Selecting the right SCADA technology


Mobile clients

Figure 2: Smartphones, tablets, and other handheld devices offer remote access from virtually any location, empowering the mobile worker. Courtesy: AutomationDirect Inc.Mobile clients take the Web-based thin client concept to another level by providing access to the SCADA system via handheld devices such as smartphones and tablets (see Figure 2). Not only does this promote exceptional mobility, it can also lower both communications and hardware costs. Advantages of mobile clients include:

  • User is not tied to a fixed location
  • Lowest hardware costs
  • Lower communication costs than Web-based thin clients
  • Users can use personal devices
  • Apps allow quick connection and two-way access.

Communication costs are lower because many cell network providers charge less than Internet providers. Cell providers are able to provide inexpensive data access because this type of traffic doesn’t have the real-time requirements of voice calls, making it possible for providers to use data traffic as a fill-in to wring the most out of their network capacity. 

Hardware costs are lower because smartphones and tablets are less expensive than PCs and embedded computing platforms. Some companies are reducing costs further by implementing bring-your-own-device policies, which require employees to use their personal cell phones and tablets for SCADA remote access and other tasks. In most cases, employees already have these devices, and companies pay employees a fixed amount, typically amounting to a portion of their monthly provider fees. 

Access options can be configured to provide users with read-only access to certain or all tag values and alarm conditions, or remote control options may be offered. Remote access to SCADA systems by mobile devices is typically achieved via a Web browser or an app. There is a debate over which method provides better access, but in both cases, screen images must be optimized for the smaller screens as compared to PCs and embedded computing platforms. 

Incorrectly sized screens for smartphones and small tablets can make remote access unwieldy. Loading graphics can slow down data retrieval to the point that the application times out before the user sees the data, and excessive scrolling is often required to view content designed for a larger screen. Correctly sizing the screens alleviates this issue, and a well-designed app can provide further benefits along these and other lines. 

Browsers or apps?

If remote users are going to be accessing many screens or graphics, an app is often a better choice than browser-based access in terms of speed and usability. Apps are designed specifically for smartphones and other handheld devices, so screens are generally sized correctly, eliminating the need for excessive scrolling and long retrieval times. 

Many HMI/SCADA software packages provide a mobile phone app for free or for a very nominal charge. As with thin client and mobile browser access, remote users benefit from full-featured two-way communication. As compared to a browser, these SCADA apps connect and load screens faster to deliver more rapid response times. While many of these apps don’t require users to do screen conversions, there is a small level of effort required for setup, typically similar to what a user would execute when loading an app for his or her cell phone. 

Whether implementing browser or app access, it’s important to select the right SCADA development package. Because the programming languages used for Apple products are different from those used for Android-based and other tablets and smartphones, less innovative SCADA suppliers must write apps and browser-based applications separately for each operating system type. This means users often have to wait months for their smartphone or tablet application to be developed or upgraded. 

However, this problem is easily overcome by choosing the right SCADA package, specifically from a supplier that programs its remote access applications in HTML5. This latest version of HTML works on an open standard that enables the development of Web applications for multiple types of devices, including iPhones and Android-based phones at the same time. A SCADA software package with HTML5 support will eliminate the development delays for different types of handheld operating systems. 

Improving security

SCADA security is of utmost importance. The general media has publicized alarming stories on the vulnerability of SCADA systems, and enabling Internet or cell network access to SCADA systems does require additional security measures such as firewalls, passwords, and possibly encrypted virtual private networks. 

Most SCADA users are familiar with the Stuxnet worm that was discovered in June 2010. In addition to gaining access to the SCADA system, it was the first major instance of malware used to destroy equipment. Stuxnet was an important wake-up call to many companies. However, many continue to erroneously believe it demonstrates the dangers of the Internet. The Stuxnet worm initially spread using infected removable drives (USB flash drives), and it then used peer-to-peer remote procedure calls to infect other computers inside private networks that weren’t connected to the Internet. 

This example is used to show that any network—regardless of how it’s accessed—is vulnerable to attacks if it’s not properly protected. It’s equally important to prohibit unauthorized access from the PCs connected to a private network as it is to create firewalls for Web-based and cell network access. Industrial security experts advise treating SCADA security with an in-depth strategy that leverages common IT practices and security measures including firewalls, encryption, and proper procedures. 

A firewall is a hardware appliance or software application that monitors network traffic based on user-defined or preconfigured rules to prevent unauthorized access. There are different types of firewalls, with some offering enhanced safeguards for industrial use. Password protection and encryption will further strengthen the network against intrusion. 

Many companies use a virtual private network (VPN) to secure communications between multiple networks or multiple hosts. A VPN establishes a protected tunnel across the Internet or other communication network that keeps data safe from unauthorized access. Communications are safeguarded regardless of the path taken or the distance traveled. Fortunately, today’s advanced SCADA systems offer a high level of protection and functionality for remote access if implemented correctly, and if correct security procedures are followed.

Regardless of the device and method used, inevitably the vast majority of SCADA systems need to provide some sort of remote access. The very nature of these systems is to facilitate the monitoring and control of remote processes and operations, so trying to isolate the SCADA system creates a real risk of falling behind competitors. The good news is now SCADA users have many options for providing that remote access, with different ones to suit each application.

Jeff Payne is the product manager for the Automation Controls Group at AutomationDirect Inc.

This article appears in the Applied Automation supplement for Control Engineering and Plant Engineering

<< First < Previous Page 1 Page 2 Next > Last >>

The Top Plant program honors outstanding manufacturing facilities in North America. View the 2015 Top Plant.
The Product of the Year program recognizes products newly released in the manufacturing industries.
Each year, a panel of Control Engineering and Plant Engineering editors and industry expert judges select the System Integrator of the Year Award winners in three categories.
Pipe fabrication and IIoT; 2017 Product of the Year finalists
The future of electrical safety; Four keys to RPM success; Picking the right weld fume option
A new approach to the Skills Gap; Community colleges may hold the key for manufacturing; 2017 Engineering Leaders Under 40
Control room technology innovation; Practical approaches to corrosion protection; Pipeline regulator revises quality programs
The cloud, mobility, and remote operations; SCADA and contextual mobility; Custom UPS empowering a secure pipeline
Infrastructure for natural gas expansion; Artificial lift methods; Disruptive technology and fugitive gas emissions
Power system design for high-performance buildings; mitigating arc flash hazards
VFDs improving motion control applications; Powering automation and IIoT wirelessly; Connecting the dots
Natural gas engines; New applications for fuel cells; Large engines become more efficient; Extending boiler life

Annual Salary Survey

Before the calendar turned, 2016 already had the makings of a pivotal year for manufacturing, and for the world.

There were the big events for the year, including the United States as Partner Country at Hannover Messe in April and the 2016 International Manufacturing Technology Show in Chicago in September. There's also the matter of the U.S. presidential elections in November, which promise to shape policy in manufacturing for years to come.

But the year started with global economic turmoil, as a slowdown in Chinese manufacturing triggered a worldwide stock hiccup that sent values plummeting. The continued plunge in world oil prices has resulted in a slowdown in exploration and, by extension, the manufacture of exploration equipment.

Read more: 2015 Salary Survey

Maintenance and reliability tips and best practices from the maintenance and reliability coaches at Allied Reliability Group.
The One Voice for Manufacturing blog reports on federal public policy issues impacting the manufacturing sector. One Voice is a joint effort by the National Tooling and Machining...
The Society for Maintenance and Reliability Professionals an organization devoted...
Join this ongoing discussion of machine guarding topics, including solutions assessments, regulatory compliance, gap analysis...
IMS Research, recently acquired by IHS Inc., is a leading independent supplier of market research and consultancy to the global electronics industry.
Maintenance is not optional in manufacturing. It’s a profit center, driving productivity and uptime while reducing overall repair costs.
The Lachance on CMMS blog is about current maintenance topics. Blogger Paul Lachance is president and chief technology officer for Smartware Group.
The maintenance journey has been a long, slow trek for most manufacturers and has gone from preventive maintenance to predictive maintenance.
This digital report explains how plant engineers and subject matter experts (SME) need support for time series data and its many challenges.
This digital report will explore several aspects of how IIoT will transform manufacturing in the coming years.
Maintenance Manager; California Oils Corp.
Associate, Electrical Engineering; Wood Harbinger
Control Systems Engineer; Robert Bosch Corp.
This course focuses on climate analysis, appropriateness of cooling system selection, and combining cooling systems.
This course will help identify and reveal electrical hazards and identify the solutions to implementing and maintaining a safe work environment.
This course explains how maintaining power and communication systems through emergency power-generation systems is critical.
click me