SCADA/HMI


Scada system for highway traffic uses wireless comms

August 2003 SCADA/HMI Information Security

A traffic control expert has succeeded in setting up the second stage of a traffic scada system along a section of Taiwan's national highway. In order to maintain good traffic and road conditions, the traffic scada system had to improve the monitoring of traffic flow, as well as rush hour traffic management, safety signs and emergency alarm systems.

Firstly, the scada system had to provide a fast and reliable, high quality, data transfer solution over long geographical distances. In addition, the government requested the use of fibre optics and high-speed Ethernet to link the local units in order to send local data to the regional control centres.

The second key factor was to overcome the mountainous area around the Taipei Basin. The highway bureau requested a wireless solution, since the installation costs of physically wiring the area would be expensive and would demand too much maintenance.

In order to meet the demand of single mode data transfer, at a minimum distance of 10 km, the ADAM-4542 was designed, a single mode fibre-optic RS232/422/485 converter with capabilities of up to 15 km. A total of 192 units were installed between the local control units and the highway devices to upload and download traffic information. The uploaded data was then transferred through the Ethernet to the control centres. In addition, eight sets of licence-free ADAM-4550 2,4 GHz wireless radio modems were placed on four mountain peaks along with 24 dB directional antennas. The 2,4 GHz bandwidth offers proportionately higher data transfer rates than the slower 900 MHz standard. The ADAM-4550 modules provided three channels to handle traffic information from different remote control units.

The regional control centre installed eight IPC-610 14-slot rack-mount IPC chassis and 25 MIC-2000 controllers for the data processing terminals in order to cope with the huge volume of data and realtime requests.

The ADAM communication modules and MIC controllers provided a space efficient solution. Since all the products are PC-based and operate under Windows, they are highly compatible with the system. The national bureau plans to apply this system to other sections of the highway as well as highways in other areas.

For more information contact Elton Prytz, ProMicro, 011 706 7913, [email protected], www.promicro.co.za





Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Cybersecurity and AI
AI & Data Analytics Information Security
Cybersecurity is one of the primary reasons that detecting the commonalities and threats of what is otherwise completely unknown is possible with tools such as SIEM and endpoint protection platforms.

Read more...
HMI with maximum performance in the smallest of spaces
ifm - South Africa SCADA/HMI
Whenever clear communication, precision and performance in the smallest of spaces are required, the most compact member of ifm’s ecomatDisplay family is the perfect choice. The 11 cm HMI makes no compromises when it comes to human-machine interaction.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
AI augmentation in security software and the resistance to IT
Security Services & Risk Management Information Security
The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...
Milestone Systems joins CVE programme
Milestone Systems News & Events Information Security
Milestone Systems has partnered with the Common Vulnerability and Exposures (CVE) Programme as a CVE Numbering Authority (CNA), to assist the programme to find, describe, and catalogue known cybersecurity issues.

Read more...
Access & identity expectations for 2024
Technews Publishing IDEMIA ZKTeco Gallagher Salto Systems Africa Regal Distributors SA Reditron Editor's Choice Access Control & Identity Management Information Security AI & Data Analytics
What does 2024 have in store for the access and identity industry? SMART Security Solutions asked several industry players for their brief thoughts on what they expect this year.

Read more...
Zero Trust and user fatigue
Access Control & Identity Management Information Security
Paul Meyer, Security Solutions Executive, iOCO OpenText, says implementing Zero Trust and enforcing it can create user fatigue, which only leads to carelessness and a couldn’t care attitude.

Read more...
Passwordless, unphishable web browsers
Access Control & Identity Management Information Security
Passkey technology is proving to be an easily deployed way to bring unphishable, biometric-based security to browsers; making identification and authentication much more secure and reliable for all parties.

Read more...