Automation Report
Automation Report
ON
SCADA
SUBMITTED BY:
DIKSHA VAID
ABSTRACT
Automation has been of high priority for the manufacturing sector, from
Ford's first set of Model-T Assembly lines in the early 1920s to the modern
factory floor. With appropriate automation, the aim was to rationalize the
production and keep the process under control. Instrumentation for
measuring process variables assumed a significant role in meeting such
goals. The development of new sensors and instruments took place in stages
concurrent with advancements in science and technology. This paper
comprehensively reviews the evolution of industrial automation. Essentially,
it reviews the milestones in the industrial automation and control systems,
the emergence of Distributed Control Systems (DCSs), the advanced control
architecture, the non-conventional technologies for the future and finally the
benefits from the networked system.
An industrial SCADA system will be used for the development of the
controls of LHC experiments. Here we describe the SCADA systems in
terms of their architecture, their interface to the process hardware, the
functionality and the application development facilities they provide. Some
attention is also aid to industrial standards to which they abide, their planned
evolution as well as the benefits of their use.
AUTOMATION – HISTORY
Ideas for ways of automating tasks have been in existence since the time of
the ancient Greeks. The Greek inventor Hero (fl. about A.D. 50), for
example, is credited with having developed an automated system that would
open a temple door when a priest lit a fire on the temple altar. The real
impetus for the development of automation came, however, during the
Industrial Revolution of the early eighteenth century. Many of the steam-
powered devices built by James Watt, Richard Trevithick, Richard
Arkwright, Thomas Savery, Thomas Newcomen, and their contemporaries
were simple examples of machines capable of taking over the work of
humans. One of the most elaborate examples of automated machinery
developed during this period was the drawloom designed by the French
inventor Basile Bouchon in 1725. The instructions for the operation of the
Bouchon loom were recorded on sheets of paper in the form of holes. The
needles that carried thread through the loom to make cloth were guided by
the presence or absence of those holes. The manual process of weaving a
pattern into a piece of cloth through the work of an individual was
transformed by the Bouchon process into an operation that could be
performed mindlessly by merely stepping on a pedal.
INTRODUCTION
a. what is automation
b. types of automation
a. Scientific Automation
(used by scientists)
b. Industrial Automation
c. Office Automation
Since the 1960s, the nature of automation has undergone dramatic changes
as a result of the availability of computers. For many years, automated
machines were limited by the amount of feedback data they could collect
and interpret. Thus, their operation was limited to a relatively small number
of alternatives. When an automated machine is placed under the control of a
computer, however, that disadvantage disappears. The computer can analyze
a vast number of sensory inputs from a system and decide which of many
responses it should make.
LAYOUT OF INDUSTRIAL AUTOMATION
AUTOMATION- APPLICATION
AUTOMATION- ADVANTAGES
DISADVANTAGES
SCADA- HISTORY
SCADA systems have made substantial progress over the recent years in
functionality, scalability, performance and openness.
WHAT IS A SCADA?
The keyword supervisory indicates that decisions are not directly made by
the system. Instead, the system executes control decisions based on control
parameters entered by the agency staff. The system monitors the health of
the process and generates alarm notifications when conditions are out of
tolerance. It is also tasked with placing the process in a safe mode. It waits
for user inputs to correct problems. The supervisory mode is designed to
operate the system in a manner that avoids out of tolerance conditions. In a
water / wastewater process, pumps are started and stopped by the system
according to limits assigned by operations. As long as the system responds
correctly to the control commands, the system remains in control.
SCADA can be used to monitor and control plant or equipment. The control
may be automatic, or initiated by operator commands. The data acquisition
is accomplished firstly by the RTU's (remote Terminal Units) scanning the
field inputs connected to the RTU (RTU’s may also be called a PLC -
programmable logic controller). This is usually at a fast rate. The central
host will scan the RTU's (usually at a slower rate.) The data is processed to
detect alarm conditions, and if an alarm is present, it will be displayed on
special alarm lists. Data can be of three main types. Analogue data (i.e. real
numbers) will be trended (i.e. placed in graphs). Digital data (on/off) may
have alarms attached to one state or the other. Pulse data (e.g. counting
revolutions of a meter) is normally accumulated or counted.
These systems are used not only in industrial processes. For example,
Manufacturing, steel making, power generation both in conventional,
nuclear and its distribution, chemistry, but also in some experimental
facilities such as laboratories research, testing and evaluation centers,
nuclear fusion. The size of such plants can range from as few as 10 to
several 10 thousands input/output (I/O) channels. However, SCADA
systems evolve rapidly and are now penetrating the market of plants with a
number of I/O channels of several 100K.
The primary interface to the operator is a graphical display (mimic)
usually via a PC Screen which shows a representation of the plant or
equipment in graphical form. Live data is shown as graphical shapes
(foreground) over a static background. As the data changes in the field, the
foreground is updated. E.g. a valve may be shown as open or closed. Analog
data can be shown either as a number, or graphically. The system may have
many such displays, and the operator can select from the relevant ones at
any time.
SCADA systems were first used in the 1960s.SCADA systems have
made substantial progress over the recent years in terms of functionality,
scalability, performance and openness such that they are an alternative to in
house development even for very demanding and complex control systems
as those of physics experiments. SCADA systems used to run on DOS, VMS
and UNIX; in recent years all SCADA vendors have moved to NT and some
also to Linux.
ARCHITECTURE
Communication
Internal Communication:
Access to Devices:
The data servers poll the controllers at a user defined polling rate. The
polling rate may be different for different parameters. The controllers pass
the requested parameters to the data servers. Time stamping of the process
parameters is typically performed in the controllers and this time-stamp is
taken over by the data server. If the controller and communication protocol
used support unsolicited data transfer then the products will support this too.
Database
The configuration data are stored in a database that is logically
centralized but physically distributed and that is generally of a proprietary
format. For performance reasons, the RTDB resides in the memory of the
servers and is also of proprietary format. The archive and logging format is
usually also proprietary for performance reasons, but some products do
support logging to a Relational Data Base Management System (RDBMS) at
a slower rate either directly or via an ODBC interface.
Scalability
CCC systems use real-time data acquisition and trending to allow you to see
what is happening with your business, as it happens. Any process can be
automated and monitored by these systems. Pioneered in the chemical and
petrochemical industries, new hardware and software now allow these
systems to be used for everyday processes. This results in cost savings that
pay for a system in a few months.
A quick example is the automation of a dosing system using day tanks and
large holding tanks used to fill the day tanks.
HMI's can also be linked to a database, which can use data gathered from
PLC's or RTU's to provide graphs on trends, logistic info, schematics for a
specific sensor or machine or even make troubleshooting guides accessible.
An important part of most SCADA implementations are alarms. An alarm is
a digital status point that has either the value NORMAL or ALARM. Alarms
can be created in such a way that when their requirements are met, they are
activated. An example of an alarm is the "fuel tank empty" light in a car. The
SCADA operator's attention is drawn to the part of the system requiring
attention by the alarm. Emails and text messages are often sent along with an
alarm activation alerting managers along with the SCADA operator.
HARDWARE SOLUTIONS
System components
The three components of SCADA system are:
3. Communication Infrastructure
The SCADA usually presents the information in the form of mimic. This
means that a operator can see a representation of the plant being controlled.
For example a picture of a pump connected to a pipe can show the operator
that the pump is running and how much fluid it is pumping through the pipe
at the moment. The operator can then switch the pump off. The SCADA will
show the flow rate of the fluid in the pipe decrease in relay time. The HMI
package for the SCADA system includes a drawing program that the
operator or system personnel use to change the way these points are
represented in the interface. These representation can be as simple as an on
screen traffic light, which represents the state of an actual traffic light in the
field or as complex as a multi-projector display representing the position of
all the elevators in a skyscraper or all the trains on a railway. The interface is
usually 2D and is displayed using the X11 protocol, although some vendors
provide immersive 3D interfaces and support for other display APIs such as
Win 32 GDI/DirectDraw. Scada master computers typically run on top of a
third party operating system. Nearly all SCADA products run on either a
UNIX variant or HP Open VMS, although many vendors are beginning to
provide Microsoft Windows as a host operating system option. Initially
more ‘open’ platforms such as Linux were no as widely used due to highly
dynamic development environment and because a SCADA customer that
was able to afford the field hardware and devices to be controlled could
usually also purchase UNIX or open VMS licenses.
OPERATIONAL PHILOSOPHY
For some installations, the cost that would result from the control system
failing is extremely high possibly even lives could be lost. Hardware for
SCADA systems is generally ruggedized to withstand temperature, vibration
and voltage extremes but in these installations reliability is enhanced by
having redundant hardware and communications channels. A failing part can
be quickly identified and its functionality automatically taken over by
backup hardware. A filed part can often be replaced without interrupting
the process. The reliability of such systems can be calculated statistically
and is stated as the mean time to failure, which is a variant of mean time
between failures. The calculated mean time to failure of such high reliability
systems can be in the centuries.
This has also come under threat with some customer want in SCADA data to
travel over their pre-established corporate networks or to share the network
with other applications. The legacy of the early low bandwidth protocols
remains, though, SCADA protocols are designed to be very compact and
many are designed to send information to the master station only when the
master station polls the RTU.
SYSTEM CONCEPT
The term SCADA usually refers to centralized systems which monitor and
control entire sites, or complexes of systems spread out over large areas
(anything between an industrial plant and a country). Most control actions
are performed automatically by remote terminal units ("RTUs") or by
programmable logic controllers ("PLCs"). Host control functions are usually
restricted to basic overriding or supervisory level intervention. For example,
a PLC may control the flow of cooling water through part of an industrial
process, but the SCADA system may allow operators to change the set
points for the flow and enable alarm conditions, such as loss of flow and
high temperature, to be displayed and recorded. The feedback control loop
passes through the RTU or PLC, while the SCADA system monitors the
overall performance of the loop.
Data acquisition begins at the RTU or PLC level and includes meter
readings and equipment status reports that are communicated to SCADA as
required. Data is then compiled and formatted in such a way that a control
room operator using the HMI can make supervisory decisions to adjust or
override normal RTU (PLC) controls.
Access Control
MMI
The products all provide trending facilities and one can summarize the
common capabilities as follows:
Logging/Archiving
The terms logging and archiving are often used to describe the same
facility. However, logging can be thought of as medium-term storage of data
on disk, whereas archiving is long-term storage of data either on disk or on
another permanent storage medium. Logging is typically performed on a
cyclic basis, i.e., once a certain file size, time period or number of points is
Report Generation
One can produce reports using SQL type queries to the archive,
RTDB or logs. Although it is sometimes possible to embed EXCEL charts in
the report, a "cut and paste" capability is in general not provided. Facilities
exist to be able to automatically generate, print and archive reports.
Automation
SCADA vendors release one major version and one to two additional minor
versions once per year. These products evolve thus very rapidly so as to take
advantage of new market opportunities, to meet new requirements of their
customers and to take advantage of new technologies.
As far as new technologies are concerned, the SCADA products are now
adopting:
REAL TIME AND HISTORICAL TREND the trend play very important
role in the process operation. If your batch fails or the plant trips, you can
simply go to the historical trend data and do the analysis. You can have
better look of the parameters through the trend. Ex. We commission a
SCADA system for Acid Regeneration plant where the plant has to be
operated on 850-deg temperature. If the operator operates the plant at 900
deg you can imagine how much additional LPG he is putting into the
reactor. Again what will happen to the bricks of the reactor? So the
production manger’s first job will be to go through the trends how the
operators are operating the plant. Even when the plant trips there are more
than 25 probable reasons for the sample but if you go through the history
trends, it’s very easy to identify the problem.
ALARMS have a very critical role in automation. Generally you have alarm
states for each inputs/outputs like your temperature should not cross 80 deg
or lever should be less than 60. So if the parameters go in alarm state the
operator should be intimated with alarm. Most of the SCADA software
support four types of alarms like LOLO,LO,HI and HIHI. Deadband the
value of deadband defines the range after which a high low alarm condition
returns to normal.
Alarms are the most important part of the plant control applications because
the operator must know instantly when something goes wrong. It is often
equally important to have a record of alarms and whether an alarm was
acknowledged. An alarm occurs when something goes wrong. It can signal
that a device or process has ceased operating within acceptable, predefined
limits or it can indicate breakdown, wear or process malfunction.
Production Dept.
Quality Dept.
Maintenance Dept.
Enterprise Information
● Corporate information and real time production data can be gathered and
viewed from anywhere within operations
Engineering Dept.
Manufacturing Dept.
● Unscheduled down time is reduced due to swift alarm detection and event
driven information
● Makes operations easier and more repeatable with its real time
functionality
String tags- are used to store ASCII strings a series of characters or whole
word. The max string length is 131 characters.
Touch links- allow the operator to input data into the system. EX. Operator
may turn the value on or off, enter a new alarm set point, run a complex
logic script etc.
Touch push buttons-are used to create object link that immediately perform
an operation when clicked with the mouse or touched. These operations can
be discrete value changes, action script executions and show or hide window
commands.
Colour links- are used to animate the line colour, fill colour or text colour of
an object. Each of these colour attributes can be made dynamic by defining a
colour link for the attribute. The colour attribute may be linked to the value
of a discrete expression, analogue expression, discrete alarm status or analog
alarm status.
Blink- used to make an object blink based on the value of the discrete
tagname or expression.
Disable- used to disable the touch functionality of objects based on the value
of a tagname of expression. Often used as a part of a security strategy.
Value display links- provides the ability to use text object to display the
value of a discrete, analog or string tagname.
Percent fill links- used to provide ability to vary the fill level of a filled
shape according to the value of an analog tagname or an expression that
computes to an analog value.
Application script- are linked to entire applications and are used to start
other applications, create process simulation, calculate variables and so on:
three types of application scripts are on start up, while running, on shut
down.
Window script- is linked to specific window. 3 types of window scripts are
on show, while showing, on hide.
Key script- touch pushbutton action scripts are similar to key scripts, except
they are associated with an object that you link to a touch link action
pushbutton. 3 types are on key down, while down, on key up.
Data change script- are linked to a tagname and/or tagname field changes
by a value greater than a dead band that you defined for the tagname in the
tagname dictionary.
There are two distinct threats to a modern SCADA system. First is the threat
of unauthorized access to the control software, whether it be human access
or changes induced intentionally or accidentally by virus infections and
other software threats residing on the control host machine. Second is the
threat of packet access to the network segments hosting SCADA devices. In
many cases, there is rudimentary or no security on the actual packet control
protocol, so anyone who can send packets to the SCADA device can control
it. In many cases SCADA users assume that a VPN is sufficient protection
and are unaware that physical access to SCADA-related network jacks and
switches provides the ability to totally bypass all security on the control
software and fully control those SCADA networks. These kinds of physical
access attacks bypass firewall and VPN security and are best addressed by
endpoint-to-endpoint authentication and authorization such as are commonly
provided in the non-SCADA world by in-device SSL or other cryptographic
techniques.
Many vendors of SCADA and control products have begun to address these
risks in a basic sense by developing lines of specialized industrial firewall
and VPN solutions for TCP/IP-based SCADA networks. Additionally,
application white listing solutions are being implemented because of their
ability to prevent malware and unauthorized application changes without the
performance impacts of traditional antivirus scans. Also, the ISA Security
Compliance Institute (ISCI) is emerging to formalize SCADA security
testing starting as soon as 2009. ISCI is conceptually similar to private
testing and certification that has been performed by vendors since 2007.
Eventually, standards being defined by ISA99 WG4 will supersede the
initial industry consortia efforts, but probably not before 2011.
Key Benefits
Key Capabilities
WONDERWARE Intouch
SIEMENS Wincc
MODICON Moriecon
G E FANUC Cimplicity
INTELLUSION I Fix
KPIT Ashtra
CONCLUSION
● Are less expensive than DCS, but offer different functionality than DCS
www.ref.web.cern.ch/ref/CERN/CNL/2002/003/scada/
www.princeton-indiana.com/wastewater/pages/scada/scada-overview.html
www.scadanews.com
www.sss-mag.com/scada.html
www.scada.com
COMPANY PROFILE
ABOUT PROLIFIC
Prolific Technology Inc., a leading IC design house and ASIC design service
provider, was founded in November 1997 by a group of highly experienced
and specialized technical engineers. The Company started out by developing
Smart I/O IC solutions, focusing on niche USB/IEEE 1394 bridge controller
products. The Company then also ventured in the Mixed-Mode technology
development, successfully designing Brushless Motor Driver IC and Hall
sensors. With the future towards 3C integration, the Company will devote
more efforts in SOC development as well as integration of competitive
multimedia (MPEG-4/JPEG/MP3) and GPS products. The Company will
also continue to introduce new technologies for existing IC product base that
will offer customers a wide range of product solutions. Through System
Integration technology, Prolific is envisioning herself to grow from a
Professional IC Design House to a leading SOC Core Technology Pioneer.
CONTENTS
AUTOMATION
• History
• Introduction
• Layout of Industrial Automation
• Applications
• Advantages and Disadvantages
SCADA
• History
• Introduction
• Architecture
• SCADA as a system
• Features of SCADA
• Usefulness of SCADA
• General terminology
• What is Intouch
• Intouch environment
• Wonderware SCADA solution
• SCADA a boom in engineering
• Practical uses of SCADA
• Advantages
• SCADA management
CONCLUSION
REFERENCES
INTRODUCTION
a. What is SCADA
b. What is Data
c. Why or where we use SCADA