Professional Documents
Culture Documents
1.1 Introduction:
We design, manufacture and deliver technical goods as per customer requirements and
needs.
The ARMbedded Group has three subdivision departments which jointly works so as to
reach companies goal and as well as for the companies’ development. They are as followed:
ARMbedded
Group
ARMbedded ARMbedded
Electronics Pvt. Ltd. CADD Centre
It’s the main sub-divisional part of the company which works for marketing and
works behind for companies’ growth. The company is dedicated for students training
& development programs where it is aimed how to train student so as they can know
the technology which are leading the world are where only knowledge & talent
speaks. ARMbedded labs organizes time to time workshop & seminar and also took
guest lectures.
The ARMbedded learning center is the place where all these are done. There are two
learning centers the one is in Jaipur (Rajasthan) and another one is situated in Rohtak
(Haryana).
In ARMbedded R&D cell a project is converted into a product. The soul of this
department is to make or work on a project that is attractive & innovative depending
on customer needs or a student’s thought. This department is also concerned with
marketing department.
1.1.4.1 Application
In application department our various kits are tested at each level so that before delivering
our goods to the companies or educational institutions we test our kits at various levels and
make sure that it is error free and if there is any bug we fix at the moments. We are also
welcomed by companies to develop application for their technical goods.
1.1.4.2 Marketing:
This department has a team of marketing professionals who knows how and where our
products should be sold. As the production of technical goods is key part of the company
in a similar way the marketing department is quiet necessary to withstand a company in a
market where there is always many competitors.
1.1.4.3 Production:
We manufacture and deliver technical goods as per customer requirements and needs. We
develop industrial products various educational purpose lab equipment like embedded
system design la, advanced design lab, PLC & SCADA panels and protoboards in the
respective domains, which are used in educational institutes. These protoboards are so
designed that a student working on i t develops a complete knowledge from firmware
development to interfacing to various active and passive components.
Training is imparted in all the four domains. Training is such that it equip an
engineer/student to use the practical knowledge gained here, fully in the field. We also
undertake training for corporate in all the respective domains.
ARMbedded Electronics Pvt. Ltd. has state-of-the-art computerized design facilities and
a team of design engineers to develop any equipment as per the customer’s need. Al
arrangements are made right from start to end of project i.e. designing, manufacturing,
installation etc.
1.1.6 Infrastructure
In infrastructure, we are having two fully ac labs in Jaipur (Rajasthan) & as well as in
Rohtak (Haryana) with projector facility. The labs are equipped with pc & with complete
practical & development kits.
We design circuit and pcb layout and after that we assemble components & its testing.
Apart from it we also design & develop industrial projects as per the requirements. We
have developed various kinds of embedded development kits and also dedicated to
develop more and more. In automation we are an emerging manufacturer for various PLC
& SCADA panels and motor driver circuits.
The personnel undertaking the training are actual design and application engineers. The
basic qualification i s masters or even higher in technology. They bear huge experience
in terms of practical experience in developing applications using these technologies. We
provide corporate as w e l l as Industrial Training.
2.1 Introduction:
In the last two decades, we have witnessed an explosive growth of real-time and embedded
systems being used in our daily life. A real-time system is required to complete its work
and deliver its services on a timely basis. In other words, real-time systems have stringent
timing requirements that they must meet. Examples of real-time systems include digital
control, command and control, signal processing, and telecommunication systems. Every
day these systems provide us with important services. When we drive, they control the
engine and brakes of our car and regulate traffic lights. When we fly, they schedule and
monitor the take-off and landing of our plane, make it fly, maintain its flight path, and keep
it out of harm’s way. When we are sick, they monitor and regulate our blood pressure and
heartbeats. When we are well, they entertain us with electronic games and joy rides. When
we invest, they provide us with up-to-date stock quotes.
Real-time and embedded systems are gaining more and more importance in our society.
Recognizing the importance of these systems, the National Science Foundation has recently
established a research program dedicated to embedded systems. The European Union (EU),
European countries, and Asian countries have also established many research programs in
real-time and embedded systems. Therefore, we can anticipate many important and exciting
results being developed in this area.
The purpose of developing the digital control theory is to be able to understand, design and
build control systems where a computer is used as the controller in the system. In addition
to the normal control task, a computer can perform supervisory functions, such as reading
data from a keyboard, displaying data on a screen or liquid crystal display, turning a light
or a buzzer on or off and so on.
2.2 Necessity:
Embedded systems design is a productive synergy between hardware and software design.
Essentially, it’s the art of choosing and designing the proper combination of hardware and
software components to achieve design goals like speed and efficiency. Although we may
not realize it, most of us use these embedded systems constantly in our daily lives.
The Myo armband is an example of a real-time embedded device. While running on a
battery, it performs computationally intensive gesture recognition algorithms to detect the
motion and gestures of the user’s hand. The hardware design must be efficient enough to
use the battery for a good length of time and fast enough to meet the real-time requirement
of gesture recognition algorithms.
In order to provide the desired user experience, we’ve had to overcome a number of tricky
design challenges. Real-time gesture recognition, limited power consumption, and
computationally intensive machine learning algorithms are just some of the challenges that
we’ve had to address.
To overcome these challenges, we’ve designed the Myo armband efficiently from both a
hardware and software perspective. On the embedded software side, the implementation is
designed to put the least possible computation load on the main processing unit, reducing
the power consumption as a result. The implementation is paralleled among different
input/output (I/O) and computation modules to achieve real-time responses for gesture
recognition algorithms. We also make use of techniques such as direct-memory-access
(DMA), which reduces the load on the CPU by directly handling the I/O module’s access
to main memory, thereby reducing power consumption.
On the hardware side, the design takes advantage of the latest power-efficient components
running with very low current draw. Different modes of operation for the Myo device result
in automatically shutting-off some sections of the electronics to further decrease power
consumption. Strategic selection of passive components’ values (including resistors and
capacitors) are also used to minimize power consumption. All of this is done while
balancing many additional competing factors such as efficiency cost, reliability, and noise
levels.
In short, embedded systems engineers often need to balance multiple competing parameters
to obtain the optimal blend of performance and power consumption. Much care needs to be
taken to carefully design the hardware alongside the software, as the two components are
integrally coupled together. For this reason, our embedded software teams and our
hardware development teams work side-by-side
The most visible use of computers and software is processing information for human
consumption. We use them to write books (like this one), search for information on the
web, communicate via email, and keep track of financial data. The vast majority of
computers in use, however, are much less visible. They run the engine, brakes, seatbelts,
airbag, and audio system in your car. They digitally encode your voice and construct a radio
signal to send it from your cell phone to a base station. They control your microwave oven,
refrigerator, and dishwasher. They run printers ranging from desktop inkjet printers to large
industrial high-volume printers. They command robots on a factory floor, power generation
in a power plant, processes in a chemical plant, and traffic lights in a city. They search for
microbes in biological samples, construct images of the inside of a human body, and
measure vital signs. They process radio signals from space looking for supernovae and for
extraterrestrial intelligence. They bring toys to life, enabling them to react to human touch
and to sounds. They control aircraft and trains. These less visible computers are called
embedded systems, and the software they run is called embedded software. Despite this
widespread prevalence of embedded systems, computer science has, throughout its
relatively short history, focused primarily on information processing. Only recently have
embedded systems received much attention from researchers. And only recently has xi
PREFACE the community recognized that the engineering techniques required to design
and analyze these systems are distinct. Although embedded systems have been in use since
the 1970s, for most of their history they were seen simply as small computers. The principal
engineering problem was understood to be one of coping with limited resources (limited
processing power, limited energy sources, small memories, etc.). As such, the engineering
challenge was to optimize the designs. Since all designs benefit from optimization, the
discipline was not distinct from anything else in computer science. It just had to be more
aggressive about applying the same optimization techniques.
2.3 Objectives
Necessity is the mother of invention and automation systems are inventions that were
fuelled by the idea of making pre-programs to perform a dedicated narrow range of
functions as part of large systems. Usually with minimal end user interactions, the 'giant
leap technology' in future embedded systems is based on instruction-oriented design but
not on design-oriented instructions. automation systems is fast achieving ubiquity, blurring
the lines between science fiction and hard reality.
In general an automation has the following futures:
Multitaskin;
Process threads that can be prioritized;
A sufficient number of interrupt levels.
An automation system is any device controlled by instructions stored on a chip. These
devices are usually controlled by a microprocessor that executes the instructions stored on
a ROM chip. PLC based systems are used in industries like water bottle liquid filling
process, automated packaging machines, networking equipment, etc. We concern ourselves
with the development and implementation of model-based, real-time, automation, hybrid
control software. In particular, we target intelligent cruise control applications, including
Adaptive Cruise Control (ACC), in which a forward-looking range sensor (radar or Lidar,
usually) is used to follow a vehicle, and Cooperative ACC (CACC), a variation in which
wireless communications are used to supplement the forward looking sensor. We discuss
modeling on automated vehicles. Our approach emphasizes the maintenance of a single
model throughout the development process, with particular emphasis on "tight-loop."
2.4 Theme
Automation systems are usually high cost and are easily available off the shelf for most
industrial applications. They usually have critical design risks, since it is easy to verify the
design using tools fueling the growth of automation systems.
Automation systems have received a major shot in the arm as the result of three
developments:
The first was the development of non-standard run-time platforms like ladder logic,
which enabled their use in myriad ways that were unimaginable in the past.
The second was the coming together of automation systems and the
Internetnetworking PLC controlled machine, which made possible the networking
of several automation systems to operate as part of a large system across networks.
The third was the emergence of several integrated software environments, which
simplified the implementations of these applications.
During operation, the design structure may be changed as per our tasks. For example,
consider two transistors; we can mould them using other passive elements as emitter
coupled circuit, Darlington pair, etc., as per instruction. Real Time Applications
Automobiles: Almost every car that rolls off the production line these days makes use of
embedded technology in one form or the other; most of the embedded systems in
automobiles are rugged in nature, as most of these systems are made up of a single chip.
No driver clashes or 'systems busy' conditions happen in these systems. Their compact
profiles enable them to fit easily under the cramped hood of a car. These systems can be
used to implement features ranging from adjustment of the suspension to suit road
conditions and the octane content in the fuel to antilock braking systems (ABS) and security
systems.
Another revolution is the way Internet services will be integrated into the car. So when you
drive past your mechanic's, you will be reminded that that your engine oil needs a refill,
and when you cross the city limits, the toll will automatically get deducted from your bank
account. In fact, the automatic to;l deduction concept is already in effect in several countries
around the globe.
Hybrid verification of the controller and analysis of timing properties are conducted
through the use of third party tools. GPS AIR BAG WINDOWS DEEBOSTER
AUTOMATIC TRANSACTION CONTROL ABS The approach is applied to Adaptive
Cruise Control (ACC) and Cooperative ACC systems. While regular cruise control systems
track a desired vehicle speed, Adaptive Cruise Control (ACC) systems adapt their behavior
if there is a vehicle ahead on the roadway, and follow the leader vehicle at a driver requested
time gap using line-of-sight sensors such as radar and/or Lidar. When there is no "leader"
vehicle present, ACC defaults to conventional cruise control and reverts to the driver-set
speed. ACC systems are now available on several production cars, including the Nissan
Q45 and FX45, the Mercedes S-class, the Lexus 330 and 430, the Audi A8, and select
Jaguar and Cadillac models. These production ACC systems obtain their distance and
closing rate information about the leading vehicle through the use of their forward-looking
sensor. These sensors are typically subject to noise, interference, false alarms and dropouts,
and their use requires heavy filtering. This in turn introduces delays into the system, and
limits the ability of the ACC-equipped vehicles to follow the leader vehicle closely or
respond quickly to change in its speed. A variant of this is Cooperative ACC (CACC),
where the forward-looking sensor is complemented by a wireless communication link that
provides hop-by-hop, leader-to-follower updates of critical information. Such a system can
be designed to follow vehicles with higher accuracy and faster response than traditional
ACC systems, and should allow for freeway throughput capacity increases. In addition, the
CACC system can be designed to have proven string stability, so it could contribute to
dampening shock waves in the freeway traffic stream.
CHAPTER 3: Training Work
Automation is the use of control systems such as computers to control industrial machinery
and processes, reducing the need for human intervention. In the scope of industrialization,
automation is a step beyond mechanization. Whereas mechanization provided human
operators with machinery to assist them with the physical requirements of work, automation
greatly reduces the need for human sensory and mental requirements as well.
3.3 APPLICATION
• Automated video surveillance
• Automated highway systems
• Automated manufacturing
• Home automation
• Industrial automation
• Agent-assisted Automation
3.4 ADVANTAGES
The main advantages of automation are
• Increased throughput or productivity.
• Improved quality or increased predictability of quality.
• Improved robustness (consistency), of processes or product.
3.7 HMI
A human machine interface (HMI) is an interface which permits interaction between a
human being and a machine.
Human machine interfaces vary widely, from control panels for nuclear power
plants to the screen and input buttons on a cell phone.
Two components are needed in a human machine interface. The first is an input. A
human user needs some way to tell the machine what to do, to make requests of the
machine, or to adjust the machine. Examples of input devices include keyboards, toggles,
switches, touch screens.
3.8 DCS
It was not until the mid1970’s that the first Distributed Control Systems (DCS) came into
existence as shown in figure1.2.
A DCS system distributes the functions of a control system into many different
microprocessors. The microprocessors form small subsystems which are physically
distributed throughout the facility and linked together via a communication or data
highway.
The operator interface is located in a central location such as a control room. The operator
interface includes colour graphics with dynamic process data, faceplate displays, trend data,
and alarm summary displays. For discrete processes, hardwired relays were used to perform
the sequential logic control functions.
3.9 PLC
PLC - programmable logic controller
A Programmable Logic Controller, or PLC for short, is simply a special computer device
used for industrial control systems. They are used in many industries such as oil refineries,
manufacturing lines, conveyor systems and so on.
PLC implements logic control functions by means of a program.
3.9.1 How does a PLC differ from a computer
• A computer is optimized for calculation and display tasks.
• A computer is programmed by specialists
• A PLC is designed for (logic) control and regulation tasks.
• A PLC is programmed by non-specialists
• A PLC is well adapted to industrial environment
3.10 SCADA
SCADA is “Supervisory Control and Data Acquisition” – real time industrial process
control systems used to centrally monitor and control remote or local industrial equipment
such as motors, valves, pumps, relays, etc.
A SCADA system gathers information (such as where a leak on a pipeline has
occurred), transfers the information back to a central site, then alerts the home station that
a leak has occurred, Carrying out necessary analysis and control, such as determining if the
leak is critical, and displaying the information in a logical and organized fashion.
CHAPTER 4: Programmable Logic Control
A DCS system distributes the functions of a control system into many different
microprocessors. The microprocessors form small subsystems which are physically
distributed throughout the facility and linked together via a communication or data
highway. The operator interface is located in a central location such as a control room. The
operator interface includes colour graphics with dynamic process data, faceplate displays,
trend data, and alarm summary displays. For discrete processes, hardwired relays were used
to perform the sequential logic control functions.
Electromechanical relays were wired in series or parallel with field input signals to
turn equipment on and off. Input devices such as pushbuttons, switches, or contacts were
used to allow current to flow through the circuit or cause a break in the current flow, thereby
switching an instrument on or off. Instruments that were controlled by relay logic outputs
were coils, timers, lights, valves, horns, and control relays. The main disadvantage of these
hardwired relays is that expansion was not possible without disabling the system, the
control logic could not be changed without adding or deleting relays or disabling the system
and it was difficult to implement and troubleshoot a complex logic system. Due to the
difficulties of hardwired relay systems, a new type of microprocessor-based control system,
known as the Programmable Logic Controller (PLC), appeared in the early 1970’s in the
automotive industry. The PLC systems replaced the hardwired relay panels and provided
the flexibility of changing the logic program whenever the application at hand changed.
PLCs also demonstrated a high degree of reliability at a fairly low cost. That is why they
became more and more popular in the process control industry, and they have grown in the
market to perform virtually any control application ranging from simple on-off control to
relatively complex control applications.
A simple electromagnetic relay consists of a coil of wire wrapped around a soft iron core,
an iron yoke which provides a low reluctance path for magnetic flux, a movable
iron armature, and one or more sets of contacts (there are two in the relay pictured). The
armature is hinged to the yoke and mechanically linked to one or more sets of moving
contacts. It is held in place by a spring so that when the relay is de-energized there is an air
gap in the magnetic circuit. In this condition, one of the two sets of contacts in the relay
pictured is closed, and the other set is open. Other relays may have more or fewer sets of
contacts depending on their function. The relay in the picture also has a wire connecting
the armature to the yoke. This ensures continuity of the circuit between the moving contacts
on the armature, and the circuit track on the printed circuit board (PCB) via the yoke, which
is soldered to the PCB.
When an electric current is passed through the coil it generates a magnetic field that
activates the armature and the consequent movement of the movable contact either makes
or breaks (depending upon construction) a connection with a fixed contact. If the set of
contacts was closed when the relay was de-energized, then the movement opens the
contacts and breaks the connection, and vice versa if the contacts were open. When the
current to the coil is switched off, the armature is returned by a force, approximately half
as strong as the magnetic force, to its relaxed position. Usually this force is provided by a
spring, but gravity is also used commonly in industrial motor starters. Most relays are
manufactured to operate quickly. In a low-voltage application this reduces noise; in a high
voltage or current application it reduces arcing.
When the coil is energized with direct current, a diode is often placed across the
coil to dissipate the energy from the collapsing magnetic field at deactivation, which would
otherwise generate a voltage spike dangerous to semiconductor circuit components. Some
automotive relays include a diode inside the relay case. Alternatively, a contact protection
network consisting of a capacitor and resistor in series (snubber circuit) may absorb the
surge. If the coil is designed to be energized with alternating current (AC), a small copper
"shading ring" can be crimped to the end of the solenoid, creating a small out-of-phase
current which increases the minimum pull on the armature during the AC cycle
Automation of production lines and manufacturing processes will lead to the development
of the mangles factory where there is no longer any significant requirement for production
workers or operators. Such levels of automation will not be achievable without
development of control systems, particularly PLCs.
The PLC works by looking at its inputs and depending upon their state, turning
on/off its outputs. The user enters a program, usually via software, that gives the desired
results. PLC are used in many “real world” applications. If there is industry present, chances
are good that there is a PLC present. Almost any application that needs some type of
electrical control has a need for a PLC Sufficient equipment-sequencing and control
functions have been implemented with PLC’s to indicate they offered many benefits that
were not yet fully recognized. Installation flexibility,
4.7 APPLICATION
• Manufacturing / Machining
• Food / Beverage
• Metals
• Power
• Mining
4.8 ADVANTAGES
• Reliability in Operation
• Large quantity of contacts
• Online/offline modifications
• Cost effective for controlling complex systems
• Small physical size, shorter project time
• Speed in operation
• In house simulation & testing of project
• Consume less energy
• Easy Maintenance
• Economical
• Security
• Minimum space requirements,
4.9 Disadvantages
• Too much work required in connecting wires.
1. Compact - In these types of PLC the number of input and output is fixed and these are
very purpose specified.
2. Modular - In this type of PLC the input and output modules are used and thus the number
of the I/O ports is variable n depend upon the number of slots available and modules used.
Fig 4.7 Different Type of PLC
• Sourcing Concept (PNP) - When the current direction of any signal is outwards to
the PLC input or output port it is known as the Sourcing.
.
Fig 4.10 Sink Source Concept
4.14 Programming
Programming software Proficy machine Edition 5.7 has been utilized in this project.
Proficy machine is a PLC programming tool for the creation, testing and
maintenance of programs associated with Gee-Fanuc PLC series. It provides
facilities for the support of PLC devices and address information and for
communications with Ge-Fanuc PLCs and their supported network types. An
example of ladder logic can be seen in Figure 2.5. To interpret this diagram
imagines that the power is on the vertical line on the left hand side, we call this the
hot rail. On the right hand side is the neutral rail. In
The figure there are two rungs, and on each rung there are combinations of inputs
(two vertical lines) and outputs (circles). If the inputs are opened or closed in the
right combination the power can flow from the hot rail, through the inputs, to power
the outputs, and finally to the neutral rail. An input can come from a sensor, switch,
or any other type of sensor. An output will be some device outside the PLC that is
switched on or off, such as lights or Motors. In the top rung the contacts are
normally open and normally closed. This means if input A is on and input B is off,
then power will flow through the output and activate it. Any other combination of
input values will result in the output X being off.
Function Block Diagram – A graphical language for depicting signal and data flows
through re-usable function blocks. FBD is useful for expressing the interconnection of
control system algorithms and logic.
Structured Text – A high level text language that encourages structured programming. It
has a language structure (syntax) that strongly resembles PASCAL and supports a wide
range of standard functions and operators.
Instruction List – A low level ‘assembler like’ language that is based on similar
instructions list languages found in a wide range of today’s PLC.
The language which we used in the PLC for writing any logic is Ladder language.
It is easy to design logic programs for small systems but as the length of the program grows
it becomes accordingly more complicated to design and verify the PLC code.
The functional operation of any manufacturing unit is needed to be smooth, without
down-times. Inefficiency in generating the controlling code in the manufacturing plant may
cause huge down time and ramp-up times. Hence, auto generation of PLC program using
rapid modelling and compiling tools to generate IEC standard PLC program is an efficient
method to reduce the PLC development time.
Works that the PLC carries out become more complex. To treat them efficiently, it
has retained more than a hundred kinds of instructions. Of the instructions, the proportion
of special instructions such as PID and floating-point operations has been increased with
extension of its adaptable range.
These instructions need much time to execute. The execution time of the PLC
program is important as a measure of its performance. Thus increase of instructions puts a
burden to performance of the PLC.
Ladder logic is a method of drawing electrical logic schematics. It is now a
graphical language very popular for programming Programmable Logic Controllers
(PLCs). It was originally invented to describe logic made from relays. The name is based
on the observation that programs in this language resemble ladders, with two vertical "rails"
and a series of horizontal "rungs" between them.
Input Instruction
This Instruction is Called XIC or Examine If Closed. i.e.; If a NO switch is actuated then
only this instruction will be true. If a NC switch is actuated then this instruction will not be
true and hence output will not be generated.
This Instruction is Called XIO or Examine If Open i.e.; If a NC switch is actuated then only
this instruction will be true. If a NC switch is actuated then this instruction will not be true
and hence output will not be generated.
Output Instruction
This Instruction is called OTE and shows the States of O/P. i.e.; if any instruction either
XIO or XIC is true then output will be high. Due to high output a 24 volt signal is generated
from PLC processor.
Retentive output instruction
If the rung is true, turns ON a bit and it remains ON even the rung gets false. The bit stays
ON until the rung containing an OUT with same address goes true.
OTU (output unlatch): If the rung is true, turns OFF a bit. The bit stays OFF until the
rung containing an OTL with same address goes true and the rung containing OUT with
same address remains false.
Timers:
1. TON-
This is an ON timer, in this we set the time base and can give the time delay.
2. TOF
This is an OFF timer, here we need to enable as well as disable the timer.
3. RTO
This is called Retentive Timer On, here the timer is not reset once we disable it, so we need
to use the RES (reset) function. This timer can be paused easily.
Compare instructions:
The Rung goes true when test value in between lower and higher limit.
2. EQU (Equal):
Counters:-
1. CTU-
This is Counter Up, here we set the pre-set and whenever the signal is given the accumulator
is increased, to reset the counter we have to use RES.
2. CTD-
This is Counter down, here DN bit is on initially and as the accumulator decreases and
becomes less than pre-set it becomes off.
RESET Function-
Compute / Math:
1. ADD (Addition):
When the rung goes true, value stored in source A is added with value stored in Source B
and the resulted value is stored in Destination.
2. SUB (Subtraction):
3. MUL (Multiplication):
4. DIV (Division):
1. MOV (Move):
When rung goes true the value stored in source move to destination.
When the rung goes true, value stored in source A is Logically ANDed with value stored
in Source B and the resulted value is stored in destination.
6. CLR (Clear):
4.18 COMMUNICATION
Serial Communications
There are several methods to communicate between a PLC and a programmer or even
between two PLCs. PLC communications facilities normally provides serial transmission
of information.
Common Standards
RS 232
Used in short-distance computer communications, with the majority of computer hardware
and peripherals. Has a maximum effective distance of approx. 30 m at 9600 baud.
Local Area Network (LAN)
Local Area Network provides a physical link between all devices plus providing overall
data exchange management or protocol, ensuring that each device can “talk” to other
machines and understand data received from them .LANs provide the common, high-speed
data communications bus which interconnects any or all devices within the local area.
LANs are commonly used in business applications to allow several users to share costly
software packages and peripheral equipment such as printers and hard disk storage.
RS 422 / RS 485
Used for longer-distance links, often between several PCs in a distributed system. RS 485
can have a maximum distance of about 1000 meters.
CHAPTER 5: SCADA
5.1 SCADA
SCADA stands for supervisory control and data acquisition. It generally refers to an
industrial control system: a computer system monitoring and controlling a process. The
process can be industrial, infrastructure or facility based as described below:
Industrial processes include those of manufacturing, production, power generation,
fabrication, and refining, and may run in continuous, batch, repetitive, or discrete modes.
Infrastructure processes may be public or private, and include water treatment and
distribution, wastewater collection and treatment, oil and gas pipelines, electrical power
transmission and distribution, and large communication systems.
Facility processes occur both in public facilities and private ones, including
buildings, airports, ships, and space stations. They monitor and control HVAC, access, and
energy consumption.
SCADA is “Supervisory Control and Data Acquisition”. Real-time industrial
process control Systems used to centrally monitor and control remote or local industrial
equipment such as Motors, valves, pumps, relays, sensors, etc. SCADA is Combination of
telemetry and Data Acquisition. Previously without SCADA software, an industrial process
was entirely controlled by PLC, CNC, PID & micro controllers having programmed in
certain languages or codes
In the first generation, computing was done by mainframe computers. Networks did
not exist at the time SCADA was developed. Thus SCADA systems were independent
systems with no connectivity to other systems. Wide Area Networks were later designed
by RTU vendors to communicate with the RTU. The communication protocols used were
often proprietary at that time. The first-generation SCADA system was redundant since a
back-up mainframe system was connected at the bus level and was used in the event of
failure of the primary mainframe system.
The processing was distributed across multiple stations which were connected
through a LAN and they shared information in real time. Each station was responsible for
a particular task thus making the size and cost of each station less than the one used in First
Generation. The network protocols used were still mostly proprietary, which led to
significant security problems for any SCADA system that received attention from a hacker.
Since the protocols were proprietary, very few people beyond the developers and hackers
knew enough to determine how secure a SCADA installation was. Since both parties had
vested interests in keeping security issues quiet, the security of a SCADA installation was
often badly overestimated, if it was considered at all.
These are the current generation SCADA systems which use open system
architecture rather than a vendor-controlled proprietary environment. The SCADA system
utilizes open standards and protocols, thus distributing functionality across a WAN rather
than a LAN. It is easier to connect third party peripheral devices like printers, disk drives,
and tape drives due to the use of open architecture. WAN protocols such as Internet
Protocol (IP) are used for communication between the master station and communications
equipment. Due to the usage of standard protocols and the fact that many networked
SCADA systems are accessible from the Internet; the systems are potentially vulnerable to
remote cyber-attacks. On the other hand, the usage of standard protocols and security
techniques means that standard security improvements are applicable to the SCADA
systems, assuming they receive timely maintenance and updates.
2. Real Time and Historical Trend the trends play very important role in process
operation. If the batch fails or the plant trips, we can simply go to the historical trend data
and do the analysis. One can have better look of the parameters through the trends.
3. Alarms indicate to the operator when something goes wrong. An alarm can signal that
a device or process has stopped operating within acceptable limits or it can indicate
breakdown, wear or process malfunction.
4. Recipe Management is an additional feature. Some SCADA support it, some don’t.
Most of the plants are manufacturing multi products. When you have different product to
manufacture, you just have to load the recipe of that particular product.
5. Security is one facility people generally look for. You can allocate certain facilities or
features to the operator, process people, engineering debt & maintenance debt. For e.g.
operators should only operate the system, he should not be able to change the application.
7. Networking can connect to the PLC and other control systems through internet and the
system can be controlled remotely.
8. Database Connectivity now a day information lays a very important role in any
business. Most manufacturing units go for ENTERPRISE RESOURCE PLANNING (ERP)
or MANAGEMENT INFORMATION SYSTEM (MIS).
9. Script for Logic Development is also a great feature available with the SCADA. Here
one can simply write the logic using simple IF-ELSE commands and the process stars
running accordingly.
●The lack of concern about security and authentication in the design, deployment and
operation of existing SCADA networks.
●The mistaken belief that SCADA systems have the benefit of security through
obscurity through the use of specialized protocols and proprietary interfaces.
●The mistaken belief that SCADA networks are secure because they are purportedly
physically secured.
The mistaken belief that SCADA networks are secure because they are supposedly
disconnected from the Internet.
SCADA systems are used to control and monitor physical processes, examples of
which are transmission of electricity, transportation of gas and oil in pipelines, water
distribution, traffic lights, and other systems used as the basis of modern society. The
security of these SCADA systems is important because compromise or destruction of these
systems would impact multiple areas of society far removed from the original compromise.
For example, a blackout caused by a compromised electrical SCADA system would cause
financial losses to all the customers that received electricity from that source. How security
will affect legacy SCADA and new deployments remains to be seen.
There are two distinct threats to a modern SCADA system. First is the threat of
unauthorized access to the control software, whether it be human access or changes induced
intentionally or accidentally by virus infections and other software threats residing on the
control host machine. Second is the threat of packet access to the network segments hosting
SCADA device. In many cases, there is rudimentary or no security on the actual packet
control protocol, so anyone who can send packets to the SCADA device can control it. In
many cases SCADA users assume that a VPN is sufficient protection and are unaware that
physical access to SCADA-related network jacks and switches provides the ability to
totally bypass all security on the control software and fully control those SCADA networks.
These kinds of physical access attacks bypass firewall and VPN security and are best
addressed by endpoint-to-endpoint authentication and authorization such as are commonly
provided in the non-SCADA world by in-device SSL or other cryptographic techniques.
The amount of specific development that needs to be performed by the end-user is limited,
especially with suitable engineering.
Reliability and robustness. These systems are used for mission critical industrial
processes where reliability and performance are paramount. In addition, specific
development is performed within a well-established framework that enhances reliability
and robustness. Technical support and maintenance by the vendor.
HMI is the apparatus which presents process data to a human operator, and through which
the human operator controls the process.
HMI is usually linked to the SCADA system's databases and software programs, to
provide trending, diagnostic data, and management information such as scheduled
maintenance procedures, logistic information, detailed schematics for a particular sensor or
machine, and expert-system troubleshooting guides.
The HMI system usually presents the information to the operating personnel
graphically, in the form of a mimic diagram. This means that the operator can see a
schematic representation of the plant being controlled. For example, a picture of a pump
connected to a pipe can show the operator that the pump is running and how much fluid it
is pumping through the pipe at the moment. The operator can then switch the pump off.
The HMI software will show the flow rate of the fluid in the pipe decrease in real time.
Mimic diagrams may consist of line graphics and schematic symbols to represent process
elements, or may consist of digital photographs of the process equipment overlain with
animated symbols.
The HMI package for the SCADA system typically includes a drawing program
that the operators or system maintenance personnel use to change the way these points are
represented in the interface. These representations can be as simple as an on-screen traffic
light, which represents the state of an actual traffic light in the field, or as complex as a
multi-projector display representing the position of all of the elevators in a skyscraper or
all of the trains on a railway.
Driver:-A driver acts like a translator between the device and programs that use the device.
Each device has its own set of specialized commands that only its driver knows. In contrast,
most programs access devices by using generic commands. The driver, therefore, accepts
generic commands from a program and then translates them into specialized commands for
the device. A Software which allows a computer to access the devices using com ports or
communication cards.
There are three drivers for SCADA
1. Direct driver
2. DDE (Dynamic data exchange)
3. OPC (OLE for Process control)
The primary function of DDE is to allow Windows applications to share data. For
example, a cell in Microsoft Excel could be linked to a value in another application and
when the value changed, it would be automatically updated in the Excel spreadsheet. The
data communication was established by a simple, three-segment model. Each program was
known to DDE by its "application" name. Each application could further organize
information by groups known as "topic" and each topic could serve up individual pieces of
data as an "item".
While newer technologies like COM offer features DDE doesn't have, there are also
issues with regard to configuration that can make COM more difficult to use than DDE.
Also, DDE is a generic protocol that allows any application to monitor changing data
provided by any other application, while to achieve similar results in COM one would
generally need to know details of the application that is either to produce or consume the
data. For example, a single DDE financial data distribution application can provide live
prices to either Excel or a financial charting application without needing to know which it
is doing, while to achieve the same results with COM would usually require the distribution
application's authors to write custom code for each use scenario.
California-based company Wonder ware developed an extension for DDE called NetDDE
that could be used to initiate and maintain the network connections needed for DDE
conversations between DDE-aware applications running on different computers in a
network and transparently exchange data. A DDE conversation is an interaction between
client and server applications. Net DDE could be used along with DDE and the DDE
management library (DDEML) in applications.
OLE for Process Control which stands for Object linking and Embedding (OLE) for
Process control, is the original name for a standards specification developed in 1996 by an
industrial automation industry task force. The standard specified the communication of
real-time plant data between control devices from different manufactures. After the initial
release, the OPC foundation was created to maintain the standard. Since then, standards
have been added and names have been changed. As of June. 2006, “OPC is a series of
standards specifications”. OPC was designed to provide a common bridge for Windows
based software applications and process control hardware. Standards define consistent
methods of accessing field data from plant floor devices.
This method remains the same regardless of the type and source of data. An OPC
Server for one hardware device provides the same methods for an OPC Client to access its
data as any and every other OPC Server for that same and any other hardware device. The
aim was to reduce the amount of duplicated effort required from hardware manufacturers
and their software partners, and from the SCADA and other HMI producers in order to
interface the two. Once a hardware manufacturer had developed their OPC Server for the
new hardware device their work was done to allow any 'top end' to access their device, and
once the SCADA producer had developed their OPC Client their work was done to allow
access to any hardware, existing or yet to be created, with an OPC compliant server.
OPC servers provide a method for many different software packages (so long as it
is an OPC Client) to access data from a process control device, such as a PLC or DCS.
Traditionally, any time a package needed access to data from a device, a custom interface,
or driver, had to be written. The purpose of OPC is to define a common interface that is
written once and then reused by any business, SCADA, HMI, or custom software packages.
There is nothing in the OPC specifications to restrict the server to providing access
to a process control device. OPC Servers can be written for anything from getting the
internal temperature of a microprocessor to the current temperature in Monument Valley.
Once an OPC server is written for a particular device, it can be reused by any
application that is able to act as an OPC client. OPC servers use Microsoft’s OLE
technology (also known as the Component Object Model, or COM) to communicate with
clients. COM technology permits a standard for real-time information exchange between
software applications and process hardware to be defined.
It is important to note that some OPC specifications are published, others are
available only to member of the OPC Foundation. So whilst no company "owns" OPC and
anyone can develop an OPC server, whether or not they are a member of the OPC
Foundation, non-members will not necessarily be using the latest specifications. Anyone
can integrate OPC products, and there is no pre-requisite for the system integrator to belong
to any organization. It is therefore up to each company that requires OPC products to ensure
that their products are certified and that their system integrators have the necessary training.
5.14 Communication
Between Rsview32 and Micrologix:-
Communication between Review 32 SCADA and Micrologix PLC done with Direct
Driver. For this First of all communicate PC with PLC and then go to Rsview32 and make
channel, after this go to node and make a node with Direct Driver.
Between Rsview32 and EXCEL:-Communication between Rsview 32 SCADA and
EXCEL done with DDE.
Between Intouch and Micrologix: - Communication between Intouch SCADA and
Micrologix PLC done with DDE.
Between Intouch and EXCEL:-Communication between Intouch SCADA and EXCEL
also done with DDE
5.15 Sensor
A sensor (also called detector) is a converter that measures a physical quantity and converts
it into a signal which can be read by an observer or by an (today mostly electronic)
instrument. For example, a mercury-in-glass thermometer converts the measured
temperature into expansion and contraction of a liquid which can be read on a calibrated
glass tube. A thermocouple converts temperature to an output voltage which can be read
by a voltmeter. For accuracy, most sensors are calibrated against known standards.
This device emits and/or detects infrared radiation to sense a particular phase in the
environment. Generally, thermal radiation is emitted by all the objects in the infrared
spectrum. The infrared sensor detects this type of radiation which is not visible to human
eye.
2. UV Sensor:
These sensors measure the intensity or power of the incident ultraviolet radiation. This
form of electromagnetic radiation has wavelengths longer than x-rays but is still shorter
than visible radiation. An active material known as polycrystalline diamond is being
used for reliable ultraviolet sensing.
CHAPTER 6: Result & Discussion
The various output devices used in the bottling process are gear motors, pumps and LED’s.
These are connected to the output module. The gear motor is used to run the conveyor in
forward direction. There is totally one pump used for the filling process. The pump is
connected to the water tank. These are the various output devices used in the bottling
process.
6.2 Conclusion
Automation plays an increasingly important role in the global economy and in daily
experience. Engineers strive to combine automated devices with mathematical and
organizational tools to create complex system for a rapidly expending range of application
and human activities.
Automation provides 100% accuracy all-time. So the failures and mis-
match in production completely eliminates. It makes the system’s efficiency higher than
manuals well as it controls wastages. So the overall savings increases. It provides safety to
human being. By that industry can achieves the safety majors and ISO and OHSAS
reputation. It makes the operation faster than manual which causes higher production and
proper utilization of utilities. It increases the production by which the cost of each product
decreases and industry profit increases. It provides smooth control on system response. It
provides repeatability, so that the same kinds of products are easier to manufacture at
different stages without wasting time. It provides quality control, so that the
products become reliable which improves industrial reputation in market. It provides
integration with business systems. It can reduce labour costs, so the final profit increases.
There are thousands of SCADA systems installed and they can be completely
different from each other, in terms of their structures but they all have common elements
and a common purpose – to supervise control and collect data. There are three types of
SCADA systems that describe all of the SCADA systems. Communication is the most
significant part of SCADA Power and communication systems are most likely to get
attacked by terrorists.
6.3 Bibliography
http://www.slideshare.net/ebees-automation-faq
http://en.wikipedia.org/wiki/Automation
http://www.plcs.net/chapters/whatis1.htm
http://www.plcs.net/chapters/history2.htm
http://www.plcs.net/chapters/rs232lad.htm
http://www.engineersgarage.com/articles/scada-systems
http://www.slideshare.net/orlandomoreno/scada-1964031