SlideShare a Scribd company logo
INTERNATIONAL ISLAMIC UNIVERSITY
                         CHITTAGONG
DEPT. OF ELECTRICAL AND ELECTRONICS ENGINEERING

                   Power System Operation and Contro
                                        EEE-4875

            PRESENTATION ON
SUPERVISORY CONTROL AND DATA ACQUISITION
                                (SCADA)
                 Presented by
                 Towfiqur Rahman
                    ET091010
                   8th Semester
OBJECTIVES:

• To discuss the concept of SCADA and its branches
• Protection for SCADA
• Future of SCADA
INDEX TERMS:
WHAT IS SCADA?
SCADA stands Supervisory Control and Data Acquisition. As the name indicates, it is not a full control
system, but rather focuses on the supervisory level. It is a computer system for gathering and analyzing real
time data.

SCADA systems can be relatively simple, such as one that monitors environmental conditions of a small
office building, or incredibly complex, such as a system that monitors all the activity in a nuclear power
plant or the activity of a municipal water system.

 SCADA systems are used to monitor and control a plant or equipment in industries such as
telecommunications, water and waste control, energy, oil and gas refining and transportation. A SCADA
system gathers information, such as where a leak on a pipeline has occurred, transfers the information back
to a central site, alerting the home station that the leak has occurred, carrying out necessary analysis and
control, such as determining if the leak is critical, and displaying the information in a logical and organized
fashion.
OVERVIEW OF SCADA SYSTEM:
MAIN FUNCTIONS OF SCADA:

  •   Data acquisition,
  •   Alarms and event monitoring,
  •   Database and data logging,
  •   Operator interface,
  •   Non real time control,
  •   Logging,
  •   MMI (men- machine interface) use,
  •   Automation, and
  •   Report generation
CONTROLLING PROCESSES :
• Industrial processes include those of manufacturing, production, power
   generation, fabrication, and refining, and may run in continuous, batch,
   repetitive, or discrete modes.
• Infrastructure processes may be public or private, and include water treatment
  and distribution, wastewater collection and treatment, oil and gas pipelines,
  electrical power transmission and distribution, wind farms and large
  communication systems.
• Facility processes occur both in public facilities and private ones, including
  buildings, airports, ships, and space stations. They monitor and control HVAC,
  access, and energy consumption
COMPONENTS OF SCADA
 o HMI (Human Machine Interface): It is an apparatus that is operated by
   human to monitor and control various processes.
 o PLC (Programmable Logic Controller): This controller is used because they
   are very flexible, and economical than Remote Terminal Units
 o Supervisory System: It collects process data and sends control commands to
   the process.
 o RTU (Remote Terminal Units): This process is connected with sensors to
   convert sensor signals into digital and sends digital data to Supervisory
   System
 o Communication Infrastructure: It is connecting Supervisory System to RLU’s.
SCADA systems have evolved in parallel with the growth and sophistication of modern computing
technology. The following sections will provide a description of the following three generations of
SCADA systems:
First generation: Monolithic System; when SCADA systems were first
developed, the concept of computing in general centered on “mainframe” systems.
Networks were generally non-existent, and each centralized system stood alone. As a
result, SCADA systems were standalone systems with virtually no connectivity to
other systems. Wide Area Networks were later designed by RTU vendors to
communicate with the RTU. The communication protocols used were often
proprietary at that time. The first-generation SCADA system was redundant since a
back-up mainframe system was connected at the bus level and was used in the event
of failure of the primary mainframe.
Model of Monolithic System:
Second generation: Distributed; the next generation of SCADA systems
took advantage of developments and improvement in system miniaturization and
Local Area Networking (LAN) technology to distribute the processing across
multiple systems. Multiple stations, each with a specific function, were
connected to a LAN and shared information with each other in real-time. These
stations were typically of the mini-computer class, smaller and less expensive
than their first generation processors.
Model of Distributed System:
Third generation: Networked; The current generation of SCADA master station
architecture is closely related to that of the second generation, with the primary
difference being that of an open system architecture rather than a vendor controlled,
proprietary environment. There are still multiple networked systems, sharing master
station functions. There are still RTUs utilizing protocols that are vendor-proprietary. The
major improvement in the third generation is that of opening the system architecture,
utilizing open standards and protocols and making it possible to distribute SCADA
functionality across a WAN and not just a LAN.
Model of Networked System:
SECURITY ISSUES:
The following are TSI’s (The Security Institute, a United Kingdom based professional body for security professionals)
recommendations to address some lingering security issues for SCADA:

1. Security of network communications: Implementation of strong encryption over the SCADA network
   communications, to ensure that both monitored data and control commands are encrypted.
2. Turning on security: Implementation of security features with devices on the network, especially authentication.
   Using secure protocols whenever possible.
3. Knowing your SCADA network: Identifying all connections to external networks including wire-less
   networks, corporate LANs and WANs, and the Internet. Also, securing the network by eliminating all unnecessary
   connections to external networks.
4. Hardening of the SCADA environment: Removing all unnecessary services from the hosts on the network. Also, just
   as in the corporate network environment, ensuring that all systems are patched and up to date.
5. Conducting regular security audits: Ensuring that security practices and procedures, such as incident response, are
   defined and implemented. Penetration testing of the network environment should also be prudently conducted
   with inspection for potential back doors into the SCADA network.
6. Implementing real-time threat protection: With the increasing number and complexity of attacks, it's insufficient to
   simply patch the systems or maintain access/service control. One alternative is to implement real-time threat
   protection in the form of network intrusion-prevention systems. Unlike standard packet-filter firewalls, these
   systems perform application-layer inspection to identify attacks that are carried in the payload and block the
   offending traffic in real time.
THE FUTURE OF SCADA SYSTEM:
The large territories and huge volumes of data SCADA can handle form a formidable
combination. Today’s SCADA systems can manage anything from a few thousands to
one million of input/output channels.
The technology is still evolving in terms of sophistication as well. SCADA systems as
they are now can perform a large variety of tasks and some systems have artificial
intelligence built into them. They are also more network-enabled, thus paving the way
for voice-data-control data convergence. With proper planning and a custom-made
installation, a SCADA system becomes a valuable asset.
THANK YOU
ALL

More Related Content

What's hot

Distributed Control System
Distributed Control SystemDistributed Control System
Distributed Control System3abooodi
 
Scada ppt
Scada  pptScada  ppt
Scada ppt
AKANSHA GURELE
 
Introduction To SCADA
Introduction To SCADAIntroduction To SCADA
Introduction To SCADAKunal gupta
 
Plc
PlcPlc
Scada System
Scada  SystemScada  System
Scada System
Arifbhatti
 
PLC - Programmable Logic Controller
PLC - Programmable Logic ControllerPLC - Programmable Logic Controller
PLC - Programmable Logic Controller
Mahesh Vadhavaniya profmjv
 
Supervisory Contro and Data Acquisition - SCADA
Supervisory Contro and Data Acquisition - SCADASupervisory Contro and Data Acquisition - SCADA
Supervisory Contro and Data Acquisition - SCADAAhmed Elsayed
 
WHAT IS SCADA AND BASIC KNOWLEDGE ABOUT IT.
WHAT IS SCADA AND BASIC KNOWLEDGE ABOUT IT.WHAT IS SCADA AND BASIC KNOWLEDGE ABOUT IT.
WHAT IS SCADA AND BASIC KNOWLEDGE ABOUT IT.
kgaurav113
 
PLC and SCADA communication
PLC and SCADA communicationPLC and SCADA communication
PLC and SCADA communication
Talha Shaikh
 
PLC (PROGRAMMABLE LOGIC CONTROLLER)
PLC (PROGRAMMABLE LOGIC CONTROLLER)PLC (PROGRAMMABLE LOGIC CONTROLLER)
PLC (PROGRAMMABLE LOGIC CONTROLLER)
Manoj Gowda K
 
SCADA
SCADASCADA
Introduction to scada systems & power control centres
Introduction to scada systems & power control centresIntroduction to scada systems & power control centres
Introduction to scada systems & power control centresHelder Joaquim Ale Psico
 
PPT of PLC and SCADA
PPT of PLC and SCADAPPT of PLC and SCADA
PPT of PLC and SCADA
Mohseen1234
 
Scada system architecture, types and applications
Scada system architecture, types and applicationsScada system architecture, types and applications
Scada system architecture, types and applications
Uchi Pou
 
Scada
ScadaScada
Scada
Tribi
 
AUTOMATION ,SCADA AND POWER SYSTEM AUTOMATION
AUTOMATION ,SCADA AND POWER SYSTEM AUTOMATIONAUTOMATION ,SCADA AND POWER SYSTEM AUTOMATION
AUTOMATION ,SCADA AND POWER SYSTEM AUTOMATION
kamal soni
 
SCADA System ? Supervisory Control & Data Acquisition
SCADA System ? Supervisory Control & Data AcquisitionSCADA System ? Supervisory Control & Data Acquisition
SCADA System ? Supervisory Control & Data Acquisition
Power System Operation
 

What's hot (20)

Distributed Control System
Distributed Control SystemDistributed Control System
Distributed Control System
 
Scada ppt
Scada  pptScada  ppt
Scada ppt
 
Introduction To SCADA
Introduction To SCADAIntroduction To SCADA
Introduction To SCADA
 
Plc
PlcPlc
Plc
 
Scada System
Scada  SystemScada  System
Scada System
 
PLC - Programmable Logic Controller
PLC - Programmable Logic ControllerPLC - Programmable Logic Controller
PLC - Programmable Logic Controller
 
Supervisory Contro and Data Acquisition - SCADA
Supervisory Contro and Data Acquisition - SCADASupervisory Contro and Data Acquisition - SCADA
Supervisory Contro and Data Acquisition - SCADA
 
WHAT IS SCADA AND BASIC KNOWLEDGE ABOUT IT.
WHAT IS SCADA AND BASIC KNOWLEDGE ABOUT IT.WHAT IS SCADA AND BASIC KNOWLEDGE ABOUT IT.
WHAT IS SCADA AND BASIC KNOWLEDGE ABOUT IT.
 
Scada
ScadaScada
Scada
 
DCS
DCSDCS
DCS
 
PLC and SCADA communication
PLC and SCADA communicationPLC and SCADA communication
PLC and SCADA communication
 
PLC (PROGRAMMABLE LOGIC CONTROLLER)
PLC (PROGRAMMABLE LOGIC CONTROLLER)PLC (PROGRAMMABLE LOGIC CONTROLLER)
PLC (PROGRAMMABLE LOGIC CONTROLLER)
 
SCADA
SCADASCADA
SCADA
 
Introduction to scada systems & power control centres
Introduction to scada systems & power control centresIntroduction to scada systems & power control centres
Introduction to scada systems & power control centres
 
PPT of PLC and SCADA
PPT of PLC and SCADAPPT of PLC and SCADA
PPT of PLC and SCADA
 
Scada system architecture, types and applications
Scada system architecture, types and applicationsScada system architecture, types and applications
Scada system architecture, types and applications
 
ppt on PLC
ppt on PLCppt on PLC
ppt on PLC
 
Scada
ScadaScada
Scada
 
AUTOMATION ,SCADA AND POWER SYSTEM AUTOMATION
AUTOMATION ,SCADA AND POWER SYSTEM AUTOMATIONAUTOMATION ,SCADA AND POWER SYSTEM AUTOMATION
AUTOMATION ,SCADA AND POWER SYSTEM AUTOMATION
 
SCADA System ? Supervisory Control & Data Acquisition
SCADA System ? Supervisory Control & Data AcquisitionSCADA System ? Supervisory Control & Data Acquisition
SCADA System ? Supervisory Control & Data Acquisition
 

Similar to Scada slide

Training manual on scada
Training manual on scadaTraining manual on scada
Training manual on scada
bhavuksharma10
 
Paper id 37201531
Paper id 37201531Paper id 37201531
Paper id 37201531IJRAT
 
Scada presentation (group 10)
Scada presentation (group 10)Scada presentation (group 10)
Scada presentation (group 10)
Ritvik Bhatia
 
IJSRED-V2I2P15
IJSRED-V2I2P15IJSRED-V2I2P15
IJSRED-V2I2P15
IJSRED
 
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
NiMa Bagheriasl
 
Scada Industrial Control Systems Penetration Testing
Scada Industrial Control Systems Penetration Testing Scada Industrial Control Systems Penetration Testing
Scada Industrial Control Systems Penetration Testing
Yehia Mamdouh
 
P1111141868
P1111141868P1111141868
P1111141868
Ashraf Aboshosha
 
SCADA_SYSTEM in industrial automation .pptx
SCADA_SYSTEM in industrial automation .pptxSCADA_SYSTEM in industrial automation .pptx
SCADA_SYSTEM in industrial automation .pptx
Viju Jigajinni
 
SCADA_SYSTEM in Industrial Autiomation.pptx
SCADA_SYSTEM in Industrial Autiomation.pptxSCADA_SYSTEM in Industrial Autiomation.pptx
SCADA_SYSTEM in Industrial Autiomation.pptx
Viju Jigajinni
 
SCADA Assignment.pptx
SCADA Assignment.pptxSCADA Assignment.pptx
SCADA Assignment.pptx
ssuser1831ba
 
8 scada
8 scada8 scada
8 scada
TIKAMVANOT
 
SCADA Systems Vulnerabilities and Blockchain Technology
SCADA Systems Vulnerabilities and Blockchain TechnologySCADA Systems Vulnerabilities and Blockchain Technology
SCADA Systems Vulnerabilities and Blockchain Technology
ijtsrd
 
SCADA ... Supervisory control and data acquisition
SCADA ... Supervisory control and data acquisitionSCADA ... Supervisory control and data acquisition
SCADA ... Supervisory control and data acquisition
Manohar Tatwawadi
 
Scada ppt
Scada pptScada ppt
Scada ppt
zudakki
 
SCADA Systems and its security!
SCADA Systems and its security!SCADA Systems and its security!
SCADA Systems and its security!
Shiv Sahni
 
Power system automation
Power system automationPower system automation
Power system automation
Abbas Ali
 
Fps scada
Fps scadaFps scada
Fps scada
AnilPanchal23
 

Similar to Scada slide (20)

Training manual on scada
Training manual on scadaTraining manual on scada
Training manual on scada
 
Paper id 37201531
Paper id 37201531Paper id 37201531
Paper id 37201531
 
Scada presentation (group 10)
Scada presentation (group 10)Scada presentation (group 10)
Scada presentation (group 10)
 
IJSRED-V2I2P15
IJSRED-V2I2P15IJSRED-V2I2P15
IJSRED-V2I2P15
 
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
 
Scada Industrial Control Systems Penetration Testing
Scada Industrial Control Systems Penetration Testing Scada Industrial Control Systems Penetration Testing
Scada Industrial Control Systems Penetration Testing
 
P1111141868
P1111141868P1111141868
P1111141868
 
B43050518
B43050518B43050518
B43050518
 
Dcs vs scada
Dcs vs scadaDcs vs scada
Dcs vs scada
 
SCADA_SYSTEM in industrial automation .pptx
SCADA_SYSTEM in industrial automation .pptxSCADA_SYSTEM in industrial automation .pptx
SCADA_SYSTEM in industrial automation .pptx
 
SCADA_SYSTEM in Industrial Autiomation.pptx
SCADA_SYSTEM in Industrial Autiomation.pptxSCADA_SYSTEM in Industrial Autiomation.pptx
SCADA_SYSTEM in Industrial Autiomation.pptx
 
SCADA Assignment.pptx
SCADA Assignment.pptxSCADA Assignment.pptx
SCADA Assignment.pptx
 
8 scada
8 scada8 scada
8 scada
 
SCADA Systems Vulnerabilities and Blockchain Technology
SCADA Systems Vulnerabilities and Blockchain TechnologySCADA Systems Vulnerabilities and Blockchain Technology
SCADA Systems Vulnerabilities and Blockchain Technology
 
SCADA ... Supervisory control and data acquisition
SCADA ... Supervisory control and data acquisitionSCADA ... Supervisory control and data acquisition
SCADA ... Supervisory control and data acquisition
 
Scada ppt
Scada pptScada ppt
Scada ppt
 
SCADA Systems and its security!
SCADA Systems and its security!SCADA Systems and its security!
SCADA Systems and its security!
 
SCADA
SCADASCADA
SCADA
 
Power system automation
Power system automationPower system automation
Power system automation
 
Fps scada
Fps scadaFps scada
Fps scada
 

Recently uploaded

How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 

Recently uploaded (20)

How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 

Scada slide

  • 1. INTERNATIONAL ISLAMIC UNIVERSITY CHITTAGONG DEPT. OF ELECTRICAL AND ELECTRONICS ENGINEERING Power System Operation and Contro EEE-4875 PRESENTATION ON SUPERVISORY CONTROL AND DATA ACQUISITION (SCADA) Presented by Towfiqur Rahman ET091010 8th Semester
  • 2. OBJECTIVES: • To discuss the concept of SCADA and its branches • Protection for SCADA • Future of SCADA
  • 4. WHAT IS SCADA? SCADA stands Supervisory Control and Data Acquisition. As the name indicates, it is not a full control system, but rather focuses on the supervisory level. It is a computer system for gathering and analyzing real time data. SCADA systems can be relatively simple, such as one that monitors environmental conditions of a small office building, or incredibly complex, such as a system that monitors all the activity in a nuclear power plant or the activity of a municipal water system. SCADA systems are used to monitor and control a plant or equipment in industries such as telecommunications, water and waste control, energy, oil and gas refining and transportation. A SCADA system gathers information, such as where a leak on a pipeline has occurred, transfers the information back to a central site, alerting the home station that the leak has occurred, carrying out necessary analysis and control, such as determining if the leak is critical, and displaying the information in a logical and organized fashion.
  • 6. MAIN FUNCTIONS OF SCADA: • Data acquisition, • Alarms and event monitoring, • Database and data logging, • Operator interface, • Non real time control, • Logging, • MMI (men- machine interface) use, • Automation, and • Report generation
  • 7. CONTROLLING PROCESSES : • Industrial processes include those of manufacturing, production, power generation, fabrication, and refining, and may run in continuous, batch, repetitive, or discrete modes. • Infrastructure processes may be public or private, and include water treatment and distribution, wastewater collection and treatment, oil and gas pipelines, electrical power transmission and distribution, wind farms and large communication systems. • Facility processes occur both in public facilities and private ones, including buildings, airports, ships, and space stations. They monitor and control HVAC, access, and energy consumption
  • 8. COMPONENTS OF SCADA o HMI (Human Machine Interface): It is an apparatus that is operated by human to monitor and control various processes. o PLC (Programmable Logic Controller): This controller is used because they are very flexible, and economical than Remote Terminal Units o Supervisory System: It collects process data and sends control commands to the process. o RTU (Remote Terminal Units): This process is connected with sensors to convert sensor signals into digital and sends digital data to Supervisory System o Communication Infrastructure: It is connecting Supervisory System to RLU’s.
  • 9. SCADA systems have evolved in parallel with the growth and sophistication of modern computing technology. The following sections will provide a description of the following three generations of SCADA systems:
  • 10. First generation: Monolithic System; when SCADA systems were first developed, the concept of computing in general centered on “mainframe” systems. Networks were generally non-existent, and each centralized system stood alone. As a result, SCADA systems were standalone systems with virtually no connectivity to other systems. Wide Area Networks were later designed by RTU vendors to communicate with the RTU. The communication protocols used were often proprietary at that time. The first-generation SCADA system was redundant since a back-up mainframe system was connected at the bus level and was used in the event of failure of the primary mainframe.
  • 12. Second generation: Distributed; the next generation of SCADA systems took advantage of developments and improvement in system miniaturization and Local Area Networking (LAN) technology to distribute the processing across multiple systems. Multiple stations, each with a specific function, were connected to a LAN and shared information with each other in real-time. These stations were typically of the mini-computer class, smaller and less expensive than their first generation processors.
  • 14. Third generation: Networked; The current generation of SCADA master station architecture is closely related to that of the second generation, with the primary difference being that of an open system architecture rather than a vendor controlled, proprietary environment. There are still multiple networked systems, sharing master station functions. There are still RTUs utilizing protocols that are vendor-proprietary. The major improvement in the third generation is that of opening the system architecture, utilizing open standards and protocols and making it possible to distribute SCADA functionality across a WAN and not just a LAN.
  • 16. SECURITY ISSUES: The following are TSI’s (The Security Institute, a United Kingdom based professional body for security professionals) recommendations to address some lingering security issues for SCADA: 1. Security of network communications: Implementation of strong encryption over the SCADA network communications, to ensure that both monitored data and control commands are encrypted. 2. Turning on security: Implementation of security features with devices on the network, especially authentication. Using secure protocols whenever possible. 3. Knowing your SCADA network: Identifying all connections to external networks including wire-less networks, corporate LANs and WANs, and the Internet. Also, securing the network by eliminating all unnecessary connections to external networks. 4. Hardening of the SCADA environment: Removing all unnecessary services from the hosts on the network. Also, just as in the corporate network environment, ensuring that all systems are patched and up to date. 5. Conducting regular security audits: Ensuring that security practices and procedures, such as incident response, are defined and implemented. Penetration testing of the network environment should also be prudently conducted with inspection for potential back doors into the SCADA network. 6. Implementing real-time threat protection: With the increasing number and complexity of attacks, it's insufficient to simply patch the systems or maintain access/service control. One alternative is to implement real-time threat protection in the form of network intrusion-prevention systems. Unlike standard packet-filter firewalls, these systems perform application-layer inspection to identify attacks that are carried in the payload and block the offending traffic in real time.
  • 17. THE FUTURE OF SCADA SYSTEM: The large territories and huge volumes of data SCADA can handle form a formidable combination. Today’s SCADA systems can manage anything from a few thousands to one million of input/output channels. The technology is still evolving in terms of sophistication as well. SCADA systems as they are now can perform a large variety of tasks and some systems have artificial intelligence built into them. They are also more network-enabled, thus paving the way for voice-data-control data convergence. With proper planning and a custom-made installation, a SCADA system becomes a valuable asset.