Presented By: Presented By: PIN: 08KG1A0402 PIN:08KG1A0431: A.Varalakshmi K.Pujitha
Presented By: Presented By: PIN: 08KG1A0402 PIN:08KG1A0431: A.Varalakshmi K.Pujitha
Presented By: Presented By: PIN: 08KG1A0402 PIN:08KG1A0431: A.Varalakshmi K.Pujitha
INTRODUCTION TO SCADA
Supervisory Control and Data Acquisition system (SCADA) technology has evolved to successful multipurpose data utility management & control tools. SCADA is one such system that is being familiar along with computational intelligence.
TASKS OF SCADA:
1. Data collection
1. Chances of human errors. 1. Delay in tripping 1. Presence of malpractices. 1. Failure in tariff collecting functions.
1.
SCADA clears out all the blackouts in the conventional billing system. In this paper we made a wide view over this topic. The system description is as follows. With the due consideration of the tasks of the modern SCADA, we can divide the SCADA billing system as follows,
a. Data acquisition. b.Data transmission. c. Remote Terminal Unit. d. Master Terminal Unit. e. Man Machine Interface
NETWORKING TOPOLOGY:
The whole system is based on MAN (Metropolitan area network). Here its a combination of two. This two can be extended between the regions are: 1.Consumers & RTU 2.RTU&MTU.
The bus topology is a pertinent topology that can be utilized between consumers and RTU. The multipoint bus topology uses along cable to link the entire consumers in the network Following this the star topology is extended between RTU&MTU . The link between these two can be accomplished through modem &router.
The RTU is otherwise called as Bay control unit when the tasks like remote control & monitoring are added with the RTU. The interfacing devices like modem are added depending upon the need on communication.
Depending on this, the prior RTU is selected & the consumers details are updated in their web pages .The web page in a MTU differs from the web page in the RTU. The programming algorithm works on the basis of the data from the fields.
MAN/MACHINE INTERFACE:
MMI allows the RTU operator to trip the consumers power supply, when he fails to pay the bill within the due date. This made possible from the status of the paid field in the consumers web page. An internal timer is set to the no of days, for bill payment. At the end of the last day, the status of zhe paid field is verified & the appropriate command word is sent back to the consumers meter .
Where 111011 address word representing the consumer. 000000 command word to the tripping unit in the meter. In this example, the command word is to connect the consumer with the supply, else we can use another code to trip the supply .
The steps are defining a security policy: Securing the SCADA network &operating environment Securing the SCADA application Detecting the unauthorized intrusions Regulating the physical access to the SCADA network
This can be accomplished through the following security policies: 1.Fire walls. 2.Virtual private networks. 3.Demilitarized zones. 4.Authentication
Applications of scada:
CONCLUSION:
The new Eva has been already started from the reference point with the Minimum source. SCADA associated with the computational intelligence will bring out the new revolution. It has been started out from our paper.
With the support of the practical considerations, qualitative & quantitative analysis this can be implemented in the user area .