Shopping Cart

No products in the cart.

BS EN 61850-5:2013

$256.21

Communication networks and systems for power utility automation – Communication requirements for functions and device models

Published By Publication Date Number of Pages
BSI 2013 148
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

IEC 61850-5:2013 applies to power utility automation systems with the core part of substation automation systems (SAS); it standardizes the communication between intelligent electronic devices (IEDs) and defines the related system requirements to be supported. The major technical changes with regard to the previous edition are as follows: – extension from substation automation systems to utility automation systems; – inclusion of interfaces for communication between substations; – requirements from communication beyond the boundary of the substation.

PDF Catalog

PDF Pages PDF Title
6 English
CONTENTS
11 INTRODUCTION
13 1 Scope
2 Normative references
14 3 Terms and definitions
3.1 General
16 3.2 Connections
17 3.3 Relations between IEDs
3.4 Substation structures
18 3.5 Power utility automation functions at different levels
19 3.6 Miscellaneous
4 Abbreviations
5 Power utility automation functions
5.1 General
20 5.2 Example substation automation system
5.2.1 General
5.2.2 Logical allocation of functions and interfaces
21 Figure 2 – Levels and logical interfaces in substation automation systems
22 5.2.3 The physical allocation of functions and interfaces
5.2.4 The role of interfaces
23 5.3 Other application examples
5.3.1 Substation – Substation
5.3.2 Substation – Network Control
5.3.3 Wind
5.3.4 Hydro
5.3.5 DER
6 Goal and requirements
6.1 Interoperability
24 6.2 Static design requirements
6.3 Dynamic interaction requirements
25 6.4 Response behaviour requirements
6.5 Approach to interoperability
26 6.6 Conformance test requirements
7 Categories of functions
7.1 General
7.2 System support functions
7.3 System configuration or maintenance functions
27 7.4 Operational or control functions
7.5 Bay local process automation functions
7.6 Distributed process automation functions
28 8 Function description and function requirements
8.1 Approach
29 8.2 Function description
8.3 The PICOM description
8.3.1 The PICOM approach
8.3.2 The content of PICOM description
8.3.3 Attributes of PICOMs
8.3.4 PICOM attributes to be covered by any message
30 8.3.5 PICOM attributes to be covered at configuration time only
8.3.6 PICOM attributes to be used for data flow calculations only
8.4 Logical node description
8.4.1 The logical node concept
31 8.4.2 Logical nodes and logical connections
32 8.4.3 Examples for decomposition of common functions into logical nodes
Figure 3 – The logical node and link concept (explanation see text)
33 8.5 List of logical nodes
8.5.1 Logical Node allocation and distributed functions
Figure 4 – Examples of the application of the logical node concept (explanation see text)
34 8.5.2 Explanation to tables
Figure 5 – Protection function consisting of 3 logical nodes
35 8.5.3 Protection
41 Figure 6 – The basic communication links of a logical node of main protection type
42 8.5.4 Logical nodes for protection related functions
44 8.5.5 Control
45 8.5.6 Interfaces, logging, and archiving
46 8.5.7 Automatic process control
47 8.5.8 Functional blocks
48 8.5.9 Metering and measurement
49 8.5.10 Power quality
50 8.5.11 Physical device and common data
8.6 LNs related to system services
8.6.1 System and device security
51 8.6.2 Switching devices
52 8.6.3 LN for supervision and monitoring
53 8.6.4 Instrument transformers
8.6.5 Position sensors
54 8.6.6 Material status sensors
8.6.7 Flow status sensors
8.6.8 Generic sensors
55 8.6.9 Power transformers
8.6.10 Further power system equipment
56 8.6.11 Generic process I/O
8.7 Mechanical non-electrical primary equipment
9 The application concept for logical nodes
9.1 Example out of the domain substation automation
9.2 Typical allocation and use of logical nodes
9.2.1 Free allocation of LNs
57 9.2.2 Station level
9.2.3 Bay level
9.2.4 Process/switchgear level
9.2.5 The use of generic logical nodes
9.3 Basic examples
Figure 7 – Decomposition of functions into interacting LNs on different levels: Examples for generic automatic function, breaker control function and voltage control function
58 9.4 Additional examples
Figure 8 – Decomposition of functions into interacting LN on different levels: Examples for generic function with telecontrol interface, protection function and measuring/metering function
Figure 9 – Example for control and protection LNs of a transformer bay combined in one physical device (some kind of maximum allocation)
59 Figure 10 – Example for interaction of LNs for switchgear control, interlocking, synchrocheck, autoreclosure and protection (Abbreviation for LN see above)
Figure 11 – Example for sequential interacting of LNs (local and remote) for a complex function like point-on-wave switching (Abbreviations for LN see above) – Sequence view
60 9.5 Modelling
9.5.1 Important remarks
9.5.2 Object classes and instances
9.5.3 Requirements and modelling
9.5.4 LN and modelling
Figure 12 – Circuit breaker controllable per phase (XCBR instances per phase) and instrument transformers with measuring units per phase (TCTR or TVTR per phase)
61 9.5.5 Use of LN for applications
10 System description and system requirements
10.1 Need for a formal system description
10.2 Requirements for logical node behaviour in the system
62 11 Performance requirements
11.1 Message performance requirements
11.1.1 Basic definitions and requirements
65 Figure 14 – Transfer time for binary signal with conventional output and input relays
66 Figure 15 – Definition of transfer time t for binary signals in case of line protection
Figure 16 – Definition of transfer time t overserial link in case of line protection
67 11.1.2 Message types and performance classes
68 11.1.3 Definition of transfer time and synchronization classes
69 Tables
Table 1 – Classes for transfer times
70 Table 2 – Time synchronization classes for IED synchronization
Table 3 – Application of time synchronization classes for time tagging or sampling
71 11.2 Messages types and performances classes
11.2.1 Type 1 – Fast messages (“Protection”)
11.2.2 Type 2 – Medium speed messages (“Automatics”)
72 11.2.3 Type 3 – Low speed messages (“Operator”)
11.2.4 Type 4 – Raw data messages (“Samples”)
11.2.5 Type 5 – File transfer functions
73 11.2.6 Type 6 – Command messages and file transfer with access control
11.3 Requirements for data and communication quality
11.3.1 General remarks
74 11.3.2 Data integrity
Table 4 – Data integrity classes
75 11.3.3 Reliability
Table 5 – Security classes
76 11.3.4 Availability
11.4 Requirements concerning the communication system
11.4.1 Communication failures
Table 6 – Dependability classes
77 11.4.2 Requirements for station and bay level communication
11.4.3 Requirements for process level communication
78 11.4.4 Requirements for recovery delay
11.4.5 Requirements for communication redundancy
11.5 System performance requirements
Table 7 – Requirements on recovery time (examples)
79 12 Additional requirements for the data model
12.1 Semantics
12.2 Logical and physical identification and addressing
12.3 Self-description
12.4 Administrative issues
80 Annex A (informative)Logical nodes and related PICOMs
Table A.1 – PICOM groups
81 Table A.2 – Logical node list
95 Annex B (informative)PICOM identification and message classification
96 Table B.1 – PICOM identification (Part 1)
97 Table B.2 – PICOM identification (Part 2)
98 Table B.3 – PICOM allocation (Part 1)
99 Table B.4 – PICOM allocation (Part 2)
101 Table B.5 – PICOM types
103 Annex C (informative)Communication optimization
104 Annex D (informative)Rules for function definition
106 Annex E (informative)Interaction of functions and logical nodes
107 Annex F (informative)Functions
131 Annex G (informative)Results from function description
Table G.1 – Function-function interaction (Part 1)
132 Table G.2 – Function-function interaction (Part 2)
133 Table G.3 – Function decomposition into logical nodes (Part 1)
134 Table G.4 – Function decomposition into logical nodes (Part 2)
135 Table G.5 – Function decomposition into logical nodes (Part 3)
136 Table G.6 – Function decomposition into logical nodes (Part 4)
137 Annex H (informative)Substation configurations
Figure H.1 – T1-1 Small size transmission substation (single busbar 132 kV with infeed from 220 kV)
Figure H.2 – D2-1 Medium size distribution substation (double busbar 22 kV with infeed from 69 kV)
Figure H.3 – T1-2 Small size transmission substation (1 1/2 breaker busbar at 110 kV)
138 Figure H.4 – T2-2 Large size transmission substation (ring bus at 526 kV, double busbar at 138 kV)
Table H.1 – Definition of the configuration of all substations evaluated
139 Figure H.5 – Substation of type T1-1 with allocation functions
140 Figure H.6 – Substation of type D2-1 with allocated functions
Figure H.7 – Substation of type T1-2 (functions allocated same as for T2-2 in Figure H.8)
141 Figure H.8 – Substation of type T2-2 with allocated functions
142 Annex I (informative)Examples for protection functions in compensated networks
Figure I.1 – The transient earth fault in a compensated network
144 Bibliography
BS EN 61850-5:2013
$256.21