Third Semester M.E. (Control and Instrumentation) Degree Examination, July 2014 (2K8 Scheme) CI 311 : SCADA AND DISTRIBUTED CONTROL SYSTEMS Time : 3 Hours
Max. Marks : 100
Instruction : Answer any five full questions. 1. a) What is Automation ? Discuss the process automation in factory.
10
b) Describe the operation of ISO Protocol (Network Standard) reference model. 2. a) Describe the operation of PLC system with a neat block diagram. b) What are the important roles of HMI in Industrial Automation ? Discuss.
10 10 10
3. a) Describe the operation of the following with respect to SCADA system. i) Channel scanning. ii) Converting into engineering units. iii) Data processing. b) What are protocols ? Explain different communication protocols in SCADA systems. 4. a) Describe the architecture of SCADA system. b) Describe the operation of field devices and explain how one can interface these field devices with SCADA systems. 5. a) Explain the architecture of Distributed Control System with necessary diagrams.
12 8 10 10 10
b) With reference to Distributed Control System explain the following : i) Operator interface ii) Engineering Interface.
10
P.T.O.
*JEP1093*
JEP 1093
6. a) Explain the roles and responsibilities of following members in DCS : i) Designer/Developer ii) Manager
10
b) Describe the operation of communication system in distributed control system. 10 7. Write short notes on the following : a) Ethernet b) Vertical Integration of Industrial Automation c) Role of PLC in DCS and SCADA d) ALARM in SCADA system. _______________
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Main menu.
The proposed approach retains all the advantages of cooperative control (such ... Mobile platforms with wireless communication capabili- ties can often be used ...
Jul 9, 2012 - The actions are which files to store locally under limited storage capacity. The global objective is to service local file requests from users while minimizing peer-to-peer content requests [19]. ⢠Ad hoc networks: The agents are mobi
Nov 1, 2014 - almost surely (a.s.) to the desired value of connectivity even in the presence ... by each node of a wireless network, in order to maximize the net-.
dow and the congestion prices based on the 802.11e pa- rameters ... â Also with the Athens University of Economics and Business,. Greece .... As in Ethernet's.
networks, in: IEEE Symposium on Security and Privacy, Oakland, CA,. 2004 (May). Haodong Wang is an assistant professor of. Computer and Information Science at Cleve- land State University. He received his PhD in. Computer Science at College of Willia
Determining whether the usage of sensitive data complies with regulations and policies ... temporal logic (MFOTL) is a good candidate for monitoring data usage to ...... V. Related Work. The usage-control architecture described by Pretschner.
light remote authentication based on the endorsement of the local sen- sors. Elliptic ...... In In Proceedings of the 9th ACM conference on Computer and Com-.
design a scheme to counteract the access control system. Besides, we also addresses node duplication attacks and. DoS attacks by inundating authentication messages to the network. It is our belief that our general data access model and realistic adve
PDF Download Optimal Control of Distributed. Systems with Conjugation Conditions (Nonconvex. Optimization and Its Applications) Full Books. Books detail.
Achieving distributed user access control in sensor networks. Haodong Wang a,*. , Qun Li b a Department of Computer and Information Science, Cleveland State University, Cleveland, OH 44115, United States b Department of Computer Science, College of W
I. Introduction. Determining whether the usage of sensitive data complies .... logs, which is a central problem in monitoring real-time .... stream of logged actions.
It is essential for future real sensor network deployment in which sensors may .... the network. It is our belief that our general data access model and realistic adversary threat model define a very realistic problem for future sensor deployment. Ou
understanding. Whoops! There was a problem loading this page. Retrying... Siemens scada manual pdf. Siemens scada manual pdf. Open. Extract. Open with.
Overview. Brodersen RTU hardware is used in a wide range of monitoring and control applications by utility industry customers. Most vendors of PLC/RTU solutions are able to provide a reasonable solution for the control portion, but require the additi
Department of Electrical and Computer Engineering, Centre for Wireless Communications, University of. Waterloo, Waterloo ... Contract/grant sponsor: Natural Science and Engineering Research Council (NSERC) of Canada. radio spectrum, many .... data ch
Aug 28, 2006 - Institute for Aerospace Studies, University of Toronto, 4925 Dufferin .... This may be done by way of a set of basis behaviours ..... We call the modified .... ings of IEEE International Conference on Evolutionary Computation,.