IT in Manufacturing


Machine safety, diagnostics and data security

March 2024 IT in Manufacturing

Personnel safety systems on machines are often seen as a necessary evil. To function correctly, a safety device is required to be self-checking, which adds more complexity and costs compared to a non-safety device. It does not enhance the machine’s performance and can stop production at any point, hence the ‘evil‘ label, despite having the very ‘good‘ function of protecting people from dangerous motion.

Diagnostics

Once an emergency stop has occurred, restarting production is usually the highest priority, assuming that there are no other emergencies to deal with. Good diagnostic information is key to achieving this in the most efficient way.

Gate interlocks and emergency stop buttons are normally the main problem areas for diagnostics. These are typically linked in series, on long chains. Whilst this reduces costs and simplifies installation, it makes identifying which E-stop has been pushed or which door has been opened difficult to find, as there are multiple devices connected to a single input. The alternative is to wire each individual point back to an input, but this is obviously very costly in wiring and inputs.

In-Series Diagnostics (ISD) eliminates this problem. Utilising a four-wire series chain, up to 32 ISD devices can be added to each chain. Either a safety controller with ISD built in, or an external ISD module monitors the status of every ISD module. This is separate from the safety function. In addition to the activated/not activated status of the device, each ISD device provides an array of additional information. This includes a unique identifier, internal temperature and voltage, and device-specific details such as alignment and distance between the sensor and actuator of a safety switch. The system will send warning alarms if a device is near the tripping point, so that remedial action can be taken before a nuisance trip occurs, for example from a door sagging on its hinges.

When a device is tripped, the location of the device is identified and can be displayed through an HMI, indicator light, or smartphone app, or by turning the machine lighting red in the vicinity of the activated device. This clear information can quickly and efficiently guide an operator to the device that was activated, allowing the machine to be restarted, with minimum downtime.

Devices with inbuilt ISD include RFID safety switches and illuminated E-stops. There is also an ISD Connect device which connects conventional E-stop buttons or safe mechanical switch contacts to an ISD chain, thus extending the diagnostic functions. The ISD controller can connect to IO-Link or other bus systems and edge devices, allowing the diagnostic data to be sent to cloud-based OEE systems, where analysis of the data can highlight areas where performance improvements can be made.

Data integrity

There has been a great deal of interest in the vulnerabilities associated with connecting information technology (IT) and operating technology (OT). IT systems have a continuous development of devices and upgrades to prevent cyberattacks from outside of the organisation, but cyberattacks have not been a consideration for OT until very recently. Questions are often raised about whether OT is now the weak point through which a cyberattack enters the IT component. Similar questions are raised as to whether a cyberattack on a connected safety system could lead to a ‘failure to danger‘ situation.

Safety systems, such as those manufactured by Turck Banner, utilise dual diverse redundancy. This involves using two different processor types running two different programs that do not share any coding. Both halves receive the same information from the safety inputs and process it independently, constantly checking that they both get the same result. If the results are different, the safety controller will initiate a safe stop.

The safety circuits and the information circuits are separate parts of the controller, providing another level of isolation. This may not guarantee that a cyberattack cannot cause an emergency stop. However the chances are negligible that a cyberattack creates identical results simultaneously by breaching the isolation in two places and manipulating two different processors running different coding. That is not to say that cyberattacks should be dismissed as a potential cause of production loss, but that the safety system is unlikely to be the target.

Safety systems are an integral part of machines with dangerous motion, where personnel have access. No one wants to expose their operators to potential harm without a safety system to protect them. Employing good diagnostics, combined with good operator guidance, can improve efficiency and productivity, while offsetting the cost of a good safety system.


Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

South Africa’s AI revolution is here – but are we secure?
IT in Manufacturing
South African businesses are sprinting to embrace generative AI, lured by its potential to drive efficiency, productivity and innovation. But here’s the stark reality: without a rock-solid cybersecurity foundation, AI will become a Trojan horse, opening the floodgates to sophisticated cyber threats.

Read more...
Shaping data resilience strategies with AI and hybrid cloud solutions
IT in Manufacturing
In today’s rapidly evolving digital landscape, organisations are under growing pressure to secure their operations against increasingly sophisticated cyberthreats, including those that leverage AI to enhance the success rate of attacks. In this landscape, it has become essential to ‘fight fire with fire’ – harnessing AI as a means to counter these threats.

Read more...
Cloud or on-prem? Decoding the choices for South African enterprises
IT in Manufacturing
The debate between on-premise and cloud computing architectures remains a prominent topic among businesses, particularly in South Africa.

Read more...
Advancements in wire rope testing
IT in Manufacturing
Being able to get instant, real-time and portable detection of wire rope flaws can make a significant difference for operational teams. There have been a number of significant technological advancements and tools entering the market that help wire rope operators detect and resolve problems faster.

Read more...
Quantum computing power: four steps to protecting your business
IT in Manufacturing
Are you ready for Q-day? Post-quantum cryptography isn’t just an IT issue, it’s a business continuity concern. Quantum computing is fast becoming a reality.

Read more...
Schneider Electric relaunches legacy access control systems
Schneider Electric South Africa IT in Manufacturing
Schneider Electric South Africa has relaunched its comprehensive access control platform to help customers upgrade from ageing and obsolete systems.

Read more...
Digitalisation in mining - the advantage you need now
Schneider Electric South Africa IT in Manufacturing
Digitalisation offers immense and proven benefits such as streamlining operations, reducing error and accelerating workflows. Mining operators today leverage digital technologies to improve efficiency, sustainability and very importantly, safety.

Read more...
The shape of water – automating hydropower operations
Schneider Electric South Africa IT in Manufacturing
Hydropower is undoubtedly one of the building blocks of today’s renewable energy industry and its operations need to be efficient, reliable and sustainable. Automation must therefore form part of today’s modern hydropower operations to improve resource management and enhance reliability.

Read more...
What lies beneath – the hidden cost of AI
Schneider Electric South Africa IT in Manufacturing
The world is quickly realising that with the rapid advancement in AI there are also caveats. In short, apart from environmental implications, it also has major significant financial ramifications.

Read more...
Trends shaping the future of cloud in South Africa
IT in Manufacturing
The cloud has emerged as a fundamental and transformative component of modern business infrastructure. It has fundamentally changed how organisations operate and innovate. In South Africa, this trend is particularly pronounced, with most businesses adopting multi-cloud strategies to enhance their agility and competitiveness.

Read more...