Engineering & Design
Engineering & Design
Engineering & Design
Engineering &
Design
Design
When designing the information architecture, you may wish to start
by defining the software needs including requirements for opera-
tors, controls, execution, and business. For example, you need to
define which Key Performance Indicators (KPI) and plant metrics
will be required. Other factors include electronic record keeping to
meet regulatory requirements. Next, determine information
required from the field to meet these needs, including sampling
and logging rates, etc. Lastly, determine which measurements are
required and how this information is gathered, communicated,
pre-processed, stored, computed, reported, and disseminated.
221
222 Software for Automation
Network Architecture
A very small centralized system needs only a single computer to
handle all functions including OPC servers, operator visualiza-
tion, database engine, etc. A distributed system including more
than one workstation will also need networking. Currently,
TCP/IP on Ethernet is the industry standard. Thanks to the multi-
protocol nature of Ethernet and TCP/IP, the same network is
shared by automation networking protocols and computer
networking protocols. Depending whether the application is
process control, building automation, or discrete manufacturing,
the automation networking protocol may be FOUNDATION™
Fieldbus HSE, Modbus/TCP, EtherNet/IP or another protocol.
The protocols between workstations and servers include OPC and
other data on DCOM, plus printer and file sharing protocols.
Database Sizing
Estimating the database size is not an exact science, but it does not
have to be because storage space is not expensive, so you can
afford to buy extra. Every logger application has a different
scheme for optimizing the rows and records in the database table
to strike a balance of condensing data while at the same time
maintaining fast access speed. Some loggers may use additional
data compression to save disk space.
Servers
In a small system, the same computer can be used for OPC
servers as well as historical, alarm, and event logging, but for
large systems it is a good idea to move the historical, alarm and
event logging to dedicated server machines for best performance.
Refer to database engine and logger application documentation to
determine resources required based on the number of tags and
frequency of logging.
very reliable, since failure will cause costly shutdown and poten-
tial loss of data required for regulatory reporting, resulting in
fines. Make sure to use machines designed for server tasks and
consider using redundant and fault tolerant servers to increase
system availability. Also, consider redundant power supplies,
Uninterruptible Power Supplies (UPS), and hot-swappable and
redundant disk arrays (see Chapter 10).
Workstations
Software applications should be hardware independent, meaning
they should not require a particular brand or model computer in
order to work. The software should run on a mainstream oper-
ating system such as Windows to ensure other applications can
run on the same machine and good support is available. All appli-
cations specify minimum resource requirement in terms of
processor speed and memory requirements but should not narrow
down the options to one particular machine.
Alarms
The alarm system needs to be designed carefully in order to help,
and not hinder, operation. Alarms should make the operator pay
attention and act. It is important to take measures already at
design time to eliminate alarm flooding during a process upset or
fault situation. As a rule of thumb, the alarm system should be
designed to generate no more than 10 alarms the first 10 minutes
after a major upset. This means the system integrator must be
disciplined when defining alarms to eliminate duplicate and other
nuisance alarms. Other basic rules include alarms only on
abnormal and unexpected events – not normal or expected. Do
not generate alarms on the operator’s own actions. Be selective
Chapter 8 – Engineering & Design 227
Test
Software can first be tested separately, but ultimately it should be
integrated with the hardware and be fully tested. Test procedures,
including what constitutes a pass or fail, should be agreed upon
between the user and systems integrator before testing starts.
Typically, testing is done in two steps; first software-only, then
integrated with hardware.
Software Test
Good OPC servers can run in a simulation mode, making it
possible to test much of the system software functionality without
having the automation devices connected. However, values gener-
ated may not be representative of the actual device.
Integrated Test
When the software is networked to the actual automation hard-
ware, it is possible to make a more exhaustive and realistic test of
associated software.
Documentation
Network and computer infrastructure in an automation system
must be well documented just like the sensors, actuators, and
logic. Documentation assists in troubleshooting, engineering for
future expansion, and change. Documentation may also be handy
in a cyber security incident and for system recovery. A site may
need paper copies of documentation handy in case the storage file
server cannot be accessed due to some cyber attack.
Network Documentation
It is a good idea to make a drawing of the computer network in
the automation system and document which user or group will
use each computer and which client applications will connect to
servers. This will make DCOM security configuration easier. The
228 Software for Automation
Computer Documentation
Software comes with a unique set of documentation requirements.
Certainly in automation systems there is a need to document
control strategies as well as cross referencing between device
communication, drivers, and so on. However, these documents are
typically generated automatically by the configuration entry tools,
ready for display and printout. Additionally, carefully document
all DCOM configuration settings for each machine, because the
only way to back up these is to create an image of the hard disk,
which can only be done while all applications are stopped. It may
be a good idea to create a sheet for each computer and application
to tabulate the DCOM settings as well as other aspects. A critical
aspect of documentation is to track versions of all software, as well
as service packs and other updates being made. Configuration
changes made within the operating system and applications, as
well as in registry and INI files, must be documented. Documenta-
tion is necessary to restore a failed computer quickly.
230 Software for Automation
Computer Datasheet
A datasheet similar to the example in Table 8-1 may be helpful for
documentation and version management. For each computer
document setup, tabulate the default DCOM settings and list all
applications installed. This makes it easy to reinstall applications
and restore the computer after a failure.
Application Datasheet
A datasheet similar to the example in Table 8-2 may be helpful for
documentation and version management. Every application and
component may require specific settings for DCOM security. For
each application, document the setup and tabulate any specific
DCOM settings as well as any specific configuration required.
This makes it easy to reinstall applications and restore the
computer after a failure.
Exercises
1. Give example of methods to ensure that non-real-time
communication does not consume all Ethernet bandwidth
when shared with the automation communication.