scada (supervisory control and data acquisition)
TRANSCRIPT
SCADA(SUPERVISORY CONTROL AND
DATA ACQUISITION)
INTRODUCTION
SCADA STANDS FOR SUPERVISORY CONTROL AND DATA
ACQUISITION. IT WAS FIRST USED IN 1960.SCADA HAS BEEN USED
INTRODUCED TO DECREASE THE PRODUCTION COST AND TIME.
SCADA TOOK THE ADVANTAGE OF THE LATEST WEB TECHNOLOGIES
AND THE POWER OF THE CLOUD WITH THE INDUSTRIES MOST
ADVANCED REMOTE DEVICE MONITORING AND AUTOMATION
SOFTWARE. SCADA IS THE ONLY CLOUD BASED AUTOMATION.
STATEMENT OF PROBLEM
THE PURPOSE BEHIND USING SCADA IS GATHERING AND ANALYZING
REAL TIME DATA. IT IS IMPOSSIBLE FOR HUMAN BEING TO GATHER
INFORMATION SUCH AS WHERE A LEAK ON PIPELINE HAS OCCURRED
OR THE PPM LEVEL IN PIPELINE CARRYING WATER HAS INCREASED
OR NOT, BUT BY USING SCADA THESE PROBLEMS CAN BE EASILY
SORTED.WE ALSO USED SCADA SYSTEM TO DETECT PRESSURE
CHANGE IN PIPELINES.
OBJECTIVE
THE OBJECTIVE OF THIS PLAN IS TO DEVELOP
WRITTEN STANDARDS AND CODE
TEMPLATES/OBJECTS FOR FLOW
CONTROL,TEMPERATURE CONTROL,PRESSURE
CONTROL AND CONTROL VALVE OPERATIONS.
RISK ANALYSIS
1#SECURITY:
IF OUR INFORMATION IS ON THE CLOUD, IT CAN BE ACCESSED
BY PEOPLE OUTSIDE OF OUR ORGANISATION. WHETHER THE
INFORMATION IS EXPOSED DUE TO THE ILLEGAL ACTIVITY OF
HACKERS-OR THROUGH LEGAL CHANNELS-ONCE IT’S OUT, IT’S
OUT AND IT COULD HAVE A DRASTID NEGATIVE IMPACT ON OUR
ORGANISATION. WHEN THE INFORMATION IS LOCATED IN THE
CLOUD IT IS VERY DIFFICULT TO TRACE THE HACKERS.
RISK ANALYSIS
2#PERFORMANCE:
IN ORDER TO OBTAIN ACCEPTABLE PERFORMANCE FOR CERTAIN
MANUFACTURING APPLICATIONS, HIGH BAND WIDTH NETWORKS WITH
LOW LATENCY MAY BE REQUIRED. EXTERIOR N NETWORKS SUCH AS THOSE
PROVIDED BY ISP’S MAY NOT BE ABLE TO FULFILL THESE REQUIREMENTS.
IF SCADA SYSTEM LOOSES SERVER FOR EVEN A FEW SECOND OR MINUTE
CAN WREAK HAVOC ON PRODUCTION DEPARTMENT.
METHODOLOGY
FIRST WE WILL GATHER DATA, ANALYSE IT AND THEN DESIGN THE SOFTWARE
ACCORDINGLY.
SECONDLY WE WILL MANAGE OUR DATABASE WHICH WILL STORE REAL TIME
DATA.
AFTER THAT WE WILL LOAD OUR SOFTWARE IN THE SYSTEM AND THEN WE WILL
CHECK THAT WHETER IT IS COMPATIBLE TO THE HARDWARE OR NOT.
THE DEVICE BED IS SET UP FOR VULNERABILITY ASSESMENTS AND TESTINGS.
PHASE PLANNING
IDENTIFICATION INITIATION
DEFINITION
OF NEED
PROJECT CLOSEOUT ACQUISITION DESIGN
PHASE PLAN
PHASE PLANNINGPHASE DESCRIPTION TIME TOTAL COST
1. IDENTIFICATION AND INITIATION(DATA
COLLECTION AND
ANALYSIS)
2. DEFINITION AND DESIGN(SOFTWARE
DEVELOPMENT)
3. ACQUISITION(SOFTW
ARE INSTALLATION)
4. PROJECT CLOSEOUT(FIELD
WORK)
REAL TIME DATA SUCH
AS VARIANCE IN
PRESSURE AND
TEMPERATURE,
LEAKAGE IN PIPELINES.
C
AND C++PROGRAMMING
LANGUAGES ARE USED.
SOFTWARE IS
INSTALLED IN
CORRESPONDING
COMPATIBLE
HARDWARE.
FUNCTIONS AND
CLASSES ARE
CORRESPONDINGLY
ACCESSED AS
REQUIRED BY REAL LIFE
7 DAYS
15 DAYS
2 DAYS
1 DAY
TOTAL TIME- 25 DAYS
RS 4,000/-
RS 1,00,000/-
RS 40,000/-
-----------
TOTAL -RS 1,44,000
BENEFITS
REDUCED SITE VISITS AND CALLOUTS.
PREDICTIVE MAINTENANCE WHICH ALLOWS PROACTIVE RATHER
THAN REACTIVE PLANNING.
THE ABILITY TO VIEW AND ADJUST SET POINTS REMOTELY.
PREVENTATIVE MAINTENANCE REDUCES COST.
MOST IMPORTANT IT SAVES MONEY AND TIME.
CONCLUSION
• BY USING SCADA WE HAVE TIMELY AND ACCURATE DATA AVAILABLE. REAL TIME
DATA CAN BE USED TO OPTIMIZE THE OPERATION OF A PLANT OR PROCESS. SCADA
CAN ENABLE CONSIDERABLE IMPROVEMENT IN EFFICIENCY AND IN SURE DATA
SAFETY. EFFICIENCY DIRECTLY TRANSLATES TO REDUCE OPERATING COSTS.
• RELYING ON THE VARIOUS VENDORS TO IDENTIFY VULNERABILITIES AND SUPPLY
PATCHES ELIMINATING THEM IS A NEVER-ENDING PROCESS. THE ONLY SOLUTION IS
TO PLACE INDEPENDENT BARRIERS AND PROTECTIONS (TECHNICAL
COUNTERMEASURES) AROUND A SCADA SYSTEM TO TRY TO KEEP ITS
COMMUNICATION PATHS SECURE.