The evolution of M2M continues at a rapid pace; in fact, another option now available to businesses is the implementation of SCADA (supervisory control and data acquisition) systems that have made it possible for machines and devices to be connected. It might seem that there are no differences between M2M and SCADA, so some might wonder if M2M is just SCADA under a different name. According to a Novotech post, they are similar under many aspects, but M2M is applied and used in a larger variety of industries.
As explained in a Control Global post, SCADA is a system that monitors and controls industrial-, infrastructure-, or facility-based processes. It uses human–machine interface (HMI) and open and non-proprietary communications protocols; a technology that allows clients to access data from two field devices/subsystems, remote terminal units (RTUs) and programmable logic controllers (PLCs) that connect to sensors and convert sensor signals to digital data. Servers and software are responsible for communicating with the field equipment (RTUs or PLCs) to display info to remote stations; thus, allowing individual operator workstations to obtain detailed schematics for a particular sensor or machine.
SCADA products are easy to use and run on multiple device platforms to perform a wide range of data collection services; in recent times, the technology has undergone developments, involving continued advancements, for monitoring and managing distributed equipment and facilities. SCADA technology appears to have bright future ahead as it is able to give users a unique perspective and insight into new data visualization possibilities with emerging technologies. “Because of its immeasurable benefits, many organizations now have their own SCADA systems in place,” explains The Modern Leader, the official blog of IQPC Asia, which listed The Seven Golden Rules for a successful SCADA implementation and operations; here they are:
Golden Rule #1: Choose your system wisely when purchasing a SCADA system. It is key to know which provider to opt for that has a legacy, historical reputation and peer preference; it is important to go with a provider that can meet sector-specific needs—i.e., is best aligned to the requirements of an organization.
Golden Rule#2: Get network integration right and make sure that it is carried out efficiently and with contingency planning in mind.
Golden Rule #3: Prepare for environmental hazards; extreme weather conditions take a toll on the durability of SCADA equipment, such as RTUs, and that could jeopardize its performance.
Golden Rule #4: Plan for replacement of obsolete units; this is necessary to prevent loss of money and time when having the need to improve usability, maximize flexibility and provide for future expansion.
Golden Rule #5: Keep security threats at bay and ensure SCADA systems are up to the task by continuously auditing to make sure that security threats are always in check.
Golden Rule #6: Assess vulnerability regularly to mitigate a SCADA system being susceptible to an attack. Assessments can be made to reduce the causes of vulnerability also through threat simulation.
Golden Rule #7: Ensure interoperability without sacrificing security. Because of the importance to find a solution that allows different systems and various devices to operate together, often open protocols are used. This might make the system susceptible to threats that cybercrime poses. Therefore, it is paramount to find a balance between the need for flexibility and proper security.
Further details of each of the seven golden rules, which came part of the SCADA Asia 2013 event, can be found at the IQPC site, a source that provides business executives around the world with tailored practical conferences and large-scale events. The conventions bring together top industry thought leaders and expert speakers from Power & Electricity, Water, Gas, Railways and Oil & Gas Sectors.
Edited by
Maurice Nagle