BSI PD IEC/TR 61850-90-1:2010
$215.11
Communication networks and systems for power utility automation – Use of IEC 61850 for the communication between substations
Published By | Publication Date | Number of Pages |
BSI | 2010 | 84 |
This part of IEC 61850 provides a comprehensive overview on the different aspects that need to be considered while using IEC 61850 for information exchange between substations. In particular, this technical report
-
defines use cases that require an information exchange between substations;
-
describes the communication requirements;
-
gives guidelines for the communication services and communication architecture to be used;
-
defines data as a prerequisite for interoperable applications;
-
does not define implementations which guarantee interoperability between different IEDs;
-
describes the usage and enhancements of the configuration language SCL.
PDF Catalog
PDF Pages | PDF Title |
---|---|
4 | CONTENTS |
7 | FOREWORD |
9 | INTRODUCTION |
10 | 1 Scope 2 Normative references |
11 | 3 Terms and definitions 4 Abbreviated terms |
12 | 5 Use cases 5.1 General 5.2 Distance line protection with permissive overreach tele-protection scheme Figures Figure 1 – Distance line protection with permissive overreach tele-protection scheme |
15 | 5.3 Distance line protection with blocking tele-protection scheme Figure 2 – Distance line protection with blocking tele-protection scheme |
17 | 5.4 Directional comparison protection |
18 | Figure 3 – Directional comparison with permissive scheme |
20 | 5.5 Transfer/Direct tripping Figure 4 – Transfer/Direct tripping |
22 | 5.6 Interlocking Figure 5 – Interlocking – Interoperation |
24 | 5.7 Multi-phase auto-reclosing application for parallel line systems Figure 6 – Auto-reclosing |
26 | 5.8 Current differential line protection |
27 | Figure 7 – Current differential line protection |
30 | 5.9 Phase comparison protection Figure 8 – Phase comparison protection Figure 9 – Principle to detect internal fault by phase comparison |
33 | 5.10 Other applications Figure 10 – Fault locator system (2, 3 terminals) |
35 | Figure 11 – Example of a system integrity protection scheme |
38 | Figure 12 – Real time predictive type generator shedding system |
41 | Figure 13 – Out-of-step detection |
43 | 6 Communication requirements for substation-to-substation communication 6.1 General issues |
44 | Figure 14 – Logical interfaces between substation A and substation B Tables Table 1 – Grouping of protection and control interfaces |
45 | 6.2 Functions based on substation-substation communication Table 2 – Protection functions using substation-substation communication |
46 | 6.3 Message performance requirements Table 3 – Control functions using substation-substation communication |
47 | Figure 15 – Transfer time for binary and other signals over a serial connection Figure 16 – Transfer time for binary signal with conventional output and input relays |
48 | Figure 17 – Definition of transfer time t for binary signals in case of line protection Figure 18 – Definition of transfer time t over serial link in case of line protection |
49 | 6.4 The introduction and use of message performance classes |
52 | Table 4 – Change of transfer time and synchronisation method Table 5 – Performance classes for time tagging of events Table 6 – Time performance classes for instrument transformer synchronisation |
53 | 6.5 General requirements for data integrity 6.6 Requirements for teleprotection – Reliability (security and dependability) Table 7 – The bit error rate as indication for communication quality |
54 | 7 Considerations on security and dependability issues when using Ethernet networks 7.1 General 7.2 Security of traffic |
55 | 7.3 Dependability of traffic 7.4 Avoiding GOOSE packets flooding the WAN |
56 | 7.5 Summary on recommendations for using Ethernet for communication between substations |
57 | 7.6 Useful features of some Ethernet telecommunications networks 8 Communication aspects 8.1 Services 8.2 Communication architecture |
58 | Figure 19 – Basic SS-to-SS communication structure |
59 | Figure 20 – SS-to-SS communication via tunnel |
60 | 9 Modelling 9.1 General architecture Figure 21 – SS-to-SS communication via proxy gateway |
61 | 9.2 Communication interface ITPC Figure 22 – Allocation of the LN ITPC representing the communication channel and the LNs providing the data to be exchanged between substations |
62 | Table 8 – Logical node ITPC |
63 | 9.3 Communication-aided protection schemes and direct tripping Figure 23 – Protection application example for permissive underreach distance teleprotection scheme and appropriate logical node modelling |
64 | 9.4 Differential protection schemes Table 9 – Logical node PSCH |
65 | Figure 24 – Communication system based on current system Figure 25 – Communication system based on future system |
66 | Figure 26 – Proposed 2-terminal current differential feeder protection relay model Figure 27 – Proposed 3-terminal current differential feeder protection relay model |
67 | Table 10 – Logical node RMXU |
68 | 10 Configuration aspects 10.1 General 10.2 Direct communication link Table 11 – Sampled value (SV) format definition |
69 | Figure 28 – SCD files and SED region for SS-to-SS communication |
70 | Figure 29 – Enhanced engineering process |
71 | Table 12 – IED engineering control types |
72 | Figure 30 – IED states when exchanging SED files |
79 | 10.3 Tele-protection equipment between substations |
80 | Figure 31 – Proxy gateway method (AA1F3, AA2F3 are Proxy gateways) |
81 | Bibliography |