Mbps 100m +
LAN Topologies
- A network topology is the basic design of a computer network.
- Networking is a collection of computers or other hardware devices that are connected together
either physically or logically, using special hardware and software, to allow them to exchange
information and cooperate.
- Topology which is a pattern of interconnection among nodes influences a networks cost and
performance.
- There are several topologies used:
o Point to point topology
o Bus topology
o Star topology
o Ring topology
o Mesh topology
1. Star topology
It is a physical topology in which a multiple nodes are connected to a central component
known as Hub. Signals are transmitted and received through the hub. The hub may actually
be a file server, central computer that contains a centralized file and control system with all its
nodes attached directly to the server.
Advantages
- Network runs even if one host fails
- More suitable for larger network
- It is easier to add or remove nodes, and to modify the cable layout
- Network administration and error detection is easier because is isolated to central node.
Disadvantages
- Installation costs are high because each node needs to be connected to the central switch
- If the hub fails the entire network fails
- Broadcasting and multicasting is not easy.
2. Bus topology
Bus consists of a single cable called a backbone that connects all workstation on the network
using a single line.
All transmissions must pass through each of the connected devices to complete the desired
request.
Each workstation has its own individual signal that identifies it and allows for the requested
data to be returned to the correct originator
Advantages
- Broadcasting and multicasting is much simpler
- It is simple and flexible
- It is easy to extend a bus topology by adding or removing nodes from a bus
- Least expensive since less amount of cabling is required and no network switches are
required.
Disadvantages
- Limited in size and speed
- There can be a security problem, since every node may see every message – even those that
are not destined for it , sniffing is easier
- Diagnosis / troubleshooting (fault-isolation), can be difficult, since the fault can be anywhere
along the bus.
- There is no automatic acknowledgment of messages, since messages get absorbed at the
end of the bus and do not return to the sender.
- The bus cable can be a bottleneck when network traffic gets heavy. This is because nodes
can spend much of their time trying to access the network.
3. Ring topology - All the nodes in a ring network are connected in a closed circle of cable
messages that are transmitted travel around the ring until they reach the computer that they
are addressed to the signal being refreshed by each node.
In a ring topology, the network signal is passed through each network card of each device and
passed on to the net device
Advantages
- Has minimum cable requirement
- Each node can regenerate the signal
- Broadcasting and multicasting is simple since you just need to send out one message.
- The message can be automatically acknowledged.
Disadvantages
- Failure of one node brings the whole network down
- Diagnosis/troubleshooting (fault isolation is difficult)
- Adding or removing nodes disrupts the network
Mesh topology
This is a topology where each node must not only capture and disseminate its own data but also
serve as a relay for other nodes i.e. it must collaborate to propagate the data in the network.
A mesh network whose nodes are all connected to each other is a fully connected network.
Advantages
- Point to point line configuration makes identification and isolation of faults easy.
- Network can be easily expanded
- If one node fails, other continue to work
- It is more secure
Disadvantages
- Quite expensive due to cabling and installation cost is high.
.
ii) Bridges
- A bridge is a device that connects two or more local area network or two or more segments
of the same network.
- Bridge connects two networks (e.g 10 BASET Ethernet and Local Tank Connection) so that
they can share information with each other.
- In addition to connecting networks, they filter information so that network traffic intended for
one portion of the network does not congest the rest of network.
- Bridges may consist either standalone hardware devices or of software running on a client or
server.
- Like switches, bridges learn the MAC addresses of all connected clients, servers and
peripherals and associate each address with a bridge port (network connection).
- When a bridge (or switch) receives an incoming frame, it opens and reads its destination MAC
address.
- If the port that will receive the frame is different from the port connected to the sender, the
bridge drops the frame.
- If the bridge cannot determine which port is associated with a destination address, it passes
the frame along to all ports.
iii) Hubs
- This is a small box that gathers the signal from each individual device optionally amplifies
each signal and then sends the signal out to all other connected devices.
- Amplification helps to ensure that devices on the network receive variable information. Hubs
are also called concentrators or repeaters.
- They come in various sizes, 12 port or 24 port etc. All the client, servers and peripherals
connected to a hub (or to a set of interconnected hubs) share the bandwidth (data delivery
capacity) of that network.
- They form a single collision domain – on area of an Ethernet network in which data sent to or
from a device may potentially collide with the data from other devices.
iv) Switches
- Like a hub, an Ethernet switch is a device that gathers the signals from devices that are
connected to it, and then regenerates a new copy of each signal.
- Switches are more powerful than hubs and can substantially increase the network
performance
- Most common switches operate by learning the MAC addresses of all connected clients,
servers and peripheral and associating each address with one of its ports.
- When a switch receives an incoming signal it creates a temporary circuit between the sender
and receiver.
- The temporary circuit provides two important benefits.
o The circuit allows the sender and receiver momentarily to exchange information
without intrusion from other devices on the network.
o The circuit ensures the information travels directly between the communicating
computers.
- The switch installed should be compatible with physical network and data link protocols.
v) Routers
- Like bridges, routers are devices whose primary purpose is to connect two or more networks
and to filter network signals so that only desired information travels between them.
- Routers regulate network traffic more precisely and are aware of many possible paths across
the network and can choose the best one for each data packet to travel.
- They operate primarily by examining incoming data for its network routing and transport
information.
- This information includes the source and destination network routing addresses.
- Routers can be programmed to prevent information from being sent to or received from certain
networks or computers based on all or part of their network routing addresses.
vi) Multiplexers
- Multiplexers (mux) acts as both concentrators and contention devices that enable multiple
relatively low speed terminal devices to share a single high capacity circuit (physical path)
between two points in a network.
vii) Modems
- These are devices that allow digital data signals to be transmitted across an analogue link.
- Modem stand for Modulator Demodulator, and it changes signal to an analogue frequency
and send this tone across the analogue link.
- At the other end, another modem receives the signal and converts it back to digital.
x) Fire wall
- A firewall is part of a computer system or network that is designed to block unauthorized
access while permitting actual communication.
- It is also a device or set of devices configured to permit, deny, encrypt, decrypt or proxy all
computer traffic between difficult security. Domain based upon a set of rules and other criteria.
- It can be implemented in both hardware or software or a combination of both.
- Firewalls can be an effective means of protecting a local system or network of systems from
network based security threats while at the same time affording access to the outside world
via wide area networks and the internet.
- Firewall provides an additional layer of defense, insulating the internal systems from external
networks.
- Firewall has the following capabilities.
o A firewall defines a single choke point that keeps unauthorized user out of the
protected network, prohibits potentially vulnerable services from entering or leaving
the network and provides protection from various kinds of IP Spooting and routing
attacks.
o A firewall provider a location for monitoring security related events. Audit and alarm
can be implemented on the firewall system.
o A firewall is a convenient platform for several internet functions that are not security
related.
- However firewalls have their limitations including:-
o It cannot protect against attacks that by passes the firewall
o It may not protect fully against internal threats such as a disgruntled employee.
o An improperly secured wireless LAN may be accessed from outside the organization.
- A firewall may act as a packet filter. It can operate as a positive filter, allowing passing only
packets that meet specific criteria or as a negative fitter, rejecting any packet that meets
certain criteria.
Types of firewalls
1. Packet filtering firewalls
- It applies a set of rules to each incoming and outgoing IP packet and then forwards or discards
the packet. It is typically configured to filter packets going in both direction (from and to the
internal network)
- It generally falls into two subcategories; stateful and stateless.
- Stateful firewalls maintain context about active section, and use that state information to
speed packet processing. If a packet does not watch on existing connection, it will be
evaluated according to the ruleset for new connections.
- Stateless firewalls require less memory and can be faster for simple filters that require less
time to filter them to look up a session.
- The major advantage of packet filtering firewalls is its simplicity. Also, packet filters typically
are transparent to user end are very fast..
- However packet filtering firewall has the following weaknesses:-
o Most do not support advanced user authentication schemes
o It is vulnerable to attacks and exploits that take advantage of problems within the
TCP/IP specification and protocol stack such as network layer address spoofing.
o It is susceptible to security breaches caused by improper configuration.
o It does not examine upper layer data, hence it cannot prevent attacks that employ
application
3) Proxies
- A proxy server may act as firewall by responding to put packets (connection requests) in the
manner of an application, while blocking other packets.
- It is a gateway from one network to another for a specific network application in the sense that
it functions as a proxy on behalf of the network user.
- Proxies make tampering with an internal system from the external network more difficult and
misuse of one internal system would not necessarily cause a security breach exploitable from
outside the firewall.
Protocols and standards
- Protocol is a kind of agreement about the exchange of information in a distributed system. It
is a set of rules that two or more devices must follow if they are to communicate with each
other.
- Protocol includes everything from the meaning of data to the voltage levels on connection
wires.
- A network protocol defines how a network will handle the following problems and tasks:
o communication line errors
o flow control (to keep buffers from overflowing)
o access by multiple devices
o failure detection
o data translation
o interpretation of messages
- Networking standards can be classified as proprietary, open or de facto
o Proprietary standards are owned by one particular organization.
o If that organization has sufficient market clout and the industry lacks alternative to its
standard, it may be adopted the whole industry, becoming a de facto standard.
o Open standard are not owned by any one – they are created by neutral organizations
to ensure that compatible products can be designed and developed by many different
companies.
i) Rs 232
- The RS-232 interface standard (officially called TIA-232) defines the electrical and
mechanical details of the interface between Data Terminal Equipment (DTE) and Data
Communications Equipment (DCE), which employ serial binary data interchange.
- The current version of the standard refers to DCE as Data Circuit-terminating Equipment.
- Its used for many purposes such as connecting mouse, printer as well as industrial
instrumentation
- RS – 232 is limited to point to point connections between pc serial ports and devices.
- The RS-232 standard consists of three major parts, which define:
• Electrical signal characteristics
• Mechanical characteristics of the interface
• Functional description of the interchange circuits
- The standard defines a logic 1 and voltage between -3v and -25v and a logic 0 as a voltage
level between +3V and +25v
- Many RS 232 connections are one-way or simplex However, using the special signaling and
control voltages available, this way or half duplex operation is possible.
- The two connected devices alternate transmitting and receiving operations.
- The central signal in the interface defines the protocol for transmitting and receiving data.
- These signals tie the two communicating devices when they are busy, transmitting, ready and
receiving.
- The transmitting device is the DTE (devices that are either the source or destination of data
frames) such as computer, work station.
- The receiving device is the DCE (device that receive and forward frames across the network)
– such as printer, modem, interface card.
- The control signal used on the common nine-pin connector are:-
a) Data carrier detect (DCD) – the DCE tells the DTE it is receiving a valid input signal (Pin
1)
b) Data set ready (DSR) – The DCE tells the DTE it is connected and ready to receive (pin
6)
c) Received data (RD): This is the actual signal received from DTE (Pin 2).
d) Request to send (RTS) – This signal from the DTE tells the DCE it is ready to transmit (pin
7)
e) Signal ground:- This is the common ground connection for all signals (pin 5)
f) Transmit data (TD) – This is the transmitted signal from the DTE (pin 3)
g) Data terminal ready (DTR) – This line is from the DTE to the DCE indicating readiness to
send or receive data (pin 4)
h) Clear to send (CTS) – This line from the DCE tells the DTE it is ready to receive data (pin
8)
i) Ring indicator (R1) – This line was used in order modem connection but it is not used
anymore (pin 9)
Here are some typical wiring diagrams for each interface type:
Limitations of RS -232
- Limited distance – cable length limited to 1.5 meter
- Not multi-drop – it can only connect on RS – 232 device per port.
- Susceptible to noise – RS 232 is single-ended, which means that they transmit and
receive lines are referenced to a common ground.
Ethernet
- The term refers to the family of LAN module covered by the IEEE 802.3 standard that defines
what is the CSMA/CIS protocol
- The Ethernet standards comprise several wiring and signaling variants of the OSI physical
layer in the use with Ethernet.
- Three data rates are defined for operation over optical fibre and twisted-pair cables.
o 10 BASE – T Ethernet
o Fast Ethernet (100 BASE – T Ethernet)
o Gigabit Ethernet 1000 BASE-T Ethernet
- The protocol has the following characteristics:
o Easy to understand, implement, manage and maintain
o Allows low cost network implementation
o Provides extensive topologies flexibility for network installation
o Guarantees successful, interconnection and operation of standard – compliant
products, regardless of manufacture
- Twisted-pair Ethernet standards are such that the majority of cables can be wired ‘straight
through’ pin1 to pin1 pin 2 to pin 2 and so on, but others may need to be wired in the ‘crossover’
form (receive to transmit and transmit to receive)
Industrial Ethernet
- This refers to the use of standard Ethernet protocols with rugged connectors and extended
temperature switches in an industrial environment for automation or process control.
- Components used in plant process areas must be designed to work in harsh environment of
temperature extremes, humidity and vibration that exceeds the ranges for information
technology equipment intended for installation in controlled environment.
- The use of fibre Ethernet reduces the problem of electrical noise and provides electrical
isolation to prevent equipment damage.
- Some industrial networks emphasis deterministic delivery of transmitted data, whereas
Ethernet used collision detection which made transport time for individual data packets difficult
to estimate with increasing network traffic.
- In addition to physical compatibility and low level transport protocols a practical industrial
Ethernet system must also provide interoperability of high levels of the OSI model.
- An industrial network use network switches to segment a large system into logical sub-
networks, divided by address, protocol or application.
- Using network switches allows the network to be broken up into many small collision domains.
- This reduces the risk of a faulty or misconfigured device generating excess network traffic.
- Although no proclaimed standards exist for device bus network applications, several de facto
standards are emerging due to the availability of company specific protocol specifications from
device bus network manufacturers.
- These network manufacturers or associations provide I/O field device manufacturers with
specifications in order to develop open network architecture, (i.e., a network that can interface
with many types of field devices).
- In this way, each manufacturer hopes to make its protocol the industry standard.
- One of these de facto standards for the byte-wide device bus network is DeviceNet, originally
from PLC manufacturer Allen-Bradley and now provided by an independent spin-off
association called the Open DeviceNet Vendor Association.
- Another is SDS (Smart Distributed System) from Honeywell. Both of these device bus protocol
standards are based on the control area network bus (CANbus), developed for the automobile
industry, which uses the commercially available CAN chip in its protocol.
- InterBus-S from Phoenix Contact is another emerging de facto standard for byte-wide device
bus network.
- The de facto standards for low-end, bit-wide device bus networks include Seriplex, developed
by Square D, and ASI (Actuator Sensor Interface), a standard developed by a consortium of
European companies.
- Again, this is why I/O bus network and field device manufacturers will specify compatibility
with a particular protocol (e.g., ASI, Seriplex, InterBus-S, SDS, or DeviceNet) even though no
official protocol standard exists.
i) InterBus-S
- InterBus-S is a sensor/actuator device bus network that connects discrete and analog field
devices to a PLC or computer (soft PLC) via a ring network configuration.
- The InterBusS has built-in I/O interfaces in its 256 possible node components, which also
include terminal block connections for easy I/O interfacing.
- This network can handle up to 4096 field I/O devices (depending on the configuration) at a
speed of 500 kbaud with cyclic redundancy check (CRC) error detection.
- A PLC or computer in an InterBus-S network communicates with the bus in a master/slave
method via a host controller or module.
- The topology of the network is a ring, with data being sequentially shifted from point to point
on the ring under the control of a network master.
- Each device is the ring acts as a shift register, transmitting and receiving data simultaneously
at 500 KHz.
- The actual serial data transmission between stations conforms to RS- 485.
- Interbus–S (interbus–S remote Bus) has also been extended to include a sub-protocol called
interbus – sensor loop (or interbus–S local Bus).
- This subprotocol provides an alternate physical layer, with a single twisted pair carrying power
and data on the same lines and a reduction in the minimum size of the shift register in each
station from 16 to 4 bits.
- Each interbus sensor loop system can act as a single station on an interbus-S network, on
the sensor loop can be connected directly to a controller or master.
- Interbus–S devices are usually implemented with a special ASIC (application specific
integrated circuit).
- The DeviceNet byte-wide network can support 64 nodes and a maximum of 2048 field I/O
devices.
- The SDS network can also support 64 nodes; however, this number increases to 126
addressable locations when multiport I/O interfaces are used to multiplex the nodes.
- Using a 4-to-1 multiport I/O interface module, an SDS network can connect to up to 126
nonintelligent I/O devices in any combination of inputs and outputs.
- This multiport interface to nonintelligent field devices contains a slave CAN chip inside the
interface, which provides status information about the nodes connected to the interface.
- In a DeviceNet network, the PLC connects to the field devices in a trunkline configuration,
with either single drops off the trunk or branched drops through multiport interfaces at the
device locations.
- Because an SDS network can transmit many bytes of information in the form of variable length
messages, it can also support many intelligent devices that can translate one, two, or more
bytes of information from the network into 16 or 32 bits of ON/OFF information.
- An example of this type of intelligent device is a solenoid valve manifold.
- This kind of manifold can have up to 16 connections, thereby receiving 16 bits (two bytes) of
data from the network and controlling the status of 16 valve outputs.
- However, this device uses only one address of the 126 possible addresses. Thus, in this
configuration, the SDS network can actually connect to more than just 126 addressable
devices.
- The CANbus device bus network uses three of the ISO layers and defines both the media
access control method and the physical signaling of the network, while providing cyclic
redundancy check (CRC) error detection.
- The media access control function determines when each device on the bus will be enabled.
Fieldbus Protocol
- The Fieldbus network protocol is based on three layers of the ISO’s seven-layer model. These
three layers are layer 1 (physical interface), layer 2 (data link), and layer 7 (application).
- It has optimized the OSI architecture for process control by removing the middle layers that
are generally associated with non-time critical applications such as file transfer.
- The section comprising layers 2 and 7 of the model are referred to as the Fieldbus
communication stack.
- In addition to the ISO’s model, Fieldbus adds an extra layer on top of the application layer
called the user layer.
- This user layer provides several key functions, which are function blocks, device description
services, and system management.
HART Networks
- HART devices can operate in one of two network configurations—point-to-point or multidrop.
- The connection can be in form of:
- In conjunction with the 4-20mA current signal in point-to-point mode,
- in conjunction with other field devices in multi-drop mode
- in point-to-point mode with only one field device broadcasting in burst mode
i) Point-To-Point:
- In point-to-point mode, the traditional 4–20 mA signal is used to communicate one process
variable, while additional process variables, configuration parameters, and other device data
are transferred digitally using the HART protocol.
- The 4–20 mA analog signal is not affected by the HART signal and can be used for control in
the normal way.
- The HART communication digital signal gives access to secondary variables and other data
that can be used for operations, commissioning, maintenance, and diagnostic purposes
ii) Multidrop:
- The multidrop mode of operation requires only a single pair of wires and, if applicable, safety
barriers and an auxiliary power supply for up to 15 field devices.
- All process values are transmitted digitally. In multidrop mode, all field device polling
addresses are >0, and the current through each device is fixed to a minimum value (typically
4 mA).
- Thus, setting the smart device polling address to a number greater than zero implies a multi-
drop loop.
- Obviously the 4-20mA concept only applies to a loop with a single transducer; hence for a
multi-drop configuration the smart device sets its analog output to a constant 4mA and
communicates only digitally.
Communication Modes
- The HART protocol can be used in various modes for communicating information to/from
smart field instruments and central control or monitoring equipment
- These protocols are: Poll/response mode and Burst (broadcast) mode.
HART Commands
- The HART command set provides uniform and consistent communication for all field devices.
- Layer 7, the Application layer, consists of three classes of HART commands: Universal,
Common Practice, and Device Specific
- Host applications may implement any of the necessary commands for a particular application.
i) Universal
- All devices using the HART protocol must recognize and support the universal commands.
- Universal commands provide access to information useful in normal operations (e.g., read
primary variable and units).
ii) Common Practice
- Common practice commands provide functions implemented by many, but not necessarily all,
HART communication devices.
iii) Device Specific
- Device-specific commands represent functions that are unique to each field device.
- These commands access setup and calibration information, as well as information about the
construction of the device. Information on device-specific commands is available from device
manufacturers.
Calibration Standards
- Calibration Standards of measurements can be classified according to their function and type
of application as:
International standards
- International standards are devices designed and constructed to the specifications of an
international forum.
- They represent the units of measurements of various physical quantities to the highest
possible accuracy that is attainable by the use of advanced techniques of production
and measurement technology.
- These standards are maintained by the International Bureau of Weights and Measures at
Sevres, France. For example, the International Prototype kilogram, wavelength of Kr86
orange-red lamp and cesium clock are the international standards for mass, length and time,
respectively.
- However, these standards are not available to an ordinary user for purposes of day-to-day
comparisons and calibrations.
Primary standards
- Primary standards are devices maintained by standards organizations / national
laboratories in different parts of the world.
- These devices represent the fundamental and derived quantities and are calibrated
independently by absolute measurements.
- These are the most precise and accurate physical standards, which are derived from
international standards.
- They specify the most stringent conditions and are used only at rare intervals for comparison
with secondary standards.
- One of the main functions of maintaining primary standards is to calibrate / check and certify
secondary reference standards.
- Like international standards, these standards also are not easily available to an ordinary user
of instruments for verification / calibration of working standards. These standards are not
portable.
Secondary standards
- Secondary standards are basic reference standards employed by industrial measurement
laboratories.
- These are derived from primary standards. They are portable and are often used as national
standards.
- They are less precise than primary standards but are still very precise.
- They are used at rare intervals to calibrate tertiary and working standards. These are
maintained by the concerned laboratory.
- One of the important functions of an industrial laboratory is the maintenance and periodic
calibration of secondary standards against primary standards of the national standards
laboratory / organization.
- In addition, secondary standards are freely available to the ordinary user of instruments for
checking and calibration of working standards.
Working standards
- These are high-accuracy devices that are commercially available and are duly checked and
certified against either the primary or secondary standards.
- For example, a standard cell and a standard resistor are the working standards of voltage and
resistance, respectively.
- Working standards are very widely used for calibrating general laboratory instruments, for
carrying out comparison measurements or for checking the quality (range of accuracy) of
industrial products.
Calibration Procedure
- The process of calibration involves the estimation of uncertainty between the values
indicated by the measuring instrument and the true value of the input.
- Calibration may be called for:
a new instrument
after an instrument has been repaired or modified
when a specified time period has elapsed
when a specified usage (operating hours) has elapsed
before and/or after a critical measurement
after an event, for example
o after an instrument has had a shock, vibration, or has been exposed to an adverse
condition which potentially may have put it out of calibration or damage it
o sudden changes in weather
whenever observations appear questionable or instrument indications do not match the
output of surrogate instruments
As specified by a requirement, e.g., customer specification, instrument manufacturer
recommendation.
- There are four types of calibration:
Primary calibration, which is performed when a measuring device is put into circulation
from production or returned from repair;
Periodic calibration, which is conducted during use or storage of a device;
Special calibration, which results from the need for immediate verification of the good
condition of a device; and
Inspection calibration, which is performed during metrological inspections of
enterprises, supply centers, warehouses, and commercial organizations.
Calibration Concepts
- There are two fundamental operations involved in calibrating any instrument:
Testing the instrument to determine its performance,
Adjusting the instrument to perform within specification.
- Testing the instrument requires collecting sufficient data to calculate the instrument's
operating errors.
- This is typically accomplished by performing a multiple point test procedure that includes the
following steps.
Using a process variable simulator that matches the input type of the instrument, set a
known input to the instrument.
Using an accurate calibrator, read the actual (or reference) value of this input.
Read the instrument's interpretation of the value by using an accurate calibrator to
measure the instrument output.
- By repeating this process for a series of different input values, you can collect sufficient data
to determine the instrument's accuracy.
- Depending upon the intended calibration goals and the error calculations desired, the test
procedure may require from 5 to 21 input points.
- The first test that is conducted on an instrument before any adjustments are made is called
the As-Found test.
- If the accuracy calculations from the As-Found data are not within the specifications for the
instrument, then it must be adjusted.
- Adjustment is the process of manipulating some part of the instrument so that its input to
output relationship is within specification. For conventional instruments, this may be zero and
span screws.
- For HART instruments, this normally requires the use of a communicator (handheld or PC) to
convey specific information to the instrument.
- After adjusting the instrument, a second multiple point test is required to characterize the
instrument and verify that it is within specification over the defined operating range. This is
called the As-Left test.
Error Calculations
- Error calculations are the principal analysis performed on the As-Found and As-Left test data.
- There are several different types of error calculations, most of which are defined in the
publication "Process Instrumentation Terminology".
- They are usually expressed in terms of the percent of ideal span which is defined as:
% span = (reading - low range) / (high range - low range) x 100
- The first step in the data analysis is to convert the engineering unit values for input and output
into percent of span. Then for each point, calculate the error, which is the deviation of the
actual output from the expected output.
The Maximum error is the most common value used to evaluate an instrument's
performance. If a computer program is not used to analyze the test data, it is often the only
error considered and is taken to be the largest deviation from the ideal output.
By itself, the maximum error does not give a complete indication of an instrument's
performance. With the availability of computer software to facilitate calculations, other error
values are gaining popularity including zero error, span error, linearity error, and hysteresis
error.
Zero error is defined as the error of a device when the input is at the lower range value.
Span error is defined as the difference between the actual span and the ideal span,
expressed as a percentage of the ideal span.
Linearity error is a measure of how close the error of the instrument over its operating
range approaches a straight line. Unfortunately, there are three different methods used to
calculate this, resulting in an independent linearity, a terminal based linearity, and a zero
based linearity. In practice, it is best to choose one method and apply it consistently. Note
that the calculation of linearity error is also greatly facilitated by a curve fit of the error data.
Hysteresis error is a measure of the dependence of the output at a given input value upon
the prior history of the input. This is the most difficult error to measure since it requires great
care in the collection of data, and it typically requires at least 9 data points to develop
reasonable curves for the calculations. Thus a technician must collect at least five data point
traversing in one direction, followed by at least four more in the opposite direction, so that
each leg has five points, including the inflection point.
If any of these errors is greater than or equal to the desired accuracy for a test, then the
instrument has failed and must be adjusted.
Hand-Held Device
- This is a mobile/portable device which is a small, handheld computing device, typically having
a display screen with touch input and/or a miniature keyboard and weighing less than 0.91kg.
- A handheld computing device has an operating system (OS), and can run various types
of application software.
- Most handheld devices can also be equipped with Wi-Fi, Bluetooth, and GPS capabilities that
can allow connections to the Internet and other Bluetooth-capable devices, such as an
automobile or a microphone headset.
- It delivers messages and performance data to the operator and is used to support installation,
configuration, provisioning, calibration and maintenance and network performance.
- This procedure is often referred to as a Zero and Span Calibration. If the relationship
between the input and output range of the instrument is not linear, then you must know the
transfer function before you can calculate expected outputs for each input value.
- Without knowing the expected output values, you cannot calculate the performance errors.
6. a) i) State the four steps in the operation of programmable logic controller (PLC)
There are four basic steps in the operation of all PLCs; Input Scan, Program Scan, Output Scan,
and Housekeeping. These steps continually take place in a repeating loop.
(i) Input Scan: Detects the state of all input devices that are connected to the PLC
(ii) Program Scan: Executes the user created program logic
(iii) Output Scan: Energizes or de-energize all output devices that are connected to the PLC.
(iv) Housekeeping: Operational commands to the controlled devices. This step includes
communications with programming terminals, internal diagnostics, etc...
ii) Explain with aid of examples the following PLC programming languages
I) Functional block diagrams
II) Instruction lists
(i) Function Block Diagram (FBD) - A graphical language for depicting signal and data flows
through re-usable function blocks. FBD is very useful for expressing the interconnection of control
system algorithms and logic
(ii) Ladder Diagram (LD): Traditional ladder logic is graphical programming language. Initially
programmed with simple contacts that simulated the opening and closing of relays, Ladder Logic
programming has been expanded to include such functions as counters, timers, shift registers, and
math operations
(iii) Instruction List (IL): A low level “assembler like” language that is based on similar instructions
list languages found in a wide range of today’s PLCs.
(iv) Structured Text (ST) – A high level text language that encourages structured programming. It
has a language structure (syntax) that strongly resembles PASCAL and supports a wide range of
standard functions and operators. For example;
If Speed
F
Else
F
ON
End
Sequential Function Chart (SFC): A method of programming complex control systems at a more
highly structured level. A SFC program is an overview of the control system, in which the basic
building blocks are entire program files. Each program file is created using one of the other types
of programming languages. The SFC approach coordinates large, complicated programming tasks
into smaller, more manageable tasks.
b) Write an instruction list for the ladder diagram provided in fig below
(ii) Proxy server is a server (a computer system or an application) that acts as an intermediary
for requests from clients seeking resources from other servers. A client connects to the
proxy server, requesting some service, such as a file, connection, web page, or other
resource available from a different server and the proxy server evaluates the request as a
way to simplify and control its complexity. A proxy server is associated with or part of a
gateway server that separates the enterprise network from the outside network and a
firewall server that protects the enterprise network from outside intrusion. Proxy servers
have two main purposes:
- Improve Performance: Proxy servers improve performance for groups of users. This
is because it saves the results of all requests for a certain amount of time.
- Filter Requests: Proxy servers can also be used to filter requests. For example, a
company might use a proxy server to prevent its employees from accessing a specific
set of Web sites.
(i) Master Slave Mode: This means that during normal operation, each slave (field device)
communication is initiated by a master communication device. Two masters can connect
to each HART loop. The primary master is generally a distributed control system (DCS),
programmable logic controller (PLC), or a personal computer (PC). The secondary master
can be a handheld terminal or another PC. Slave devices include transmitters, actuators,
and controllers that respond to commands from the primary or secondary master.
(ii) Burst Mode: It enables faster communication (3–4 data updates per second). In burst
mode, the master instructs the slave device to continuously broadcast a standard HART
reply message (e.g., the value of the process variable). The master receives the message at
the higher rate until it instructs the slave to stop bursting. Use of burst mode enables more
than one passive HART device to listen to communications on the HART loop.
(i) UTP
PRO: Most flexible; cheapest cable (but requires expensive support components); easy to
install; easy to add users; may be able to use existing phone cable if data grade
CON: Shortest usable cable length; susceptible to electrical interference; unsecure; generally
not good for use between buildings
(ii) Shielded twisted pair (STP) is similar to UTP except it contains a copper braid jacket to ‘shield’ the
wires from electrical interference. It can support transmissions over greater distances than UTP.
(iii) Fiber-Optic
PRO: Fastest transmission rate; not susceptible to electrical interference; secure; good for use
between buildings
CON: Most expensive; relatively difficult to work with
(iv) Coaxial Cable
PRO: Flexible and easy to install; relatively good resistance to electronic interference;
electronic support components are relatively inexpensive
CON: Short cable length; more expensive than UTP; unsecure; hard to change configuration;
thinnet generally not good for use between buildings
d) With aid of a diagram, describe the mesh topology used in industrial networks and state its
advantage.
In a mesh network, devices are connected with many redundant
interconnections between network nodes. In a true mesh topology every
node has a connection to every other node in the network. There are two
types of mesh topologies:
(i) Full mesh topology occurs when every node has a circuit
connecting it to every other node in a network. Full mesh is very expensive
to implement but yields the greatest amount of redundancy, so in the event
that one of those nodes fails, network traffic can be directed to any of the other nodes. Full
mesh is usually reserved for backbone networks.
(ii) Partial mesh topology is less expensive to implement and yields less redundancy than full
mesh topology. With partial mesh, some nodes are organized in a full mesh scheme but
others are only connected to one or two in the network. Partial mesh topology is commonly
found in peripheral networks connected to a full meshed backbone.
Advantages
Disadvantages
- The more extensive the network, in terms of scope or of physical area, the greater the
investment necessary to build it will be, due, among other considerations, to the amount of
cabling and the number of hardware ports it will require. For this reason, such networks
are uncommon.
- Because every device must be connected to every other device, installation and
reconnection are difficult.
7 a) With the aid of a block diagram, explain how a PLC process input from the sensors
Input scan: During the input scan, the current status of every input module is stored in the
input image (memory) table, bringing it up-to-date. Thus all the status of the input devices
(which in turn is connected to the input module) is updated in the input memory table.
Program scan: Following the input scan, the CPU enters its user program execution, or
program scan. The execution involves starting at the program's first instruction, then moving
on to the second instruction and carrying out its execution sequence. This continues to the
last program instruction. Throughout the user-program execution, the CPU continually keeps
its output image (memory) table up-to-date.
Output scan: During program scan, the output modules themselves are not kept continually
up to date.
Instead, the entire output image table is transferred to the output modules during the output
scan which comes after the program execution. Thus the output devices are activated
accordingly during the output scan.
b) Using OSI reference model diagram indicate different encapsulation process at every peer-
to peer communication layer of two Remote Terminal Unit (RTU) of a SCADA system
starting with the top most down to the lowest layers.
c) An Alarm system is used in conjunction with an automated bottling system in a milk bottling
plant. A conveyer belt carries empty bottles that are to be filled with milk. The alarm goes
off in any of the conditions occurs.
- Milk tank is empty and bottles are in conveyor belt.
- There are no bottles in the conveyer and there is milk in the tank.
- There is milk in the tank and bottles on the conveyor belt but electric power is off.
- There is no milk in the tank, no bottles on the conveyor belt and electric power is off.
i) Write down a Boolean expression for the alarm system.
ii) Implement this system using a PLC ladder diagram.
c) With the aid of a block diagram, describe the construction of a Programmable Logic
Controller
In the figure, the heart of the “PLC” is in the center, i.e., the Processor or CPU (Central
Processing Unit).
The CPU regulates the PLC program, data storage, and data exchange with I//O modules.
Input and output modules are the media for data exchange between field devices and
CPU. It tells CPU the exact status of field devices and also acts as a tool to control them.
A programming device is a computer loaded with programming software, which allows
a user to create, transfer and make changes in the PLC software.
Memory provides the storage media for the PLC program as well as for different data.
OR
CPU or processor: The main processor (Central Processing Unit or CPU) is a
microprocessor-based system that executes the control program after reading the status
of field inputs and then sends commands to field outputs.
I/O section: I/O modules act as “Real Data Interface” between field and PLC CPU. The
PLC knows the real status of field devices, and controls the field devices by means of the
relevant I/O cards.
Programming device: A CPU card can be connected with a programming device
through a communication link via a programming port on the CPU.
Operating station: An operating station is commonly used to provide an "Operating
Window" to the process. It is usually a separate device (generally a PC), loaded with HMI
(Human Machine Software).
Star Topology
A star topology is designed with each node (file server, workstations, and peripherals) connected directly
to a central network hub, switch, or concentrator.
Data on a star network passes through the hub, switch, or concentrator before continuing to its destination.
The hub, switch, or concentrator manages and controls all functions of the network. It also acts as a repeater
for the data flow. This configuration is common with twisted pair cable; however, it can also be used with
coaxial cable or fiber optic cable.
Advantages of a Star Topology
Easy to install and wire.
No disruptions to the network when connecting or removing devices.
Easy to detect faults and to remove parts.
Disadvantages of a Star Topology
Requires more cable length than a linear topology.
If the hub, switch, or concentrator fails, nodes attached are disabled.
More expensive than linear bus topologies because of the cost of the hubs, etc.
Ring Network Topology: A local-area network (LAN) whose topology is a ring. That is, all
of the nodes are connected in a closed loop. Messages travel around the ring, with each
node reading those messages addressed to it. One of the advantages of ring networks is that
they can span larger distances than other types of networks, such as bus networks, because
each node regenerates messages as they pass through it.
Mesh network Topology: The mesh network topology employs either of two schemes, called full
mesh and partial mesh. In the full mesh topology, each workstation is connected directly to each of the
others. In the partial mesh topology, some workstations are connected to all the others, and some are
connected only to those other nodes with which they exchange the most data.
Tree Network Topology: The tree network topology uses two or more star networks connected
together. The central computers of the star networks are connected to a main bus. Thus, a tree network
is a bus network of star networks.
d) With the aid of a ladder program and a process control figure, explain how a converter can
be used in a machine to direct 6 products to a packaging box and 12 products to another box
simultaneously.
The control of a machine which is required to direct 6 products along one path for
packaging in a box and then 12 products along another path the packaging in another box.
A deflector plate might be controlled by a photocell sensor which gives an output every
time a product passes it. Thus the numb rod pulse from the sensor has to be counted and
used to control the deflector.
On rung 1, each time the photo sensor is triggered it causes C1’s count to increase. When
C1, the six product counter, reaches six it causes the deflector to activate.
On rung 3, while the deflector is activated C2, the 12 products counter, and starts counting
the products. On rung 4, after 12 products are counted the counters are reset and the
process starts again.
The process can also be reset at anytime using the start button.
8) a) Explain how fault-finding is carried out in PLC systems
With any PLC controlled plant, by far the greater percentage of the faults are likely to be
with sensors, actuators and wiring rather than within the PLC itself.
Of the faults within the PLC, most are likely to be in the input/output channels or power
supply rather than in the CPU.
The actual fault finding starts once the actual status has been established and compared
with the required status. This comparison frequently leads to the discovery of the error
source, if the fault is visible (e.g. mechanical damage to a signal generator), audible (e.g.
leakage on a valve), detectable by smell (e.g. cable burnt out). If this is not the case, the
fault can only be found and eliminated by means of a systematic procedure.
Many PLCs provide built-in fault analysis procedures which carry out self-testing and
display fault codes, with possibly a brief message, which can be translated by looking up
the code in a list to give the source of the fault and possible methods of recovery. For
example, the fault code may indicate that the source of the fault is in a particular module
with the method of recovery given as replace that module or perhaps switch the power off
and then on.
b) Describe the following fault detection techniques in reference to PLCs:
i) time checks
ii) Replication
Fault Detection Techniques
(i) Timing checks: The term watchdog is used for a timing check that is carried out by the
PLC to check that some function has been carried out within the normal time. If the
function is not carried out within the normal time then a fault is assumed to have occurred
and the watchdog timer trips, setting off an alarm and perhaps closing down the PLC. As
part of the internal diagnostics of PLCs, watchdog timers are used to detect for faults. The
watchdog timer is preset to a time slightly longer than the scan time would normally be.
They are then set at the beginning of each program scan and if the cycle time is as normal
they do not time out and are reset at the end of a cycle ready for the next cycle. However,
if the cycle time is longer than it would normally be, the watchdog timer times out and
indicate that the system has a fault.
Time checks can also be built into the ladder logic program. This is where additional ladder
rungs might be includes so that when a function starts a timer is started. If the function does
not complete when the timer finishes a fault is signaled.
(ii) Last output set: This technique involves the use of status lamps to indicate the last output
that has been set during a process which has come to a halt. Such lamps are built into the
program so that as each output occurs a lamp comes on. The lamps on thus indicate which
outputs are occurring. The program has to be designed to turn off previous status lamps
and turn on a new status lamp as each new output is turned on.
(iii)Replication: Where there is concern regarding safety in the case of a fault developing,
checks may be constantly used to detect faults. One technique is replication checks which
involves duplicating, i.e. replicating, the PLC system. This could mean that the system
repeats every operation twice and if it gets the same result it is assumed there is no fault.
This procedure can detect transient faults. A more expensive alternative is to have duplicate
PLC systems and compare the results given by the two systems. In the absence of a fault
the two results should be the same, a fault showing up as a difference.
(iv) Expected value checks: Software errors can be detected by checking whether an expected
value is obtained when a specific input occurs. If the expected value is not obtained then a
fault is assumed to be occurring.
d) Explain how zero and span errors are corrected in measuring instruments
Zero and span errors are corrected by performing a calibration. Most instruments are provided
with a means of adjusting the zero and span of the instrument, along with instructions for
performing this adjustment.
- The zero adjustment is used to produce a parallel shift of the input-output curve.
- The span adjustment is used to change the slope of the input-output curve.
- Linearization error may be corrected if the instrument has a linearization adjustment.
If the magnitude of the nonlinear error is unacceptable and it cannot be adjusted, the
instrument must be replaced.
ii) Distinguish between supervisory control and data acquisition and distributed control
system
A DCS is a process-oriented system and it treats the control of the process, (the chemical
plant, refinery or whatever) as its main task, and it presents data to operators as part of its
job.
A SCADA system is data gathering oriented; and the control center and operators are its
focus. However, the remote equipment is merely there to collect the data - though it may
also do some very complex process control.
A DCS operator station is intimately connected with its input/output signals (I/O) through
local wiring, communication buses (e.g. Field Bus, networks) etc. When the DCS
operator wants to see information he/she usually makes a request directly to the field I/O
and gets a response. Field events can directly interrupt the system and advise the operator.
A SCADA system must continue to operate when field communications have failed. The
‘quality’ of data shown to the operator is an important facet of SCADA system operation.
SCADA systems often provide special ‘event’ processing mechanisms to handle
conditions that occur between data acquisition periods.
There are many other differences, but they tend to involve a lot of detail. The underlying points
are:
A SCADA system needs to transfer secure data and control signals over a potentially
slow, unreliable communications medium, and needs to maintain a database of ‘last
known good values’ for prompt operator display. It frequently needs to do event
processing and data quality validation. Redundancy is usually handled in a distributed
manner.
A DCS is always connected to its data source, so it does not need to maintain a database
of ‘current values’. Redundancy is usually handled by parallel equipment, not by
diffusion of information around a distributed database.
b) With the aid of a diagram, explain how PLC’s can be used to control water level in a tank
c) Explain why user interface is necessary in PLC’s
A user interface is the system by which people (users) interact with a machine. The user
interface includes hardware (physical) and software (logical) components. User interfaces
exist for various systems, and provide a means of:
Input, allowing the users to manipulate a system
Output, allowing the system to indicate the effects of the users' manipulation
6) i) Define ladder logic control system
It is a control system whish uses ladder logic to manage, command, directs or regulates the
behavior of other device(s) or system(s).
ii) With aid of a labeled block diagram, explain the hardware architecture of a SCADA system
Basic layers in a SCADA system can be classified in two parts generally: the “client layer”
which caters for the man machine interaction and the “data server layer” which handles most
of the process data control activities. The data servers communicate with devices in the field
through process controllers.
Process controllers, e.g. PLCs, are connected to the data servers either directly or via networks
or fieldbuses. Data servers are connected to each other and to client stations via an
Ethernet LAN.
The RTU connects to physical equipment. Typically, an RTU converts the electrical signals from the
equipment to digital values such as the open/closed status from a switch or a valve, or measurements
such as pressure, flow, voltage or current. By converting and sending these electrical signals out to
equipment the RTU can control equipment, such as opening or closing a switch or a valve, or setting the
speed of a pump.
Supervisory Station; The term “Supervisory Station” refers to the servers and software responsible for
communicating with the field equipment (RTUs, PLCs, etc), and then to the HMI software running on
workstations in the control room, or elsewhere.
In smaller SCADA systems, the master station may be composed of a single PC. In larger SCADA
systems, the master station may include multiple servers, distributed software applications, and disaster
recovery sites.
To increase the integrity of the system the multiple servers will often be configured in a dual-redundant
or hot-standby formation providing continuous control and monitoring in the event of a server failure.
b i) State and explain four user configurable open system (UCOS) components
UCOS is a control system that employs object-oriented techniques at every level of its system
architecture. It includes a number of subsystems which segment the functionality of UCOS.
This includes an Engineering Workstation Subsystem, an Operator Workstation Subsystem,
and a Field Control Unit (FCU) Controller Subsystem. The subsystems communicate via a
Control Network.
Engineering Workstation (EWS) used for project development. The EWS is the
development tool where control schemes are configured then downloaded to the OWS, FCU,
and SDS. The entire project is configured using a single integrated tool based on graphical
Windows standards. Graphical techniques are also used to define the logical relationships
among the devices in a process area. Project configuration begins by defining the system
architecture: workstations, field control units (FCUs), I/O, networking, etc. Graphical
techniques are also used to define the logical relationships among the control elements for
multiple devices.
Operator Workstation (OWS) for operator interface. This is used to monitor and control
the process. It uses the project screens created during project development and animates
them based on real-time data received from field control units and field data servers.
Authorized operators can monitor detailed activities for many types of devices and send
commands using standard faceplate command windows and group displays.
Field Control Unit (FCU) for control logic execution and direct scanning of I/O. The FCU
provides I/O services by monitoring and controlling I/O across standard networks and data
highways. The FCU can provide simultaneous support for multiple vendors’ I/O and I/O
networks. The variety of platform and form-factor options supported by the FCU allows
incorporation of distributed, distinct I/O subsystems into common control strategies.
Control Network. System supports redundant and non-redundant fiber optic and Ethernet
local networks using the TCP/IP networking protocol for standardized, advanced application
connectivity. The LAN/WAN can be extended to other sites inside or outside the plant using
such remote communications technologies as satellite, radio, microwave, and dial-up
running such standard protocols as TCP/IP, Modbus, OPC, DDE
I/O Subsystem supporting I/O from all industry standard suppliers. The same logic can be
solved to manipulate different I/O subsystems from different manufacturers without having
to change any of the programming or operational parameters of the configured system.
SCADA Data Server (SDS) for interfacing data from intelligent devices, such as PLCs,
Fieldbus technologies, RTUs, PLC I/O, and other third-party devices
Process Historical Archiver (PHA) for storing and retrieving historical data collected by
the FCU, SDS or any other intelligent device in the system
microFCU: is a small, low-powered PLC that executes sequential and regulatory logic and
directly scans onboard I/O. It can replace RTUs at a significant reduction in cost and power
consumption – plus it can provide local intelligent control of devices, which RTUs can't do.
Networking cables are used to connect one network device to other network devices or to
connect two or more computers to share resources. Different types of network cables like
Coaxial cable, Optical fiber cable, Twisted Pair cables are used depending on the network's
topology, protocol and size. The devices can be separated by a few meters (e.g. via
Ethernet) or nearly unlimited distances (e.g. via the interconnections of the Internet).
Twisted pair cabling is a form of wiring in which pairs of wires (the forward and
return conductors of a single circuit) are twisted together for the purposes of
canceling out electromagnetic interference (EMI) from other wire pairs and from
external sources. This type of cable is used for home and corporate Ethernet
networks. There are two types of twisted pair cables: shielded, unshielded. STP is
commonly used in Token Ring networks and UTP in Ethernet networks where it is
referred to as "10baseT and above." Transmission rates vary between 10-1000
Mbps.
Fiber-optic cable consists of a thin cylinder of glass surrounded by glass cladding,
encased in protective outer sheath. Fiber-optic cable is very fast (100 -1000
Mbps). It can transmit over long distances (2 km +) but is expensive.
Coaxial cable has a single copper conductor at its center. A plastic layer provides
insulation between the center conductor and a braided metal shield. The metal shield
helps to block any outside interference. Coaxial cable comes in two versions:
Thinnet and Thicknet. Thinnet is about 1/4 inch in diameter and is very flexible and
easy to work with. In contrast, Thicknet is about 1/2 inch in diameter and not very
flexible. Coax transmits at 10 Mbps.
Star topology: This is the Ethernet topology, the most common at management and shop floor
levels. It has the advantage of being very flexible to run and repair. The end stations are linked
together via an intermediate device (repeater, switch). Failure of a node does not prevent the
network as a whole from working, though the intermediate device linking the nodes together is
a point of weakness.
Bus topology: This is one of the simplest layouts; all the elements are wired together along the
same transmission line. The word bus refers to the physical line. This topology is easily
implemented and the failure of a node or element does not prevent the other devices from
working. Machine and sensor level networks, otherwise known as field buses, use this system.
The bus topology is implemented by linking devices together in a chain or to the main cable via
a connection box (TAP)
c) With aid of a diagram explain the importance of calibration of equipment and products.
To ensure readings from an instrument are consistent with other measurements.
To determine the accuracy of the instrument readings.
To establish the reliability of the instrument i.e. that it can be trusted.