Functions of SCADA: 1. Data Acquisition
Functions of SCADA: 1. Data Acquisition
Functions of SCADA
1. Data Acquisition
❖ In SCADA systems, MTU performs the periodic acquisition
of data from RTUs. As discussed above that the RTU can
respond in either a request form the MTU or continuously
transferring the data when changes of state of a parameter
takes place or when limits of the parameter exceeded, even
without a request from the MTU.
❖ The data acquisition process includes internal scanning of
RTU internal database, periodic RTU polling by MTU,
transmission of data by RTU to MTU, scaling of data into
engineering units and updating a previous value or state in
the database.
3. Supervisory Control
❖ It is the process of controlling the equipment operations from
remote locations. In SCADA systems, the MTU in the master
station sends the control instructions such as set points and
discrete control commands to the RTU at remote station. At
the remote stations, RTU receives the commands and
accordingly controls the appropriate actuator.
❖ The supervisory control includes selection of the remote
station, choosing the device to be controlled and executing
the desired command such as close or trip. Most of the
systems employ check-before-operate method for correct
selection and operation of the equipment in the remote
place.
4. Trending
❖ All SCADA products provide trending facilities which display
the gathered (real-time) or saved (historian) data on various
charts. The parameters to be trended on a specific chart can
be defined online or it can be predefined.
❖ These charts are able to display one or more parameter
using one or more plots. It provides the automatic scrolling of
data with enhanced zoom features. Historian trending is
possible with archived databases.
Page |3
5. Alarm Processing
❖ It involves in alerting the operator to unscheduled events by
informing place of occurrence, time of occurrence, device ID
and nature of the event.
❖ Alarms are logically programmed on the master control
station by comparing the received data with appropriate
limits. It is possible to handle alarms on multiple priority
level. Alarms can be suppressed either by individual or as a
complete group.