Presented By: Presented By: PIN: 08KG1A0402 PIN:08KG1A0431: A.Varalakshmi K.Pujitha

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 23

SCADA IN ElECTRICITY BILLING

PRESENTED BY: PRESENTED BY: A.VARALAKSHMI K.PUJITHA PIN: 08KG1A0402 PIN:08KG1A0431

INTRODUCTION TO SCADA
Supervisory Control and Data Acquisition system (SCADA) technology has evolved to successful multipurpose data utility management & control tools. SCADA is one such system that is being familiar along with computational intelligence.

SCADA IN POWER SYSTEMS :


SCADA can be used extensively for compilation of extensive data & management of distribution systems .
The key features of the system are viz; Faster execution of decisions. Manual errors & oversights are eliminated. Periodic reports for performance analysis of the power system

TASKS OF SCADA:

1. Data collection

1. Data transmission 1. Data monitoring:

1. Man / Machine interface

APPLICATION OF SCADA IN ELECTRICITY BILLING:

1. Chances of human errors. 1. Delay in tripping 1. Presence of malpractices. 1. Failure in tariff collecting functions.

1.

Human resource wastage.

SCADA clears out all the blackouts in the conventional billing system. In this paper we made a wide view over this topic. The system description is as follows. With the due consideration of the tasks of the modern SCADA, we can divide the SCADA billing system as follows,

a. Data acquisition. b.Data transmission. c. Remote Terminal Unit. d. Master Terminal Unit. e. Man Machine Interface

NETWORKING TOPOLOGY:
The whole system is based on MAN (Metropolitan area network). Here its a combination of two. This two can be extended between the regions are: 1.Consumers & RTU 2.RTU&MTU.
The bus topology is a pertinent topology that can be utilized between consumers and RTU. The multipoint bus topology uses along cable to link the entire consumers in the network Following this the star topology is extended between RTU&MTU . The link between these two can be accomplished through modem &router.

REMOTE TERMINAL UNIT:


Remote terminal units play a vital role in this system in data acquisition that is collection of the readings from a no of consumers meters & also behaves as a zonal collection center for the bills. The data from the consumers meters are stored in their respective web pages Fig: web page in the RTU.

The RTU is otherwise called as Bay control unit when the tasks like remote control & monitoring are added with the RTU. The interfacing devices like modem are added depending upon the need on communication.

MASTER TERMINAL UNIT:


The data from the RTU are collected in the MTU for further processing. Depending upon the application software in the MTU the collected data get processed. The application software is developed using a high level language like c, c++ etc. the data from the RTUs are collected on the basis of the priority table algorithm in the router i.e., priority may be on the basis of the shortest distance.

Depending on this, the prior RTU is selected & the consumers details are updated in their web pages .The web page in a MTU differs from the web page in the RTU. The programming algorithm works on the basis of the data from the fields.

MAN/MACHINE INTERFACE:
MMI allows the RTU operator to trip the consumers power supply, when he fails to pay the bill within the due date. This made possible from the status of the paid field in the consumers web page. An internal timer is set to the no of days, for bill payment. At the end of the last day, the status of zhe paid field is verified & the appropriate command word is sent back to the consumers meter .

he command word is in the following format:

Where 111011 address word representing the consumer. 000000 command word to the tripping unit in the meter. In this example, the command word is to connect the consumer with the supply, else we can use another code to trip the supply .

MEASURES TO SECURE SCADA:

The steps are defining a security policy: Securing the SCADA network &operating environment Securing the SCADA application Detecting the unauthorized intrusions Regulating the physical access to the SCADA network

This can be accomplished through the following security policies: 1.Fire walls. 2.Virtual private networks. 3.Demilitarized zones. 4.Authentication

FUTURE TRENDS OF SCADA:


SCADA with intelligent database processors speed up the Process such as search, retrieval &updating activity. SCADA with a concept of artificial intelligence, embedded systems can be used in automatic power monitoring, automatic restoration of power networks, load compensation in distribution & real time control. IT enabled SCADA systems have a higher operational efficiency & maintain

The security of the power system network.

Applications of scada:

CONCLUSION:
The new Eva has been already started from the reference point with the Minimum source. SCADA associated with the computational intelligence will bring out the new revolution. It has been started out from our paper.

With the support of the practical considerations, qualitative & quantitative analysis this can be implemented in the user area .

You might also like