Skip to main content

Posts

What happens when Fluid Flow Reversed through Control Valve?

 Explain why the direction of flow shown in the below image goes from left to right. What would happen if we sent fluid flow through this control valve in reverse direction i.e. from right to left instead? Fluid Flow Reversed through Control Valve If we were to use this valve “backwards,” the pressure drop across the plug would tend to “slam” it closed whenever it approached the closed position. In other words, the process fluid’s differential pressure drop would make it very difficult to maintain any plug position near full-closed. This is actually an example of a mechanical feedback system. As the valve closes, the pressure drop across it (in most processes) usually rises because other pressure losses in the piping system decrease with decreased flow, leaving the valve to drop all the fluid pressure. Since plug position has an effect on pressure drop, and pressure drop exerts a mechanical force on the plug, there is a system of feedback at work here. In the proper flow direction, the feedba...

Transmitter Proof Testing

 The purpose of proof testing is to detect the failures within the transmitter that are not detected by the regular diagnostics of the transmitter. Of main concern are undetected failures that prevent the safety instrumented function from performing its intended function. Proof Testing Method The frequency of the proof tests (or the proof test interval) is to be determined in the reliability calculations for the safety instrumented functions for which the transmitter is applied. The actual proof tests must be performed more frequently or as frequently as specified in the calculation in order to maintain the required safety integrity of the safety instrumented function. The following tests need to be specifically executed when a proof test is performed. The results of the proof test need to be documented and this documentation should be part of a plant safety management system. Failures that are detected should be reported to the manufacturer. The personnel performing the proof test...

MODBUS ASCII Communication Protocol Explained

 n this post, we will study the concept of the Modbus ASCII protocol. Modbus is a communication protocol that is widely used in PLCs. It is a type of serial communication. Nowadays, apart from PLC’s, it is widely used in various ranges of instruments like PID controllers, sensors, various types of electronic instruments, VFD’s, etc. Modbus works in master-slave mode. That means, suppose there is a PLC that acts as a master and three VFD’s which act as slaves. If you understand it in simpler terms, it is a turn-by-turn protocol. The PLC requests information from the first slave; then the second slave and at last, the third slave. It requests for data in a set period of time; and if the response is not received (timeout time), then it proceeds for the next slave and so on. After the last slave, it goes back again to the first slave. Also, apart from reading, it also writes data to slaves one by one. MODBUS ASCII Communication Protocol Modbus works on three hardware layers for serial ...

What is Sequential Function Chart (SFC?)

 As per IEC 61131-3, there are five PLC programming languages, three are graphical. The other two are textual languages. The three graphical languages are ladder diagram (LD), Function Block Diagram (FBD), Sequential Function Chart (SFC). Two textual languages are Standard Text (ST) and Instruction List (IL). Out of all the above, various languages have different strengths for different tasks. In this article let us discuss Sequential Function Chart (SFC). It is a flow chart-like programming language. The execution of process operations is structured sequentially. It can encapsulate ladder diagram (LD), Function Block Diagram (FBD), Instruction List (IL), and Standard Text (ST) structures to control subroutines. Sequential Function Chart Sequential Function Chart (SFC) can be used to structure the internal organization of a program consisting of sub-programs and are also written in other languages of the standard. It can also be used in its pure form of specifying the logical contr...

High-end Programmable Logic Controller – Schneider PLC

 In the first part, we overviewed the PLC’s used for smaller and medium applications. The second part overviews the PLCs used for higher-level applications. M340 – Mid Range PLC The first range of high-end processors in Schneider PLC starts with M340 PLC. It is a very powerful and compact series of PLCs providing high-end efficiency and control solutions in it. This PLC has a program memory of 4 MB, 128 MB of file storage, and executes 7 instructions in a millisecond. The PLC is a modular type which means it requires a rack to configure. The communication part comprises a USB port, 3 Ethernet networks, 1 CAN Open, 1 serial port, 4 ASI, and 37 Modbus buses. The PLC has an embedded web server and file transfer protocols. The main advantage is that the program is stored in a removable SD card. So, whenever the PLC gets corrupt or damaged, just remove the SD card and insert it in the new PLC. The software used for programming is Control Expert. You have all the languages available in i...

How Has Technology Changed Education?

Every year means that experts develop new, useful technologies for helping people to deal with different issues. We use their achievements daily to search for information on the Web, contact friends on social media, play games, and so on. One of the most popular examples is artificial intelligence. Its importance is spectacular for different spheres including business, work, education, etc.  So it’s fair to say that technologies are a huge part of a modern individual’s life. Let’s pay more attention to its influence on the educational sphere and find out its main advantages and perspectives for the future.  Powerful and unstoppable technological influence This is a fact: technology causes a very positive influence on students’ experience during campus life. With such many benefits revealed to individuals, they are able to become more engaged in educational programs, more informed about their opportunities, and more powerful in the flow of neverending assignments. Students can ...

8 Data Protection Tips For Businesses And Individuals

 Progress in recent years has contributed to businesses being increasingly reliant on information systems while also making them exposed to external threats and attacks. Every year, new techniques for getting illegal access to databases emerge. Because “who has the information owns the world,” we can see several examples of unfair competition on the market today. Many businesses are attempting to obtain extensive information about their competitors in whatever way possible in order to gain a competitive advantage. Obviously, the issue of maintaining security and data protection is more important than ever for businesses that are battling for market share and confronting external threats. After all, if you do not correctly arrange your work in this direction, it is simple to fail in today’s economic environment. However, there is a good side to information technology progress: new solutions and means of protection develop, allowing for a high level of security of a company’s IT infr...