=Paper=
{{Paper
|id=Vol-2843/shortpaper018
|storemode=property
|title=Ensuring Safety in the Automation of Equipment Monitoring (short paper)
|pdfUrl=https://ceur-ws.org/Vol-2843/shortpaper018.pdf
|volume=Vol-2843
|authors=Vyacheslav Trutnev,Gaziz Mingaleev,Vitaliy Babushkin
}}
==Ensuring Safety in the Automation of Equipment Monitoring (short paper)==
Ensuring Safety in the Automation of Equipment
Monitoring*
Trutnev Vyacheslav1, Mingaleev Gaziz2 and Babushkin Vitaliy2
1
Abak-Service LLC, 159, Adelya Kutuya street, Kazan, 420073, Russian Federation
vtrutnev@abak-service.ru
2
Federal State Budgetary Educational Institution of Higher Education “Kazan National Re-
search Technical University named after A.N. Tupolev–KAI”, 10, Karl Marx Street, Kazan,
420111, Russian Federation
kafedra@eupkai.ru
Abstract. The article deals with safety issues that need to be addressed when
working with monitoring systems when working on equipment at an industrial
enterprise. The organizational and technical tasks that the monitoring system
solves at industrial enterprises are outlined. The requirements for monitoring
systems of equipment operating at an industrial enterprise in the conditions of
industrial workshops are investigated. An approach to the boundaries of the
monitoring system, including the project documentation used in the implemen-
tation of the system, is formed, and attention is paid to the graphic part. The is-
sues of the technical part and the software component of the monitoring system
are taken into account. The ways of user interaction with the monitoring system
are shown, including user authorization and authorization on the server. Special
attention is paid to the information flows formed in the system, which allows
you to form restrictions on access to the system by unauthorized persons. The
indicators used in the monitoring system are given.
Keywords: Enterprise automation, Production planning, Production monitor-
ing.
1 Introduction
1.1 A Subsection Sample
The main task of the equipment operation monitoring system is to independently fix
the equipment useful operation time and the ability to control the equipment operation
efficiency in an automated mode without human intervention. The second task of the
monitoring system is to collect statistical data on the causes of equipment downtime
and makes it possible to analyze the causes of productivity losses, develop and im-
*
Copyright © 2021 for this paper by its authors. Use permitted under Creative Commons License Attribu-
tion 4.0 International (CC BY 4.0).
plement corrective measures to eliminate them [1-3]. The third task is analytical sup-
port in making operational decisions on the management of production processes [4-
7].
Functioning in the infocommunication network of an enterprise, the security re-
quirements for the monitoring system used become more important [4; 7-10].
2 Materials and methods
Among the main requirements for software and hardware systems for planning and
monitoring production processes, the following can be distinguished:
─ The monitoring system software must be located on the enterprise server;
─ The server part of the monitoring system must be located on the servers of the
enterprise;
─ The monitoring system should be able to distribute access rights among employ-
ees;
─ The total number of users connected to the system should not be limited;
─ Data should be accumulated on the server without overwriting the previously re-
corded ones. The data must be stored indefinitely;
─ The system should return the requested data upon request from the client applica-
tion or from the web client.
Also among the requirements are real-time monitoring and possible integration
with other enterprise systems.
3 Results
Computer equipment and critical network equipment should be placed in lockable
cabinets that restrict access to unauthorized persons; when the doors of the industrial
and technological complex cabinets are opened, an alarm should be displayed at the
operator's workplace. System blocks of Automated Work Places (AWPs) of operators
should be placed in lockable cabinets.
Firewalls must be provided at the border of machines with a Data Exchange Server
(DES). As a firewall, a specialized software and hardware FireWall (FW) should be
used that controls all information exchange with the DES. Only the ports and services
required to access these machines should be open on the firewall. All other ports and
services must be blocked.
A demilitarized zone must be applied between the machines and the Local Area
Network (LAN).
Direct access from the corporate network to the LAN of the machines should be
excluded - access should be carried out only through the DES (the machines must
transmit data by referring to the DES). The rules for adjusting the FW must be agreed
and documented.
On the LAN of machines, the following should be prohibited:
─ remote access to machine tools for technical support of system and applied soft-
ware (SW);
─ access to machine tools from public information networks, for example, the Inter-
net;
─ Internet access services and e-mail;
─ direct access to the corporate network.
During implementation, specialists need to provide all the necessary equipment
(including cabinets, cables) and software for transferring parameters from machines to
the monitoring center. The list of parameters that need to be transferred are developed
at the stage of collection of initial data and are agreed with the specialists of the en-
terprise.
The section of the project documentation on information security should contain:
─ description of the object of protection;
─ information security threat model;
─ model of a potential illegal intruder;
─ description of the technical means complex;
─ solutions for ensuring information security, including solutions for access control,
security audit, protection of machine storage media, ensuring integrity, ensuring
availability, anti-virus protection, protecting the automated system and its compo-
nents, etc.;
─ specifications of equipment and software for the information security subsystem.
All decisions must be sufficient and justified in accordance with the results ob-
tained in the process of analyzing current threats to information security and potential
illegal intruder.
The graphic part of the section should include:
─ structural diagram of a technical means complex for information protection, super-
imposed on the corresponding diagrams of the information and technological infra-
structure of the object, communication systems, etc. The diagram should clearly
highlight the computer equipment and information security equipment installed or
modified within the framework of the project;
─ diagram of information interaction of machine tools with external systems;
─ diagram of the functional structure of the information security subsystem.
As a result, the main requirements for the safety of the industrial equipment moni-
toring system were formulated.
4 Discussion
Ensuring safety when working in the equipment planning and monitoring system is
carried out in the following three areas.
1) User (client) authorization:
─ Only a user (client) with an MS Windows account and access to the enterprise
information network can start the Dispatcher's AWP;
─ The user works only with the interface of the Dispatcher's AWP, which does not
have any functionality to influence the operation of both equipment and the moni-
toring system;
─ In the basic configuration, user authentication is disabled. If an unauthorized per-
son has access to the user's computer, the Dispatcher's AWP can be launched;
─ If user authentication is enabled (with an MS Windows account), when starting the
Dispatcher's AWP, the client's rights to work with the monitoring system are
checked, and in the absence of such rights, access to the Dispatcher's AWP is not
possible;
─ To work with the monitoring unit, the operator must be authorized, while he has no
opportunity to influence the operation of the equipment through the monitoring
system.
2) Server authorization:
─ Only the system administrator has access to the server;
─ When working with the Dispatcher's AWP, the user (client) has no opportunity to
influence the operation of both the equipment and the server;
─ Only monitoring services operate on the server, which are not able to influence the
operation of the equipment.
3) Information flows in the monitoring system:
─ The information flow from the server to the machine is a request for the state of the
equipment using the library of the equipment control system without the possibility
of controlling the equipment;
─ The information flow from the machine to the server is the response to the system's
request for the equipment status;
─ The information flow from the monitoring unit to the server is the result of the
operator's actions on the monitoring unit (authorization, entering the reason for
downtime, etc.) without the possibility of controlling the equipment;
─ The information flow from the server to the monitoring unit is confirmation or
non-confirmation of operator authorization;
─ The information flow from the Dispatcher's AWP to the server is one request (at
the first start of the Dispatcher's AWP) about the state of the equipment in real time
without the possibility of controlling the equipment and a request for generating a
report;
─ The information flow from the server to the Dispatcher's AWP is the result of a
change in the state of the equipment in real time and a response to a user's request
for generating a report. Set-up takes quite a long time, which is 30 % of the total
time, or more than half of the processing time. Consequently, reducing the time of
production losses when setting up equipment can significantly increase the propor-
tion of processing.
The general diagram of data transmission in the system is shown in Figure 1.
Fig. 1. Data transfer diagram in the equipment monitoring system.
Noting the data transfer structure shown in Figure 1, the parameters of the gener-
ated indicators, summarized in Table 1, should be highlighted.
The values of the indicators indicated in Table 3 allow to generate various tabular
and graphical reports indicating the dynamics of key values. From the values of tech-
nological modes (feed, speed), economic indicators are identified, which are set indi-
vidually for each type of equipment.
5 Conclusion
If the safety requirements of the equipment monitoring system are met, the managers
and specialists of the enterprise receive objective data for making management deci-
sions.
The management assesses the Overall Equipment Efficiency (OEE), monitors the
dynamic indicators of the equipment efficiency, receives data on the onset of a condi-
tion or violation of technological modes (sms, e-mail).
The technological service receives data on the equipment operation for the selected
period in the context of production-equipment-operator-detail-operation-modes of
processing-machine time-reasons for stops-program frames-tool, which was used for
processing. In addition, it is possible to track the change in the NC program, the dura-
tion of stops during NC execution, the NC execution time, pauses between NC starts,
program blocks.
The equipment maintenance service is promptly informed about the number, type
and frequency of equipment breakdowns.
Table 1. Indicators’ parameters and their statuses.
Indicators’ parameters Status
Parts processing time Work on the program
Manual operation
Planned downtime Lunch
Personal needs
Unplanned downtime
1) Downtime due to setup Adjustment / Installation
Correction of the control program
Cleaning the machine
Working with a technologist
Quality control department check
Control measurements by the operator
2) Downtime Machine downtime
Waiting for the slinger
Lack of control program
Waiting for a decision on the defect
Lack of detail
Cycle (service state)
Machine stopped
The program is over
Machine is on
3) Downtime due to repair Failure
Waiting for repair
Unplanned repair
Planned repair
4) Downtime due to assembly or lack of Assembling the tool
tools
Lack of tool
5) Lack of work shift Lack of work shift
The machine is switched off without giving any
reason
Amending of defects Amending of defects
References
1. Valitov S.M., Mingaleev G.F., Khadeev N.R., Antonova N.V.: Methods to assess eco-
nomic loss while implementing energy saving programs in oil-production enterprises.
Mediter-ranean Journal of Social Sciences, 6(3), 766-769 (2019).
2. Shleymovich M.P., Medvedev M.V., Lyasheva S.A.: Contour segmentation based on im-
age points energy estimation in object and processes control systems. 2017 International
Conference on Industrial Engineering, Applications and Manufacturing, ICIEAM 2017 -
Proceedings, 8076422 (2017).
3. Nadreeva L., Gaynutdinova J., Rakhimova G.: Productivity and motivation of employees
in the services sector. Proceedings of the 27th International Business Information Manage-
ment Association Conference - Innovation Management and Education Excellence Vision
2020: From Regional Development Sustainability to Global Economic Growth, IBIMA
1211-1219 (2016).
4. Snegurenko A.P., Sosnovsky S.A., Novikova S.V., Yakhina R.R., Valitova N.L., Krem-
leva E.Sh.: Using E-Learning Tools to Enhance Students-Mathematicians’ Сompetences in
the Сontext of International Academic Mobility Programmes. Integratsiya obrazovaniya =
Integration of Education, 23(1), 8-22 (2019).
5. Bikmullin A.L., Pavlov B.P., Zufar K.K.: Analyzing accuracy and sensitivity in forecast-
ing at the variant level. Espacios, 38, 49, 9 (2017).
6. Shleymovich M.P., Medvedev M.V., Lyasheva S.A.: Object detection in the images in in-
dustrial process control systems based on salient points of wavelet transform analysis.
2016 2nd International Conference on Industrial Engineering, Applications and Manufac-
turing, ICIEAM 2016 - Proceedings, 7911633 (2016).
7. Nadreeva L., Abramov V.: Problems and directions for improving labor rating. Proceed-
ings of the 30th International Business Information Management Association Conference,
IBIMA 2017 - Vision 2020: Sustainable Economic development, Innovation Management,
and Global Growth, 1184-1190 (2017).
8. Bakeev M., Nikolaeva A., Safargaliev M., Garifullin R., Nefedova J.: Factors of corruption
on the firm level Influence of level of development of innovative potential of region on re-
sults of innovative activity. Proceedings of the International conference "Economy in the
modern world", 17-22 (2018).
9. Butov G., Nadreeva L., Abramov V: Digitalization and digital transformation of human re-
source management in Russia. Proceedings of the 33rd International Business Information
Management Association Conference, Education Excellence and Innovation Management
through Vision, 1514-1520 (2019).
10. Lyasheva S., Shleymovich M., Shakirzyanov R.: The Image Analysis Using Fast Radial
Symmetry Transform in Control Systems Base on the Computer Vision. 2019 International
Multi-Conference on Industrial Engineering and Modern Technologies, FarEastCon 2019,
8934298 (2019).
11. Dmitriev O.N., Novikov S.V. Optimizing the economic information transparency level of
high-tech enterprises in the post-industrial globalized economy. Moscow (2019).