Ethernet for industrial communications is growing rapidly in factory automation, process control and SCADA systems. The ODVA EtherNet/IP network standard is gaining popularity as a preferred industrial protocol. Plant engineers are recognizing the significant advantages that Ethernet-enabled devices provide such as ease of connectivity, high performance and cost savings. While EtherNet/IP has many advantages, cable installation is often expensive, and communications to remote sites or moving platforms may not be reliable or cost-effective.
Wireless Ethernet technologies have emerged that can now reliably reduce network costs while improving plant production. However, applying these technologies is not a simple matter as industrial Ethernet systems vary greatly in terms of bandwidth requirements, response times and data transmission characteristics. This paper will explore applying wireless technologies to EtherNet/IP based networks for industrial automation systems.09/03/2009
The Control article "Six Sigma Alarm Management" highlights an end user's experience applying Six Sigma practices to their alarm management effort. This white paper by TiPS explores why Six Sigma is such a good companion for an alarm management program and outlines various ways Six Sigma can be incorporated into the alarm management workflow.06/12/2006
This paper describes an end-user project at Arla Foods with the use of the B2MML schemas as a corporate standard for communication between business systems and ES systems. This presentation presents the real-life experiences using the B2MML schemas. The focus is on the Schedule and Performance schemas. A short introduction on the general use of S88 and S95 within Arla Foods is also included.06/23/2008
Automating manufacturing using S88 concepts across all of the operational manufacturing boundaries has become the standard way of doing business. The current states of the technologies used in these automations require individuals with unique capabilities, or success is not always certain. Each operational area has its own unique needs, and not only requires a high minimum capability in that area, but the ability to coordinate across areas as well. This paper will address what it takes to identify levels of capability, and the benefits of taking advantage of this capability. What to look for in evaluating an organizations capability in delivering automation will also be discussed, as well as the results of not knowing your automation suppliers real capabilities.06/23/2008
Power-over-Ethernet is fast becoming the best solution for powering industrial networks. This paper describes the benefits of using PoE for control applications on the factory floor, including utilization of an RPS, time and cost savings, ease of implementation, versatility of plant design, and safety advantages.06/14/2006
The National Institute of Standards and Technology (NIST) has established an Industrial Control System Security Project to improve the security of public and private sector Industrial Control Systems (ICSs).11/10/2006
Although multivariable control is now a wellestablished technology, new applications are still being found on which to apply it.In this paper, details will be presented on how Honeywells Profit Controller was found to be particularly applicable to the offshore production process.12/15/2009
The application of Model Predictive Control (MPC) is often considered for multi-variable continuous processes. However, the benefit of applying MPC to a batch process can often be just as significant as a continuous process. In this presentation we will show how MPC is being applied in a pharmaceutical manufacturing facility for the control of one cut of a batch distillation column. The primary benefit of using MPC is to reduce batch cycle time. The performance that can be achieve with MPC vs. traditional techniques for this application will be examined.06/23/2008
Human operators are a key part of any process control system. As such, they constitute part of a complex, causal chain of overall system processing. Human machine interfaces (HMIs) form a key link in that chain by bridging the physical world where processes reside with the perceptual reconstruction and representation of those processes in the heads of human operators and supervisors.
If an HMI design gives rise to a flawed or inaccurate representation of a process, then error and suboptimal task performance may result. HMIs have become increasingly important links in this chain for two reasons. First, the arrival of distributed control systems (DCS) in the 1970s distanced operators from the physical entities they controlled, requiring all interaction be mediated by HMIs. Second, the ongoing introduction of complex automation into process control is increasingly changing human operators into supervisors. Supervision has complex decision-making requirements that must all be conveyed via HMIs.
Download this entire white paper to learn more.10/09/2012
This paper explores some of the Buncefield recommendations along with the applicable safety standards and translates those into tangible solutions that can be applied to prevent accidents such as the massive explosion at the Buncefield oil storage and transfer depot in Hemel Hempstead, United Kingdom.08/18/2010
The Control article "Six Sigma Alarm Management" highlights an end user's experience applying Six Sigma practices to his alarm management effort. This white paper by TiPS, explores why Six Sigma is such a good companion for an alarm management program and outlines various ways Six Sigma can be incorporated into the alarm management workflow.03/21/2008
This white paper explains why application whitelisting is being rapidly adopted as a security and control solution for SCADA systems. In three major sections, the paper: 1) Provides a detailed perspective on how application whitelisting technology works. 2) Discusses the use and benefits of whitelisting technologies in SCADA and Energy environments. 3) Explains how the technology is adapting to function in environments where controlled software changes are needed.12/21/2009
A recipe control of a continuous distillation plant was a challenge in its design, simulation, validation and successful exploitation. The plant was used for solvent recovery in an Active Pharmaceutical Ingredients Production Facility (API). Following S88 models, which were used as tools in structuring a specific process cell, which had several trains with batch operating units, it was decided to apply and extend the same approach on the continuous processes as well.06/23/2008
Effective Feb. 2, 2010, the PHMSA rule: 49 CFR Parts 192, 195 Pipeline Safety: Control Room Management/Human Factors imposes control room management requirements for all regulated gas and hazardous liquid pipelines. This paper gives an overview of requirements and time line to comply. Learn more.05/04/2010
The purpose of this paper is to review the standards of IEC 61511 and API RP 556 as they apply to flue gas analyzers and the implementation of SIS system for combustion monitoring.03/19/2014
Continuous level measurement is about one thing, e.g. answering the question "how much stuff do I have". There are many applications where you need to know how much material is in a bin, silo or other vessel type. Usually the desired engineering unit is expressed in terms of volume or weight. "Measuring" volume or weight is not always the most practical approach, sometimes it isn't even viable. Take those silos you have, how do you weigh the ingredients if the silos weren't installed with load systems? Not an easy or inexpensive question to answer. So what do we do? This is where continuous level measurement sensors and systems come into play and offer a viable and cost effective approach.
The purpose of this white paper is to discuss and inform about the application considerations when you need to measure the level of material continuously or simply determine on a continuous basis how much stuff you have in your vessels.07/20/2010
The purpose of this paper is to trace the history of the development of process control, advanced process control and related applied engineering technologies, and to discuss the reasons why the industry has encountered difficulties. This paper also presents some recommendations to improve the likelihood of successful APC project implementation, and make some predictions about the future direction of the technology.03/26/2009
This paper focuses on the resource that is of greatest concern to most organizations personnel.02/11/2008
Analysis of the ICONICS GENESIS Security Vulnerabilities for Industrial Control System Professionals
A number of previously unknown security vulnerabilities in the ICONICS GENESIS32 and GENESIS64 products have been publically disclosed. The release of these vulnerabilities included proof-of-concept (PoC) exploit code.
While we are currently unaware of any malware or cyber attacks taking advantage of these security issues, there is a risk that criminals or political groups may attempt to exploit them for either financial or ideological gain.
The products affected, namely GENESIS32 and GENESIS 64 are OPC Web-based human-machine interface (HMI) / Supervisory Control and Data Acquisition (SCADA) systems. They are widely used in critical control applications including oil and gas pipelines, military building management systems, airport terminal systems, and power generation plants.
Of concern to the SCADA and industrial control systems (ICS) community is the fact that, though these vulnerabilities may initially appear to be trivial, a more experienced attacker could exploit them to gain initial system access and then inject additional payloads and/or potentially malicious code. At a minimum, all these vulnerabilities can be used to forcefully crash system servers, causing a denial-of-service condition. What makes these vulnerabilities difficult to detect and prevent is that they expose the core communication application within the GENESIS platform used to manage and transmit messages between various clients and services.
This White Paper summarizes the current known facts about these vulnerabilities. It also provides guidance regarding a number of possible mitigations and compensating controls that operators of SCADA and ICS systems can take to protect critical operations.
Learn more about Tofino at www.tofinosecurity.com/blog03/31/2011