A protocol for all industries
August 2008
IT in Manufacturing
Jaco Hoogenboezem, SCADAGroup SA
Historical information gathering for distributed networks, where different media such as radios and cellular networks are used, has always been limited in terms of the system response. The bigger the system became, the slower the update times. In an effort to remove the influence of the communication architecture on the system response, a distributed network protocol was designed, and the two flavours of this were called DNP3 and IEC 60870-5. IEC 60870-5 is the protocol mostly used in the electrical industry. IEC 60870-5 is used widely in Europe, while DNP3 is used in the rest of the world.
Typically DNP-data contains not only the value for a data point, but also the quality and timestamp, and the specification allows for the controller to buffer the data for communications delays and failures. In simplistic terms it can be said that one should be able to obtain system responses expected from non-distributed system from for instance a radio system by using DNP.
In a DNP-system, one has DNP-Masters, DNP-slaves, DNP-Routers as well as DNP-Mapping to coordinate the architecture. Optional parameters in the DNP-protocol that like time synchronisation, retries, time-outs and confirmation messages are also used. The DNP-protocol can be implemented as a polled event where a time stamped value is transmitted on request, or an unsolicited response. In such cases a value is defined in terms of classes, and each class has its own hold time and hold count. If the hold time is 60 seconds, and the hold count is 10, it means that if the value changed outside of its dead band, more than 10 times before 60 seconds has elapsed the 10 time stamped values will be sent to the DNP-Master. The DNP master can be a controller or data concentrator or a DNP-enabled SCADA.
This report by exception (RBE) functionality allows slaves to send messages to the master, and the master needs to minimise clash avoidance and initiate recovery.
Typical applications where recording and logging events and periodic data from remote sites include:
* Non-continuous communications links (cellular, satellite and dial-up interfaces may be polled infrequently to reduce operational costs. Many only initiate calls for high priority events or alarms).
* Low power operation (infrequent communications for power management).
* Metering applications (hourly, daily and monthly totals).
* Time stamped events (sequence of events communication, failure and recovery).
With most other protocols, remote site RTU configurations can quickly become very complex because of aspects such as:
* Mapping of data.
* Conversion of data formats.
* Triggering of event logging.
* Triggering of messages.
* Retrying of failed messages.
DNP is designed to answer these problems with:
* Each device has addressing for over 65 000 points of each object type.
* Automatic time synchronisation of all devices.
* Automatic time-stamped events.
* Data class and priority configuration.
* Broadcast and polled messages.
* Capability for large messages (>2 kBytes).
Because DNP is an open protocol three levels of compliance have been certified:
* Level 1 – Basic slave ie an I/O device.
* Level 2 – Smarter slave/master ie a PLC/RTU.
* Level 3 – Very smart slave/master.
For a demonstration of a controller/SCADA environment that is Level 3 compliant, contact Jaco Hoogenboezem on [email protected]
For a demonstration or more information contact Jaco Hoogenboezem, SCADAGroup, +27 (0)83 282 5706, [email protected], www.controlmicrosystems.com
Further reading:
Buildings in Africa’s urban evolution
Schneider Electric South Africa
IT in Manufacturing
Africa is now an urban continent. How does the continent mobilise to accommodate urban dwellers and maintain and implement critical infrastructure that allows for this expansion? Building management systems provide a tangible solution to optimise resource use, lower operations costs and ultimately contribute to a growing continent that also employs green practices.
Read more...
Black Rock Mining centralises mining operations with AVEVA
IT in Manufacturing
Black Rock Mine Operations replaced and upgraded its existing infrastructure, and installed additional capacity to expand production from 3 to 4,6 million tons in three years. The new system is powered by a suite of AVEVA solutions.
Read more...
The strategic role of technology in today’s economy
IT in Manufacturing
In an era of economic uncertainty and persistent market volatility, businesses are under immense pressure to manage costs while maintaining operational effectiveness. The role of chief information officers and chief technology officers has never been more critical, as they are tasked with leveraging technology not just as a tool for efficiency but as a strategic asset in navigating these turbulent times.
Read more...
Minutes to meltdown: surviving a cyber attack
IT in Manufacturing
Commvault recently hosted its Minutes to Meltdown event. Led by the company’s security experts, this was an interactive and detailed ransomware attack simulation designed to help companies understand how to respond in the event of a cyber attack.
Read more...
Siemens elevates automotive and aerospace simulation
Siemens South Africa
IT in Manufacturing
Siemens Digital Industries Software has announced the latest update to its Simcenter portfolio, delivering advancements in aerostructure analysis, electric motor design, gear optimisation and smart virtual sensing. These enhancements are designed to streamline workflows, accelerate certification and provide deeper insights into system performance.
Read more...
Automation in 2025: Navigating manufacturing innovation without the risk
IT in Manufacturing
During 2025, a wave of innovative technologies is expected to disrupt and change the way IT is applied to automation systems. The challenge lies in balancing the reliability of proven techniques with the potential of new technologies, all while minimising and controlling risk. This article explores ways to approach the latest information technologies effectively in a manufacturing context.
Read more...
South Africa’s AI revolution is here – but are we secure?
IT in Manufacturing
South African businesses are sprinting to embrace generative AI, lured by its potential to drive efficiency, productivity and innovation. But here’s the stark reality: without a rock-solid cybersecurity foundation, AI will become a Trojan horse, opening the floodgates to sophisticated cyber threats.
Read more...
Shaping data resilience strategies with AI and hybrid cloud solutions
IT in Manufacturing
In today’s rapidly evolving digital landscape, organisations are under growing pressure to secure their operations against increasingly sophisticated cyberthreats, including those that leverage AI to enhance the success rate of attacks. In this landscape, it has become essential to ‘fight fire with fire’ – harnessing AI as a means to counter these threats.
Read more...
Cloud or on-prem? Decoding the choices for South African enterprises
IT in Manufacturing
The debate between on-premise and cloud computing architectures remains a prominent topic among businesses, particularly in South Africa.
Read more...
Advancements in wire rope testing
IT in Manufacturing
Being able to get instant, real-time and portable detection of wire rope flaws can make a significant difference for operational teams. There have been a number of significant technological advancements and tools entering the market that help wire rope operators detect and resolve problems faster.
Read more...