Chapter 11
Chapter 11
DISTRIBUTION MODELING
AND MANAGEMENT
Authors
Thomas M. Walski
Donald V. Chase
Dragan A. Savic
Walter Grayman
Stephen Beckwith
Edmundo Koelle
Contributing Authors
Scott Cattran, Rick Hammond, Kevin Laptos, Steven G. Lowry,
Robert F. Mankowski, Stan Plante, John Przybyla, Barbara Schmitz
11
Water System Security
The security of water systems has long been a concern in the water industry. The
potential for natural, accidental, and purposeful contamination or other events that
would hinder the ability of the system to provide a safe water supply has been the sub-
ject of many studies. In May 1998, President Clinton issued Presidential Decision
Directive (PDD) 63, which outlined a policy on critical infrastructure protection,
including our nation’s water supplies. However, it wasn’t until the terrorist events of
September 11, 2001, that the water industry truly focused on the vulnerability of our
nation’s water supplies to terrorist activities.
Figure 11.1
Major points of
vulnerability in a
Reservoir
water supply system
Tanks
Canals &
Pumps
Pipes
Wells
Distribution System
River
Water systems are vulnerable to natural, purposeful, or accidental events that can
challenge the security of the system. Examples of each of these types of events
include the following:
• Natural events: Floods, earthquakes, fire, severe weather (droughts, hurri-
canes, tornadoes, and so on), sinkholes, and natural contamination of surface
or groundwater sources
• Purposeful events: Terrorist or criminal contamination, vandalism, or
destruction
• Accidental events: Accidental discharges of pollutants into source waters,
cross-connections between the water distribution system and waste collec-
tion system, vehicle and pipeline accidents, and explosions
Physical Disruption
The ability of a water supply system to provide water to its customers can be compro-
mised by damage or destruction of key physical elements of the water system. Key
elements include raw water facilities (for example, dams, reservoirs, pipelines, and
canals), treatment facilities, and finished water elements (such as transmission lines
and pump stations).
In general, physical disruption can result in disruption of service, significant eco-
nomic cost, inconvenience, and loss of confidence by customers, but the direct threat
to human health is generally limited. Exceptions to this generalization include (1) the
destruction of a dam that causes loss of life and property in the accompanying flood
wave and (2) an explosive release of chlorine gas at a treatment plant that produces a
cloud injurious or lethal to nearby populations.
Section 11.2 Potential Water Security Events 501
Water utilities should examine their physical assets, determine their areas of vulnera-
bility, and increase security accordingly. For example, switching from chlorine gas to
liquid hypochlorite, especially in less secure locations, decreases the risk of exposure
to poisonous chlorine gas. Also, redundant system components can limit disruption of
service by providing backup capability in case of accidental or purposeful damage to
facilities.
Contamination
The ability to deliver water of an acceptable quality can be compromised by the pres-
ence of contaminants in the raw or finished water supply. Contaminants can enter the
water supply through natural causes, accidental spills or events, or purposeful terrorist
or criminal acts. As illustrated in Figure 11.1, there are many potential locations
where a contaminant can enter the water system. Locations include raw water sources
(surface or groundwater), raw water delivery systems, the treatment facility, or the
actual distribution system. Water treatment is the primary barrier to contaminants
reaching the customer but may not be effective for some constituents found in the raw
water and is not effective for contaminants that enter the finished water in the distribu-
tion system. Maintenance of a secondary disinfectant residual in a distribution system
provides protection from some bacterial agents but is not effective for all constituents.
502 Water System Security Chapter 11
Contamination has long been viewed as a serious potential terrorist threat to water
systems (Hoover, 1941). Chemical or biological agents could spread throughout a dis-
tribution system and result in sickness or death among people drinking the water. For
some agents, the presence of the contaminant would not be known until emergency
rooms reported an increase in patients with a particular set of symptoms. Deliberate
chemical and biological contamination of water supply systems is nothing new (Hick-
man, 1999; Deininger, 2000; Clark and Deininger, 2000). Such terrorist activities
were reported in ancient Rome (cyanide), in the United States during the Civil War
(animal carcasses in farm ponds), in Europe and Asia during World War II (anthrax,
cholera, and sewage), and, more recently, in Kosovo (paints, oil, and gasoline in
wells). Deininger and Meier (2000) discuss the topic of deliberate sabotage of water
supply systems.
Accidental contamination of water systems has resulted in many fatalities and ill-
nesses, as well. Examples of such outbreaks include (but are not limited to) E. coli
contamination in Walkerton, Ontario (Canada) (Haestad Methods, 2002), cholera
contamination in Peru (Craun et al., 1991), cryptosporidium contamination in Mil-
waukee, Wisconsin (USA) (Fox and Lytle, 1996), and salmonella contamination in
Gideon, Missouri (USA) (Clark et al., 1996).
The U.S. Army has compiled information on potential biological agents (Burrows and
Renner, 1998). Table 11.1 summarizes this information on agents that may have an
impact on water systems.
There are many factors that should be considered in evaluating the potential threat
from different chemical and biological agents. Following is a summary of some of
these factors:
Deininger and Meier (2000) ranked various agents and compounds in terms of their
relative factor of effectiveness, R, based on lethality and solubility using the following
equation:
R = solubility in water (in mg/L) / (1000 x lethal dose (in mg/human)) (11.1)
Table 11.2 lists values of R for various biological agents and chemicals by decreasing
level of effectiveness (that is, decreasing degree of toxicity in water).
Section 11.2 Potential Water Security Events 503
The primary mechanism for identifying and responding to source water contamina-
tion is an early warning system. An early warning system is a combination of equip-
ment and institutional arrangements and policies that are used in an integrated manner
to achieve the goal of identifying and responding to contaminants in the source water.
An effective early warning system includes the following components (Grayman,
Deininger, and Males, 2002):
identifying the presence of most transient contaminants. More advanced online moni-
tors, such as gas chromatographs and spectrophotometers are more expensive and
require greater expertise and maintenance, but they are more effective as part of an
early warning system.
Examination of online monitors around the world has shown that given sufficient
resources, almost all analyses can be automated if there is a perceived need. Biomon-
itors utilize living aquatic organisms (such as fish, mussels, daphnia, and bacteria) and
measure the stresses placed on the organisms by contaminants in the water. They do
not provide information on the specific contaminant but rather “raise a red flag” that
there is something unusual in the water that is affecting the organisms used in the
biomonitor. Although they have been in use now in many places for almost 20 years,
the field of biomonitoring still appears to be an emerging technology. Other emerging
technologies that may have future utility in early warning systems are generally being
developed in other fields and include electronic noses, DNA chips, flow cytometry,
immuno-magnetic separation techniques, and online bacteria monitors. The current
state of the art in identification of microbial contamination in drinking water has been
summarized by Sobsey (1999).
If the presence of a contaminant is identified in source water, several responses can be
taken to mitigate the impacts of a spill event:
• Closure of water intakes and use of alternate sources
• Cleanup of the spill prior to impacting water intakes
• Enhanced temporary chemical treatment at the treatment plant
• Public notification
506 Water System Security Chapter 11
Closure of water intakes provides the most absolute barrier to a contaminant impact-
ing a drinking water supply but is effective only if the presence of a contaminant is
identified prior to entering the water intake and is limited by the length of time that a
water utility can close their intake and still provide a sufficient supply of water.
Cleanup within the source water body itself is practical for only a limited range of
pollutants (such as some petroleum products, which can be physically separated from
the water body). Enhanced chemical treatment can include addition of coagulants,
carbon, disinfectant, or other chemicals. In order to be effective, the chemical nature
of the contamination must be known and the proper chemical dosage determined.
If contamination has not been identified in the source water, the only line of defense is
the normal treatment processes that are online at the time of the event. Table 11.3 con-
tains typical contaminant removal ranges for various treatment types and contaminant
categories. Actual removal rates depend on specific designs, the chemical characteris-
tics of the raw water, temperature, and so on. Other treatment options that provide
additional barriers to contaminants reaching the water user include regular use of
granular activated carbon, and groundwater injection and subsequent harvesting of the
water. Another mechanism, raw water storage, provides a time lag between the water
intake and water treatment, thus potentially allowing for additional testing prior to the
use of the water.
Abbreviations: P – Poor (0–20% removal); F – Fair (20–60% removal); G – Good (60–90% removal); E – Excellent (90–100% removal);
- Insufficient Data; VOC – volatile organic chemicals; SOC - synthetic organic chemical; TOC - total organic carbon
Potential points of contamination within the distribution system include the follow-
ing:
• Water treatment plant: Treatment plants are the interface between the raw
water source and the distribution system. They are especially vulnerable
because the entire water supply goes through the plant. Clearwells at the end
of the treatment should receive special attention. In the clearwells, a large
amount of supply is concentrated in a single location. A contaminant added
at that point can impact the entire water supply leaving the plant for a period
of many hours. Treatment plants generally have some form of security, and
large plants have around the clock personnel.
• Pump stations and valves: These components are potential points of con-
tamination because a large amount of flow may be passing through these
points at any given time. Thus, any contaminant injected at these locations
could impact many downstream customers.
• Finished tanks and reservoirs: Tanks and reservoirs are vulnerable because
they contain a relatively large quantity of water at a single location, are fre-
quently located in isolated locations, are generally maintained at atmo-
spheric pressure, and usually have access to the interior for maintenance
purposes. Open reservoirs are especially vulnerable because of the open
access to the contents, but they are also relatively rare. Because of the quan-
tity of water in storage in a tank or reservoir, a significant amount of contam-
inant is needed to impact the water quality. Once a sufficient amount of
contaminant is added and mixed with the water in the tank, the water quality
in the distribution system fed by the tank can be impacted for many days
until the fill and draw process has sufficiently diluted the contaminant. This
process is shown graphically in Figure 11.2, where it would take approxi-
mately 12 days for the concentration to be reduced by 90 percent from its
initial peak concentration.
Figure 11.2
Decline in
concentration of a 0.30
well-mixed
contaminated tank
0.25
Calculated Concentration, mg/l
0.20
0.15
0.10
0.05
0.00
0 48 96 144 192 240 288
Time, hr
• Are the wellheads covered and locked? • Can the structure be isolated from the sys-
tem?
• Are the wells with vents not easily accessi-
ble? • Are manholes/access ports and vents locked
and secured?
• Is the area fenced, well lit, and clear of vege-
tation and obstalces?
DISTRIBUTION
Surface Sources • Is the system above ground or below ground?
• Are intakes accessible? If so, can their vul- Can it be tampered with?
nerability be reduced? • Are there valve pits on the system? Are the
facilities fenced, locked, and secured? Who
Local Supplies has access to them?
• Who operates and maintains them? • Are pits located upstream from critical facili-
• Are there controlling valves between the sys- ties?
tems? Who controls them?
• Do they have an adequate vulnerability PERSONNEL
reduction program?
• Who has access to any components of the
water system?
Alternate Emergency Sources Identified
• Are such personnel reliable? Have they been
• Is bottled water available? Does it meet pre-
ventive medicine standards? checked out?
• How are keys and combination locks secured
• Is there an adequate supply? Is it secure?
and managed?
TREATMENT
SECURITY PATROLS
• How is water disinfected? Is chlorine used?
• Are they regularly conducted? If so, how
• Are chlorine levels checked throughout the often and on what sites? Is this sufficient?
system, by whom, and how often?
• Is there remote monitoring of critical points
• What other chemicals are added? and/or processes? Is it necessary?
• How and by whom are the process and the
concentration monitored?
SAMPLING/DETECTION
• Could treatment process(es) be modified to
• How often are chlorine residual measure-
prevent injection of unwanted material?
ments done and where?
• Is the facility secured, is it monitored, how
• What type of monitoring capability exists?
often?
• Are there adequate contingency plans?
• Are the grounds fenced, locked, with an area
clear of vegetation and obstacles, and is it • Do medical facilities identify and track a
well lit? waterborne epidemic?
(Hickman, 1999)
510 Water System Security Chapter 11
Whichever approach is adopted, the vulnerability analysis can be framed in the con-
text of managing the risks within the water system. The basic framework for consider-
ing risk analysis consists of the interwoven areas of risk assessment and risk
management. Risk analysis recognizes that it is impossible to eliminate all risks but
that risks can be identified, assessed, managed, and balanced with other resources so
that the resulting risks are within an acceptable level. Quite simply, risk analysis can
be embodied in a series of questions, such as the following.
Assessment
• What can go wrong?
Fault Trees. Sandia National Laboratories in conjunction with the EPA and
AwwaRF developed a water system vulnerability assessment training package. This
stemmed from a performance-based vulnerability assessment methodology initially
developed by Sandia for the nuclear security area and later applied to security of fed-
eral dams. The central component of this analysis is a risk assessment process shown
schematically in Figure 11.3.
Section 11.3 Assessment of Vulnerability 511
Figure 11.3
Risk assessment
process applied to
Characterize
Context water systems (Sandia
Assets
National Laboratories,
2001)
Determine
Prioritize Targets
Consequence
Define
Protection Goals
Threats
Define
Protection Systems
Safeguards
Analyze
System Risks
No Risks Yes
Proposed Upgrades Acceptable END
?
One of the tools applied in the Sandia assessment is a fault tree. Figure 11.4 illustrates
an example of a generic fault tree applied to a water system. A fault tree is a top-down
method of analyzing system design and performance. The top event is an undesired
state of the system—in this case, defined as an occurrence that will result in the water
utility being unable to meets its mission of supplying safe water to its customers. In
the second level, specific credible ways that could result in not meeting this mission
are enumerated, such as interruption of the raw water supply, treatment capability, or
distribution.
The fault tree continues down with events being combined either through AND or OR
gates. An AND gate indicates that multiple events must occur simultaneously for the
higher level event to occur while OR gates indicate that either of two or more events
could lead to the higher level event occurring. The lowest level of detail depicted in
the graphical fault tree is referred to as a basic event. In the example shown, the basic
events are referred to as “undeveloped” events because they may be broken down into
more detail. (That level of detail is not shown in the diagram.)
The fault tree can be viewed as a graphical depiction of events that would lead to the
overall system failure. Alternatively, it may take on more of a quantitative tool by
assigning probabilities of occurrence to the basic events and then, by following the
tree upward, calculating the overall probability of the top event occurring.
512 Water System Security Chapter 11
Figure 11.4
Sample fault tree for
water system (Sandia
National Laboratories,
2001)
Computer Simulation Models. Simulation models are another tool that can
be used in vulnerability studies to help a water utility understand how their system
will respond to an accidental or purposeful physical or chemical event. This under-
standing can be used to identify the consequences of such events, to test solutions to
minimize the impacts of the events, or to learn how to respond if such events occur.
Simulation models are discussed in more detail in the following section.
• If an oil tank adjacent to a river ruptures and discharges to a river used down-
stream as a source of raw water, when should the utility close its water intake
and for how long will they need to keep the intake closed?
• If a major main in the water system breaks, what happens to pressure
throughout the distribution system and will there be sufficient flow and pres-
sure to provide fire protection?
• If runoff contaminates a particular well, what customers would receive con-
taminated water and how quickly will the contaminant reach them?
• If a terrorist manages to dump a barrel of a particular chemical into a fin-
ished water tank, how will the chemical mix within the tank and, if the con-
tamination is not discovered, which customers will receive the contaminated
water, when will they receive it, and what will the concentration be?
In the area of water system security, computer models have been used to examine
three different time frames:
• As a planning tool to look at what may happen in the future in order to assess
the vulnerability of a system to different types of events and to plan how to
respond if such an event occurs
514 Water System Security Chapter 11
drew the contaminated water deep into the distribution system. Similar historical
modeling has been done in the investigation of E. coli outbreaks in Cabool, Missouri,
and Walkerton, Ontario (Haestad Methods, 2002).
Figure 11.5
Example movement
of a contaminant
through a distribution
system
• DO NOT leave keys in equipment of vehicles • Mark equipment with logos and distinctive
at any time. paint jobs.
• Invite local law enforcement to become famil- • Integrate early warning monitoring systems
iar with your facilities, and establish a proto- into water transport, treatment, and distribu-
col for reporting and responding to threats. tion systems so that an operator will be noti-
fied immediately of changes in chemical
• Discuss detection, response, and notification characteristics, flows, pressures, and temper-
issues with public health officials, and estab-
ature.
lish protocols for them.
• Design and install valves that open and close
• Establish a chain of command and an emer- slowly.
gency call list to be used in emergency situa-
tions. • Know your employees and who it is you are
hiring. Make it a standard procedure to con-
• Provide copies of your operational proce- duct background checks on all new employ-
dures to local law enforcement and emer-
ees.
gency management personnel.
• Install firewalls in computer systems, and
LONG TERM change access codes frequently.
• Install motion sensors and video cameras to • Conduct and attend training activities to pre-
monitor, detect, and record events. They can pare your staff to detect, delay, and respond
be tied into a supervisory control and data appropriately.
acquisition system for remote monitoring. (Denileon, 2001)
• Install intrusion alarms that cover remote
buildings and grounds.
tions (multiple years) of the hydraulics and water quality in the distribution system
(Harding and Walski, 2000).
A recently completed detailed study of the water system in the Dover Township, New
Jersey, area by the U.S. Agency for Toxic Substances and Disease Registry identified
the paths between wells and customers over a multi-decade period (ATSDR, 2001). In
this study, a water distribution system model of the present day system was first
developed and calibrated. Subsequently, models of the distribution system were
developed that covered the period from 1962 to 1996. The models were used to trace
the percentage of water reaching nodes from the wells serving the system.
Water distribution system models have been proposed as part of a real-time or near
real-time system to assist in many aspects of the operation of a water system includ-
ing energy management, water quality management, and emergency operation. The
major obstacle in such use of water distribution system models is the requirement that
the model must be calibrated for a wide range of conditions and is ready to apply
quickly and easily in an extended-period simulation mode. Information on the current
state of the system must be readily available to the model through direct ties to a
SCADA system. In addition, the model must be set up in an automated mode so that
operation is represented by a series of logical controls that reflect the existing operat-
ing procedures. Both information requirements are feasible based on existing technol-
ogy but there have been only limited demonstrations of this type of operation to date.
The key to using a model as part of a real-time response lies in having the model
ready to run. During an emergency, there is no time to construct a model. There is
only time to make some minor adjustments to an existing model.
Section 11.5 Security Measures 519
REFERENCES
Agency for Toxic Substances and Disease Registry (ATSDR). (2001). Summary of Findings. Historical
Reconstruction of the Water-Distribution System Serving the Dover Township Area, New Jersey: Janu-
ary 1962-December 1996. Atlanta, Georgia.
American Water Works Association. (1990). Water Quality & Treatment A Handbook of Community Water
Supplies. 4th Edition, McGraw-Hill, New York, New York.
522 Water System Security Chapter 11
American Water Works Association (2001). “Emergency Planning for Water Utilities.” Manual of Practice
M-19, Denver, Colorado.
AwwaRF. (2002). Online Monitoring for Drinking Water Utilities. Edited by E. Hargesheimer, Denver, Col-
orado.
Burrows, W. D., and Renner, S. E. (1998). “Biological Warfare Agents as Threats to Potable Water.” Envi-
ronmental Health Perspectives, 107(12), 975.
Clark, R. M., and Deininger, R. A. (2000). “Protecting the Nation’s Critical Infrastructure: The Vulnerabil-
ity of U.S. Water Supply Systems.” Journal of Contingencies and Crisis Management, 8(2), 73.
Clark, R. M., Geldreich, E. E., Fox, K. R., Rice, E. W., Johnson, C. W., Goodrich, J. A., Barnick, J. A., and
Abdesaken, F. (1996). “Tracking a Salmonella Serovar Typhimurium Outbreak in Gideon, Missouri:
Role of Contaminant Propagation Modeling.” Journal Of Water Supply and Technology, 45(4), 171.
Craun, G., Swerdlow, D., Tauxe, R., Clark, R., Fox, K., Geldreich, E., Reasoner, D., and Rice, E. (1991).
“Prevention of Waterborne Cholera in the United States.” Journal of the American Water Works Associ-
ation, 83(11), 43.
Deininger, R. A. (2000). “Constituents of Concern. The Threat of Chemical and Biological Agents to Pub-
lic Water Supply Systems.” Appendix F in Pipeline Net User’s Guide, SAIC, McLean, Virginia.
Deininger, R. A., and Meier, P. G. (2000). “Sabotage of Public Water Supply Systems.” Security of Public
Water Supplies, Deininger, R. A., Literathy, P., and Bartram, J., eds, NATO Science Series 2, Environ-
ment - Volume 66, Kluwer Academic Publishers.
Denileon, G. P. (2001). “The Who, What, Why, and How of Counterterrorism Issues.” Journal of the Amer-
ican Water Works Association, 93(5), 78.
Fox, K. R., and Lytle, D. A. (1996). “Milwaukee’s Crypto Outbreak Investigation and Recommendations.”
Journal of the American Water Works Association, 88(9), 87.
Grayman, W. M., Deininger, R. A., and Males, R. M. (2002). Design Of Early Warning and Predictive
Source-Water Monitoring Systems. AWWA Research Foundataion, Denver, Colorado.
Grayman, W. M., and Males, R. M. (2001). “Risk-Based Modeling of Early Warning Systems for Pollution
Accidents.” Proceedings of the IWA 2nd World Water Congress, IWA, London, United Kingdom.
Grayman, W. M., Rossman, L. A., Arnold, C., Deininger, R. A., Smith, C., Smith, J. F., Schnipke, R.
(2000). Water Quality Modeling of Distribution System Storage Facilities. AWWA Research Founda-
tion, Denver, Colorado.
Haestad Methods, Inc. (2002). Proceedings of the Water Security Summit. Haestad Press, Waterbury, Con-
necticut.
Harding, B. L., and Walski, T. M. (2000). “Long Time-Series Simulation of Water Quality in Distribution
Systems.” Journal of Water Resources Planning and Management, ASCE, 126(4), 1199.
Harr, J. (1995). A Civil Action. Vintage Books, New York, New York.
Hickman, D. C. (1999). “A Chemical and Biological Warfare Threat: USAF Water Systems at Risk.” Coun-
terproliferation Paper No. 3, Maxwell Air Force Base, USAF Counterproliferation Center, http://
www.au.af.mil/au/awc/awcgate/cpc-pubs/hickman.pdf.
Hoover, J. E. (1941). “Water Supply Facilities and National Defense.” Journal of the American Water
Works Association, 33(11), 1861-1865.
Murphy, P. J. (1986). Water Distribution in Woburn, Massachusetts. University of Massachusetts, Amherst,
Massachusetts.
Sandia National Laboratories (2001). “Water Infrastructure Security Critical Infrastructure Protection.”
Webcast presented by AwwaRF, http://www.awwarf.com/whatsnew.html.
Sobsey, M. D. (1999). “Methods to Identify and Detect Contaminants in Drinking Water.” Identifying
Future Drinking Water Contaminates, National Academy Press, Washington, D.C.
Discussion Topics and Problems 523
Read the chapter and complete the problems. Submit your work to Haestad Methods
and earn up to 11.0 CEUs. See Continuing Education Units on page xxix for more
information, or visit www.haestad.com/awdm-ceus/.
11.1 The source (node A) in a distribution system has become contaminated and you have been asked to
determine when the contamination will reach a hospital located at node B. You have a steady-state
hydraulic model that has been calibrated for average day conditions that you feel is representative of
the current day.
A
1 2 6 14
3 5 7
4 8
9
11
10 12
B
13
The following table contains information on the network as represented under steady-state average
day conditions. Fill in the values for velocity and travel time in the table.
Diameter Length Discharge Velocity Travel Time
Pipe Label
(in.) (ft) (gpm) (ft/s) (hours)
P-1 8 8,000 500
P-2 8 8,000 300
P-3 8 8,000 200
P-4 8 8,000 180
P-5 6 8,000 50
P-6 8 8,000 240
P-7 8 8,000 40
P-8 8 8,000 220
P-9 8 4,000 240
P-10 6 4,000 120
P-11 6 4,000 120
P-12 6 4,000 100
P-13 6 4,000 100
P-14 8 4,000 200
524 Water System Security Chapter 11
a) What is the shortest travel time and longest travel time between nodes A and B?
b) Is it reasonable to expect that flows will remain relatively constant over the time it takes for the
contaminant to travel from node A to B?
c) What is likely to happen when the tank switches from the fill cycle represented in the diagram to
a draw cycle?
d) Based on your analysis do you feel that the use of a steady-state model is reasonable or should
you use an EPS hydraulic and water quality model to calculate travel times?
11.2 You are conducting a vulnerability analysis of a water system and want to determine the potential
impacts of a particular toxic substance if it was added to the city’s water supply. The city water sys-
tem serves 100,000 people with a daily average water use of 400 liters per person. Assume that only
1 liter is actually consumed by the average person per day. The average lethal dose for this toxic
contaminant for a person is estimated to be 1 milligram over a course of a day. Assuming that the
substance is evenly mixed throughout the water supply, how much of the substance must be added to
reach the lethal level?
Is it reasonable to assume that the substance would be evenly distributed throughout the system?
What other factors should you consider in making a more accurate assessment of the vulnerability of
the water system to this substance?
11.3 Assume you are given an EPS model of the water distribution system in the following figure and you
are asked to investigate the consequence of contaminants being added at several locations (Prob11-
03.wcd). The model is currently set up to represent average day conditions with a repeating daily
pattern for 288 hours. The system is served by a well (represented as a constant inflow at J-13) and
by a pump from a surface water source (R-1). The pump is controlled by the water level in tank T-1.
Run the model for the following three situations to simulate the movement of the contaminant and
answer the corresponding questions.
Discussion Topics and Problems 525
a) A conservative substance is dumped into the tank where it mixes completely resulting in an ini-
tial concentration of 100 mg/L. If the substance is not detected and the system is operated nor-
mally, how long will it take for the concentration in the tank to drop by 90% to 10 mg/L? Do all
demand nodes receive contaminated water at some time?
b) A contaminant is added at the well (node J-13) at a high concentration (1,000 mg/L) from hour 6
to hour 7. Does the contaminant reach the tank? How much of the system is affected by the con-
taminant? How long does it take until the entire system is cleared of the contaminant?
c) A contaminant is pumped into the system at node J-5 for a 24-hour period starting at hour 6 at a
rate of 1 gpm with a concentration of 1,000 mg/L. Does the contaminant reach the tank? What is
the maximum concentration in the tank? How many nodes receive a concentration exceeding 1
mg/L at any time during the event? What demand node receives the highest concentration (aside
from node J-5)? When does the concentration drop below 1 mg/L throughout the entire system?