Systems and methods are disclosed for distributed control of a plant process.
Distributed control systems (DCS) are used, for example, as the control mechanism of a manufacturing system or process, or any other type of dynamic system or process. In a DCS, multiple controllers are distributed throughout the system. Component sub-systems located throughout the system can be under the control of one or more of the controllers. The entire system may be networked for communication and monitoring.
Distributed control systems are used in industrial, electrical, computer and civil engineering applications to monitor and control distributed equipment with or without remote human intervention.
A DCS can use computers, or black boxes, as controllers and use both proprietary interconnections and protocols for communication. Prior to installation, the computers are configured with proprietary information by a vendor or other administrator. Reconfiguration of the DCS can involve removing selected computers so that they can be reprogrammed or reconfigured based on new system requirements. Input and output modules form component parts, and the processor (which is a part of the controller) receives information from input modules and sends information to output modules. The input modules can receive information from instruments associated with a system or process, and the output modules can transmit instructions and data to the instruments associated with a system or process. This can include direct connections to physical equipment such as switches, pumps, and valves, or indirect connections via a secondary system such as a Supervisory Control And Data Acquisition (SCADA) system.
A SCADA system is a large-scale, distributed measurement (and control) system used, for example, to monitor or control chemical or transport processes, in municipal water supply systems, or to control electric power generation, transmission and distribution, gas and oil pipelines, and other distributed processes. A SCADA system can include input-output signal hardware, controllers, an interface, network communication, databases, and software.
Exemplary embodiments are directed to a system for distributed control of a plant process. The exemplary system comprises means of monitoring plural plant processes, and means for controlling the plural plant processes. The system also comprises processing means for receiving data from the monitoring means, translating the received data into a common protocol, and sending control signals to the controlling means based on the translated data.
Exemplary embodiments are also directed to a system for distributed control that manages a plant process. The exemplary system comprises a plurality of sensors, wherein each sensor monitors at least one plant process and communicates via a first protocol. The system also comprises a plurality of controllers, wherein each controller is configured to control at least one plant process and communicates via a second protocol. An interface receives data from the sensors, translates the received data into a common protocol, and generates control signals based on the translated data to send to the controllers over a network.
Other objects, advantages and novel features of the present invention will become apparent from the following detailed description of the invention when considered in conjunction with the accompanying drawings.
In the following, exemplary embodiments will be described in greater detail in reference to the drawings, wherein:
With exemplary embodiments described herein, an open architecture construct can be employed. The open architecture allows the system 100 to be implemented by mixing and matching various equipment and components regardless of the manufacturer, communication protocol, or platform of the selected component.
As shown in exemplary
The control system 102 can include a plurality of control platforms CP1-CPn where each control platform CP1-CPn can be associated with a different plant system or plant variable. Each control platform can be configured to communicate over a protocol that is unique to that control platform. The control platforms can be implemented through devices including, but not limited to, a programmable logic controller (PLC), a personal computer (PC)-based controller, a smart sensor, or any other suitable device as desired. The interface 103 provides means for each control platform CP1-CPn to communicate with another control platform CP2-CPZ, by translating the respective protocol of each control platform communicates into a common protocol.
The interface 103 can be implemented as a processor and configured to generate control signals for sending to the control platforms CP1-CPn of the control system 102. The interface 103 can be used as a platform to deploy real-time control applications. The interface 103 can also be configured to generate visual, audio, text, phone, and email messages upon the occurrence of predetermined system events (e.g., system failure, abnormal temperature or pressure, component failure, etc.). The interface 103 can be configured to generate reports, graphs, charts, trends, or perform any other statistical analysis on the data acquired from the control platforms CP1-CPn as desired.
The interface 103 can be configured as a local interface 105 and/or a remote interface 106. The local interface 105 can be configured so that an operator can monitor and control various plant systems and processes from any desired location (including, but not limited to, a location within the confines of the plant facility). The remote interface 106 can be configured so that an operator can remotely monitor and control selected plant systems and processes over a network. The local and remote interfaces 105, 106 can be configured to include all of the functional and processing capabilities of the interface 103.
The interface 103 can be configured to include drivers for interpreting the data received over the different protocols by translating the data into a common protocol. The interface 103 can provide the translated data both locally and remotely to the operators and administrators over the communication network 104. The drivers can be implemented in Object Linking and Embedding for Process Control (OPC) structure which so that the received data can be translated into a standard-based OPC format such that the interface 103 operates as an OPC server. One of ordinary skill will appreciate that implementation of the interface 103 and drivers is not limited to an OPC architecture, and that implementation can be achieved through any architecture suitable for achieving the desired results.
The communication network 104 can be implemented through any one of a number of communication protocols that is compatible with a respective control platform CP1-CPn. For example, the communication protocols can include Modbus, Profibus, CANbus, Ethernet, Ethernet/IP, or any other suitable protocol as desired. Each communication protocol can support an Object Linking and Embedding for Process Control (OPC) structure.
The lower network 203 includes means, such as a non-routable switch 204, for communicating data and signals between the various plant systems and the local and remote interfaces 105, 106, respectively. The non-routable switch 204 is connected to communicate with the control system 102 over any of the control platforms CP1-CPn associated with the various plant systems and processes. The non-routable switch 204 provides the data acquired from the control system 102 to the remote interface 106 over a secure wide area network. The non-routable switch 204 can be securely connected to the remote interface 106 using various components such as a DSL modem 208 and router/firewall 210, or any other suitable devices or software as desired.
The upper network 205 includes means, such as a routable switch 212, for communicating the data between the control system 102 and the local interface 105. The routable switch 212 communicates with the control system 102 through the router/firewall 210 and non-routable switch 204. The routable switch 212 can be connected to communicate with workstations 214 and a video system 216. The upper network 205 can also include a plurality of operator consoles 218 for displaying the local interface 103. The operator consoles 218 can be connected to receive data from the workstations 214 and video system 216 via a keyboard-video-mouse (KVM) switch 220. The upper network 205 can be configured such that any of the workstations 214 and the video system 216 can be controlled from any of the operator consoles 218.
The control system 102 can include means, such as a safety instrumentation system (SIS) control platform 302, for providing centralized monitoring and control of the various plant systems and processes. The SIS platform 302 can be connected to communicate with the interface 103 through Ethernet or other suitable communication standard as desired. The SIS platform can include a plurality of drivers for
The control system 102 can also include means, such as a compressor storage dispenser (CSD) platform 304, for controlling the dispensing of fuel to a vehicle. The CSD platform 304 can be implemented through any known fuel dispensing devices or systems.
For example, in an exemplary embodiment, the CSD platform 304 can be configured to communicate data both internally and externally over a controller area network (CAN) protocol such as CsCAN. Internal communications of the CSD platform 304 can involve controllers, displays, processors, or other suitable devices as desired. The CSD platform 304 can communicate externally with the interface 103. The SIS platform 302 can be connected to monitor the various system parameters, operating parameters, or other parameters or data of the CSD platform 304, as desired. This connection can be implemented through any of a number of analog transmission standards such as, 4-20 mA, 0-10 VDC, or other transmission standard as desired.
The SIS platform 302 can also be connected to monitor the status of the CSD platform 304 through a dry contact. The dry contact connection can be implemented through a 2-way communication channel that enables on/off control of the CSD platform 304.
The control system 102 can also include means, such as a purified hydrogen generator (PHG) platform 306, for generating purified hydrogen (H2). The PHG platform 306 can include any number of analyzers that monitor the concentration of gases during the H2 purification process, such as a carbon monoxide (CO) analyzer 308, for example.
The PHG platform 306 can be connected to communicate with the interface 103 using a protocol, such as Ethernet. The CO analyzer 308 can also be configured separately to communicate with the interface 103 using a protocol such as Profibus, or any other suitable communication standard as desired. The CO analyzer 308 communicates with the interface 103 through a gateway device 310. The gateway device 310 can be configured to convert the data transmitted by the CO analyzer 308 over the Profibus protocol into another communication protocol, such as Ethernet, so that the data can be processed at the interface 103.
The SIS platform 302 can be connected to monitor various system components and processes of the PHG platform 306 through an analog transmission standard such as 4-20 mA and 0-10 VDC as desired. Furthermore, the SIS platform 302 can be connected to monitor and control the operational status of the PHG platform 306 through a dry contact, or other suitable standard as desired.
The control system 102 can include a plurality of gas sensors 312 and a plurality of flame sensors 314. The gas sensors 312 can be configured to detect gases that have escaped from any of the various plant systems. The flame sensors 314 can detect the presence of a fire in or around any of the plant systems or processes. The gas sensors 312 and the flame sensors 314 can be placed in various locations throughout the plant, as desired, to provide the necessary safeguards.
The gas sensors 312 and the flame sensors 314 can be configured to generate data according to any of a number of communication protocols, such as RS485 or Modbus, and can be connected to communicate with the interface 103 through a MOXA Device Server 316. The MOXA Server 316 can be configured to convert the data received over the Modbus protocol into data suitable for transmission over any of a number of other communication protocols, such as Ethernet. The SIS platform 302 can be connected to monitor the status of the gas sensors 312 and the flame sensors 314 through an analog communication standard, such as 4-20 mA, 0-10 VDC, or any other suitable standard as desired.
The control system 102 can also include means, such as a deionized water (DI) platform 318, for neutralizing tap water used by any of the various plant systems or processes. The DI platform 318 can be connected to communicate status information and receive control signals from the interface 103 over a 2-way serial bus. The SIS platform 302 can be connected to monitor various operational and process parameters of the DI platform 318, such as water acidity, through a dry contact.
The control system 102 can include means, such as a fire alarm control panel (FACP) 320, for generating fire alarm signals. The FACP 320 is connected to receive fire detection signals from any one of the flame sensors 314 through a dry contact. The FACP 320 is connected to communicate with the interface 103 through a communication standard such as RS232, or any other suitable standard as desired. When a fire alarm is manually triggered or any of the flame sensors 314 detect a fire, the FACP 320 can send notification to a local fire department over an existing phone line, wirelessly, or through any suitable communication medium as desired. The SIS platform 302 can be connected to control the on/off status of the FACP 320 through a dry contact.
The control system 102 can include means, such as a natural gas (NG) compressor 322, for compressing natural gas to produce hydrogen (H2). The SIS platform 302 can be connected to control the operational status (on/off) of the NG compressor 322 through a dry contact, for example, or any other suitable connection as desired.
The control system 102 can also include means, such as an intrusion alarm platform 324, for monitoring each entry point (e.g., doors) to a plant facility housing an associated control system or process. The SIS platform 302 can be connected to monitor and control the intrusion alarm platform 324 through a dry contact, for example, or any other suitable connection as desired.
The control system 102 can also include means, such as a fueling facility platform 326, for fueling hydrogen vehicles. The fueling facility platform 326 can be connected to receive inputs from a number of components and systems related to the fueling facility such as vent stacks that direct gases away from the facility, emergency stop buttons (E-stops) aborting power to the facility in the event of an emergency, flame sensors that detect flames, lower explosion limit (LEL) sensors that detect flammable gases, instrument air presses, and/or any other suitable systems or components as desired. The fueling facility platform 326 can be configured to display the status of various components or processes associated with fueling a vehicle through means such as panel lights or other suitable display devices as desired. The SIS platform 302 can be connected to monitor the various components and processes of the fueling facility platform 326 through an analog communication standard, such as 4-20 mA or 0-10 VDC, or any other suitable communication standard as desired.
The control and communication system 300 of the SCADA system 200 can include means, such as the video system 328 (also see
The control and communication system 300 can also include means, such as power meters 334, for monitoring power consumption of various plant systems and processes. The power meters 334 can be configured to generate data according to an RS485 or Modbus communication standard. The power meters 334 can be connected to provide data on its output to MOXA Device Server 316, which converts the data received from the power meters 334 into data suitable for Ethernet communication, for example. The interface 103 can be connected to receive data from the MOXA device server 316 over the Ethernet connection.
The interface 103 can be configured to include a local interface 105 and remote interface 106, which can be implemented through the nonroutable switch 204 and routable switch 206, respectively. The non-routable and routable switches 204, 206 can be configured for sending the received data to operators and other authorized users over the lower network 203 and upper network 205, respectively. For example, as shown in
As shown in
The foregoing disclosure has been set forth merely to illustrate the invention and is not intended to be limiting. Since modifications of the disclosed embodiments incorporating the spirit and substance of the invention may occur to persons skilled in the art, the invention should be construed to include everything within the scope of the appended claims and equivalents thereof.
This application is a continuation of U.S. patent application Ser. No. 11/834,539, filed Aug. 6, 2007, the entire disclosure of which is herein expressly incorporated by reference.
Number | Date | Country | |
---|---|---|---|
Parent | 11834539 | Aug 2007 | US |
Child | 12048737 | US |