=Paper= {{Paper |id=Vol-2843/shortpaper018 |storemode=property |title=Ensuring Safety in the Automation of Equipment Monitoring (short paper) |pdfUrl=https://ceur-ws.org/Vol-2843/shortpaper018.pdf |volume=Vol-2843 |authors=Vyacheslav Trutnev,Gaziz Mingaleev,Vitaliy Babushkin }} ==Ensuring Safety in the Automation of Equipment Monitoring (short paper)== https://ceur-ws.org/Vol-2843/shortpaper018.pdf
            Ensuring Safety in the Automation of Equipment
                              Monitoring*

                Trutnev Vyacheslav1, Mingaleev Gaziz2 and Babushkin Vitaliy2
        1
         Abak-Service LLC, 159, Adelya Kutuya street, Kazan, 420073, Russian Federation
                               vtrutnev@abak-service.ru
    2
      Federal State Budgetary Educational Institution of Higher Education “Kazan National Re-
    search Technical University named after A.N. Tupolev–KAI”, 10, Karl Marx Street, Kazan,
                                  420111, Russian Federation
                                    kafedra@eupkai.ru




            Abstract. The article deals with safety issues that need to be addressed when
            working with monitoring systems when working on equipment at an industrial
            enterprise. The organizational and technical tasks that the monitoring system
            solves at industrial enterprises are outlined. The requirements for monitoring
            systems of equipment operating at an industrial enterprise in the conditions of
            industrial workshops are investigated. An approach to the boundaries of the
            monitoring system, including the project documentation used in the implemen-
            tation of the system, is formed, and attention is paid to the graphic part. The is-
            sues of the technical part and the software component of the monitoring system
            are taken into account. The ways of user interaction with the monitoring system
            are shown, including user authorization and authorization on the server. Special
            attention is paid to the information flows formed in the system, which allows
            you to form restrictions on access to the system by unauthorized persons. The
            indicators used in the monitoring system are given.

            Keywords: Enterprise automation, Production planning, Production monitor-
            ing.


1           Introduction

1.1         A Subsection Sample
The main task of the equipment operation monitoring system is to independently fix
the equipment useful operation time and the ability to control the equipment operation
efficiency in an automated mode without human intervention. The second task of the
monitoring system is to collect statistical data on the causes of equipment downtime
and makes it possible to analyze the causes of productivity losses, develop and im-


*
    Copyright © 2021 for this paper by its authors. Use permitted under Creative Commons License Attribu-
tion 4.0 International (CC BY 4.0).
plement corrective measures to eliminate them [1-3]. The third task is analytical sup-
port in making operational decisions on the management of production processes [4-
7].
    Functioning in the infocommunication network of an enterprise, the security re-
quirements for the monitoring system used become more important [4; 7-10].


2      Materials and methods

Among the main requirements for software and hardware systems for planning and
monitoring production processes, the following can be distinguished:
─ The monitoring system software must be located on the enterprise server;
─ The server part of the monitoring system must be located on the servers of the
  enterprise;
─ The monitoring system should be able to distribute access rights among employ-
  ees;
─ The total number of users connected to the system should not be limited;
─ Data should be accumulated on the server without overwriting the previously re-
  corded ones. The data must be stored indefinitely;
─ The system should return the requested data upon request from the client applica-
  tion or from the web client.

   Also among the requirements are real-time monitoring and possible integration
with other enterprise systems.


3      Results

Computer equipment and critical network equipment should be placed in lockable
cabinets that restrict access to unauthorized persons; when the doors of the industrial
and technological complex cabinets are opened, an alarm should be displayed at the
operator's workplace. System blocks of Automated Work Places (AWPs) of operators
should be placed in lockable cabinets.
   Firewalls must be provided at the border of machines with a Data Exchange Server
(DES). As a firewall, a specialized software and hardware FireWall (FW) should be
used that controls all information exchange with the DES. Only the ports and services
required to access these machines should be open on the firewall. All other ports and
services must be blocked.
   A demilitarized zone must be applied between the machines and the Local Area
Network (LAN).
   Direct access from the corporate network to the LAN of the machines should be
excluded - access should be carried out only through the DES (the machines must
transmit data by referring to the DES). The rules for adjusting the FW must be agreed
and documented.
   On the LAN of machines, the following should be prohibited:
─ remote access to machine tools for technical support of system and applied soft-
  ware (SW);
─ access to machine tools from public information networks, for example, the Inter-
  net;
─ Internet access services and e-mail;
─ direct access to the corporate network.

   During implementation, specialists need to provide all the necessary equipment
(including cabinets, cables) and software for transferring parameters from machines to
the monitoring center. The list of parameters that need to be transferred are developed
at the stage of collection of initial data and are agreed with the specialists of the en-
terprise.
   The section of the project documentation on information security should contain:
─ description of the object of protection;
─ information security threat model;
─ model of a potential illegal intruder;
─ description of the technical means complex;
─ solutions for ensuring information security, including solutions for access control,
  security audit, protection of machine storage media, ensuring integrity, ensuring
  availability, anti-virus protection, protecting the automated system and its compo-
  nents, etc.;
─ specifications of equipment and software for the information security subsystem.

    All decisions must be sufficient and justified in accordance with the results ob-
tained in the process of analyzing current threats to information security and potential
illegal intruder.
    The graphic part of the section should include:
─ structural diagram of a technical means complex for information protection, super-
  imposed on the corresponding diagrams of the information and technological infra-
  structure of the object, communication systems, etc. The diagram should clearly
  highlight the computer equipment and information security equipment installed or
  modified within the framework of the project;
─ diagram of information interaction of machine tools with external systems;
─ diagram of the functional structure of the information security subsystem.

   As a result, the main requirements for the safety of the industrial equipment moni-
toring system were formulated.


4      Discussion

Ensuring safety when working in the equipment planning and monitoring system is
carried out in the following three areas.
   1) User (client) authorization:
─ Only a user (client) with an MS Windows account and access to the enterprise
  information network can start the Dispatcher's AWP;
─ The user works only with the interface of the Dispatcher's AWP, which does not
  have any functionality to influence the operation of both equipment and the moni-
  toring system;
─ In the basic configuration, user authentication is disabled. If an unauthorized per-
  son has access to the user's computer, the Dispatcher's AWP can be launched;
─ If user authentication is enabled (with an MS Windows account), when starting the
  Dispatcher's AWP, the client's rights to work with the monitoring system are
  checked, and in the absence of such rights, access to the Dispatcher's AWP is not
  possible;
─ To work with the monitoring unit, the operator must be authorized, while he has no
  opportunity to influence the operation of the equipment through the monitoring
  system.

  2) Server authorization:
─ Only the system administrator has access to the server;
─ When working with the Dispatcher's AWP, the user (client) has no opportunity to
  influence the operation of both the equipment and the server;
─ Only monitoring services operate on the server, which are not able to influence the
  operation of the equipment.

  3) Information flows in the monitoring system:
─ The information flow from the server to the machine is a request for the state of the
  equipment using the library of the equipment control system without the possibility
  of controlling the equipment;
─ The information flow from the machine to the server is the response to the system's
  request for the equipment status;
─ The information flow from the monitoring unit to the server is the result of the
  operator's actions on the monitoring unit (authorization, entering the reason for
  downtime, etc.) without the possibility of controlling the equipment;
─ The information flow from the server to the monitoring unit is confirmation or
  non-confirmation of operator authorization;
─ The information flow from the Dispatcher's AWP to the server is one request (at
  the first start of the Dispatcher's AWP) about the state of the equipment in real time
  without the possibility of controlling the equipment and a request for generating a
  report;
─ The information flow from the server to the Dispatcher's AWP is the result of a
  change in the state of the equipment in real time and a response to a user's request
  for generating a report. Set-up takes quite a long time, which is 30 % of the total
  time, or more than half of the processing time. Consequently, reducing the time of
  production losses when setting up equipment can significantly increase the propor-
  tion of processing.

  The general diagram of data transmission in the system is shown in Figure 1.
             Fig. 1. Data transfer diagram in the equipment monitoring system.


   Noting the data transfer structure shown in Figure 1, the parameters of the gener-
ated indicators, summarized in Table 1, should be highlighted.
   The values of the indicators indicated in Table 3 allow to generate various tabular
and graphical reports indicating the dynamics of key values. From the values of tech-
nological modes (feed, speed), economic indicators are identified, which are set indi-
vidually for each type of equipment.


5      Conclusion

If the safety requirements of the equipment monitoring system are met, the managers
and specialists of the enterprise receive objective data for making management deci-
sions.
    The management assesses the Overall Equipment Efficiency (OEE), monitors the
dynamic indicators of the equipment efficiency, receives data on the onset of a condi-
tion or violation of technological modes (sms, e-mail).
    The technological service receives data on the equipment operation for the selected
period in the context of production-equipment-operator-detail-operation-modes of
processing-machine time-reasons for stops-program frames-tool, which was used for
processing. In addition, it is possible to track the change in the NC program, the dura-
tion of stops during NC execution, the NC execution time, pauses between NC starts,
program blocks.
  The equipment maintenance service is promptly informed about the number, type
and frequency of equipment breakdowns.


                      Table 1. Indicators’ parameters and their statuses.

          Indicators’ parameters                                   Status
Parts processing time                       Work on the program
                                            Manual operation
Planned downtime                            Lunch
                                            Personal needs
Unplanned downtime
1) Downtime due to setup               Adjustment / Installation
                                       Correction of the control program
                                       Cleaning the machine
                                       Working with a technologist
                                       Quality control department check
                                       Control measurements by the operator
2) Downtime                            Machine downtime
                                       Waiting for the slinger
                                       Lack of control program
                                       Waiting for a decision on the defect
                                       Lack of detail
                                       Cycle (service state)
                                       Machine stopped
                                       The program is over
                                       Machine is on
3) Downtime due to repair              Failure
                                       Waiting for repair
                                       Unplanned repair
                                       Planned repair
4) Downtime due to assembly or lack of Assembling the tool
tools
                                       Lack of tool
5) Lack of work shift                  Lack of work shift
                                       The machine is switched off without giving any
                                       reason
Amending of defects                    Amending of defects


References
 1. Valitov S.M., Mingaleev G.F., Khadeev N.R., Antonova N.V.: Methods to assess eco-
    nomic loss while implementing energy saving programs in oil-production enterprises.
    Mediter-ranean Journal of Social Sciences, 6(3), 766-769 (2019).
 2. Shleymovich M.P., Medvedev M.V., Lyasheva S.A.: Contour segmentation based on im-
    age points energy estimation in object and processes control systems. 2017 International
    Conference on Industrial Engineering, Applications and Manufacturing, ICIEAM 2017 -
    Proceedings, 8076422 (2017).
 3. Nadreeva L., Gaynutdinova J., Rakhimova G.: Productivity and motivation of employees
    in the services sector. Proceedings of the 27th International Business Information Manage-
    ment Association Conference - Innovation Management and Education Excellence Vision
    2020: From Regional Development Sustainability to Global Economic Growth, IBIMA
    1211-1219 (2016).
 4. Snegurenko A.P., Sosnovsky S.A., Novikova S.V., Yakhina R.R., Valitova N.L., Krem-
    leva E.Sh.: Using E-Learning Tools to Enhance Students-Mathematicians’ Сompetences in
    the Сontext of International Academic Mobility Programmes. Integratsiya obrazovaniya =
    Integration of Education, 23(1), 8-22 (2019).
 5. Bikmullin A.L., Pavlov B.P., Zufar K.K.: Analyzing accuracy and sensitivity in forecast-
    ing at the variant level. Espacios, 38, 49, 9 (2017).
 6. Shleymovich M.P., Medvedev M.V., Lyasheva S.A.: Object detection in the images in in-
    dustrial process control systems based on salient points of wavelet transform analysis.
    2016 2nd International Conference on Industrial Engineering, Applications and Manufac-
    turing, ICIEAM 2016 - Proceedings, 7911633 (2016).
 7. Nadreeva L., Abramov V.: Problems and directions for improving labor rating. Proceed-
    ings of the 30th International Business Information Management Association Conference,
    IBIMA 2017 - Vision 2020: Sustainable Economic development, Innovation Management,
    and Global Growth, 1184-1190 (2017).
 8. Bakeev M., Nikolaeva A., Safargaliev M., Garifullin R., Nefedova J.: Factors of corruption
    on the firm level Influence of level of development of innovative potential of region on re-
    sults of innovative activity. Proceedings of the International conference "Economy in the
    modern world", 17-22 (2018).
 9. Butov G., Nadreeva L., Abramov V: Digitalization and digital transformation of human re-
    source management in Russia. Proceedings of the 33rd International Business Information
    Management Association Conference, Education Excellence and Innovation Management
    through Vision, 1514-1520 (2019).
10. Lyasheva S., Shleymovich M., Shakirzyanov R.: The Image Analysis Using Fast Radial
    Symmetry Transform in Control Systems Base on the Computer Vision. 2019 International
    Multi-Conference on Industrial Engineering and Modern Technologies, FarEastCon 2019,
    8934298 (2019).
11. Dmitriev O.N., Novikov S.V. Optimizing the economic information transparency level of
    high-tech enterprises in the post-industrial globalized economy. Moscow (2019).