Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
SUBSTATION
Case Study in Engineering System Design
INTRODUCTION
SCADA (supervisory control and data acquisition) is a type of industrial control
system (ICS). Industrial control systems are computer-controlled systems that
monitor and control industrial processes that exist in the physical world. SCADA
systems historically distinguish themselves from other ICS systems by being largescale processes that can include multiple sites, and large distances. These processes
include industrial, infrastructure, and facility-based processes, as described below:
Industrial processes include those of manufacturing, production, power
generation, fabrication, and refining, and may run in continuous, batch, repetitive,
or discrete modes.
Infrastructure processes may be public or private, and include water treatment and
distribution, wastewater collection and treatment, oil and gas pipelines, electrical
power transmission and distribution, wind farms, civil defense siren systems, and
large communication systems.
Facility processes occur both in public facilities and private ones, including
buildings, airports, ships, and space stations. They monitor and control heating,
ventilation, and air conditioning systems (HVAC),access, and energy consumption.
Reliability
Cost effectiveness
Capacity to handle data rates
Adequate to meet response requirements
Ability to reach identified areas of power system
Ease of operation and maintenance
Security (of data and of control actions)
Communications is the enabling technology for
Power System
Communication Reliability
Reliable communication with
respect to Exposure to severe
environment
Electromagnetic Interference
(EMI)
Transient EMI (lightning, faults)
Outage of transmission lines
Power outages
Radio paths obstructed or
attenuated (by buildings or
foliage)
SCADA architectures
SCADA architectures
Second generation: "Distributed"
The processing was distributed across multiple stations which were
connected through a LAN and they shared information in real time.
Each station was responsible for a particular task thus making the
size and cost of each station less than the one used in First
Generation. The network protocols used were still mostly
proprietary, which led to significant security problems for any SCADA
system that received attention from a hacker. Since the protocols
were proprietary, very few people beyond the developers and
hackers knew enough to determine how secure a SCADA installation
was. Since both parties had vested interests in keeping security
issues quiet, the security of a SCADA installation was often badly
overestimated, if it was considered at all.
SCADA architectures
Third generation: "Networked"
Fourth generation: "Internet of Things"
With the commercial availability of cloud computing, SCADA systems
have increasingly adopted Internet of Things technology to
significantly reduce infrastructure costs and increase ease of
maintenance and integration. As a result SCADA systems can now
report state in near real-time and use the horizontal scale available
in cloud environments to implement more complex control
algorithms than are practically feasible to implement on
traditional programmable logic controllers. Further, the use of open
network protocols such as TLS inherent in Internet of Things
technology provides a more readily comprehendable and
manageable security boundary than the heterogenous mix of
proprietary network protocols typical of many decentralized SCADA
implementations.
Challenges
Indian Power networks growing faster, larger & more complex.
Data communication needs to be much faster catering to
smart grid initiatives being taken up.
With faster, smarter & innovative technologies, data security
to be addressed adequately.
All radio communication to be replaced with fibre optic
network by Dec.,2011 as per GOI decision.
Future Trends
Smart grid technologies driving communication needs.
High speed fibre optic networks need of the hour.
Increasing use of internet as the mechanism for data
communication.
Main thrust on security issues with use of web based
technologies.
Introduction of Service oriented architecture(SOA) will
need high band width networks.
Growing insistence on adherence to communication
standards.
Possible application of cellular digital packet data radio
technologies.