+ All Categories
Home > Documents > Distributed Control Systems Theory & Implementation

Distributed Control Systems Theory & Implementation

Date post: 23-Oct-2015
Category:
Upload: simonlisa
View: 30 times
Download: 3 times
Share this document with a friend
Description:
DCS control
Popular Tags:
28
Page 1 ISA Lunch and Learn Ken Carfagno November 6, 2013 Agenda Theory & Practice - Basic control (e.g., regulatory control, feedback, etc) - Discrete control (e.g., relay logic, Boolean algebra) - Sequential control (e g batch) Sequential control (e.g., batch) - Typical Configuration and Programming - Input/output termination and wiring Implementation - HMI (e.g., graphics, alarm management, trending, historical data) 2 HONEYWELL - CONFIDENTIAL File Number - Network security
Transcript

Page 1

ISALunch and Learn

Ken CarfagnoNovember 6, 2013

Agenda

• Theory & Practice- Basic control (e.g., regulatory control, feedback, etc)- Discrete control (e.g., relay logic, Boolean algebra) - Sequential control (e g batch)Sequential control (e.g., batch)- Typical Configuration and Programming- Input/output termination and wiring

• Implementation - HMI (e.g., graphics, alarm management, trending, historical

data)

2 HONEYWELL - CONFIDENTIAL File Number

- Network security

Page 2

Basic Control

Types of Control Loops Simple Feedback Control Loop

Control Loop Types & Components

Cascade Control Loops

Components of Control Loops Basic Elements

4 HONEYWELL - CONFIDENTIAL File Number

Page 3

IP

FR FICFIC FY

Basic Feedback Control Loop

E

FT

FV

5 HONEYWELL - CONFIDENTIAL File Number

E

Most commonly used process control loop

IP

PID Controller

Transducer

Controller Output (0-100%)

Basic Loop Components

P

FR FICFIC

E

FY

FT

FV

RecorderTransducer

Primary

TransmitterFinal Control Element (control valve)

Pneumatic Signal

Transmission Signal

6 HONEYWELL - CONFIDENTIAL File Number

Element

Detailed description of instrument symbolsare on the legend

Page 4

Bypass Valve

“E” Assembly-Double Block/Bleed w Bypass Valve

Block Valve

Block Valve

Control Valve

7 HONEYWELL - CONFIDENTIAL File Number

Bleed Valve

Control Valve

I/P Transducer

TT FICTIC

TRPrimary Controller

Why incorporate a cascade system?

To minimize outside

Cascade Control Loops

IP

FR FICFIC FY

Secondary Controller

To minimize outside load variables resulting in increased process stability

Examples

Condensate control

8 HONEYWELL - CONFIDENTIAL File Number

E

FT

FV Fuel gas/oil burner pressure control

Quick and frequent hydraulic changes

Page 5

Basic Loop

TIC

I/P

TY

TT

Process

Steam

Cascade Control

Condensate

FIC

Load Variable Changes(P1 or P2 is variable)

TICTT

Process

9 HONEYWELL - CONFIDENTIAL File Number

Steam, P1 I/P

FY

FT

P2

Condensate

Basic Control Implementation – Function Blocks

Input from the

Cascade fromPrimary

Input from the transmitter

PID Controller

10 HONEYWELL - CONFIDENTIAL File Number

Output to Valve

Page 6

Discrete Control

Water level

Float level indicator

Simple Process

Automate simple process

• Push a button to start

• The value should open automatically

• When the valve is open, the pump should start automatically

IN

OUT

Valve with actuator

Water level• The operator watches the level indicator. When the tank is full the operator pushes another button

• The pump should stop and the valve should close.

12 HONEYWELL - CONFIDENTIAL File Number

OUT

Water TankWater Pump

Page 7

Honeywell Proprietary & ConfidentialHoneywell Proprietary & Confidential

120 VAC

Since I am using relays and pushbuttons to do my remote control, I need an electrical diagram to use as my guide for connecting all of the electrical wires so I create the following pushbutton / relay wiring schematic diagram.

R1

R1

120 VAC

H NPB-1

PB-2 (Start)(Stop)(Open Valve)

R2

ZSO-2 R1

(Run Pump)(Valve Opened)

R1

120 VAC

H NPB-1

PB-2

R2

R1

ZSO-2 R1

Here is how it works:

- Press normally open pushbutton PB-2 and relay R1 is energized.

ClosedStopped

14 HONEYWELL - CONFIDENTIAL File Number

Page 8

R1

120 VAC

H NPB-1

PB-2

R2

R1

ZSO-2 R1

Here is how it works:

- Press normally open pushbutton PB-2 and relay R1 is energized.

R1 seals in PB 2 so that when I remove my finger from the button R1 stays energized

OpenStopped

15 HONEYWELL - CONFIDENTIAL File Number

- R1 seals in PB-2 so that when I remove my finger from the button, R1 stays energized.

- A contact from R1 relay is wired to my valve actuator. A closed R1 contact opens the valve. Note R1 is also close in the second rung.

R1

120 VAC

H NPB-1

PB-2

R2

R1

ZSO-2 R1

Here is how it works:

- Press normally open pushbutton PB-2 and relay R1 is energized.

R1 seals in PB 2 so that when I remove my finger from the button R1 stays energized

OpenStart

16 HONEYWELL - CONFIDENTIAL File Number

- R1 seals in PB-2 so that when I remove my finger from the button, R1 stays energized.

- A contact from R1 relay is wired to my valve actuator. A closed R1 contact opens the valve. Note R1 is also close in the second rung.

- Valve open contact ZSO-2 is wired from the valve (the contact is closed when the valve is fully open). A closed ZSO-2 contact along with the closed R1 contact energizes relay R2.

- A contact from R2 relay is wired to the pump. A closed R2 contact starts the pump.

Page 9

R1

120 VAC

H NPB-1

PB-2

R2

R1

ZSO-2 R1

Once the tank is full, I can stop the pump and close the valve.

Here is how you do it:

OpenStart

17 HONEYWELL - CONFIDENTIAL File Number

- Press normally closed PB-1 and relay R1 is de-energized.

R1

120 VAC

H NPB-1

PB-2

R2

R1

ZSO-2 R1

Once the tank is full, I can stop the pump and close the valve.

Here is how you do it:

Press normally closed PB 1 and relay R1 is de energized

ClosedStopped

18 HONEYWELL - CONFIDENTIAL File Number

- Press normally closed PB-1 and relay R1 is de-energized.

- When R1 is de-energized, the contact from R2 stops the pump and the contact from R1 closes the valve.

- Valve open contact ZSO-2 returns to the open state as the valve goes to the closed position.

Page 10

R1

120 VAC

H NPB-1

PB-2

R2

R1

ZSO-2 R1

Once the tank is full, I can stop the pump and close the valve.

Here is how you do it:

P ll l d PB 1 d l R1 i d i d

ClosedStopped

19 HONEYWELL - CONFIDENTIAL File Number

- Press normally closed PB-1 and relay R1 is de-energized.

- When R1 is de-energized, the contact from R2 stops the pump and the contact from R1 closes the valve.

- Valve open contact ZSO-2 returns to the open state as the valve goes to the closed position.

- We are back at the beginning of our sequence when I remove my finger from PB-1.

R1

120 VAC

H NPB-1

PB-2 R1 Contact

120 VAC

Here is how we would wire our control circuit.

Typical Connection and Wiring

R2

R1

R1

R2 Contact

120 VAC

20 HONEYWELL - CONFIDENTIAL File Number

ZSO-2

Page 11

Control Via PLC, Ladder Logic

Here is how we would wire our devices to the PLC I/O.

DI DO

DI 1

DI 2

DI 3

DO 1

DO 2

DO 3

PB-1

PB-2

ZSO 2

Pump

Valve

PB-1 Stop

DI 3

DI 4

DI 5

DI 6

DI 7

DI 8

DO 3

DO 4

DO 5

DO 6

DO 7

DO 8

ZSO-2

21 HONEYWELL - CONFIDENTIAL File Number

ZSO-2

PB-2 Start

R1

R1

120 VAC

H NPB-1

PB-2DI 1

DI 2

DI 3

DI 4

DI 5

DO 1

DO 2

DO 3

DO 4

DO 5

PB-1

PB-2

ZSO-2

PumpValve

R2

R1DI 6

DI 7

DI 8

DO 6

DO 7

DO 8

( )DODIDI

ZSO-2 R1

We take all of our wiring information and I/O module information create this program

This is what our PLC programming language looks like.

22 HONEYWELL - CONFIDENTIAL File Number

( )

( )

1

DO

2

DO

1

DI

3

2

DO

1

1information create this program.

Notice the relationship between our I/O point numbers and the programming.

Page 12

R1

R1

120 VAC

H NPB-1

PB-2DI 1

DI 2

DI 3

DI 4

DI 5

DO 1

DO 2

DO 3

DO 4

DO 5

PB-1

PB-2

ZSO-2

Pump

Valve

R2

R1DI 6

DI 7

DI 8

DO 6

DO 7

DO 8

( )DODIDI

ZSO-2 R1

Also take note that my DI-1 logic contact is normally open. This is because it will be held close by PB-1 when the PLC power is on.

23 HONEYWELL - CONFIDENTIAL File Number

( )

( )

1

DO

2

DO

1

DI

3

2

DO

1

1

DI 1

DI 2

DI 3

DI 4

DI 5

DO 1

DO 2

DO 3

DO 4

DO 5

PB-1

PB-2

ZSO-2

Pump

Valve

R1

R1

120 VAC

H NPB-1

PB-2

DI 6

DI 7

DI 8

DO 6

DO 7

DO 8

( )DODIDI

R2

R1

ZSO-2 R1

The programming is done on a laptop PC.

24 HONEYWELL - CONFIDENTIAL File Number

( )

( )

1

DO

2

DO

1

DI

3

2

DO

1

1

Page 13

Control via DCS, Function Blocks

R1

R1

120 VACH N

PB-1PB-2

R2

ZSO-2 R1

25 HONEYWELL - CONFIDENTIAL File Number

Sequential Control

Page 14

Sequential Control

• Time ordered control• Series of step to meet control objective

- Examples: Equipment Startup or shutdown Equipment Startup or shutdownNon-continuous (batch) process

• Sequential Control follows a common pattern- Take action which will cause a change in the process- Wait for the desired change to complete- Repeat

27 HONEYWELL - CONFIDENTIAL File Number

SCM ExampleEmbedded Operator

Instructions

Transition Blocks

Step Blocks

28 HONEYWELL - CONFIDENTIAL File Number

Configured Handlers

Page 15

Basic Wiring

Analog Inputs

Analog Inputs: Questions

• Where does the signal power come from?

• Where does the transmitter power come from?

• Where is the signal ground?

30 HONEYWELL - CONFIDENTIAL File Number

Page 16

Analog Inputs, 2 wire, System Powered

31 HONEYWELL - CONFIDENTIAL File Number

AI, Current Signal, Self Power

32 HONEYWELL - CONFIDENTIAL File Number

Page 17

Human Machine Interface

HMI

HMI – Example of Non-Conforming Graphic

PC10615 73

PC10518.70PSIGE209

E210

TI202281.53DEGF TI203

200.09DEGF

FL ARECSR

CW S

FUELGAS

FI226400.312MSCFD

PI11510.77PSIG

FI204000.00

MSCFD

T200 FRAC OVRHD

15%

PI20118.71

PSI

TI201280.03

FFC201

4608.23BPD

LC20425%

LI21485%

FC214

FC23413.29KBPD

15.73PSIG

TI21389.03

F

TI223440.06

F

AI241320.78AMPS

D200

T20

3

T200

C205

LI22495%

VRU

SOUR

CW S

T200 TEMPS1-281.53 DEGF2-280.03 DEGF3-271.89 DEGF4-266.00 DEGF5-255.44 DEGF6-254.99 DEGF7-266.92 DEGF

0%85%

65%

35 HONEYWELL - CONFIDENTIAL File Number

FC2141308.29

BPD

P211

P212P210

P209

NAPHT HA

WTR

SL OP

50%

100%

Page 18

HMI – Example of ASM Graphic

36 HONEYWELL - CONFIDENTIAL File Number

Abnormal Situation Management Study

• Comparing ASM designed operator interface (multi-window) vs standard operator interface (single window)- 21 Operators- Matching process upsets on

simulator

• >38% improvement in recognizing process deviations before an alarm

• 26% improvement in their ability to successfully resolveproblem

37 HONEYWELL - CONFIDENTIAL File Number

p• 35-48% improvement in overall

operator response time to deviations

Source: ASM Meeting report – Oct. 2004

Page 19

Context-sensitive Access to Information

Context-Sensitive Menus

Alarm help

Operating procedures

38 HONEYWELL - CONFIDENTIAL File Number

Trends and analysis toolsAlarm management tools

Maintenance management tools

Quicker response & Less errors

Alarm Management

• Filtering• Sorting• Alarm Shelving• Alarm

CommentingCommenting• Custom

“Views”• Alarm Details• Links to Detail

& Associated Displays

• Alarm Help

39 HONEYWELL - CONFIDENTIAL File Number

p• Dynamic Alarm

Suppression

Page 20

Trending

• Trending- Events Integration - Custom Trend - 32 Pens- Resizable views- Save on demand- Improved User Interface- Easy to use time range

selections

40 HONEYWELL - CONFIDENTIAL File Number

Operators can invoke the Location Pane to quickly filter event data to specific process areas.

Operators can invoke the Location Pane to quickly filter event data to specific process areas.

Trending Examples

Trend Navigation Bar Chart

Trend with Events Trend with Numerics

42 HONEYWELL - CONFIDENTIAL File Number

Page 21

Secure Network Architectures

Level 4Business Planning

& LogisticsPlant Production Scheduling,

4 - Establishing the basic plant schedule -production, material use, delivery, and shipping. Determining inventory levels.

Ti F

Manufacturing automation architecture

• ISA99 functional hierarchical model

FIC

E D

OM

AIN

Level 2

Level 3

Plant Production Scheduling,Operational Management, etc

Manufacturing Operations Management

Dispatching Production, Detailed ProductionScheduling, Reliability Assurance, ...

2 - Monitoring, supervisory control and automated control of the production process

Time Frame

3 - Work flow / recipe control to produce the desired end products. Maintaining records and optimizing the production process.

Time FrameDays, Shifts, hours, minutes, seconds

Time FrameMonths, weeks, days O

FF

SS

CO

NT

RO

L D

OM

AIN

ISA

99

44 HONEYWELL - CONFIDENTIAL File Number

Level 1

BatchControl

DiscreteControl

ContinuousControl

1 - Sensing the production process, manipulating the production process

Time FrameHours, minutes, seconds, subseconds

Level 0 0 - The actual production process

PR

OC

ES

Page 22

Typical PCS Network Topology

Firewall

Enterprise Switch

l 3 DMZ

Level 4

Terminal Patch AntieServer

PHD Limited

Comm flow

L4 to L4

Ver

y L

imit

ed

L3.

5 to

L4

bet

wee

n L

4 &

L3

Router

ESC ESF ESTACE ExperionServer

ESVT SafetyManager

TerminalServer

Qualified Cisco Switches

Optional HSRPRouter

Domain Controller

ESF EASPHDServer

ExperionServer

3RD Party App SubsystemInterface

Level 3

Level 3.5 DMZ Server MgmtServer

VirusServer

eServerShadowServer

Level 2

Domain Controller

L2 to L2

L3 to L3

Lim

ite

d L

2 to

L

3

Limited L3.5 to L3.5

Ver

y L

imit

ed L

3 to

L3.

5V

ery

Lim

ited

L2

to L

3.5 N

o D

ire

ct

co

mm

un

ica

tio

ns

o

r L

2w

ee

n L

1

& L

3

45 HONEYWELL - CONFIDENTIAL File Number

Qualified Cisco SwitchesLevel 2

Level 1

L1 to L1

Lim

ite

d L

2 to

L

1N

o c

om

mu

nic

ati

on

s b

etw

or

L4

Security levels

– Level 1 - Controllers and real time control

– Level 2 – Servers, Operator Stations and supervisory control.

– Level 3 - Historians and Advanced Control and connection to other Level 2 areas or units.

– Level 3.5 - DMZ accessed from the Business Network and the PCN.

– Level 4 - Is the business network with clients for Historians or Advanced Control applications.

46 HONEYWELL - CONFIDENTIAL File Number

– Level 3 and 3.5 utilizes standard open systems Ethernet technology and Level 4 utilizes standard open systems LAN technology.

Page 23

Level 1 – Process Control

Domain ESF EASPHD

Experion

Firewall

3RD Party App Subsystem

Enterprise Switch

Level 3.5 DMZ

Level 4

TerminalServer

PatchMgmtServer

AntiVirusServer

eServerPHD ShadowServer

Limited L3.5 to L3.5 L

3

Comm flow

L4 to L4

Ver

y L

imit

ed

L3.

5 to

L4

ati

on

s b

etw

ee

n L

4 &

L3

Router

ESC ESF ESTACE ExperionServer

ESVT SafetyManager

TerminalServer

Qualified Cisco Switches

Optional HSRPRouter

Domain Controller

ESF EASServerExperionServer

3RD Party App SubsystemInterface

Level 3

Level 2

Domain Controller

Level 1 ite

2 to

L2 to L2

L3 to L3

Lim

ite

d L

2 to

L

3

Ver

y L

imit

ed L

to L

3.5

Ver

y L

imit

ed L

2 to

L3.

5 No

Dir

ec

t c

om

mu

nic

ao

r L

2s

bet

wee

n L

1 &

L3

47 HONEYWELL - CONFIDENTIAL File Number

Level 1

L1 to L1

Lim

d L

2L

1N

o c

om

mu

nic

ati

on

so

r L

4

Level 1 - Process Control

• Controllers and real time control

• Safety Systems• Safety Systems

• Protected by all other levels

48 HONEYWELL - CONFIDENTIAL File Number

Page 24

Level 2 – Supervisory Control

Firewall

Enterprise Switch

l 3 DMZ

Level 4

Terminal Patch AntieServer

PHD Limited

Comm flow

L4 to L4

Ver

y L

imit

ed

L3.

5 to

L4

bet

wee

n L

4 &

L3

Router

ESC ESF ESTACE ExperionServer

ESVT SafetyManager

TerminalServer

Qualified Cisco Switches

Optional HSRPRouter

Domain Controller

ESF EASPHDServer

ExperionServer

3RD Party App SubsystemInterface

Level 3

Level 3.5 DMZ Server MgmtServer

VirusServer

eServerShadowServer

Level 2

Domain Controller

L2 to L2

L3 to L3

Lim

ite

d L

2 to

L

3

Limited L3.5 to L3.5

Ver

y L

imit

ed L

3 to

L3.

5V

ery

Lim

ited

L2

to L

3.5 N

o D

ire

ct

co

mm

un

ica

tio

ns

o

r L

2w

ee

n L

1

& L

3

49 HONEYWELL - CONFIDENTIAL File Number

Qualified Cisco SwitchesLevel 2

Level 1

L1 to L1

Lim

ite

d L

2 to

L

1N

o c

om

mu

nic

ati

on

s b

etw

or

L4

Level 2 - Supervisory Control

• Connections for Servers and Operator Stations

• Supervisory control

• Connection to Level 1

• Protection for Level 1 with access lists

50 HONEYWELL - CONFIDENTIAL File Number

• FTE capable

Page 25

Level 3 – Advanced Control

Firewall

Enterprise Switch

l 3 DMZ

Level 4

Terminal Patch AntieServer

PHD Limited

Comm flow

L4 to L4

Ver

y L

imit

ed

L3.

5 to

L4

bet

wee

n L

4 &

L3

Router

ESC ESF ESTACE ExperionServer

ESVT SafetyManager

TerminalServer

Qualified Cisco Switches

Optional HSRPRouter

Domain Controller

ESF EASPHDServer

ExperionServer

3RD Party App SubsystemInterface

Level 3

Level 3.5 DMZ Server MgmtServer

VirusServer

eServerShadowServer

Level 2

Domain Controller

L2 to L2

L3 to L3

Lim

ite

d L

2 to

L

3

Limited L3.5 to L3.5

Ver

y L

imit

ed L

3 to

L3.

5V

ery

Lim

ited

L2

to L

3.5 N

o D

ire

ct

co

mm

un

ica

tio

ns

o

r L

2w

ee

n L

1

& L

3

51 HONEYWELL - CONFIDENTIAL File Number

Qualified Cisco SwitchesLevel 2

Level 1

L1 to L1

Lim

ite

d L

2 to

L

1N

o c

om

mu

nic

ati

on

s b

etw

or

L4

Level 3 - Advanced Control

• Connections for Historians and Advanced Control

• Routingg

• Access List control

• Connect other Level 2 areas or units

52 HONEYWELL - CONFIDENTIAL File Number

• Can be redundant, but not FTE capable

• HSRP

Page 26

Level 3.5 – Demilitarized Zone (DMZ)

Firewall

Enterprise Switch

l 3 DMZ

Level 4

Terminal Patch AntieServer

PHD Limited

Comm flow

L4 to L4

Ver

y L

imit

ed

L3.

5 to

L4

bet

wee

n L

4 &

L3

Router

ESC ESF ESTACE ExperionServer

ESVT SafetyManager

TerminalServer

Qualified Cisco Switches

Optional HSRPRouter

Domain Controller

ESF EASPHDServer

ExperionServer

3RD Party App SubsystemInterface

Level 3

Level 3.5 DMZ Server MgmtServer

VirusServer

eServerShadowServer

Level 2

Domain Controller

L2 to L2

L3 to L3

Lim

ite

d L

2 to

L

3

Limited L3.5 to L3.5

Ver

y L

imit

ed L

3 to

L3.

5V

ery

Lim

ited

L2

to L

3.5 N

o D

ire

ct

co

mm

un

ica

tio

ns

o

r L

2w

ee

n L

1

& L

3

53 HONEYWELL - CONFIDENTIAL File Number

Qualified Cisco SwitchesLevel 2

Level 1

L1 to L1

Lim

ite

d L

2 to

L

1N

o c

om

mu

nic

ati

on

s b

etw

or

L4

Level 3.5 - Demilitarized Zone (DMZ)

• Is commonly called the DMZ

• Typical nodes WSUS, Anti-Virus Server, etc.

• Provides connectivity for devices that are to be accessed from the Business Network and the PCN.

• Security zone between the PCN and outside networks

54 HONEYWELL - CONFIDENTIAL File Number

• Can be redundant, but not FTE capable

Page 27

Level 4 - Business Network

Firewall

Enterprise Switch

l 3 DMZ

Level 4

Terminal Patch AntieServer

PHD Limited

Comm flow

L4 to L4

Ver

y L

imit

ed

L3.

5 to

L4

bet

wee

n L

4 &

L3

Router

ESC ESF ESTACE ExperionServer

ESVT SafetyManager

TerminalServer

Qualified Cisco Switches

Optional HSRPRouter

Domain Controller

ESF EASPHDServer

ExperionServer

3RD Party App SubsystemInterface

Level 3

Level 3.5 DMZ Server Mgmt

ServerVirusServer

eServerShadowServer

Level 2

Domain Controller

L2 to L2

L3 to L3

Lim

ite

d L

2 to

L

3

Limited L3.5 to L3.5

Ver

y L

imit

ed L

3 to

L3.

5V

ery

Lim

ited

L2

to L

3.5 N

o D

ire

ct

co

mm

un

ica

tio

ns

o

r L

2w

ee

n L

1

& L

3

55 HONEYWELL - CONFIDENTIAL File Number

Qualified Cisco SwitchesLevel 2

Level 1

L1 to L1

Lim

ite

d L

2 to

L

1N

o c

om

mu

nic

ati

on

s b

etw

or

L4

Level 4 – Business Network

• Is the business network with clients for Historians or Advanced Control applications.

• Untrusted Network

• Separated by a firewall

• No direct connection to Level 3 or below

• Managed by Business IT department

Level 4 utilizes standard open systems LAN

56 HONEYWELL - CONFIDENTIAL File Number

• Level 4 utilizes standard open systems LAN technology.

Page 28

Questions?

57 HONEYWELL - CONFIDENTIAL File Number

Thank You

58 HONEYWELL - CONFIDENTIAL File Number


Recommended