Preview

Scada System

Good Essays
Open Document
Open Document
1115 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Scada System
Supervisor control and data acquisition

I am going to discuss in brief the SCADA system in GASCO which is one of the biggest MIS in Egypt as it responsible for control natural gas all over Egypt.
GASCO (Egyptian natural gas company), is the greatest and the only company in Egypt responsible for transmition of natural gas all over Egypt starting from natural gas wells in seas or deserts and finally to the huge customers (i.e electrical power station, cement and steel factories)

SCADA system
A SCADA (or supervisory control and data acquisition) system means a system consisting of a number of remote terminal units (or RTUs) collecting field data connected back to a master station via a communications system. The master station displays the acquired data and also allows the operator to perform remote control tasks.
The accurate and timely data (normally real-time) allows for optimization of the operation of the plant and process. A further benefit is more efficient, reliable and most importantly, safer operations. This all results in a lower cost of operation compared to earlier non-automated systems.
There is a fair degree of confusion between the definition of SCADA systems and process control system. SCADA has the connotation of remote or distant operation. The inevitable question is how far ‘remote’ is – typically this means over a distance such that the distance between the controlling location and the controlled location is such that direct-wire control is impractical (i.e. a communication link is a critical component of the system).
A successful SCADA installation depends on utilizing proven and reliable technology, with adequate and comprehensive training of all personnel in the operation of the system.
There is a history of unsuccessful SCADA systems – contributing factors to these systems includes inadequate integration of the various components of the system, unnecessary complexity in the system, unreliable hardware and unproven software.
Today

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Bsbwor501 Final Exam

    • 757 Words
    • 4 Pages

    | What Standard Army Management Information System is the primary automation system used by Army Direct Support and General Support supply units?…

    • 757 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Items covered in the lecture include the history of the system, differences between the main system and the deployable system. Also covered is consideration to be taking in siting the set-up, setting up the system and functionality.…

    • 522 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Itq Coursework

    • 6612 Words
    • 27 Pages

    IT makes good use of automated routines. These help to cut down the time it takes to perform a process.…

    • 6612 Words
    • 27 Pages
    Good Essays
  • Powerful Essays

    An initial task in a security assessment will focus on the basic hardware, software, and network of the system, also known as the infrastructure. Identifying types of hardware and software will dictate a large part of the requirements necessary to protect the environment. Also, a thorough analysis of the hardware will help in identifying what exists where. This information can be used for planning for replacement (Chapter, 2003).…

    • 1453 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    This course provides an overview of controls relating to IT governance, databases and their structures, networks, client servers systems, IT service delivery, business continuity, disaster recovery, IS security, cryptography, firewalls, IDS, IPS, backups, recovery, and distributed systems.…

    • 746 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    PPL SFGSC

    • 1247 Words
    • 8 Pages

    Sensys Advanced Plant Information Management System and SAP Integration Solution for PPL SUI Solutions for Process, Manufacturing and Facilities Sensys Advanced Plant Information Management System and SAP Integration Solution for PPL SUI About Pakistan Petroleum Limited: The pioneer of the natural gas industry in the country, Pakistan Petroleum Limited (PPL) has been a frontline player in the energy sector since the mid – 1950s. As a major supplier of natural gas, PPL today contributes some 20 percent of the country’s total natural gas supplies besides producing crude oil, Natural Gas Liquid and Liquefied Petroleum Gas.…

    • 1247 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Do some Internet research on security vulnerabilities associated with SCADA and digital industrial control systems. Summarize the major security concerns associated with these systems and steps than can be taken to enhance their…

    • 1137 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Scada Report

    • 4408 Words
    • 18 Pages

    There are three main elements to a SCADA system, various RTU's (Remote TelemetryUnits), communications and an HMI (Human Machine Interface).…

    • 4408 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    Bpr at Ongc

    • 3170 Words
    • 13 Pages

    Pre ERP days Existing Environment IT initiatives by ONGC Project Objective The Implementation phase Implementation Plan Implementation Highlights Post Implementation SCADA System Architecture Reverse Auction process References . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 . . . . . . .…

    • 3170 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    Even though it is fun and practical, Information Technology gives us new challenges in security, because the security threats also adapt their shape. In the past, securing vital objects means keeping their physical attributes intact, but this is not the case now. Currently, we should also be concerned about the security of its digital format or access, and Informatics certainly plays a vital role in this area. Nowadays informatics has totally changed our approach to security of technical systems. Impending Threats increased by eminence use of SCADA and rapid growth of telecommunication and computer systems connect previously isolated technical systems. SCADA have indirect threats like viruses and operational errors that can be get rid of by toil in Informatics only.…

    • 1289 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Scada

    • 3310 Words
    • 14 Pages

    SCADA systems have made substantial progress over the recent years in terms of functionality, scalability, performance and openness such that they are an alternative to in house development even for very demanding and complex control systems as those of physics experiments.…

    • 3310 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    Distribution Automation

    • 2007 Words
    • 9 Pages

    In Distribution Automation (DA) system, various quantities like voltage, current, switch status, and temperature are recorded in the field at distribution transformers and feeders, using data acquisition device called Remote Terminal Units (RTU). These system quantities are transmitted on-line to substation through variety of communication media .The measured field data are processed at substation for displaying any selected system quantity through Graphic User Interface (GUI). In the event of any system quantity crossing a pre-defined level, an alarm is automatically generated for operator intervention .So that the respective control action will be initiated by operator or automatically and transmitted from base station through communication channel to remote terminal unit associated with corresponding control action that is initiated. The desired…

    • 2007 Words
    • 9 Pages
    Better Essays
  • Good Essays

    IEDs are a key component of substation integration and automation technology. Substation integration involves integrating protection, control, and data acquisition functions into a minimal number of platforms to reduce capital and operating costs, reduce panel and control room space, and eliminate redundant equipment and databases. Automation involves the deployment of substation and feeder operating functions and applications ranging from supervisory control and data acquisition (SCADA) and alarm processing to integrated volt/var control in order to optimize the management of capital assets and enhance operation and maintenance (O&M) efficiencies with minimal human intervention.…

    • 3064 Words
    • 13 Pages
    Good Essays
  • Good Essays

    Role of computers in the control of Industrial processes (plants). Elements of Computer Controlled Process / Plant. Classification – Batch, Continuous, Supervisory and Direct Digital Controls. Architecture – Centralized, Distributed and Hierarchical Systems. Man Machine or Human Computer Interface (HCI). *…

    • 359 Words
    • 11 Pages
    Good Essays
  • Powerful Essays

    Enterprise Database Systems

    • 17962 Words
    • 72 Pages

    As the complexity of vehicle control-systems increases, the amount of information that these systems are intended to handle also increases. This thesis provides concepts relating to real-time database management systems to be used in such control-systems. By integrating a real-time database management system into a vehicle control-system, data management on a higher level of abstraction can be achieved. Current database management concepts are not sufficient for use in vehicles, and new concepts are necessary. A case-study at Volvo Construction Equipment Components AB in Eskilstuna, Sweden presented in this thesis, together with a survey of existing database platforms confirms this. The thesis specifically addresses data access issues by introducing; (i) a data access method, denoted database pointers, which enables data in a real-time database management system to be accessed efficiently. Database pointers, which resemble regular pointers variables, permit individual data elements in the database to be directly pointed out, without risking a violation of the database integrity. (ii) two concurrency-control algorithms, denoted 2V-DBP and 2VDBP-SNAP which enable critical (hard real-time) and non-critical (soft realtime) data accesses to co-exist, without blocking of the hard real-time data accesses or risking unnecessary abortions of soft real-time data accesses. The thesis shows that 2V-DBP significantly outperforms a standard real-time concurrency control algorithm both with respect to lower response-times and minimized abortions. (iii) two…

    • 17962 Words
    • 72 Pages
    Powerful Essays