The design of verification function is based on the Pioneer primitive. The verification function consists of three main components: the ch...
Tuesday, September 7, 2010
Monday, September 6, 2010
Supervisory Control and Data Acquisition Architecture
A SCADA system is common process automation system which is used to gather data from sensors and instruments located at remote site and to...
Posted by
Cartiman
2010-09-06T00:01:00-07:00
Sunday, September 5, 2010
Cyber Security Threat of SCADA Control Systems
The continuous growth of cyber security threat and attacks including the increasing sophistication of malware is impacting the security of...
Posted by
Cartiman
2010-09-05T00:01:00-07:00
Saturday, September 4, 2010
SCADA Network Operation Outsourcing
A fundamental concern regarding SCADA security is the increased connectivity to other, internal or external, computer networks. The typica...
Posted by
Cartiman
2010-09-04T00:01:00-07:00
Friday, September 3, 2010
A Typical SCADA System
Perhaps the most common architecture for SCADA (Supervisory, Control and Data Acquisition) system is a hierarchically organized structure....
Posted by
Cartiman
2010-09-03T00:01:00-07:00
Thursday, September 2, 2010
Data Transaction between PLC and Micro
The underlying protocol; for the data transaction is called Modbus Protocol. It uses a query-response cycle between a master and the slave...
Posted by
Cartiman
2010-09-02T00:01:00-07:00
Wednesday, September 1, 2010
Implementation of Epics Support
For each PLC , the vxWorks driver code arranges the tags in scan lists depending on the requested update rate. One thread per PLC handles ...
Posted by
Cartiman
2010-09-01T00:01:00-07:00