Use of scada in power systems pdf
Bob's engineering skill and dedication to solving his clients' real-world problems has grown DPS from a small consulting firm to an Inc. This guide talks about the cost reductions and revenue protections that can boost your bottom-line profits.
But, you'll likely be surprised by just how many different kinds of businesses can use SCADA systems to process data. In this white paper, you'll get a list of six of the most common industrial processes that use SCADA gear, such as oil and gas industry and communication infrastructures. They will, however, give you a good introduction of SCADA systems and the types of places where they are used.
Do your systems use a constant supply of electrical power and do they have demanding temp and humidity tolerances? Do you need real-time statuses of many pieces of gear in a large system? These and the other questions included in this white paper will help you to evaluate just what SCADA can actually do to make improvements in your company.
Supervisory control and data acquisition allow you to access quantitative measurements of important processes, detect problems as soon as they start, measure trends over time, and get many other important results. This SCADA white paper takes you through an in-depth look at all of these efficiency boosters and profit maximizers.
From initial logic data acquisition all the way through to control system, Bob Berry's SCADA white paper will walk you through each of the steps individually. You'll also learn about the four different kinds of SCADA components and functions, including sensors and the overarching data communications network. When learning a new topic, it's useful to look at the absolute most basic system that still meets the definition for that topic. Although clearly far less complex than any real-world SCADA operating system, the example still includes the basics of remote monitoring and control functions.
This will be a major B2B purchase that your company will have to live with for a decade or more or spend perhaps millions of dollars cleaning up the mess you've made if you make the wrong choice. Just as powerful a SCADA can be to improve your operations, it also has a dark side in the form of pitfalls. Some of these pitfalls include spending a fortune on unnecessary cost overruns, or ending up with a system that doesn't really meet all your needs. You may even purchase an inflexible system that only meets your needs today and can't expand as your needs grow.
However, you need to know exactly how an RTU works and how to choose the right vendor. Key elements to look for are sufficient capacity, rugged construction, the right RTU communication transport, web browser capability in a computer system, and intelligent control. From flexible responses to sensor inputs to expansion capability to support for a lot of protocols and gear types, you absolutely need to know how to select the right SCADA master for your environment.
MTUs provide a human interface to the system and automatically regulate the managed system in response to sensor inputs. Communications Network: A communication network is needed to transport all the data collected from sensors.
This is the glue that holds the automation system together. The network transfers data among servers and the field data interface devices and control units. The system can use different communication technologies such as cable, radio, mobile phones, fibre optics, microwaves, Ethernet or satellites. The communication system connects the supervisory system to the remote terminal units. Communication networks generally support four basic operations: establish communications, terminate communications, write data, and read data.
SCADA software package is positioned on top of hardware to which it is interfaced. They are multi-tasking and are based on a real-time database located in one or more servers. SCADA system architectures have gone through three generations. The first generation employs the wide area network for communication between MTUs. The third generation uses Internet protocol and wireless technologies [4].
It is widely used in electric power systems. SCADA solution is central to effective operation of a utility's most critical and costly distribution, transmission, and generation assets. SCADA system is used for remote measurement and control of power system component such as power plant, transmission facilities, and substations. Automation took root in power generating stations earlier than in transmission and distribution. We consider two of these applications in detail.
Distribution System: Electric power distribution systems involve monitoring and controlling many remote sites, which is difficult. By installing RTUs at substations, SCADA systems have replaced the manual labor to perform electrical distribution tasks and supervise the entire distribution. They provide features like real-time view into the operations and maintain desired voltages, currents and power factors. They perform automatic monitoring, protecting, and controlling of various equipment in distribution systems with the use of RTUs.
Substation Control: Substations are a critical component for maintaining electrical supply and load control. SCADA system continuously monitors the status of various equipment in substation and accordingly sends control signals to them.
It performs the operations like bus voltage control, bus load balancing, circulating current control, overload control, etc. As SCADA systems get larger, they are connected to other networks such as the Internet for both economic and technological reasons.
The interconnectivity of SCADA systems in the power grid exposes them to a wide range of communication security issues as they become subject a new kinds of threats and cyber attacks such man- in-the middle attack, denial-of-service attack, social engineering attack, and insider attack. To counter this, security devices at two points for encryption and decryption of exchanging information should be installed [8].
Access authorization is also required between the RTUs and master systems. Besides password authorization, other mechanisms for protection include smart cards, firewalls, and intrusion detection systems. Vendors should provide built-in security features in their systems to meet security challenges. A system may consist of devices from different vendor using different proprietary communications protocols [9]. It will continue to enable power companies to conduct their business in remote and hostile environments.
Gao et al. Kang and H. Nazir, S. Patel, and D. He is the author of several books and papers.
0コメント