IT in Manufacturing


Machine safety, diagnostics and data security

March 2024 IT in Manufacturing

Personnel safety systems on machines are often seen as a necessary evil. To function correctly, a safety device is required to be self-checking, which adds more complexity and costs compared to a non-safety device. It does not enhance the machine’s performance and can stop production at any point, hence the ‘evil‘ label, despite having the very ‘good‘ function of protecting people from dangerous motion.

Diagnostics

Once an emergency stop has occurred, restarting production is usually the highest priority, assuming that there are no other emergencies to deal with. Good diagnostic information is key to achieving this in the most efficient way.

Gate interlocks and emergency stop buttons are normally the main problem areas for diagnostics. These are typically linked in series, on long chains. Whilst this reduces costs and simplifies installation, it makes identifying which E-stop has been pushed or which door has been opened difficult to find, as there are multiple devices connected to a single input. The alternative is to wire each individual point back to an input, but this is obviously very costly in wiring and inputs.

In-Series Diagnostics (ISD) eliminates this problem. Utilising a four-wire series chain, up to 32 ISD devices can be added to each chain. Either a safety controller with ISD built in, or an external ISD module monitors the status of every ISD module. This is separate from the safety function. In addition to the activated/not activated status of the device, each ISD device provides an array of additional information. This includes a unique identifier, internal temperature and voltage, and device-specific details such as alignment and distance between the sensor and actuator of a safety switch. The system will send warning alarms if a device is near the tripping point, so that remedial action can be taken before a nuisance trip occurs, for example from a door sagging on its hinges.

When a device is tripped, the location of the device is identified and can be displayed through an HMI, indicator light, or smartphone app, or by turning the machine lighting red in the vicinity of the activated device. This clear information can quickly and efficiently guide an operator to the device that was activated, allowing the machine to be restarted, with minimum downtime.

Devices with inbuilt ISD include RFID safety switches and illuminated E-stops. There is also an ISD Connect device which connects conventional E-stop buttons or safe mechanical switch contacts to an ISD chain, thus extending the diagnostic functions. The ISD controller can connect to IO-Link or other bus systems and edge devices, allowing the diagnostic data to be sent to cloud-based OEE systems, where analysis of the data can highlight areas where performance improvements can be made.

Data integrity

There has been a great deal of interest in the vulnerabilities associated with connecting information technology (IT) and operating technology (OT). IT systems have a continuous development of devices and upgrades to prevent cyberattacks from outside of the organisation, but cyberattacks have not been a consideration for OT until very recently. Questions are often raised about whether OT is now the weak point through which a cyberattack enters the IT component. Similar questions are raised as to whether a cyberattack on a connected safety system could lead to a ‘failure to danger‘ situation.

Safety systems, such as those manufactured by Turck Banner, utilise dual diverse redundancy. This involves using two different processor types running two different programs that do not share any coding. Both halves receive the same information from the safety inputs and process it independently, constantly checking that they both get the same result. If the results are different, the safety controller will initiate a safe stop.

The safety circuits and the information circuits are separate parts of the controller, providing another level of isolation. This may not guarantee that a cyberattack cannot cause an emergency stop. However the chances are negligible that a cyberattack creates identical results simultaneously by breaching the isolation in two places and manipulating two different processors running different coding. That is not to say that cyberattacks should be dismissed as a potential cause of production loss, but that the safety system is unlikely to be the target.

Safety systems are an integral part of machines with dangerous motion, where personnel have access. No one wants to expose their operators to potential harm without a safety system to protect them. Employing good diagnostics, combined with good operator guidance, can improve efficiency and productivity, while offsetting the cost of a good safety system.


Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Buildings in Africa’s urban evolution
Schneider Electric South Africa IT in Manufacturing
Africa is now an urban continent. How does the continent mobilise to accommodate urban dwellers and maintain and implement critical infrastructure that allows for this expansion? Building management systems provide a tangible solution to optimise resource use, lower operations costs and ultimately contribute to a growing continent that also employs green practices.

Read more...
Inductive IO-Link sensors
Turck Banner Southern Africa Sensors & Transducers
Turck Banner is expanding its sensor range, with inductive measuring sensors with IO-Link and an analogue output for flush and non-flush mounting.

Read more...
Black Rock Mining centralises mining operations with AVEVA
IT in Manufacturing
Black Rock Mine Operations replaced and upgraded its existing infrastructure, and installed additional capacity to expand production from 3 to 4,6 million tons in three years. The new system is powered by a suite of AVEVA solutions.

Read more...
The strategic role of technology in today’s economy
IT in Manufacturing
In an era of economic uncertainty and persistent market volatility, businesses are under immense pressure to manage costs while maintaining operational effectiveness. The role of chief information officers and chief technology officers has never been more critical, as they are tasked with leveraging technology not just as a tool for efficiency but as a strategic asset in navigating these turbulent times.

Read more...
Minutes to meltdown: surviving a cyber attack
IT in Manufacturing
Commvault recently hosted its Minutes to Meltdown event. Led by the company’s security experts, this was an interactive and detailed ransomware attack simulation designed to help companies understand how to respond in the event of a cyber attack.

Read more...
Siemens elevates automotive and aerospace simulation
Siemens South Africa IT in Manufacturing
Siemens Digital Industries Software has announced the latest update to its Simcenter portfolio, delivering advancements in aerostructure analysis, electric motor design, gear optimisation and smart virtual sensing. These enhancements are designed to streamline workflows, accelerate certification and provide deeper insights into system performance.

Read more...
Automation in 2025: Navigating manufacturing innovation without the risk
IT in Manufacturing
During 2025, a wave of innovative technologies is expected to disrupt and change the way IT is applied to automation systems. The challenge lies in balancing the reliability of proven techniques with the potential of new technologies, all while minimising and controlling risk. This article explores ways to approach the latest information technologies effectively in a manufacturing context.

Read more...
South Africa’s AI revolution is here – but are we secure?
IT in Manufacturing
South African businesses are sprinting to embrace generative AI, lured by its potential to drive efficiency, productivity and innovation. But here’s the stark reality: without a rock-solid cybersecurity foundation, AI will become a Trojan horse, opening the floodgates to sophisticated cyber threats.

Read more...
Shaping data resilience strategies with AI and hybrid cloud solutions
IT in Manufacturing
In today’s rapidly evolving digital landscape, organisations are under growing pressure to secure their operations against increasingly sophisticated cyberthreats, including those that leverage AI to enhance the success rate of attacks. In this landscape, it has become essential to ‘fight fire with fire’ – harnessing AI as a means to counter these threats.

Read more...
Cloud or on-prem? Decoding the choices for South African enterprises
IT in Manufacturing
The debate between on-premise and cloud computing architectures remains a prominent topic among businesses, particularly in South Africa.

Read more...