SlideShare a Scribd company logo
TRAINING MANUAL ON SCADA
OBJECTIVES:
o To discuss the concept of SCADA and its branches
• Protection for SCADA
• Future of SCADA
INDEX:
1) WHAT IS SCADA ?
2) ARCHITECTURE
3) FUNCTIONALITY
4) MAIN FUNCTIONS
5) CONTROLLING PROCESSES
6) COMPONENTS OF SCADA
7) SCADA ARCHITECTURE
8) SECURITY ISSUES
9) FUTURE OF SCADA
1.WHAT IS SCADA ?
Supervisory
Control And
Data
Acquisition
 SCADAstands Supervisory Control and Data Acquisition. As the
name indicates, it is not a full control system, but rather focuses on the
supervisory level. It is a computer system for gathering and analyzing
real time data.
 SCADA systems can be relatively simple, such as one that
monitors environmental conditions of a small office building, or
incredibly complex, such as a system that monitors all the activity in
a nuclear power plant or the activity of a municipal water system.
SCADA systems are used to monitor and control a plant or equipment
in industries such as telecommunications, water and waste control,
energy, oil and gas refining and transportation. A SCADA system gathers
information, such as where a leak on a pipeline has occurred, transfers
the information back to a central site, alerting the home station that the
leak has occurred, carrying out necessary analysis and control, such as
determining if the leak is critical, and displaying the information in a
logical and organized fashion.
Where and why, use of SCADA?
Application area :
Industrial processes : chemical, power generation and
distribution, metallurgy, …
: reactors, nuclear waste, ...Nuclear processes
Experimental physics : HEP laboratories
Application size:
20 k I/O to 450 K I/O,
1 M I/O under development
Data Server
Supervisory
Control
And
Data
Acquisition
Archiving, Logging,
Access Control, AlarmsGraphics and Batch processing
Distributed database
Field Bus
Control Programs
Data Server
ERP Systems
Expert Systems
PLC’s
SCADA
2.ARCHITECTURE
•Hardware
•Software
•HARDWARE:
Typical Hardware Architecture
•SOFTWARE:
Communication
Internal Communication
Access to Devices
Interfacing
H/W
Multiple communication protocols supported in a single system
Support for major PLCs/DCSs but not VME
S/W




API
ODBC, DDE and OLE I/F to PC Products
OPC Client and OPC Server
ActiveX Containers
Scalability
Database
Configuration DB, alarm DB, Archive DB, log DB and
RTDB resides in the memory of the servers
SOFTWARE ARCHITECTURE
Generic SCADA functionality
1. Access Control, MMI,
2. Trending, Alarm Handling,
3. Logging, Archiving, Report
Generation, Automation.
3. FUNCTIONALITY
1)Data acquisition
2)Alarms and event monitoring
3)Database and data login
4)Operator interface
5)Non real time control
6)Logging
7)MMI (men-machine interface) use
8)Automation, and
9)Report generation
4. MAIN FUNCTIONS
5. CONTROLLING PROCESSES
I. Industrial processes include those of manufacturing,
production, power generation, fabrication, and refining, and
may run in continuous, batch, repetitive, or discrete modes.
II. Infrastructure processes may be public or private, and include
water treatment and distribution, wastewater collection and
treatment, oil and gas pipelines, electrical power transmission
and distribution, wind farms and large communication systems.
III. Facility processes occur both in public facilities and private
ones, including buildings, airports, ships, and space stations.
They monitor and control HVAC, access, and energy
consumption.
6. COMPONENTS OF SCADA
1) HMI (Human Machine Interface): It is an apparatus that is
operated by human to monitor and control various processes.
2) PLC (Programmable Logic Controller): This controller is used
because they are very flexible, and economical than Remote
Terminal Units
3) Supervisory System: It collects process data and sends control
commands to the process.
4) RTU (Remote Terminal Units): This process is connected with
sensors to convert sensor signals into digital and sends digital
data to Supervisory System
5) Communication Infrastructure: It is connecting Supervisory
System to RLU’s
7. SCADA ARCHITECTURE
oSCADA systems have evolved in parallel with the growth and sophistication of
modern computing technology. The following sections will provide a
description of the following three generations of SCADA systems:
1. First Generation: Monolithic
2. Second Generation: Distributed
3. Third Generation: Networked
1. First generation: Monolithic System; when SCADA systems
were first developed, the concept of computing in general centered on
“mainframe” systems. Networks were generally non-existent, and each
centralized system stood alone. As a result, SCADA systems were standalone
systems with virtually no connectivity to other systems. Wide Area Networks
were later designed by RTU vendors to communicate with the RTU. The
communication protocols used were often proprietary at that time. The first-
generation SCADA system was redundant since a back-up mainframe system
was connected at the bus level and was used in the event of failure of the
primary mainframe.
Model of Monolithic System:
2. Second generation: Distributed; the next generation of SCADA systems took
advantage of developments and improvement in system miniaturization and Local
Area Networking (LAN) technology to distribute the processing across multiple
systems. Multiple stations, each with a specific function, were connected to a LAN
and shared information with each other in real-time. These stations were typically
of the mini-computer class, smaller and less expensive than their first generation
processors.
Model of Distributed System:
3. Third generation: Networked; The current generation of SCADA master station
architecture is closely related to that of the second generation, with the primary
difference being that of an open system architecture rather than a vendor
controlled, proprietary environment. There are still multiple networked systems,
sharing master station functions. There are still RTUs utilizing protocols that are
vendor-proprietary. The major improvement in the third generation is that of
opening the system architecture, utilizing open standards and protocols and
making it possible to distribute SCADA functionality across a WAN and not just a
LAN.
Model of Networked System:
8. SECURITY ISSUES
The following are TSI’s (The Security Institute, a United Kingdom based professional body for security
professionals) recommendations to address some lingering security issues for SCADA:
1. Security of network communications: Implementation of strong encryption over the SCADA
network communications, to ensure that both monitored data and control commands are
encrypted.
2.Turning on security: Implementation of security features with devices on the network, especially
authentication. Using secure protocols whenever possible.
3. Knowing your SCADA network: Identifying all connections to external networks including wire-less
networks, corporate LANs and WANs, and the Internet. Also, securing the network by eliminating
all unnecessary connections to external networks.
1. Hardening of the SCADA environment: Removing all unnecessary services from the hosts on the
network. Also, just as in the corporate network environment, ensuring that all systems are
patched and up to date.
2. Conducting regular security audits: Ensuring that security practices and procedures, such as
incident response, are defined and implemented. Penetration testing of the network
environment should also be prudently conducted with inspection for potential back doors into
the SCADA network.
3. Implementing real-time threat protection: With the increasing number and complexity of attacks,
it's insufficient to simply patch the systems or maintain access/service control. One alternative is
to implement real-time threat protection in the form of network intrusion-prevention systems.
Unlike standard packet-filter firewalls, these systems perform application-layer inspection to
identify attacks that are carried in the payload and block the offending traffic in real time
The large territories and huge volumes of data SCADA can
handle form a formidable combination. Today’s SCADA systems
can manage anything from a few thousands to one million of
input/output channels.
The technology is still evolving in terms of sophistication as
well. SCADA systems as they are now can perform a large
variety of tasks and some systems have artificial intelligence
built into them. They are also more network-enabled, thus
paving the way for voice-data-control data convergence. With
proper planning and a custom-made installation, a SCADA
system becomes a valuable asset.
9. FUTURE OF SCADA
Training manual on scada

More Related Content

What's hot

DCS
DCSDCS
Presentaton on Plc & Scada
Presentaton on Plc & ScadaPresentaton on Plc & Scada
Presentaton on Plc & Scada
Nokia Technology
 
A presentation on scada system
A presentation on scada systemA presentation on scada system
A presentation on scada system
IIT INDORE
 
Distributed Control System
Distributed Control SystemDistributed Control System
Distributed Control System
SHIVAJI CHOUDHURY
 
supervisory control and data acquisition system
supervisory control and data acquisition systemsupervisory control and data acquisition system
supervisory control and data acquisition system
selvakumar R
 
SCADA
SCADASCADA
Scada systems basics winnie mbau
Scada systems basics winnie mbauScada systems basics winnie mbau
Scada systems basics winnie mbau
winnie15
 
All about scada
All about scadaAll about scada
All about scada
Stella Hermias
 
DCS Introduction
DCS IntroductionDCS Introduction
DCS Introduction
PranavAutomation
 
PLC SCADA
PLC SCADAPLC SCADA
PLC SCADA
Appin Delhi
 
Distributed Control System (DCS) Notes
Distributed Control System (DCS) NotesDistributed Control System (DCS) Notes
Distributed Control System (DCS) Notes
Raj Nayak
 
PLC Based multilevel automatic car parking
PLC Based multilevel automatic car parkingPLC Based multilevel automatic car parking
PLC Based multilevel automatic car parking
Ayush Srivastava
 
SCADA
SCADASCADA
PLC and SCADA summer training report- government engineering college ajmer
PLC and SCADA summer training report- government engineering college ajmerPLC and SCADA summer training report- government engineering college ajmer
PLC and SCADA summer training report- government engineering college ajmer
Nemichand sencha
 
SCADA (Supervisory Control & data Acquisation) PPT
SCADA (Supervisory Control & data Acquisation) PPTSCADA (Supervisory Control & data Acquisation) PPT
SCADA (Supervisory Control & data Acquisation) PPT
DeepeshK4
 
PLC, DCS and PLC vs DCS Presentation by Jitender Singh Shekhawat
PLC, DCS and PLC vs DCS Presentation by Jitender Singh ShekhawatPLC, DCS and PLC vs DCS Presentation by Jitender Singh Shekhawat
PLC, DCS and PLC vs DCS Presentation by Jitender Singh Shekhawat
Jitender Singh Shekhawat
 
Scada system architecture, types and applications
Scada system architecture, types and applicationsScada system architecture, types and applications
Scada system architecture, types and applications
Uchi Pou
 
Scada System
Scada  SystemScada  System
Scada System
Arifbhatti
 
Scada architecture
Scada architectureScada architecture
Scada architecture
invincibleneo
 
PPT on Substation Automation through SCADA
PPT on Substation Automation through SCADAPPT on Substation Automation through SCADA
PPT on Substation Automation through SCADA
ANKIT SURANA
 

What's hot (20)

DCS
DCSDCS
DCS
 
Presentaton on Plc & Scada
Presentaton on Plc & ScadaPresentaton on Plc & Scada
Presentaton on Plc & Scada
 
A presentation on scada system
A presentation on scada systemA presentation on scada system
A presentation on scada system
 
Distributed Control System
Distributed Control SystemDistributed Control System
Distributed Control System
 
supervisory control and data acquisition system
supervisory control and data acquisition systemsupervisory control and data acquisition system
supervisory control and data acquisition system
 
SCADA
SCADASCADA
SCADA
 
Scada systems basics winnie mbau
Scada systems basics winnie mbauScada systems basics winnie mbau
Scada systems basics winnie mbau
 
All about scada
All about scadaAll about scada
All about scada
 
DCS Introduction
DCS IntroductionDCS Introduction
DCS Introduction
 
PLC SCADA
PLC SCADAPLC SCADA
PLC SCADA
 
Distributed Control System (DCS) Notes
Distributed Control System (DCS) NotesDistributed Control System (DCS) Notes
Distributed Control System (DCS) Notes
 
PLC Based multilevel automatic car parking
PLC Based multilevel automatic car parkingPLC Based multilevel automatic car parking
PLC Based multilevel automatic car parking
 
SCADA
SCADASCADA
SCADA
 
PLC and SCADA summer training report- government engineering college ajmer
PLC and SCADA summer training report- government engineering college ajmerPLC and SCADA summer training report- government engineering college ajmer
PLC and SCADA summer training report- government engineering college ajmer
 
SCADA (Supervisory Control & data Acquisation) PPT
SCADA (Supervisory Control & data Acquisation) PPTSCADA (Supervisory Control & data Acquisation) PPT
SCADA (Supervisory Control & data Acquisation) PPT
 
PLC, DCS and PLC vs DCS Presentation by Jitender Singh Shekhawat
PLC, DCS and PLC vs DCS Presentation by Jitender Singh ShekhawatPLC, DCS and PLC vs DCS Presentation by Jitender Singh Shekhawat
PLC, DCS and PLC vs DCS Presentation by Jitender Singh Shekhawat
 
Scada system architecture, types and applications
Scada system architecture, types and applicationsScada system architecture, types and applications
Scada system architecture, types and applications
 
Scada System
Scada  SystemScada  System
Scada System
 
Scada architecture
Scada architectureScada architecture
Scada architecture
 
PPT on Substation Automation through SCADA
PPT on Substation Automation through SCADAPPT on Substation Automation through SCADA
PPT on Substation Automation through SCADA
 

Similar to Training manual on scada

Scada slide
Scada slideScada slide
Scada slide
Towfiqur Rahman
 
Scada Industrial Control Systems Penetration Testing
Scada Industrial Control Systems Penetration Testing Scada Industrial Control Systems Penetration Testing
Scada Industrial Control Systems Penetration Testing
Yehia Mamdouh
 
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
NiMa Bagheriasl
 
SCADA Assignment.pptx
SCADA Assignment.pptxSCADA Assignment.pptx
SCADA Assignment.pptx
ssuser1831ba
 
Scada presentation (group 10)
Scada presentation (group 10)Scada presentation (group 10)
Scada presentation (group 10)
Ritvik Bhatia
 
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADARITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
csandit
 
SCADA.pptx supervisory control and data aquasition
SCADA.pptx supervisory control and data aquasitionSCADA.pptx supervisory control and data aquasition
SCADA.pptx supervisory control and data aquasition
RapidAcademy
 
Practical DNP3 and Modern SCADA Systems
Practical DNP3 and Modern SCADA SystemsPractical DNP3 and Modern SCADA Systems
Practical DNP3 and Modern SCADA Systems
Living Online
 
Scada pdf
Scada pdfScada pdf
Scada pdf
Vidya Sisale
 
Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems
aswanthmrajeev112
 
SCADA Systems Vulnerabilities and Blockchain Technology
SCADA Systems Vulnerabilities and Blockchain TechnologySCADA Systems Vulnerabilities and Blockchain Technology
SCADA Systems Vulnerabilities and Blockchain Technology
ijtsrd
 
Scada and industry 4.0
Scada and industry 4.0Scada and industry 4.0
Scada and industry 4.0
EngrBilalMehmood1
 
P1111141868
P1111141868P1111141868
P1111141868
Ashraf Aboshosha
��
Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems Worldwide
Angela Hays
 
SCADA Systems and its security!
SCADA Systems and its security!SCADA Systems and its security!
SCADA Systems and its security!
Shiv Sahni
 
SCADA
SCADASCADA
Paper id 37201531
Paper id 37201531Paper id 37201531
Paper id 37201531
IJRAT
 
Dcs vs scada
Dcs vs scadaDcs vs scada
Dcs vs scada
Sayed Qaisar Shah
 
IJSRED-V2I2P15
IJSRED-V2I2P15IJSRED-V2I2P15
IJSRED-V2I2P15
IJSRED
 
Practical Troubleshooting and Problem Solving of Modbus Protocols
Practical Troubleshooting and Problem Solving of Modbus Protocols Practical Troubleshooting and Problem Solving of Modbus Protocols
Practical Troubleshooting and Problem Solving of Modbus Protocols
Living Online
 

Similar to Training manual on scada (20)

Scada slide
Scada slideScada slide
Scada slide
 
Scada Industrial Control Systems Penetration Testing
Scada Industrial Control Systems Penetration Testing Scada Industrial Control Systems Penetration Testing
Scada Industrial Control Systems Penetration Testing
 
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
 
SCADA Assignment.pptx
SCADA Assignment.pptxSCADA Assignment.pptx
SCADA Assignment.pptx
 
Scada presentation (group 10)
Scada presentation (group 10)Scada presentation (group 10)
Scada presentation (group 10)
 
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADARITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
 
SCADA.pptx supervisory control and data aquasition
SCADA.pptx supervisory control and data aquasitionSCADA.pptx supervisory control and data aquasition
SCADA.pptx supervisory control and data aquasition
 
Practical DNP3 and Modern SCADA Systems
Practical DNP3 and Modern SCADA SystemsPractical DNP3 and Modern SCADA Systems
Practical DNP3 and Modern SCADA Systems
 
Scada pdf
Scada pdfScada pdf
Scada pdf
 
Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems
 
SCADA Systems Vulnerabilities and Blockchain Technology
SCADA Systems Vulnerabilities and Blockchain TechnologySCADA Systems Vulnerabilities and Blockchain Technology
SCADA Systems Vulnerabilities and Blockchain Technology
 
Scada and industry 4.0
Scada and industry 4.0Scada and industry 4.0
Scada and industry 4.0
 
P1111141868
P1111141868P1111141868
P1111141868
 
Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems Worldwide
 
SCADA Systems and its security!
SCADA Systems and its security!SCADA Systems and its security!
SCADA Systems and its security!
 
SCADA
SCADASCADA
SCADA
 
Paper id 37201531
Paper id 37201531Paper id 37201531
Paper id 37201531
 
Dcs vs scada
Dcs vs scadaDcs vs scada
Dcs vs scada
 
IJSRED-V2I2P15
IJSRED-V2I2P15IJSRED-V2I2P15
IJSRED-V2I2P15
 
Practical Troubleshooting and Problem Solving of Modbus Protocols
Practical Troubleshooting and Problem Solving of Modbus Protocols Practical Troubleshooting and Problem Solving of Modbus Protocols
Practical Troubleshooting and Problem Solving of Modbus Protocols
 

Recently uploaded

Introduction to IP address concept - Computer Networking
Introduction to IP address concept - Computer NetworkingIntroduction to IP address concept - Computer Networking
Introduction to IP address concept - Computer Networking
Md.Shohel Rana ( M.Sc in CSE Khulna University of Engineering & Technology (KUET))
 
Social media management system project report.pdf
Social media management system project report.pdfSocial media management system project report.pdf
Social media management system project report.pdf
Kamal Acharya
 
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Miss Khusi #V08
 
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K SchemeMSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
Anwar Patel
 
GUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdf
GUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdfGUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdf
GUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdf
ProexportColombia1
 
Quadcopter Dynamics, Stability and Control
Quadcopter Dynamics, Stability and ControlQuadcopter Dynamics, Stability and Control
Quadcopter Dynamics, Stability and Control
Blesson Easo Varghese
 
Evento anual Splunk .conf24 Highlights recap
Evento anual Splunk .conf24 Highlights recapEvento anual Splunk .conf24 Highlights recap
Evento anual Splunk .conf24 Highlights recap
Rafael Santos
 
Software Engineering and Project Management - Introduction to Project Management
Software Engineering and Project Management - Introduction to Project ManagementSoftware Engineering and Project Management - Introduction to Project Management
Software Engineering and Project Management - Introduction to Project Management
Prakhyath Rai
 
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
VICTOR MAESTRE RAMIREZ
 
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
IJAEMSJORNAL
 
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
Mani Krishna Sarkar
 
Online music portal management system project report.pdf
Online music portal management system project report.pdfOnline music portal management system project report.pdf
Online music portal management system project report.pdf
Kamal Acharya
 
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...
IJAEMSJORNAL
 
Rotary Intersection in traffic engineering.pptx
Rotary Intersection in traffic engineering.pptxRotary Intersection in traffic engineering.pptx
Rotary Intersection in traffic engineering.pptx
surekha1287
 
Development of Chatbot Using AI/ML Technologies
Development of  Chatbot Using AI/ML TechnologiesDevelopment of  Chatbot Using AI/ML Technologies
Development of Chatbot Using AI/ML Technologies
maisnampibarel
 
Lecture 6 - The effect of Corona effect in Power systems.pdf
Lecture 6 - The effect of Corona effect in Power systems.pdfLecture 6 - The effect of Corona effect in Power systems.pdf
Lecture 6 - The effect of Corona effect in Power systems.pdf
peacekipu
 
Germany Offshore Wind 010724 RE (1) 2 test.pptx
Germany Offshore Wind 010724 RE (1) 2 test.pptxGermany Offshore Wind 010724 RE (1) 2 test.pptx
Germany Offshore Wind 010724 RE (1) 2 test.pptx
rebecca841358
 
IWISS Catalog 2024
IWISS Catalog 2024IWISS Catalog 2024
IWISS Catalog 2024
Iwiss Tools Co.,Ltd
 
Chlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptxChlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptx
yadavsuyash008
 
Response & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITHResponse & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITH
IIIT Hyderabad
 

Recently uploaded (20)

Introduction to IP address concept - Computer Networking
Introduction to IP address concept - Computer NetworkingIntroduction to IP address concept - Computer Networking
Introduction to IP address concept - Computer Networking
 
Social media management system project report.pdf
Social media management system project report.pdfSocial media management system project report.pdf
Social media management system project report.pdf
 
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
 
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K SchemeMSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
 
GUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdf
GUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdfGUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdf
GUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdf
 
Quadcopter Dynamics, Stability and Control
Quadcopter Dynamics, Stability and ControlQuadcopter Dynamics, Stability and Control
Quadcopter Dynamics, Stability and Control
 
Evento anual Splunk .conf24 Highlights recap
Evento anual Splunk .conf24 Highlights recapEvento anual Splunk .conf24 Highlights recap
Evento anual Splunk .conf24 Highlights recap
 
Software Engineering and Project Management - Introduction to Project Management
Software Engineering and Project Management - Introduction to Project ManagementSoftware Engineering and Project Management - Introduction to Project Management
Software Engineering and Project Management - Introduction to Project Management
 
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
 
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
 
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
 
Online music portal management system project report.pdf
Online music portal management system project report.pdfOnline music portal management system project report.pdf
Online music portal management system project report.pdf
 
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...
 
Rotary Intersection in traffic engineering.pptx
Rotary Intersection in traffic engineering.pptxRotary Intersection in traffic engineering.pptx
Rotary Intersection in traffic engineering.pptx
 
Development of Chatbot Using AI/ML Technologies
Development of  Chatbot Using AI/ML TechnologiesDevelopment of  Chatbot Using AI/ML Technologies
Development of Chatbot Using AI/ML Technologies
 
Lecture 6 - The effect of Corona effect in Power systems.pdf
Lecture 6 - The effect of Corona effect in Power systems.pdfLecture 6 - The effect of Corona effect in Power systems.pdf
Lecture 6 - The effect of Corona effect in Power systems.pdf
 
Germany Offshore Wind 010724 RE (1) 2 test.pptx
Germany Offshore Wind 010724 RE (1) 2 test.pptxGermany Offshore Wind 010724 RE (1) 2 test.pptx
Germany Offshore Wind 010724 RE (1) 2 test.pptx
 
IWISS Catalog 2024
IWISS Catalog 2024IWISS Catalog 2024
IWISS Catalog 2024
 
Chlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptxChlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptx
 
Response & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITHResponse & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITH
 

Training manual on scada

  • 2. OBJECTIVES: o To discuss the concept of SCADA and its branches • Protection for SCADA • Future of SCADA
  • 3. INDEX: 1) WHAT IS SCADA ? 2) ARCHITECTURE 3) FUNCTIONALITY 4) MAIN FUNCTIONS 5) CONTROLLING PROCESSES 6) COMPONENTS OF SCADA 7) SCADA ARCHITECTURE 8) SECURITY ISSUES 9) FUTURE OF SCADA
  • 4. 1.WHAT IS SCADA ? Supervisory Control And Data Acquisition
  • 5.  SCADAstands Supervisory Control and Data Acquisition. As the name indicates, it is not a full control system, but rather focuses on the supervisory level. It is a computer system for gathering and analyzing real time data.  SCADA systems can be relatively simple, such as one that monitors environmental conditions of a small office building, or incredibly complex, such as a system that monitors all the activity in a nuclear power plant or the activity of a municipal water system. SCADA systems are used to monitor and control a plant or equipment in industries such as telecommunications, water and waste control, energy, oil and gas refining and transportation. A SCADA system gathers information, such as where a leak on a pipeline has occurred, transfers the information back to a central site, alerting the home station that the leak has occurred, carrying out necessary analysis and control, such as determining if the leak is critical, and displaying the information in a logical and organized fashion.
  • 6. Where and why, use of SCADA? Application area : Industrial processes : chemical, power generation and distribution, metallurgy, … : reactors, nuclear waste, ...Nuclear processes Experimental physics : HEP laboratories Application size: 20 k I/O to 450 K I/O, 1 M I/O under development
  • 7. Data Server Supervisory Control And Data Acquisition Archiving, Logging, Access Control, AlarmsGraphics and Batch processing Distributed database Field Bus Control Programs Data Server ERP Systems Expert Systems PLC’s SCADA
  • 10. Communication Internal Communication Access to Devices Interfacing H/W Multiple communication protocols supported in a single system Support for major PLCs/DCSs but not VME S/W     API ODBC, DDE and OLE I/F to PC Products OPC Client and OPC Server ActiveX Containers Scalability Database Configuration DB, alarm DB, Archive DB, log DB and RTDB resides in the memory of the servers SOFTWARE ARCHITECTURE
  • 11. Generic SCADA functionality 1. Access Control, MMI, 2. Trending, Alarm Handling, 3. Logging, Archiving, Report Generation, Automation. 3. FUNCTIONALITY
  • 12. 1)Data acquisition 2)Alarms and event monitoring 3)Database and data login 4)Operator interface 5)Non real time control 6)Logging 7)MMI (men-machine interface) use 8)Automation, and 9)Report generation 4. MAIN FUNCTIONS
  • 13. 5. CONTROLLING PROCESSES I. Industrial processes include those of manufacturing, production, power generation, fabrication, and refining, and may run in continuous, batch, repetitive, or discrete modes. II. Infrastructure processes may be public or private, and include water treatment and distribution, wastewater collection and treatment, oil and gas pipelines, electrical power transmission and distribution, wind farms and large communication systems. III. Facility processes occur both in public facilities and private ones, including buildings, airports, ships, and space stations. They monitor and control HVAC, access, and energy consumption.
  • 14. 6. COMPONENTS OF SCADA 1) HMI (Human Machine Interface): It is an apparatus that is operated by human to monitor and control various processes. 2) PLC (Programmable Logic Controller): This controller is used because they are very flexible, and economical than Remote Terminal Units 3) Supervisory System: It collects process data and sends control commands to the process. 4) RTU (Remote Terminal Units): This process is connected with sensors to convert sensor signals into digital and sends digital data to Supervisory System 5) Communication Infrastructure: It is connecting Supervisory System to RLU’s
  • 15. 7. SCADA ARCHITECTURE oSCADA systems have evolved in parallel with the growth and sophistication of modern computing technology. The following sections will provide a description of the following three generations of SCADA systems: 1. First Generation: Monolithic 2. Second Generation: Distributed 3. Third Generation: Networked 1. First generation: Monolithic System; when SCADA systems were first developed, the concept of computing in general centered on “mainframe” systems. Networks were generally non-existent, and each centralized system stood alone. As a result, SCADA systems were standalone systems with virtually no connectivity to other systems. Wide Area Networks were later designed by RTU vendors to communicate with the RTU. The communication protocols used were often proprietary at that time. The first- generation SCADA system was redundant since a back-up mainframe system was connected at the bus level and was used in the event of failure of the primary mainframe.
  • 17. 2. Second generation: Distributed; the next generation of SCADA systems took advantage of developments and improvement in system miniaturization and Local Area Networking (LAN) technology to distribute the processing across multiple systems. Multiple stations, each with a specific function, were connected to a LAN and shared information with each other in real-time. These stations were typically of the mini-computer class, smaller and less expensive than their first generation processors. Model of Distributed System:
  • 18. 3. Third generation: Networked; The current generation of SCADA master station architecture is closely related to that of the second generation, with the primary difference being that of an open system architecture rather than a vendor controlled, proprietary environment. There are still multiple networked systems, sharing master station functions. There are still RTUs utilizing protocols that are vendor-proprietary. The major improvement in the third generation is that of opening the system architecture, utilizing open standards and protocols and making it possible to distribute SCADA functionality across a WAN and not just a LAN. Model of Networked System:
  • 19. 8. SECURITY ISSUES The following are TSI’s (The Security Institute, a United Kingdom based professional body for security professionals) recommendations to address some lingering security issues for SCADA: 1. Security of network communications: Implementation of strong encryption over the SCADA network communications, to ensure that both monitored data and control commands are encrypted. 2.Turning on security: Implementation of security features with devices on the network, especially authentication. Using secure protocols whenever possible. 3. Knowing your SCADA network: Identifying all connections to external networks including wire-less networks, corporate LANs and WANs, and the Internet. Also, securing the network by eliminating all unnecessary connections to external networks. 1. Hardening of the SCADA environment: Removing all unnecessary services from the hosts on the network. Also, just as in the corporate network environment, ensuring that all systems are patched and up to date. 2. Conducting regular security audits: Ensuring that security practices and procedures, such as incident response, are defined and implemented. Penetration testing of the network environment should also be prudently conducted with inspection for potential back doors into the SCADA network. 3. Implementing real-time threat protection: With the increasing number and complexity of attacks, it's insufficient to simply patch the systems or maintain access/service control. One alternative is to implement real-time threat protection in the form of network intrusion-prevention systems. Unlike standard packet-filter firewalls, these systems perform application-layer inspection to identify attacks that are carried in the payload and block the offending traffic in real time
  • 20. The large territories and huge volumes of data SCADA can handle form a formidable combination. Today’s SCADA systems can manage anything from a few thousands to one million of input/output channels. The technology is still evolving in terms of sophistication as well. SCADA systems as they are now can perform a large variety of tasks and some systems have artificial intelligence built into them. They are also more network-enabled, thus paving the way for voice-data-control data convergence. With proper planning and a custom-made installation, a SCADA system becomes a valuable asset. 9. FUTURE OF SCADA