The system architecture of the Trusted
interlock applications as is possible. The control algorithms detailed in this Product Description are
primarily intended to support the limited process control capabilities required for Floating Production,
Storage and Offloading (FPSO) installations. The algorithms may also be used for other process
control applications as required.
Control functions require the use of floating point values. This ultimately limits the integrity that can be
attributed to these functions because of the introduction of an element of “loss of precision” and the
general inability to exhaustively verify floating-point capabilities.
T
is intended to cover as large a cross section of control and
The functions are integrated into the IEC1131 TOOLSET execution environment. This environment is
“Commercial-Off-The-Shelf (COTS)” and designed to commercial standards. The overall system
achieves higher levels of integrity by the use of additional on-line monitoring and internal state control.
The combination of the above factors indicate that the target integrity for the basic process control
functions should be SIL1 (AK3). These functions should therefore NOT be used within elements of
application programs intended for SIL3 (AK6) use.
TM
The control algorithms are executed within the Trusted
program and are divided into ‘functions’ and ‘function blocks’.
‘Functions’ are those algorithms with no internal state, or time dependent operation, i.e. they have no
storage element. The functions process the defined number of parameters and return a single
resultant state or value. Functions, therefore, have only a single operating mode, always performing
the same operation.
The ‘function blocks’ include retentive information and may return multiple values. Function blocks will
have an initial state or value for each of their outputs. The initial value may be maintained for a single
or multiple application iterations, depending on the detail of the algorithms.
Controller as part of the standard application
Issue 8 Sep 07 PD-T8019 1
Trusted
Issue Record
Issue
Number Date Revised by Technical CheckAuthorised by Modification
Table 3 Example Time Average .............................................................................................................21
Issue 8 Sep 07 PD-T8019 4
Trusted
TM
Process Control Algorithms T8019
Notice
The content of this document is confidential to ICS Triplex Technology Ltd. companies and their
partners. It may not be given away, lent, resold, hired out or made available to a third party for any
purpose without the written consent of ICS Triplex Technology Ltd.
his document contains proprietary information that is protected by copyright. All rights are reserved.
T
Microsoft, Windows, Windows 95, Windows NT, Windows 2000, and Windows XP are registered
trademarks of Microsoft Corporation.
The information contained in this document is subject to change without notice. The reader should, in
all cases, consult ICS Triplex Technology Ltd. to determine whether any such changes have been
made. From time to time, amendments to this document will be made as necessary and will be
distributed by ICS Triplex Technology Ltd.
Information in this documentation set may be subject to change without notice and does not represent
a commitment on the part of ICS Triplex Technology Ltd.
The contents of this document, which may also include the loan of software tools, are subject to the
confidentiality and other clause(s) within the Integrator Agreement and Software License Agreement.
No part of this documentation may be reproduced or transmitted in any form or by any means,
electronic or mechanical, including photocopying and recording, for any purpose, without the express
written permission of ICS Triplex Technology Ltd.
Disclaimer
The illustrations, figures, charts, and layout examples in this manual are intended solely to illustrate the
text of this manual.
The user of, and those responsible for applying this equipment, must satisfy themselves as to the
acceptability of each application and use of this equipment.
This document is based on information available at the time of its publication. While efforts have been
made to be accurate, the information contained herein does not purport to cover all details or variations
in hardware or software, nor to provide for every possible contingency in connection with installation,
operation, or maintenance. Features may be described herein which are present in all hardware or
software systems. ICS Triplex Technology Ltd. assumes no obligation of notice to holders of this
document with respect to changes subsequently made.
ICS Triplex Technology Ltd. makes no representation or warranty, expressed, implied, or statutory with
respect to, and assumes no responsibility for the accuracy, completeness, sufficiency, or usefulness of
the information contained herein. No warranties of merchantability or fitness for purpose shall apply.
Issue 8 Sep 07 PD-T8019 5
Trusted
TM
Process Control Algorithms T8019
Revision and Updating Policy
All new and revised information pertinent to this document shall be issued by ICS Triplex Technology
Ltd. and shall be incorporated into this document in accordance with the enclosed instructions. The
change is to be recorded on the Amendment Record of this document.
Precautionary Information
WARNING
Warning notices call attention to the use of materials, processes, methods, procedures or limits which
must be followed precisely to avoid personal injury or death.
CAUTION
Caution notices call attention to methods and procedures which must be followed to avoid damage to
the equipment.
Notes:
Notes highlight procedures and contain information to assist the user in the understanding of the
information contained in this document
Warning
RADIO FREQUENCY INTERFERENCE
Most electronic equipment is influenced by Radio Frequency Interference (RFI). Caution should be
exercised with regard to the use of portable communications equipment around such equipment.
Signs should be posted in the vicinity of the equipment cautioning against the use of portable
communications equipment.
MAINTENANCE
Maintenance must be performed only by qualified personnel, otherwise personal injury or death, or
damage to the system may be caused.
Caution
HANDLING
Under no circumstances should the module housing be removed.
Associated Documents
Product Descriptions (PD) provide product specific information.
The Safety Manual contains the recommended safety requirements for the safety system design.
The PD8082B – Toolset Suite provides specific guidance on system configuration and application
generation.
The Operator and Maintenance Manual contains general guidelines on maintenance and diagnostic
procedures.
For technical support email: support@icstriplex.com
Issue 8 Sep 07 PD-T8019 6
Trusted
TM
Process Control Algorithms T8019
1. Description
Several of the basic control algorithms may generate error conditions at run-time as all function
arameters are variable. This may result in reversed parameters, e.g. max < min, overflow and
p
underflow conditions, divide by zero errors, etc. For each function, the required output under these
conditions is defined and error counters are incremented. These error counters are available to the
application programmer using the error statistics function block.
The function block has a single Boolean input that is used to reset the counters. Whilst this input is
true, the error counters will be reset to zero. The initial value of all error counters is zero.
eversed
RESET
ERRSTAT
R
Param
Overflow
Underflow
Data types are
1. RESET Boolean
2. All others Integer
Output Error condition
Reversed Pairs of function parameters are reversed, i.e. max<min.
Param A function parameter is incorrect, e.g. out of range or not
Overflow An overflow error occurred in the execution of the function.
Underflow An underflow error occurred in the execution of the function.
Zero Divide A divide by zero error occurred in the execution of the
Zero Divide
The associated function has reversed the two values in order
to obtain a valid result. The count is incremented on each
iteration of the function whilst the parameters are reversed.
consistent with the functions required operation. The count
is incremented on each iteration of the function whilst the
parameter is incorrect.
The count is incremented on each iteration of the function
whilst the overflow condition occurs.
The count is incremented on each iteration of the function
whilst the underflow condition occurs.
function. The count is incremented on each iteration of the
function whilst the divide by zero condition occurs.
Table 1 Error Statistics
Issue 8 Sep 07 PD-T8019 7
Trusted
()(
)
TM
Process Control Algorithms T8019
1.1. Functions
1.1.1. Square Root Extraction
SQRTX
OUT
IP
IP
PV
MAX
MIN
The Process Variable (PV) is scaled to a value 0…1 according to maximum input value (IP
minimum input value (IP
i.e. a value greater than maximum input will use the IP
will use the IP
value. The square root of the resulting value is then taken and is returned as a
MIN
). Out of range values will result in the value being clamped to the range,
MIN
value, similarly a value below the minimum
AX
M
MAX
) and
percentage.
i.e.
IPIP,IPPV,MaxMin
MINMAXMIN
100
×
Note: All inputs (PV, IP
If IP
MAX
< IP
, the function assumes that the values have been reversed and “swap” the values. The
MIN
MIN
OUT
=
and IP
IP -IP
MINMAX
) and the returned value OUT must be real.
MAX
“reversed” error counter is incremented each time the function has to swap the parameters.
If IP
MAX
= IP
, the function returns a value of zero and increments the “zero divide” error counter to
MIN
indicate that a divide by zero error would have occurred.
If PV is not a number (NaN), the function returns a value of zero and increments the “Param” error
counter.
All input range parameters (IP
MIN
and IP
) must be finite, i.e. not ±infinities or NaNs. Behaviour is not
MAX
defined for any other values.
If PV is not a NaN, and an overflow or underflow condition occurs the function returns zero and
increment the corresponding error counter.
Issue 8 Sep 07 PD-T8019 8
Trusted
()(
)
TM
Process Control Algorithms T8019
1.2. BCD Translation
IP0
I
P1
IP2
IP3
M
N
The BCD translation function requires the 4-bit BCD value represented as 4 Boolean parameters (IP0,
IP1, IP2, and IP3), IP0 being the least significant bit, IP3 the most significant bit. All four inputs must
be defined; inputs not required for specific application must be set to FALSE. M and N are of type
integer.
M specifies the value multiplier and must be a power of 10, i.e. 1, 10, 100, etc. N allows the BCD
functions to be cascade, by adding the value from a previous function. A value of -1 is assumed to be
the result of an up-stream conversion error and will result in all chained BCD functions generating
values of -1. The returned value OUT is an integer.
BCD
OUT
NMIP3IP2,IP1,IP0,BCDOUT+×=
Invalid BCD number (see table below) are to result in OUT = -1.
IP3
IP2
IP1
IP0
OUT
(with M=1 and N=0)
00000
00011
00102
00113
01004
01015
01106
01117
10008
10019
1010-1
1011-1
1100-1
1101-1
1110-1
1111-1
Table 2 BCD Translation
Multiple values (M) that are not powers of 10 are to result in a value of -1. If an overflow condition
occurs, the function is to return a value of -1 and increment the “Overflow”, error counter.
Issue 8 Sep 07 PD-T8019 9
Loading...
+ 19 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.