General Information

Library Overview

The DigitalTwinCommunication library provides OPC UA structures to build and emulate devices in EcoStruxure Machine Expert Twin.

Since the DigitalTwinCommunication library serves as a bridge between EcoStruxure Machine Expert and EcoStruxure Machine Expert Twin, the following terms are used as synonyms describing identical concepts in the different contexts:
  • Entity: In the EcoStruxure Machine Expert context, an entity is a mechatronic component like a robot, a conveyor or a multi carrier. Once an entity has been added to a scene in EcoStruxure Machine Expert Twin, entity is referred to as an assembly.

  • Target: In the EcoStruxure Machine Expert context, a target is an object with a defined geometric shape and size. In the EcoStruxure Machine Expert Twin context, target corresponds to a load.

Also refer to the glossary for further definitions.

Characteristics of the Library

The table indicates the characteristics of the library:

Characteristic

Value

Library title

DigitalTwinCommunication

Company

Schneider Electric

Category

Communication

Component

Digital Twin Communication Library

Default namespace

DTC

Language model attribute

Qualified-access-only

Forward compatible library

Yes FCL

NOTE: For this library, qualified-access-only is set. The POUs, data structures, enumerations, and constants must be accessed using the namespace of the library. The default namespace of the library is DTC.

Controller Platforms

The DigitalTwinCommunication library is supported by the following controller platforms:

  • PacDrive LMC Eco

  • PacDrive LMC Pro/Pro2

  • Modicon M262 Motion Controllers:
    • TM262M25MESS8T

    • TM262M35MESS8T

General Considerations

NOTE: Schneider Electric adheres to industry best practices in the development and implementation of control systems. This includes a "Defense-in-Depth" approach to secure an Industrial Control System. This approach places the controllers behind one or more firewalls to restrict access to authorized personnel and protocols only.
 WARNING
UNAUTHENTICATED ACCESS AND SUBSEQUENT UNAUTHORIZED MACHINE OPERATION
  • Evaluate whether your environment or your machines are connected to your critical infrastructure and, if so, take appropriate steps in terms of prevention, based on Defense-in-Depth, before connecting the automation system to any network.
  • Limit the number of devices connected to a network to the minimum necessary.
  • Isolate your industrial network from other networks inside your company.
  • Protect any network against unintended access by using firewalls, VPN, or other, proven security measures.
  • Monitor activities within your systems.
  • Prevent subject devices from direct access or direct link by unauthorized parties or unauthenticated actions.
  • Prepare a recovery plan including backup of your system and process information.
Failure to follow these instructions can result in death, serious injury, or equipment damage.

For more information on organizational measures and rules covering access to infrastructures, refer to ISO/IEC 27000 series, Common Criteria for Information Technology Security Evaluation, ISO/IEC 15408, IEC 62351, ISA/IEC 62443, NIST Cybersecurity Framework, Information Security Forum - Standard of Good Practice for Information Security and refer to Cybersecurity Guidelines for EcoStruxure Machine Expert, Modicon and PacDrive Controllers and Associated Equipment.