Documente Academic
Documente Profesional
Documente Cultură
The advanced performance is not limited to the CPU module only, and also extended to inter-modules bus speed, and inter-process
network speed.
Inter modules bus speed advancement means that the I/O response can be faster, and process response can react
more real-time. Besides I/O response, the higher system bus speed has been utilised to achieve a multi-CPU
system, not commonly found in most manufacturers. A typical PLC system consists of a single CPU with I/O and
network modules. A multi-CPU system consists of up to four CPUs on a single rack.
An example of a multi-CPU system is a first CPU handling sequence & interlocking control, while a second CPU on the same rack
handling motion control. This distributes the processing and gives a superior performance because of the focused tasks by each
CPU.
A multi-CPU system realises very accurate motion control. By supporting synchronised data communications between the
programmable controller CPU and motion CPU via the high-speed system bus, easily realising super-high motion control accuracy.
An inter process network enables interconnectivity across all levels of automation. Open network, albeit secure, are now a
requirement of customers to ensure interoperability across their plants. Data must flow seamlessly between the sensor level and
management level across multiple industry-standard automation networks. Industrial networks are usually designed with bias
towards more reliability than speed. This is very different from commercial networks where speed takes priority.
However, in recent advancement, industrial networks with 1Gbps have been developed with the speed of commercial networks, and
the reliability of industrial requirements. Based on Seamless Message Protocol (SLMP), such a highly reliable distributed control
network is designed to handle very large data communications (128k Words) over a high speed (1Gbps) dual loop network.
b. Reducing Maintenance Costs
Maintenance cost can be reduced through a series of functions built to help maintenance teams as well as development teams in
their work.
Built-In Database
Traditionally, data loggings, used for trends, alarms & events, are done at the Human Machine Interface (HMI) like SCADA, touch
panels, and so on. The HMIs are connected to the PLC via Ethernet, serial communication. In the event that the communication
breaks, precious data and important information are lost. This lost data may cause the maintenance team to put in additional hours
to bring back the machine or process.
The newer generation PLC includes a database which makes it possible for these functions to be done at PLC level, and data
continues to be logged even in the event of communication loss.
Again, open data format, like Comma Separated Values (CSV) format, are used so that even common Microsoft Excel can display
these data.
Intuitive Engineering Software
The engineering software is sometimes considered a fundamental part of the control system in addition to the hardware
components. The core of the system, it includes various steps of the product life cycle, from the design stage all the way to
commissioning and maintenance of the control system. Today, intuitive, easy-to-use software suites are expected as a standard for
modern process needs.
Software now includes not only intuitive programming, but also graphics based system design, graphics based
debugging/maintenance. Customers have an overview of their system and fast indication of the trouble areas and as such process
downtime can be kept to a minimum.
Usually compliant to IEC61131-2, engineering software utilises a point and click set up and the configuration is automatically
reflected to the hardware. This reduces the learning curve for the developers and production start-up time can be very much
reduced.
All this brings about the reduction of Total Cost of Ownership, which is a better indication of the Return Of Investment (ROI).
Compared to 20 years ago when decision makers are only interested in upfront capital costs.
2. Security
Traditionally, control systems are standalone process independent of one another as well as the IT networks. With the demands for
visibility of the productivity and processes, control systems are now very much interconnected to the Manufacturing Execution
System and the Enterprise Resource Planning System. With the increased connectivity and integration to IT networks, security of the
control systems are becoming a closely looked-into topic. A security breach in a connected control systems may now potentially
affect the enterprise network.
Past history of control system based malware like the Stuxnet virus affecting targeted PLCs, has increased the awareness of security
administrators. Standard one-level protection for read/write restrictions of the PLC using numeric/alphanumeric passwords is no
longer sufficient.
As technology becomes more complex and the distribution of process systems more global, the protection of intellectual property is
even more significant. When shipping a finished product overseas, the last thing an OEM needs to consider is unauthorised copying
or changing of the original project data.
In addition to this, unauthorised access to the control system can have very serious implications to the control system and the end
user, which can compromise the overall safety of the plant.
Advanced PLC now has a number of embedded features that help to maintain these requirements, such as hardware and software
keys to protect intellectual property, and multi-level user access password hierarchy to protect the project at the design stage.
Security Key Authentication Protecting Project Data
The hardware security key authentication prevents programs from being opened on personal computers where the security key has
not been registered. Furthermore, because programs cannot be executed by CPU modules where the hardware security key has not
been registered, the integrity of customer technologies and other intellectual property is not compromised. As the hardware key is
removable, therefore, when replacing the CPU module, there is no need to re-register the security key, making replacement very
simple.
The IP filter can be used to register the IP addresses of devices permitted to access the CPU module. As a result, access from nonregistered devices can be blocked, thereby lowering the risk of program hacking and unauthorised access by a third party.
Of course, the traditional password-based security is here to stay. Enhancement to the authentication levels, as well as passwords of
up to 32 alphanumeric and special characters can be set to prevent unauthorised access to the CPU module via networks such as
Ethernet.