Professional Documents
Culture Documents
Ltd.
SUBMITTED TO : SUBMITTED BY :
MR. VISHRAM MEENA PRATYUSH SHARMA
D.G.M. (E & T) 6TH SEMESTER
INFOCOM SECTION ELECTRONICS & COMMUNICATION
ONGC, JODHPUR M.B.M. UNIVERSITY
JODHPUR, (RAJASTHAN)
1
ACKNOWLEDGEMENT
2
TRAINING EXPERIENCE
3
CONTENTS
SR.NO. TOPICS PAGE NO.
1. ABOUT ONGC 5
2. SCADA 7
3. SUPERVISORY STATION 15
4. SCADA ARCHITECTURE 17
6. NETWORK CLASSIFICATION 31
7. SATELLITE COMMUNICATION 40
4
9. REFERENCES 47
ONGC
Oil and Natural Gas Corporation Limited (ONGC) (incorporated on June
23, 1993) is an Indian public sector petroleum company. ONGC is one of
Asia's largest and most active companies involved in exploration and
production of oil. It is involved in exploring for and exploiting
hydrocarbons in 26 sedimentary basins of India.
5
ONGC Offshore Site
6
SCADA
SCADA stands for Supervisory Control and Data Acquisition.
7
SCADA is an online monitoring system and supervision. It is a
process control application that collects data from sensors and
machines on the shop floor or in remote locations and sends them to a
central computer for management and control.
8
A Human-Machine Interface or HMI is the apparatus which
presents process data to a human operator, and through this, the
human operator monitors and controls the process.
A Supervisory (computer) System, gathering (acquiring) data on
the process and sending commands (control) to the process.
Remote Terminal Units (RTUs) connecting to sensors in the
process, converting sensor signals to digital data and sending
digital data to the supervisory system.
Programmable Logic Controller (PLCs) used as field devices
because they are more economical, versatile, flexible, and
configurable than special-purpose RTUs.
Communication infrastructure connecting the supervisory system
to the Remote Terminal Units.
Systems Concepts
9
The term SCADA usually refers to centralized systems which monitor
and control entire sites, or complexes of systems spread out over large areas
(anything between an industrial plant and a country). Most control actions
are performed automatically by Remote Terminal Units ("RTUs") or by
Programmable Logic Controllers ("PLCs").
Data acquisition begins at the RTU or PLC level and includes meter
readings and equipment status reports that are communicated to SCADA as
required. Data is then compiled and formatted in such a way that a control
room operator using the HMI can make supervisory decisions to adjust or
override normal RTU (PLC) controls. Data may also be fed to a Historian,
often built on a commodity Database Management System, to allow
trending and other analytical auditing.
Example: - a PLC may control the flow of cooling water through part of an
industrial process, but the SCADA system may allow operators to change the
set points for the flow, and enable alarm conditions, such as loss of flow and
high temperature, to be displayed and recorded. The feedback control loop
passes through the RTU or PLC, while the SCADA system monitors the
overall performance of the loop.
10
11
Human Machine Interface (HMI)
A Human-Machine Interface or HMI is the apparatus which
presents process data to a human operator, and through which the
human operator controls the process.
12
Remote Terminal Unit (RTU)
Switch
In electronics, a Switch is an electrical component that can break
an electrical circuit, interrupting the current or diverting it from one
conductor to another. The most familiar form of switch is a manually
operated electromechanical device with one or more sets of electrical
contacts. Each set of contacts can be in one of two states: either
13
'closed' meaning the contacts are touching and electricity can flow
between them, or 'open', meaning the contacts are separated and
nonconducting.
14
Basic SCADA Animation
15
Supervisory Station
16
The term "Supervisory Station" refers to the servers and
software responsible for communicating with the field equipment
(RTUs, PLCs, etc.), and then to the HMI software running on
workstations in the control room, or elsewhere. In smaller SCADA
systems, the master station may be composed of a single PC. In larger
SCADA systems, the master station may include multiple servers,
distributed software applications, and disaster recovery sites. To
increase the integrity of the system the multiple servers will often be
configured in a dual-redundant or hot-standby formation providing
continuous control and monitoring in the event of a server failure.
17
SCADA systems have traditionally used combinations of radio
and direct serial or modem connections to meet communication
requirements. The remote management or monitoring function of a
SCADA system is often referred to as telemetry.
This has also come under threat with some customers wanting
SCADA data to travel over their pre-established corporate networks or
to share the network with other applications. The legacy of the early
low-bandwidth protocols remains, though. SCADA protocols are
designed to be very compact and many are designed to send
information to the master station only when the master station polls
the RTU.
18
SCADA Architectures
SCADA systems have evolved through 3 generations as follows:
19
people beyond the developers and hackers knew enough to determine
how secure a SCADA installation was. Since both parties had vested
interests in keeping security issues quiet, the security of a SCADA
installation was often badly overestimated, if it was considered at all.
20
Security Issues in SCADA
In particular, security researchers are concerned about:
21
Application & Advantages of SCADA
Treatment Plant Automation for more Effective Plant Management
Programming
Alarm Annunciation
Programming
Advantages:
22
Computer Network
A computer network, or data network, is a digital telecommunications
network which allows nodes to share resources. In computer networks,
computing devices exchange data with each other using connections
between nodes (data links.) These data links are established over cable
media such as wires or optic cables, or wireless media such as Wi-Fi.
Introduction:-
A computer network facilitates interpersonal communications allowing
users to communicate efficiently and easily via various means: email, instant
messaging, online chat, telephone, video telephone calls, and video
conferencing. A network allows sharing of network and computing
resources. Users may access and use resources provided by devices on the
network, such as printing a document on a shared network printer or use of
a shared storage device. Distributed computing uses computing resources
across a network to accomplish tasks.
23
OSI Model
OSI stands for Open System Interconnection is a reference model that
describes how information from a software application in
one computer moves through a physical medium to the software
application in another computer.
OSI consists of seven layers, and each layer performs a particular
network function.
OSI model was developed by the International Organization for
Standardization (ISO) in 1984, and it is now considered as an
architectural model for the inter-computer communications.
OSI model divides the whole task into seven smaller and manageable
tasks. Each layer is assigned a particular task.
Each layer is self-contained, so that task assigned to each layer can be
performed independently.
24
Layer 1: Physical Layer
The lowest layer of the OSI reference model is the physical layer. It is
responsible for the actual physical connection between the devices.
The physical layer contains information in the form of bits. It is
responsible for transmitting individual bits from one node to the next.
When receiving data, this layer will get the signal received and convert
it into 0s and 1s and send them to the Data Link layer, which will put
the frame back together.
25
Layer 2: Data Link Layer
The data link layer is responsible for the node-to-node delivery of the
message. The main function of this layer is to make sure data transfer is
error-free from one node to another, over the physical layer. When a
packet arrives in a network, it is the responsibility of DLL to transmit it
to the Host using its MAC address.
Data Link Layer is divided into two sublayers:
1. Logical Link Control (LLC)
2. Media Access Control (MAC)
The packet received from the Network layer is further divided into
frames depending on the frame size of NIC(Network Interface Card).
DLL also encapsulates Sender and Receiver’s MAC address in the
header.
The Receiver’s MAC address is obtained by placing an ARP(Address
Resolution Protocol) request onto the wire asking “Who has that IP
address?” and the destination host will reply with its MAC address.
26
Flow Control: The data rate must be constant on both sides else the
data may get corrupted thus, flow control coordinates the amount of
data that can be sent before receiving acknowledgement.
Access control: When a single communication channel is shared by
multiple devices, the MAC sub-layer of the data link layer helps to
determine which device has control over the channel at a given time.
* Packet in Data Link layer is referred to as Frame.
** Data Link layer is handled by the NIC (Network Interface Card) and
device drivers of host machines.
*** Switch & Bridge are Data Link Layer devices.
.
27
Layer 4: Transport Layer
The transport layer provides services to the application layer and takes
services from the network layer. The data in the transport layer is
referred to as Segments. It is responsible for the End to End Delivery of
the complete message. The transport layer also provides the
acknowledgement of the successful data transmission and re-transmits
the data if an error is found.
At sender’s side: Transport layer receives the formatted data from the
upper layers, performs Segmentation, and also implements Flow &
Error control to ensure proper data transmission. It also adds Source
and Destination port numbers in its header and forwards the
segmented data to the Network Layer.
Note: The sender needs to know the port number associated with the
receiver’s application.
Generally, this destination port number is configured, either by default
or manually. For example, when a web application makes a request to a
web server, it typically uses port number 80, because this is the default
port assigned to web applications. Many applications have default ports
assigned.
At receiver’s side: Transport Layer reads the port number from its
header and forwards the Data which it has received to the respective
application. It also performs sequencing and reassembling of the
segmented data.
The functions of the transport layer are as follows:
Segmentation and Reassembly: This layer accepts the message from
the (session) layer, and breaks the message into smaller units. Each of
the segments produced has a header associated with it. The transport
layer at the destination station reassembles the message.
Service Point Addressing: In order to deliver the message to the correct
process, the transport layer header includes a type of address called
28
service point address or port address. Thus by specifying this address,
the transport layer makes sure that the message is delivered to the
correct process.
The services provided by the transport layer :
A. Connection-Oriented Service: It is a three-phase process that
includes
– Connection Establishment
– Data Transfer
– Termination / disconnection
In this type of transmission, the receiving device sends an
acknowledgement, back to the source after a packet or group of
packets is received. This type of transmission is reliable and secure.
B. Connectionless service: It is a one-phase process and includes Data
Transfer. In this type of transmission, the receiver does not
acknowledge receipt of a packet. This approach allows for much faster
communication between devices. Connection-oriented service is more
reliable than connectionless Service.
* Data in the Transport Layer is called as Segments.
** Transport layer is operated by the Operating System. It is a part of
the OS and communicates with the Application Layer by making system
calls.
Transport Layer is called as Heart of OSI model.
.
29
Synchronization: This layer allows a process to add checkpoints which
are considered synchronization points into the data. These
synchronization points help to identify the error so that the data is re-
synchronized properly, and ends of the messages are not cut
prematurely and data loss is avoided.
Dialog Controller: The session layer allows two systems to start
communication with each other in half-duplex or full-duplex.
**All the below 3 layers(including Session Layer) are integrated as a
single layer in the TCP/IP model as “Application Layer”.
**Implementation of these 3 layers is done by the network application
itself. These are also known as Upper Layers or Software Layers.
Scenario:
Let us consider a scenario where a user wants to send a message
through some Messenger application running in his browser. The
“Messenger” here acts as the application layer which provides the user
with an interface to create the data. This message or so-called Data is
compressed, encrypted (if any secure data), and converted into bits (0’s
and 1’s) so that it can be transmitted.
30
Layer 6: Presentation Layer
The presentation layer is also called the Translation layer. The data
from the application layer is extracted here and manipulated as per the
required format to transmit over the network.
The functions of the presentation layer are :
Translation: For example, ASCII to EBCDIC.
Encryption/ Decryption: Data encryption translates the data into
another form or code. The encrypted data is known as the ciphertext
and the decrypted data is known as plain text. A key value is used for
encrypting as well as decrypting data.
Compression: Reduces the number of bits that need to be transmitted
on the network.
31
The functions of the Application layer are :
Network Virtual Terminal
FTAM-File transfer access and management
Mail Services
Directory Services
OSI model acts as a reference model and is not implemented on the
Internet because of its late invention. The current model being used is
the TCP/IP model.
OSI model in a nutshell
32
Network Classification
The following list presents categories used for classifying networks:
Connection method
Scale
Functional relationship (network architecture)
Network topology
33
Types of Networks
Below is a list of the most common types of computer networks in
order of scale:
34
allows a business to effectively carry out its daily function regardless of
location. The Internet may be considered a WAN.
35
A personal area network (PAN) is a computer network for
interconnecting devices centered on an individual person's workspace.
A PAN provides data transmission amongst devices such as
computers, smart phones, tablets and personal digital assistants. PANs
can be used for communication amongst the personal devices
themselves, or for connecting to a higher level network and the
Internet (an uplink) where one master device takes up the role
as gateway. A PAN may be carried over wired computer buses such
as USB.
36
allow remote users and branch offices to securely access corporate
applications and other resources.
Sample
Bandwidth
Option: Description Advantages Disadvantages protocols
range
used
37
length cells and then
transported across virtual
circuits
Internetwork
An Internetwork is the connection of two or more distinct computer
networks or network segments via a common routing technology. The result
is called an internetwork (often shortened to internet). Two or more
networks or network segments connected using devices that operate at
layer 3 (the 'network' layer) of the OSI Basic Reference Model, such as a
router. Any interconnection among or between public, private, commercial,
industrial, or governmental networks may also be defined as an
internetwork.
Intranet
Extranet
Internet
38
Intranets and extranets may or may not have connections to the
Internet. If connected to the Internet, the intranet or extranet is normally
protected from being accessed from the Internet without proper
authorization. The Internet is not considered to be a part of the intranet or
extranet, although it may serve as a portal for access to portions of an
extranet.
39
Network Switch
A Network Switch is a computer networking device that connects
network segments. The term commonly refers to a Network bridge that
processes and routes data at the Data link layer (layer 2) of the OSI
model. Switches that additionally process data at the Network layer
(layer 3 and above) are often referred to as Layer 3 switches or
Multilayer switches.
40
Role of Switches in Networks
Network switch is a marketing term rather than a technical one. Switches
may operate at one or more OSI layers, including physical, data link,
network, or transport (i.e., end-to-end). A device that operates
simultaneously at more than one of these layers is called a multilayer
switch, although use of the term is diminishing
41
Routers
A Router is a networking device that forwards packets between
networks using information in protocol headers and forwarding tables
to determine the best next router for each packet. Routers work at the
Network Layer of the OSI model and the Internet Layer of TCP/IP.
42
Communications satellite
A communications satellite is an artificial satellite that relays and
amplifies radio telecommunications signals via a transponder; it creates
a communication channel between a source transmitter and a
receiver at different locations on Earth. Communications satellites are
used for television, telephone, radio, internet, and military applications.
There are over 2,000 communications satellites in Earth’s orbit, used by
both private and government organizations.
Satellite orbits
Communications satellites usually have one of three primary types
of orbit, while other orbital classifications are used to further specify
orbital details.
44
In applications that require a large number of ground antennas, such
as DirecTV distribution, the savings in ground equipment can more than
outweigh the cost and complexity of placing a satellite into orbit.
Applications
Television
A direct broadcast satellite is a communications satellite that transmits
to small DBS satellite dishes (usually 18 to 24 inches or 45 to 60 cm in
diameter). Direct broadcast satellites generally operate in the upper
portion of the microwave Ku band. DBS technology is used for DTH-
oriented (Direct-To-Home) satellite TV services, such as DirecTV, DISH
Network, Bell TV, Shaw Direct, Free sat, Sky, Tata Sky, AirtelTV
and DSTV
45
Radio broadcasting
A satellite radio or subscription radio (SR) is a digital radio signal that is
broadcast by a communications satellite, which covers a much wider
geographical range than terrestrial radio signals.
Internet access
After the 1990s, satellite communication technology has been used as a
means to connect to the Internet via broadband data connections. This
can be very useful for users who are located in remote areas, and
cannot access a broadband connection, or require high availability of
services.
Military
Communications satellites are used for military
communications applications, such as Global Command and Control
Systems. Examples of military systems that use communication
satellites are the MILSTAR, the DSCS, and the FLTSATCOM of the United
States, NATO satellites, United satellites (for instance Skynet), and
satellites of the former Soviet Union.
46
small fixed earth station.
VSATs provide the
vital communication link
required to set up a satellite
based Communication
network. VSATs can
support any communication
requirement be it voice, Data, or
video conferencing.
A Very Small Aperture
Terminal (VSAT), is a two-way
satellite ground station or a
stabilized maritime
VSAT antenna with a dish
antenna that is smaller than 3
47
meters. The majority of VSAT
antennas range
from 75 cm to 1.2 m. Data rates
typically range from 56 Kbit/s
up to 4 Mbit/s. VSATs access
satellites in
geosynchronous orbit to relay
data from small remote earth
stations (terminals) to other
terminals (in
mesh configurations) or master
earth station "hubs" (in star
configurations).
The term Very Small Aperture
Terminal (VSAT) refers to a
48
small fixed earth station.
VSATs provide the
vital communication link
required to set up a satellite
based Communication
network. VSATs can
support any communication
requirement be it voice, Data, or
video conferencing.
A Very Small Aperture
Terminal (VSAT), is a two-way
satellite ground station or a
stabilized maritime
VSAT antenna with a dish
antenna that is smaller than 3
49
meters. The majority of VSAT
antennas range
from 75 cm to 1.2 m. Data rates
typically range from 56 Kbit/s
up to 4 Mbit/s. VSATs access
satellites in
geosynchronous orbit to relay
data from small remote earth
stations (terminals) to other
terminals (in
mesh configurations) or master
earth station "hubs" (in star
configurations).
50
Very Small Aperture Terminal (VSAT)
A very small aperture terminal (VSAT) is a small-sized earth station
used in the transmit/receive of data, voice and video signals over a
satellite communication network, excluding broadcast television. A
VSAT consists of two parts: a transceiver placed outdoors in direct line
of sight to the satellite, and a device that is placed indoors to interface
the transceiver with the end user’s communications device, such as a
PC. The transceiver receives or sends a signal to a satellite transponder
in the sky. The satellite sends and receives signals from a ground station
computer that acts as a hub for the system. Each end user is
interconnected with the hub station via the satellite, forming a star
topology. The hub controls the entire operation of the network. For one
end user to communicate with another, each transmission must first go
to the hub station, which then retransmits it via the satellite to the
other end user’s VSAT. VSAT data throughput speeds have increased
significantly throughout the years and now can provide multimegabit
service in downstream and upstream. Antenna/dish sizes usually range
from 1.2 meters to approximately 3 meters in diameter. Generally,
these systems operate in Ku-band and C-band frequencies, but with the
launch of Ka-band satellites by a number of operators in North America
and Asia/Pacific, and with newer Ka-band satellites planned for Europe,
high-bandwidth, bidirectional VSAT services for enterprise, government
and other users will increasingly migrate to these satellites.
51
52
CONCLUSION:
ONGC, Jodhpur is basically an administrative office which is looking
after drilling activities going in Thar Desert area and Gas Collection
Station, Gamnewala, Ramgarh, Jaisalmer. It works as an intermediate
between these all sites and remotely supervises and controls the sites.
We have learnt about SCADA that is provided by ABB organization that
maintains records and tells about what amount of production of
hydrocarbons such as oil and gases, about RTU, components and
functions of SCADA.
LAN has a high speed of transmission and provides more security. We
learnt about types of cables, color codes of UTP cable (RJ45), working of
Switches, Media Converter, and Modems etc. In ONGC Jodhpur
nowadays the groups of people are working on the system to make it
more secure and reliable using topologies i.e. star.
53
REFERENCES
1. https://en.wikipedia.org/
2. www.Studymafia.org
3. www.scada.com
4. https://newsite.scada-international.com/news-hub
5. https://www.geeksforgeeks.org
6. https://www.mobilsat.com/vsat
7. https://www.ongcindia.com
54