SCADA BACHELOR OF TECHNOLOGY
!
" #$
%& % '" &(
) *+ (
,
-./c012c.013
BHARAT INSTITUTE OF TECHNOLOGY BY- ROAD, PARTAPUR MEERUT ,U.P NOVEMBER, 2010
c
p M
4 + 4 5 !
,
9,
, 6
7
,
!
,, + , +
+! +
8
+
+ 4
!
,,
!
+
+
9,
+ 5
4
+
!
$ +
+ + ,
!
+
7
+ + +
)*+ ! ./ 212 .21
2
: ;
<
=
;
> =
? c cc c2 c3 c c: c: c: c> c c c? 20 2c 23 24 3
;
2: 2> 2> 27 28 2? 2? 30 3c
32 33
4
| |
<
@
A|
A|
A
:
- | | || < < < <
<
<
- - - >
< < B C
B
@
D c0
c0
@
@ @
c00K.
< . .
.
.g.
.
g
graphically. he ystem may have many such isplays, and the perator can select rom the relevant ones at any time. irst used in the c?>0s.
| 7
systems
ere
t i ti i t til i ib t
itt i t t
j bi t t i iti i it t bi l t lit l i t t i itti t t l i l t t t t l tiiti t
it it i i t il t t ll t ll6 6 t t t t it itl i t ilb t t it i !"6 # it ib" t t t t t lit tti i $t t % &i ! til itt
&i ! il itt
à V
| erver-client and server-server communication is in general on a pu lish su scri e and event-driven asis and uses a @
protocol, i.e., a client
application su scri es to a parameter hich is owned y a particular server application and only changes to that parameter are then communicated to the client application.
p he data servers poll the controllers at a defined polling rate. he polling rate may e different for different parameters. he controllers the re
weeks depending on the complexity and similarity with existing drivers, and a driver development tool kit is provided for this.
| ?
p
|
he provision of
client functionality for
open and standard manner is deve loping. devices@controllers, which provide
to access devices in an
here still seems to e a lack of
server software,
ut this improves
rapidly as most of the producers of controllers are actively involved in the development of this standard. The products also provide
an
pen
ata
ase onnectivity
interface to the data in the
archive@logs, ut not to the configuration data ase,
an import@export facility for configuration data,
a li rary of
s ing , '', and
data in the
TDB, logs and archive. The
isual
asic
to access
often does not provide
access to the productBs internal features such as alarm handling, reporting, trending, etc. The products provide for the Data
icrosoft standards such as Dynamic
xchange DDE) which allows e.g. to visualiDe data dynamically in an
EXEL spreadsheet, Dynamic Link Li rary DLL) and Em edding
LE).
c0
Eect Linking and
The configuration data are stored in a data ase that is logically c entraliDed ut physically distri uted and that is generally of a proprietary format.
or
performance reasons, the TDB resides in the memory of the servers and is also of proprietary format. The archive and logging format is usually also proprietary for performance reasons, ut some products do logging to a elational Data Base
anagement ystem
DBM) at a slower rate either directly or via
an DB interface.
cala ility is understood as the possi ility to extend the DA ased contr ol system y adding more process varia les, more specialiDed servers e.g. for alarm handling) or more clients. The products achieve scala ility y having multiple data servers connected to multiple controllers. Each data server has its own configuration data ase and TDB and is responsi le for the handling of a su -set of the process varia les ac
cc
A ADA ystem usually consists of the following su systems
A
j or
MI is the apparatus which
presents process data to a human operator, and through this, the human operator monitors and controls the process. A supervisory computer) system, gathering ac
?
TUs) connecting to sensors in the
process, converting sensor signals to digital data and sending digital data to the supervisory system.
V
Ls) used as field devices
ecause they are more economical, versatile, flexi le, and configura le than special-purpose TUs.
connecting the supervisory
system to the emote Terminal Units. A ADA system could e programmed to
monitor high and low levels in the day tanks ,
fill them when a certain level is reached,
calculated and store the volume used,
monitor the level in the main feed tank,
Alarm when a certain level is reached to notify purchasing or send an e mail),
Vlot the usage of chemicals vs time, process, or any other parameter.
c2
TYVIAL ADA YTEM
Example of scada system
c3
| | A
MI is the apparatus which presents process data to a human operator, and
through which the human operator controls the process. MIBs are an easy way to standardiDe the facilitation of monitoring multiple TUBs or VLBs programma le logic controllers). Usually
TUBs or VLBs will
run a pre programmed process, ut monitoring each of them individually can e difficult, usually ecause they are spread out over the system. Because
TUBs
and VLBs historically had no standardiDed method to display or present data to an operator, the ADA system communicates with VLBs throughout the system network and processes information that is easily disseminated y the MI. MIBs can also e linked to a data ase, which can use data gathered from VLBs or
TUBs to provide graphs on trends, logistic info, schematics for a specific
sensor or machine or even make trou leshooting guides accessi le.
| | The
TU connects to physical e
TU converts the
electrical signals from the e
c4
MAL or ALARM.
The ADA usually presents the information in the form of mimic. This means that a operator can see a representation of the plant
eing controlled.
or
example a picture of a pump connected to a pipe can show the operato r that the pump is running and how much fluid it is pumping through the pipe at the moment. The operator can then switch the pump off. The ADA will show the flow rate of the fluid in the pipe decrease in relay time. The
MI package for
the ADA system includes a drawing program that the operator or system personnel use to change the way these points are represented in the interface. These representation can e as simple as an on screen traffic light, which represents the state of an actual traffic light in the field or as complex as a multi proEector display representing the position of all the elevators in a skyscraper or all the trains on a railway.
The term ADA usually refers to centraliDed systems which monitor and control entire sites, or complexes of systems spread out over large areas anything etween an industrial plant and a country). Most control actions are performed automatically
y
remote terminal units
programma le logic controllers VLs).
RTUs) or
y
ost control functions are usually
restricted to asic overriding or supervisory level intervention. or example, a VL may control the flow of cooling water through part of an industrial process, ut the ADA system may allow operators to change the set points for the flow and ena le alarm conditions, such as loss of flow and high temperature, to e displayed and recorded. The feed ack control loop es through the RTU or VL, while the ADA system monitors the overall performance of the loop.
c:
Data ac
MI can make supervisory decisions to adEust or override normal
RTU VL) controls. ADA systems typically implement a distri uted data ase, commonly referred to as a tag data ase, which contains data elements called tags or points. A point represents a single input or output value monitored or controlled y the system. Voints can e either hard or soft. A hard point represents an actual input or output within the system, while a soft point results from logic and math operations applied to other points. Most implementations conceptually remove the distinction y making every property a soft point expression, which may, in the simplest case, e
c>
÷ V? ?Vj
mimics developed in ADA
software should resem le the process mimic. ADA should have good li rary of sym ols so that you can develop the mimic as per re
nce the
operator sees the screen he should know what is going on in the plant.
? ÷ j ? ?÷
the trend play very
important role in the process operation. If your atch fails or the plant trips, you can simply go to the historical trend data and do the analysis. You can have etter look of the parameters through the trend. Ex. ;e commission a ADA system for Acid Regeneration plant where the plant has to e operated on 8:0 deg temperature. If the operator operates the plant at ?00 deg you can imagine how much additional LV he is putting into the reactor. Again what will happen to the ricks of the reactor= o the production mangerCs first Eo will e to go through the trends how the operators are operating the plant. Even when the plant trips there are more than 2: pro a le reasons for the sample ut if you go through the history trends, itCs very easy to identify th e pro lem.
? have a very critical role in automation.
enerally you have alarm
states for each inputs@outputs like your temperature should not cross 80 deg or lever should e less than >0. o if the parameters go in alarm state the operator should e intimated with alarm. Most of the ADA software four types of alarms like LOLO,LO,HI and HIHI. Dead and the value of dead and defines the range after which a high low alarm condition returns to normal. Alarms are the most important part of the plant control applications ecause the operator must know instantly when something goes wrong. It is often e
? V is
an additional feature. ome ADA
software it, some do not. Most of the plants are manufacturing multi products. ;hen you have different products to manufacture, you Eust have to load the recipe of the particular product.
?
is on facility people generally look for. You can allocate certa in
facilities or features to the operator, process people, engineering dept and maintenance dept. for example operators should only operate the system, he should not e a le change the application. The engineers should have access to changing the applicati on. The engineers should have access to changing the application developed.
÷
you will find there are hundreds of
automation hardware manufacturer like Modicon, iemens, Allen Bradly, ABB. Every ody has there own way of communication or we can say they have there own communication protocol. ADA software should have connectivity to the different hardware used in automation. It should not happen that for Modicon I am uying one software and for iemens another one. The software like Aspic or ;onderware has connectivity to almost all hardware used in automation.
÷
now a days information plays very
important role in any usiness. Most manufacturing units go for Enterprise Resource Vlanning or Management Information ystem.
c8
V ÷ A Real time production status manufacturing status is updated in real time in direct communication to operator and control device A Vroduction schedules production schedules can
e viewed and updated
directly A Vroduction information management production specific information is distri uted to all
÷ A Data integrity and
÷ A Improved trou leshooting and de- ugging direct connection to wide variety of devices, displays improves trou leshooting reduces diagnostic@de ugging time A Vlant can e viewed remotely.
otification can include pagers, e-mails and
phones. A o-ordination etween maintenance and management reduces unscheduled downtime.
c?
A orporate information and real time production data can e gathered and viewed from anywhere within operations A specific information ensures etter informed decisions A Data exchange with standard data ases and enterprise systems provides integrated information solutions
÷ A Integrated automation solutions reduce design and configuration time A ommon configuration platform offers flexi ility for constant configuration in all areas A apa le of connecting to wide variety of systems. Reduces start up time and system training with industry proven open interfaces
÷ A Unscheduled down time is reduced due to swift alarm detection and event driven information A Makes operations easier and more repeata le with its real time functionality A ecured real time operation are maintained with windows
20
ë | ë - - a tag is a logical name for a varia
le in a device or local
memory RAM). Tags that receive data from some external devices such as programma le logic controllers or servers are refereed to as I@O tags. Tags that receive data internally from software are called memo ry tags.
h store a range of values. EX temp, flow, density etc ÷ h to store values such as 0 or c. EX on@off status of a pump, valves, switches etc.
h
store information generated while the software is running
including alarm info and system time and date.
h are used to store AII strings a series of characters or whole word. The max string length is c3c characters.
- allow the operator to input data into the system. EX. Operator may turn the value on or off, enter a new alarm set point, run a complex logic script etc.
-are
used to create o Eect link that immediately
perform an operation when clicked with the mouse or touched. These operations can
e discrete value changes, action scr ipt executions and show or hide
window commands.
2c
- are used to animate the line colour, fill colour or text colour of an o Eect. Each of these colour attri utes can e made dynamic y defining a colour link for the attri ute.
- used to control visi
ility of an o Eect ased on the value of discrete
tag name or expression.
used to make an o Eect
link
ased on the value of the discrete
tagname or expression.
- used to make an o
Eect rotate ased on the value of a tagna me
@expression.
÷ - used to disa
le the touch functionality of o Eects ased on the value
of a tagname of expression. Often used as a part of a security strategy.
h provides the a
ility to use text o Eect to display the
value of a discrete, analog or string tagname.
V h used to provide a
ility to vary the fill level of a filled
shape according to the value of an analog tagname or an expression that computes to an analog value.
h are linked to entire
applications and are used to start
other applications, create process simulation, calculate varia les and so on three types of application scripts are on start up, while running, on shut down.
- - is linked to specific window. 3 types of window scripts are on show, while showing, on hide.
22
þ - touch push
utton action scripts are similar to key scripts, except
they are associated with an o Eect that you link to a touch link action push utton. 3 types are on key down, while down, on key up.
- is linked to discrete tagname or expression that e
÷ h are linked to a tagname and@or tagname field changes y a value greater than a dead and that you defined for the tagname in the tagname dictionary.
h
to an application is optional. It provides the
application developer with the a ility to control whether or not specific operators are allowed to perform specific functions within an application ecurity is ased on the concept of operator logging on to the application and entering his name and and access level. or each operator access to any protected function is granted upon verification of his and access level .
23
||
The move from proprietary technologies to more standardiDed and open solutions together with the increased num er of connections etween ADA systems and office networks and the Internet has made them more vulnera le to attacks.onse
the lack of concern a out security and authentication in the design, deployment and operation of existing ADA networks
the mistaken elief that ADA systems have the enefit of security through o scurity through the use of specialiDed protocols and proprietary interfaces
the mistaken elief that ADA networks are secure ecause they are purportedly physically secured
the mistaken elief that ADA networks are secure ecause they are supposedly disconnected from the Internet
ADA systems are used to control and monitor physical processes, examples of which are transmission of electricity, transportation of gas and oil in pipelines, water distri ution, traffic lights, and other systems used as the asis of modern society. The security of these ADA systems is important ecause compromise or destruction of these systems would impact multiple areas of society far removed from the original compr omise. or example, a lackout caused y a compromised electrical ADA system would cause financial losses to all the customers that received electricity from that source. How security will affect legacy ADA and new deployments remains to e seen . 24
- | | ;onderware InTouch provides a single integrated view of all your controls and information resources. Intouch ena les engineers, supervisors, operators and managers to view to view and interact with the working of entire operation through graphical representations of their p roduction processes.
j j ? InTouch consist of three maEor programs. The InTouch Application Manager, ;indowmaker and ;indowviewer. InTouch also includes the diagnostics program ;indow Logger.
organiDes the application to
create. It is also used to configure ;indowviewer as an T service, to configure etwork Application Development for client
ased and server
ased
architectures, to configure Dynamic Resource onversions and@or distri uted alarms.
-
is the development environment, where o Eect oriented
graphics are used to create animated, touch sensitive display windows. These display windows can e connected to industrial I@O systems and other Microsoft ;indows application.
-
is the runtime environment used to display graphic
windows created in ;indowMaker. ;indowViewer executes InTouch Fuickcript, performs historical data logging and reporting, processes alarm logging and reporting and can function as a client and a server for oth DDE and uite link communication protocol.
2:
þ
Easy-to-use, easy to implement
Easy configuration, simplified maintenance
High security and availa ility
Virtually unlimited scala ility
þ
HMI visualiDation and geographically distri uted ADA
Template ased development and maintenance
Remote application development and change management
Data level security uilt into the system
Easy and flexi le alarm definition
Data collection and analysis for new and existing systems
Easy-to-use report generation
Open access to historical data
2>
|p |p| |p p
27
ë ADA ystems Management M) helps its customers to transform the operational performance of their usinesses through the use of Manufacturing Enterprise olutions ME). Our in-depth practical experience of a range of industries com ines with our expertise in the award-winning
E
anuc Vroficy products to ena le us to
deliver insights that ring enefits.
28
| ë| | ë ;hile one should rightly anticipate significant development and maintenance savings
y adopting ADA product for the implementation of a control
system, it does not mean a Gno effort´ operation. The need for proper engineering can not e sufficiently emph asiDed to reduce development effort and to reach a system that complies with the re
ehavior, graphical
interface and associated scripts for animation, A templates for different types of Gs´, eg alarms A instructions on how to control eg. A device A a mechanism to prevent conflicting controls
| A ADA used as a control mechanism for chemical plants, electricity generation, electric power transmission, electricity distri ution, district heating. A ontrol mechanisms are descri ed in Vrocess ontrol. AEVI is an example of an open source software environment used to develop and implement ADA system to operate devices such as particle accelerators, telescopes and other large experiments.
2?
ë c. A ADA system is normally significantly cheaper than a D. 2. ADA can continue operating even when telecommunication are temporarily lost. 3. ADA systems allow a smaller num er of operators to control a large num er of individual assets. 4. ADA systems were designed to e used on large scale
systems with
remote assets over a very large geographical area. :. ADA system improves operation, maintenance and customer service and provides rapid response to emergencies. >. It provides a high level of system relia ility and availa ility.
30
-
;ONDER;ARE
Intouch
ALLEN BRADLEY
R. View
IEMEN
;incc
MODION
Moriecon
E ANU
implicity
INTELLUION
I ix
KVIT
Ashtra
3c
| ADA is a control system with A More interfaces and efficient storage
A More record or device oriented configuration
A But system wide configuration tools are needed
A Are less expensive than D, ut offer different functionality than D
A And finally various applications
32
www.ref.we .cern.ch@ref@ERN@NL@2002@003@scada@ www.princeton-indiana.com@wastewater@pages@scada@scada -overview.html www.scadanews.com
[email protected] www.scada.com
33