Latest Posts
Friday, July 28, 2023
Eil Automation
July 28, 2023
The world of Programmable Logic Controllers (PLCs) is vast, and different programming languages cater to various application scenarios and user preferences. Here's a description of the most popular PLC programming languages:
Ladder Logic (LAD):
Ladder Logic is one of the most widely used and iconic programming languages in the PLC world. It derives its name from the ladder-like appearance of its graphical representation. LAD is ideal for applications with discrete logic, such as on/off control, timers, counters, and simple logic operations. Its visual representation makes it easy for engineers and technicians to understand and troubleshoot ladder programs, making it an excellent choice for beginners and industries with legacy systems.
Structured Text (ST):
Structured Text is a high-level textual programming language based on the IEC 61131-3 standard. It resembles modern programming languages like Pascal and C, making it familiar to software developers. ST is particularly suited for complex mathematical calculations, data manipulation, and algorithms. It provides the flexibility to implement advanced control strategies and is preferred in applications requiring complex calculations and custom algorithms.
Function Block Diagram (FBD):
Function Block Diagram is another graphical programming language often used in conjunction with Ladder Logic. It allows users to create function blocks, representing reusable functions with input and output variables. FBD is well-suited for applications that require modular programming, making it easier to design, test, and maintain larger projects. It is also helpful for engineers with a background in electronics or digital logic design.
Instruction List (IL):
Instruction List is a low-level textual programming language that resembles assembly language. It uses mnemonics and addresses to represent specific instructions. IL is suitable for experienced programmers who prefer a more detailed control over PLC operations and memory management. Although not as popular as some other languages, IL can be an efficient choice for optimizing execution speed and memory usage in critical applications.
Sequential Function Chart (SFC):
Sequential Function Chart is a graphical language used to represent complex sequential processes. It is well-suited for designing state-based control systems with different operating modes and transitions between them. SFC allows engineers to design programs with a clear sequence of events and actions, making it ideal for batch processes and complex automation tasks with defined states.
The popularity of each programming language depends on factors such as the application's complexity, the programming team's background, industry standards, and the available hardware and software. Many modern PLC programming environments, such as the IEC 61131-3 compliant systems, offer multiple languages, allowing engineers to choose the most appropriate one for each part of their automation project.
Sunday, September 20, 2020
Eil Automation
September 20, 2020
Siemens Addressing Concept
See the video from start to end
Addressing concept of siemens PLC : Byte .Bit addressing
Hardware Bit Addressing:
Input Address:
% I: 0.0 -------% PREFIX : BYTE.BIT
Output Address:
% O: 0.0 -------% PREFIX : BYTE.BIT
Memory Addressing:
Bit Memory Address:
% M 0.0 -------% PREFIX : BYTE.BIT
Byte Memory Address:
% MB0 -------% PREFIX : BYTE
Word Memory Address:
% MW0 -------% PREFIX : WORD
Doubleword Memory Address:
% MD0 -------% PREFIX : DWORD
ADDRESSING:
1BIT=4NIBBLE
8BIT=2NIBBLE=1BYTE
16BIT=4NIBBLE=2BYTE=1WORD
32BIT=8NIBBLE=4BYTE=2WORD=1DOUBLEWORD
Timer Addressing:
Define Address:
% T:0 -------% PREFIX : NUMBER
Counter Addressing:
Define Address:
% C:0 -------% PREFIX : NUMBER
Wednesday, August 19, 2020
PLC
Eil Automation
August 19, 2020
Delta PLC Software
PLC Having 2 type of software requirement:
Please see the video
how to download the delta PLC programming software
Monday, July 27, 2020
Eil Automation
July 27, 2020
RSLogix 500 Programming course 1 to 10
Rockwell PLC Part 1 |
How to uplode the PLC program?
Rockwell PLC Part 2 |
RSlogix 500 configuring PLC and Expansion Module in the IO configuration
Rockwell PLC Part 3 |
RSlogix 500 PLC Addressing Concept | PLC IO Digital & Analog Addressing
Rockwell PLC Part 4 |
How to start a programming? | Programming concept
Rockwell PLC Part 5 |
How to Build the first project in PLC ? | RSLogix 500 First Project programming
Rockwell PLC Part 6 |
How to created a holding coil logic? | Start Stop motor logic
Rockwell PLC Part 7 |
All Digital Logic Gate PLC Programming
Rockwell PLC Part 8 |
Monitor ON/OFF PLC Logic | INTRODUCTION TO INTERNAL MEMORY BIT
Rockwell PLC Part 9 |WHY HARDWARE FEEDBACK USED IN PLC PROGRAMMING?|MOTOR LOGIC EXAMPLE
Rockwell PLC Part 10 |
INTRODUCTION TO LATCH & UNLATCH INSTRUCTION IN PLC PROGRAMMING
Friday, May 8, 2020
Eil Automation
May 08, 2020
Critical industries, such as chemical, energy, transportation, and water/wastewater depend on supervisory control and data acquisition (SCADA) systems for daily operations. Strengthening weaknesses in these systems must be a priority and is a shared responsibility.
The U.S. Dept. of Homeland Security (DHS) has identified 16 critical infrastructure sectors that are "so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof." These include the chemical, critical manufacturing, energy, nuclear, transportation systems, and water/wastewater sectors.
According to a DHS report from the National Cyber Security and Communications Integration Center and Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), the ICS-CERT team responded to 295 cyber incidents in U.S. fiscal year 2015, a 20% increase over the previous fiscal year. This included 95 incidents within critical manufacturing, 46 within the energy sector, and 25 within the water and wastewater systems sector.
These industries rely heavily on supervisory control and data acquisition (SCADA) networks for day-to-day operations. If national security is only as strong as its weakest link, the SCADA networks in our critical infrastructure might be that weak point. Strengthening the weaknesses in these systems must be a priority and is a shared responsibility.
The U.S. government has issued several guidelines and recommendations to help secure these critical industries, but most are vague and unenforceable. More than 85% of U.S. critical infrastructure is privately owned or operated, so it is largely up to the infrastructure operators to prepare action plans of prevention, mitigation, incident management, and response.
Why industrial networks are so vulnerable
Many of these SCADA systems have been running for decades. This legacy equipment was designed for the needs of the operational technology (OT) department, rather than the information technology (IT) department. IT and OT traditionally have had different priorities when it comes to security. IT is tasked with protecting a company’s data, so confidentiality is the main concern. The OT world was designed for ease of use, data availability and integrity, and uptime, but not necessarily for security.
When programmable logic controllers (PLCs) were introduced to the market decades ago, they solved a specific set of problems: easy maintenance in the field, high uptime, and a life span of 20 to 30 years. In the past, this was fine, because PLCs in the field were typically air-gapped, or isolated from other zones. However, in today’s connected world, this isolation is no longer the case. Even an air-gapped, stand-alone system is vulnerable to infection from a universal serial bus (USB) device.
Industrial protocols also present risks because they were not designed with security in mind. Because many of these protocols have been in use for decades, it would be a daunting task to add security at this point. It would require coordinating updates with hundreds of vendors who manufacture products for those protocols and ensuring interoperability of the devices installed around the world.
The growing use of industrial PCs (IPCs) and other human-machine interfaces (HMIs) leads to more vulnerability. While the IPC is built to withstand industrial conditions, it still might be running a commercial version of Windows, so it is susceptible to all of the vulnerabilities that come with that operating system. At least one out of three devices is still running Windows XP, which Microsoft no longer supports. Running antivirus software is difficult and expensive to maintain in an industrial environment, so if a virus infects an IPC, it could affect an entire system.
Where to turn for cybersecurity guidance
Both the public and private sectors understand how important it is to increase the security of these systems. In February 2016, the White House established a Commission on Enhancing National Cybersecurity with the goal of strengthening cybersecurity in both the public and private sectors. In addition, many industries have formed cyber security awareness groups to share experiences about the importance of cybersecurity, develop recommended practices, and create guidelines to show asset owners how and where to start taking responsibility for security in their networks.Examples include:
These guidelines rely heavily on Recommended Practice: Improving Industrial Control Systems Cyber Security with Defense-in-Depth Strategies, a report from DHS, originally released in October 2009 and updated in September 2016.

Steps to take to protect SCADA and HMI
A defense-in-depth methodology recommends taking a layered approach to cybersecurity. If there is only a single layer of defense, an intruder who knows how to get around that level can easily breach the entire system. For example, if the only level of defense is antivirus software, a new piece of malware that has not been detected can slip through the cracks because the software does not recognize it. Adding multiple layers of defense to a control system will minimize the risk of a serious incident.
Consider the following best practices for adding defensive layers to a control system:
Firewall management: Firewalls should be deployed throughout the control system network, including device-level firewalls at the remote terminal unit (RTU)/PLC/distributed control system (DCS) level (see Figure 1). The potential downsides of this practice are added latency and capital costs, but device-level firewalls will help isolate the infected or disrupted system if an attacker is able to gain access. For key access points, it is also smart to install multiple firewalls from different manufacturers. If an attacker manages to break through one firewall, there still is an additional layer of protection and additional time to patch vulnerabilities.
There are several different types of firewalls, and each has its pros and cons.
Security information and event monitoring (SIEM) technologies: SIEM technologies streamline the review of logs, simple network management protocol (SNMP) traps, and event management. SIEM technologies provide a central console for security personnel to review logs from intrusion detection systems, firewalls, and other cybersecurity devices. This can help users comply with monitoring, logging, and review requirements.
Demilitarized zones (DMZs): A DMZ is a protected subnetwork between two other networks (see Figure 2). It can be set up between an untrusted network (e.g., the office network) and a trusted network (the control network). There are several ways to create a DMZ network, but the purpose is to make data from the trusted network available to those who need it and who don’t necessarily need direct access to the network.
Patch management: As mentioned earlier, security patch management is difficult within legacy industrial control systems, but performing it can fix bugs and close vulnerabilities. Test these patches on a regular basis—at least once a year but more often in some cases—in a controlled environment, before applying the updates to all individual devices. After patches are tested, verify those results with the appropriate vendors.
Authentication and authorization: Authentication is a verification process to ensure that only those people, devices, systems, or other entities with the proper credentials can access the network. It is often used along with authorization, which specifies who has rights to access data. Technologies and practices to enable authentication and authorization include
Malicious code prevention: There are several ways to detect, deter, and mitigate malicious code from infecting a network:
Virtual LANs: Another technology that can be deployed in networks is virtual LANs, or VLANs. VLANs physically divide networks into smaller, more logical networks to help increase performance and simplify management of the network. A VLAN is actually a network management tool and not designed to detect network security or vulnerabilities. A properly designed VLAN can help mitigate broadcast storms that may occur from hardware failures or cyber incidents.
Data diodes: Data diodes are another access control technology that can be deployed in control system networks. For traffic that needs to be only unidirectional (e.g., operational data being sent to a backup location), a data diode can ensure that no return traffic is allowed back into the protected system. A data diode is a system in which a pair of devices works together; one device has only a physical transmitter while the other has only a physical receiver. Software within the system handles the generation of transmission control protocol (TCP) acknowledgments that are required for many communication protocols.
Encryption technologies: The ISA 99 standard recommends the use of virtual private networks (VPNs) to secure remote connectivity. A VPN allows private networks to communicate over a public infrastructure. It encrypts data across untrusted networks and authenticates access into trusted networks.
Common-sense best practices: Technology is critical in securing control systems but doesn’t overlook the human level. SCADA and plant managers need to cultivate a security culture, similar to the safety culture that has become more common over the past decade. Managers should look at the logs and audit them regularly. Set a policy that requires strong passwords and teach employees how to create them. Never use the device’s default password.
Securing the future
Nearly every day, reports are published that prove how fragile and vulnerable networks are, including SCADA and the operating systems running in ICS. These reports explain new cyber-attacks, viruses, vulnerabilities, and even zero days in detail, which can either push the vendor to fix the problem by pushing out security updates or allow attackers to exploit them. ICS cybersecurity is very important, as we count on these systems to bring electricity, clean water, communication, entertainment, and more to our homes.
The implementation of the methods mentioned above, like a multitiered, defense-in-depth approach, addresses the cybersecurity gap in our critical infrastructure, but there is no single entity responsible for the entire process. Other than the energy industry, no other industry regulations are mandatory, therefore the level of protection depends largely on budgetary restrictions in the organization.
An IT administrator’s goal is to maintain the highest level of protection possible in his or her network and systems without interfering with everyday business in which OT engineers must keep the ICS process available and running. At the same time, because both groups must comply with corporate policies, a centralized way to monitor security and manage the network and OS can make their jobs easier and more flexible and efficient. OT, IT, company management, government, and others must play on the same team to ensure that our networks stay secure, available, and accurate.
Mariam Coladonato is the product marketing specialist for networking and security at Phoenix Contact USA. She has worked at Phoenix Contact, supporting the FL mGuard product family, since 2012. Coladonato has a degree in electrical engineering from West Virginia University Institute of Technology, and she is currently pursuing a master’s degree in cybersecurity.
This article appears in the Applied Automation supplement for Control Engineering and Plant Engineering.
Friday, April 24, 2020
PLC
Eil Automation
April 24, 2020
What are PLC languages used for programming?
IEC (International Electrotechnical Commission) Section 61131-3 Standard following languages used in programming:
1. Ladder Diagram (LD)
2. Functional Block Diagram (FBD)
3. Sequential Flow Chart (SFC)
4. Structural Text (ST)
5. Instruction List (IL)
1. Ladder Diagram
Ladder is work in left power rail to right power rail, top to bottom.
ladder logic as same as a electrical relay logic concept.
All the input connection as connected to the left side of ladder programming and output connection are connected to the write side of connection in ladder diagram
Input connect as NO/NC contact.
Output connect as COIL.
2. Functional Block Diagram
Functional Block diagram indicated the programming used in block for the operation.
It is function between inputs and outputs that are connected in blocks by connection lines.
Left side of programming used the conditional functional block & output side indicate the output of the functional block.
It easy to used the programming.
At one logic created used in multi-pal time.
FBD programming is difficult to troubleshoot that is the major disadvantage.
2. Sequential Flow Chart
Sequential Function Charts use steps and transitions to achieve your end results.
It can be faster to design and write the logic
Equipment are directly connect to logic, so direct access of equipment faulted find.
Most of time PLC Programming Language does not always fit every application that is disadvantage.
Monday, April 20, 2020
PLC
Eil Automation
April 20, 2020
What are major type of industrial control system?
In the industrial automation control system following type:
In the industrial automation control system following type:
- PLC
- DCS
- SCADA
- Embedded System
PLC:
Programmable logic controller used in the process, plant , SPM machine application.
DCS:
Distributed control system are the system to control the hole the process. Human interference is minimized so labor cost reduce & Safety of system increases
Embedded System:
In this system, small component attached to industrial computing system with the help of network & control is executed. It is used in one of application only.
SCADA:
Supervisory control and data acquisition system is centralized system. It attached the many number of PLC system to monitor and control the individual system.
Sunday, April 19, 2020
PLC
Eil Automation
April 19, 2020
What Is automation:
Programming interface between Input's & Output's to reduce human efforts.
Effect of automation:
The effect on industry to automate the human error reduce, so that cost of production reduced.
Manpower reduced then human interference reduce then safety of human as well as machine increases.In that of case machine work in all the process so quality of product increases as well as accuracy and productivity increased.
Manpower reduced then human interference reduce then safety of human as well as machine increases.In that of case machine work in all the process so quality of product increases as well as accuracy and productivity increased.
Evolution of automation:
The term of automation, inspired by the earlier word automatic was not widely used before 1947, When Ford established an automation department.
Control systems
1. Manual
2. Pneumatic
3. Hardwired
4. Electronic Control
5. PLC(Programmable Logic Controller)
PLC
Eil Automation
April 19, 2020
PLC having two type of connection: Sink Type/ Sources Type:
Sink Type Connection:
Source Type:
PLC also required the sensor type same as above ans connection as below:
Sink Type Connection:
Sink Type Connection
The above connection check the all the output devices on end connected to the power supply +Ve site and PLC common connected to the -Ve/ 0Vdc supply.
Source Type Connection
The output device on terminal connected to the -Ve site of power supply and power supply +Ve side connected to the common of PLC card.
In Both the above connection scheme you see that both the connection are only difference the common point connection.PLC also required the sensor type same as above ans connection as below:
Sensor type for NPN & PNP
Most of the time PLC used as a PNP type of sensor because the output generated in +Ve supply.
Eil Automation
April 19, 2020
PROFIBUS (Process Field Bus) is a standard for fieldbus communication in automation technology and was first promoted in 1989 by BMBF (German department of education and research) and then used by Siemens. It should not be confused with the PROFINET standard for Industrial Ethernet. PROFIBUS is openly published as part of IEC 61158.
Profibus comes in four variants, each with a different purpose:
- PROFIBUS DP (Decentralized Peripherals) used to drive sensors and actuators via a central controller. Dataspeed up to 12 Mbit/s with twisted pair cables and fiber optic cables are an option.
- PROFIBUS PA (Process Automation) is used to monitor measuring equipment via a process control system. This Profibus variant is ideal for use in explosive areas (Ex-zone 0 and 1). In the cables flows namely a weak current through the bus lines in an intrinsically safe circuit so that sparks do not occur, even at fault. The con. about this variant is the slow dataspeed at 31,25 kbit/s.
- PROFIsafe used for safety applications, usually with safety PLC’s or safety relays.
- PROFIdrive used in motion control.
![]() |
| Profibus Cable |
Profibus Connector:
| Pin # | Function | Description |
| 1 | Shield | Shield and functional earth |
| 2 | NC | Not in use |
| 3 | RxD/TxD-P | Data recieve and transmit (positive) |
| 4 | CNTR-P | Control signal to repeater (positive) |
| 5 | DGND | Reference potential for +5 volt and data |
| 6 | VP | +5 volt for terminating resistors (active termination) |
| 7 | NC | Not in use |
| 8 | RxD/TxD-N | Data recieve and transmit (negative) |
| 9 | CNTR-N | Control signal to repeater (negative) |
Profibus Wire Cutter:
The first thing to do is to remove the isolation of your Profibus cable. You can use a special Profibus Tripping Tool or if you are used to work with cables, you can use a knife or a wire cutter. The Profibus stripping tool is worth the money, because it will give you a sharp and perfect stripping of the Profibus cable needed for the connectors. It can be difficult to strip the cables correctly with a knife, so that both the shield and the two wires inside are visible.
How to Connect the master & slave ?
One master and slave connector as below diagram, The master connection in use a incoming entry only with switch on condition & slave connection for fist slave also incoming connection with the switch off condition. If other slave are connector then slave outgoing cable connected the next connector with on the terminal switch & other slave off.
Connecting the Profibus cable to the connector should be done with extra caution. Remember, that it is very important not only to connect the wires correct, but also to connect the shield correct and even to strip the wire correct. Take a look at this great instruction video if you’re in doubt about the connector:
Subscribe to:
Comments (Atom)























