A distribution management system ( DMS ) is a collection of applications designed to monitor and control the electric power distribution networks efficiently and reliably. It acts as a decision support system to assist the control room and field operating personnel with the monitoring and control of the electric distribution system. Improving the reliability and quality of service in terms of reducing power outages , minimizing outage time, maintaining acceptable frequency and voltage levels are the key deliverables of a DMS. Given the complexity of distribution grids, such systems may involve communication and coordination across multiple components. For example, the control of active loads may require a complex chain of communication through different components as described in US patent 11747849B2
80-416: FMSR may refer to Distribution Management System#Fault Management & System Restoration (FMSR) Federated Malay States Railways Morombe Airport , ICAO code FMSR Topics referred to by the same term [REDACTED] This disambiguation page lists articles associated with the title FMSR . If an internal link led you here, you may wish to change
160-567: A tag database , which contains data elements called tags or points , which relate to specific instrumentation or actuators within the process system. Data is accumulated against these unique process control equipment tag references. A SCADA system usually consists of the following main elements: An important part of most SCADA implementations is alarm handling . The system monitors whether certain alarm conditions are satisfied, to determine when an alarm event has occurred. Once an alarm event has been detected, one or more actions are taken (such as
240-482: A LAN. Information was shared in near real time. Each station was responsible for a particular task, which reduced the cost as compared to First Generation SCADA. The network protocols used were still not standardized. Since these protocols were proprietary, very few people beyond the developers knew enough to determine how secure a SCADA installation was. Security of the SCADA installation was usually overlooked. Similar to
320-455: A SCADA device by sending commands over a network. In many cases SCADA users have assumed that having a VPN offered sufficient protection, unaware that security can be trivially bypassed with physical access to SCADA-related network jacks and switches. Industrial control vendors suggest approaching SCADA security like Information Security with a defense in depth strategy that leverages common IT practices. Apart from that, research has shown that
400-543: A compliant utility inter-application infrastructure be defined using Unified Modelling Language (UML). UML includes a set of graphic notation techniques that can be used to create visual models of object-oriented software-intensive systems. The IEC 61968 series of standards extend the Common Information Model (CIM), which is currently maintained as a UML model, to meet the needs of electrical distribution. For structured document interchange particularly on
480-482: A contractor installed a SCADA system in January 2000, system components began to function erratically. Pumps did not run when needed and alarms were not reported. More critically, sewage flooded a nearby park and contaminated an open surface-water drainage ditch and flowed 500 meters to a tidal canal. The SCADA system was directing sewage valves to open when the design protocol should have kept them closed. Initially this
560-419: A distributed architecture, any complex SCADA can be reduced to the simplest components and connected through communication protocols. In the case of a networked design, the system may be spread across more than one LAN network called a process control network (PCN) and separated geographically. Several distributed architecture SCADAs running in parallel, with a single supervisor and historian, could be considered
640-447: A modern SCADA system. One is the threat of unauthorized access to the control software, whether it is human access or changes induced intentionally or accidentally by virus infections and other software threats residing on the control host machine. Another is the threat of packet access to the network segments hosting SCADA devices. In many cases, the control protocol lacks any form of cryptographic security , allowing an attacker to control
720-417: A network and adjusted to raise or lower voltage as is necessary. Capacitor banks manage voltage by “generating” reactive power, and have thus far been the primary tools through which true Volt/VAR control is carried out. These large capacitors are connected to the grid in shunt configuration through switches which, when closed, allow the capacitors to generate VARs and boost voltage at the point of connection. In
800-460: A network architecture. This allows for a more cost-effective solution in very large scale systems. The growth of the internet has led SCADA systems to implement web technologies allowing users to view data, exchange information and control processes from anywhere in the world through web SOCKET connection. The early 2000s saw the proliferation of Web SCADA systems. Web SCADA systems use internet browsers such as Google Chrome and Mozilla Firefox as
880-568: A power system for specified load and generator real power and voltage conditions. Once this information is known, real and reactive power flow on each branch as well as generator reactive power output can be analytically determined. Due to the nonlinear nature of this problem, numerical methods are employed to obtain a solution that is within an acceptable tolerance. The load model needs to automatically calculate loads to match telemeter or forecasted feeder currents. It utilises customer type, load profiles and other information to properly distribute
SECTION 10
#1732779612659960-473: A screen (that might act in a similar way to the "fuel tank empty" light in a car); in each case, the role of the alarm indicator is to draw the operator's attention to the part of the system 'in alarm' so that appropriate action can be taken. "Smart" RTUs, or standard PLCs, are capable of autonomously executing simple logic processes without involving the supervisory computer. They employ standardized control programming languages (such as those under IEC 61131-3 ,
1040-471: A section of network before work is carried out, and the DMS validates these schedules using its network model. Switching schedules can combine telecontrolled and manual (on-site) switching operations. When the required section has been made safe, the DMS allows a Permit To Work (PTW) document to be issued. After its cancellation when the work has been finished, the switching schedule then facilitates restoration of
1120-778: A single console at the control centre in an integrated manner. Their development varied across different geographic territories. In the US, for example, DMSs typically grew by taking Outage Management Systems to the next level, automating the complete sequences and providing an end to end, integrated view of the entire distribution spectrum. In the UK, by contrast, the much denser and more meshed network topologies, combined with stronger Health & Safety regulation, had led to early centralisation of high-voltage switching operations, initially using paper records and schematic diagrams printed onto large wallboards which were 'dressed' with magnetic symbols to show
1200-511: A standard attack type leveraging access to the Tomcat Embedded Web server . Security researcher Jerry Brown submitted a similar advisory regarding a buffer overflow vulnerability in a Wonderware InBatchClient ActiveX control . Both vendors made updates available prior to public vulnerability release. Mitigation recommendations were standard patching practices and requiring VPN access for secure connectivity. Consequently,
1280-422: A suite of five programming languages including function block, ladder, structured text, sequence function charts and instruction list), that are frequently used to create programs which run on these RTUs and PLCs. Unlike a procedural language like C or FORTRAN , IEC 61131-3 has minimal training requirements by virtue of resembling historic physical control arrays. This allows SCADA system engineers to perform both
1360-532: A typical power system, the State is quasi-static. The time constants are sufficiently fast so that system dynamics decay away quickly (with respect to measurement frequency). The system appears to be progressing through a sequence of static states that are driven by various parameters like changes in load profile. The inputs of the state estimator can be given to various applications like Load Flow Analysis , Contingency Analysis, and other applications. Load flow study
1440-409: A vital role in emergency operation and control in any utility. An automated Load Shedding Application detects predetermined trigger conditions in the distribution network and performs predefined sets of control actions, such as opening or closing non-critical feeders, reconfiguring downstream distribution or sources of injections, or performing a tap control at a transformer. When a distribution network
1520-465: A voltage drop. VVC encompasses devices that purposely inject reactive power into the grid to alter the size of that voltage drop, in addition to equipment that more directly controls voltage. In the legacy grid, there are three primary tools for carrying out voltage management: Load Tap Changers (LTCs), voltage regulators, and capacitor banks. LTCs and voltage regulators refer to transformers with variable turns ratios that are placed at strategic points in
1600-445: A working group, WG4. WG4 "deals specifically with unique technical requirements, measurements, and other features required to evaluate and assure security resilience and performance of industrial automation and control systems devices". The increased interest in SCADA vulnerabilities has resulted in vulnerability researchers discovering vulnerabilities in commercial SCADA software and more general offensive SCADA techniques presented to
1680-455: Is a control system architecture comprising computers , networked data communications and graphical user interfaces for high-level supervision of machines and processes. It also covers sensors and other devices, such as programmable logic controllers , which interface with process plant or machinery. The operator interfaces which enable monitoring and the issuing of process commands, such as controller setpoint changes, are handled through
SECTION 20
#17327796126591760-429: Is a digital status point that has either the value NORMAL or ALARM that is calculated by a formula based on the values in other analogue and digital points—or implicit: the SCADA system might automatically monitor whether the value in an analogue point lies outside high and low- limit values associated with that point. Examples of alarm indicators include a siren, a pop-up box on a screen, or a coloured or flashing area on
1840-802: Is a standard being developed by the Working Group 14 of Technical Committee 57 of the IEC and defines standards for information exchanges between electrical distribution system applications. It is intended to support the inter-application integration of a utility enterprise that needs to collect data from different applications which could be new or legacy. As per IEC 61968, a DMS encapsulates various capabilities like monitoring and control of equipment for power delivery, management processes to ensure system reliability, voltage management, demand-side management, outage management, work management, automated mapping and facilities management. The crux of IEC 61968 standards
1920-474: Is also frequently used for large systems such as railways and power stations. The remote management or monitoring function of a SCADA system is often referred to as telemetry . Some users want SCADA data to travel over their pre-established corporate networks or to share the network with other applications. The legacy of the early low-bandwidth protocols remains, though. SCADA protocols are designed to be very compact. Many are designed to send information only when
2000-417: Is also used for loss minimization . Due to several network and operational constraints utility network may be operated to its maximum capability without knowing its consequences of losses occurring. The overall energy losses and revenue losses due to these operations shall be minimized for effective operation. The DMS application utilizes switching management application for this, the losses minimization problem
2080-409: Is an important tool involving numerical analysis applied to a power system. The load flow study usually uses simplified notations like a single-line diagram and focuses on various forms of AC power rather than voltage and current. It analyzes the power systems in normal steady-state operation. The goal of a power flow study is to obtain complete voltage angle and magnitude information for each bus in
2160-432: Is classified in terms of different planning durations: short-term load forecasting or STLF (up to 1 day, medium-term load forecasting or MTLF (1 day to 1 year), and long-term load forecasting or LTLF (1–10 years). To forecast load precisely throughout a year, various external factors including weathers, solar radiation , population, per capita gross domestic product seasons and holidays need to be considered. For example, in
2240-663: Is compiled here. An example of efforts by vendor groups to standardize automation protocols is the OPC-UA (formerly "OLE for process control" now Open Platform Communications Unified Architecture ). SCADA systems have evolved through four generations as follows: Early SCADA system computing was done by large minicomputers . Common network services did not exist at the time SCADA was developed. Thus SCADA systems were independent systems with no connectivity to other systems. The communication protocols used were strictly proprietary at that time. The first-generation SCADA system redundancy
2320-703: Is complex and covers a larger area, emergency actions taken downstream may reduce burden on upstream portions of the network. In a non-automated system, awareness and manual operator intervention play a key role in trouble mitigation. If the troubles are not addressed quickly enough, they can cascade exponentially and cause major catastrophic failure. DMS needs to provide a modular automated load shedding & restoration application which automates emergency operation & control requirements for any utility. The application should cover various activities like Under Frequency Load Shedding (UFLS), limit violation and time of day based load shedding schemes which are usually performed by
2400-544: Is derived from the method previously used to maintain the wallboard diagrams. The state estimator is an integral part of the overall monitoring and control systems for transmission networks. It is mainly aimed at providing a reliable estimate of the system voltages. This information from the state estimator flows to control centers and database servers across the network. The variables of interest are indicative of parameters like margins to operating limits, health of equipment and required operator action. State estimators allow
2480-528: Is solved by the optimal power flow algorithm and switching plans are created similar to above function Distribution Load Forecasting (DLF) provides a structured interface for creating, managing and analyzing load forecasts. Accurate models for electric power load forecasting are essential to the operation and planning of a utility company . DLF helps an electric utility to make important decisions including decisions on purchasing electric power, load switching, as well as infrastructure development. Load forecasting
FMSR - Misplaced Pages Continue
2560-627: Is the Interface Reference Model (IRM) that defines various standard interfaces for each class of applications. Abstract (Logical) components are listed to represent concrete (physical) applications. For example, a business function like Network Operation (NO) could be represented by various business sub-functions like Network Operation Monitoring (NMON), which in turn will be represented by abstract components like Substation state supervision, Network state supervision, and Alarm supervision. IEC 61968 recommends that system interfaces of
2640-639: The Internet, the data format used can be the Extensible Markup Language (XML). One of its primary uses is information exchange between different and potentially incompatible computer systems. XML is thus well-suited to the domain of system interfaces for distribution management. It formats the message payloads so as to load the same to various messaging transports like SOAP ( Simple Object Access Protocol ), etc. SCADA SCADA (an acronym for supervisory control and data acquisition )
2720-741: The Nation’s critical infrastructures represent a systemic threat to their continued operation following an EMP event. Additionally, the necessity to reboot, repair, or replace large numbers of geographically widely dispersed systems will considerably impede the Nation’s recovery from such an assault." Many vendors of SCADA and control products have begun to address the risks posed by unauthorized access by developing lines of specialized industrial firewall and VPN solutions for TCP/IP-based SCADA networks as well as external SCADA monitoring and recording equipment. The International Society of Automation (ISA) started formalizing SCADA security requirements in 2007 with
2800-575: The SCADA computer system. The subordinated operations, e.g. the real-time control logic or controller calculations, are performed by networked modules connected to the field sensors and actuators . The SCADA concept was developed to be a universal means of remote-access to a variety of local control modules, which could be from different manufacturers and allowing access through standard automation protocols . In practice, large SCADA systems have grown to become similar to distributed control systems in function, while using multiple means of interfacing with
2880-461: The SCADA master in lieu of a traditional RTU. Since about 1998, virtually all major PLC manufacturers have offered integrated HMI/SCADA systems, many of them using open and non-proprietary communications protocols. Numerous specialized third-party HMI/SCADA packages, offering built-in compatibility with most major PLCs, have also entered the market, allowing mechanical engineers, electrical engineers and technicians to configure HMIs themselves, without
2960-417: The SCADA system and processes the same for identification of faults and on running switching management application; the results are converted to action plans by the applications. The action plan includes switching ON/OFF the automatic load break switches / RMUs/Sectionalizer . The action plan can be verified in study mode provided by the functionality . The switching management can be manual/automatic based on
3040-478: The SCADA to readings and equipment status reports that are communicated to level 2 SCADA as required. Data is then compiled and formatted in such a way that a control room operator using the human-machine interface (HMI) can make supervisory decisions to adjust or override normal RTU (PLC) controls. Data may also be fed to a historian , often built on a commodity database management system , to allow trending and other analytical auditing. SCADA systems typically use
3120-691: The UK, therefore, the network component/connectivity models were usually developed in the DMS first, whereas in the USA these were generally built in the GIS. The typical data flow in a DMS has the SCADA system, the Information Storage & Retrieval (ISR) system, Communication (COM) Servers, Front-End Processors (FEPs) & Field Remote Terminal Units (FRTUs). In order to support proper decision making and O&M activities, DMS solutions should support
3200-467: The US), there is increasing use of satellite-based communication. This has the key advantages that the infrastructure can be self-contained (not using circuits from the public telephone system), can have built-in encryption, and can be engineered to the availability and reliability required by the SCADA system operator. Earlier experiences using consumer-grade VSAT were poor. Modern carrier-class systems provide
3280-418: The activation of one or more alarm indicators, and perhaps the generation of email or text messages so that management or remote SCADA operators are informed). In many cases, a SCADA operator may have to acknowledge the alarm event; this may deactivate some alarm indicators, whereas other indicators remain active until the alarm conditions are cleared. Alarm conditions can be explicit—for example, an alarm point
FMSR - Misplaced Pages Continue
3360-746: The architecture of SCADA systems has several other vulnerabilities, including direct tampering with RTUs, communication links from RTUs to the control center, and IT software and databases in the control center. The RTUs could, for instance, be targets of deception attacks injecting false data or denial-of-service attacks . The reliable function of SCADA systems in our modern infrastructure may be crucial to public health and safety. As such, attacks on these systems may directly or indirectly threaten public health and safety. Such an attack has already occurred, carried out on Maroochy Shire Council's sewage control system in Queensland , Australia . Shortly after
3440-491: The basis of modern society. The security of these SCADA systems is important because compromise or destruction of these systems would impact multiple areas of society far removed from the original compromise. For example, a blackout caused by a compromised electrical SCADA system would cause financial losses to all the customers that received electricity from that source. How security will affect legacy SCADA and new deployments remains to be seen. There are many threat vectors to
3520-415: The calculation of these variables of interest with high confidence despite the facts that the measurements may be corrupted by noise, or could be missing or inaccurate. Even though we may not be able to directly observe the state, it can be inferred from a scan of measurements which are assumed to be synchronized. The algorithms need to allow for the fact that presence of noise might skew the measurements. In
3600-447: The capability to produce repeatable and accurate forecasts. In any integrated energy delivery utility operation model, there are different functional modules like GIS, Billing & metering solution, ERP, Asset management system that are operating in parallel and supports routine operations. Quite often, each of these functional modules need to exchange periodic or real time data with each other for assessing present operation condition of
3680-450: The configuration. Load balancing via feeder reconfiguration is an essential application for utilities where they have multiple feeders feeding a load congested area. To balance the loads on a network, the operator re-routes the loads to other parts of the network. A Feeder Load Management (FLM) is necessary to allow you to manage energy delivery in the electric distribution system and identify problem areas. A Feeder Load Management monitors
3760-419: The current running states. There, DMSs grew initially from SCADA systems as these were expanded to allow these centralised control and safety management procedures to be managed electronically. These DMSs required even more detailed component/connectivity models and schematics than those needed by early OMSs as every possible isolation and earthing point on the networks had to be included. In territories such as
3840-536: The design and implementation of a program to be executed on an RTU or PLC. A programmable automation controller (PAC) is a compact controller that combines the features and capabilities of a PC-based control system with that of a typical PLC. PACs are deployed in SCADA systems to provide RTU and PLC functions. In many electrical substation SCADA applications, "distributed RTUs" use information processors or station computers to communicate with digital protective relays , PACs, and other devices for I/O, and communicate with
3920-676: The distribution system. By combining the locations of outage calls from customers with knowledge of the locations of the protection devices (such as circuit breakers) on the network, a rule engine is used to predict the locations of outages. Based on this, restoration activities are charted out and the crew is dispatched for the same. In parallel with this, distribution utilities began to roll out Supervisory Control and Data Acquisition (SCADA) systems, initially only at their higher voltage substations. Over time, use of SCADA has progressively extended downwards to sites at lower voltage levels. DMSs access real-time data and provide all information on
4000-479: The exact operational requirement. Network connectivity analysis is an operator specific functionality which helps the operator to identify or locate the preferred network or component very easily. NCA does the required analyses and provides display of the feed point of various network loads. Based on the status of all the switching devices such as circuit breaker (CB), Ring Main Unit (RMU) and/or isolators that affect
4080-422: The first detection of malware that attacks SCADA systems (Siemens' WinCC /PCS 7 systems) running on Windows operating systems. The malware is called Stuxnet and uses four zero-day attacks to install a rootkit which in turn logs into the SCADA's database and steals design and control files. The malware is also capable of changing the control system and hiding those changes. The malware was found on 14 systems,
SECTION 50
#17327796126594160-408: The following functions: The various sub functions of the same, carried out by the DMS are listed below:- Distribution network usually covers over a large area and catering power to different customers at different voltage levels. So locating required sources and loads on a larger GIS/Operator interface is often very difficult. Panning & zooming provided with normal SCADA system GUI does not cover
4240-404: The future, further VVC might be carried out by smart inverters and other distributed generation resources, which can also inject reactive power into a distribution network. A VVC application helps the operator mitigate dangerously low or high voltage conditions by suggesting required action plans for all VVC equipment. The plan will give a required tap position and capacitor switching state to ensure
4320-422: The general security community. In electric and gas utility SCADA systems, the vulnerability of the large installed base of wired and wireless serial communications links is addressed in some cases by applying bump-in-the-wire devices that employ authentication and Advanced Encryption Standard encryption rather than replacing all existing nodes. In June 2010, anti-virus security company VirusBlokAda reported
4400-597: The graphical user interface (GUI) for the operators HMI. This simplifies the client side installation and enables users to access the system from various platforms with web browsers such as servers, personal computers, laptops, tablets and mobile phones. SCADA systems that tie together decentralized facilities such as power, oil, gas pipelines, water distribution and wastewater collection systems were designed to be open, robust, and easily operated and repaired, but not necessarily secure. The move from proprietary technologies to more standardized and open solutions together with
4480-409: The growing changes and additions which would result in making system integrations non- functional. Hence utilities cannot make use of the complete benefit of functional modules and in some cases; the systems may even need to be migrated to suitable environments with very high costs. As these problems came to light, various standardization processes for inter application data exchanges were initiated. It
4560-540: The increased number of connections between SCADA systems, office networks and the Internet has made them more vulnerable to types of network attacks that are relatively common in computer security . For example, United States Computer Emergency Readiness Team (US-CERT) released a vulnerability advisory warning that unauthenticated users could download sensitive configuration information including password hashes from an Inductive Automation Ignition system utilizing
4640-822: The link to point directly to the intended article. Retrieved from " https://en.wikipedia.org/w/index.php?title=FMSR&oldid=932827199 " Category : Disambiguation pages Hidden categories: Short description is different from Wikidata All article disambiguation pages All disambiguation pages Distribution Management System#Fault Management ⁘ System Restoration (FMSR) In recent years, utilization of electrical energy increased exponentially and customer requirement and quality definitions of power were changed enormously. As electric energy became an essential part of daily life, its optimal usage and reliability became important. Real-time network view and dynamic decisions have become instrumental for optimizing resources and managing demands, leading to
4720-500: The load to each individual distribution transformer. Load-flow or Power flow studies are important for planning future expansion of power systems as well as in determining the best operation of existing systems. Volt-VAR Control or VVC refers to the process of managing voltage levels and reactive power (VAR) throughout the power distribution systems. These two quantities are related, because as reactive power flows over an inductive line (and all lines have some inductance) that line sees
4800-688: The majority of which were located in Iran. In October 2013 National Geographic released a docudrama titled American Blackout which dealt with an imagined large-scale cyber attack on SCADA and the United States' electrical grid. Both large and small systems can be built using the SCADA concept. These systems can range from just tens to thousands of control loops , depending on the application. Example processes include industrial, infrastructure, and facility-based processes, as described below: However, SCADA systems may have security vulnerabilities, so
4880-588: The master station polls the RTU. Typical legacy SCADA protocols include Modbus RTU, RP-570 , Profibus and Conitel. These communication protocols, with the exception of Modbus (Modbus has been made open by Schneider Electric), are all SCADA-vendor specific but are widely adopted and used. Standard protocols are IEC 60870-5-101 or 104 , IEC 61850 and DNP3 . These communication protocols are standardized and recognized by all major SCADA vendors. Many of these protocols now contain extensions to operate over TCP/IP . Although
SECTION 60
#17327796126594960-420: The most popular STLF were stochastic time series models like Autoregressive (AR) model , Autoregressive moving average model (ARMA), Autoregressive integrated moving average (ARIMA) model and other models using fuzzy logic and Neural Networks. DLF provides data aggregation and forecasting capabilities that is configured to address today's requirements and adapt to address future requirements and should have
5040-430: The need for a custom-made program written by a software programmer. The Remote Terminal Unit (RTU) connects to physical equipment. Typically, an RTU converts the electrical signals from the equipment to digital values. By converting and sending these electrical signals out to equipment the RTU can control equipment. SCADA systems have traditionally used combinations of radio and direct wired connections, although SONET/SDH
5120-440: The need for distribution management systems in large-scale electrical networks. Most distribution utilities have been comprehensively using IT solutions through their Outage Management System (OMS) that makes use of other systems like Customer Information System (CIS), Geographical Information System (GIS) and Interactive Voice Response System (IVRS). An outage management system has a network component/connectivity model of
5200-483: The network, workflows and resources (like crew, assets, etc.). Unlike other power system segments, distribution system changes or grows every day, and this could be due to the addition of a new consumer, a new transmission line or replacement of equipment. If the different functional modules are operating in a non-standard environment and uses custom APIs and database interfaces, the engineering effort for managing shall become too large. Soon it will become difficult to manage
5280-423: The normal running arrangements. Switching components can also be tagged to reflect any Operational Restrictions that are in force. The network component/connectivity model, and associated diagrams, must always be kept absolutely up to date. The switching schedule facility therefore also allows 'patches' to the network model to be applied to the live version at the appropriate stage(s) of the jobs. The term 'patch'
5360-435: The operator. Reliability and quality of power supply are key parameters which need to be ensured by any utility. Reduced outage time duration to customer, shall improve over all utility reliability indices hence FMSR or automated switching applications plays an important role. The two main features required by a FMSR are: Switching management & Suggested switching plan The DMS application receives faults information from
5440-435: The plant. They can control large-scale processes that can span multiple sites, and work over large distances. It is one of the most commonly-used types of industrial control systems . The key attribute of a SCADA system is its ability to perform a supervisory operation over a variety of other proprietary devices. Level 1 contains the programmable logic controllers (PLCs) or remote terminal units (RTUs). Level 2 contains
5520-414: The quality of service required for SCADA. RTUs and other automatic controller devices were developed before the advent of industry wide standards for interoperability. The result is that developers and their management created a multitude of control protocols. Among the larger vendors, there was also the incentive to create their own protocol to "lock in" their customer base. A list of automation protocols
5600-413: The security of some SCADA-based systems has come into question as they are seen as potentially vulnerable to cyber attacks . In particular, security researchers are concerned about: SCADA systems are used to control and monitor physical processes, examples of which are transmission of electricity, transportation of gas and oil in pipelines, water distribution, traffic lights, and other systems used as
5680-547: The system. In April 2008, the Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP) Attack issued a Critical Infrastructures Report which discussed the extreme vulnerability of SCADA systems to an electromagnetic pulse (EMP) event. After testing and analysis, the Commission concluded: "SCADA systems are vulnerable to EMP insult. The large numbers and widespread reliance on such systems by all of
5760-429: The topology of the network modeled, the prevailing network topology is determined. The NCA further assists the operator to know operating state of the distribution network indicating radial mode, loops and parallels in the network. In territories such as the UK a core function of a DMS has always been to support safe switching and work on the networks. Control engineers prepare switching schedules to isolate and make safe
5840-604: The total current. An ideal power system needs to control current flow by carefully planning the production, absorption and flow of reactive power at all levels in the system. Electric Distribution Systems have long stretches of transmission line , multiple injection points and fluctuating consumer demand. These features are inherently vulnerable to instabilities or unpredicted system conditions that may lead to critical failure. Instability usually arises from power system oscillations due to faults, peak deficit or protection failures. Distribution load shedding and restoration schemes play
5920-447: The use of conventional networking specifications, such as TCP/IP , blurs the line between traditional and industrial networking, they each fulfill fundamentally differing requirements. Network simulation can be used in conjunction with SCADA simulators to perform various 'what-if' analyses. With increasing security demands (such as North American Electric Reliability Corporation (NERC) and critical infrastructure protection (CIP) in
6000-405: The vital signs of the distribution system and identifies areas of concern so that the distribution operator is forewarned and can efficiently focus attention where it is most needed. It allows for more rapid correction of existing problems and enables possibilities for problem avoidance, leading to both improved reliability and energy delivery performance. On a similar note, Feeder Reconfiguration
6080-659: The voltage stays close to its nominal value and thus optimize Volt-VAR control function for the utility. Beyond maintaining a stable voltage profile, VVC has potential benefits for the ampacity (current-carrying capacity) of power lines. There could be loads that contain reactive components like capacitors and inductors (such as electric motors ) that strain the grid. This is because the reactive portion of these loads causes them to draw more current than an otherwise comparable, purely resistive load would draw. The extra current can result in heating up of equipment like transformers, conductors, etc. which might then need resizing to carry
6160-668: The winter season, average wind chill factor could be added as an explanatory variable in addition to those used in the summer model. In transitional seasons such as spring and fall, the transformation technique can be used. For holidays, a holiday effect load can be deducted from the normal load to estimate the actual holiday load better. Various predictive models have been developed for load forecasting based on various techniques like multiple regression , exponential smoothing , iterative reweighted least-squares, adaptive load forecasting, stochastic time series, fuzzy logic , neural networks and knowledge based expert systems . Amongst these,
6240-536: Was achieved using a back-up mainframe system connected to all the Remote Terminal Unit sites and was used in the event of failure of the primary mainframe system. Some first generation SCADA systems were developed as "turn key" operations that ran on minicomputers such as the PDP-11 series. SCADA information and command processing were distributed across multiple stations which were connected through
6320-418: Was believed to be a system bug. Monitoring of the system logs revealed the malfunctions were the result of cyber attacks. Investigators reported 46 separate instances of malicious outside interference before the culprit was identified. The attacks were made by a disgruntled ex-employee of the company that had installed the SCADA system. The ex-employee was hoping to be hired by the utility full-time to maintain
6400-454: Was understood that a standard based integration shall ease the integration with other functional modules and that it also improves the operational performance. It ensures that the utility can be in a vendor neutral environment for future expansions, which in turn means that the utility can easily add new functional modules on top of existing functionality and easily push or pull the data effectively without having new interface adapters. IEC 61968
#658341