Академический Документы
Профессиональный Документы
Культура Документы
In no event is Honeywell liable to anyone for any indirect, special or consequential damages. The
information and specifications in this document are subject to change without notice.
Honeywell, TotalPlant, Uniformance PHD, and Business FLEX are U.S. registered trademarks of
Honeywell Inc.
Release Information
Uniformance 310
Document Revision: 15
Document Revision Date: February, 2012
Document ID: pim2901.pdf
Document PARs Fixed:
Document PAR
Revision
12 n/a Revised the document for R300.
14 1-B4MJ7D
Europe
Contact: Honeywell TAC-EMEA
Phone: +32-2-728-2732
Facsimile: +32-2-728-2696
Mail: TAC-BE02
Hermes Plaza
Hermeslaan, 1H
B-1831 Diegem, Belgium
Pacific
Contact: Honeywell Global TAC – Pacific
Phone: 1300-300-4822 (toll free within Australia)
+61-8-9362-9559 (outside Australia)
Facsimile: +61-8-9362-9564
Mail: Honeywell Limited Australia
5 Kitchener Way
Burswood 6100, Western Australia
Email: GTAC@honeywell.com
India
Contact: Honeywell Global TAC – India
Phone: +91-20- 66039400
Facsimile: +91-20- 66039800
Mail: Honeywell Automation India Ltd.
56 and 57, Hadapsar Industrial Estate
Hadapsar, Pune –411 013, India
Email: Global-TAC-India@honeywell.com
Korea
Contact: Honeywell Global TAC – Korea
Phone: +82-80-782-2255 (toll free within Korea)
Facsimile: +82-2-792-9015
Mail: Honeywell Co., Ltd
4F, Sangam IT Tower B4-4 Block
1590, DMC Sangam-dong, Mapo-gu,
Seoul, 121-835, Korea
Email: Global-TAC-Korea@honeywell.com
People’s Republic of China
Contact: Honeywell Global TAC – China
Phone: +86- 21-52574568
Mail: Honeywell (China) Co., Ltd
33/F, Tower A, City Center, 100 Zunyi Rd.
Shanghai 200051, People’s Republic of China
Email: Global-TAC-China@honeywell.com
Singapore
Contact: Global TAC – South East Asia
Phone: +65-6580-3500
Facsimile: +65-6580-3501
+65-6445-3033
Mail: Honeywell Private Limited
Honeywell Building
17, Changi Business Park Central 1
Singapore 486073
Email: GTAC-SEA@honeywell.com
Taiwan
Contact: Global TAC – Taiwan
Phone: +886- 7- 536 2567
Facsimile: +886-7-536 2039
Mail: Honeywell Taiwan Ltd.
17F-1, No. 260, Jhongshan 2nd Road.
Cianjhen District
Kaohsiung, Taiwan, ROC
Email: Global-TAC-Taiwan@honeywell.com
Japan
Contact: Global TAC – Japan
Phone: +81-3-6730-7160
Facsimile: +81-3-6730-7228
Mail: Honeywell Japan Inc.
New Pier Takeshiba, South Tower Building,
20th Floor, 1-16-1 Kaigan, Minato-ku,
Tokyo 105-0022, Japan
Email: Global-TAC-JapanJA25@honeywell.com
Elsewhere
Call your nearest Honeywell office.
World Wide Web
Honeywell Solution Support Online: http://www.honeywell.com/ps
Training Classes
Honeywell Automation College: http://www.automationcollege.com
Configuring the PHD OPC How to configure the PHD OPC Server.
Server
Using the PHD OPC Server General information useful to the application developer.
This section also describes the server name forms and
data types supported.
OLE for Process Control Data Access Standard Version 3 See NOTE
OLE for Process Control Data Historical Data Access Version 1.2 See NOTE
NOTE: Information on OPC automation standards can be found in the publicly available
OPC specifications at www.opcfoundation.org.
OPC DA The OPC Data Access (DA) standard interface allows clients to gain
access to real-time (current) data values maintained by a PHD Server.
OPC HDA The OPC Historical Data Access (HDA) standard interface allows clients
to gain access to historical data values maintained by a PHD Server.
Memory 64 MB
Software environment
Item Requirement
PHD OPC Server Requires the installation of PHD Server software on at least one
computer system within the same network domain.
Network environment
Item Requirement
Network Protocols Ethernet, TCP/IP, Microsoft application layer software (RPC and
DCOM). One of the following name services must be available:
DNS
WINS
Local Host File
Install Description
Type
Client Installs the OPC Client DLLs and registers the OPC Server name
on this machine.
Install Description
Type
Server Installs the complete OPC server, registers the OPC Client DLLs,
and registers the OPC Server name.
1 Always enabled
2 Always disabled
Cached browsing
Tag browsing has the potential to be a slow and memory intensive process. Browsing may be
performed in a cached mode. If cached browsing is enabled, all PHD tags "queried" during
the first browse are "cached" in memory. Any subsequent requests to browse for tags will go
to this cache for tag information. If disabled, each browse request will go to PHD for tag
information. The advantage of caching is that any subsequent browse request is quicker after
the first request; however, with cached browsing enabled, you will not see updated or new
PHD tags through the browse.
The cached browsing can be enabled by changing the registry setting under the following key:
HKEY_LOCAL_MACHINE\SOFTWARE\Honeywell\Uniformance\OPCServer\
CacheBrowseInfo
Valid options are:
0 : Disabled
1 : Enabled
REFERENCE – EXTERNAL
For information on OPC DCOM communications with Windows XP and
Windows 2003 , refer to the white paper 'Using OPC via DCOM with XP SP2.pdf',
available at http://opcfoundation.org. This white paper also applies to
Windows 2003 SP1 and greater.
Note: Do not attempt to modify DCOM settings without a thorough understanding of the
impact it may have on your system.
Step Action
1 Click Start on the Windows taskbar. Click Run. The Run dialog box appears.
Step Action
RESULT:
On Windows 2003/XP:
On Windows 2000:
Note:
Step Action
Default Properties
3 Click the Default Properties tab.
4 Set the Default Properties as shown in the following screen example:
Step Action
Default Protocols
5 Click the Default Protocols tab.
6 Ensure that Connection-oriented TCP/IP is the first protocol listed.
Step Action
On Windows 2000: Steps 6, 7, and 8 are not applicable - skip to Step 12.
Step Action
Step Action
TIP:
1) Click Add.
3) Click OK.
Step Action
7) Click OK.
8) Click OK.
Step Action
11 Click OK to close the 'Access Permission' window.
13 Add the Everyone group and ensure that it has the correct permissions, as
shown in the following screen examples.
Step Action
On Windows 2000: Ensure that the Everyone group has Allow Access
selected for ‘Type of Access’.
Step Action
14 Click OK to close the window.
Windows 2003/XP:
Step Action
On Windows 2000:
Step Action
1 On Windows 2003/XP: In the Component Services console tree, expand the
following directories: Component Services>Computers>My
Computer>DCOM Config. A list of the components will appear.
(You will need to repeat the following steps for the Uniformance PHD OPC
DA Server component.)
Windows 2003/XP:
Step Action
Windows 2000:
Step Action
3 Click the Location tab. Edit the properties as shown in the following screen
example.
The PHD OPC Server runs on the local system by default. If you wish to run
the Server on a remote machine, select 'Run application on the following
computer' and enter the computer name.
You may need to install the PHD OPC Server software on the remote
computer before you can configure it to execute there.
Step Action
4 Click the Security tab.
The Security tab is used to customize the access, launch, and configuration
permissions for a selected individual COM component.
On Windows 2000, normally you need not change these settings. Skip to
Step X.
Step Action
5 Add the Distributed COM Users group to the list if it is not there already.
Ensure the Distributed COM Users group has Remote Launch and
Remote Activation enabled, as shown in the following screen example.
6 Click OK.
Step Action
7 On the Security tab, under Access Permissions, select Customize and
click Edit.
Step Action
8 Add the Distributed COM Users group to the list if it is not there already.
Ensure the Distributed COM Users group has Remote Access enabled, as
shown in the following screen example.
Step Action
9 Select the Identity tab.
By default, the PHD OPC Server runs under the identity of The Launching
user - the user who initially launches it.
If you wish the server to run under a specific user identity, select This User
and enter the username and password.
Launch of the PHD OPC Server with the identity of The interactive user is
often used for interactive client applications that use asynchronous
operations that require the server to execute callbacks with the appropriate
identity.
Note: Ensure that the selected user identity has rights to access and launch
the component.
10 Repeat this procedure (steps 1-9) for the Uniformance PHD OPC DA Server
component.
The system configuration represented in the previous figure has three Uniformance PHD
Servers used by clients.
Multiple PHD Servers often provide distributed history storage to a varied group of clients,
thereby providing better security and more predictable system loading. In this example
diagram, the client applications executing on computers in the Level 4 LAN are isolated from
access to Level 3 and the control system environment by the “Shadow” PHD server. They are
still able to access data provided to the “Shadow” by the PHD Servers on the Level 3 LAN.
The previous diagram illustrates the following configuraton:
“Shadow” and “Collector” PHD Servers share a common reference database, maintained
by a SQL Server RDBMS located on “Shadow”. Both servers share the identical
configuration information. This allows “Shadow” to maintain identical data as
“Collector” by retrieving its data and storing it locally.
The Clients accessing history data through “Shadow” (typically, the Level 4 clients) are
able to access data collected by “Collector” transparently. This configuration is
commonly used to isolate a Level 3 history server, in this case, “Collector”, from any
dynamic load imposed by client data queries from Level 4. In addition, the existence of
PHD Server “Collector” is unknown to the Level 4 clients, allowing greater control on
the security of the Level 3 system.
“Peer” PHD Server uses its own reference data independent from that shared by the other
two servers, effectively isolating this server from Level 4 entirely. Its configuration and
the data values it stores are not accessable to Level 4 clients; however, you can replicate
configuration information from this server in a configuration database used by the other
two PHD Servers, so they provide access to a portion, or all, of the historical data
maintained by “Peer”.
Both “Collector” and “Peer” are configured to use real-time interfaces that collect data
from the same DCS. These two servers, using separate databases, operate as peers and
may be configured to store data samples for the same point variable.
Once implemented, PHD security is absolute. All access is governed by the privileges
granted by the roles assigned to the user and PHD objects. There are no default privileges.
The security configuration controlled by the PHD Server is optional, and may be enabled or
disabled:
Required expertise
Developing an OPC client application is not a trivial undertaking. You must be familiar with
OPC and the underlying Microsoft DCOM architecture, and should be well versed in the
development of applications in Visual C++ or Visual Basic. There are numerous documents
available that will help you obtain the necessary expertise.
If you are developing an OPC client application that uses the PHD OPC Server, become
familiar with the Uniformance PHD to understand the fundamentals of its implementation and
the services it provides.
HRESULT
In order to make the return interface consistent with OPC APIs, the PHD OPC Server uses a
consistent 32-bit return value called HRESULT. Each API description includes a table of
returned HRESULT values.
PHD OPC interfaces return the following status values:
S_OK
E_FAIL
E_ABORT
OPC_E_UNKNOWNITEMID
OPC_E_BADRIGHTS
E_ACCESSDENIED
E_NOTIMPL
E_INVALIDARG
E_UNEXPECTED
E_NOINTERFACE
E_POINTER
E_OUTOFMEMORY
Ordinal VT_I4
String VT_BSTR
Array indexing
PHD support for array data types depends on the real-time data interface (collector) being
used. Each element of an array type DCS parameter must be configured as a separate PHD
Tag.
If you need to access an array element through the PHD OPC Server, you must configure a
corresponding PHD Tag for the element. For example, the following DCS names would map
to specific PHD tags, each of which must be configured in PHD to reference a specific
element of the point parameter named A100.PV:
[lcn1\]A100.PV[(1)
[lcn1\]A100.PV[(2)
[lcn1\]A100.PV[(n)
REFERENCE: For more information about configuring tags in PHD, please refer to the PHD
User Guide (pim0201).
REFERENCE: For more information about binary array tags in PHD, please refer to the
PHD Array Tag User Guide (pim3701).
-1 Bad No Data
Extrapolated values
You can use the PHD OPC Server to return extrapolated values. To use extrapolation, the
OPC items specified by the client must refer to PHD tags that are configured appropriately.
The PHD Server configuration allows you to use syntax to specify the dynamic use of
extrapolation when values are referenced - this syntax is specified in the source tag
specification of the tag configuration. The specific notation invokes a dynamic data reduction
(virtual calculation) by the PHD Server to perform the extrapolation.
For example, the following syntax specified in the source tag specification field of the PHD
tag SRC_A.A100PV.extrap invokes extrapolation of the current value from the PHD tag
SRC_A.A100.PV:
SRC_A.A100.PV{,,NOW,NOW,}
Since an extrapolated value is derived from actual data prior to the specific request time, it
has a confidence factor of less than 100%.
The PHD OPC Server translates the PHD value confidence to OPC data quality. For
extrapolated values, the OPC data quality is always Uncertain, and the sub-status is Non-
Specific.
For the definition of the mapping of PHD data confidence to OPC data quality, refer to
Interpreting data quality in this guide.
Interpolated values
The PHD OPC Server calculates interpolative and time average aggregates as follows.
INTERPOLATIVE (snapshot)
For PHD tags configured with non-float data types (not Float or Double), or with Manual
Input enabled, or with Interpolation Method of Step, the PHD OPC Server uses stepped
interpolation; otherwise it uses linear interpolation.
TIMEAVERAGE
For the time-weighted average aggregate, the PHD OPC Server uses linear interpolation.
REFERENCE: For other aggregates, refer to the OPC HDA Specification (Custom Interface
Specification Version 1.2_Errata 1) Feb 9, 2004.
http://www.opcfoundation.org/forum/viewtopic.php?t=345&postdays=0&postorder=asc&star
t=0
user rights,change, 44
using PHD OPC Server
creating client applications, 48
data standards, 49