What Is SCADA How Does Work
What Is SCADA How Does Work
What Is SCADA How Does Work
This can be graphical and tabular and can involve words and pictures
(or mimics).
The central host will scan the RTU’s or the RTU’s will report in Data can
be of three main types.
Analogue data (i.e. real numbers) will be trended (ie placed in graphs).
Digital data (on/off) may have alarms attached to one state or the
other. Pulse data (e.g. counting revolutions of a meter) is normally
accumulated or counted
For example, the PLC (in an industrial process) controls the flow of
cooling water, the SCADA system allows any changes related to the
alarm conditions and set points for the flow (such as high
temperature, loss of flow, etc) to be recorded and displayed.
Data acquisition starts at the PLC or RTU level, which includes the
equipment status reports, and meter readings. Data is then formatted
in such way that the operator of the control room can make the
supervisory decisions to override or adjust normal PLC (RTU) controls,
by using the HMI.
For example, the picture of the pump that is connected to the pipe
shows that this pump is running and it also shows the amount of fluid
pumping through the pipe at the particular moment.
The pump can then be switched off by the operator. The software of
the HMI shows the decrease in the flow rate of fluid in the pipe in the
real time.
SCADA systems are commonly used in alarm systems. The alarm has
only two digital status points with values ALARM or NORMAL. When
the requirements of the Alarm are met, the activation will start.
For example, when the fuel tank of a car is empty, the alarm is
activated and the light signal is on. To alert the SCADA operators and
managers, text messages and emails are sent along with alarm
activation.
SCADA Hardware
SCADA system may have the components of the Distributed Control
System. Execution of easy logic processes without involving the master
computer is possible because ‘smart’ PLCs or RTUs.IEC61131-
39(Ladder Logic) is used, (this is a functional block programming
language, commonly used in creating programs running on PLCs and
RTUs.)
Supervisory Station
A ‘supervisory Station’ refers to the software and servers responsible
for communication with the field equipment (PLCs, RTUs etc), and after
that, to HMI software running on the workstations in the control room,
or somewhere else.
SCADA Architectures
Monolithic: The First Generation
In the first generation, mainframe systems were used for computing.
At the time SCADA was developed, networks did not exist.
Therefore, the SCADA systems did not have any connectivity to other
systems, meaning they were independent systems. Later on, RTU
vendors designed the Wide Area Networks that helped in
communication with RTU.
The cost and size of the stations were reduced in comparison to the
ones used in the first generation. The protocols used for the networks
were still proprietary, which caused many security issues for SCADA
systems.
Due to the proprietary nature of the protocols, very few people
actually knew how secure the SCADA installation was.
Since the standard protocols used and the networked SCADA systems
can be accessed through the internet, the vulnerability of the system is
increased.
SCADA Trends
In the late 1990s instead of using the RS-485, manufacturers used
open message structures like Modbus ASCII and Modbus RTU (both
developed by Modicon). By 2000, almost all I O makers offered fully
open interfacing like Modbus TCP instead of the IP and Ethernet.
SCADA systems also are used for monitoring and controlling physical
processes, like distribution of water, traffic lights, electricity
transmissions, gas transportation and oil pipelines and other systems
used in the modern society. Security is extremely important because
destruction of the systems would have very bad consequences.
There are two major threats. The first one is unauthorized access to
software, be it human access or intentionally induced changes, virus
infections or other problems that can affect the control host machine.
The second threat is related to the packet access to network segments
that host SCADA devices.
Often, SCADA users infer that VPN is sufficient protection, and remain
oblivious to the fact that physical access to network switches and jacks
related to SCADA provides the capacity to bypass the security on
control software and control SCADA networks.
APPLICATIONS OF SCADA:
1)Application In Power Plants:
A group of Hydro and Gas generation plants when the load demand
exceeds the generating capacity, These plants are considered as peak
load plants because these plants can start in no time and deliver
power to the grid.
These plants are located in the romote locations. These plants are
controlled by opening and closing the valves of turbines so that they
can deliver the power in peak conditions and can be kept on standby
during normal load conditions.
3)Applications In Pipelines:
Pipelines carrying oil, gas, chemicals and water which are located at
varying distances from the plant needs continuous monitoring and
control.
Control includes opening and closing the valves, starting and stopping
the pumps. Monitoring the flowrate and other parameters to avoid
leakage in the pipelines by acquiring the data and carrying out
suitable controls is done through SCADA systems.