KAMAL REPORT
KAMAL REPORT
Chapter-1
AUTOMATION
1.1 INTRODUCTION
Automation is the use of machines, control systems and information technologies to optimize
productivity in the production of goods and delivery of services. The correct incentive for
applying automation is to increase productivity, and/or quality beyond that possible with
current human labor levels so as to realize economies of scale, and/or realize predictable
quality levels. The incorrect application of automation, which occurs most often, is an effort
to eliminate or replace human labor. Simply put, whereas correct application of automation
can net as much as 3 to 4 times original output with no increase in current human labor costs,
incorrect application of automation can only save a fraction of current labor level costs. In
the scope of industrialization, automation is a step beyondmechanization. Whereas
mechanization provides human operators with machinery to assist them with the muscular
requirements of work, automation greatly decreases the need for human sensory and mental
requirements while increasing load capacity, speed, and repeatability. Automation plays an
increasingly important role in the world economy and in daily experience.
Automation has had a notable impact in a wide range of industries
beyond manufacturing (where it began). Once-ubiquitous telephone operators have been
replaced largely by automated telephone switchboards and answering machines. Medical
processes such as primary screening inelectrocardiography or radiography and laboratory
analysis of human genes, sera, cells, and tissuesare carried out at much greater speed and
accuracy by automated systems. Automated teller machines have reduced the need for bank
visits to obtain cash and carry out transactions. In general, automation has been responsible
for the shift in the world economy from industrial jobs to service jobs in the 20th and 21st
centuries.
The term automation, inspired by the earlier word automatic (coming from automaton), was
not widely used before 1947, when General Motors established the automation department.
At that time automation technologies were electrical, mechanical, hydraulic and pneumatic.
RIET/B.TECH/EE/15EREEE010/Page | 1
VWTPL, JAIPUR
Between 1957 and 1964 factory output nearly doubled while the number of blue collar
workers started to decline.
1.2 ADVANTAGES AND DISADVANTAGES:-
The main advantages of automation are:
Increased throughput or productivity.
Improved quality or increased predictability of quality.
Improved robustness (consistency), of processes or product.
The following methods are often employed to improve productivity, quality, or robustness.
Install automation in operations to reduce cycle time.
Install automation where a high degree of accuracy is required.
Replacing human operators in tasks that involve hard physical or monotonous work.
Replacing humans in tasks done in dangerous environments (i.e. fire, space,
volcanoes, nuclear facilities, underwater, etc.)
Performing tasks that are beyond human capabilities of size, weight, speed, endurance, etc.
Economy improvement: Automation may improve in economy of enterprises, society or most
of humanity. For example, when an enterprise invests in automation, technology recovers its
investment; or when a state or country increases its income due to automation
like Germany or Japan in the 20th Century.
Reduces operation time and work handling time significantly.
Frees up workers to take on other roles.
Provides higher level jobs in the development, deployment, maintenance and running
of the automated processes.
The main disadvantages of automation are:
Security Threats/Vulnerability: An automated system may have a limited level of
intelligence, and is therefore more susceptible to committing errors outside of its immediate
scope of knowledge (e.g., it is typically unable to apply the rules of simple logic to general
propositions).
Unpredictable/excessive development costs: The research and development cost of
automating a process may exceed the cost saved by the automation itself.
RIET/B.TECH/EE/15EREEE010/Page | 2
VWTPL, JAIPUR
High initial cost: The automation of a new product or plant typically requires a very large
initial investment in comparison with the unit cost of the product, although the cost of
automation may be spread among many products and over time.
In manufacturing, the purpose of automation has shifted to issues broader than productivity,
cost, and time.
1.3 RELIABILITY AND PRECISION
The old focus on using automation simply to increase productivity and reduce costs was seen
to be short-sighted, because it is also necessary to provide a skilled workforce who can make
repairs and manage the machinery. Moreover, the initial costs of automation were high and
often could not be recovered by the time entirely new manufacturing processes replaced the
old. (Japan's "robot junkyards" were once world famous in the manufacturing industry.)
Automation is now often applied primarily to increase quality in the manufacturing process,
where automation can increase quality substantially. For example, internal combustion
engine pistons used to be installed manually. This is rapidly being transitioned to automated
machine installation, because the error rate for manual installment was around 1-1.5%, but
has been reduced to 0.00001% with automation.
1.5AUTOMATION TOOLS
Engineers can now have numerical control over automated devices. The result has been a
rapidly expanding range of applications and human activities. Computer-aided
technologies (or Coax) now serve the basis for mathematical and organizational tools used to
create complex systems. Notable examples of Coax include Computer-aided design (CAD
software) and Computer-aided manufacturing (CAM software). The improved design,
analysis, and manufacture of products enabled by Coaxhas been beneficial for industry.
RIET/B.TECH/EE/15EREEE010/Page | 3
VWTPL, JAIPUR
Information technology, together with industrial machinery and processes, can assist in the
design, implementation, and monitoring of control systems. One example of an industrial
control system is a programmable logic controller (PLC). PLCs are specialized hardened
computers which are frequently used to synchronize the flow of inputs from
(physical) sensors and events with the flow of outputs to actuators and events.
1.6HUMAN MACHINE INTERFACE
Human-machine interfaces (HMI) or computer human interfaces (CHI), formerly known
asman-machine interfaces, are usually employed to communicate with PLCs and other
computers. Service personnel who monitor and control through HMIs can be called by
different names. In industrial process and manufacturing environments, they are called
operators or something similar. In boiler houses and central utilities departments they are
called stationary engineers.
1.7LIMITATIONS TO AUTOMATION
RIET/B.TECH/EE/15EREEE010/Page | 4
VWTPL, JAIPUR
3. Similar to the above, as more and more processes become automated, there are fewer
remaining non-automated processes. This is an example of exhaustion of opportunities.
1.8 APPLICATION
The Defense Advanced Research Projects Agency (DARPA) started the research and
development of automated visual surveillance and monitoring (VSAM) program, between
1997 and 1999, and airborne video surveillance (AVS) programs, from 1998 to 2002.
Currently, there is a major effort underway in the vision community to develop a fully
automated tracking surveillance system. Automated video surveillance monitors people and
vehicles in real time within a busy environment. Existing automated surveillance systems are
based on the environment they are primarily designed to observe, i.e., indoor, outdoor or
airborne, the amount of sensors that the automated system can handle and the mobility of
sensor, i.e., stationary camera vs. mobile camera. The purpose of a surveillance system is to
record properties and trajectories of objects in a given area, generate warnings or notify
designated authority in case of occurrence of particular events.
As demands for safety and mobility have grown and technological possibilities have
multiplied, interest in automation has grown. Seeking to accelerate the development and
introduction of fully automated vehicles and highways, the Congress authorized more than
$650 million over six years for intelligent transport systems (ITS) and demonstration projects
in the 1991Intermodal Surface Transportation Efficiency Act (ISTEA). Congress legislated
in ISTEA that “the Secretary of Transportation shall develop an automated highway and
vehicle prototype from which future fully automated intelligent vehicle-highway systems can
be developed. Such development shall include research in human factors to ensure the
success of the man-machine relationship. The goal of this program is to have the first fully
RIET/B.TECH/EE/15EREEE010/Page | 5
VWTPL, JAIPUR
automated highway roadway or an automated test track in operation by 1997. This system
shall accommodate installation of equipment in new and existing motor vehicles." [ISTEA
1991, part B, Section 6054(b)].
1.9AUTOMATED MANUFACTURING
Automated manufacturing refers to the application of automation to produce things in the
factory way. Most of the advantages of the automation technology has its influence in the
manufacture processes.
The main advantages of automated manufacturing are higher consistency and quality,
reduced lead times, simplified production, reduced handling, improved work flow, and
increased worker morale when a good implementation of the automation is made.
1.10HOME AUTOMATION
Home automation (also called domotics) designates an emerging practice of increased
automation of household appliances and features in residential dwellings, particularly
through electronic means that allow for things impracticable, overly expensive or simply not
possible in recent past decades.
1.11INDUSTRIAL AUTOMATION
Industrial automation deals with the optimization of energy-efficient drive systems by precise
measurement and control technologies. Nowadays energy efficiency in industrial processes
are becoming more and more relevant. Semiconductor companies like Infineon
Technologies are offering 8-bit microcontroller applications for example found in motor
controls, general purpose pumps, fans, and ebikes to reduce energy consumption and thus
increase efficiency. One of Infineon`s 8-bit product line found in industrial automation is
the XC800 family.
Agriculture: Now that we’re moving towards automated orange-sorting[1] and autonomous
tractors[2], the next step in automated agriculture is robotic strawberry pickers[3].
RIET/B.TECH/EE/15EREEE010/Page | 6
VWTPL, JAIPUR
1.12AGENT-ASSISTED AUTOMATION
Agent-assisted Automation refers to automation used by call center agents to handle
customer inquiries. There are two basic types: desktop automation and automated voice
solutions. Desktop automation refers to software programming that makes it easier for the
call center agent to work across multiple desktop tools. The automation would take the
information entered into one tool and populate it across the others so it did not have to be
entered more than once, for example. Automated voice solutions allow the agents to remain
on the line while disclosures and other important information is provided to customers in the
form of pre-recorded audio files. Specialized applications of these automated voice solutions
enable the agents to process credit cards without ever seeing or hearing the credit card
numbers or CVV codes.
The key benefit of agent-assisted automation is compliance and error-proofing. Agents are
sometimes not fully trained or they forget or ignore key steps in the process.
RIET/B.TECH/EE/15EREEE010/Page | 7
VWTPL, JAIPUR
Chapter-2
SUPERVISORY CONTROL AND DATA ACQUISTION
INTRODUCTION
An industrial SCADA system will be used for the development of the controls of the
fourLHC experiments. This paper describes the SCADA systems in terms of
theirarchitecture, their interface to the process hardware, the functionality and theapplication
development facilities they provide.Widely used in industry for Supervisory Control and
Data Acquisition of industrialprocesses, SCADA systems are now also penetrating the
experimental physicslaboratories for the controls of ancillary systems such as cooling,
ventilation, powerdistribution, etc.
2.1 SCADA
SCADA systems have made substantial progress over the recent years in terms
offunctionality, scalability, performance and openness such that they are an alternative to
inhouse development even for very demanding and complex control systems as those
ofphysics experiments.
1. Dynamic process Graphic :Object interact can be assigned to graphic objects for specific
user interactions. Users can also implement custom interactions like context-dependant
menus, alarm acknowledgment or custom editing.
The E-XD++ Diagram is a top-of-the-line real-time graphics and data visualization product
with various additional packages and deployment options.
RIET/B.TECH/EE/15EREEE010/Page | 8
VWTPL, JAIPUR
2. Alarm summery: Alarm Summary page displays a historical log of alarms that you can
use for long term analysis and troubleshooting. It displays the date and time
each alarm reached ON state and OFF state.
3. Alarm history :As alarm notification providers thinking about the future, it’s sometimes important
to reflect on the past. alarm notification systems help plant operators navigate challenges that get in
the way of communication, safety, and productivity. How we meet those needs is ever-evolving.
4. Historical time trend: The Open Trend system has the ability to trend any real-time,
calculated or application generated data value from the system database. The historical
trending supports the storage of trend data for an unlimited period of time.
5. Security (Application Security): security is :Security gives a lender or oblige a legal right
of access to the pledged asset and to take their possession and title in case of default for a
foreclosure sale. 3. Computing: The extent to which a computer system is protected from
data corruption, destruction, interception, loss, or unauthorized access.
6. Data base connectivity: Event Logs are an easy way to process on-going system
information, such as: user-logs, alerts, system warnings, changed data values, etc. As well as
storing event logs in readable text files, or routing them to printers, they can be written to
sequential tables in Microsoft Access databases.
7. Device connectivity: device connectivity is a process which is other device is contact to
other device and they can share their data
8. Scripts: scripts is a programming language which is write a program to operate any device.
RIET/B.TECH/EE/15EREEE010/Page | 9
VWTPL, JAIPUR
Chapter-3
3. MEANING OF SCADA
SCADA stands for Supervisory Control And Data Acquisition. As the name indicates, itis
not a full control system, but rather focuses on the supervisory level. As such, it is apurely
software package that is positioned on top of hardware to which it is interfaced, ingeneral via
Programmable Logic Controllers (PLCs), or other commercial hardwaremodules.
SCADA systems are used not only in industrial processes: e.g. steel making,
powergeneration (conventional and nuclear) and distribution, chemistry, but also in
someexperimental facilities such as nuclear fusion. The size of such plants range from a
few1000 to several 10 thousands input/output (I/O) channels. However, SCADA
systemsevolve rapidly and are now penetrating the market of plants with a number of
I/Ochannels of several 100 K: we know of two cases of near to 1 M I/O channels
currentlyunder development.SCADA systems used to run on DOS, VMS and UNIX; in
recent years all SCADAvendors have moved to NT and some also to Linux.
3.1 ARCHITECTURE
RIET/B.TECH/EE/15EREEE010/Page | 10
VWTPL, JAIPUR
However, it is possible to have dedicated servers for particular tasks, e.g. historian,data
logger, alarm handler. Fig. 3.1 shows a SCADA architecture that is generic for theproducts
that were evaluated.
3.2 COMMUNICATIONS
RIET/B.TECH/EE/15EREEE010/Page
RIET/B.TECH/EE/15EREEE | 11
VWTPL, JAIPUR
3.3 INTERFACING
The PC products provide support for the Microsoft standards such as Dynamic
DataExchange (DDE) which allows e.g. to visualize data dynamically in an
EXCELspreadsheet, Dynamic Link Library (DLL) and Object Linking and Embedding
(OLE).
3.3.2 DATABASE
The configuration data are stored in a database that is logically centralized but
physicallydistributed and that is generally of a proprietary format.System (RDBMS) at a
slower rate either directly or via an ODBC interface
3.4 FUNCTIONALITY
RIET/B.TECH/EE/15EREEE010/Page | 13
VWTPL, JAIPUR
3.4.3 TRENDING
The products all provide trending facilities and one can summarize the commoncapabilities
as follows:
• the parameters to be trended in a specific chart can be predefined or defined online
• a chart may contain more than 8 trended parameters or pens and an unlimited
• number of charts can be displayed (restricted only by the readability)
• real-time and historical trending are possible, although generally not in the samechart
• historical trending is possible for any archived parameter
• zooming and scrolling functions are provided
• parameter values at the cursor position can be displayed
• The trending feature is either provided as a separate module or as a graphical object
• (ActiveX), which can then be embedded into a synoptic display. XY and other
statistical
• analysis plots are generally not provided.
3.4.4 ALARM HANDLING
Alarm handling is based on limit and status checking and performed in the data servers.More
complicated expressions (using arithmetic or logical expressions) can be developedby
creating derived parameters on which status or limit checking is then performed. Thealarms
are logically handled centrally, i.e., the information only exists in one place andall users see
the same status (e.g., the acknowledgement), and multiple alarm prioritylevels (in general
many more than 3 such levels) are supported.
It is generally possible to group alarms and to handle these as an entity (typically filteringon
group or acknowledgement of all alarms in a group). Furthermore, it is possible tosuppress
alarms either individually or as a complete group. The filtering of alarms seenon the alarm
page or when viewing the alarm log is also possible at least on priority, timeand group.
However, relationships between alarms cannot generally be defined in astraightforward
manner. E-mails can be generated or predefined actions automaticallyexecuted in response to
alarm conditions
3.4.5 LOGGING/ARCHIVING
The terms logging and archiving are often used to describe the same facility.
However,logging can be thought of as medium-term storage of data on disk, whereas
RIET/B.TECH/EE/15EREEE010/Page | 14
VWTPL, JAIPUR
3.5.1 CONFIGURATION
The development of the applications is typically done in two stages. First the
processparameters and associated information (e.g. relating to alarm conditions) are
definedthrough some sort of parameter definition template and then the graphics,
includingtrending and alarm displays are developed, and linked where appropriate to the
processparameters. The products also provide an ASCII Export/Import facility for
theconfiguration data (parameter definitions), which enables large numbers of parameters
tobe configured in a more efficient manner using an external editor such as Excel and
thenimporting the data into the configuration database.
However, many of the PC tools now have a Windows Explorer type development studio.The
developer then works with a number of folders, which each contains a differentaspect of the
configuration, including the graphics.The facilities provided by the products for configuring
very large numbers of parametersare not very strong. However, this has not really been an
issue so far for most of theproducts to-date, as large applications are typically about 50K I/O
RIET/B.TECH/EE/15EREEE010/Page | 15
VWTPL, JAIPUR
points and databasepopulation from within an ASCII editor such as Excel is still a workable
option.On-line modifications to the configuration database and the graphics is generally
possiblewith the appropriate level of privileges.
industrial applications are increasing in size, new SCADA versions are now beingdesigned to
handle devices and even entire systems as full entities (classes) thatencapsulate all their
specific attributes and functionality. In addition, they will alsosupport multi-team
development.
3.7 ENGINEERING
Whilst one should rightly anticipate significant development and maintenance savings
byadopting a SCADA product for the implementation of a control system, it does not meana
"no effort" operation. The need for proper engineering can not be sufficientlyemphasized to
reduce development effort and to reach a system that complies with therequirements, that is
economical in development and maintenance and that is reliable androbust. Examples of
engineering activities specific to the use of a SCADA system are thedefinition of:
A library of objects (PLC, device, subsystem) complete with standard objectbehavior (script,
sequences, ...), graphical interface and associated scripts foranimation,templates for different
types of "panels", e.g. Alarms,instructions on how to control e.g.
A mechanism to prevent conflicting control(if not provided with the SCADA),alarm levels,
behavior to be adopted in case of specific alarms.
For large collaborations, as for the CERN LHC experiments, using a SCADA system fortheir
controls ensures a common framework not only for the development of the
specificapplications but also for operating the detectors. Operators experience the same "look
andfeel" whatever part of the experiment they control. However, this aspect also depends to
asignificant extent on proper engineering.
RIET/B.TECH/EE/15EREEE010/Page | 18
VWTPL, JAIPUR
Chapter-4
PROGRAMMABLE LOGIC CONTROLLER
(PLC)
4.1 INTRODUCTION
Control engineering has evolved over time. In the past humans were the mainmethod for
controlling a system. More recently electricity has been used for control andearly electrical
control was based on relays. These relays allow power to be switched onand off without a
mechanical switch. It is common to use relays to make simple logicalcontrol decisions. The
development of low cost computer has brought the most recent revolution,the Programmable
Logic Controller (PLC). The advent of the PLC began in the1970s, and has become the most
common choice for manufacturing controls.
PLCs have been gaining popularity on the factory floor and will probably remainpredominant
for some time to come. Most of this is because of the advantages they offer.
• Cost effective for controlling complex systems.
• Flexible and can be reapplied to control other systems quickly and easily.
• Computational abilities allow more sophisticated control.
• Trouble shooting aids make programming easier and reduce downtime.
• Reliable components make these likely to operate for years before failure.
Modern control systems still include relays, but these are rarely used for logic. Arelay is a
simple device that uses a magnetic field to control a switch. When a voltage is applied to the
input coil, the resulting current creates a magneticfield. The magnetic field pulls a metal
switch (or reed) towards it and the contacts touch,closing the switch. The contact that closes
when the coil is energized is called normallyopen. The normally closed contacts touch when
the input coil is not energized. Relays arenormally drawn in schematic form using a circle to
represent the input coil. The outputcontacts are shown with two parallel lines. Normally open
contacts are shown as twolines, and will be open (non-conducting) when the input is not
energized. Normally closedcontacts are shown with two lines with a diagonal line through
them. When the input coilis not energized the normally closed contacts will be closed
(conducting).
Relays are used to let one power source close a switch for another (often high current) power
source, while keeping them isolated. An example of a relay in a simple control application is
shown in Figure 4. In this system the first relay on the left is used as normally closed, and
will allow current to flow until a voltage is applied to the input A. The second relay is
normally open and will not allow current to flow until a voltage is applied to the input B. If
current is flowing through the first two relays then current will flow through the coil in the
third relay, and close the switch for output C. This circuit would normally be drawn in the
ladder logic form
RIET/B.TECH/EE/15EREEE010/Page | 20
VWTPL, JAIPUR
The example in Figure 4.1 does not show the entire control system, but only the logic. When
we consider a PLC there are inputs, out
outputs, and the logic. Figure 4.2 shows a more complete
representation of the PLC. Here there are two inputs from push buttons.
We can imagine the inputs as activating 24V DC relay coils in the PLC. This in turn drives
an output relay that switches 115V AC, that will turn on a light. Note, in actual PLCs inputs
are never relays, but outputs are often relays. The ladder logic in the PLC is actually a
computer program that the user can enter and change. Notice that both of the input push
buttons are normally open, but the ladder logic inside the PLC has one normally open
contact, and one normally closed contact. Do not think that the ladder logic in the PLC needs
to match the inputs or outputs. Many beginners will get caught trying to make the ladder
logic match the input types.
RIET/B.TECH/EE/15EREEE010/Page
RIET/B.TECH/EE/15EREEE | 21
VWTPL, JAIPUR
Many relays also have multiple outputs (throws) and this allows an output relay to also be an
input simultaneously. The circuit shown in Figure 4.2 is an example of this, it is called a seal
in circuit. In this circuit the current can flow through either branch of the circuit, through the
contacts labeled A or B. The input B will only be on when the output B is on. If B is off, and
A is energized, then B will turn on. If B turns on then the input B will turn on, and keep
output B on even if input A goes off. After B is turned on the output B will not turn off.
RIET/B.TECH/EE/15EREEE010/Page | 22
VWTPL, JAIPUR
4.2 PROGRAMMING
The first PLCs were programmed with a technique that was based on relay logic wiring
schematics. This eliminated the need to teach the electricians, technicians and engineers how
to program a computer - but, this method has stuck and it is the most common technique for
programming PLCs today. An example of ladder logic can be seen in Figure 4.3. To interpret
this diagram imagine that the power is on the vertical line on the left hand side, we call this
the hot rail. On the right hand side is the neutral rail. In the figure there are two rungs, and on
each rung there are combinations of inputs (two vertical lines) and outputs (circles). If the
inputs are opened or closed in the right combination the power can flow from the hot rail,
through the inputs, to power the outputs, and finally to the neutral rail. An input can come
from a sensor, switch, or any other type of sensor. An output will be some device outside the
PLC that is switched on or off, such as lights or motors. In the top rung the contacts are
normally open and normally closed.Which means if input A is on and input B is off, then
power will flow through the output and activate it. Any other combination of input values
will result in the output X being off.
RIET/B.TECH/EE/15EREEE010/Page | 23
VWTPL, JAIPUR
The second rung of Figure 4.4 is more complex, there are actually multiple combinationsof
inputs that will result in the output Y turning on. On the left most part of therung, power
could flow through the top if C is off and D is on. Power could also (andsimultaneously) flow
through the bottom if both E and F are true. This would get powerhalf way across the rung,
and then if G or H is true the power will be delivered to output Y.In later chapters we will
examine how to interpret and construct these diagrams.There are other methods for
programming PLCs. One of the earliest techniquesinvolved mnemonic instructions. These
instructions can be derived directly from the ladderlogic diagrams and entered into the PLC
through a simple programming terminal.
Anexample of mnemonics is shown in Figure 4.4. In this example the instructions are
readone line at a time from top to bottom. The first line 00000 has the instruction LDN
(inputload and not) for input 00001. This will examine the input to the PLC and if it is off it
willremember a 1 (or true), if it is on it will remember a 0 (or false). The next line uses an
LD(input load) statement to look at the input. If the input is off it remembers a 0, if the
inputis on it remembers a 1 (note: this is the reverse of the LD). The AND statement recalls
thelast two numbers remembered and if the are both true the result is a 1, otherwise the
resultis a 0. This result now replaces the two numbers that were recalled, and there is only
onenumber remembered. The process is repeated for lines 00003 and 00004, but when
theseare done there are now three numbers remembered. The oldest number is from the
AND,the newer numbers are from the two LD instructions. The AND in line 00005 combines
theresults from the last LD instructions and now there are two numbers remembered. The
ORinstruction takes the two numbers now remaining and if either one is a 1 the result is a
1,otherwise the result is a 0. This result replaces the two numbers, and there is now a single
number there. The last instruction is the ST (store output) that will look at the last value
stored and if it is 1, the output will be turned on, if it is 0 the output will be turned off.
RIET/B.TECH/EE/15EREEE010/Page | 24
VWTPL, JAIPUR
The ladder
adder logic program in Figure4.4
Figure4.4, is equivalent to the mnemonic program.Even if you
have programmed a PLC with ladder logic, it will be converted to mnemonicform before
being used by the PLC. In the past mnemonic programming was the mostcommon, but now it
is uncommon for users to even see mnemonic programs.
Sequential Function Charts (SFCs) have been developed to accommodate the programmingof
more advanced systems. These are similar to flowcharts, but much morepowerful.
morepowerful The
example seen in Figure 8 is doing two different things. To read tthe
he chart,start at the top
where is says start.. Below this there is the double horizontal line that saysfollow both paths.
As a result the PLC will start to follow the branch on the left and righthand sides separately
and simultaneously. On the left there aare two functions the first oneis the power up function.
This function will run until it decides it is done, and the powerdown function will come after.
On the right hand side is the flash function, this will rununtil
until it is done. These functions look
unexplained, but each function, such as power upwill
will be a small ladder logic program. This
RIET/B.TECH/EE/15EREEE010/Page
RIET/B.TECH/EE/15EREEE | 25
VWTPL, JAIPUR
method is much different from flowchartsbecause it does not have to follow a single path
through the flowchart.
Figure 4.5
4.5:- The Separation of Controller and Process
The control loop iss a continuous cycle of the PLC reading inputs, solving the ladderlogic, and
then changing the outputs. Like any computer this does not happen
happeninstantly.
stantly. Figure 4.6
shows the basic operation cycle of a PLC. When power is turned oninitially the PLC does a
quick sanity check to ensure that the hardware is working properly.
If there is a problem the PLC will halt and indicate there is an error. For example, ifthe PLC
backup battery is low and power was lost, the memory will be corrupt and thiswill result in a
fault. If the PLC passes the sanity check it will then scan (read) all theinputs. After the inputs
values are stored in memory the ladder logic will be scanned(solved) using the stored values
RIET/B.TECH/EE/15EREEE010/Page
RIET/B.TECH/EE/15EREEE | 26
VWTPL, JAIPUR
- not the current values. This is done to prevent logicproblems when inputs change during the
ladder logic scan. When the ladder logic scan iscomplete the outputs will be scanned (the
output values will be changed). After this thesystem goes back to do a sanity check, and the
loop continues indefinitely. Unlike normalc
normalcomputers,
omputers, the entire program will be run every
scan. Typical times for each of the stagesis in the order of milliseconds.
RIET/B.TECH/EE/15EREEE010/Page
RIET/B.TECH/EE/15EREEE | 27
VWTPL, JAIPUR
RIET/B.TECH/EE/15EREEE010/Page
RIET/B.TECH/EE/15EREEE | 28
VWTPL, JAIPUR
RIET/B.TECH/EE/15EREEE010/Page
RIET/B.TECH/EE/15EREEE | 29
VWTPL, JAIPUR
Chapter-5
CONCLUSION
RIET/B.TECH/EE/15EREEE010/Page | 30
VWTPL, JAIPUR
REFERENCES
http://www.google.co.in/#hl=en&sclient=psy- bih=667
http://www.google.co.incement+wikipedia&oq=instruments+of++SCADA+wikipedi
a&gs
http://www.google.co.in/automation==241
http://www.google.co.in/PLC==441
RIET/B.TECH/EE/15EREEE010/Page | 31