data acquistion for monitoring and reporting using e

30

Upload: mohammed-abdul-jabbar

Post on 11-Apr-2016

238 views

Category:

Documents


2 download

DESCRIPTION

Data Acquistion for Monitoring and Reporting Using Data Acquistion for Monitoring and Reporting Using eData Acquistion for Monitoring and Reporting Using e

TRANSCRIPT

Page 1: Data Acquistion for Monitoring and Reporting Using e
Page 2: Data Acquistion for Monitoring and Reporting Using e
Page 3: Data Acquistion for Monitoring and Reporting Using e

DATA ACQUISITION FOR MONITORING AND REPORTING USING E-SCADA

BACHELOR OF ENGINEERING

IN

ELECTRONICS AND INSTRUMENTATION ENGINEERING

BY

ZAFAR JALEEL (1604-09-739-301)

SYED SALMAN HUSSAIN (1604-09-739-303)

RASHED MOHSIN (1604-09-739-304)

Under the guidance of

DEPARTMENT OF ELECTRICAL ENGINEERING

MUFFAKHAM JAH COLLEGE OF ENGINEERING AND TECHNOLOGY

(Affiliated to Osmania University)

Banjara Hills,Hyderabad

Page 4: Data Acquistion for Monitoring and Reporting Using e

ACKNOWLEDGEMENT

The satisfaction and contentment that accompanies the completion of any important task can’t be put into words very easily. Our project would have never materialized if not for constant and consistent guidance and encouragement of several people who helped us at numerous instances.

Firstly, we express sincere thanks to professor ,Head of Department, EED, MJCET who has been the guiding and motivating force for all his students. if not for his persistent motivation and pursuit for improvement, our project would not have been as good as it is now.

We are also heavily indebted to , Assistant Professor, EED, MJCET without whose guidance it would have been impossible to complete the project. He has guided us at almost every instance of the project and has always shown great interest and concern in our ideas.

We would also like to thanks all the lectures at EED, MJCET who have taught us during the course of our engineering.

Lastly, we would like to thank our family and friends without whose constant support, patience and encouragement, our project would have never been accomplished. We extend thanks to our parents who have been understanding and cooperative throughout.

Page 5: Data Acquistion for Monitoring and Reporting Using e

MUFFAKHAM JAH COLLEGE OF ENGINEERING AND TECHNOLOGY

(Affiliated to Osmania University)

Banjara Hills, Hyderabad

DEPARTMENT OF ELECTRICAL ENGINEERING

CERTIFICATEThis is to certify that the project work entitled “DATA ACQUISITION FOR MONITORING AND REPORTING USING E- SCADA” has been bonafide project of SYED SALMAN HUSSAIN bearing pin 1604-09-739-303 under my supervision and my guidance and submitted in partial fulfillment of the requirement for the award of degree in ELECTRONIC AND INSTRUMENTATION ENGINEERING by OSMANIA UNIVERSITY ,HYDERABAD during the academic year 2010-2013 in the Department of Electrical Engineering.

(internal guide) (Head of Department , EED)

Page 6: Data Acquistion for Monitoring and Reporting Using e

(External Examiner) (Principal)

CONTENTS

1. ACKNOWLEDGEMENT2. ABSTRACT

Page 7: Data Acquistion for Monitoring and Reporting Using e

INTRODUCTION

SCADA (supervisory control and data acquisition) is a type of industrial control system (ICS). Industrial control systems are computer controlled systems that monitor and control industrial processes that exist in the physical world. SCADA systems historically distinguish themselves from other ICS systems by being large scale processes that can include multiple sites, and large distances.[1] These processes include industrial, infrastructure, and facility-based processes, as described below:

Industrial processes include those of manufacturing, production, power generation, fabrication, and refining, and may run in continuous, batch, repetitive, or discrete modes.

Infrastructure processes may be public or private, and include water treatment and distribution, wastewater collection and treatment, oil and gas pipelines, electrical power transmission anddistribution, wind farms, civil defense siren systems, and large communication systems.

Facility processes occur both in public facilities and private ones, including buildings, airports, ships, and space stations. They monitor and control heating, ventilation, and air conditioningsystems (HVAC), access, and energy consumption.

vMSCADA is a remote monitoring and control system that provides you with the tools necessary to build and view customized interfaces, through which you can interact with your field operations. This system is part of the vMonitor TOTALACCESS application suite and offers complete visual customization of your products as well as alarm notifications and writeback control options.vMSCADA consists of two basic components:

• vMSCADA Builder. The development environment for creating customized graphical interfaces.

• vMSCADA Viewer. The run-time environment for running these interfaces, through which you can monitor and control your field devices in real-time.

After you design the look-and-feel of the interfaces using Vmscada Builder, you can attach the devices and tags you created using vMConfig to your interface components. At run-time, you can view and manipulate the values returned from remote devices in the field through vMSCADA Viewer.

Using vMConfig, you can define alarms and corresponding actions, which are then displayed in vMSCADA Viewer. You can monitor these alarms as they

Page 8: Data Acquistion for Monitoring and Reporting Using e

occur and even acknowledge them directly through the vMSCADA Viewer interface. You can also handle the alarm-triggering events by sending new values back to the field devices whose tag values are producing these alarms.

Adding Analog Tags

TO ADD A NEW ANALOG TAG:1. Click Tag on the button bar.2. Click the Tags icon.

All existing tags are displayed in the tree pane and content pane. If there are no existing tags, the list is empty.

3. In the tree pane, click the Analog Tags node.4. Right-click the Analog Tags node, and click New Analog Tag on the context menu.

The Analog Tag window is displayed in the content pane

Page 9: Data Acquistion for Monitoring and Reporting Using e

5. Enter values for the following Tag Information fields:5a Name. The user-defined tag name.5b Description. The tag description.5c Display Name. The tag display name. The display name is used when the tag is displayed in the HMI screen.5d Conversion. The pre-defined conversion used to convert the raw count into a meaningful scaled value. Click the pick list button to see a list of available conversions.

6. Click the Properties tab.

The Tag window is displayed in the content pane

Page 10: Data Acquistion for Monitoring and Reporting Using e

8 CHANNEL ANALOG INPUT MODULE

Page 11: Data Acquistion for Monitoring and Reporting Using e

The ADAM-4017+ is a 16-bit, 8-channel analog input module that provides programmable input ranges on all channels. This module is an extremely cost-effective solution for industrial measurement and monitoring applications. Its opto-isolated inputs provide 3000 VDC of isolation between the analog input and the module, and protect the module and peripherals from damaging due to high input-line voltages.

The ADAM-4017+ offers signal conditioning, A/D conversion, ranging and RS-485 digital communication functions. The module protects your equipment from power surges at the ground terminal by providing opto-isolation of A/D input and up to 3000 VDC transformer based isolation.

The ADAM-4017+ uses a 16-bit microprocessor-controlled sigma-delta A/D converter to convert sensor voltage or current into digital data. The digital data are then translated into engineering units. When prompted by the host computer, the module sends the data to the host through a standard RS-485 interface.

Input Range ±150mV, ±500mV, ±1v, ±5v, ±10v, ±20mA,4~20mA

Isolation voltage 3000 VDC

Accuracy ± 0.1 % or better

Maximum distance 4000 ft (1.2km)

RS - 485 to RS - 232 ISOLATED CONVERTER

Page 12: Data Acquistion for Monitoring and Reporting Using e

ADAM-4520 is an intelligent RS-485 to RS-232 converter specifically designed to connect RS-232 devices to an RS-485 network with other RS-485 devices. RS-232 is the most common transmission standard. Although widely available on most computer systems, measurement equipment, PLCs, and industrial devices, its transmission speed, communication distance, and especially networking capability are limited due to unbalanced transmission. The ADAM-4520 addressable converter solves this problem and lets you easily build up an RS-485 network with your RS-232 devices by assigning each one an address for easier communication.

Page 13: Data Acquistion for Monitoring and Reporting Using e

ETHERNET Ethernet is a family of computer networking technologies for local area networks (LANs). Ethernet was commercially introduced in 1980 and standardized in 1985 as IEEE 802.3. Ethernet has largely replaced competing wired LAN technologies.

The Ethernet standards comprise several wiring and signaling variants of the OSI physical layer in use with Ethernet. The original 10BASE5 Ethernet used coaxial cable as a shared medium. Later the coaxial cables were replaced by twisted pair and fiber optic links in conjunction with hubs or switches. Data rates were periodically increased from the original 10 megabits per second to 100 gigabits per second

Systems communicating over Ethernet divide a stream of data into shorter pieces called frames. Each frame contains source and destination addresses and error-checking data so that damaged data can be detected and re-transmitted. As per the OSI model Ethernet provides services up to and including the data link layer.

Since its commercial release, Ethernet has retained a good degree of compatibility. Features such as the 48-bit MAC address and Ethernet frame format have influenced other networking protocols.

Ethernet evolutionEthernet evolved to include higher bandwidth, improved media access control methods, and different physical media. The coaxial cable was replaced with point-to-point links connected by Ethernet repeaters or switches to reduce installation costs, increase reliability, and improve management and d

Ethernet stations communicate by sending each other data packets: blocks of data individually sent and delivered. As with other IEEE 802 LANs, each Ethernet station is given a 48-bit MAC address. The MAC addresses are used to specify both the destination and the source of each data packet. Ethernet establishes link level connections, which can be defined using both the destination and source addresses. On reception of a transmission, the receiver uses the destination address to determine whether the transmission is relevant to the station or should be ignored. Network interfaces normally do not accept packets addressed to other Ethernet stations. Adapters come programmed with a globally unique address.[note 2] An Ethertype field in each frame is used by the operating system on the receiving station to select the appropriate protocol module (i.e. the Internet protocol module). Ethernet frames are said to be self-identifying, because of the frame type. Self-identifying frames make it possible to intermix multiple protocols on the same physical network and allow a single computer to use multiple protocols together.[18] Despite the evolution of Ethernet technology, all generations of Ethernet (excluding early experimental versions) use the same frame formats[19] (and hence the same interface for higher layers), and can be readily interconnected through bridging.

Due to the ubiquity of Ethernet, the ever-decreasing cost of the hardware needed to support it, and the reduced panel space needed by twisted pair Ethernet, most manufacturers now build Ethernet interfaces directly into PC motherboards, eliminating the need for installation of a separate network card

Page 14: Data Acquistion for Monitoring and Reporting Using e

ETHERNET AS SHARED MEDIA

Ethernet was originally based on the idea of computers communicating over a shared coaxial cable acting as a broadcast transmission medium. The methods used were similar to those used in radio systems,[note 3] with the common cable providing the communication channel likened to theLuminiferous aether in 19th century physics, and it was from this reference that the name "Ethernet" was derived.[21]

Original Ethernet's shared coaxial cable (the shared medium) traversed a building or campus to every attached machine. A scheme known as carrier sense multiple access with collision detection (CSMA/CD) governed the way the computers shared the channel. This scheme was simpler than the competing token ring or token bus technologies.[note 4] Computers were connected to an Attachment Unit Interface (AUI) transceiver, which was in turn connected to the cable (later with thin Ethernet the transceiver was integrated into the network adapter). While a simple passive wire was highly reliable for small networks, it was not reliable for large extended networks, where damage to the wire in a single place, or a single bad connector, could make the whole Ethernet segment unusable.[note 5]

Through the first half of the 1980s, Ethernet's 10BASE5 implementation used a coaxial cable 0.375 inches (9.5 mm) in diameter, later called "thick Ethernet" or "thicknet". Its successor, 10BASE2, called "thin Ethernet" or "thinnet", used a cable similar to cable television cable of the era. The emphasis was on making installation of the cable easier and less costly.

Since all communications happen on the same wire, any information sent by one computer is received by all, even if that information is intended for just one destination.[note 6] The network interface card interrupts the CPU only when applicable packets are received: The card ignores information not addressed to it.[note 7] Use of a single cable also means that the bandwidth is shared, such that, for example, available bandwidth to each device is halved when two stations are simultaneously active.

Collisions corrupt transmitted data and require stations to retransmit. The lost data and retransmissions reduce throughput. In the worst case where multiple active hosts connected with maximum allowed cable length attempt to transmit many short frames, excessive collisions can reduce throughput dramatically. However, a Xerox report in 1980 studied performance of an existing Ethernet installation under both normal and artificially generated heavy load. The report claims that 98% throughput on the LAN was observed.[22] This is in contrast with token

Page 15: Data Acquistion for Monitoring and Reporting Using e

passing LANs (token ring, token bus), all of which suffer throughput degradation as each new node comes into the LAN, due to token waits. This report was controversial, as modeling showed that collision-based networks theoretically became unstable under loads as low as 37% of nominal capacity. Many early researchers failed to understand these results. Performance on real networks is significantly better.[23]The 10BASE-T standard introduced a collision-free full duplex mode of operation that eliminated collisions. Modern Ethernets are entirely collision-free.

ETHERNET AS BRIDGING AND SWITCHINGFor the above propsed project Ethernet is used as a real time switch and connected to multiple access points so that the media which is to shared via Modbus protocols can be switched to different networks via the routers of the specified platforms of the précised protocols introduced in the working of the project.

While repeaters could isolate some aspects of Ethernet segments, such as cable breakages, they still forwarded all traffic to all Ethernet devices. This created practical limits on how many machines could communicate on an Ethernet network. The entire network was one collision domain, and all hosts had to be able to detect collisions anywhere on the network. This limited the number of repeaters between the farthest nodes. Segments joined by repeaters had to all operate at the same speed, making phased-in upgrades impossible.

To alleviate these problems, bridging was created to communicate at the data link layer while isolating the physical layer. With bridging, only well-formed Ethernet packets are forwarded from one Ethernet segment to another; collisions and packet errors are isolated. Prior to learning of network devices on the different segments, Ethernet bridges (and switches) work somewhat like Ethernet repeaters, passing all traffic between segments. After the bridge learns the addresses associated with each port, it forwards network traffic only to the necessary segments, improving overall performance.Broadcast traffic is still forwarded to all network segments. Bridges also overcame the limits on total segments between two hosts and allowed the mixing of speeds, both of which are critical to deployment of Fast Ethernet.

In 1989, the networking company Kalpana introduced their EtherSwitch, the first Ethernet switch.[note 8] This worked somewhat differently from an Ethernet bridge, where only the header of the incoming packet would be examined before it was either dropped or forwarded to another segment. This greatly reduced the forwarding latency and the processing load on the network device. One drawback of this cut-through switching method was that packets that had been corrupted would still be propagated through the network, so a jabbering station could continue to disrupt the entire network. The eventual remedy for this was a return to the original store and forward approach of bridging, where the packet would be read into a buffer on the switch in its entirety, verified against its checksum and then forwarded, but using more powerful application-specific integrated circuits. Hence, the bridging is then done in hardware, allowing packets to be forwarded at full wire speed.

When a twisted pair or fiber link segment is used and neither end is connected to a repeater, full-duplex Ethernet becomes possible over that segment. In full-duplex mode, both devices can transmit and receive to and from each other at the same time, and there is no collision domain. This doubles the aggregate bandwidth of the link and is sometimes advertised as double the link speed (e.g., 200 Mbit/s).[note 9] The elimination of the collision domain for these connections also means that all the link's bandwidth

Page 16: Data Acquistion for Monitoring and Reporting Using e

can be used by the two devices on that segment and that segment length is not limited by the need for correct collision detection.

Since packets are typically delivered only to the port they are intended for, traffic on a switched Ethernet is less public than on shared-medium Ethernet. Despite this, switched Ethernet should still be regarded as an insecure network technology, because it is easy to subvert switched Ethernet systems by means such as ARP spoofing and MAC flooding.

The bandwidth advantages, the improved isolation of devices from each other, the ability to easily mix different speeds of devices and the elimination of the chaining limits inherent in non-switched Ethernet have made switched Ethernet the dominant network technology.

ETHERNET AS ADVANCED NETWORKINGSimple switched Ethernet networks, while a great improvement over repeater-based Ethernet, suffer from single points of failure, attacks that trick switches or hosts into sending data to a machine even if it is not intended for it, scalability and security issues with regard to broadcast radiation andmulticast traffic, and bandwidth choke points where a lot of traffic is forced down a single link.

Advanced networking features in switches and routers combat these issues through means including spanning-tree protocol to maintain the active links of the network as a tree while allowing physical loops for redundancy, port security and protection features such as MAC lock down and broadcast radiation filtering, virtual LANs to keep different classes of users separate while using the same physical infrastructure, multilayer switching to route between different classes and link aggregation to add bandwidth to overloaded links and to provide some measure of redundancy.

IEEE 802.1aq (shortest path bridging) includes the use of the link-state routing protocol IS-IS to allow larger networks with shortest path routes between devices. In 2012 it was stated by David Allan and Nigel Bragg, in 802.1aq Shortest Path Bridging Design and Evolution: The Architect's Perspective that shortest path bridging is one of the most significant enhancements in Ethernet's history

Page 17: Data Acquistion for Monitoring and Reporting Using e

POWER SUPPLY

For the above proposed project we are using a portable power supply ,the current required for the adam modules to operate s 2.5 amps and the voltage required is 24 vdcThe power supply here is a portable power supply which has a standard of 2.5 A / 24 VDC which is manufactured by traco power , which connects itself with main supply 230 V AC through a miniature circuit breaker which has a fuse which blows itself incase of overload in the circuit , thus by giving a protection edge in the circuit design.

A power supply is a device that supplies electric power to an electrical load. The term is most commonly applied to electric power converters that convert one form of electrical energy to another, though it may also refer to devices that convert another form of energy (mechanical, chemical, solar) to electrical energy. A regulated power supply is one that controls the output voltage or current to a specific value; the controlled value is held nearly constant despite variations in either load current or the voltage supplied by the power supply's energy source.

Every power supply must obtain the energy it supplies to its load, as well as any energy it consumes while performing that task, from an energy source. Depending on its design, a power supply may obtain energy from:

Electrical energy transmission systems. Common examples of this include power supplies that conver t AC line voltage to DC voltage.

Energy storage devices such as batteries and fuel cells. Electromechanical systems such as generators and alternators. Solar power.

A power supply may be implemented as a discrete, stand-alone device or as an integral device that is hardwired to its load. Examples of the latter case include the low voltage DC power supplies that are part of desktop computers and consumer electronics devices.

Commonly specified power supply attributes include:

The amount of voltage and current it can supply to its load. How stable its output voltage or current is under varying line and load conditions. How long it can supply energy without refueling or recharging (applies to power supplies that employ

portable energy sources).

Page 18: Data Acquistion for Monitoring and Reporting Using e

PURPOSE

Time has been a precious jewel in terms of todays automated era when calculated , time nowadays has been a basic builder of reputation of any organization which try to achieve its goals in the matter of specific time where the requirement of the market is satisfied . We have proposed our project , in the intention that time is saved in terms that data is acquired and monitored by the SCADA personnel whose location need not be obligated to the control room only, but as in it is determined irrespective of his location globally, as he can access this by connecting through the internet network, by this the specific personnel can have a means of communication between the industry and produce reports regarding the monitored parameters to the concerned authorities by saving time , which would have been lost if it this project would not have been proposed.

Page 19: Data Acquistion for Monitoring and Reporting Using e

INTRODUCTION

SCADA (supervisory control and data acquisition) is a type of industrial control system (ICS). Industrial control systems are computer controlled systems that monitor and control industrial processes that exist in the physical world. SCADA systems historically distinguish themselves from other ICS systems by being large scale processes that can include multiple sites, and large distances.[1] These processes include industrial, infrastructure, and facility-based processes, as described below:

Industrial processes include those of manufacturing, production, power generation, fabrication, and refining, and may run in continuous, batch, repetitive, or discrete modes.

Infrastructure processes may be public or private, and include water treatment and distribution, wastewater collection and treatment, oil and gas pipelines, electrical power transmission and distribution, wind farms, civil defense siren systems, and large communication systems.

Facility processes occur both in public facilities and private ones, including buildings, airports, ships, and space stations. They monitor and control heating, ventilation, and air conditioning systems (HVAC), access, and energy consumption.

vMSCADA is a remote monitoring and control system that provides you with the tools necessary to build and view customized interfaces, through which you can interact with your field operations. This system is part of the vMonitor TOTALACCESS application suite and offers complete visual customization of your products as well as alarm notifications and writeback control options.vMSCADA consists of two basic components:

• vMSCADA Builder. The development environment for creating customized graphical interfaces.

• vMSCADA Viewer. The run-time environment for running these interfaces, through which you can monitor and control your field devices in real-time.

After you design the look-and-feel of the interfaces using Vmscada Builder, you can attach the devices and tags you created using vMConfig to your interface components. At run-time, you can view and manipulate the values returned from remote devices in the field through vMSCADA Viewer.

Using vMConfig, you can define alarms and corresponding actions, which are then displayed in vMSCADA Viewer. You can monitor these alarms as they

Page 20: Data Acquistion for Monitoring and Reporting Using e

occur and even acknowledge them directly through the vMSCADA Viewer interface. You can also handle the alarm-triggering events by sending new values back to the field devices whose tag values are producing these alarms.

Page 21: Data Acquistion for Monitoring and Reporting Using e
Page 22: Data Acquistion for Monitoring and Reporting Using e

8 CHANNEL ANALOG INPUT MODULE

The ADAM-4017+ is a 16-bit, 8-channel analog input module that provides programmable input ranges on all channels. This module is an extremely cost-effective solution for industrial measurement and monitoring applications. Its opto-isolated inputs provide 3000 VDC of isolation between the analog input and the module, and protect the module and peripherals from damaging due to high input-line voltages.

The ADAM-4017+ offers signal conditioning, A/D conversion, ranging and RS-485 digital communication functions. The module protects your equipment from power surges at the ground terminal by providing opto-isolation of A/D input and up to 3000 VDC transformer based isolation.

The ADAM-4017+ uses a 16-bit microprocessor-controlled sigma-delta A/D converter to convert sensor voltage or current into digital data. The digital data are then translated into engineering units. When prompted by the host computer, the module sends the data to the host through a standard RS-485 interface.

Specification:1. Input Type :mV, V, mA2. Input Range: ±150 mV, ±500 mV, ±1 V, ±5 V, ±10 V, ±20 mA, 4 ~

20 mA3. Isolation Voltage :3000 VDC.4. Sampling Rate :10 sample/sec (total).

Page 23: Data Acquistion for Monitoring and Reporting Using e

5. Accuracy-:±0.1% or better.6. Power Consumption :1.2 W @ 24VDC.

RS - 485 to RS - 232 ISOLATED CONVERTER

ADAM-4520 is an intelligent RS-485 to RS-232 converter specifically designed to connect RS-232 devices to an RS-485 network with other RS-485 devices. RS-232 is the most common transmission standard. Although widely available on most computer systems, measurement equipment, PLCs, and industrial devices, its transmission speed, communication distance, and especially networking capability are limited due to unbalanced transmission. The ADAM-4520 addressable converter solves this problem and lets you easily build up an RS-485 network with your RS-232 devices by assigning each one an address for easier communication.

Specifications:

1. Isolation Voltage: 3000 VDC.2. RS-232 Interface Connector: Female DB-9.3. RS-422/RS-485 Interface Connector: plug-in screw terminal.4. Power Consumption: 1.2 W.5. Baud rate (bps): 1200, 2400, 4800, 9600, 19.2 k, 38.4 k,57.6 k, 115.2 k, RTS control and

RS-422 mode (switchable).

Page 24: Data Acquistion for Monitoring and Reporting Using e

SOFTWARE CONFIGURATION OF 8 CHANNEL ANALOG INPUT MODULE

1. Configure the ADAM-4000 Module with the ADAM-4000 utility.2. Initialize the ADAM-4000 on a RS-485 network .3. With the module powered off, turn the switch in the “Init” position.4. Power up the module5. Wait 10 seconds for the module to initialize.6. Using the ADAM-4000 utility, search (scan) for the module to change the protocol. 7. The utility will identify the module from the search function.8. The ADAM-4000 utility will now permit the serial data protocol to be changed to the Modbus protocol.9. The address and COM port settings can also be changed at this time.10. To access the module, click on the module icon in the utility.11. Update the settings by pressing the “Update” button.12. Power off the module.13. Turn the switch back to NORMAL position. (For the older Adam models, remove the wire between the INIT* and GND terminals).14. The module is now ready to be placed in the Modbus network.

Page 25: Data Acquistion for Monitoring and Reporting Using e