Shopping Cart

No products in the cart.

BSI PD IEC/TR 61850-90-1:2010

$215.11

Communication networks and systems for power utility automation – Use of IEC 61850 for the communication between substations

Published By Publication Date Number of Pages
BSI 2010 84
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This part of IEC 61850 provides a comprehensive overview on the different aspects that need to be considered while using IEC 61850 for information exchange between substations. In particular, this technical report

  • defines use cases that require an information exchange between substations;

  • describes the communication requirements;

  • gives guidelines for the communication services and communication architecture to be used;

  • defines data as a prerequisite for interoperable applications;

  • does not define implementations which guarantee interoperability between different IEDs;

  • describes the usage and enhancements of the configuration language SCL.

PDF Catalog

PDF Pages PDF Title
4 CONTENTS
7 FOREWORD
9 INTRODUCTION
10 1 Scope
2 Normative references
11 3 Terms and definitions
4 Abbreviated terms
12 5 Use cases
5.1 General
5.2 Distance line protection with permissive overreach tele-protection scheme
Figures
Figure 1 – Distance line protection with permissive overreach tele-protection scheme
15 5.3 Distance line protection with blocking tele-protection scheme
Figure 2 – Distance line protection with blocking tele-protection scheme
17 5.4 Directional comparison protection
18 Figure 3 – Directional comparison with permissive scheme
20 5.5 Transfer/Direct tripping
Figure 4 – Transfer/Direct tripping
22 5.6 Interlocking
Figure 5 – Interlocking – Interoperation
24 5.7 Multi-phase auto-reclosing application for parallel line systems
Figure 6 – Auto-reclosing
26 5.8 Current differential line protection
27 Figure 7 – Current differential line protection
30 5.9 Phase comparison protection
Figure 8 – Phase comparison protection
Figure 9 – Principle to detect internal fault by phase comparison
33 5.10 Other applications
Figure 10 – Fault locator system (2, 3 terminals)
35 Figure 11 – Example of a system integrity protection scheme
38 Figure 12 – Real time predictive type generator shedding system
41 Figure 13 – Out-of-step detection
43 6 Communication requirements for substation-to-substation communication
6.1 General issues
44 Figure 14 – Logical interfaces between substation A and substation B
Tables
Table 1 – Grouping of protection and control interfaces
45 6.2 Functions based on substation-substation communication
Table 2 – Protection functions using substation-substation communication
46 6.3 Message performance requirements
Table 3 – Control functions using substation-substation communication
47 Figure 15 – Transfer time for binary and other signals over a serial connection
Figure 16 – Transfer time for binary signal with conventional output and input relays
48 Figure 17 – Definition of transfer time t for binary signals in case of line protection
Figure 18 – Definition of transfer time t over serial link in case of line protection
49 6.4 The introduction and use of message performance classes
52 Table 4 – Change of transfer time and synchronisation method
Table 5 – Performance classes for time tagging of events
Table 6 – Time performance classes for instrument transformer synchronisation
53 6.5 General requirements for data integrity
6.6 Requirements for teleprotection – Reliability (security and dependability)
Table 7 – The bit error rate as indication for communication quality
54 7 Considerations on security and dependability issues when using Ethernet networks
7.1 General
7.2 Security of traffic
55 7.3 Dependability of traffic
7.4 Avoiding GOOSE packets flooding the WAN
56 7.5 Summary on recommendations for using Ethernet for communication between substations
57 7.6 Useful features of some Ethernet telecommunications networks
8 Communication aspects
8.1 Services
8.2 Communication architecture
58 Figure 19 – Basic SS-to-SS communication structure
59 Figure 20 – SS-to-SS communication via tunnel
60 9 Modelling
9.1 General architecture
Figure 21 – SS-to-SS communication via proxy gateway
61 9.2 Communication interface ITPC
Figure 22 – Allocation of the LN ITPC representing the communication channel and the LNs providing the data to be exchanged between substations
62 Table 8 – Logical node ITPC
63 9.3 Communication-aided protection schemes and direct tripping
Figure 23 – Protection application example for permissive underreach distance teleprotection scheme and appropriate logical node modelling
64 9.4 Differential protection schemes
Table 9 – Logical node PSCH
65 Figure 24 – Communication system based on current system
Figure 25 – Communication system based on future system
66 Figure 26 – Proposed 2-terminal current differential feeder protection relay model
Figure 27 – Proposed 3-terminal current differential feeder protection relay model
67 Table 10 – Logical node RMXU
68 10 Configuration aspects
10.1 General
10.2 Direct communication link
Table 11 – Sampled value (SV) format definition
69 Figure 28 – SCD files and SED region for SS-to-SS communication
70 Figure 29 – Enhanced engineering process
71 Table 12 – IED engineering control types
72 Figure 30 – IED states when exchanging SED files
79 10.3 Tele-protection equipment between substations
80 Figure 31 – Proxy gateway method (AA1F3, AA2F3 are Proxy gateways)
81 Bibliography
BSI PD IEC/TR 61850-90-1:2010
$215.11