Skip to main content

Programmable Logic Controllers (PLC) - The Brain behind Industrial Automation




The Start ....

With the advent of industrial age, machines were used to automate process, which were routine in nature. This greatly allowed the reduction in production cost, benefitting the consumers.

Earlier Relay Logic Devices  based on electromagnetism, were used to control machinery. 

Two circuits, one with an open switch and another with a coil of wire, were placed parallel to each other. When current passes through the coil, it produced a magnetic field. This created a force of attraction, and the switch closes. The circuit gets completed, allowing the flow of current. This in turn drives a motor or an actuator.

Being a cost-effective solution, there were still some downsides. The installation part was highly complex. 

A breakthrough came in 1964, when Dick Morely, an American inventor, designed a general-purpose computer to control industrial applications.

Known as Programmable Logic Controllers, or PLC, it brought about a revolution in industrial automation.

What is PLC 

A specialized computer which can perform logical operations, while withstanding harsh environmental conditions like dust, humidity and temperature.

Based on the relay logic technique, switching was done digitally with electronic circuits and coding. This reduced overall complexity and installation overhead.

Ladder Logic is the coding language used. Also C/C++ in certain cases. 

Components

The internal layout of PLC consist of five main components

1. Processor: Dubbed the brain of the computer, the microprocessor performs logical and analytical computations, based on environmental variables

2. Input: The module that receives signals from sensors, or other measuring devices. Can be either analog or digital. This is then passed to the processor.

3. Output: Gets the calculated data from the processor, and converts it to readable signal. This in turn drives a motor, or an actuator.

4. Memory: Split into two divisions, the RAM (Random Access Memory) is used to store temporary data. ROM (Read Only Memory) stores the Operating System and programs, installed by the user.

5. Power Supply:  220V Alternating Current is converted into Direct Current. It is further split into smaller voltages to be fed into different components



The PLC is by definition a Real Time Operating System. The inputs are continuously scanned for any changes, and processor is always on stand by mode. 


More information:

 

Comments

Popular posts from this blog

Virtual Private Network (VPN) - Browsing Anonymous

  Privacy is a major concern when browsing the internet. Your data could be eavesdropped by hackers, companies targeting ads or even rogue state actors. What gets revealed would be personal browsing history, location monitoring, IP addresses to name a few. Enter the tech... Virtual Private Network or simply known as VPN is a technology used to prevent unauthorized access of your private data. Even if a hacker penetrates the network and get hold of data packets, all that is revealed is gibberish.  This is because all the information that passes through your device is encrypted and can be only revealed through a personal key.  Internet Service Provider Before going further, a knowledge of Internet Service Provider (ISP) is needed. They are the backbone of the World Wide Web. ISP provides each device with a unique IP (Internet Protocol) address, bandwidth allocation and network security. When a website is searched, first it goes from your device to the Router or Modem which...

Cyber Stalking - Unwanted Attention

With the advent of digital age, we are more connected than ever. Social media has transcended geographical locations, and no place is out of reach. But with this type of connectivity, there is a rise in the number of antisocial players. Cyber stalking cases has reportedly gone high in recent years.  Stalking is considered as any form of unwanted attention, contact or harassment directed towards an individual. This results in victim's personal space being encroached or taken for granted.  The preparator perform stalking through fake profiles, monitoring social media sites, messages or chat history. They initiate a volley of hate speech or try to tarnish their victim's reputation. Here stalking can be also a form of love addiction. An unrequited love can cause the stalker to perform the above steps as an act of revenge. Mode of Operation Installing a piece of code in the victim's computer for accessing the webcam. The spyware comes bundled with a software which could be do...

Romance Scam - Phishing at its peak

  Technology has brought about a change in how we interact with the world. Online dating, in particular has ushered in a new trend. Providing anonymity and exclusivity, this can act as a double-edged sword or the breeding ground for some conmen.  Modus operandi is simple. Sell a fantasy of everlasting love. In return, empty one's bank deposits and life savings. Out for Love..... Starts with an unsuspicious friend or dating request. The scammer throws his net wide and lures in the victim.  Next a repo is built through online chat and voice calls, appearing casual, and innocent in nature. The victim is made to believe he or she is the center of attention. This follows up with small gifts, to enforce the fantasy. Once trust gets built, the scammer initiates the next phase. The chat becomes more personal, usually in the form of a tragic story, or financial tip.  " Invest in a cryptocurrency which has bright future" or "Lost travel documents and stranded in a foreign land...