No Copy


No Right Click

Selamat Datang di Situs Belajar PLC dan SCADA

Blog gratis yang menyajikan berita seputar PLC dan SCADA.

Microsoft Windows 10

Berita seputar Microsoft Windows 10. Membahas berbagai informasi mengenai Microsoft windows terbaru.

Apple OSX

Artikel yang membahas tentang OSX terbaru dari Apple tentu sangat menarik untuk dibaca. Tak kalah serunya jika kita paham mengenai tips dan trik yang ada didalamnya.

Photography

Photography asik dan menarik jika kita mengetahuinya lebih dalam. Disini kita bisa melihat berbagai hal dari sudut pandang photo. Menarik untuk dipahami.

Thursday, December 30, 2010

Profinet

A photo of a version 2 WRT54G Linksys router. ...Image via Wikipedia
PROFINET has been described as the “all-encompassing Industrial Ethernet” because it supports virtually all automation functions in the manufacturing industries including discrete control, process automation, motion control, peer-to-peer integration, vertical integration with enterprise IT systems, functional safety, energy management, fast IO and much more.
Because PROFINET uses standard IEEE 802.3 Ethernet, it operates successfully over cabled networks and IEEE 802.11 wireless Ethernet. Wireless is a necessity when untethered devices like AGVs (Automatic Guided Vehicles) must be controlled. Installations using wireless in concert with PI's PROFIsafe profile shows how the combination of these two technologies can provide a powerful and effective solution in difficult applications such as cranes.
In motion control applications, PROFINET can control up to 150 axes in one millisecond, with no more than one microsecond of jitter. This makes it also suitable for demanding applications like printing presses.
PROFINET is the only Industrial Ethernet whose specification defines how Plant Asset Management (PAM) and other information needed by Manufacturing Execution Systems (MES) is communicated.
PROFINET protects users’ investments in plant skills, equipment and networks by seamlessly integrating PROFIBUS installations, and other fieldbuses like Modbus and DeviceNet. This makes it easy and quick to migrate to Ethernet-based installations.
For more in detail, visit http://www.allthingsprofinet.com
While embracing industry standards like Ethernet, TCP/IP, XML, and OPC, PROFINET itself is an open standard supported by PI (PROFIBUS and PROFINET International). PI support means that engineers from top automation companies and end users are continually collaborating to enhance PROFINET's features and keep it in tune with the needs of industry.
To learn more, please use the navigation menu left, choosing the best path to suit your needs.

Enhanced by Zemanta

Automation and Standards Bring New Life to an Old Machine

Rockwell Automation logoImage via Wikipedia
Curt G. Joa Inc., Sheboygan Falls, Wis., is a builder of web converting machinery for manufacturers of disposable diapers and other household and medical paper products. Recently, a diaper manufacturer approached Curt G. Joa Inc. to help upgrade a converting machine that was outdated and increasingly expensive to fix.  
"Fifteen years ago, when this converting system was made, it was considered top-of-the-line," says Kevin Zeinemann, electrical engineering manager at Joa. "But at that time, plant-floor information was not a priority as it is today, when executives look for production data to help them make business decisions."

The old diaper machine employed several third-party systems, including a different human-machine interface (HMI), drive system and input/output (I/O) system, none of which communicated effectively with each other or with plantwide information systems. When the time came to add a new piece of end-of-line packaging equipment, the old system no longer had the functionality or the flexibility to accommodate the new addition.

To ease the transition to the new control platform, engineers at Joa standardized on Allen-Bradley/Rockwell for the new motion control, I/O and HMI products. The new devices, which were capable of interfacing with the existing equipment, were added in stages in order to meet the customer's objective of minimal disruption to production. They also standardized in terms of programming, using Rockwell's Power Programming tool and methodology, designed to allow users to leverage pre-engineered, ISA88-based modules of code across multiple machines and applications. This reportedly helped them reduce design and engineering costs by an average of 45 percent.

Modular programming
"That's the intent behind new modular programming guidelines recently incorporated into the (International Society of Automation's) ISA88 standard," says Dan Seger, principal engineer, Rockwell Automation Inc., Milwaukee. "The guidelines provide programmers with a broadly recognized and predictable machine state model and standardized data model to help ensure they speak the same language and use the same terminology consistently during machine design.

"With the ability to reuse definitions, structures and lines of code, programmers can better leverage prior work," Seger continues. He notes that this is particularly important as machine builders continue to assume more responsibility for designing "information-enabled" machines that are pre-configured and accurately coded with the operating and performance data that end-users need.

The people at Joa seem to agree. "Our partnership with Rockwell helped us to innovate without risking the flexibility our customers need or slowing our design process," says Zeinemann.

OPC Foundation News From Around The World

SCADA PUMPING STATION 1Image via Wikipedia
OPC UA and The Cloud Webinar and Demo Available:  A new end-user targeted webinar and demo is available which discusses how OPC UA is the ideal foundation for a cloud computing strategy for industrial automation applications. Link here.

OPC UA Java Stack Release Candidate Available:  The OPC Foundation is pleased to announce that the OPC UA Java Stack is now available as a release candidate. Download here.
6-steps to Success with OPC UA:  The OPC Foundation has witnessed significant interest in OPC UA adoption around the world. We have defined 6 simple steps to help you maximize your investment in OPC UA technology, from inception, to development and through to certification. Download this paper today.

OPC Foundation Announces OPC .NET 3.0 (WCF) For OPC Classic:  Scottsdale, AZ October 25, 2010 - The OPC Foundation has announced the release of OPC .NET 3.0 (formerly known as OPC Express Interface (Xi)). This new API will enable users of OPC Classic to leverage the Windows Communication Foundation (WCF) technology, facilitating the transfer of data securely through firewalls. Complete information can be found here.

OPC Foundation and MTConnect Institute Announce a Memorandum of Understanding:  OPC and MTConnect will cooperate in developing standards called MTConnectOpcUa. MTConnectOpcUa is a set of companion specifications to ensure interoperability and consistency between MTConnect specifications and OPC specifications, as well as the manufacturing technology equipment, devices, software or other products that implement those standards. [Full Story]

OPC UA Part 11 Historical Access Release Candidate Available:  The OPC Foundation annouces the availability of the Release Candidate for Part 11 - Historical Access specification. The document can be found here.

OPC UA Part 7 Profiles and Part 10 Programs New Drafts Available:  The OPC Foundation annouces the availability of new Drafts for Version 1.01 of the Profiles and Programs specifications. The documents can be found here.

OPC Foundation Announces Updates to OPC UA SDK:  The OPC Foundation Announces the updated release of the OPC UA SDK deliverables. The downloads are available here.

Using OPC UA and PLCopen to Create Better Automation Solutions : 
The webinar and slides ares now available online.

OPC Foundation OPC Xi Technology/Product Demonstration Webinar: 
The webinar demonstrating the OPC Xi Technology is available online.

More news can be found here.  

Enhanced by Zemanta

SITEK installs large Siemens MES in Russia

December 20, 2010 - SITEK Group announced the launch of the largest implementation project on MES (Manufacturing Execution Systems) in Russian Federation carried out by Siemens and Avtodizel (Yaroslavl Motor Works), a member of GAZ Group, Russia's second-largest auto companу.

Siemens' departments of Industry Automation and Drive Technologies, and Avtodizel launched the MES on November 22, 2010. The project aims to improve optimization of production and reduce costs through better production processes management at Avtodizel.

The agreement between the parties provides introduction of MCIS (Motion Control Information System) developed by Siemens as a corporate standard at Avtodizel. MCIS is an integrated solution that enables to automate production processes, improve product quality and productivity, reduce downtime, increase production efficiency.

Avtodizel opted on the solutions of Siemens MES Software (MCIS) after careful analysis and consideration of the leading players of the MES-solutions world market. SITEK Group was also chosen. High level of service and reliability of the created systems were determining factors in choosing project partners.

In today’s globally competitive and recessionary environment it is imperative that enterprises further eliminate waste, become leaner and more agile to respond to customer’s demand. The main way to realize a profit is to low production costs. Optimization of manufacturing processes, reducing overhead costs associated with the need to keep in stock some supplies of raw materials might help. It is known that in western practice leaders of various levels are provided with reliable and operational information on the current state of affairs in order to optimize costs without risking to break the production process. The automated production management system (MES) solves these tasks which functions include operational planning, reduction of material balances, monitoring, recording and analysis of losses, calculation of reserves and work in progress, as well as tracking the effectiveness of the use of equipment, monitoring its condition.

"We are creating an entirely new production: a fundamentally new engine, new engineering building, new approach to the engine development and production process taking into account modern standards of quality, new methods of production management, ─ said Victor Kadylkin, CEO of the Yaroslavl Motor Works. ─ We are striving to achieve European quality of work and any mistake in production costs more than ever before. Thanks to MCIS solution we expect to have rapid, reliable and accurate information at hands on the status of each machine at each site, and here we are completely rely on competence and experience of SITEK Group and Siemens».

Pavel Klepinin, CIO at Yaroslavl Motor Works added: "All machinery for a new engine production at Yaroslavl Motor Works is equipped with Siemens control equipment. А new uniform standard to control the equipment from the chip to a set of commands was agreed to draft with Siemens three years ago. All our machines are designed to meet this standard. It is obvious that MES will bring this standard to the level of production management tools and services. The use of machines and tools at our enterprise will become truly centralized, transparent and manageable."

Avtodizel (Yaroslavl Motor Works) – one of the largest Russian enterprises that specializes on diesel engines of a universal purpose manufacture, couplings and transmissions. The Yaroslavl engines are established on commercial cars, buses, main lorry convoys, career dump-body trucks, air field tractors, combine harvesters, timber carrying vessDecember 20, 2010 - SITEK Group announced the launch of the largest implementation project on MES (Manufacturing Execution Systems) in Russian Federation carried out by Siemens and Avtodizel (Yaroslavl Motor Works), a member of GAZ Group, Russia's second-largest auto companу.

Siemens' departments of Industry Automation and Drive Technologies, and Avtodizel launched the MES on November 22, 2010. The project aims to improve optimization of production and reduce costs through better production processes management at Avtodizel.

The agreement between the parties provides introduction of MCIS (Motion Control Information System) developed by Siemens as a corporate standard at Avtodizel. MCIS is an integrated solution that enables to automate production processes, improve product quality and productivity, reduce downtime, increase production efficiency.

Avtodizel opted on the solutions of Siemens MES Software (MCIS) after careful analysis and consideration of the leading players of the MES-solutions world market. SITEK Group was also chosen. High level of service and reliability of the created systems were determining factors in choosing project partners.

In today’s globally competitive and recessionary environment it is imperative that enterprises further eliminate waste, become leaner and more agile to respond to customer’s demand. The main way to realize a profit is to low production costs. Optimization of manufacturing processes, reducing overhead costs associated with the need to keep in stock some supplies of raw materials might help. It is known that in western practice leaders of various levels are provided with reliable and operational information on the current state of affairs in order to optimize costs without risking to break the production process. The automated production management system (MES) solves these tasks which functions include operational planning, reduction of material balances, monitoring, recording and analysis of losses, calculation of reserves and work in progress, as well as tracking the effectiveness of the use of equipment, monitoring its condition.

"We are creating an entirely new production: a fundamentally new engine, new engineering building, new approach to the engine development and production process taking into account modern standards of quality, new methods of production management, ─ said Victor Kadylkin, CEO of the Yaroslavl Motor Works. ─ We are striving to achieve European quality of work and any mistake in production costs more than ever before. Thanks to MCIS solution we expect to have rapid, reliable and accurate information at hands on the status of each machine at each site, and here we are completely rely on competence and experience of SITEK Group and Siemens».

Pavel Klepinin, CIO at Yaroslavl Motor Works added: "All machinery for a new engine production at Yaroslavl Motor Works is equipped with Siemens control equipment. А new uniform standard to control the equipment from the chip to a set of commands was agreed to draft with Siemens three years ago. All our machines are designed to meet this standard. It is obvious that MES will bring this standard to the level of production management tools and services. The use of machines and tools at our enterprise will become truly centralized, transparent and manageable."

Avtodizel (Yaroslavl Motor Works) – one of the largest Russian enterprises that specializes on diesel engines of a universal purpose manufacture, couplings and transmissions. The Yaroslavl engines are established on commercial cars, buses, main lorry convoys, career dump-body trucks, air field tractors, combine harvesters, timber carrying vessels, dredges, etc. In 2001 Avtodizel became part of RusPromAvto company transformed later into GAZ Group (parent company).

Siemens (Berlin and Munich) ─ a world leader in electronics and electrical engineering. The concern operates in areas such as industry and energy, as well as in healthcare. Moreover Siemens is the world's largest supplier of environmentally safe technologies. More than 405 000 employees develop and manufacture products, design and build equipment and systems offering tailored solutions for specific customers. More than 160 years Siemens stands for technical progress, innovation, quality, reliability and international cooperation.

SITEK Group is a certified Competence center of MES-systems in mechanical engineering of Siemens and represents its interests in the CIS countries since 2008. SITEK Group supports global improvement by delivering control and visibility in manufacturing. SITEK Group serves 100+ customers in Russia, Europe and CIS delivering hi-tech automation MES-software. Its customers include AVTOVAZ, Zawolzhsky Motorny Zawod (ZMZ), Belarusian Autoworks (BELAZ), Minsk Tractor Works, Yaroslavl Motor Works and other.
els, dredges, etc. In 2001 Avtodizel became part of RusPromAvto company transformed later into GAZ Group (parent company).

Siemens (Berlin and Munich) ─ a world leader in electronics and electrical engineering. The concern operates in areas such as industry and energy, as well as in healthcare. Moreover Siemens is the world's largest supplier of environmentally safe technologies. More than 405 000 employees develop and manufacture products, design and build equipment and systems offering tailored solutions for specific customers. More than 160 years Siemens stands for technical progress, innovation, quality, reliability and international cooperation.

SITEK Group is a certified Competence center of MES-systems in mechanical engineering of Siemens and represents its interests in the CIS countries since 2008. SITEK Group supports global improvement by delivering control and visibility in manufacturing. SITEK Group serves 100+ customers in Russia, Europe and CIS delivering hi-tech automation MES-software. Its customers include AVTOVAZ, Zawolzhsky Motorny Zawod (ZMZ), Belarusian Autoworks (BELAZ), Minsk Tractor Works, Yaroslavl Motor Works and other.

Friday, November 12, 2010

Install STEP7 5.4 on Windows 7

Windows 7, the latest client version in the Mi...Image via Wikipedia

1. Installing STEP7 on Windows 7

If you try to install STEP7 on Windows 7 without any tricks you’ll get the error
The software cannon be installed on your computer with the operating system ?.

The setup program requires Windows XP, 2003 Server or Vista. Other operation systems are not supported. Then setup ends.
Obviously, the install program don’t know such version of operation system as Windows 7 have. Windows Vista and Windows 7 are compatible in most situations. Knowing that fact, many people expect that Step7 will work on Win7. The problem is in setup program, so some fans try to force installing the Step 7. They got a help from siemens support forum.
You need to download and install the special program for MSI packages edit. It names Orca.

You must to modify several setup.msi files, which contains in STEP7 distributive. To install Step7 Professional 2006 SR6 under Windows 7 you need to edit the next files:
CD_1\STEP7\Disk1\setup.msi
CD_1\STEP7\HF1\Disk1\setup.msi
CD_1\S7PCT\Disk1\setup.msi
CD_1\S7-Plcsim\Disk1\setup.msi
CD_1\Automation License Manager\Disk1\setup.msi
CD_2\S7-Graph\Disk1\setup.msi
CD_2\S7-Scl\Disk1\setup.msi
Изменение установочного пакета setup.msi
Open every file in Orca program, choose “ControlCondition” row in Tables, then select at right row DLG_InstallationRequirements and change the contents in Action column from “Disable” to “Enable”. The screenshot is applied. Now the install program allows to skip the prevention message and you’ll be able to press the Ignore button in prerequires checking window.
If you wouldn’t to do this actions you can download the already corrected distributive of Step7 Professional 2006 SR6.

2. File S7EpaSRVx.exe not found

During the installation process of STEP7 the new error appears: “can’t find the S7EpaSRVx.exe file”. This error don’t interrupt the installation, but it appears again when work with “Setting the PG-PC interface” utility. There is no ability to add/remove any interface, for example, to start using PLCSIM.
Не удается найти S7EpaSRVx.exe при попытке добавить новый интерфейс
The problem cause is the same: the setup program didn’t know OS version. The file S7EpaSRVx.exe must be located in Common Files\Siemes folder, though it’s required only in Vista not in XP. There are more some files in this folder that don’t install on Win7. The solution is simple: copy the Common Files\Siemens folder from Windows Vista with successfully installed Step7 Pro on it. You can download this folder with instuctions from
It’s recomended to place this folder before starting the Step7 setup program. Then you will not got the any error.

3. Adding CP5611, CP5612 and PC Adapter to PG/PC Interface

The problems end only for users who work only with controllers by Ethernet interface. You can’t select MPI or ProfiBus interfaces to work with PCI-card, PCMCIA extension or USB adapter, because they miss in selection list of Install/Remove Interface window. The PC_Adapter_USB drivers installation also don’t help.
The interface selection list places in HKEY_LOCAL_MACHINE\SOFTWARE\Siemens\SINEC registry tree. This tree contents were exported from Vista OS with installed STEP7 5.4 SP5. Add this content to registry in replace mode and you’ll see the full list of interfaces.
Теперь доступны все возможные интерфейсы подлючения к контроллеру для программирования
The connection to controller throught USB Adapter were tested. All functions work fine.

4. Configure the help system WinHlp32.exe

The most part of STEP7 help system build on old .hlp file format. In order to open it in Windows 7, you need to download the special addon from Microsoft site (validation required).
http://www.microsoft.com/downloads/details.aspx?displaylang=ru&FamilyID=258aa5ec-e3d9-4228-8844-008e02b32a2c

Conclusion

All the problems are caused by unknown version of Windows for the setup program. The Vista compability mode don’t working in full measure.
Siemens must do some adaptaions and tests in order to STEP7 works fine on Windows 7. You perform described operations at you own risk. You must understand that creating the project for real objects under Windows 7 is not a good idea. But learning the Step7 or starting to develop the project are seems to be acceptable.

Files to download

Siemens folder, which should be placed in C:\Program Files\Common Files  before starting the setup program, and SINEC. reg file with registry settings for connection interface list to be full.
Simatic STEP7 Professional 2006 SR6 под Windows 7
CD1
CD2
or Orca to modify existing distributive
WinHlp32.exe для Windows 7

Enhanced by Zemanta

Wednesday, October 13, 2010

IP Ratings – What are they and what do they mean?

Electrical cabinets are one of those ubiquitous elements in industrial environments. It doesn’t matter what industry you are in – whether it’s discrete, process , utility, building and construction or even commercial retail – everything needs power. That means cables and relays carrying what may be a dangerous amount of electricity that need to be protected from the elements and environment on one side and people that need to be protected from accidental exposure on the other.

The consequences of such accidental exposure can be tragic. According to statistics collected and published by Capelli-Schellpfeffer, Inc., electrical accidents called arc flashes kill one or two people in the United States every day. Many more are injured and then there is the cost of damaged equipment and lost production to consider. Numerous standards have been devised to reduce the frequency of such accidents and make industrial environments as safe as possible. These standards govern every aspect of equipment and procedures used for managing electricity. For example, IEC 60529 classifies the level of protection provided against accidental contact with live electrical parts and the intrusion of solid objects (including  tools and body parts like hands and fingers), dust, and water in electrical enclosures.

However, there is more to adhering to safety standards than including them as requirements in an RFP. You have to know what they mean so you can select the right equipment for the right task and enforce their use. And that can be a challenge as you have to understand what the different ratings mean and how they are applied in your particular environment. In the case of IEC 60529 the grading is called an IP rating.
“IP is short for Ingress Protection, and is specifically oriented to the amount of security an electrical cabinet has against the intrusion of either solid objects, dust or moisture,” says John Kovacik, Principal Engineer, industrial control equipment with Underwriters Laboratories Inc. Underwriters Laboratories is an independent product safety certification organization that has been testing products and writing safety standards for more than a century. “The IP rating is very important for knowing what kind of enclosure is appropriate for your particular environment and application.”

An IP rating consists of the letters IP followed by two numbers and an optional letter. The numbers provide a grading against a set of conditions – specifically delineating the level of protection an enclosure has against the penetration of solids and dust (first number) or liquids (second number). If a cabinet has no rating against one of these categories of penetration, the number is replaced with an X. For example, an electrical socket rated IP22 is protected against the insertion of fingers and will continue to function safely when exposed to vertically or nearly vertically dripping water. IP22 or IP2X are typical minimum requirements for the design of electrical accessories for indoor use.

“IP ratings are very important to people setting up equipment in almost any environment,” says Kovacik, who adds that enclosures are further categorized by the environments they are designed for. “If you are setting up an electrical cabinet in an outdoor environment in Alaska, you need to know the enclosure you purchase can withstand severe winter conditions. Buying an enclosure engineered for an indoor SMT line won’t satisfy your needs. These ratings help you determine what type of enclosure is right for your requirements.”

Solids
First NumberObject size protected againstEffective against
0No protection against contact and ingress of objects
1>50 mmAny large surface of the body, such as the back of a hand, but no protection against deliberate contact with a body part
2>12.5 mmFingers or similar objects
3>2.5 mmTools, thick wires, etc.
4>1 mmMost wires, screws, etc.
5Dust protectedIngress of dust is not entirely prevented, but it must not enter in sufficient quantity to interfere with the satisfactory operation of the equipment; complete protection against contact
6Dust tightNo ingress of dust; complete protection against contact

Liquids
Second NumberProtected againstDetails
0Not protected
1Dripping waterDripping water (vertically falling drops) shall have no harmful effect.
2Dripping water when tilted up to 15°Vertically dripping water shall have no harmful effect when the enclosure is tilted at an angle up to 15° from its normal position.
3Spraying waterWater falling as a spray at any angle up to 60° from the vertical shall have no harmful effect.
4Splashing waterWater splashing against the enclosure from any direction shall have no harmful effect.
5Water jetsWater projected by a nozzle against enclosure from any direction shall have no harmful effects.
6Powerful water jetsWater projected in powerful jets against the enclosure from any direction shall have no harmful effects.
7Immersion up to 1 mIngress of water in harmful quantity shall not be possible when the enclosure is immersed in water under defined conditions of pressure and time (up to 1 m of submersion).
8Immersion beyond 1 mThe equipment is suitable for continuous immersion in water under conditions which shall be specified by the manufacturer. Normally, this will mean that the equipment is hermetically sealed. However, with certain types of equipment, it can mean that water can enter but only in such a manner that produces no harmful effects.

Further complicating matters is the fact that the IEC isn’t the only organization that offers a rating system for electrical enclosures. The National Electrical Manufacturers Association (NEMA) also has a system of protection ratings. While you may find an IP rating on almost any piece of electrical equipment, NEMA ratings are specifically focused on the industrial environment and are predominantly North American.
According to Kovacik, NEMA ratings cover additional qualifications not addressed by the IEC standards so they don’t map directly to IP ratings and that makes it important to understand how they relate. NEMA ratings also address issues such as corrosion resistance and construction practices which are not addressed by IP ratings. Because NEMA covers these additional factors, NEMA and IP ratings are not truly equivalent. A NEMA rating can satisfy or exceed all the requirements of an IP rating – for example, NEMA 1 meets all the requirements of IP20 and NEMA 6 meets all the requirements of IP67 – but the reverse is not true.

NEMA Ratings:
Type DesignationEffective against
1Indoor use primarily to provide a degree of protection against limited amounts of falling dirt.
2Indoor use primarily to provide a degree of protection against limited amounts of falling water and dirt.
3Outdoor use primarily to provide a degree of protection against rain, sleet, wind blown dust and damage from external ice formation.
3ROutdoor use primarily to provide a degree of protection against rain, sleet, and damage from external ice formation.
3SOutdoor use primarily to provide a degree of protection against rain, sleet, windblown dust and to provide for operation of external mechanisms when ice laden.
4Indoor or outdoor use primarily to provide a degree of protection against windblown dust and rain, splashing water, hose-directed water and damage from external ice formation.
4XIndoor or outdoor use primarily to provide a degree of protection against corrosion, windblown dust and rain, splashing water, hose-directed water, and damage from external ice formation.
5Indoor use primarily to provide a degree of protection against settling airborne dust, falling dirt, and dripping noncorrosive liquids.
6Indoor or outdoor use primarily to provide a degree of protection again hose-directed water, and the entry of water during occasional temporary submersion at a limited depth and damage from external ice formation.
6PIndoor or outdoor use primarily to provide a degree of protection against hose-directed water, the entry of water during prolonged submersion at a limited depth and damage from external ice formation.
7Indoor use in locations classified as Class I, Division 1, Groups A, B, C or D hazardous locations as defined in the National Electric Code (NFPA 70) (Commonly referred to as explosion-proof).
8Indoor or outdoor use in locations classified as Class I, Division 2, Groups A, B, C or D hazardous locations as defined in the National Electric Code (NFPA 70) (commonly referred to as oil immersed).
9Indoor use in locations classified as Class II, Division 1, Groups E, F and G hazardous locations as defined in the National Electric Code (NFPA 70) (commonly referred to as dust-ignition proof).
10Intended to meet the applicable requirements of the Mine Safety and Health Administration (MSHA).
12/KIndoor use primarily to provide a degree of protection against circulating dust, falling dirt, and dripping noncorrosive liquids.
13Indoor use primarily to provide a degree of protection against dust, spraying of water, oil, and noncorrosive coolant.
Note: An “X” may be added to the Type 3, 3R and 3S ratings (3X, 3RX, 3SX) to denote additional corrosion protection equivalent to a Type 4X rating.
Additional links

Wednesday, October 6, 2010

StuxnetRemover 1.0.1.3: Free Download

StuxnetRemover is a lightweith utility that will scan and remove Stuxnet/Tmphider rootkit from your computer. StuxnetRemover is able to remove active infections and clear USB devices.



Download: http://www.softpedia.com/progDownload/StuxnetRemover-Download-165585.html

How Stuxnet Worm Works

Stuxnet looks for industrial control systems and then changes the code in them to allow the attackers to take control of these systems without the operators knowing. In other words, this threat is designed to allow hackers to manipulate real-world equipment, which makes it very dangerous.
It’s like nothing we’ve seen before – both in what it does, and how it came to exist. It is the first computer virus to be able to wreak havoc in the physical world. It is sophisticated, well-funded, and there are not many groups that could pull this kind of threat off. It is also the first cyberattack we’ve seen specifically targeting industrial control systems.
The worm is made up of complex computer code that requires lots of different skills to put it together. Symantec security experts estimate it took five to ten people to work on this project for six months. In addition, knowledge of industrial control systems was needed along with access to such systems to do quality assurance testing; again indicating that this was a highly organized and well-funded project.
"We've definitely never seen anything like this before," said Liam O’Murchu, Researcher, Symantec Security Response. "The fact that it can control the way physical machines work is quite disturbing."

Exploring Stuxnet’s PLC Infection Process

We first mentioned that W32.Stuxnet targets industrial control systems (ICSs) -- such as those used in pipelines or nuclear power plants -- 2 months ago in our blog here and gave some more technical details here.
While we are going to include all of the technical details in a paper to be released at the Virus Bulletin Conference on September 29th, in recent days there has been significant interest in the process through which Stuxnet is able to infect a system and remain undetected.
Because Stuxnet targets a specific ICS, observing its behavior on a test system can be misleading, as the vast majority of the most interesting behavioral characteristics simply will not occur. When executed, one of the behaviors that one may immediately see is Stuxnet attempting to access a Programmable Logic Controller (PLC) data block, DB890. This data block is actually added by Stuxnet itself, however, and is not originally part of the target system. Stuxnet monitors and writes to this block to alter the PLC program flow depending on certain conditions.
In this blog entry we will discuss the details of the PLC infection and rootkit functionality. In particular we will discuss the following important aspects of the Stuxnet attack on targeted ICSs:
  1. How it chooses industrial control systems to target
  2. The method used to infect PLC code blocks
  3. The actual code that is placed onto PLCs during infection
  4. The PLC rootkit code that is present on an infected Windows machine
These four points are to be addressed individually as the code to achieve each of these tasks is quite different.
Stuxnet’s goal is to modify the behavior of an industrial control system by modifying PLCs. It does this by intercepting read/write requests sent to the PLC, determining whether the system is the intended target, modifying the existing PLC code blocks and writing new blocks to the PLC, and finally hiding the PLC infection from the PLC operator/programmer using rootkit functionality. The tasks are distinct because, for instance, the hiding of infected code blocks takes place on the infected Windows machine using standard C/C++ code whereas the malicious code that Stuxnet aims to run on the industrial control system execute on the PLC and are written in MC7 bytecode. MC7 is the assembly language that runs on PLCs and is often originally written in STL.
Before discussing Stuxnet’s techniques for attacking PLCs let’s first look at the basics of how PLCs are accessed and programmed.
To access a PLC, specific software needs to be installed; Stuxnet specifically targets the WinCC/Step 7 software used for programming particular models of PLC. With this software installed, the programmer can connect to the PLC via a data cable and access the memory contents, reconfigure it, download a program onto it, or debug previously loaded code. Once the PLC has been configured and programmed, the Windows machine can be disconnected and the PLC will function by itself. To give you an idea of what this looks like in real life, here’s a photo of some basic test equipment in the lab:

 
The screenshot below shows a portion of the Stuxnet malicious code in the Step7 STL editor. The beginning of the MC7 code for one of Stuxnet’s Function Code (FC) blocks is visible; the code shown is from the disassembled block FC1873.
The Step 7 software uses a library file called s7otbxdx.dll to perform the actual communication with the PLC. The Step7 program calls different routines in this DLL when it wants to access the PLC. For example, if a block of code is to be read from the PLC using Step 7, the routine s7blk_read is called. The code in s7otbxdx.dll accesses the PLC, reads the code and passes it back to the Step7 program, as shown in the following diagram:
Let’s now take a look at how access to the PLC works when Stuxnet is installed. When executed, Stuxnet renames the original s7otbxdx.dll file to s7otbxsx.dll. It then replaces the original DLL with its own version. Stuxnet can now intercept any call that is made to access the PLC from any software package.

 
Stuxnet ’s modified s7otbxdx.dll file contains all potential exports of the original DLL – a maximum of 109 – which allows it to handle all the same requests. The majority of these exports are simply forwarded to the real DLL, now called s7otbxsx.dll, and nothing untoward happens; in fact, 93 of the original 109 exports are dealt with in this manner. The trick, however, lies in the 16 exports that are not simply forwarded but are instead intercepted by the custom DLL. The intercepted exports are the routines to read, write, and locate code blocks on the PLC. By intercepting these requests Stuxnet is able to modify the data sent to or returned from the PLC without the operator of the PLC ever realizing it. It is also through these routines that Stuxnet is able to hide the malicious code that is on the PLC.
To understand how Stuxnet accesses and infects a PLC we will first mention the types of data present. PLCs work with blocks of code and data which are loaded on to the PLC by the operator. For the sake of understanding, we will briefly explain what the most common types of blocks are and what they do:
  • Data Blocks (DB) contain program-specific data, such as numbers, structures and so on.
  • System Data Blocks (SDB) contain information about how the PLC is configured; these are created depending on the number/type of hardware modules that are connected to the PLC.
  • Organization Blocks (OB) are the entry point of programs. They are executed cyclically by the CPU. In regards to Stuxnet, two notable OBs are:
    • OB1 is the entry-point of the PLC program. It is executed cyclically, without specific time requirements.
    • OB35 is a standard watchdog Organization Block, executed by the system every 100ms. This function may contain any logic that needs to monitor critical input in order to respond immediately or perform functions in a time critical manner.
  • Function Blocks (FC) are standard code blocks. They contain the code to be executed by the PLC. Generally, the OB1 block references at least one FC block.
The following sections detail the previously mentioned four main aspects of the threat.
1. Determining which PLCs to infect.
Stuxnet infects PLCs with different code depending on the characteristics of the target system.
An infection sequence consists of PLC blocks (code blocks and data blocks) that will be injected into the PLC to alter its behavior. The threat contains three infection sequences.Two of these sequences are very similar, and functionally equivalent. We dubbed these two sequences A and B. The third sequence was named sequence C. Stuxnet determines if the system is the intended target by fingerprinting it. It checks:
  • The PLC type/family: only CPUs  6ES7-417 and 6ES7-315-2 are infected
  • The System Data Blocks: the SDBs will be parsed, and depending on the values they contain, the infection process will start with method of infection A, B or none.  When parsing the SDBs the code searches for the presence of 2 values (7050h and 9500h), and depending on the number of occurrences of each of these values sequence A or B is used to infect the PLC.
The code also searches for the bytes 2C CB 00 01 at offset 50h in the SDB blocks, which appear if the CP 342-5 communications processor (used for Profibus-DP) is present.  If these bytes are not found then infection does not occur.
Infection conditions for sequence C are determined by other factors.
2. Method of infection
Stuxnet uses the code-prepending infection technique. When Stuxnet infects OB1 it performs the following sequence of actions:
  1. Increases the size of the original block
  2. Writes malicious code to the beginning of the block
  3. Inserts the original OB1 code after the malicious code
As well as infecting OB1, Stuxnet also infects OB35 in a similar fashion. It also replaces the standard coprocessor DP_RECV code block with its own, thereby hooking network communications on the Profibus (a standard industrial network bus used for distributed I/O).
The overall process of infection for methods A/B is as follows:
  • Check the PLC type; it must be an S7/315-2
  • Check the SDB blocks and determine whether sequence A or B should be written
  • Find DP_RECV, copy it to FC1869, replace it with a malicious copy embedded in Stuxnet
  • Write the malicious blocks (in total, 20 blocks) of the sequence, embedded in Stuxnet
  • Infect OB1 so that the malicious code is executed at the start of a cycle
  • Infect OB35, which will act as a watchdog
3. Infection code
The code inserted into the OB1 function is responsible for starting infection sequences A and B. These sequences contain the following blocks:
  • Code blocks: FC1865 though FC1874, FC1876 through FC1880
    (Note that FC1869 is not contained within Stuxnet but is instead a copy of the original DP_RECV block found on the PLC)
  • Data blocks: DB888 through DB891.
Sequences A and B intercept packets on the Profibus by using the DP_RECV hooking block. Based on the values found in these blocks, other packets are generated and sent on the wire. This is controlled by a complex state machine (implemented in the various FC blocks mentioned above). This machine can be partially controlled by the DLL via the data block DB890.
Under certain conditions the sequence C is written to a PLC. This sequence contains more blocks than A/B:
  • FC6055 through FC6084
  • DB8062, DB8063
  • DB8061, DB8064 through DB8070, generated on the fly
Sequence C is meant to read and write I/O information (Input/Output) to the memory-mapped I/O areas of the PLC, as well as the peripheral I/O.
The control flow for program A/B is shown below, which is partially shown in the screen shot from the Step7 editor shown above (code block FC1873):


The program flow for code sequence C is more complex, as can be seen from the following diagram:


4. The rootkit
The Stuxnet PLC rootkit code is contained entirely in the fake s7otbxdx.dll. In order to achieve the aim of continuing to exist undetected on the PLC it needs to account for at least the following situations:
  1. Read requests for its own malicious code blocks
  2. Read requests for infected blocks (OB1 , OB35, DP_RECV)
  3. Write requests that could overwrite Stuxnet’s own code
Stuxnet contains code to monitor for and intercept these types of requests The threat modifies these such requests so that Stuxnet’s PLC code is not discovered or damaged. The following list gives some examples of how Stuxnet uses the hooked exports to handle these situations:
  • s7blk_read: read requests are monitored, and Stuxnet will return:
    • The real DP_RECV (kept as FV1869) is requested
    • An error if the request regards its own malicious blocks
    • A cleaned version (disinfected on the fly) copy of OB1 or OB35
  • s7blk_write: write requests to OB1/OB35 are monitored to make sure the new versions of these are infected.
  • s7blk_findfirst / s7blk_findnext: these routines are used to enumerate blocks on a PLC. Malicious blocks will be voluntarily “skipped”.
  • s7blk_delete: deletion of blocks is also monitored
Stuxnet is thus able to ensure its continuing presence on the PLC.
As we have noted before, Stuxnet is a complex threat and its PLC infection code is another part of that complexity.  Discussion of the injected MC7 code itself that we reverse engineered a couple of months ago could by itself fill multiple blogs. For more details on not only the PLC infection routines but the threat in general, be sure to read the whitepaper soon to be released at the Virus Bulletin conference.

Tuesday, October 5, 2010

34.000 Komputer di Indonesia Terinfeksi Stuxnet

JAKARTA, KOMPAS.com - Indonesia tercatat menjadi negara tertinggi kedua yang di dunia yang terinfeksi Stuxnet, malware (malicious software) alias program jahat jenis worm yang tengah merajalela di dunia saat ini. Demikian hasil analisis Kaspersky Lab, pengembang solusi keamanan terkemuka yang berpusat di Rusia.

Stuxnet, sebuah worm komputer Windows spesifik pertama kali ditemukan pada bulan Juni 2010 oleh sebuah perusahaan keamanan yang berasal dari Belarus. Worm ini menjadi terkenal karena merupakan worm pertama yang memata-matai dan memprogram ulang sistem industri. Belakangan ini, serangan worm Stuxnet telah menimbulkan banyak spekulasi dan diskusi mengenai maksud dan tujuan, asal, dan – yang terpenting - identitas dari penyerang dan targetnya.

Kaspersky Lab belum melihat cukup bukti untuk mengidentifikasi penyerang atau targetnya, tetapi Kaspersky dapat mengkonfirmasikan bahwa ini adalah satu-satunya serangan malware canggih yang didukung dengan biaya besar, tim penyerang dengan keahlian tinggi dan pengetahuan teknologi SCADA yang baik.

"Serangan-serangan ini dapat digunakan sebagai alat untuk perang dunia maya atau terorisme dunia maya atau sabotase dunia maya yang bergantung pada sumber serangan dan targetnya. Sejauh ini apa yang telah kita lihat mengenai Stuxnet lebih cenderung digunakan sebagai alat untuk melakukan sabotase. Kaspersky Lab tidak dalam posisi untuk mengomentari sisi politik dari serangan ini," ujar Eugene Kaspersky, Co-founder and Chief Executive Officer of Kaspersky Lab dalam rilis persnya akhir pekan lalu.

Berdasarkan geografis penyebaran Stuxnet; Iran, India dan Indonesia memimpin dalam hal infeksi sejauh ini. Namun, epidemi Stuxnet (seperti epidemi lainnya) tidak statis; worm ini secara terus menerus menyebar, dan sementara beberapa sistem tetap terinfeksi, banyak dari sistem tersebut telah dibersihkan. Negara yang paling rentan serangan ini adalah India dengan jumlah serangan mencapai 86.258 unit komputer. Indonesia di pisisi kedua dengan korban34.138 komputer.
Tujuan utama worm ini adalah untuk mengakses Simatic WinCC SCADA, yang digunakan sebagai sistem pengendali industri dan bertugas untuk mengawasi dan mengendalikan industri, infrastruktur, atau proses-proses berbasis fasilitas. Sistem serupa digunakan secara luas pada pengilangan minyak, pembangkit tenaga listrik, sistem komunikasi yang besar, bandar udara, perkapalan, dan bahkan instalasi militer secara global.

Pengetahuan mendalam tentang teknologi SCADA, kecanggihan serangan yang berlapis-lapis, penggunaan beberapa kerentanan zero-day dan sertifikat yang sah membawa kita kepada pemahaman bahwa Stuxnet diciptakan oleh tim yang terdiri dari para profesional dengan keahlian yang sangat terampil dan memiliki sumber daya dan dukungan finansial yang besar.
Target serangan dan wilayah yang dijangkiti oleh worm ini (terutama Iran) menyiratkan bahwa mereka bukanlah kelompok penjahat dunia maya biasa. Lebih jauh lagi, ahli keamanan Kaspersky yang menganalisa kode worm tersebut menegaskan bahwa tujuan utama Stuxnet bukan untuk memata-matai sistem yang terinfeksi tetapi untuk melakukan sabotase.

Para peneliti di Kaspersky Lab menemukan bahwa worm tersebut mengeksploitasi dua dari empat kerentanan zero-day yang telah dilaporkan langsung kepada Microsoft. Analis Kaspersky telah bekerja sama dengan Microsoft untuk memastikan kelancaran dari peluncuran patch, serta memastikan pelanggan terlindungi dan memperoleh informasi mengenai serangan tersebut. Semua produk Kaspersky Lab telah berhasil mendeteksi dan menetralisir Worm.Win32.Stuxnet.

Sumber: www.kompas.com

Mengenal Stuxnet Lebih Dekat (Becarefull VIRUS on SCADA!!!)

JAKARTA, KOMPAS.com - Sebuah virus komputer yang dirancang untuk menyerang sistem industri muncul secara luas. Fasilitas nuklir di Iran diduga salah satu target serangan virus tersebut. Hal tersebut mengindikasikan adanya campur tangan suatu negara atau lembaga berdana besar untuk menyusup sistem keamanan nasional negara lain.

Stuxnet disebut-sebut para pakar keamanan sebagai bentuk senjata cyber yang menjadi sarana terorisme di dunia maya. Serangannya tidak hanya mencuri informasi di komputer korban, namun mengambil alih sistem kontrol berbasis mesin.

Sampai saat ini belum diketahui siapa di balik Stuxnet ini. Berikut adalah beberapa informasi mengenai sepak terjang Stuxnet.

Bagaimana Stuxnet Bekerja?

- Virus itu adalah perangkat lunak berbahaya, atau malware, yang umumnya menyerang sistem kontrol industri yang dibuat oleh perusahaan Jerman, Siemens. Para ahli mengatakan virus tersebut dapat digunakan untuk mata-mata atau sabotase.
- Siemens mengatakan malware menyebar melalui perangkat memori USB thumb drive yang terinfeksi, memanfaatkan kerentanan dalam sistem operasi Windows Microsoft Corp.
- Program serangan perangkat lunak Malware melalui Sistem Supervisory Control and Data Acquisition, atau SCADA. Sistem itu digunakan untuk memonitor pembangkit listrik secara otomatis - dari fasilitas makanannya dan kimia untuk pembangkit listrik.
- Analis mengatakan para penyerang akan menyebarkan Stuxnet melalui thumb drive karena banyak sistem SCADA tidak terhubung ke Internet, tetapi memiliki port USB.
- Sekali saja worm menginfeksi sebuah sistem, dengan cepat dan membentuk komunikasi dengan komputer server penyerang sehingga dapat digunakan untuk mencuri data perusahaan atau mengendalikan sistem SCADA, kata Randy Abrams, seorang peneliti dengan ESET, sebuah perusahaan keamanan swasta yang telah mempelajari Stuxnet.

Siapa Penciptanya?

- Siemens, Microsoft dan para ahli keamanan telah mempelajari worm dan belum menentukan siapa yang membuatnya.
- Mikka Hypponen, seorang kepala penelitian pada perusahaan perangkat lunak keamanan F-Secure di Finlandia percaya itu adalah serangan yang disponsori oleh suatu negara. Stuxnet sangat kompleks dan "jelas dilakukan oleh kelompok dengan dukungan teknologi dan keuangan yang serius."
- Ralph Langner, ahli cyber Jerman mengatakan serangan dilakukan oleh pakar yang berkualifikasi tinggi, mungkin negara bangsa. "Ini bukan peretas yang duduk di ruang bawah rumah orang tuanya. Pada website-nya, www.langner.com /en/index.htm, Langner mengatakan penyelidikan akhirnya "fokus" pada penyerang. "Para penyerang harus tahu ini. Kesimpulan saya adalah, mereka tidak peduli, mereka tidak takut masuk penjara."

Di Mana Disebarkan?

Sebuah studi tentang penyebaran Stuxnet oleh teknologi perusahaan AS Symnatec menunjukkan bahwa negara-negara yang terkena dampak utama pada 6 Agustus adalah Iran dengan 62.867 komputer yang terinfeksi, Indonesia dengan 13.336, India dengan 6.552, Amerika Serikat dengan 2913, Australia dengan 2.436, Inggris dengan 1.038, Malaysia dengann 1.013 dan Pakistan dengan 993. Laporan ini terus berubah seiring penyebarannya.

Laporan Pertama

- Perusahaan Belarusia Virusblokada adalah yang pertama mengidentifikasi virus itu pada pertengahan Juni. Direktur Komersial, Gennady Reznikov kepada Reuters perusahaan memiliki dealer di Iran, dan salah satu klien dealer komputernya sudah terinfeksi virus yang ternyata Stuxnet. Reznikov mengatakan Virusblokada sendiri sudah tidak ada hubungannya dengan pembangkit listrik tenaga nuklir di Bushehr.
- Menurut juru bicara Siemens, Michael Krampe, Siemens telah mengidentifikasi 15 pelanggan yang menemukan Stuxnet pada sistem mereka, dan "masing-masing mampu mendeteksi dan menghapus virus tanpa membahayakan operasi mereka."

Sumber: http://tekno.kompas.com/read/2010/10/04/2347081/Mengenal.Stuxnet.Lebih.Dekat

Wednesday, September 29, 2010

Siemens SIMATIC S7-1200 Getting Started

Getting started with your first SIMATIC S7-1200 Compact Controller and Step 7 Basic Software. See how easy it is to configure, program, and test your first S7-1200 in less than 8 minutes. This is part one of a four part series showcasing the time and cost saving benefits of the new S7-1200. For more information see: http://www.usa.siemens.com/s7-1200





Tuesday, September 28, 2010

STEP 7 V5.5 Released for Delivery



With immediate effect, STEP 7 V5.5 has been released for delivery. STEP 7 users can upgrade their existing STEP 7 software to the latest version by purchasing an upgrade (order no. 6ES7810-4CC10-0YE5). Users with a valid Software Update Service agreement for STEP 7 will receive the upgrade to STEP 7 V5.5 automatically. STEP 7 V5.5 will also be included in the new STEP 7 Professional Edition 2010, which is expected to be available as from end of August 2010. We shall inform you as soon as STEP 7 Professional 2010 becomes available.


Content:
  1. Ordering information for STEP 7 V5.5
  2. System requirements
  3. New features of STEP 7 V5.5
  4. Compatibility
  5. STEP 7 V5.4 - declared a mature product
  6. STEP 7 V5.3 - end of production
1. Ordering information for STEP 7 V5.5  
Order No.
Product Name
6ES7810-4CC10-0YA5 SIMATIC S7, STEP7 V5.5
FLOATING LICENSE for 1 USER
6ES7810-4CC10-0YE5 SIMATIC S7, STEP7 V5.5 UPGRADE
(V3.X - V5.4 to V5.5)
FLOATING LICENSE for 1 USER
6ES7810-4CC10-0YA6 SIMATIC S7, STEP7 V5.5
RENTAL LICENSE for 50 hours
6ES7810-4CC10-0YA7 SIMATIC S7, STEP7 V5.5,
DATA CARRIER incl. TRIAL LICENSE,
6ES7810-4BC01-0YX2 SIMATIC S7, STEP7 SOFTWARE UPDATE SERVICE for 1 year with automatic prolongation, latest software version must be available

STEP 7 V5.5 Upgrade:
Customers who use STEP 7 V3.x, V4.x, V5.0, V5.1, V5.2, V5,3, or V5.4 already, can purchase on upgrade. The precondition for the installation of the upgrade package is a valid license for STEP 7 V3.x, V4.x, V5.0, V5.1, V5.2, V5.3 or V5.4.
 
STEP 7 V5.5 Rental License:
Users who only work with STEP 7 occasionally, can purchase a Rental License with an operating time of 50 hours. The time starts elapsing when STEP 7 is started and stops when STEP 7 is closed.
The changeover to Idle State / Standby Mode with the STEP 7 software started is not counted as closing of STEP 7.
STEP 7 V5.5 Trial License:
Users who wish to know more about STEP 7 can obtain a Trial License. The Trial License will run for 14 days, beginning with the first start of STEP 7. During this period the software has full functionality.
General:
STEP 7 V5.5 is supplied on DVD, the appropriate license on a USB stick. STEP 7 is multilingual (Ge, En, Fr, It, Sp).
Documentation:
The documentation for STEP 7 (Basic Information and Reference Manual) is included on the product DVD as PDF file. It is also available in printed form.
The Basic Information in printed form (comprises: Getting Started, User Manual on HW configuration, programming and previous S5 users):
Order No.
Product Name
6ES7810-4CA10-8AW0 Basic Information for V5.5, German
6ES7810-4CA10-8BW0 Basic Information for V5.5, English
6ES7810-4CA10-8CW0 Basic Information for V5.5, French
6ES7810-4CA10-8DW0 Basic Information for V5.5, Spanish
6ES7810-4CA10-8EW0 Basic Information for V5.5, Italian
The Reference Manual in printed form (comprises: Programming Manual for STL/LAD/FBD and Reference Manual for S7300/400):
Order No.
Product Name
6ES7810-4CA10-8AW1 Reference Manual for V5.5, German
6ES7810-4CA10-8BW1 Reference Manual for V5.5, English
6ES7810-4CA10-8CW1 Reference Manual for V5.5, French
6ES7810-4CA10-8DW1 Reference Manual for V5.5, Spanish
6ES7810-4CA10-8EW1 Reference Manual for V5.5, Italian

 

2. System requirements
Supported operating systems:
  • MS Windows XP Professional  SP2 or SP3
  • MS Windows Server 2003 SP2 / R2 SP2 Standard Edition as workstation
  • MS Windows 7 32 Bit Ultimate, Professional and Enterprise (Standard Installation).
    The Windows XP mode under Windows 7 is not release yet.
Windows 95 / 98 / Me / NT / Windows 2000 and Windows Vista are no longer supported.
Please note:
The Microsoft Internet Explorer 6.0 (or higher) is required for all operating systems.
Display of PDF files: To be able to read the supplied PDF files, you require a PDF Reader that is compatible with PDF 1.7
(ISO32000-1:2008 PDF).
For the central user administration you require SIMATIC Logon . For ordering information on SIMATIC Logon please see entry ID: 36474276
For ordering information on SIMATIC Version Trail please see entry ID: 36979696
In addition to STEP 7, the STEP 7 DVD contains the following programs with their setup in the directory CD2\Optional Components:
S7 Block Privacy  for software block encryption
S7 Web2PLC for the integration of user-defined web sites in the CPU
More information is available from the file
Our Training Center can provide training for SIMATIC trend topics.
For more information about diagnostic training and maintenance strategies please see entry ID: 42806192
 
3. New features of STEP 7 V5.5
We have summarized the important new features of STEP 7 V5.5 in a set of overhead slides
In addition a list of the new features:
 
List of newly supported modules:
 
4.Compatibility
General:
  • STEP 7 V5.5 is fully upwardly compatible with STEP 7 V5.4, V5.3, V5.2, V5.1, V5.0, V4.x and V3.x, i.e. programs and projects created with these versions can be further processed with STEP 7 V5.5 without any changes.
  • STEP 7 V5.5 is also reverse compatible with these versions under the condition that a V5.5 project does not contain components and functions which are not supported by STEP 7 V5.4, V5.3, V5.2, V5.1, V5.0, V4.x or V3.x, e.g. new CPUs or new functions.

    • If a project created with STEP 7 V5.5 is to be further processed with STEP 7 V5.0, for instance, the V5.5 project may only contain module order no.'s which are known to STEP 7 V5.0. It may be necessary to configure new modules with the "predecessor order no." in this case.
    • In the reverse case down to STEP 7 V5.1 incl. SP3 it is not necessary to consider the above restriction, because here it is possible to also represent new modules that are not known to the STEP 7 version.
  • From STEP 7 V5.2 and higher many new modules can be "post-loaded".
 
5. STEP 7 V5.4 declared a mature product
With the delivery release of STEP 7 V5.5, STEP 7 V5.4 has been declared a mature product. This means that the affected items will be deleted from the current catalogs, but will remain available for order for approx. one more year:
Order No.
Product Name
6ES7810-4CC08-0YA5 SIMATIC S7, STEP7 V5.4
FLOATING LICENSE for 1 user
6ES7810-4CC08-0YE5 SIMATIC S7, STEP7 V5.4
UPGRADE (V3.X - V5.3 to V5.4)
FLOATING LICENSE for 1 user
6ES7810-4CC08-0YA6 SIMATIC S7, STEP7 V5.4
RENTAL LICENSE for 50 hours
6ES7810-4CC08-0YA7 SIMATIC S7, STEP7 V5.4,
DATA CARRIER incl. TRIAL LICENSE,
6ES7810-4CA08-8AW0 Basic Information for V5.4, German
6ES7810-4CA08-8BW0 Basic Information for V5.4, English
6ES7810-4CA08-8CW0 Basic Information for V5.4, French
6ES7810-4CA08-8DW0 Basic Information for V5.4, Spanish
6ES7810-4CA08-8EW0 Basic Information for V5.4, Italian
6ES7810-4CA08-8AW1 Reference Manual for V5.4, German
6ES7810-4CA08-8BW1 Reference Manual for V5.4, English
6ES7810-4CA08-8CW1 Reference Manual for V5.4, French
6ES7810-4CA08-8DW1 Reference Manual for V5.4, Spanish
6ES7810-4CA08-8EW1 Reference Manual for V5.4, Italian
 
6. STEP 7 V5.3 - end of production
With the delivery release of STEP 7 V5.5, the supply of STEP 7 V5.3 will be discontinued, i.e. STEP 7 V5.3 plus the associated manuals will cease to be available effective end of September 2010. The following items are affected by this measure:
 
Order No.
Product Name
6ES7810-4CC07-0YA5 SIMATIC S7, STEP7 V5.3
FLOATING LICENSE for 1 user
6ES7810-4CC07-0YE5 SIMATIC S7, STEP7 V5.3
UPGRADE (V3.X - V5.2 to V5.3)
FLOATING LICENSE for 1 user
6ES7810-4CC07-0YC5 SIMATIC S7, STEP7 V5.3 POWERPACK
(STEP 7 LITE V2.0 to STEP 7 V5.3)
FLOATING LICENSE for 1 user
6ES7810-4CC07-0YA6 SIMATIC S7, STEP7 V5.3
RENTAL LICENSE for 50 hours
6ES7810-4CC07-0YA7 SIMATIC S7, STEP7 V5.3,
DATA CARRIER incl. TRIAL LICENSE,
6ES7810-4CA07-8AW0 Basic Information for V5.3, German
6ES7810-4CA07-8BW0 Basic Information for V5.3, English
6ES7810-4CA07-8CW0 Basic Information for V5.3, French
6ES7810-4CA07-8DW0 Basic Information for V5.3, Spanish
6ES7810-4CA07-8EW0 Basic Information for V5.3, Italian
6ES7810-4CA07-8AW1 Reference Manual for V5.3, German
6ES7810-4CA07-8BW1 Reference Manual for V5.3, English
6ES7810-4CA07-8CW1 Reference Manual for V5.3, French
6ES7810-4CA07-8DW1 Reference Manual for V5.3, Spanish
6ES7810-4CA07-8EW1 Reference Manual for V5.3, Italian

 STEP 7 - is a basic software package, which includes in its membership the tools needed for programming and operation control systems, based on programmable controllers SIMATIC S7/C7, as well as computer control systems SIMATIC WinAC.

Year: 2010
Version: v5.5
Developer: SIEMENS A & D
Platform: x86 32-bit only
Compatible with only a 32-bit OS:
Windows XP Professional, Windows Server 2003,
Windows 7 (for the home version edit Setup.ini)
Set on / Install to Windows XP / Vista Home Edition
RAM RAM of 2 GB recommended
Size: 700.93 Mb
The package includes:
* STEP 7 V5.5;
* ALM v5.0 SP1.
A distinctive feature of the package STEP 7 is to develop complex automation projects based on the use of multiple programmable controllers, industrial computers, devices and systems, human-machine interface devices, distributed I / O, network structures of industrial relations. Restrictions on the development of such projects are imposed only features programmers or computers that are running STEP 7.
STEP 7 tools allow you to:
* Configure and define the settings of equipment.
* Configure systems of industrial relations and setting parameters of data transmission.
* Programming, testing, debugging and running programs of individual automation systems, as well as their local or remote maintenance.
* Documenting and archiving project data.
* Operational management and diagnostic equipment.
STEP 7 supplied programmers SIMATIC Field PG and SIMATIC Power PG. It may come as a separate software package for personal computers running operating systems Windows 7 / XP PROF. To be able to connect programmable controllers, computer must be equipped with an MPI card or PC / MPI adapter and connecting cable.

STEP 7 provides parallel execution of work on one project by several developers. The only restriction in this case is the impossibility of simultaneous recording of data by multiple developers.

To install Step7 on Windows XP / Vista Home Basic and Vista Home Premium to:
1. Extract the service pack to your hard disk;
2. Open the file Setups.ini;
3. Find a terrible line;
For Vista WinVistaExclude = SKU2; SKU3; SKU5; SKU8; SKU9; SKU10; SKU11; SKU12; SKU13; SKU14; SKU15; SKU16; SKU17; SKU18; SKU19; SKU20; SKU21; SKU22; SKU23; SKU24; SKU25
For HRyuni WinXPExclude = 0, ...
4. Placed at the beginning of this line, or simply delete it.
Everything is now possible to safely install and use Step7 on Vista Home Premium.
#