Академический Документы
Профессиональный Документы
Культура Документы
AUTOMATION An industrial SCADA & PLCs system is used for the development of the controls of machinery. This paper describes the SCADA & PLCs systems in terms of their architecture, their interface to the process hardware, the functionality and the application development facilities they provide. Some attention is also paid to the industrial standards to which they abide their planned evolution as well as the potential benefits of their use.
Acknowledgement:
I would like to thank SOFCON INDIA PVT. LIMITED, Jaipur for providing me exposure to the whole Scada & PLCs System. Id also like to thank Mr.
Page 2
AUTOMATION Mohit and Ms Pooja, for their enduring support and guidance throughout
the training. I am very grateful to the whole Control and Instrumentation Department for their support and guidance. I am also very thankful to the workers and employees near the machineries and the library in charge for their support to my training.
1.Introduction 1.1Advantages and disadvantages 2. Automation tools 3.Defination of plc 4. Features of PLCs 5. Classificationof plc 6.Difference between ALLEN BRADELYplc
Page 3
AUTOMATION
7. I/O modules 7.1 EEPROM memory module 7.2Cycle of plc 7.3 Types of I/Os 7.4 Analog Input Module 8. Block diagram of a PLC 9. Generation of input signal 9.1 Generation of Output Signal 10. PLC compared with other control systems 11. Digital and analog signals 12. Ladder logic 12.1 Generally Used Instructions & symbol For PLC Programming 13. SCADA 14.Common system components 15 Systems concepts 16Hardware solutions 17 Supervisory Station 18.Communication infrastructure and methods: 19. Trends in SCADA 20. Security issues 21 SCADA companies 22. SCADA packages 23. Licensing patterns used in the SCADA software 24. EXE files used in Touch Software 25. Types of Window use in scada 26. Alarm and Events in scada 27. Scripts in In scada 28. Communication with software 29. SCADA architectures
Page 4
AUTOMATION
30. Application Development 30.1 Development Tools 30.2Configuration 31.Evolution 32.Benefits of SCADA 33.Commnucation of plc and scada 34. Difference between PLC and SCADA 35. SCADA Softwar 35.1SCADA Example Application 36SCADA Sensors 37. Example of plc 37.1 Programming For Start/Stop of Motor by PLC 37.2 Lamp Glows when at Input Switch is Actuated 38. Human Machine Interface 39. Remote Terminal Unit (RTU) 39.1 Supervisory Station 39.2 Operational philosophy 40. Conclusion 41.References
Page 5
AUTOMATION
1. Introduction: Automation is encompassing virtually every walk of life. Automation solutions are required right from agricultural to space technology. Plant Automation is the necessity for the manufacturing industry to survive in todays globally competitive market The art of making processes or machines self-acting or self-moving. Also pertains to the technique of making a device, machine, process or procedure more fully automatic. Automation is the use of control systems and information technologies to reduce the need for human work in the production of goods and services. In the scope of industrialization, automation is a step beyond mechanization. Whereas mechanization provided human operators with machinery to assist them with the muscular requirements of work, automation greatly decreases the need for human sensory and mental requirements as well. Automation plays an increasingly important role in the world economy and in daily experience. 1.1 Advantages and disadvantages: The main advantages of automation are: Replacing human operators in tasks that involve hard physical or monotonous work.
Page 6
AUTOMATION
Replacing humans in tasks done in dangerous environments (i.e. fire, space, volcanoes, nuclear facilities, underwater, etc.) Performing tasks that are beyond human capabilities of size, weight, speed, endurance, etc.
The main disadvantages of automation are: Unemployment rate increasesdue to machines replacing humans and putting those humans out of their jobs. Technical Limitation: Current technology is unable to automate all the desired tasks.Security Threats/Vulnerability: An automated system may have limited level of intelligence, hence it is most likely susceptible to commit error. Unpredictable development costs: The research and development cost of automating a process may exceed the cost saved by the automationitself. High initial cost: The automation of a new product or plant requires a huge initial investment in comparison with the unit cost of the product, although the cost of automation is spread in many product batches.
3.Defination of plc:
Programmable Controller is a digital computer used for automation of industrial processes, such as control of machinery on factory assembly lines. Unlike general-purpose computers, the PLC is designed for multiple inputs and output arrangements, extended temperature ranges, immunity to electrical noise, and resistance to vibration and impact. Programs to control machine operation are typically stored in battery-backed or non-volatile memory. A PLC is an example of a real time system since output results must be produced in response to input conditions within a bounded time, otherwise unintended operation will result.
Page 7
AUTOMATION
PLC is armored for severe condition (dust, moisture, heat, cold, etc) and has the facility for extensive input/output (I/O) arrangements. These connect the PLC to sensors and actuators. PLCs read limit switches, analog process variables (such as temperature and pressure), and the positions of complex positioning systems. Some even use machine vision. On the actuator side, PLCs operate electric motors, pneumatic or hydraulic cylinders, magnetic relays or solenoids, or analog outputs. The input/output arrangements may be built into a simple PLC, or the PLC may have external I/O modules attached to a computer network that plugs into the PLC.Many of the earliest PLCs expressed all decision making logic in simple ladder logic which appeared similar to electrical schematic diagrams. The electricians were quite able to trace out circuit problems with schematic diagrams using ladder logic. This program notation was chosen to reduce training demands for the existing technicians. Other early PLCs used a form of instruction list programming, based on a stack-based logic solver.The functionality of the PLC has evolved over the years to include sequential relay control, motion control, process control, distributed control systems and networking. The data handling, storage, processing power and communication capabilities of some modern PLCs are approximately equivalent to desktop computers
5.Classification of plc:
5.1Plc 5.2 Slc 5.3Dcs
Page 8
AUTOMATION
arrangements, extended temperature ranges, immunity to electrical noise, and resistance to vibration and impact. Programs to control machine operation are typically stored in batterybacked or non-volatile memory. A PLC is an example of a hard real time system since output results must be produced in response to input conditions within a bounded time, otherwise unintended operation will result. These PLCs were programmed in "ladder logic", which strongly resembles a schematic diagram of relay logic. This program notation was chosen to reduce training demands for the existing technicians. Other early PLCs used a form of instruction list programming, based on a stack-based logic solver.Modern PLCs can be programmed in a variety of ways, from ladder logic to more traditional programming languages such as BASIC and C. Another method is State Logic, a very high-level programming language designed to program PLCs based on state transition diagrams.
5.2 Slc: In digital circuit theory, sequential logic is a type of logic circuit
whose output depends not only on the present input but also on the history of the input. This is in contrast to combinational logic, whose output is a function of, and only of, the present input. In other words, sequential logic has state (memory) while combinational logic does not.Sequential logic is therefore used to construct some types of computer memory, other types of delay and storage elements, and finite state machines. Most practical computer circuits are a mixture of combinational and sequential logic.
Type
Page 9
AUTOMATION
4 . 5 . 6 . 7 . 8 . Programmin g Software Timers Counters Online Modification No.of i/o RSLOGIX 40 32 NO RSLOGIX 256&more 256&more NO RSLOGIX 256 and more 256&more YES
32
100
1024
7. I/O modules: Electronic plug in units used for interfacing the i/p and
o/p device in the machine or process to be controlled. I/P module receives data from i/p devices (Pushbutton, Switches, Transmitters) and send it to processor. The O/P module receives data from processor and send it to output device (Relay, Valves). Digital/Discrete:- Sends and Receives On/Off signal Analog:- Sends and receives variable input or output signals
7.1EEPROM memory module: This module is inserted into processor system for maintaining a copy of project (PLC program). This is helpful in case of memory corruption or Extended power loss. 7.2Cycle of plc:PLCs can cycle follows following path Scan cycle of PLC :
Input Image Updation Process Logic Execution Output Updation I/P module receives data from i/p devices (Pushbutton, Switches, Transmitters) and send it to processor. The O/P module receives data from processor and send it to output device (Relay, Valves).
Page 10
AUTOMATION
Distributed These are the I/O placed at remote location from the main rack containing the CPU. These I/Os are to be connected on communication bus like control net, device net or FIP I/O
Page 11
AUTOMATION
respective input terminal and the Common terminal. An indicating LED on the front panel of the PLC gives visual indication of an "energized" input
9.1 Generation of Output Signal: Output signals are generated by the PLC's computer circuitry activating a switching device (transistor, TRIAC, or even an electromechanical relay), connecting the "Source" terminal to any of the "Y-" labeled output terminals. The "Source" terminal, correspondingly, is usually connected to the L1 side of the 120 VAC power source. As with each input, an indicating LED on the front panel of the PLC gives visual indication of an "energized" outputIn this way, the PLC is able to interface with real-world devices such as switches and solenoids. The actual of the control system is established inside the PLC by means of a computer program. This program dictates which output gets energized under which input conditions. Although the program itself appears to be a ladder diagram, with switch and relay symbols, there are no actual switch contacts or relay coils operating inside the PLC to create the logical relationships between input and output. These are imaginary contacts and coils, if you will. The program is entered and viewed via a personal computer connected to the PLC's programming port.
Page 12
AUTOMATION
Page 13
AUTOMATION
distributed control system (DCS) would instead be used. However, as PLCs have become more powerful, the boundary between DCS and PLC applications has become less clear-cut.
Page 14
AUTOMATION
useful for simple but critical control systems, or for reworking old hardwired relay circuits. As programmable logic controllers became more sophisticated it has also been used in very complex automation systems.Ladder logic can be thought of as a rule-based language, rather than a procedural language. A "rung" in the ladder represents a rule. When implemented with relays and other electromechanical devices, the various rules "execute" simultaneously and immediately. When implemented in a programmable logic controller, the rules are typically executed sequentially by software, in a loop. By executing the loop fast enough, typically many times per second, the effect of simultaneous and immediate execution is obtained. In this way it is similar to other rule-based languages, like spreadsheets or SQL. However, proper use of programmable controllers requires understanding the limitations of the execution order of rungs.
--( )-- a regular coil, true when its rung is true --(\)-- a "not" coil, false when its rung is true --[ ]-- A regular contact, true when its coil is true (normally false) --[\]-- A "not" contact, false when its coil is true (normally true)
12.1Generally
Used Programming:
Input Instruction
Instructions
&
symbol
For
PLC
--[ ]-- This Instruction is Called IXC or Examine If Closed If a NO switch is actuated then only this instruction will be true. If a NC switch is actuated then this instruction will not be true and hence output will not be generated. --[\]-- This Instruction is Called IXO or Examine If Open If a NC switch is actuated then only this instruction will be true. If a NC switch is actuated then this instruction will not be true and hence output will not be generated.
Output Instruction
--( )-- This Instruction Shows the States of Output. If any instruction either XIO or XIC is true then output will be high. Due to high output a 24 volt signal is generated from PLC processor.
Rung
Rung is a simple line on which instruction are placed and logics are created E.g.; ---------------------------------------------
the name indicates, it is not a full control system, but rather focuses on the supervisory level. As such, it is a purely software package that is positioned
Page 15
AUTOMATION
on top of hardware to which it is interfaced, in general via Programmable Logic Controllers (PLCs), or other commercial hardware modules. SCADA systems are used not only in industrial processes: e.g. steel making, power generation (conventional and nuclear) and distribution, chemistry, but also in some experimental facilities such as nuclear fusion. The size of such plants range from a few 1000 to several 10 thousands input/output (I/O) channels. However, SCADA systems evolve rapidly and are now penetrating the market of plants with a number of I/O channels of several 100 K: we know of two cases of near to 1 M I/O channels currently under development. SCADA systems used to run on DOS, VMS and UNIX; in recent years all SCADA vendors have moved to NT and some also to Linux.
15 Systems concepts:
The term SCADA usually refers to centralized systems which monitor and control entire sites, or complexes of systems spread out over large areas (anything between an industrial plant and a country). Most control actions are performed automatically by remote terminal units ("RTUs") or by programmable logic controllers ("PLCs"). Host control functions are usually restricted to basic overriding or supervisory level intervention. For example, a PLC may control the flow of cooling water through part of an industrial process, but the SCADA system may allow operators to change the
Page 16
AUTOMATION
set points for the flow,and enable alarm conditions, such as loss of flow and high temperature, to be displayed and recorded. The feedback control loop passes through the RTU or PLC, while the SCADA system monitors the overall performance of the loop.
Data acquisition begins at the RTU or PLC level and includes meter readings and equipment status reports that are communicated to SCADA as required. Data is then compiled and formatted in such a way that a control room operator using the HMI can make supervisory decisions to adjust or override normal RTU (PLC) controls. Data may also be fed to a Historian, often built on a commodity Database Management System, to allow trending and other analytical auditing. SCADA systems typically implement a distributed database, commonly referred to as a tag database, which contains data elements called tags or points. A point represents a single input or output value monitored or controlled by the system. Points can be either "hard" or "soft". A hard point represents an actual input or output within the system, while a soft point results from logic and math operations applied to other points. (Most implementations conceptually remove the distinction by making every
Page 17
AUTOMATION
property a "soft" point expression, which may, in the simplest case, equal a single hard point.) Points are normally stored as value-timestamp pairs: a value, and the timestamp when it was recorded or calculated. A series of value-timestamp pairs gives the history of that point. It's also common to store additional metadata with tags, such as the path to a field device or PLC register, design time comments, and alarm information.
16.Hardware solutions:
SCADA solutions often have Distributed Control System (DCS) components. Use of "smart" RTUs or PLCs, which are capable of autonomously executing simple logic processes without involving the master computer, is increasing. A functional block programming language, IEC 61131-3 (Ladder Logic), is frequently used to create programs which run on these RTUs and PLCs. Unlike a procedural language such as the C programming language or FORTRAN, IEC 61131-3 has minimal training requirements by virtue of resembling historic physical control arrays. This allows SCADA system engineers to perform both the design and implementation of a program to be executed on an RTU or PLC. A Programmable automation controller (PAC) is a compact controller that combines the features and capabilities of a PC-based control system with that of a typical PLC. PACs are deployed in SCADA systems to provide RTU and PLC functions. In many electrical substation SCADA applications, "distributed RTUs" use information processors or station computers to communicate with protective relays, PACS, and other devices for I/O, and communicate with the SCADA master in lieu of a traditional RTU. Since about 1998, virtually all major PLC manufacturers have offered integrated HMI/SCADA systems, many of them using open and nonproprietary communications protocols. Numerous specialized third-party HMI/SCADA packages, offering built-in compatibility with most major PLCs, have also entered the market, allowing mechanical engineers, electrical engineers and technicians to configure HMIs themselves, without the need for a custom-made program written by a software developer.
Page 18
Page 19
AUTOMATION
SCADA vendors. Many of these protocols now contain extensions to operate over TCP/IP. It is good security engineering practice to avoid connecting SCADA systems to the Internet so the attack surface is reduced. RTUs and other automatic controller devices were being developed before the advent of industry wide standards for interoperability. The result is that developers and their management created a multitude of control protocols. Among the larger vendors, there was also the incentive to create their own protocol to "lock in" their customer base. A list of automation protocols is being compiled here. Recently, OLE for Process Control (OPC) has become a widely accepted solution for intercommunicating different hardware and software, allowing communication even between devices originally not intended to be part of an industrial network.
Page 20
AUTOMATION
The North American Electric Reliability Corporation (NERC) has specified that electrical system data should be time-tagged to the nearest millisecond. Electrical system SCADA systems provide this Sequence of events recorder function, using Radio clocks to synchronize the RTU or distributed RTU clocks. SCADA systems are coming in line with standard networking technologies. Ethernet and TCP/IP based protocols are replacing the older proprietary standards. Although certain characteristics of frame-based network communication technology (determinism, synchronization, protocol selection, environment suitability) have restricted the adoption of Ethernet in a few specialized applications, the vast majority of markets have accepted Ethernet networks for HMI/SCADA. With the emergence of software as a service in the broader software industry, a few vendors have begun offering application specific SCADA systems hosted on remote platforms over the Internet. This removes the need to install and commission systems at the end-user's facility and takes advantage of security features already available in Internet technology, VPNs and SSL. Some concerns include security, Internet connection reliability, and latency. SCADA systems are becoming increasingly ubiquitous. Thin clients, web portals, and web based products are gaining popularity with most major vendors. The increased convenience of end users viewing their processes remotely introduces security considerations. While these considerations are already considered solved in other sectors of internet services, not all entities responsible for deploying SCADA systems have understood the changes in accessibility and threat scope implicit in connecting a system to the internet.
Page 21
AUTOMATION
vulnerable to attacks - see references. Consequently, the security of SCADAbased systems has come into question as they are increasingly seen as extremely vulnerable to cyber warfare/cyber terrorism attacks. In particular, security researchers are concerned about: the lack of concern about security and authentication in the design, deployment and operation of existing SCADA networks the mistaken belief that SCADA systems have the benefit of security through obscurity through the use of specialized protocols and proprietary interfaces the mistaken belief that SCADA networks are secure because they are purportedly physically secured the mistaken belief that SCADA networks are secure because they are supposedly disconnected from the Internet SCADA systems are used to control and monitor physical processes, examples of which are transmission of electricity, transportation of gas and oil in pipelines, water distribution, traffic lights, and other systems used as the basis of modern society. The security of these SCADA systems is important because compromise or destruction of these systems would impact multiple areas of society far removed from the original compromise. For example, a blackout caused by a compromised electrical SCADA system would cause financial losses to all the customers that received electricity from that source. How security will affect legacy SCADA and new deployments remains to be seen. There are two distinct threats to a modern SCADA system. First is the threat of unauthorized access to the control software, whether it be human access or changes induced intentionally or accidentally by virus infections and other software threats residing on the control host machine. Second is the threat of packet access to the network segments hosting SCADA devices. In many cases, there is rudimentary or no security on the actual packet control protocol, so anyone who can send packets to the SCADA device can control it. In many cases SCADA users assume that a VPN is sufficient protection and are unaware that physical access to SCADA-related network jacks and switches provides the ability to totally bypass all security on the control
Page 22
AUTOMATION
software and fully control those SCADA networks. These kinds of physical access attacks bypass firewall and VPN security and are best addressed by endpoint-to-endpoint authentication and authorization such as are commonly provided in the non-SCADA world by in-device SSL or other cryptographic techniques. Many vendors of SCADA and control products have begun to address these risks in a basic sense by developing lines of specialized industrial firewall and VPN solutions for TCP/IP-based SCADA networks. Additionally, application white listing solutions are being implemented because of their ability to prevent malware and unauthorized application changes without the performance impacts of traditional antivirus scans Also, the ISA Security Compliance Institute (ISCI) is emerging to formalize SCADA security testing starting as soon as 2009. ISCI is conceptually similar to private testing and certification that has been performed by vendors since 2007. Eventually, standards being defined by ISA99 WG4 will supersede the initial industry consortia efforts, but probably not before 2011 . The increased interest in SCADA vulnerabilities has resulted in vulnerability researchers discovering vulnerabilities in commercial SCADA software and more general offensive SCADA techniques presented to the general security community. In electric and gas utility SCADA systems, the vulnerability of the large installed base of wired and wireless serial communications links is addressed in some cases by applying bump-in-the-wire devices that employ authentication and Advanced Encryption Standard encryption rather than replacing all existing nodes. Security provides the ability to control whether or not specific operators are allowed to perform specific functions within an application. Security is based on the concept of the operator logging on to the application and entering a User Name and Password. (The application developer sets up each operator with a User Name, a pre-assigned Password and an Access Level via the Special/Security/Configure Users command wither in WindowMaker or Windows Viewer. When a new application is created, the default User Name is Administrator with an access level of 1999 (which allows access to all security commands).
21 SCADA companies:
Invensys Wonder ware In Touch
Page 23
AUTOMATION
Siemens WinCC (Earlier COROS) Allen Bradley RS View (Earlier Control View) Intellution ifix (Earlier Fix DMACS) GE Fanuc Simplicity
Page 24
AUTOMATION
AUTOMATION
SCADA systems have evolved through 3 generations as follows:
Page 26
AUTOMATION
systems and adoption of information technology in the area of energy accounting. The backbone for sustaining the R-APDRP program is underscored by successful upgrades of legacy-system based substation automation. In the process, protection and automation of power supply systems have attained high priority. For the electrical distribution part of the business, improvements in technology are evident in the functional capabilities and value proposition offered by Electric SCADA (Supervisory Control And Data Acquisition Systems), in terms of infusion of intelligence into grids, increasing substation automation, real-time demand response pricing, and also complex forecasting models. SCADA is now viewed as an essential component to manage the smart grid. The transmission and distribution restructuring requires SCADA to become an integral part of the unique business processes of the electric power market to seamlessly unify the separate domains of generation, transmission, and distribution. Intelligent field devices and the resultant available data requirements for SCADA in transmission and distribution sub-stations drive demand. On consumption side of power business, the State owned Power Grid Corporation of Indias (PGCIL) is driving a power evacuation program, estimated to be $ 10 billion. Substation control devices center on the area of protection. It is not just the electromagnetic relays that have to give way to microprocessor based numeric relays. It now encompasses intelligent electronic devices (IEDs) Sequence Event Recorders (SERs), Remote Terminal Units (RTUs), transformer tap changers, and such others. All these devices and units with essential communication capabilities facilitating interconnectivity and links through local area network and HMIs makes the essential transformation from the legacy systems of yesteryears. Centralized Load Dispatch Centers have come into being, facilitating greater visibility across the entire operative range of substations or cluster of substations. It is no more a challenge with modernized SCADA in place to control circuit-breakers in remote areas and facilitate seamless load and fault management.
Page 27
AUTOMATION
30.2Development Tools:
The following development tools are provided as standard: A graphics editor, with standard drawing facilities including freehand, lines, squares circles, etc. It is possible to import pictures in many formats as well as using predefined symbols including e.g. trending
Page 28
AUTOMATION
charts, etc. A library of generic symbols is provided that can be linked dynamically to variables and animated as they change. It is also possible to create links between views so as to ease navigation at runtime. A data base configuration tool (usually through parameter templates). It is in general possible to export data in ASCII files so as to be edited through an ASCII editor or Excel. A scripting language An Application Program Interface (API) supporting C, C++, VB
31 Evolution:
SCADA vendors release one major version and one to two additional minor versions once per year. These products evolve thus very rapidly so as to take advantage of new market opportunities, to meet new requirements of their customers and to take advantage of new technologies. As was already mentioned, most of the SCADA products that were evaluated decompose the process in "atomic" parameters to which a Tag-name is associated. This is impractical in the case of very large processes when very large sets of Tags need to be configured. As the industrial applications are increasing in size, new SCADA versions are now being designed to handle devices and even entire systems as full entities (classes) that encapsulate all their specific attributes and functionality. In addition, they will also support multi-team development. As far as new technologies are concerned, the SCADA products are now adopting: Web technology, ActiveX, Java, etc. OPC as a means for communicating internally between the client and server modules. It should thus be possible to connect OPC compliant third party modules to that SCADA product.
Page 29
AUTOMATION
Reliability and robustness. These systems are used for mission critical industrial processes where reliability and performance are paramount. In addition, specific development is performed within a well-established framework that enhances reliability and robustness.
Page 30
AUTOMATION
PLC
PLC is Programmable Logic Controllers, a PLC is just a controller to do some works. It may be a brick with lots of terminals on it for wires and control something more or less by itself. Traditional PLC are migrating toward to traditional DCS for instants Fisher Delta V. For application in small or medium plant many people use a PLC (Allen Bradley) and also use DCS (Delta V, PlantScappe). If you have a small plant, it is better to set PLC or DCS system which has a system starting at 5 I/O and going up to 500 I/O.
SCADA
SCADA is Supervisory Control And Data Acquisition. SCADA is more complex and typically contains number of systems such as communications, data logging, server access, etc. SCADA may be used mostly by utilities and include data exchange requirement and protocols. SCADA is just that supervisory and data acquisition. It usually is not in plant but it used to supervise multiple small sites. In industry SCDA often do monitoring systems with little RTU at each well site.
2.
Page 31
AUTOMATION
3. PLC is always connected to its data source, so it does not need to maintain a database of current values. Redundancy is usually handled by parallel equipment, not by diffusion of information around a distributed database. SCADA needs to get secure data and control over a potentially slow, unreliable communications medium, and needs to maintain a database for prompt operator display. It frequently needs to do event processing and data quality validation. Redundancy is usually handled in distributed manner.
Digram
Name
Sedimentation Tank Clarifier Generator
About
Monitor on/off status of pumps Control coliform, TSS, and on/off status of pumps Monitor torque Control on/off status and torque alarms Monitor and control temperatures and flow rates within exhaust heat recovery unit and heat exchanger Monitor on/off status of pumps and blowers, dissolved oxygen, flow rate, and wetwell level Control on/off st Monitor ORP Control Cl2and SO2 injection
2. 3.
4.
Trickling Filter
5.
Page 32
AUTOMATION
6. Digester Monitor and temperature control
Page 33
The
pushbutton
switch
connected
to
input X1 serves as the "Start" switch, while the switch connected to input X2 serves as the "Stop." Another contact in the program, named Y1, uses the output coil status as a seal-in contact, directly, so that the motor contactor will continue to be energized after the "Start" pushbutton switch is released. You can see the normally-closed contact X2 appear in a colored block, showing that it is in a closed ("electrically conducting") state.
Starting of Motor: If we were to press the "Start" button, input X1 would energize, thus "closing" the X1 contact in the program, sending "power" to the Y1 "coil," energizing the Y1 output and applying 120 volt AC power to the real motor contactor coil. The parallel Y1 contact will also "close," thus latching the "circuit" in an energized state:
Page 34
AUTOMATION
To stop the motor, we must momentarily press the "Stop" pushbutton, which will energize the X2 input and "open" the normally-closed "contact," breaking continuity to the Y1 "coil:" When the "Stop" pushbutton is released, input X2 will de-energize, returning "contact" X2 to its normal, "closed" state. The motor, however, will not start again until the "Start" pushbutton is actuated, because the "seal-in" of Y1 has been lost:
Page 35
Page 36
AUTOMATION
Page 37
AUTOMATION
be created in such a way that when their requirements are met, they are activated. An example of an alarm is the "fuel tank empty" light in a car. The SCADA operator's attention is drawn to the part of the system requiring attention by the alarm. Emails and text messages are often sent along with an alarm activation alerting managers along with the SCADA operator.
Page 38
40. Conclusion:
SCADA is used for the constructive working not for the destructive work using a SCADA system for their controls ensures a common framework not only for the development of the specific applications but also for operating the detectors. Operators experience the same "look and feel"
Page 39
AUTOMATION
whatever part of the experiment they control. However, this aspect also depends to a significant extent on proper engineering.
41.References:
A.Daneels, W.Salter, "Technology Survey Summary of Study Report", ITCO/98-08-09, CERN, Geneva 26th Aug 1998. A.Daneels, W.Salter, "Selection and Evaluation of Commercial SCADA Systems for the Controls of the CERN LHC Experiments", Proceedings of the 1999 International Conference on Accelerator and Large Experimental Physics Control Systems, Trieste, 1999, p.353. G.Baribaud et al., "Recommendations for the Use of Fieldbuses at CERN in the LHC Era", Proceedings of the 1997 International Conference on Accelerator and Large Experimental Physics Control Systems, Beijing, 1997, p.285.
Page 40