PLCs, DCSs & Controllers


Connecting to the PLC from a remote location

January 2008 PLCs, DCSs & Controllers

Internet access process control

Industrial automation is no longer limited by the walls of a production facility. More and more automation is being handled via remote communication, whether it is from the office or from the comfort of your own home. Today's PLCs give you the ability to access your control system to handle such tasks as monitoring via a website to determine the condition of a machine or check other statistics. With the latest PLC technology, almost anything that can be accomplished next to the machine can be accomplished wherever there is an Internet connection.

Remote connection to the PLC

The latest generation of PLCs have an integrated Ethernet port on the controller for two main operations. The first is controlling remote (Input/Output) I/O on Ethernet-based protocols like EtherNet/IP, Profinet, or Modbus/TCP. The second is to program and/or debug the internal program of the controller. With these features, and utilising the Ethernet's other services such as a web and FTP server, remote administration of a control process becomes possible.

The first step in connecting remotely is to set up the controller to handle communication from both the local network as well as handle messages from a wider network such as the Internet. This is accomplished by adding a gateway address to the Ethernet communication settings on the controller. Thereby, allowing the controller to send and receive IP messages that are not established inside the local network.

This gateway address is usually assigned to an Ethernet router. Routers provide a way of directing IP traffic to the correct Ethernet device inside the LAN (local area network). Routers come in all shapes and sizes; from a computer (with two NIC cards and routing software) to an off-the-shelf broadband router, both handle the communication traffic pretty much the same way. The most common way of routing network traffic between a LAN and wide area network (WAN) is to use a network address translation (NAT). NAT provides a way of taking a single IP address, supplied by the Internet service provider (ISP), and allowing multiple devices to share the same Internet connection.

Unfortunately, the NAT does not provide a true end-to-end connection. This means, by default, that a TCP connection established outside the local network may not be able to connect with the destination device - due to the fact the IP address of the destination device is hidden behind the router. In order for this type of communication to occur, the process of port forwarding must be used. Port forwarding occurs when communication from outside the network sends a message to the router's IP address; the router determines where to send the packet based on the port number. NAT lack of end-to-end connectivity may be considered a problem in some circumstances but it also provides a simple means of network protection.

Protection

By attaching a programmable logic controller to a network with Internet access, the device will be exposed to all of the same possible security threats as a computer.

One of the best security measures is to select a controller that utilises an embedded operating system not popularly used by the consumer public. This helps keep the PLC from being vulnerable to attackers using known exploits to the operating system because the knowledge base is much smaller. 'Security through obscurity' is the phrase coined by this type of security measure.

In addition, a properly configured router can provide effective protection for the control network from potential attacks. Utilising the lack of end-to-end connectivity prevents most unsolicited requests for communication outside the local area network. When setting up a router, be sure to limit the amount of open ports. For example, an open FTP port can lead to a possible exploit by uploading a program to override the operation of the controller. The best rule of thumb is never keep a port open that is not being used regularly.

For increased protection, a virtual private network (VPN) can be set up to increase the security by encrypting the data transmission when travelling over a public network - such as the Internet. Instead of opening all the ports that are needed to handle communication to the control network, one single authenticated network port passes the encrypted communication so the user can have all of the access as if they were inside the local area network.

Summary

By applying these simple techniques to modern day control networks, new options are available for the control design. Data collection over great distances is one of the best uses for this technology. Control systems can be more easily integrated within a business network for coupling the supply chain management to the factory floor.

For more information contact Paul Bouwer, Shorrock Automation, +27 (0)12 345 4449, [email protected], www.shorrock.co.za



Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Megatech is expanding
PLCs, DCSs & Controllers
Megatech SA has been importing high quality industrial plant equipment and spare parts since 2016. Based in KwaZulu-Natal, the company specialises in electrical and mechanical equipment and instrumentation.

Read more...
Powerful and versatile IIoT controller
ifm - South Africa PLCs, DCSs & Controllers
The IIoT controller from ifm is a powerful, communicative and flexible PLC solution in machine and plant digitalisation.

Read more...
ACTOM Industry to upgrade drive and control system
ACTOM Electrical Machines PLCs, DCSs & Controllers
ACTOM Industry secured an important contract to upgrade the drive and control system of a man-winder at a gold mine in Ghana.

Read more...
Powerful and versatile IIoT controller
ifm - South Africa PLCs, DCSs & Controllers
The IIoT controller from ifm is a powerful, communicative and flexible PLC solution in machine and plant digitalisation.

Read more...
ACTOM Industry to upgrade drive and control system
ACTOM Electrical Machines PLCs, DCSs & Controllers
ACTOM Industry secured an important contract to upgrade the drive and control system of a man-winder at a gold mine in Ghana.

Read more...
MCCs for local and international markets
Iritron PLCs, DCSs & Controllers
With a history of delivering large engineering projects globally, Iritron has over 20 years’ experience in designing motor control centres (MCCs) built to the highest international specifications.

Read more...
Deep learning based component inspection in the automotive industry
Beckhoff Automation PLCs, DCSs & Controllers
Achieving the shortest possible inspection times – even when working with different components – is paramount when it comes to series production. This is precisely what stoba Sondermaschinen achieved with its optical inspection system, which is based on deep learning, and features the Beckhoff XPlanar planar motor system at the conveyor system core.

Read more...
Case history 189: Poor furnace temperature control.
Michael Brown Control Engineering Editor's Choice PLCs, DCSs & Controllers
Many process engineers do not appreciate the importance of flow loops in their unit controls. A senior process engineer once told me that flow loops need not be tuned well, as they generally have little effect on the more important and much slower loops like temperatures and pressures.

Read more...
PLCs and PACs simplify data acquisition
PLCs, DCSs & Controllers
Data acquisition, data logging and data analysis are required functions for most modern industrial control systems. The simplest and lowest cost way to provide these functions is often by using the same platform that’s providing real-time control, namely the PLC or the programmable automation controller.

Read more...
Enhanced perimeter defence solution
Emerson Automation Solutions PLCs, DCSs & Controllers
Emerson is improving perimeter security for the DeltaV distributed control system with its new NextGen Smart Firewall, a purpose-built control system firewall designed to provide easy-to-install and maintain perimeter security for all industries.

Read more...