BS EN 61850-5:2013
$256.21
Communication networks and systems for power utility automation – Communication requirements for functions and device models
Published By | Publication Date | Number of Pages |
BSI | 2013 | 148 |
IEC 61850-5:2013 applies to power utility automation systems with the core part of substation automation systems (SAS); it standardizes the communication between intelligent electronic devices (IEDs) and defines the related system requirements to be supported. The major technical changes with regard to the previous edition are as follows: – extension from substation automation systems to utility automation systems; – inclusion of interfaces for communication between substations; – requirements from communication beyond the boundary of the substation.
PDF Catalog
PDF Pages | PDF Title |
---|---|
6 | English CONTENTS |
11 | INTRODUCTION |
13 | 1 Scope 2 Normative references |
14 | 3 Terms and definitions 3.1 General |
16 | 3.2 Connections |
17 | 3.3 Relations between IEDs 3.4 Substation structures |
18 | 3.5 Power utility automation functions at different levels |
19 | 3.6 Miscellaneous 4 Abbreviations 5 Power utility automation functions 5.1 General |
20 | 5.2 Example substation automation system 5.2.1 General 5.2.2 Logical allocation of functions and interfaces |
21 | Figure 2 – Levels and logical interfaces in substation automation systems |
22 | 5.2.3 The physical allocation of functions and interfaces 5.2.4 The role of interfaces |
23 | 5.3 Other application examples 5.3.1 Substation – Substation 5.3.2 Substation – Network Control 5.3.3 Wind 5.3.4 Hydro 5.3.5 DER 6 Goal and requirements 6.1 Interoperability |
24 | 6.2 Static design requirements 6.3 Dynamic interaction requirements |
25 | 6.4 Response behaviour requirements 6.5 Approach to interoperability |
26 | 6.6 Conformance test requirements 7 Categories of functions 7.1 General 7.2 System support functions 7.3 System configuration or maintenance functions |
27 | 7.4 Operational or control functions 7.5 Bay local process automation functions 7.6 Distributed process automation functions |
28 | 8 Function description and function requirements 8.1 Approach |
29 | 8.2 Function description 8.3 The PICOM description 8.3.1 The PICOM approach 8.3.2 The content of PICOM description 8.3.3 Attributes of PICOMs 8.3.4 PICOM attributes to be covered by any message |
30 | 8.3.5 PICOM attributes to be covered at configuration time only 8.3.6 PICOM attributes to be used for data flow calculations only 8.4 Logical node description 8.4.1 The logical node concept |
31 | 8.4.2 Logical nodes and logical connections |
32 | 8.4.3 Examples for decomposition of common functions into logical nodes Figure 3 – The logical node and link concept (explanation see text) |
33 | 8.5 List of logical nodes 8.5.1 Logical Node allocation and distributed functions Figure 4 – Examples of the application of the logical node concept (explanation see text) |
34 | 8.5.2 Explanation to tables Figure 5 – Protection function consisting of 3 logical nodes |
35 | 8.5.3 Protection |
41 | Figure 6 – The basic communication links of a logical node of main protection type |
42 | 8.5.4 Logical nodes for protection related functions |
44 | 8.5.5 Control |
45 | 8.5.6 Interfaces, logging, and archiving |
46 | 8.5.7 Automatic process control |
47 | 8.5.8 Functional blocks |
48 | 8.5.9 Metering and measurement |
49 | 8.5.10 Power quality |
50 | 8.5.11 Physical device and common data 8.6 LNs related to system services 8.6.1 System and device security |
51 | 8.6.2 Switching devices |
52 | 8.6.3 LN for supervision and monitoring |
53 | 8.6.4 Instrument transformers 8.6.5 Position sensors |
54 | 8.6.6 Material status sensors 8.6.7 Flow status sensors 8.6.8 Generic sensors |
55 | 8.6.9 Power transformers 8.6.10 Further power system equipment |
56 | 8.6.11 Generic process I/O 8.7 Mechanical non-electrical primary equipment 9 The application concept for logical nodes 9.1 Example out of the domain substation automation 9.2 Typical allocation and use of logical nodes 9.2.1 Free allocation of LNs |
57 | 9.2.2 Station level 9.2.3 Bay level 9.2.4 Process/switchgear level 9.2.5 The use of generic logical nodes 9.3 Basic examples Figure 7 – Decomposition of functions into interacting LNs on different levels: Examples for generic automatic function, breaker control function and voltage control function |
58 | 9.4 Additional examples Figure 8 – Decomposition of functions into interacting LN on different levels: Examples for generic function with telecontrol interface, protection function and measuring/metering function Figure 9 – Example for control and protection LNs of a transformer bay combined in one physical device (some kind of maximum allocation) |
59 | Figure 10 – Example for interaction of LNs for switchgear control, interlocking, synchrocheck, autoreclosure and protection (Abbreviation for LN see above) Figure 11 – Example for sequential interacting of LNs (local and remote) for a complex function like point-on-wave switching (Abbreviations for LN see above) – Sequence view |
60 | 9.5 Modelling 9.5.1 Important remarks 9.5.2 Object classes and instances 9.5.3 Requirements and modelling 9.5.4 LN and modelling Figure 12 – Circuit breaker controllable per phase (XCBR instances per phase) and instrument transformers with measuring units per phase (TCTR or TVTR per phase) |
61 | 9.5.5 Use of LN for applications 10 System description and system requirements 10.1 Need for a formal system description 10.2 Requirements for logical node behaviour in the system |
62 | 11 Performance requirements 11.1 Message performance requirements 11.1.1 Basic definitions and requirements |
65 | Figure 14 – Transfer time for binary signal with conventional output and input relays |
66 | Figure 15 – Definition of transfer time t for binary signals in case of line protection Figure 16 – Definition of transfer time t overserial link in case of line protection |
67 | 11.1.2 Message types and performance classes |
68 | 11.1.3 Definition of transfer time and synchronization classes |
69 | Tables Table 1 – Classes for transfer times |
70 | Table 2 – Time synchronization classes for IED synchronization Table 3 – Application of time synchronization classes for time tagging or sampling |
71 | 11.2 Messages types and performances classes 11.2.1 Type 1 – Fast messages (“Protection”) 11.2.2 Type 2 – Medium speed messages (“Automatics”) |
72 | 11.2.3 Type 3 – Low speed messages (“Operator”) 11.2.4 Type 4 – Raw data messages (“Samples”) 11.2.5 Type 5 – File transfer functions |
73 | 11.2.6 Type 6 – Command messages and file transfer with access control 11.3 Requirements for data and communication quality 11.3.1 General remarks |
74 | 11.3.2 Data integrity Table 4 – Data integrity classes |
75 | 11.3.3 Reliability Table 5 – Security classes |
76 | 11.3.4 Availability 11.4 Requirements concerning the communication system 11.4.1 Communication failures Table 6 – Dependability classes |
77 | 11.4.2 Requirements for station and bay level communication 11.4.3 Requirements for process level communication |
78 | 11.4.4 Requirements for recovery delay 11.4.5 Requirements for communication redundancy 11.5 System performance requirements Table 7 – Requirements on recovery time (examples) |
79 | 12 Additional requirements for the data model 12.1 Semantics 12.2 Logical and physical identification and addressing 12.3 Self-description 12.4 Administrative issues |
80 | Annex A (informative)Logical nodes and related PICOMs Table A.1 – PICOM groups |
81 | Table A.2 – Logical node list |
95 | Annex B (informative)PICOM identification and message classification |
96 | Table B.1 – PICOM identification (Part 1) |
97 | Table B.2 – PICOM identification (Part 2) |
98 | Table B.3 – PICOM allocation (Part 1) |
99 | Table B.4 – PICOM allocation (Part 2) |
101 | Table B.5 – PICOM types |
103 | Annex C (informative)Communication optimization |
104 | Annex D (informative)Rules for function definition |
106 | Annex E (informative)Interaction of functions and logical nodes |
107 | Annex F (informative)Functions |
131 | Annex G (informative)Results from function description Table G.1 – Function-function interaction (Part 1) |
132 | Table G.2 – Function-function interaction (Part 2) |
133 | Table G.3 – Function decomposition into logical nodes (Part 1) |
134 | Table G.4 – Function decomposition into logical nodes (Part 2) |
135 | Table G.5 – Function decomposition into logical nodes (Part 3) |
136 | Table G.6 – Function decomposition into logical nodes (Part 4) |
137 | Annex H (informative)Substation configurations Figure H.1 – T1-1 Small size transmission substation (single busbar 132 kV with infeed from 220 kV) Figure H.2 – D2-1 Medium size distribution substation (double busbar 22 kV with infeed from 69 kV) Figure H.3 – T1-2 Small size transmission substation (1 1/2 breaker busbar at 110 kV) |
138 | Figure H.4 – T2-2 Large size transmission substation (ring bus at 526 kV, double busbar at 138 kV) Table H.1 – Definition of the configuration of all substations evaluated |
139 | Figure H.5 – Substation of type T1-1 with allocation functions |
140 | Figure H.6 – Substation of type D2-1 with allocated functions Figure H.7 – Substation of type T1-2 (functions allocated same as for T2-2 in Figure H.8) |
141 | Figure H.8 – Substation of type T2-2 with allocated functions |
142 | Annex I (informative)Examples for protection functions in compensated networks Figure I.1 – The transient earth fault in a compensated network |
144 | Bibliography |