Premium Essay

Scada and Satellites

In:

Submitted By infra4801
Words 719
Pages 3
So far we have studied the use of Distributed Control Systems in Frontier Refineries as a close example of the use of a SCADA-like system in the oil industry. Implementing the capability of satellites to these systems has allowed broadening their utilization potential to other industries, including government and military defense uses within the domain of national security. This can lead us to an analysis of the financial sustainability of these systems for the-at least for now-near future. Based on what we have learned about the oil industry-the need for continuous monitoring and control of diverse assets in the plant/field-we can conclude that the basic functions-pipeline, tank and pump monitoring, leak detection, etc-are operations that will maintain steady usage in spite of fluctuating financial conditions in the oil/gas market. We expect also that, given the conditions of international relations, the military and government need of SCADA systems for anti-terrorism and peacekeeping efforts will not be affected by variations in credit markets. In fact, the more this security around this technology is developed, the more we expect security-sensitive users such as the military will make use of them. We should also consider the possibility that a shift in international relations policies might dampen the demand growth rate for SCADA/Satellite systems.
The sources studied for this report also make another consideration: the uncertain and variable situation in the Middle East and Africa seriously affects not only military activities but also oil and gas interests, increasing the viability and demand of renewable energy sources. We suggest that the implications and effects of the growth in this segment of the energy industry on SCADA/DSC systems are considered for further research.
Furthermore, the implementation of satellites to the SCADA systems has allowed for an

Similar Documents

Free Essay

Satellite Scada for Treatment Plants | Isa

...Satellite SCADA for treatment plants | ISA http://www.isa.org/PrinterTemplate.cfm?Section=InTech_Home1&tem... 09 April 2001 by Eric Silverman The technology is available, but is it cost effective? Dedicated, satellite-based business communications using relatively small dish antennas, or very small aperture terminals (VSATs), are no longer only for governments and colossal corporations. An industry study predicted in 1990 that supervisory control and data acquisition (SCADA) services would become a market for VSAT technology by the mid-1990s. VSAT SCADA is now an important tool in the oil, pipeline, and electric utility markets, fulfilling the prediction. VSAT has been successful in these industries, according to Satellite Communications contributor Phil Samuels, because the "electric, gas, and liquid transmission systems transit vast distances, often far from telecommunications and electrical power sources. Monitoring of these transmission facilities and the ability to take action to control their operations are important for inventory, regulatory, and safety reasons." Following its successful entry into these markets, the VSAT industry is now looking for new SCADA applications. One market to attract its interest is water and wastewater treatment, currently about 0.5% of VSAT SCADA installations. A close look suggests VSAT might soon play an important role in water and wastewater plant SCADA. The VSAT SCADA system for a typical water or wastewater treatment plant...

Words: 1016 - Pages: 5

Free Essay

Bentek Systems

...industries. Bentek Systems' Scope of Supply includes System Design, Systems Integration, Equipment Supply, Installation and Field Services. Bentek Systems offers SCADA Hosting service for industrial application. With over 20 years of experience and expertise in SCADA systems and industrial applications, our clients can be confident in our Hosted SCADA solution. Bentek Systems have a range of SCADA host software that provides local plant site monitoring to enterprise-wide SCADA Systems for the Oil & Gas, Water and Environment Industry. We use NetSCADA,which is a a Client-Server SCADA host software, which enables clients to login securely to monitor their remote sites by viewing data through Monitoring, Alarming, Historical Trending & Reporting graphical screens. The SCADALink SAT100 is a flexible low power satellite SCADA device that provides Modem, RTU, and Alarm Callout in a single device. It is designed for remote SCADA communications and monitoring to RS232/RS485 serial devices such as Flow Computers, RTU, PLC, Smart Transmitters and Power Meters inaccessible by terrestial communications. The SAT100's low power draw makes it an ideal solution for many remote SCADA applications SAT100 works with SCADALink SatSCADA Server software to provide a complete end-to-end satellite networking solution, allowing SCADA Hosts to reach SAT100 terminals located anywhere in the world. Alarm Callout ability means that it can be configured to generate callout messages on Alarm...

Words: 588 - Pages: 3

Free Essay

Herman Miller

...Research paper 1 SCADA Attack worldwide In era of modern technology evolves and it change continuously over the time as well as it creates risk or threat. The emergence of Internet and worldwide technologies as these systems were tightly integrated with business systems and became more exposed to cyber threats. Supervisory Control and Data Acquisition (SCADA) protocols are communications protocols designed for the exchange of control messages on industrial networks. A control system is a device or set of devices to manage, command, direct, or regulate the behavior of other devices or systems. By complexity, the reliable operation of modern infrastructures depends on computerized systems and SCADA systems. These control systems and devices communicated with each other almost exclusively, and rarely shared information with systems outside their environment. As more components of control systems become interconnected with the outside world using IP-based standards, the probability and impact of a cyber attack is at highest risk. Complexity of SCADA architectures, there is a variety of both wired and wireless media and protocols involved in getting data back to the central monitoring site. This enables implementation of powerful IP-base SCADA networks over mixed cellular, satellite, and landline systems. SCADA communications can employ a diverse range of both wired (lease...

Words: 884 - Pages: 4

Premium Essay

Opsec and Terrorism

...OPSEC in Warfare and Terrorism “The enemy aggressively "reads" our open source and continues to exploit such information for use against our forces. Some soldiers continue to post sensitive information to internet websites and blogs, e.g., photos depicting weapon system vulnerabilities and tactics, techniques, and procedures. Such OPSEC violations needlessly place lives at risk and degrade the effectiveness of our operations.” Peter Schoomaker (1). Operations Security (OPSEC), while a relatively recent term, is an operations enabler that has been practiced in varying degrees throughout history. This document will explore the history of OPSEC as it’s known today, discuss the process and its role in disrupting the capabilities of adversarial forces using multiple collection and planning models and examine the rapidly advancing technical capabilities of threat vectors. OPSEC as a concept was developed during the Vietnam War under the command of Admiral Ulyssess Sharp. The mission of the newly-established “Purple Dragon” team was to determine how the enemy was able to gather information on military operations (2). The team was able to understand the need to alter tactics and procedures to reduce an adversary's ability to make educated predictions based on the knowledge of routines (3). Post-war OPSEC was formally established as a national program when President Ronald Regan signed the National Security Decision Directive Number...

Words: 5936 - Pages: 24

Free Essay

Role of Gis in Power Transmission

...A PROJECT REPORT ON ROLE OF GIS IN POWER TRANSMISSION CASE STUDY OF THE KENYA ELECTRICITY TRANSMISSION COMPANY, BY David M. Kariuki To Central Institute of Rural Electrification International training program on upgrades of power utilities management using it/automated solutions. 29-10-2012 to 23-11-2012 CONTENTS CONTENTS...................................................................................... i 1 ACKNOWLEDGEMENTS ........................................................... iii 2 MY EXPERIENCE ..................................................................... iv 3 LIST OF ABBREVIATIONS ......................................................... v 4 LIST OF FIGURES AND TABLES. ............................................. vi 5 INTRODUCTION ........................................................................ 1 5.1 Background.......................................................................... 1 5.2 Mandate ............................................................................... 1 5.3 Core Functions ..................................................................... 2 5.4 KETRACO PROJECTS .......................................................... 5 5.4.1 NATIONAL GRID PROJECTS ........................................... 6 5.4.2 REGIONAL POWER INTERCONNECTIONS. ..................... 7 5.4.3 AFRICAN POWER POOLS ................................................ 8 5.4.4 AFRICAN POWER POOLS – (INTERCONNECTORS) .......... 9 6 SCOPE OF PROJECT...

Words: 3989 - Pages: 16

Free Essay

Utility Scale

...calculate the approximate design of a 1MW solar PV power plant (utility scale). The total no. of solar panel required and the different parameters of the solar panel estimated. A site in West Bengal is taken virtually to estimate the solar intensity of the site which is most important for calculation of such type of report. A Single Line Diagram (SLD) has been introduced in this report. Also the brief details of the materials/equipments (solar panels, inverters, protective gears, transformer, SCADA etc.) used to set up a 1MW power plant have been highlighted. A financial overview with a possible income datasheet included in the project report Please give your feedback via email to this email address: amrit.mandal0191@gmail.com 1 Contents 1. Aim of the project 2. Financial overview 3. Global market price trends of solar panel 4. Technical Calculation/Estimation & Specification i. Solar panel ii. Inverter iii. Protective gears iv. SCADA system v. Transformer 5. Single line diagram & Schematics 2 1. Aim of the project Aim of this paper is to give an overview of a 1MW solar PV power plant (utility scale). How the project will work? 1. Using solar pv modules, solar power generates in DC which is converted into AC power and then using a power transformer the generated and modified AC power will be fed to the grid. 2. No battery storage introduced here because the plant will only functions in the daylight and here...

Words: 6264 - Pages: 26

Free Essay

Overview in Phasor Measurement Units

...Table of Contents Abstract..........................................................................................................................................3 1.0 Introduction .............................................................................................................................4 2.0 History…………………….................................................................................................................5 3.0 Measurement Techniques .......................................................................................................6 4.0. Phasor Measurement Units.....................................................................................................8 4.1. Standards……………………………………………………............................................................10 4.1.1. COMTRADE Standard - IEEE C37.111……………………………………………………….11 4.1.2. Synchrophasor Standard -IEEE C37.118…………………………………………………..11 5.0. Optimization - Spreading and Placements.............................................................................12 5.1. Applications - State Estimation .................................................................................13 5.2 Applications - Control and Protection.........................................................................14 6.0. Conclusions............................................................................................................................16 References………………………………………………………………………………………………………………………………...

Words: 3042 - Pages: 13

Premium Essay

Information Technology

...rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 70 CHAPTER 3 1. Describe the major ethical issues related to information technology and identify situations in which they occur. 2. Identify the many threats to information security. 3. Understand the various defense mechanisms used to protect information systems. 4. Explain IT auditing and planning for disaster recovery. Ethics, Privacy, and Information Security LEARNING OBJECTIVES rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 71 WEB RESOURCES Student Web site www.wiley.com/college/rainer • Web quizzes • Lecture slides in PowerPoint • Author podcasts • Interactive Case: Ruby’s Club assignments WileyPLUS • All of the above and... • E-book • Manager Videos • Vocabulary flash cards • Pre- and post-lecture quizzes • Microsoft Office 2007 lab manual and projects • How-to animations for Microsoft Office • Additional cases CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Threats to Information Security 3.3 Protecting Information Resources What’s in IT for me? ACC FIN MKT OM HRM MIS rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 72 72 Chapter 3 Ethics, Privacy, and Information Security Opening Case NASA Loses Secret Information for Years The Business Problem Over the past decade, U.S. government agencies have been the victims of an unprecedented number of cyber-attacks. One government official noted, “It is espionage on a massive scale.” Government agencies reported almost 13,000 security...

Words: 25389 - Pages: 102

Free Essay

Automation

...Introduction The use of computers to control a particular process in order to increase reliability and efficiency, often through the replacement of employees. For a manufacturer, this could entail using robotic assembly lines to manufacture a product. Automation is the use of control systems (such as numerical control, programmable logic control, and other industrial control systems), in concern with other applications of information technology (such as computer-aided technologies [CAD, CAM], to control industrial machinery and processes, reducing the need for human intervention. In the scope of industrialization, automation is a step beyond mechanization. Whereas mechanization provided human operators with machinery to assist them with the muscular requirements of work, automation greatly reduces the need for human sensory and mental requirements as well. Processes and systems can also be automated. Automation plays an increasingly important role in the global economy and in daily experience. Engineers strive to combine automated devices with mathematical and organizational tools to create complex systems for a rapidly expanding range of applications and human activities. Many roles for humans in industrial processes presently lie beyond the scope of automation. Human-level pattern recognition, language recognition, and language production ability are well beyond the capabilities of modern mechanical and computer systems. Tasks requiring subjective assessment...

Words: 3283 - Pages: 14

Free Essay

Wind Speed Analysis of Cox's Bazar Using Ann

...Title :Wind speed prediction using Artificial Neural Network (ANN) Abstract : The crisis of fossil based fuel around the world has led to the research of Renewable Energy sources. One of the oldest sources of Renewable energy was using the wind to generate electrical or mechanical power using windmills. To use it efficiently the wind speed which determines the wind power must be known beforehand. Wind speed is a random variable depending on meteorological variables like atmospheric pressure,temperature,relative humidity & such. Methods that are currently being applied to predict wind speed are Statistical, Intelligent systems, Time series, Fuzzy logic, neural networks.Our focus will be on using Artificial Neural Network to predict the wind speed in daily basis in this report. Chapter 1 1.1 Introduction Bangladesh has a 724 lm long coastal area where south-westerly tradewind& sea breeze makes the usage of wind as a renewable energy source very visible. But, not much systematic wind study has been made, adequate information on the wind speed over the country and particularly on wind speeds at hub heights of wind machines is not available. A previous study (1986) showed that for the wind monitoring stations of Bangladesh Meteorological Department (BMD) the wind speed is found to be low near the ground level at heights of around 10 meter. Chittagong – Cox’s Bazar seacoast and coastal off-shore islands appeared to have better wind speeds. Measurements...

Words: 4034 - Pages: 17

Free Essay

Seda Pd Solar

...© Copyright 2013, First Solar, Inc. Key Messages • PV power plant is a cost-effective energy resource • Well designed “Grid Friendly” PV plant actively stabilizes grid and enhances its reliability • PV variability can be managed with existing grid infrastructure through forecasting and site diversity with minimum impact © Copyright 2013, First Solar, Inc. 2 First Solar — Utility Scale PV Plant Leader Over 3GW Completed or In Development (10MW AC – 550MW AC Plants) © Copyright 2013, First Solar, Inc. 3 Utility Scale PV Power Plant Overview PV Module Arrays Combiner Boxes 300 to 690V (AC) 1000V (DC) Inverters Transformers Photovoltaic Combining Switchgear Substation 34.5kV (AC) Typical 69 to 525kV (AC) Gen Tie-line Power Grid © Copyright 2013, First Solar, Inc. 4 PV Module PV Module Arrays 1000V (DC) © Copyright 2013, First Solar, Inc. 5 Combiner Box Combiner Boxes • Aggregates DC wiring from multiple strings (80KW-160KW) • Provides single dc output to inverter 1000V (DC) © Copyright 2013, First Solar, Inc. 6 Utility Scale Solar Plant Inverters Inverters • Converts DC power to AC (low voltage) • Grid Management Functions (LVRT, Reactive Power, etc.) 300 to 690V (AC) 1000V (DC) • UL1741 and IEEE1547 compliant © Copyright 2013, First Solar, Inc. 7 Transformer • Increases low AC voltage to medium Transformers 300 to 690V (AC) AC voltage for Collection System 34.5kV (AC)...

Words: 2227 - Pages: 9

Premium Essay

Sdlc

...KFF Network Design NTC/362 – Fundamentals of Networking Tom Krawczyk September 12, 2015 Primer Information technology is an essential part of many businesses today, and this is evident in the ways many companies are increasingly relying on their computers to optimize their businesses. It is also not uncommon for businesses of distinct sizes to utilize multiple computers in their offices, with these computers interconnected through networks to allow information sharing between computers. Computer networking is even more required in businesses with multiple offices, and these locations could sometimes cut across different geographical boundaries. Kudler Fine Foods (KFF) epitomizes such business concerns that optimize its with computer networking. The company, located in San Diego, was founded in June 18, 1998, and it is a local specialty food store with three locations within the USA. However, the organization has evolved since its formation and seems to have outgrown its present network infrastructure. As such, to successfully compete in ever challenging business climate, KFF requires enterprise upgrade, and the goals of proposed network are modern technologies for data collection, information protection, and enterprise communication coupled with optimal data speeds and network access. This upgrade will not only enable transform KFF into a 21st century organization, but it will also enhance its productivity and giving it...

Words: 4257 - Pages: 18

Free Essay

Management Information Systems

...Find more on www.studymaterial.ca ADMS 2511 MIS Notes Ch 1 – Modern Organization in the Global, Web-Based Environment Management information systems (MIS)- deals with the planning of info tech to help people perform tasks related to info processing and management Information technology (IT)- any computer-based tool used with info to support the needs of an org Importance of Planning for IT -a new info system can apply to the whole org, or a specific area of the org Application portfolios- are groups of new system proposals (apps that have to be added/modified) IT Planning -begins with an organizational strategic plan -states  the  firm’s  mission,  goals,  and  steps  to  reach  those  goals -IT architecture describes  the  way  an  org’s  info  resources  should  be  used  to  accomplish  its  mission -includes both technical (hardware operating systems) and managerial aspects (managing the IT dpt, how area managers will be involved) IT strategic plan- LT goals that describe the IT infrastructure and major IT initiatives to achieve the organization’s  goals -it must meet three main objectives: -must  be  aligned  with  the  org’s  strategic  plan -must provide for an IT architecture that networks users, apps, and databases -must efficiently allocate IS resources among different projects so they can all be completed on time, within budget, and function properly IT steering committee- composed of managers/staff who rep diff organizational units -they  establish  IT  priorities...

Words: 24496 - Pages: 98

Free Essay

Blue Print

...Cityworks® Empowering GIS™ for Asset Management, Permitting, Licensing, and more! InPrint Spring 2013 In This Issue: Cityworks GIS-centric Platform Scalability from the Top, Down Cityworks Contracts Module Harnessing Cloud Computing InPrint Empowering GIS TM for Asset Management, Permitting, Licensing, and more! Advisory Board: Brian Haslam, President & CEO Carl Horton, Chief Technology Officer George Mastakas, Vice President of Enterprise Solutions Wayne Hill, Vice President of Client Relations Tom Palizzi, Vice President of Marketing and Sales Brent Wilson, Executive Director of Sales Steve Thomas, Executive Manager, Customer Support Cityworks® Editor’s Page Scalability W InPrint Staff: Editor in Chief: Tom Palizzi Managing Editor: Kaye Ryser Associate Editor: Lindsay Ferguson Copy Editor: Reece Hanzon Graphic Design: Kent Hepworth Graphic Design: Rachel Haslam Advertising: Cindy Curletti Subscription: To subscribe, change your address, or cancel your subscription: inprint@cityworks.com Contact Us: Tel: 801-523-2751 Email: info@cityworks.com Archives available at: www.cityworks.com Azteca Systems Inc. 11075 South State Street, Suite 24 Sandy, UT 84070 801-523-2751 www.cityworks.com e hear the word scalability used extensively to describe today’s technology. For all intents and purposes, it is typically used to illustrate a solution’s ability to accommodate a variety of needs and preferences. Most software starts as a solution to a...

Words: 16329 - Pages: 66

Free Essay

Cybersecurity

...Cybersecurity and U.S.-China Relations 网络安全与美中关系 Kenneth Lieberthal and Peter W. Singer 李侃如,彼得. W. 辛格 Cybersecurity and U.S.-China Relations 网络安全与美中关系 Kenneth Lieberthal and Peter W. Singer 李侃如,彼得. W. 辛格 February 2012 Authors’ Note F or the last year, the John L. Thornton China Center and the 21st Century Defense Initiative at Brookings have convened a working group on cybersecurity and U.S.-China relations, which the two authors organized and co-chaired. The research was motivated by our sense that: 1) the many policy issues involved in cybersecurity, especially in its impact on foreign relations, were already significant and would grow rapidly in importance in the coming years; 2) that such issues, if not well managed, could provide a major source of international friction, especially in U.S.-China relations; and 3) the newness of the field added a particularly complicating factor, making cybersecurity one of the most important but least understood emerging flashpoints in global security. A key aspect of the effort was to convene several dozen knowledgeable Americans from both the private and public sector, including the civilian government, military, corporate, think tank, and university communities. With such dynamic and fast-changing events playing out, the Brookings project not only sought to study the key issues in cybersecurity and how they impact U.S.-China relations, but also to break down some of the organizational and bureaucratic stovepipes that have limited...

Words: 17963 - Pages: 72