SCADA and Data Acquisition in Machine Automation
Supervisory Control and Data Acquisition (SCADA) systems occupy the monitoring and control layer that sits above field-level devices in industrial automation hierarchies. This page covers how SCADA architectures are structured, the data acquisition mechanisms they rely on, the operational scenarios where they are deployed, and the decision criteria that distinguish SCADA from adjacent control technologies. Understanding these systems is foundational to evaluating machine automation integration considerations and the broader IIoT in machine automation landscape.
Definition and scope
SCADA is a category of industrial control system (ICS) that collects real-time data from geographically distributed or process-intensive assets, presents that data to operators through supervisory interfaces, and issues control commands back to field devices — typically without requiring continuous manual intervention. The term encompasses both the software platform and the communication infrastructure that connects it to physical equipment.
The National Institute of Standards and Technology (NIST) defines SCADA systems within the ICS family in NIST SP 800-82, "Guide to Industrial Control Systems (ICS) Security", distinguishing them from Distributed Control Systems (DCS) and Programmable Logic Controller (PLC)-based systems primarily by geographic scope and communication architecture. SCADA architectures typically span large physical distances — pipelines, electrical grids, water treatment networks — while DCS architectures are more commonly confined to a single plant or process unit.
Data acquisition, as a sub-function of SCADA, refers to the systematic collection of sensor readings, equipment states, alarms, and process variables from field instruments. These inputs are transmitted to a central master terminal unit (MTU) or historian server for logging, visualization, and analysis.
The scope of a SCADA deployment is defined along three axes:
- Geographic reach — single facility, multi-site campus, or regional/national infrastructure
- Data volume and velocity — number of tags polled, polling frequency (typically 100 ms to several seconds per tag), and historian retention periods
- Control authority — read-only monitoring versus closed-loop supervisory control with setpoint adjustment capability
How it works
A functional SCADA system operates through four discrete layers:
- Field instrumentation layer — Industrial sensors, transmitters, flow meters, and actuators generate raw process signals (analog 4–20 mA, digital discrete, or fieldbus-encoded).
- Remote Terminal Unit (RTU) / PLC layer — RTUs or programmable logic controllers at each field site convert raw signals into digital values, execute local control logic, and buffer data for transmission. RTUs are preferred in high-latency or bandwidth-constrained remote environments; PLCs are preferred where local processing speed and ladder logic flexibility matter.
- Communication layer — Data travels from RTUs/PLCs to the MTU over industrial protocols. Common protocols include Modbus RTU/TCP, DNP3, IEC 60870-5, and OPC-UA. Physical media range from leased telephone lines and radio frequency (RF) links to fiber optic and cellular (4G/5G LTE) networks.
- Master station / SCADA server layer — The MTU aggregates incoming data into a real-time database (RTDB), feeds the human-machine interface (HMI) for operator visualization, routes alarms, and writes records to the historian for trend analysis and compliance reporting.
Data acquisition polling can be structured as cyclic (fixed-interval scans of all tags) or exception-based (RTU reports only when a value changes beyond a deadband threshold). Exception-based reporting reduces bandwidth consumption substantially in large networks — an important consideration for systems managing thousands of tag points.
Common scenarios
Water and wastewater utilities — Municipal systems use SCADA to monitor pump station levels, chemical dosing rates, and flow across distribution networks. The U.S. Environmental Protection Agency's guidance document Cybersecurity Best Practices for the Water Sector identifies SCADA as the primary monitoring infrastructure for drinking water systems.
Electric power transmission — Grid operators use SCADA integrated with Energy Management Systems (EMS) to monitor substations, switching equipment, and generation assets across regions spanning hundreds of miles.
Oil and gas pipeline monitoring — Pipeline operators deploy SCADA with RTUs at compressor stations and valve clusters along gathering and transmission lines, enabling leak detection and pressure management without continuous field personnel.
Discrete manufacturing — In plant environments, SCADA overlays sit above PLC-controlled cells to aggregate production counts, downtime codes, and quality metrics — feeding condition monitoring and predictive maintenance workflows. This is distinct from the DCS role in continuous process industries such as refining or chemical production.
Decision boundaries
Choosing between SCADA, DCS, and standalone PLC architectures depends on four criteria:
| Criterion | SCADA | DCS | PLC-Based |
|---|---|---|---|
| Geographic scope | Multi-site / remote | Single plant | Single machine or cell |
| Control loop density | Low to moderate | High (thousands of loops) | Moderate |
| Communication latency tolerance | Seconds acceptable | Milliseconds required | Milliseconds required |
| Operator supervisory role | Primary control mode | Shared with automation | Limited supervisory |
SCADA vs. DCS: A DCS tightly integrates control and data acquisition within a single vendor architecture, optimized for continuous process control with fast loop execution. SCADA, by contrast, is communication-centric and vendor-agnostic, prioritizing visibility over a distributed asset base. A refinery's distillation columns are typically governed by DCS; its remote tank farms and pipeline terminals are typically governed by SCADA.
SCADA vs. standalone HMI: A standalone HMI system provides local visualization for a single machine or cell. SCADA aggregates data from multiple machines or sites into a unified supervisory layer with historian, alarm management, and reporting capabilities.
Integration with edge computing: Edge computing in industrial machine automation can act as an intermediate processing layer between RTUs and the central SCADA server, filtering data and performing local analytics before transmission — reducing historian storage requirements and network bandwidth consumption.
Cybersecurity posture is a critical decision factor specific to SCADA. Because SCADA systems increasingly use TCP/IP networks rather than proprietary serial links, the attack surface has expanded. NIST SP 800-82 and the Cybersecurity and Infrastructure Security Agency (CISA) ICS-CERT advisories provide the primary US federal guidance for SCADA security architecture decisions.
References
- NIST SP 800-82 Rev. 3 — Guide to Industrial Control Systems (ICS) Security
- CISA ICS-CERT Advisories and Resources
- U.S. EPA — Water Security Resources and Cybersecurity Best Practices
- IEC 60870-5 Telecontrol Standard — International Electrotechnical Commission
- OPC Foundation — OPC-UA Specification