You are on page 1of 14

58th International Astronautical Congress , Hyderabad, India, 24 - 28 September 2007. Copyright IAF/IAA. All rights reserved.

IAC-07-D2.I.03
PROCESS AUTOMATION SYSTEMS FOR
PROPELLANT SERVICING OF LIQUID STAGES
FOR SATELLITE LAUNCH VEHICLES
Srinivas Anand Yalamarty RSN
Manager, CS-ESPS, LSSF
Indian Space Research Organisation (ISRO), SDSC-SHAR, India
Email: yrsn@shar.gov.in
Naga Satyanarayana Mamidala
Manager, CS-CPS, LSSF
Indian Space Research Organisation (ISRO), SDSC-SHAR, India
Email: mnsatya@shar.gov.in
Dhanumjaya Rao MMV
Dy. Manager, CS-CPS, LSSF
Indian Space Research Organisation (ISRO), SDSC-SHAR, India
Email: mmvdrao@shar.gov.in
Sambhu Prasad Sesham
Engineer SE, CS-ESPS, LSSF
Indian Space Research Organisation (ISRO), SDSC-SHAR, India
Email: sambhu@shar.gov.in
Palani PT
General Manager, LSSF
Indian Space Research Organisation (ISRO), SDSC-SHAR, India
Email: ptpalani@shar.gov.in
Malay Krishna Sanyal
Deputy Director, LSSF
Indian Space Research Organisation (ISRO), SDSC-SHAR, India
Email: mksanyal@shar.gov.in

ABSTRACT
Satellite launch vehicles use solid and liquid propelled stages. Liquid
Propelled rocket stages need to be serviced at the launch pad during the
final phases of the launch count down. Due to the nature of the
propellants being used, requirement to service in a fully automated, safe
and reliable manner from a remote location and perform the functions in
stipulated time frame even under single point failures, distributed fault
tolerant control systems, with Triple Redundant Programmable
Computer Controller (PCC) Architecture, were realised for liquid stage
servicing. Hardware Implemented Fault Tolerance (HIFT) and Software
Implemented Fault Tolerance (SIFT) schemes were employed for
determining healthiness of signals read or generated to the field. The
software was developed in-house, using International Standard Software
development life cycle model. The software is built using “layered
architecture” for the tasks identified in each system. A Client–Server
based Supervisory Control and Data Acquisition (SCADA) System, with
dual redundancy is implemented for providing real-time graphical display
of process at remote control centre. The Paper discusses the architecture
of the process automation system implemented to meet the above
requirements and the issues addressed to meet the safety, reliability and
fault tolerance requirements of the system.

1
FULL TEXT
withstand all single point
INTRODUCTION
failures. Under all nominal and
Satellite launch vehicles use a off-nominal conditions, the
combination of liquid and solid automation system should be
propelled stages. Rocket stages able to complete the scheduled
including the satellite are activities in time.
assembled at the launch
complex. The solid motor stages Distributed fault tolerant control
are brought to the assembly / systems were realized for
integration facilities in pre-cast servicing Earth storable and
condition. Due to hazardous and Cryogenic propellants separately
highly toxic nature of the interfacing to 20000 process
propellants, temperature elements and onboard systems,
constraints, corrosive nature, the with a deterministic response
liquid propellants are filled to the time requirement of 100ms for
rocket stages after integration control and monitoring including
and at the launch pad. They network performance. The
need to be chilled and filled to system is configured for
the stages at the specified distributed control and
temperatures at controlled flow monitoring using Programmable
rate and pressure. The propellant Computer Controllers (PCC) with
servicing and gas charging triple redundancy having
operations required for the liquid Software and hardware
stages need to be carried out implemented fault tolerant
remotely, safely and reliably architectures to avoid single
during the count down point failures. The IO data
operations for the launch acquisition systems are
mission. connected on triple redundant
networks to the distributed
The propellant servicing process locations to ensure reliability and
is required to be controlled using high availability.
E/P Valves, propellant pumps,
flow control valves etc. Feedback The Supervisory Control and
parameters such as pressure, Data acquisition activities are
temperature, flow etc., are performed using Client Server
measured using sensors. It is architecture. 48 Client displays
also required to monitor / control are provided on the network to
the safety systems. facilitate simultaneous real-time
graphical viewing of the process
Since the activities are carried activity, real-time alarm
out during the final phase of the monitoring, trend information,
count down, it demands that the and system health monitoring.
automation system planned The total system is configured on
should be fault tolerant and a distributed network system

2
connecting the remote control The conceptual overall system
centre and the launch complex architectural diagram is depicted
on dual redundant Fiber Optic in Fig 1.
network.
Distributed Process
Control Systems
The application software is
developed in-house, following FO

International standard software SCADA Servers


Network

development life cycle model.


Application software for the
control algorithms in the Triple
Redundant CPUs are divided into
multiple independent tasks with
inter-task communications to Client Stations
handle various related activities. Fig 1: Conceptual Architectural Diagram
The tasks are configured to work
in a layered architecture in a The following sections briefly
100ms cycle time with internal describe the architectural details
functions using a “Call and of every individual item in the
Return” Architecture. The overall system.
software is built taking into
consideration, necessary safety
aspects with respect to control Distributed Process Control
system functionality and the
liquid stage servicing process. Systems
The system is configured using
SYSTEM ARCHITECTURE PCC based systems to cater to
To meet the functional, safety, the requirement of interfacing to
reliability and performance large number of I/O devices. To
requirements of the control meet the requirements of fault
system, for performing the tolerance, safety and reliability of
required activities of servicing operations to be carried out for
liquid stages of a launch vehicle, propellant servicing of liquid
Programmable computer stages of launch vehicles,
controller (PCC) based systems redundant systems were
were realised. The system is envisaged.
configured for performing the
control functions of the total Safety Vs. Reliability
process in a deterministic cycle
time of 100ms, in a distributed There are two basic reasons to
architecture. The visualization of use redundant systems for the
the entire process in real-time is process control application,
provided using a SCADA system first to achieve a higher safety
configured using Client Server and second to get a higher
Architecture.

3
reliability. These both PCC Systems
requirements often contradict
each other [1]. To meet the requirements of
fault tolerance, dual or triple
In a high safety application, redundancy can be employed.
we may require to switch on Dual redundancy has always
some actuators only if all the possibility of contention of
redundant software and which of the data is correct, in
hardware parts agree on case data from both elements
switching it on. If one of the does not agree with each
software parts fails, the other. To avoid contention
actuator will not be activated, under such scenarios, the
the plant does not make the system was configured with
required action. triple redundant architecture
as depicted in Fig 2.
In another case we may
require, that the actuator is
switched as long as possible,
also if major hardware parts
or sensors fail. We would
possibly require that if only
one part of the redundant
software and one part of the
redundant hardware is Fig 2: PCC Architecture
working, they shall still keep
the plant working. Three CPUs are configured for
each PCC system with their
The system required for this own network interfaces and
application has to meet both other sub-systems. These
of the above requirements. It CPUs work together in a cyclic
is possible to design high fashion, similar to that of the
safety applications and high Programmable logic
reliability applications as well. controllers (PLCs) and can be
We can mix them and create programmed independently.
an application, including high The three CPUs communicate
safety parts and high between each other using a
reliability parts at the same dual redundant CAN interface
time. Both the features can be bus. One of the CPU assumes
achieved by the Scalable the state of a Master CPU and
Redundancy concept based takes the responsibility of
PCC systems selected for this synchronization of events and
application. activities carried out by the
other two CPUs, such that all
three CPUs would work
cohesively and generate

4
identical output at all times. redundancy. The above
The CPUs exchange the architecture can be easily
synchronization information modified into dual redundant
and common data over the system by removing I/O layers
CAN Bus link. Each CPU is in column 2 of the above
equipped with three network architecture. Similarly
cards to communicate with redundancy level could be
triple redundant Input and increased by increasing the
Output device interface number of I/O layers and the
boards (referred to as I/O CPUs (example: 3 out of 5
Slave Stations) over the Redundancies).
dedicated network links.
Logical data flow
I/O Slave Stations The outputs originating from
Three sets of I/O Slave the three I/O layers are
Stations are configured to connected to a hardware
interface each type of field implemented fault tolerant
device to take care of system (HIFT) logic circuit (two of
operations during single point three voting logic) to ensure
failure of the process control that only correct and validated
system hardware elements. output only is posted to the
Each I/O Layer consists of its field. The typical HIFT based
own CPU and network voter can be implemented
interface boards for using Relay Logics.
communicating with the PCC Thus, the inputs are validated
CPUs. The CPU in the I/O by the PCC CPUs using a
Layer acquires the data from Software Implemented Fault
the Input device, and sends tolerant (SIFT) architecture,
the data to the PCC CPU for and the outputs are validated,
its usage. The Commands at I/O Slave CPUs, using a
from the three PCC CPUs are combination of Software and
acquired over the network, Hardware implemented fault
voted using a two out of three tolerance architectures. The
voting algorithm and the Logical Input data flow is
resulted voted output data is shown in Fig 3 and the Logical
posted on the output circuit. Output data flow is shown in
Fig 4.
Scalable Redundancy Concept

The architecture of the PCC


system explained has the
advantage of being scalable
for various levels of
redundancy. The architecture
shown was with triple

5
CPU Station
(supervisory control) by the
Application
operator as per count down
cyclogram.
Input Voter

The SCADA system is realised as


IO Slave Station 1 IO Slave Station 2 IO Slave Station 3
Input Data Input Data Input Data Client-Server architecture. The
column 1 column 2 column 3
total hardware components are
Input Input Input
duplicated to handle single point
channels
column 1
channels
column 2
channels
column 3
failures and thus implementing
fault tolerance in the system. The
Field Process Server is connected to the PCC
Fig 3: Logical Input Data Flow systems on a dual redundant
network (Control network)
Field Process
through which it can read the
process data and also exchange
Hardware Voter
user commands with the PCC.
The Server communicates with
IO Slave Station 1 IO Slave Station 2 IO Slave Station 3 the Client Stations on a separate
Output Voter Output Voter Output Voter
dual redundant network (Client
Network). Multiple Client stations
are configured to meet the user
requirements to simultaneously
CPU Station 1 CPU Station 2 CPU St. 3
view and control various
Application 1 Application 2 Application 3 processes that are required to be
Fig 4: Logical Output Data Flow carried out during the propellant
servicing phase of the count
Supervisory Control and Data down activities. The client
displays are refreshed with the
Acquisition (SCADA) process data in real-time by
reading the data from the process
The total operations related to data base stored at the Server.
propellant servicing needs to be
carried out from a remote control The above architecture ensures
centre in view of the hazardous that only Servers would make
nature of the propellants being communication calls to the PCC
handled. The SCADA system systems which are mainly
provides monitoring and control controlling the process activity.
of the entire process in real-time. This saves the time spent by the
It provides necessary features for PCC systems to service network
acquiring the data from the PCC communication calls, which
systems, store data for offline would have been otherwise
analysis, necessary graphical required for servicing
user displays for showing the communication calls from each
process of servicing the launch Client Station and likely to have
vehicle in real-time and for impact on the response times of
initiating control algorithms the PCC system.
6
I/O slave stations on receipt of
The SCADA system also provides synchronization signal start
the facility to depict critical transmitting with fixed delay
parameters as Trends in real- time, from the above event,
time to enable the operator to which is a function of the node
take necessary decisions, where number of the I/O slave station.
required. Provision exists to This ensures that no collisions
configure alarm data for occur during data transmission
generating alarm messages to the between the stations on the
operator based on the process network.
value of selected parameters. The
total data is logged at the Server
as a central database which can RS2 FX
( RH1CX)

be retrieved for offline analysis of


the process.
LAN 5 LAN 6 LAN 7

Network Architecture
The overall network architecture
is divided into multiple individual Fig 5: Network Architecture of PCC System
sub-nets. Each PCC system is
configured with three The network communication link
independent networks for from Server to PCC systems and
establishing communication Server to Client Systems are
between the CPU station and I/O realised as separate networks, as
slave stations. shown in Fig 6, to ensure that
the network communication
Ethernet communication network between Server and Client
is non-deterministic in nature. A Stations does not affect the
Process Control system needs to performance of the data
provide deterministic response communication between the
while servicing various field Server and PCC systems.
elements. In order to make the
Ethernet communication network
deterministic, the networks
between each chain of I/Os are
made independent of each other,
reducing the collision domain of
the network. The network
architecture of one PCC CPU
communication with the I/O
slave stations is shown in Fig 5.
The CPU stations generate a
synchronization signal to the I/O Fig 6: Overall Network Architecture
Slave layers, which are
numbered by node numbers. The
7
Application Software Architecture Voting of input data
(Environment Software
Application software for Inputs) and processing
controlling the process resides in of input data into
the PCC system CPU. The engineering units.
application requires to be Process application
executed in a deterministic cycle algorithms (Divided into
of 100ms to ensure that outputs multiple tasks based on
are maintained as per the the process
process requirement. The requirements)
application software is developed Data output to field
following an incremental model of (Environment Software
software development life cycle. outputs) and data
The Software requirements are communication to
analyzed using Structured external network
Analysis techniques and the devices.
necessary software architecture Each of the above activity is
is formulated. To ensure that all divided into individual tasks
CPUs generate outputs in and configured in a layered
synchronization with each other, architecture in the order
Event based State transition provided above. Within each
techniques are employed. All task, application requirements
software life cycle activities are are met by building function
carried out as per ESA-PSS-05 calls which are inter
Software engineering standards dependent on each other. The
[2]. function calls are generated
Architecture using a “Call and Return”
To achieve the deterministic Architecture.
cycle of 100ms the PCC
system operates using a cyclic The application tasks are
architecture. Each CPU of the designed to be independent to
PCC System carries out the each other such that any
following activities change in a particular
sequentially every cycle in application task does not have
deterministic manner. any implication on the
System health execution of any other task.
monitoring functions, Standard interface structures
Acquisition of data from are created for inter-task
I/O CPUs, data communications by building
acquisition from interface function macros with
Network resources standard arguments. These
Exchange functions ensure that the task
synchronisation data implementation is
between Master and independent of the interface
Slave CPUs. with other tasks. For example,
all inputs from the field are
8
acquired by the “Environment Voting Algorithms
Software Inputs” task. This “Environment software
task takes care of voting the Inputs” application task has
input data and generating to carry out the necessary
voted information and voting of IO data before it is
conversion of the data into handed over for processing to
engineering units. The the process algorithm.
application tasks, whose
algorithms are used to control IO voting means to select one
the process, access these data input or output signal from
by way of using environment three signals. The aim of
software macro interfaces, voting is to avoid processing
which gets the relevant data faulty signals. Voting
from the “Environment algorithms are software
software inputs” task functions, which select one
variables. signal from multiple input
signals. There are different
Each algorithm of an voting algorithms for digital
application task is assigned to and for analog signals.
any one of the states viz.,
SLEEP, INITIATED, READY, The input signals of a voting
AUTHORISED, SCHEDULED, algorithm can have either
and COMPLETED/ABORTED, valid values (e.g. 0 or 1 for a
which are self-explanatory. By digital signal) or they can have
controlling the state of the a special value, indicating that
algorithm of each application the signal is missing or faulty.
task, the necessary jobs are Voting algorithms can handle
executed at the PCC system. missing and faulty signals and
An algorithm by default will they have an exactly defined
be in SLEEP state. An behaviour in case of missing
algorithm can be brought to or faulty signals. This special
an INITIATED condition only if value is identified as Safe
an operator initiates this value, which takes care of fail-
activity. The algorithm safe criticality.
indicates its READINESS,
once its initial conditions to Voting Digital Signals
carry out the process are Digital voting algorithms
satisfied. The algorithm waits use either democratic
for an AUTHORISATION from voting algorithms, or voting
the Chief of Operations to get algorithms, which make a
SCHEDULED and run to simple logical combination
COMPLETION. of the input signals.
Democratic voting
algorithms select the
status from those signals

9
which is in majority. voting is selected, the voted
Therefore it is necessary to value is determined similar
have an odd number of to the above logic, but in
signals. Democratic case the values do not
algorithms cannot be used match, it generates the
if only two signals are value read by the Master
available and they have CPU as the voted value.
different values. For this Also this returns the single
case either a predefined value if only one signal
value, the failure value, is (from Master CPU only) is
used or a master majority healthy. In all other cases
decision will be made, this logic returns a failure
which prefers the value value. This type of voting is
from the master CPU usually referred to as “3-2-
station. The inputs values 1-0” logic.
are validated with the
healthiness of the For fail safe applications
hardware used for reading the voting logic requires
the values before they are that all three signals
subjected to voting. should be healthy and
equal. This is referred as
Democratic Voting logic “3-0” voting logic.
can be of two types viz.,
Safe Democratic and Voting Analog Signals
Available Democratic with Analog Signals also can be
Master Majority. Safe voted based on the fault
Democratic voting tolerance or fail-safe logics.
algorithms are selected The healthy analog signals
when Odd number (>1) of are compared to be within
healthy inputs are to be a valid discrepancy value.
considered for evaluating The analog signals whose
the voted result. If 3 inputs values are within the
are available, two out of discrepancy tolerance
three voting is performed. value and within the
If only two inputs are specified time period
healthy and they are equal, (discrepancy tolerance
then one of them is period) are considered for
returned as voted value. usage. Depending upon the
For all other cases, the usage and application
voting algorithm returns a area, highest of the values,
failure value (Safe value for lowest of the values or
process). This type of average of the values is
voting is usually referred taken as valid data. The
as 3-2-0 voting logic. In following are the possible
case “Available Democratic
with Master Majority”
10
analog signal voting applications are synchronised
algorithms. with each other.
Safe highest value
Safe middle value The sequence of the running
Safe lowest value of the application / system
Safe average tasks in the PCC system is as
Available highest explained in the Software
available value Architecture above.
Available middle
available value Due to the cyclic nature of
Available lowest execution of the application in
available value the PCC, advantage can be
Available average taken by synchronizing the
available value program state and user events
“Safe” algorithms are used and some critical control data.
in 3-0 voting logic. That is, All CPUs will be allowed to
these voting algorithms run asynchronously. The
require that all three CPUs will start their cyclic
signals are healthy before execution at the same time
voting. “Available” (synchronized by call from
algorithms are used in “3- System Manager in Master
2-0” or "3-2-1-0” voting CPU). The systems will
logics. That is, these voting acquire data from all the
algorithms are used under interfaced sub systems. The
failure mode conditions. If CPUs will wait for the
all signals are available synchronization call after
(healthy), all three signals reporting completion of the
are used, else if two are above activity.
healthy, two analog values
are used for voting and so On Synchronization call the
on. CPUs start executing the
application logic
Synchronized operation of simultaneously. The first
activity is to synchronize the
algorithms in all CPUs
data marked for
The three CPU stations
synchronization. Since the
execute the three application
Input data set is ensured to
programs, which can be
be identical amongst all CPUs,
identical or can be different.
due to voting, it is ensured
To achieve data integrity and
that if the processing logic is
concurrent application
same in all CPUs, they would
program processing, the
generate identical outputs.

11
N-Version Programming
When same application
software is executed in all
the CPUs as explained in
the previous section,
possibility of an erroneous
implementation of the
software would result in
not meeting the process
Fig 7: Application Synchronization requirements properly. The
hardware and the software
The processing algorithm acts architecture built provides
on the input data set available for having different
from “Environment Software software in each of the
Inputs” Task and generates CPU.
output. The output generated
is presented on the output The application software
system by all CPUs for each CPU can be
simultaneously at the same developed by independent
instant by synchronising the programmers and loaded
event with the help of System into the CPUs. The State
Manager Task call. This is transitions and the
illustrated in Fig 7. synchronization events
First the three CPU stations need to be handled at the
execute the three application time of software design
programs. The application that all CPUs handle the
programs may have a different same state and event(s) at
duration. The system waits a given time instant.
until the slowest application This ensures that the
program has finished and system is robust against
starts system activities only bugs in application
after all applications have software also, since no two
finished. After executing programmers are likely to
system activities a similar generate erroneous code at
synchronisation takes place. the same location.
The system waits until all
CPU stations finished their This feature of N-Version
system activities and starts programming with the
the applications subsequently. above Software
This process runs cyclically, Architecture provides high
repeating application reliability in terms of
execution and internal application software also.
activities.

12
Safety Aspects related to a particular
Safety of the process also activity only are
forms primary responsibility grouped. This ensures
for the application software that during a particular
architecture and design. This activity, elements
is required in order to ensure related to other
that process is handled in a processes cannot be
way that all safety precautions operated inadvertently.
are scrupulously followed. Inhibition feature for
The safety features built into operation of process
the software are addressed to elements. This feature
take care of situations related allows a process
to safe operation practices element to be marked
and any abnormal conditions as “Inhibited”, which
that may arise during the does not allow even the
course of propellant servicing automatic algorithm to
to the stage. change its state of
operation without a
The following features are prior approval from the
provided in order to have safe operator. The operator,
operation practices. authorised to give
All authenticated and permission to operate
trained operators are such “inhibited” process
provided with necessary elements is identified
security levels, which with a higher level of
they can gain access by security level. Thus
logging into the system these elements cannot
using their access be operated without the
rights. This ensures knowledge of the
that the system cannot Supervisor.
be operated by any Mode of Operation –
unauthorised Each PCC system is
personnel. identified with various
Group Authorisation – modes of operations.
Each group of process The default mode of
elements is associated operation being “Idle”.
with a group The “Idle” mode of
authorisation. Unless operation only acquires
the group is authorised, the data from the field
it is not possible to and displays the data to
operate the field the operator. No
elements identified operations can be done
under the group. The on the system under
group definition is this mode of operation.
ensured that elements Other modes of
operation are defined
13
based on the type of logics, surveillance
application tasks that algorithms also take
are programmed on the necessary corrective
PCC System. The mode action in case of an
of operation selected alarm generation.
determines which
application tasks get
executed (can be taken
REFERENCES
out of SLEEP state) at
the PCC Systems. This [1] M Blanke, “Concepts and
type of architecture Methods in fault tolerant
provides safety against control”, Tutorial at American
operating applications Control Conference, June
related to a non- 2001
relevant task. [2] ESA Board for Software
The following safety features Standardisation and Control
are provided as part of the (BSSC), “ESA-PSS-05-0 ESA
application logic to ensure Software Engineering
that they are terminated or Standards Issue 02”, ESA,
handled properly. France, February 1991
Wherever analog data is
used for determining
the termination of logic,
multiple samples are
considered to positively
confirm the action being
taken. The samples are
correlated with the
trend of the parameter
to ensure that
processing is not done
based on wild samples.
Surveillance algorithms
are built in and get
executed automatically
such that they keep
monitoring for the
parameters to be within
the nominal operating
range. These logics will
generate necessary
alarms for the
application and the
operator whenever a
parameter violates its
safe limits. For critical
14

You might also like