Category Archive for: «SCADA»

Purpose And Applicable Processes Of a SCADA System

What is the SCADA system? SCADA is the technology that enables a user to collect data from one or more distant facilities and to send limited control instructions to those facilities. It is important to note the words “distant” and “limited” in this definition. SCADA has been developed to monitor and control very large process facilities. […]

Read More

Hardware Implementation of Substation Control and Automation

Substation control system // To form a substation control system, the various elements described above must be assembled into some form of topology. Three major hardware topologies can be identified as being commonly used, as follows: HMI based Topology RTU based Topology Decentralised Topology HMI based Topology This takes the form of Figure 1. The software to implement the […]

Read More

Field Data Interface Devices as Eyes and Ears of a SCADA System

It’s all about information // Field data interface devices form the “eyes and ears” of a SCADA system. Devices such as reservoir level meters, water flow meters, valve position transmitters, temperature transmitters, power consumption meters, and pressure meters all provide information that can tell an experienced operator how well a water distribution system is performing. […]

Read More

Satellite communication for remote control and monitoring of substations

Application for substation automation Substation Automation is a supervisory management and control system that lies in between transmission and distribution systems. The interests on substation automation have been increasing rapidly due to its numerous benefits to utilities. It has advanced further than a traditional Supervisory Control and Data Acquisition (SCADA) system providing additional capability and […]

Read More

Do Your Substation Devices Speak IEC 61850? They Should, It’s Time.

Overview of IEC 61850 Since being published in 2004, the IEC 61850 communication standard has gained more and more relevance in the field of substation automation. It provides an effective response to the needs of the open, deregulated energy market, which requires both reliable networks and extremely flexible technology – flexible enough to adapt to […]

Read More

Thinking About Security Considerations in SCADA Systems (2)

Continued from previous part: Thinking About Security Considerations in SCADA Systems (1) SCADA Threats In this part of technical article, I will focus on various types of threats which must be considered in order to plan the security management of a SCADA system. Some of them (first two) were described in the previous part, so […]

Read More

Thinking About Security Considerations in SCADA Systems (1)

SCADA System can be affected by a number of threats, which may be natural or intentional. So it is very much important to focus on security aspects of SCADA Systems. SCADA Threats In this article, I will focus on various types of threats which must be considered in order to plan the security management of […]

Read More

An Introduction To SCADA For Electrical Engineers – Beginners

Control and Supervision It is impossible to keep control and supervision on all industrial activities manually. Some automated tool is required which can control, supervise, collect data, analyses data and generate reports. A unique solution is introduced to meet all this demand is SCADA system. SCADA stands for supervisory control and data acquisition. It is […]

Read More

Three generations of SCADA system architectures

Generations SCADA systems have evolved in parallel with the growth and sophistication of modern computing technology. The following sections will provide a description of the following three generations of SCADA systems: First Generation – Monolithic Second Generation – Distributed Third Generation – Networked – Waste Water Treatment Plant – SCADA (VIDEO) 1. Monolithic SCADA Systems When SCADA systems […]

Read More

Responding to Cyber Intrusion in SCADA System

Continued from technical article: Detecting Cyber Intrusion in SCADA System The Three R’s As Response The “three R’s” of the response to cyber intrusion are: Recording, Reporting, and Restoring. Theoretically, it would be desirable to record all data communications into and out of all substation devices. In that manner, if an intruder successfully attacks the […]

Read More
Page 1 of 3123