Control Systems – Module 2 (Diploma in Electrical
Engineering)
Supervisory Control and Data Acquisition (SCADA) – 15 Hours
1. Introduction & Definition (2 hrs)
Supervisory Control and Data Acquisition (SCADA) refers to a system used for monitoring
and controlling industrial processes from a remote location. It integrates hardware and
software components to ensure automation and reliability of critical infrastructure.
Functions of SCADA Systems:
- Real-time monitoring
- Process control
- Data collection and analysis
- Remote operation and fault detection
Applications include power systems, oil & gas pipelines, water treatment plants, and
manufacturing industries.
2. Human Machine Interface (HMI) (2 hrs)
The Human Machine Interface (HMI) is the graphical interface through which operators
interact with the SCADA system.
Key Features of HMI:
- Process visualization (graphs, gauges, alarms)
- Command input (start/stop, adjust values)
- Alarm management (colors, priority levels)
3. Data Acquisition (3 hrs)
Data acquisition is the process of collecting real-time process data from sensors and
instruments.
Key Components:
- Sensors and transducers
- Signal conditioning (A/D and D/A conversion)
- Remote Terminal Units (RTUs) and Programmable Logic Controllers (PLCs)
Communication protocols include Modbus, Profibus, DNP3, and OPC-UA.
4. Sequence Control (3 hrs)
Sequence control refers to the step-by-step execution of predefined control actions. It is
critical in ensuring safe and efficient operation of automated systems.
Applications include batch processing, conveyor belt systems, and power switching.
5. Data Storage and Activity (2.5 hrs)
SCADA systems provide data logging for performance analysis and maintenance.
Historical data is stored in relational or historian databases.
Uses of stored data include predictive maintenance and compliance reporting.
6. Security (Access Control) (2.5 hrs)
Security is essential as SCADA systems often control critical infrastructure. Cybersecurity
threats include malware and unauthorized access.
Mitigation strategies include:
- User authentication and role-based access
- Network firewalls and VPNs
- Encryption and intrusion detection
- Regular security audits
Suggested Teaching Methods
- Lectures with case studies (power plants, water systems)
- Practical demos using HMI and SCADA software
- Group assignments (designing SCADA diagrams)
- Assessments (tests, lab work, reports)