You are on page 1of 32

I.

INTRODUCTION
SCADA is not a specific technology, but a type of application. SCADA stands for Supervisory Control and Data Acquisition ,any application that gets data about a system in order to control that system is a SCADA application. A SCADA application has two elements: Y The process/system/machinery you want to monitor acontrol. This can be a power plant, a water system, a network , a system of traffic lights, or anything else. Y A network of intelligent devices that interfaces with the first system through sensors and control outputs. This network, which is the SCADA system, gives you the ability to measure and control specific elements of the first system. You can build a SCADA system using several different kinds of technologies and protocols. This white paper will help you evaluate your options and decide what kind of SCADA system is best for your needs.

Where is SCADA Used?


You can use SCADA to manage any kind of equipment. Typically, SCADA systems are used to automate complex industrial processes where human control is impractical systems where there are more control factors, and faster moving control factors, than human beings can comfortably manage. Around the world, SCADA systems control: Electric power generation, transmission and distribution: Electric utilities use SCADA systems to detect current flow and line voltage, to monitor the operation of circuit breakers, and to take sections of the power grid online or offline.

Water and sewage:

State and municipal water utilities use SCADA to monitor and regulate water flow, reservoir levels, pipe pressure and other factors. Buildings, facilities and environments: Facility managersuse SCADA to control HVAC, refrigeration units, lighting andentry systems.

Manufacturing:
SCADA systems manage parts inventories for just-in-time manufacturing, regulate industrial automation and robots, and monitor process and quality control. Mass transit: Transit authorities use SCADA to regulate electricity to subways, trams and trolley buses; to auto mate traffic signals for rail systems; to track and locate trains and buses; and to control railroad crossing gates.

Traffic signals:
SCADA regulates traffic lights, controls traffic flow and detects out-of-order signals. As Im sure you can imagine, this very short list barely hints at all the potential applications for SCADA systems. SCADA is used in nearly every industry and public infrastructure project anywhere where automation increases efficiency. Whats more, the se examples dont show how deep and complex SCADA data can be. In every industry, managers need to control multiple factors and the interactions between those factors. SCADA systems provide the sensing capabilities and the computational power to track everything thats relevant to your operations.

Whats the Value of SCADA to You?


Maybe you work in one of the fields I listed; maybe you dont .But think about your operations and all the parameters that affect your bottom-line results: Does your equipment need an uninterrupted power supply and/or a controlled temperature and

humidity environment? Do you need to know in real time the status of many different components and devices in a large complex system? Do you need to measure how changing inputs affect the output of your operations? What equipment do you need to control, in real time, from a distance? Where are you lacking accurate, real-time data about key processes that affect your operations? Real-Time Monitoring and Control Increases Efficiency And Maximizes Profitability Ask yourself enough questions like that, and Im sure you can see where you can apply a SCADA system in your operations. But Im equally sure youre asking So what? What you really want to know is what kind of real-world results you can expect from using SCADA .Here are few of the things you can do with the information and control capabilities you get from a SCADA system: Access quantitative measurements of important processes, both immediately and over time Detect and correct problems as soon as they begin Measure trends over time Discover and eliminate bottlenecks and inefficiencies Control larger and more complex processes with a smaller ,less specialized staff A SCADA system gives you the power to fine-tune your knowledge of your systems. You can place sensors and controls at every critical point in your managed process (and as SCADA technology improves, you can put sensors in more and more places). As you monitor more things, you have amore detailed view of your operations and most important, its all in real time. So even for very complex manufacturing processes, large electrical plants, etc., you can have an eagle-eye view of every event while its happening and that means you have a knowledge base from which to correct errors and improve efficiency. With SCADA, you can do more, at less cost, providing a direct increase in profitability. II.DETAILED WORKING OF SCADA SYSTEMS A SCADA system performs four functions: 1. Data acquisition 2. Networked data communication 3. Data presentation

4. Control These functions are performed by four kinds of SCADA components: 1.Sensors (either digital or analog) and control relays thatdirectly interface with the managed system. 2.Remote telemetry units (RTUs). These are small computerized units deployed in the field at specific sites and locations. RTUs serve as local collection points for gathering reports from sensors and delivering commands to control relays 3. SCADA master units. These are larger computer consoles that serve as the central processor for the SCADA system. Master units provide a human interface to the system and automatically regulate the managed system in response to sensor inputs. 4. The communications network that connects the SCAD A master unit to the RTUs in the field. The Worlds Simplest SCADA System .The simplest possible SCADA system would be a single circuit that notifies you of one event. Imagine a fabrication machine that produces widgets. Every time the machine finishes a widget, it activates a switch. The switch turns on alight on a panel, which tells a human operator that a widget has been completed. Obviously, a real SCADA system does more than this simple model. But the principle is the same. Afull-scale SCADA system just monitors more stuff over greater distances. Lets look at what is added to our simple model to create a full scale SCADA system: A. Data Acquisition First, the systems you need to monitor are much more complex than just one machine with one output. So a real-life SCADA system needs to monitor hundreds or thousands of sensors. Some sensors measure inputs into the system (for example, water flowing into a reservoir), and some sensors measure outputs (like valve pressure as water is released from

the reservoir). Some of those sensors measure simple events that can be detected by a straightforward on/off switch, called a discrete input (or digital input). For example, in our simple model of the widget fabricator, the switch that turns on the light would be a discrete input. In real life, discrete inputs are used to measure simple states, like whether equipment is on or off, or tripwire alarms, like a power failure at a critical facility. Some sensors measure more complex situations where exact measurement is important. These are analog sensors, which can detect continuous changes in a voltage or current input. Analog sensors are used to track fluid levels in tanks, voltage levels in batteries, temperature and other factors that can be measured in a continuous range of input. For most analog factors , there is a normal range defined by a bottom and top level. For example, you may want the temperature in a server room to stay between 60 and 85 degrees Fahrenheit. If the temperature goes above or below this range, it will trigger a threshold alarm. In more advanced systems, there are four threshold alarms for analog sensors, defining Major Under, Minor Under, Minor Over and Major Over alarms.

B Data Communication In our simple model of the widget fabricator, the network is just the wire leading from the switch to the panel light. In real life, you want to be able to monitor multiple systems from a central location, so you need a communications network to transport all the data collected from your sensors. Early SCADA networks communicated over radio, modem or dedicated serial lines. Today the trend is to put SCADA data on Ethernet and IP over SONET. For security reasons, SCADA data should be kept on closed LAN/WANs without exposing sensitive data to the open Internet. Real SCADA systems dont communicate with just simple electrical signals, either. SCADA data is encoded in protocol format. Older SCADA systems depended on closed proprietary protocols, but today the trend is to open, standard protocols and protocol mediation. Sensors and control relays are very simple electric devices that cant generate or interpret protocol communication on their own. Therefore the remote telemetry unit (RTU) is needed to provide an interface between the sensors and the SCADA network. The RTU encodes sensor inputs into protocol format and forwards

them to the SCADA master; in turn, the RTU receives control commands in protocol format from the master and transmits electrical signals to the appropriate control relays. C. Data Presentation The only display element in our model SCADA system is the light that comes on when the switch is activated. This obviously wont do on a large scale you cant track a light Figure 1(a), 1(b) showing the simplest SCADA system and the components of SCADA respectively

board of thousand separate lights, and you dont want to pay someone simply to watch a light board, either. A real SCADA system reports to human operators over a specialized computer that is variously called a master station, an HMI(Human-Machine Interface) or an HCI (Human- Computer Interface). The SCADA master station has several different functions. The master continuously monitors all sensors and alerts the operator when there is an alarm that is, when a control factor is operating outside what is defined as its normal operation. The master presents a comprehensive view of the entire managed system, and presents more detail in response to user requests. The master also performs data processing on information gathered from sensors it maintains report logs and summarizes historical trends. An advanced SCADA master can add a great deal of intelligence and automation to your systems management, making your job much easier. D. Control

Unfortunately, our miniature SCADA system monitoring the widget fabricator doesnt include any control elements. So lets add one. Lets say the human operator also has a but to non his control panel. When he presses the button, it activates a switch on the widget fabricator that brings more widget parts into the fabricator. Now lets add the full computerized control of a SCADA master unit that controls the entire factory. You now have a control system that responds to inputs elsewhere in the system. If the machines that make widget parts break down, you can slow down or stop the widget fabricator. If the part fabricators are running efficiently, you can speed up the widget fabricator. If you have a sufficiently sophisticated master unit, these controls can run completely automatically, without the need for human intervention. Of course, you can till manually override the automatic controls from the master station. In real life, SCADA systems automatically regulate all kinds of industrial processes. For example, if too much pressure is building up in a gas pipeline, the SCADA system can automatically open a release valve. Electricity production can be adjusted to meet demands on the power grid. Even\these real-world examples are simplified; a full-scale SCADA system can adjust the managed system in response to multiple inputs. III.EVALUATION OF SCADA SYSTEMS AND HARDWARE SCADA can do a lot for you but how do you make sure that youre really getting the full benefits of SCADA? Evaluating complex systems can be tricky especially if you have to learn a new technology while still doing your everyday job .But youve got to be able to make an informed decision, because the stakes are incredibly high. SCADA system is a major, business-to-business purchase that your company will live with for maybe as long as 10 to 15 years. When you make a recommendation about a permanent system like that, youre laying your reputation on the line and making a major commitment for your company. And as much as SCADA can help you improve your operations, there are also some pitfalls to a hasty, unconsidered SCADA implementation: You can spend a fortune on unnecessary cost overruns Even after going way over budget, you can STILL

end up with a system that doesnt really meet all your needs Or just as bad, you can end up with an inflexible system that just meets your needs today, but cant easily expand as your needs grow so lets go over some guidelines for what you should look for in a SCADA system.

What to Look for in a SCADA RTU


Your SCADA RTUs need to communicate with all your on-site equipment and survive under the harsh conditions of an industrial environment. Heres a checklist of things you should expect from a quality RTU: Y Sufficient capacity to support the equipment at your Site but not more capacity than you actually will use. At every site , you want an RTU that can support your expected growth over a reasonable period of time, but its simply wasteful to spend your budget on excess capacity that you wont use. Y Rugged construction and ability to withstand extremes of temperature and humidity. You know how punishing one equipment your sites can be. Keep in mind that your SCADA system needs to be the most reliable element in your facility. Y Secure redundant power supply. You need your SCADA system up and working 24/7, no excuses. Your RTU should support battery power and, ideally, two power inputs. Y Redundant communication ports. Network connectivity is as important to SCADA operations as a power supply. A secondary serial port or internal modem will keep your RTU online even if the LAN fails. Plus, RTU s with multiple communication ports easily support a LAN migration strategy. Y Nonvolatile memory (NVRAM)

for storing software and/or firmware. NVRAM retains data even when power is lost. New firmware can be easily downloaded to NVRAM storage, often over LAN so you can keep your RTU scapabilities up to date without excessive site visits. Y Intelligent control. As I noted above, sophisticated SCADA remotes can control local systems by themselves according to programmed responses to sensor inputs. This is nt necessary for every application, but it does come in handy for some users. Y Real-time clock for accurate date/time stamping of reports. Y Watchdog timer to ensure that the RTU restarts after a power failure.

What to Look for in a SCADA Master


Your SCADA master should display information in the most useful ways to human operators and intelligently regulated your managed systems. Heres a checklist of SCADA master must-haves: Y Flexible, programmable response to sensor inputs. Y Look for a system that provides easy tools for programming soft alarms (reports of complex events that track combinations of sensor inputs and date/time statements) and soft controls (programmed control responses to sensor inputs). Y 24/7, automatic pager and email notification. Y Theres no need to pay personnel to watch a board 24 hours a day. If equipment needs human attention, the SCADA master can automatically page or email directly to repair technicians. Y Detailed information display. You want a system that displays reports in plain English, with a complete description of what activity is happening and how you can manage it.

Y Nuisance alarm filtering. Nuisance alarms desensitize your staff to alarm reports, and they start to believe that all alarms are nonessential alarms. Eventually they stop responding even to critical alarms. Look for a SCADA master that includes tools to filter out nuisance alarms. Y Expansion capability. A SCADA system is a long term investment that will last for as long as 10 to 15 years. So you need to make sure it will support your future growth for up to 15 years. Y Redundant, geo diverse backup. The best SCADA systems support multiple backup masters, in separate locations.. If the primary SCADA master fails, a second master on the network automatically takes over, with no interruption of monitoring and control functions. Y Support for multiple protocols and equipment types. Early SCADA systems were built on closed, proprietary protocols. Single-vendor solutions are nt a great idea vendors sometimes drop support for their products or even just go out of business. Support for multiple open protocols safeguards your SCADA system against unplanned obsole scence. Now that you know about the SCADA application and its components , youll want to know where the sensors come in.Sensors used in SCADA systems can be discrete or analog. Discrete vs. Analog Alarms Some sensors detect conditions that are reported as an on or an off (called a discrete input or digital input). That onand off originate as an on/off, such as a door sensor, or can represent an analog value that crosses a threshold. Other sensors measure more complex situations where exact measurement is important. Not every alarm condition can be represented by an on and off.Analogs provide you with the ability to monitor environmental factors that affect your operations. These inputs can answer the question of how much?. Common examples of analog values include temperature, battery voltages, humidity, and many more. By knowing when these factors cross critical thresholds and by

seeing their rate of change, you can take action before these conditions affect your network. As an example , you might bring in a portable generator if your batteries run low. For most analog measurements, you ideally want to keep the value between a bottom and top level. For example, you might want the temperature in a server room to stay between 60 and 72 degrees Fahrenheit. If the temperature goes above or below this range, you need to be notified. Good SCADA systems will support your custom safe zone and alert you automatically if the sensor detects conditions outside of that range. In more advanced systems, there are four threshold alarms for analog sensors, defining Major Under, Minor Under, Minor Over and Major Over alarms. These user-defined values will help you to distinguish the severity of alarms by indicating when a monitored analog has passed a certain value, such as a major temperature high that threatens your equipment. Know Exactly How Much with Analog Monitoring Analog monitoring is highly valuable, as it conveys specific environmental levels, fuel levels, and battery voltages from analog sensors. Near real-time readings of these continuous values provide a much clearer picture of your network than you can achieve with discrete alarm points alone. Analog Sensors Show You Exactly Whats Happening in Your Network One of the primary advantages of using analog sensors for environmental monitoring is the ability to monitor shifting analog values in near real-time. This gives you insight into how the temperature, humidity, or battery voltage is rising or dropping at a site, allowing you to dispatch your technicians most effectively. It helps you make fast, prioritized decisions. For example, your discrete alarm notifies you of 2 hot more sites. One site is at 74 degrees, while the other has reached118 degrees. How do you know which to fix first? Levels measured by analog sensors can have critical effects on essential equipment - and when your network uptime is threatened , you want all the information you can get.

Powering Your Sensors

You have an important choice to make when deciding how to power the sensors for your SCADA system. Here are your twomajor options: 1) Commercial Power-This is a simple way power SCADA sensors. However, when remote sites experience a power outage, so do your sensors. They are also unprotected againsta power surge. 2) RTU Power- The ideal way to provide power to your sensors is through a secure, redundant power supply. Using your SCADA remotes as the power supply for your sensors offers a big advantage. Your sensors are protected from commercial power failures because theyre running on thesame protected battery power as your SCADA remotes. Establish Critical Thresholds and Receive Alarms when Theyre Crossed Basic SCADA systems almost never include analog inputs, so youll never be able to measure exact values. Analog sensor support gives you the key advantage of complete visibility .For example, suppose you are measuring the temperature of are mote site. Under normal conditions, the buildings heating and cooling system will keep the temperature within an acceptable range. But if climate control fails and your equipment is threatened, will you have enough information to make the right decisions? board of thousand separate lights, and you dont want to pay someone simply to watch a light board, either. Areal SCADA system reports to human operators over a specialized computer that is variously called a master station, an HMI(Human-Machine Interface) or an HCI (Human- Computer Interface). The SCADA master station has several different functions. The master continuously monitors all sensors and alerts the operator when there is an alarm that is, when a control factor is operating outside what is defined as its normal operation. The master presents a comprehensive view of the entire managed system, and presents more detail in response to user requests. The master also performs data processing on information gathered from sensors it maintains report logs and summarizes historical trends. An advanced SCADA master can add a great deal of intelligence and automation to your systems management, making your job much easier.

D. Control Unfortunately, our miniature SCADA system monitoring the widget fabricator does nt include any control elements. So lets add one. Lets say the human operator also has a but to non his control panel. When he presses the button, it activates a switch on the widget fabricator that brings more widget parts into the fabricator. Now lets add the full computerized control of a SCADA master unit that controls the entire factory. You now have a control system that responds to inputs elsewhere in the system. If the machines that make widget parts break down, you can slow down or stop the widget fabricator. If the part fabricators are running efficiently, you can speed up the widget fabricator. If you have a sufficiently sophisticated master unit, these controls can run completely automatically, without the need for human intervention. Of course, you can still manually override the automatic controls from the master station. In real life, SCADA systems automatically regulate all kinds of industrial processes. For example, if too much pressure is building up in a gas pipeline, the SCADA system can automatically open a release valve. Electricity productioncan be adjusted to meet demands on the power grid. Even\these real-world examples are simplified; a full-scale SCADA system can adjust the managed system in response to multipleinputs. III.EVALUATION OF SCADA SYSTEMS AND HARDWARE SCADA can do a lot for you but how do you make sure that youre really getting the full benefits of SCADA? Evaluating complex systems can be tricky especially if you have to learn a new technology while still doing your everyday job .But you ve got to be able to make an informed decision, because the stakes are incredibly high. SCADA system is a major, business-to-business purchase that your company will live with for maybe as long as 10 to 15 years .When you make a recommendation about a permanent system like that, youre laying your reputation on the line and makinga major commitment for your company. And as much asSCADA can help you improve your operations, there are alsosome pitfalls to a hasty, unconsidered SCADA implementation: You can spend a fortune on unnecessary cost overruns Even after going way over budget, you can STILL

end up with a system that does nt really meet all your needs Or just as bad, you can end up with an inflexible system that just meets your needs today, but cant easily expand as your needs grow so lets go over some guidelines for what yous hould look for in a SCADA system. What to Look for in a SCADA RTU Your SCADA RTUs need to communicate with all your on-site equipment and survive under the harsh conditions of an industrial environment. Heres a checklist of things you should expect from a quality RTU: Y Sufficient capacity to support the equipment at your Site but not more capacity than you actually will use. At every site , you want an RTU that can support your expected growth over a reasonable period of time, but its simply wasteful to spend your budget on excess capacity that you wont use. Y Rugged construction and ability to withstand extremes of temperature and humidity. You know how punishing on equipment your sites can be. Keep in mind that your SCADA system needs to be the most reliable element inyour facility. Y Secure redundant power supply. You need your SCADAsystem up and working 24/7, no excuses. Your RTU should support battery power and, ideally, two power inputs. Y Redundant communication ports . Network connectivity isas important to SCADA operations as a power supply. A secondary serial port or internal modem will keep your RTU online even if the LAN fails. Plus, RTUs with multiple communication ports easily support a LAN migration strategy. Y Nonvolatile memory (NVRAM) for storing software and/or firmware. NVRAM retains data even when power islost. New firmware can be easily downloaded to NVRAM storage , often over LAN so you can keep your RTUscapabilities up to date without excessive site visits.

Y Intelligent control. As I noted above, sophisticated SCADA remotes can control local systems by themselves according to programmed responses to sensor inputs. This isnt necessary for every application, but it does come in handy for some users. Y Real-time clock for accurate date/time stamping of reports. Y watch dog timer to ensure that the RTU restarts after a power failure. What to Look for in a SCADA Master Your SCADA master should display information in the mostuseful ways to human operators and intelligently regulatedyour managed systems. Heres a checklist of SCADA master must-haves: Y Flexible, programmable response to sensor inputs. Y Look for a system that provides easy tools for programming soft alarms (reports of complex events that track combinations of sensor inputs and date/time statements) and As an example, you might set up 4 different thresholdvalues: 1) When the temperature is below 45 degrees, page atechnician and notify the Network Operations Center (NOC)with a major alarm. A value this low might indicate that theheater is not working at all. 2) When the temperature is below 60 degrees, notify the NOCwith a minor alarm. This may indicate that the heater is notfunctioning at full capacity. 3) When the temperature is above 90 degrees, notify the NOCwith a minor alarm. This may indicate that the air conditioningunit is not functioning at full capacity.

4) When the temperature is above 100 degrees, notify the NOC with a major alarm. This may indicate that the air conditioning unit has failed - Equipment and services are in jeopardy.To ensure that you can react appropriately to rapidlyfluctuating site conditions, its essential to choose the right SCADA system that features analog inputs that report realtime analog values. Analog Parameters and Scaling Once youve determined what your different threshold values need to be, youll want to be notified if they are crossed. But how can you make sure your alarm notifications arrive in native units (like F) that make sense? An advanced SCADARTU uses analog scaling to convert voltage readings to the units you need, such as degrees. For example, lets say you need to monitor outside temperature, and youve got a sensor with a measurable range of 4 to 167 Fahrenheit (20 to75 Celsius). The voltage for the analog channel is between 1and 5 VDC for that sensor, and is reported as F. Here, 1 volt represents 4 F and 5 volts represents 167 F. Simply by in putting these two values into your remote, every notification you receive will be in F instead of meaningless voltages. Scale it once, use it forever. The Top 10 SCADA Sensors: 1.) Temperature Sensors The most basic way to monitor temperature is a discrete threshold sensor. This is very similar to a simple home thermostat. You set a high-point threshold or a low-point threshold (one per sensor). When these presets are exceeded , you get a contact closure alarm, which translates toa basic high or low temperature alarm. The downside to this type of alarm is that if your threshold was set to 80F, you could be at 81F or 181F - and all you wouldnt be able to tell the difference! More advanced temperature sensors output analog values .Analog monitoring allows you to monitor fluctuating sensor levels at your remote sites. With the right SCADA system ,you can use your analog readings to send alarms based on configurable thresholds. You can have different thresholds for low, critically low, high, and critically high.

2) Humidity Sensors Often , humidity monitoring is over looked. But it is one of the key environmental alarms to monitor in every unmanned remote site. Looking at both internal and external humidity ranges, its very important to monitor what conditions your revenue-generating equipment is operating in. If your environmental control unit failed and you did not have adequate monitoring of the humidity at your site, you would be completely unaware of the damage and would be too late in preventing equipment failure. Humidity can be monitored with both discrete and analog sensors, much like temperature. Where possible, look for a sensor that monitors temperature and humidity. 3.) Motion Sensors The most critical element of physical site security is being able to detect intruders and receive an immediate alert. Motion sensors provide you with the instant information you need to react to an intruder before the real damage is done. Discrete motion sensors can even turn on alight and send an immediate intrusion notification when movement is detected in its field of vision. Its very important to consider placement when installing motion sensors .Windows and other possible intrusion points should be protected by motion sensors. 4.) Liquid Level Sensors Liquid level sensors can be used to monitor water towers and fuel tanks. This makes them specially useful for alarm circuits that control motor starters ,contactors , solenoids, and relays. You should always knowhow much fuel you have before activating any piece of equipment. With a discrete liquid level sensor, you can configure the sensor to latch a contact closure when your liquid level has fallen below a critical line. This allows you to receive a notification when your water, fuel, or other tanks are low. Dont risk running dry by ignoring the liquid levels of your machines and other equipment. 5.)Water Flow Sensors -

Using water flow sensors gives you an accurate picture of your fluid flow rates. Most flow sensors can monitor water with an internal flow meter or a flow data logging device. At at water treatment plant, water flow Is one item on a long list of data that must be collected during the treatment process. Its important to find a reliable water flow sensor that produces accurate flow results and allows you to make quick decisions based on that data. 6.) Smoke Sensors Smoke sensors are critical safety devices needed in every home, and the same principle holds true for your remote sites. There are many possible reasons a fire could break out at a site. Overheated equipment, electrical short , wildfire the list goes on. In order to save your revenue-generating equipment, you need to know right away if smoke or fire is present at a remote site. Fires cause irreparable damage, and smoke sensors are your first line of defense. 7.) Door Sensors Whether or not youve already experienced theft or vandalism in your network, your unmanned sites are vulnerable. While you might expect this type of criminal activity from strangers, an alarming amount of damage is done by employees, ex-employees, and outside contractors . Door sensors keep your revenue-generating equipment secure. Youll know the moment someone tries to gain unauthorized access to one of your remote sites, or if an employee enters when theyre not supposed to. Without the protection a door sensor and other BAS sensors can provide ,an unknowing technician could walk into a dangerous situation. 8.) Power Failure Sensors The primary damage caused by a power outage is obvious: If commercial power and you dont have a reliable backup power supply, that site will eventually go dark. Dark sites mean network downtime, lost revenue, and frustrated customers. A power failure sensor will send an alarm when power is disrupted . This is a discrete sensor that outputs a contact closure when power is not detected for a user-defined amount of time. Most users want to receive a critical alarm after any failure lasting more than a few seconds.

9.) Current Sensors You must always know whether your battery chargers, backup generators, and other power sources are outputting power. Analog current sensors tell you way more than, Theyre outputting power. Youll also know how much. Measuring AC/DC currents, current sensors isolate thesensor output from the conductor. These types of sensors arehighly useful for motor drives, UPS systems, and batterysupplies.

10.) Propane Tank Sensors Monitoring your propane tank scan save you from running out of fuel. Some propane sensors end can audible alert when theyre running low. Depending onyour tanks, a float sensor that gauges the propane remaining inyour tank may be all you need. At sites where propane is the main fuel source, you may need advanced sensors that track gas usage rates and report back to an on-site RTU, like the Net Guardian, with the exact amount left. These type of analog sensors will allow you to order more propane for your tank - before it runs empty. An empty propane tank means you have to wait for your next delivery from your supplier, and you may have to suffer without fuel for some time. Control Your Equipment Remotely with Control Relays allow you to remotely switch equipment on and off. They are simply a switch mechanism that can be activated remotely , no matter where you are located. This can be used for anything from light switches to generators to door locks and more. Youll also want to make sure that your RTU supports both N/O and N/C so that if power fails, relay will return to intended operation sufficiently sophisticated master unit or RTU can run these cotrols completely automatically, without the need for human intervention. Of course, you can still manually override the automatic control from

the master station.In real life, SCADA systems automatically regulate all kindsof industrial processes. For example, if too much pressure is building up in a gas pipeline, the SCADA system can utomatically open a release valve. Electricity production can be adjusted to meet demands on the power grid. You want to be able to monitor multiple systems from a central location, so you needa communications network to transport all the datacollected from your sensors.Early SCADA networks communicated over radio, modem or dedicated serial lines. Today the trend is to put SCADA dataon Ethernet and IP over SONET. For security reasons,SCADA data should be kept on closed LAN/WANs withoutexposing sensitive data to the open Internet.Real SCADA systems dont communicate with just simpleelectrical signals, either. SCADA data is encoded in protocolformat. Older SCADA systems depended on closed proprietary protocols, but today the trend is to open, standard protocols and protocol mediation. Sensors and control relaysare very simple electric devices that cant generate or interpret protocol communication on their own. Therefore the remotetelemetry unit (RTU) is needed to provide an interface between the sensors and the SCADA network. The RTUencodes sensor inputs into protocol format and forwards themto the SCADA master; in turn, the RTU receives controlcommands in protocol format from the master and transmitselectrical signals to the appropriate control relays. Advanced SCADA Data Presentation : A real SCADAsystem reports to human operators over a specializedcomputer that is variously called a master station, an HMI(Human-Machine Interface) or an HCI (HumanComputer Interface). The SCADA master station has several differentfunctions. The master continuously monitors all sensors andalerts the operator when there is an alarm that is, when acontrol factor is operating outside what is defined as itsnormal operation. The master presents a comprehensive viewof the entire managed system, and presents more detail inresponse to user requests. The master also performs data processing on information gathered from sensors it maintainsreport logs and summarizes historical trends. An advancedSCADA master can add a great deal of intelligence andautomation to your systems management, making your jobmuch easier.IV.

SECURITY OF SCADA In recent years, utility companies have undergone greatchanges in the way they run their businesses. The pressure toincrease profits and reduce expenses has them integrating their SCADA systems with their business networks to streamlineoperations. The popularity of the Internet has customersrequesting online access to their accounts as well as online bill payment, further increasing network exposure. In addition,utility companies have reduced costs by leveraging theInternet to facilitate core business operations such as outagemanagement and procurement.The first step towards securing SCADA systems is creating awritten security policy, an essential component in protectingthe corporate network. Failure to have a policy in placeexposes the company to attacks, revenue loss and legal action.A security policy should also be a living document, not a static policy created once and shelved. The management team needsto draw very clear and understandable objectives, goals, rulesand formal procedures to define the overall position andarchitecture of the plan. Key personnel such as senior management, IT department, human resources and the legaldepartment all should be included in the plan. It should alsocover the following key components: Y Roles and responsibilities of those affected by the policy Y Actions, activities and processes that are allowed and thosethat are not allowed Y Consequences of non-compliance A.Vulnerability Assessment A key aspect of preparing a written security policy is to perform a vulnerability assessment prior to completing the written policy. A vulnerability assessment is designed to identify both the potential risks associated with the different aspects of the SCADA-related IT infrastructure and the priority of the different aspects of the infrastructure. This would typically be presented in a hierarchical manner, which in turn sets the priority to address security concerns and the level of related funding associated with each area

of vulnerability. For example, within a typical SCADA environment, key items and the related hierarchy could be as follows: Y Operational Availability of Operator Stations Y Accuracy of Real-Time Data Y Protection of System Configuration Data Y Interconnection to Business Networks Y Availability of Historical Data Y Availability of Casual User Stations A vulnerability assessment also acts as a mechanism toidentify holes or flaws in the understanding of how a system isarchitected and where threats against the system mayoriginate.To successfully complete a vulnerability assessment, a physical audit of all the computer and networking equipment,associated software and network routings needs to be performed. A clear and accurate network diagram should beused to present a detailed depiction of the infrastructurefollowing the audit.After defining the hierarchy and auditing the different systemcomponents, the next section highlights the areas of vulnerability need to be addressed, as they relate to eachcomponent, as part of the assessment process. B. Further Security Measures As previously mentioned, SCADA networks were once separate from other networks and physical penetration of the system was needed to perpetuate an attack. As corporate networks became electronically linked via the Internet or wireless technology, physical access was no longer necessary for a cyber attack. One solution is to isolate the SCADA network; however, this is not a practical solution for budget-minded operations that require monitoring plants and remote terminal units (RTU) from distant locations. There ore, security measures need to be taken to protect the network, andsome common security mechanisms apply to virtually all SCADA networks, which have any form of wide area (WAN)or Internet-based access requirements. The core elements are:

Y Network Design Y Firewalls Y Virtual Private Networks (VPN) Y IP Security (IPSec) and Y Demilitarized Zones (DMZs)

C. Network Design Keep It Simple Simple networks are at less risk than more complex,interconnected networks. Keep the network simple and, moreimportantly, well documented from the beginning.A key factor in ensuring a secure network is the number of contact points. These should be limited as far as possible.While firewalls have secured access from the Internet, manyexisting control system have modems installed to allowremote users access to the system for debugging.These modems are often connected directly to controllers inthe substations. The access point, if required, should bethrough a single point that is password protected and whereuser action logging can be achieved. D. Firewalls A firewall is a set of related programs, located at a network gateway server that protects the resources of a private network from outside users. A firewall, working closely with a router program, examines each network packet to determine whether to forward it toward its destination. A firewall also includes or works with a proxy server that makes network requests on behalf of workstation users. A firewall is often installed in aspecially designated computer separate from the rest of thenetwork, so that no incoming request can get directly at private network resources.In packet switched networks such as the Internet, a router is adevice or, in some cases, software in a computer, thatdetermines the next network point to which a packet should beforwarded toward its destination. The router is

connected to atleast two networks and decides which way to send eachinformation packet based on its current understanding of thestate of the networks to which it is connected. A router islocated at any gateway (where one network meets another),including each point of presence on the Internet. A router isoften included as part of a network switch.It is imperative to utilize a secured firewall between thecorporate network and the Internet. As the single point of traffic into and out of a corporate network, a firewall can beeffectively monitored and secured. It is important to have atleast one firewall and router separating the network fromexternal networks not in the companys dominion.On larger sites the control system needs to be protected fromattack within the SCADA network. Implementing anadditional firewall between the corporate and SCADAnetwork can achieve this aim and is highly recommended. E. virtual Private Network ( VPN) One of the main security issues facing more complex networks today is remote access. VPN is a secured way of connecting to remote SCADA networks. With a Virtual Private Network (VPN), all data paths are secret to a certain extent , yet open to a limited group of persons, such as employees of a supplier company. A VPN is basically a group of computers that interact as if they are on their own private network regardless of the actual structure of the physical network (e.g., the Internet, local LAN, wireless LAN, etc) upon which they actually exist. For example, there are a number of systems that allow the creation of networks using the Internet as the medium for transporting data. These systems use encryption and other security measures to ensure only authorized users access the network and data cannot be intercepted. Based on the existing public network infrastructure and incorporating data encryption and tunneling techniques, it provides a high level of data security . Typically a VPN server will be installed either as part of the firewall or as a separate machine to which external users will authenticate before gaining access to theSCADA networks. F..IP Security (IP sec) IP Security (IP sec) is a set of protocols developed by the Internet Engineering Task Force (IETF) to support the secure exchange of packets at the IP layer. IP sec has been deployed

widely to implement VPN s. IP sec can be deployed within a network to provide computerlevel authentication, as well as data encryption. IP sec can becused to create a VPN connection between the two remote networks using the highly secured Layer Two Tunneling Protocol with Internet Protocol security (L2TP/IPSec). IP sec supports two encryption modes: Transport and Tunnel. The Transport mode encrypts only the data portion (payload) of each packet, but leaves the header untouched. The more secure Tunnel mode encrypts both the header and the payload. On the receiving side, an IPSec-compliant device decrypts each packet .For IP sec to work, the sending and receiving devices must share a public key. This is accomplished through a protocol l known as Internet Security Association and Key Management Protocol/Oakley (ISAKMP/ Oakley), which allows the receiver to obtain a public key and authenticate the sender using digital certificates. It is important during the selection process of network hardware such as routers, switches and gateways to consider the inclusion of support for IPSec security as part of thedevices to enable the support of secure VPN connections. G. Demilitarized Zones (DMZ) Demilitarized Zones (DMZ) are a buffer between a trustednetwork (SCADA network) and the corporate network or Internet, separated through additional firewalls and routers,which provide an extra layer of security against cyber attacks.Utilizing DMZ buffers is becoming an increasingly commonmethod to segregate business applications from the SCADAnetwork and is a highly recommended additional securitymeasure.V.

APPLICATION OF SCADA IN POWER SYSTEM

Analysis of Power System reliability provides a means of determining when power system failures or load curtailments occurring . SCADA failures are assumed To occur independently of load curtailments and occur when a power system Operator is unable to retrieve data from or issue controls to primary plant associated with one or more busses. In each case the controls or retrieved data is a necessary part of load restoration. Determining whether a bus is controlled or not, is done by analyzing, The availability of control paths through the SCADA system. This system Is a detailed I model representing the master station, SCADA data communications network , remote terminal units and the data wide area network (WAN). Interest In SCADA reliability arose out of Trans Powers adoption of new, centralized sub transmission SCADA architecture ((a) in Figure 2). This relies on a PC full graphics terminal located remotely at each Area Control Centre (ACC) connected to National Control Centre (NCC).Trans Power previously had implemented distributed systems Similar to (b) in Figure 2 (control did not have 100% overlap).In each case the NCC acts as a standby backup facility for the ACC. This work was undertaken in response to concern over the apparent reduction in reliability caused by the removal of a master station and consequent dependence on a single master. Hence a comparison of the differences between these two architectures is presented as a detailed example of theapplication of the composite reliability analysis algorithm .This is based on using the IEEE reliability test system (IEEE RTS) and a model of one of Trans Powers implemented ACC systems . A. Analysis Algorithm The objective of the analysisis to calculate the expected amount of unsupplied energy attributed to a SCADA failure. Taking an annual reference period we denote J to be the random variable representing the joint unsupplied energy inannual system minutes. Hence we want to derive E[J], The expected value of J.

For a given system model, a single simulation will provide a sample as follows, assuming a constant load. Then making a number of simulation runs will give an estimate of E [J] from The quantity, joint load curtailments, is derived from the algorithm illustrated in Figure 3 and described below. Figure 2 Alternative area control centers SCADA architectures

1.Generate a SCADA and power system state based on individual component reliabilitys and determines which busses the Operator has control of. 2.If there are no power system failures then there will be no load curtailments. 3&4 If there is sufficient, available generation to meet the load then it may be possible to re-schedule this subject to circuit constraints. This is done using a dc load flow. 5. This step is based on the linear programme based optimal power flow (OPF) The OPF minimizes load curtailment by rescheduling generation subject to branch and generation capacities. 6.Compare whether loads curtailment and SCADA control failure has occurred at the same bus or busses. This is perhaps a harsh simplification. The real question at this step Is whether, given a load curtailment. SCADA can restore the power system to full load? For example in Figure 5 if a load curtailment occurs at bus 7 due to a circuit outage on its feedfrom bus 8 then SCADA control would be required at both busses 7and 8 to restore the load at bus 7. Whilst this is astraight forward example, analysis of this situation becomesmore complex at more heavily meshed busses. Hence this isan area of ongoing study. 7 . Accumulate the total power not supplied at busses whereSCADA control has also failed.VI.

C ONCLUSION A brief startup of SCADA makes the concept of this new process to be suggested as emerging trend in control systems.And wise decision parameters were discussed in order to makethe best choice of SCADA system components according tothe need problem. Security of SCADA is major hurdle andneed to be handled with care with advanced encryptiontechniques. Application of SCADA to power system reliability problem suggests the efficient operation with increasedreliability. Similarly various other areas also find the immense potentiate application of SCADA, such as railways, transport,generation, Water Management System, etc. With prime needof reliability and efficient optimized cost operation of bigsystems SCADA promises an advanced solution.REFRENCES(1) Bob berry,Key Scada Concepts, white paper from DPSTelecoms Newyork.(2) Replacement of Programmable Logic Controls Bhavani,Shalini, SCADA system AgenceMtropolitaine de TransportRef/N. inVisakhapatnam Stell Plant, march : AMTI06BS-0086-000,Section F-17010 Page I Rev 00 January, 2006 .(3) Divya, Ramya, 2009. (4)Anonymous,SCADA systemshttp://www.amt.qc.ca/docs/appel/AMTI06BS_0086_000_DEV01_en.pdf?Aspx, Accessed on 15 April 2011.(5)Anonymous, daata acquition using scada systems http://www.cscjournals.org/csc/manuscript/Journals/IJE/volume3/Issue1.(6)Anonymous, PLC and RTU comparison and basics http://www.motorola.com/web/Business/Products/SCADA%20Products/ Accessed on 13 April 2011.(7)Anonymous, Risk mitigation systems, http://www.detect-inc.com ,Accesse d on 14 April 2011.Figure 3. Flow chart for analysis algorithm

You might also like