Download presentation
Presentation is loading. Please wait.
Published byEdith Mosley Modified over 9 years ago
1
Copyright © SEL 2004 Protection for Abnormal System Conditions Presented at: Clemson Power Systems Conference 2005 March 10, 2005 E. O. Schweitzer Schweitzer Engineering Laboratories, Inc.
2
Overview Voltage stability Angle stability Wide-area measurement Line overload protection Communications security
3
August 14, 2003
4
Power System Challenges Load-generation separation Environmental restrictions (NIMBY) Limited network growth Network resource optimization Separate companies for G,T,D -> Voltage collapse, angle instability
5
Voltage (Load) Stability
6
Slow Fault Clearing Time Initiates Voltage Collapse
7
Reverse Zone 3 Element Operated During Low Voltage Conditions
8
Be Careful with Zone 3! Avoid them Use bus protection Breaker failure protection Line Thermal Protection Zone 3 is NOT Overload Protection! Block its response to load with Load Encroachment Elements
9
prevent false tripping under heavy load by blocking phase distance elements in defined load areas We Invented Load-Encroachment Elements to… R X
10
Model to Study Voltage Stability (Kundur, Power System Stability and Control)
11
V < 95% at Buses 8 and 9 are for Loss of Two Lines Definite-time elements would trip loads at both buses.
12
Inverse-Time Undervoltage Elements Shed Low-Voltage Loads First
13
Bus 8 Voltage recovers after Inverse Element drops Bus 9 load… without communications!
14
Tap Changers and Voltage Collapse As unregulated voltage goes down, tap changers raise regulated side. Reactive power demand increases. Unregulated voltage goes down some more. Tap changer reaches limit. Unregulated voltage goes further down. Better: return tap changers to neutral and block them when unreg voltage is low.
15
Voltage Phasors Determine System Power Flow
16
Real Power Transfer Depends on
17
Accelerating Power Changes Machine Kinetic Energy Swing Equation
18
System Swing
19
Event Capture From Aug. 14, 2003
20
Out-of-Step Detection Logic Avoids Zone 1 Tripping
21
Transmission Line Tripping During System Oscillation in Idaho
22
Thermal Overload Protection
23
Program a Thermal Model in SEL-421 Use Multiple Alarm and Trip Set Points Add Logic Conditions to Customize Application Initiate Actions Based on Alarm Stage
24
SEL-3010 Event Messenger Calls Out for Line Overload Line Thermal Overload Sag Risk SEL-3010 Calls System Operator SEL-3010 Event Messenger Communication Processor Receives Alert SEL-421 Alarms SEL Comm. Processor Forwards Message Line Overload On Highland Line !!!
25
Trip ONE end for overload! Use it as a capacitor for voltage support. Letting lines sag and fault on thermal overloads is dangerous. Waiting for a fault causes both ends to trip and is much more severe on stability.
26
Synchronized Phasor Measurements Provide a “Snapshot” of the Power System Using an Absolute Time Reference
27
Absolute Time Reference Across the Power System
28
Synchronized Phasor Measurement Applications Compare state estimator to synchrophasors Is system near stability limits? Wide Area Protection and Control Systems Verifiy polarity, ratio, and operation of instrument transformers All event recordings are synchronized to the microsecond, making analysis of event reports across the system easier! Simplifies analysis of major events because all phasors are on same reference.
29
Faster State Estimation With Synchronized Measurements 10 minutes0.1 second!
30
Potential SEL PMUs in US and Canada
31
Customer Testimonial Satendra said. “We were very excited about using the synchrophasor technology produced by Schweitzer Engineering Laboratories Inc. (SEL) and in the process ensured that Transend became the first Australian electricity supply utility to trial the SEL technology.”
32
Synchronized Data Collection and Local Storage
33
Data Alignment in Less Than 10 ms
34
Power System Real-Time Test Reveals Model – to – Measurement agreement of 0.05 degree !
35
SCADA Security Problems Utility Communication Systems Are Vulnerable to: unauthorized access intruder monitoring malicious attack These Vulnerabilities Can Result in: lost or manipulated data unauthorized breaker operation equipment damage
36
Vulnerable SCADA System
37
Defining the Electronic Perimeter latigidlatigid EMSICCP Operator Console Internet WAN latigid Communications Processor RTU Corporate LAN Secure LAN Electronic Security Perimeter
38
Encryption Encryption is a means of concealing information in a reversible manner.
39
Defensive Tools – Serial Encryption Device Uses Advanced Encryption Algorithm Standard (AES) with 128–bit key Multilevel Password Authentication Point-to-Point and Multidrop Ready Trusted Network Interface Insecure Network Interface
40
SEL-3021 Security Incorporates Strong Encryption Techniques (AES) Hides sensitive data in transit (passwords, metering data, etc.) Strong Session Authentication Need 128-bit system key to initiate a connection Message Replay Protection Previously transmitted messages cannot be resent to affect the same result (ex. Encrypted breaker operate frames)
41
SEL-3021 Benefits Designed for Low-Latency, Time-Critical SCADA Communication Retrofit “Bump-in-the-wire” Solution Federal Information Processing Standards – FIPS -140 Compliant Developed for Harsh Substation Environment
42
Secured SCADA System
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.