PRODUCTS CATEGORY
HOT PRODUCT
Contact Us
- josephine@seeiyo.com
-
Wechat,Telegram,Line,
Whatsapp:+8618030983224 - Skype:1004611300@qq.com
TRICONEX safety-instrumented system (SIS)
Description
.Many products are not yet on the shelves please contact us for more products
.If there is any inconsistency between the product model and the picture on display, the model shall prevail. Contact us for the specific product picture, and we will arrange to take photos in the warehouse for confirmation
.We have 16 shared warehouses around the world, so please understand that it can sometimes take several hours to accurately return to you. Of course, we will respond to your concerns as soon as possible
Modern industrial processes tend to be technically complex, involve substantial energies, and have the potential to inflict serious harm to persons or property during a mishap.
The IEC 61508 standard defines safety as “freedom from unacceptable risk.” In other words,
absolute safety can never be achieved; risk can only be reduced to an acceptable level.Safety methods to mitigate harm and reduce risk include:
• Changing the process or mechanical design, including plant or equipment layout
• Increasing the mechanical integrity of equipment
• Improving the basic process control system (BPCS)
• Developing additional or more detailed training procedures for operations and maintenance
• Increasing the testing frequency of critical components
• Using a safety-instrumented system (SIS)
• Installing mitigating equipment to reduce harmful consequences; for example, explosion walls, foams, impoundments, and pressure relief systems
SIS Factors
According to the ANSI/ISA S84.01 and IEC 61508 standards, the scope of an SIS is restricted to the instrumentation or controls that are responsible for bringing a process to a safe state in the event of a failure. The availability of an SIS is dependent upon:
• Failure rates and modes of components
• Installed instrumentation
• Redundancy
• Voting
• Diagnostic coverage
• Testing frequency
SIL Factors
An SIL can be considered a statistical representation of the availability of an SIS at the time of a process demand. A process demand is defined as the occurrence of a process deviation that causes an SIS to transition a process to a safe state.
An SIL is the litmus test of acceptable SIS design and includes the following factors:
• Device integrity
• Diagnostics
• Systematic and common cause failures
• Testing
• Operation
• Maintenance
In modern applications, a programmable electronic system (PES) is used as the core of an SIS.
The Tri-GP controller is a state-of-the-art PES optimized for safety-critical applications.
Safety Life Cycle Model
The necessary steps for designing an SIS from conception through decommissioning are described in the safety life cycle.
Before the safety life cycle model is implemented, the following requirements should be met:
• Complete a hazard and operability study
• Determine the SIS requirement
• Determine the target SIL
Developing an SIS Using the Safety Life Cycle
1 Develop a safety requirement specification (SRS).
An SRS consists of safety functional requirements and safety integrity requirements. An SRS can be a collection of documents or information.Safety functional requirements specify the logic and actions to be performed by an SIS and the process conditions under which actions are initiated. These requirements include such items as consideration for manual shutdown, loss of energy source, etc.
Safety integrity requirements specify a SIL and the performance required for executing SIS functions. Safety integrity requirements include:
• Required SIL for each safety function
• Requirements for diagnostics
• Requirements for maintenance and testing
• Reliability requirements if the spurious trips are hazardous2 Develop the conceptual design, making sure to:
• Define the SIS architecture to ensure the SIL is met (for example, voting 1oo1, 1oo2, 2oo2, 2oo3).
• Define the logic solver to meet the highest SIL (if different SIL levels are required in a single logic solver).
• Select a functional test interval to achieve the SIL.
• Verify the conceptual design against the SRS.
3 Develop a detailed SIS design including:
• General requirements
• SIS logic solver
• Field devices
• Interfaces
• Energy sources
• System environment
• Application logic requirements
• Maintenance or testing requirements
Some key ANSI/ISA S84.01 requirements are:
• The logic solver shall be separated from the basic process control system (BPCS).
• Sensors for the SIS shall be separated from the sensors for the BPCS.
• The logic system vendor shall provide MTBF data and the covert failure listing, including the frequency of occurrence of identified covert failures.
• Each individual field device shall have its own dedicated wiring to the system I/O. Using a field bus is not allowed!
• The operator interface may not be allowed to change the SIS application software.
• Maintenance overrides shall not be used as a part of application software or operating procedures.
• When online testing is required, test facilities shall be an integral part of the SIS design.
4 Develop a pre-start-up acceptance test procedure that provides a fully functional test of the SIS to verify conformance with the SRS.
5 Before startup, establish operational and maintenance procedures to ensure that the SIS functions comply with the SRS throughout the SIS operational life, including:
• Training
• Documentation
• Operating procedures
• Maintenance program
• Testing and preventive maintenance
• Functional testing
• Documentation of functional testing
6 Before start-up, complete a safety review.
7 Define procedures for the following:
• Start-up
• Operations
• Maintenance, including administrative controls and written procedures that ensure safety if a process is hazardous while an SIS function is being bypassed
• Training that complies with national regulations (such as OSHA 29 CFR 1910.119)
• Functional testing to detect covert faults that prevent the SIS from operating according to the SRS
• SIS testing, including sensors, logic solver, and final elements (such as shutdown valves, motors, etc.) 8 Follow management of change (MOC) procedures to ensure that no unauthorized changes are made to an application, as mandated by OSHA 29 CFR 1910.119.
9 Decommission an SIS before its permanent retirement from active service, to ensure proper review.
Applicable Industry
All Safety Systems
These general guidelines apply to all user-written safety applications and procedures:
• A design-change review, code-change review, and functional testing are recommended to verify the correct design and operation.
• After a safety system is commissioned, no changes to the system software (operating system, I/O drivers, diagnostics, etc.) are allowed without type approval and re commissioning. Any changes to the application or the control application should be
made under strict change-control procedures. For more information on change-control procedures, see Project Change and Control on page 23. All changes should be
thoroughly reviewed, audited, and approved by a safety change control committee or group. After an approved change is made, it should be archived.
• In addition to printed documentation of the application, two copies of the application should be archived on an electronic medium that is write-protected to avoid accidental changes.
• Under certain conditions, a PES may be run in a mode that allows an external computer or operator station to write to system attributes. This is normally done by means of a communication link. The following guidelines apply to writes of this type:
— The communication link should use Modbus or other approved protocols with CRC checks.
— The communication link should not be allowed to write directly to output points.
— The application must check the value (of each variable written) for a valid range or limit before its use.
— For information on the potential impacts of writes to safety-related variables that result in disabling diagnostics such as Output Voter Diagnostics, see Module Diagnostics on page 36.
• PID and other control algorithms should not be used for safety-related functions. Each control function should be checked to verify that it does not provide a safety-related function.
• Pointers should not be used for safety-related functions. For TriStation 1131 applications, this includes the use of VAR_IN_OUT variables.
• An SIS PES should be wired and grounded according to the procedures defined by the manufacturer.
Emergency Shutdown Systems
The safe state of the plant should be a de-energized or low (0) state.
All power supplies should be monitored for proper operation.
Burner Management Systems
The safe state of the plant is a de-energized or low (0) state.
When a safety system is required to conform to the EN 50156 standard for electrical equipment for furnaces, PES throughput time should ensure that a safe shutdown can be performed within one second after a problem in the process is detected.
Fire and Gas Systems
Fire and gas applications should operate continuously to provide protection. The following industry guidelines apply:
• If inputs and outputs are energized to mitigate a problem, a PES system should detect and alarm open and short circuits in the wiring between the PES and the field devices.
• An entire PES system should have redundant power supplies. Also, the power supplies that are required to activate critical outputs and read safety-critical inputs should be redundant. All power supplies should be monitored for proper operation.
• De-energized outputs may be used for normal operation. To initiate action to mitigate a problem, the outputs are energized. This type of system shall monitor the critical output circuits to ensure that they are properly connected to the end devices.
Safety-Critical Modules
It is recommended that only the following modules be used for safety-critical applications:
• Main Processor Module
• Communication Module (only when using protocols defined for safety-critical applications)
• Analog Input Module
• Analog Input/Digital Input Module
• Analog Output Modules
• Digital Input Modules
• Digital Output Modules
• Pulse Input Module
The Solid-State Relay Output Module is recommended for non-safety-critical points only.
Safety-Shutdown
A safety application should include a network that initiates a safe shutdown of the process being controlled when a controller operates in a degraded mode for a specified maximum time. The Triconex Library provides two function blocks to simplify programming a safety-shutdown application: SYS_SHUTDOWN and SYS_CRITICAL_IO. To see the Structured Text code for these function blocks, see Appendix C, Safety-Critical Function Blocks. For more information on safety-shutdown networks, see Sample Safety-Shutdown Programs on page 49.
Response Time and Scan Time
Scan time must be set below 50 percent of the required response time. If scan time is greater than 50 percent, an alarm should be available.
Disabled Points Alarm
A project should not contain disabled points unless there is a specific reason for disabling them, such as initial testing. An alarm should be available to alert the operator that a point is disabled.
Disabled Output Voter Diagnostic
For safety programs, disabling the Output Voter Diagnostics is not recommended; however, if it is required due to process interference concerns, it can be done if, and only if, the DO is proof tested every three to six months.
Download All at Completion of Project
When development and testing of a safety application is completed, use the Download All command on the Controller Panel to completely re-load the application to the controller.
Modbus Master Functions
Modbus Master functions are designed for use with non-critical I/O points only. These functions should not be used for safety-critical I/O points or for transferring safety-critical data using the MBREAD and MBWRITE functions.
Triconex Peer-to-Peer Communication
Triconex Peer-to-Peer communication enables Triconex controllers (also referred to as nodes) to send and receive information. You should use a redundant Peer-to-Peer network for safety critical data. If a node sends critical data to another node that makes safety-related decisions, you must ensure that the application on the receiving node can determine whether it has received new data.
If new data is not received within the time-out period (equal to half of the process-tolerance time), the application on the receiving node should be able to determine the action to take. The specific actions depend on the unique safety requirements of your process. The following sections summarize actions typically required by Peer-to-Peer send and receive functions.
Basic Triconex Peer-to-Peer Network
Safety-Critical Function Blocks
3006 | Main processor module |
3007 | Main processor module |
3008 | Main processor module |
3009 | Main processor module |
3501E/T | 115 Vac/Vdc Digital Input |
3502E | 48 Vac/Vdc Digital Input |
3503E | 24 Vac/Vdc Digital Input |
3504E | 24/48 Vdc Digital Input |
3505E | 24 Vdc Digital Input |
3564 | 24 Vdc Digital Input (simplex) |
3506X | 24 Vdc Supervised Digital Input |
3511 | Pulse Input |
3506X | 24 Vdc Supervised Digital Input |
3515 | Pulse Totalizer |
3601E/T | 115 Vac Digital Output |
3603B/E/T | 120 Vdc Digital Output |
3604E | 24 Vdc Digital Output |
3607E | 48 Vdc Digital Output |
3611E | 115 Vac Digital Output |
3617E | 48 Vdc Supervised Digital Output |
3623E/T | 120 Vdc Digital Output |
3624 | 24 Vdc Supervised Digital Output |
3625 | 24 Vdc Digital Output |
3664 | 24 Vdc Digital Output (Dual) |
3626X | 24 Vdc Supervised Digital Output |
3674 | 24 Vdc Digital Output (Dual) |
3636R/T | Relay Output |
3701 | 0-10 Vdc Analog Input |
3722X | 0-5 Vdc Analog Input |
3723X | 0-5 Vdc Analog Input + Hart |
3703E | 0-5, 0-10 Vdc Analog Input |
3704E | 0-5, 0-10 Vdc (HD) Analog Input |
3706A | Thermocouple Analog Input |
3708E | Thermocouple Analog Input |
3720 | 0-5 Vdc Analog Input |
3721 | 0 to 5 or –5 to +5 Vdc Analog Input |
3805E/H | 4-20 mA Analog Output |
3806E | 4-20 mA and 20-320 mA Analog Output |
3807 | -60 to +60 mA Bipolar Analog Output |
3825X | 0-20 mA Analog Output |
3901X | 24 Vdc Supervised Universal I/O |
4355X | TCM Module |
4610X | UCM Module |
4351B | TCM Module (Copper) |
4352B | TCM Module (Fiber) |
4610 | UCM Module |
Tricon devices are certified for use in Marine environments | www.seeiyo.com |
8110C | Main box 8110 |
8111C | Expansion Chassis 8111 |
8112C | Remote Expansion Chassis 8112 |
8310C | High-density power module, 120 V 8310 |
8311C | High-density power module, 24 VDC 8311 |
8312C | High-density power module, 230VAC 8312 |
3008C | enhanced main processor III, 16Mb 3008 |
4200C | Remote Extender module 4200 |
4200-3C | Remote Extender module (set) 4200-3 |
4201C | Remote Extender module 4201 |
4201-3C | Remote Extender Module |
4351BC | Tricon Communication Module (TCM), copper 4351B |
4352BC | Tricon Communication module (TCM), optical fiber 4352B |
4353C | Tricon Communication module (TCM), embedded OPC server |
4354C | Tricon Communication module (TCM), embedded OPC server |
HART compatible chassis
The HART compatible chassis provide only power, ground, and field connections to interface modules. They do not connect the RS-485 signal over the backplane, so each HART Interface Module must have a connection from the previous module and a connection to the next module as shown in this figure.
The HART compatible chassis do not provide interface modules with the chassis and slot addresses for determining the RS-485 port address for the HART multiplexer (MUX). In these chassis, the chassis and slot addresses are set with DIP switches on the 2071H HART MUX Module, a removable sub-component of the HART Interface Module. The DIP switches are set correctly at the factory, but if a MUX Module needs to be replaced, the DIP switches can be set by the user.