专利摘要:
Disclosed are adaptive communication assisted protection and control. Local intelligent electronic devices (lEDs) associated with local switching devices and having unique IDs may transmit switch status and unique IDs to an area lED. The area lED may calculate topology using switch status, and provide control information to local lEDs using the topology. The area lED may communicate the unique ID of the local lED calculated to be immediately upstream of each local lED and, upon detection of a fault, the local lEDs may send blocking signals that include the received unique ID of the lED immediately upstream therefrom. The area lED may communicate control commands that include the unique IDs and control commands for the local lEDs to take the control action. Upon matching of the unique ID in the control command with its own unique ID, the local lEDs may take the control action and transmit remaining actions.
公开号:ES2556145A2
申请号:ES201590107
申请日:2014-03-26
公开日:2016-01-13
发明作者:F. ALLEN William;Dennis Haes;J. FAZZARI Bryan
申请人:Schweitzer Engineering Laboratories Inc;
IPC主号:
专利说明:

5
10
fifteen
twenty
25
30
35
DESCRIPTION
Protection and control assisted by adaptive topology of electric power supply systems
Technical field
This disclosure refers to systems and procedures to inform local protection devices and control of the relevant aspects of the topology of neighboring energy systems, and to adapt the behavior of the local device as it participates in a protection communication scheme or assisted control . The relevant aspects of the topology may be related to other system conditions, such as load levels, voltage levels and equipment availability.
Federally sponsored research or development
The present invention was made with the support of the US government, under the contract N °: DOE-OE0000280. The US government may have certain rights over the present invention.
Brief description of the drawings
Non-limiting or exhaustive embodiments of the disclosure are described, including various embodiments of the disclosure with reference to the figures, in which:
Figure 1 illustrates a simplified unilinear diagram of an electric power supply system and associated FDI, consistent with the various embodiments disclosed herein.
Figure 2 illustrates a simplified unilinear diagram of an electrical power supply system that includes a permanent failure in the system that causes the upstream recloser to open and close, consistent with various embodiments disclosed herein.
Figure 3A illustrates an example of a distribution feeder segment that includes a number of reclosing devices.
5
10
fifteen
twenty
25
30
35
Figure 3B illustrates a distribution feeder segment illustrating that the trip blocking signals, received from certain reclosers, are blocked.
Figure 4 illustrates a block diagram of a system that can be used to implement certain embodiments of the systems and procedures disclosed herein.
Figure 5A illustrates a simplified unilinear diagram of an electrical power supply system that includes a permanent system failure.
Figure 5B illustrates the system of Figure 5A with a different location of the open connection switch and a fault in the opposite feeder near the open connection switch.
Figure 6 illustrates a protection and control procedure assisted by adaptive communication with an extended area context, consistent with the present disclosure.
Figure 7 illustrates a simplified unilinear diagram of an electrical power supply system that includes an overload condition.
Figure 8 illustrates a protection and control procedure assisted by adaptive communication with an extended area context, consistent with the present disclosure.
Detailed description
Electric power supply systems may include equipment for generating, transmitting and distributing electrical energy, and loads that produce and consume electrical energy. For example, such systems include various types of equipment, such as generators, transformers, circuit breakers, switches, distribution lines, transmission lines, buses, capacitor banks, reactors, loads and the like. One purpose of electric power supply systems is to generate and supply usable electric power to a user or final load. Often, the generation sites are located at great distances from a user or final load. The generated electrical energy is usually of a relatively low voltage, but is transformed into a relatively high voltage before entering a transmission system. The voltage is
5
10
fifteen
twenty
25
30
35
again reduced for the supply system, and often reduced once more before the final supply to the user or final load. Electric power can be monitored and controlled at various stages in the supply system. Intelligent electronic devices (IED) are often used to collect information from the electric power system, make control and / or protection decisions, take control, automation and / or protection actions, and / or to monitor the power supply system electric
The configuration of the electric power supply system (also mentioned as topology or context) can be modified due to the protection or control actions undertaken by the IEDs. After such a modification, it may be difficult to maximize the effectiveness of subsequent protection, unless the protection and control system is aware of topology modifications. For example, volt / VAR control can be used to achieve various different objectives, including voltage profile optimization, conservation voltage reduction (CVR) and power factor correction; however, its application may be somewhat rigid in that it tends to be unable to adapt to changes in feeder length or, worse, its configurations are unable to manipulate topology changes that cause a device to belong substantially To another feeder. Similarly, a protection action can modify the topology, making subsequent restoration actions less effective, due to insufficient margin to restore power, or by closing switching devices that do not restore power to the greatest number of customers.
These automated changes in the system topology also cause problems with trigger blocking schemes, such as a blocking scheme based on a Generic Object Oriented Substation Event (based on GOOSE) IEC 61850. This disclosure describes how these two technologies They have been integrated into an automated fault detection, isolation and restoration (FDIR) scheme to provide both an effective volt / VAR control system and a high-speed dynamic trigger lock scheme, applicable throughout the system, which can Be flexible and continue to function as the system topology changes.
This disclosure refers to systems and procedures to inform local protection and control devices of relevant aspects of the topology of neighboring energy systems and to adapt the behavior of the local device as it participates in a
5
10
fifteen
twenty
25
30
35
protection scheme or assisted communication control. The relevant aspects of the topology may refer to other system conditions such as load levels, voltage levels and equipment availability. Various systems and procedures, consistent with the present disclosure, may allow the extended area context (e.g., topology) to inform local decisions, with limited degradation of the overall speed of the system response. Each local IED can make a comparison of whether or not the device identifier included in a message is equal to the identifier of the local IED.
The embodiments of the disclosure will be better understood with reference to the drawings, in which equal parts are designated with equal numbers throughout their length. It will be readily understood that the components of the disclosed embodiments, as generally described and illustrated in the figures herein, could be arranged and designed in a wide variety of different configurations. Therefore, the following detailed description of the embodiments of the disclosure systems and procedures is not intended to limit the scope of the disclosure, as claimed, but is merely representative of possible embodiments of the disclosure. In addition, the stages of a procedure should not necessarily be executed in any specific order, or even sequentially, nor should the stages be executed only once, unless otherwise specified.
In some cases, well-known features, structures or operations are not shown or described in detail. In addition, the features, structures or operations described can be combined in any suitable manner in one or more embodiments. It will also be readily understood that the components of the embodiments, as generally described and illustrated in the figures herein, could be arranged and designed in a wide variety of different configurations.
Several aspects of the described embodiments will be illustrated as modules or software components. As used herein, a software module or component may include any type of computer instruction, or code executable by computer, located within a memory device, and / or transmitted as electronic signals by a system bus, or wired or wireless network. A software module or component, for example, can comprise one or more physical or logical blocks of computer instructions, which can be organized as a routine, a program, an object, a component, a data structure, etc., which perform one or more tasks or that
5
10
fifteen
twenty
25
30
35
implements specific types of abstract data.
In certain embodiments, a specific software module or component may comprise disparate instructions stored in different locations of a memory device, which jointly implement the described functionality of the module. Indeed, a module or component can comprise a single instruction or many instructions, and can be distributed among different different code segments, between different programs and between different memory devices. Some embodiments may be implemented in a distributed computing environment, where the tasks are performed by a remote processing device linked through a communications network. In a distributed computing environment, software modules or components may be located in local and / or remote memory storage devices. In addition, data linked or represented together in a database record may be resident in the same memory device, or between different memory devices, and may be linked together in fields of a record in a database on a network. .
The embodiments may be provided as a computer program product that includes a computer-readable medium that has stored in the same instructions that can be used to program a computer (or other electronic device) to perform the processes described herein. The machine-readable medium may include, but is not limited to, hard disk controllers, floppy disks, optical discs, CD-ROM, ROM, RAM, EPROM, EEPROM, magnetic or optical cards, solid state memory devices or other types of media readable by means / machines, suitable for storing electronic instructions.
Figure 1 illustrates a simplified unilinear diagram of an electric power supply system 100 and associated IEDs 104, 106, 108, 115 and 170, consistent with certain embodiments disclosed herein. System 100 includes several substations and IEDs 104, 106, 108, 115 and 170, configured to perform various functions. System 100 is provided for illustrative purposes and does not imply any specific provision or function required of any specific IED. In some embodiments, IEDs 104, 106, 108, 115 and 170 may be configured to monitor and communicate information, such as voltages, currents, equipment status, temperature, frequency, pressure, density, infrared absorption, radiofrequency information, pressures partial, viscosity, speed, rotating speed, mass, state of
5
10
fifteen
twenty
25
30
35
switching, valve status, circuit breaker status, tap status, meter readings and the like. In addition, IED 104, 106, 108, 115 and 170 can be configured to communicate calculations, such as phasors (which may or may not be synchronized as synchro-phasors), events, fault distances, differentials, impedances, reactances, frequency and Similar. IEDs 104, 106, 108, 115 and 170 can also communicate configuration information, IED identification information, communications information, status information, alarm information and the like. Information of the types listed above or, more generally, information about the status of monitored equipment, can generally be referred to herein as monitored system data.
In certain embodiments, IEDs 104, 106, 108, 115 and 170 can issue control instructions to the monitored equipment, in order to control various aspects related to the monitored equipment. For example, an IED (e.g., IED 106) may be in communication with a circuit breaker (e.g., switch 152), and may be able to send an instruction to open and / or close the circuit breaker, thus connecting or disconnecting a part of the system 100. In another example, an IED may be in communication with a recloser and be able to control reconnection operations. In another example, an IED may be in communication with a voltage regulator and be able to instruct the voltage regulator to increase or reduce the tap. In yet another example, an IED may be in communication with a capacitor bank, which may be selectively connected to an electrical power supply system to provide reactive support of energy and voltage. Information of the types listed above or, more generally, the information or instructions that direct an IED or other device to perform a certain action, may be mentioned as control instructions.
The electric power supply system 100, illustrated in Figure 1, may include a generation substation 111. Substation 111 may include generators 110 and 112, which are connected to a bus 118 through the elevator transformers 120 and 122 Bus 118 may be connected to bus 126 in substation 119 via transmission line 124. Although the equipment in substation 111 may be monitored and / or controlled by various IEDs, only a single IED 104 is shown. The IED 104 may be a transformer protection IED for transformer 120. IED 104 may be in communication with a common time source 188 which, as indicated below, may be distributed in system 100 using a communications network or using a universal time source, such as a global location system (GPS) or
5
10
fifteen
twenty
25
30
35
Similar.
The use of a common or universal time source can ensure that IEDs have a synchronized time signal that can be used to generate time-synchronized data, such as synchro-phasors.
Substation 119 may include a generator 114, which may be a distributed generator, and which may be connected to bus 126 through the elevator transformer 118. Bus 126 may be connected to a distribution bus 132 via a reducer transformer 130. Various distribution lines 136 and 134 may be connected to the distribution bus 132. Distribution line 136 may lead to a substation 141 where the line is monitored and / or controlled using IED 106, which can selectively open and close the switch. 152. Load 140 can be supplied from distribution line 136. In addition, reducing transformer 144 can be used to reduce a voltage for consumption by load 140.
The distribution line 134 can lead to the substation 151, and supply electric power to the bus 148. The bus 148 can also receive electric power from the distributed generator 116, by the transformer 150. The distribution line 158 can supply electric power from the bus 148 to load 138, and may also include reducing transformer 142. Circuit switch 160 can be used to selectively connect bus 148 with distribution line 134. IED 108 can be used to monitor and / or control the circuit breaker 160, as well as distribution line 158.
A central IED 170 may be in communication with various IEDs 104, 106, 108 and 115, using a data communications network. The IEDs 104, 106, 108 and 115 may be remote with respect to the central IED 170. The remote IEDs 104, 106, 108 and 115 may communicate by various means, such as direct communication from the IED 170, or over a network of extended area communications 162. IEDs 104, 106, 108, 115 and 170 may be communicatively linked to each other using a data communications network, and may also be communicatively linked to a central monitoring system, such as a system of Supervisory and data acquisition control (SCADA) 182, an information system (IS) 190 and / or an extended area situational control and perception system (WCSA) 180. The data communications network between IEDs 104, 106 , 108, 115 and 170 can use a wide variety of network technologies, and can comprise network devices such as modems, routers, firewalls, servers
5
10
fifteen
twenty
25
30
35
virtual private network and the like, which are not shown in Figure 1. IEDs 104, 106, 108 and 115 can be in communication using protection class communication, such as, for example, communication channels between high-speed peers .
The various IEDs in the system 100 can obtain electrical energy information from monitored equipment using potential transformers (PT) for voltage measurements (e.g., potential transformer 156), current transformers (CT) for current measurements (e.g., current transformer 154) and the like. PTs and CTs can include any device capable of providing outputs that can be used by IEDs to make potential and current measurements, and can include traditional PTs and CTs, optical PTs and CTs, Rogowski coils, Hall effect sensors and the like.
Each IED can be configured to access a source, or source, common time 188. The common time source 188 can be distributed via a communications network (using, for example, the IEEE-1588 protocol, the NTP protocol or the like), or obtained locally in each FDI. The common time source 188 may be a universal time, or time, such as that supplied using GPS, WWVB, WWV or similar satellites. A common time can be used to synchronize over time the measurements of the electric power system and / or in the calculation of synchro-phasors. The phasors calculated by the IEDs may include a time stamp that indicates a time at which the measurement was made.
The central IED 170 may also be in communication with a certain number of other devices or systems. Such devices or systems may include, for example a WCSA 180 system, a SCADA 182 system or a local Man-Machine Interface (HMI) 187. Local HMI 187 can be used to change settings, issue control instructions, extract an event report, extract data and the like. In some embodiments, the WCSA 180 system can receive and process time-aligned data, and can coordinate time-synchronized control actions at the highest level of the power supply system 100. Mass storage device 187 can store data referring to system 100 of the IED 104, 106, 108, 115 and 170.
The central IED 170 may also include a time entry, which can receive a time signal from a time source 186 of the central IED. The time source 186 of the central IED can also be used by the central IED 170 to seal the information and data with the time. Time synchronization can be useful for organizing data and taking
5
10
fifteen
twenty
25
30
35
of real-time decisions, as well as in post-event analysis. Time synchronization can also be applied to network communications. Common time source 188 may be any time source that is an acceptable form of time synchronization, including, but not limited to, a temperature-compensated temperature controlled crystal oscillator, Rubidium and Cesium oscillators, with or without digital loops phase locked, micro-electromechanical systems technology (MEMS), which transfers the resonant circuits between the electronic and mechanical domains, or a GPS receiver with time decoding. In the absence of a common time source available to all IEDs, central IED 170 can serve as a common time source, distributing a synchronization signal over time.
The information system 190 generally includes hardware and software to enable network communication, network security, user administration, Internet and intranet administration, remote network access and the like. The information system 190 can generate information about the network to maintain and sustain a reliable, quality and secure communications network, executing real-time business logic about network security events, performing network diagnostics, optimizing network performance. and the like The embodiments illustrated in Figure 1 are configured in a star topology with the IED 170 at its center; however, other topologies are also contemplated. For example, IEDs 104, 106, 108, 115 and 170 can be communicatively coupled to each other in a peer-to-peer arrangement. In addition, a ring topology can be used to connect the various IEDs with each other and / or with other systems, such as a SCADA system or a WCSA 140 system.
Figure 2 illustrates a simplified unilinear diagram of an electric power supply system 200 that includes a permanent failure 250 in the system 200 that causes the upstream reconnect 202 to open and close. System 200 includes three power supplies 222, 224 and 226, each connected using switching devices (such as, for example, reclosers or circuit breakers) 202, 204, 206 and 208. Initially (before failure), the switching devices 202 and 204 are closed, while switching devices 206 and 208 are open. All downstream line segments are energy deprived. Following the occurrence of the failure 250, the switching device 202 is opened due to fault protection, to isolate the fault 250. The electricity is then restored to the down-line customers who experienced a blackout, but whose line segment did not fail, closing the switching device 206.
5
10
fifteen
twenty
25
30
35
By complementing the responses shown in Figure 2, a distributed control scheme or a central control scheme can be implemented. Distributed control places the decision-making algorithm in reclosing or switching cabinets and substations, usually organizing them in small workgroups that provide coordinated switching. Distributed control can support a robust system, in the sense that if one group loses communication with individual members, it does not affect the other groups in the system; however, distributed control may require a reliable communication link between peers and may be limited in the ability to implement control actions based on the condition of the system as a whole.
The presence of the FDIR system in the distribution network introduces the possibility that feeders can change length and complexity in a large number of variations. Consequently, an adaptive volt / VAR control system can be configured to take these changes into account. Taking these changes into account may involve the modification of the reference point and other modifications to the control parameters.
According to certain embodiments, in order to coordinate all the devices in a feeder, a tripping block scheme may extend beyond the fence of the substation, and to the recloser cabinets. According to some embodiments, additional logic controllers may be placed in the vicinity of the reclosers. Each logical controller can use an IEC GOOSE 61850 to multi-broadcast its blocking signal over a network of Ethernet compartmentalized in virtual local area networks (VLANs). GOOSE is a Level 2 multi-broadcast protocol that uses the extended Ethernet message frame. This extended message frame allows a VLAN Identification (ID) to be sent along with each message. The VLAN Identification is read by Ethernet switches, which then confine the message to a defined network area. This reduces unnecessary traffic throughout the network. GOOSE messages can also be prioritized by an Ethernet switch, which allows them to be placed in a high priority queue, omitting any temporary storage of lower priority that may be taking place on any given port. Additionally, because they are full-duplex Layer 2 communications, GOOSE messages do not experience delay due to retransmission after an Ethernet collision (there is no Ethernet collision).
Figure 3A illustrates an example of a distribution feeder segment 300 that includes
5
10
fifteen
twenty
25
30
35
a certain number of devices 304, 306, 308, 310, 312 adjacent to recloser A 302. Reconnectors 302 to 312 may include a switching device (such as, for example, a recloser) in communication with a local IED (such as , for example, a recloser controller) that includes a logical controller. The arrows in Figure 3A indicate that the logic controller in recloser A 302 should be passing blocking signals from reclosers D 308, E 310 and F 312, but disengaging any blocking signal received from reclosers B 304 and C 306. Figure 3B illustrates a distribution feeder segment 350 that includes a certain number of devices 354, 356, 358, 360 and 362 adjacent to Recloser A 352. Figure 3B illustrates that the trip blocking signals received from the reclosers D 358, E 360 and F 362 are passed to the recloser control 352. If the energy flow is reversed, the trip blocking signals from the reclosers B 354 and C 356 should be passed, while the signals from the reclosers D 358 , E 360 and F 362 should be ignored.
According to some embodiments, each recloser location may have a unique identifier assigned. The unique identifier may correspond to a geographical location or to another identifier (e.g., a serial number, a MAC address or the like). The identifier can be set in the logic controller configurations within each cabinet, and associated with each reclosing device in the FDIR configuration.
The FDIR system can periodically recalculate the topology. According to some embodiments, recalculation can occur every few seconds. According to other embodiments, the recalculation period may be shorter or longer. If the topology has changed, an update can be sent to each affected device. The message can identify the unique identifier of the nearest protection device upstream in the new feeder topology. According to some embodiments, this message may be an analog message. A set of GOOSE data, transmitted by each logical controller, can contain an analog and a digital object. The digital object may be the value of the blocking signal itself. The analog object is set as the unique identifier of the up-line recloser, as received by the FDIR system. When a logic controller receives a blocking signal, it can be configured to compare the value of the analog object in the received data set with its own unique identifier. If the two values are equivalent, the blocking signal is sent to the recloser control.
Instead of creating a series of logical rules if-then for each recloser, which are rigid and do not adapt well to changes or aggregates of lines or devices, the
5
10
fifteen
twenty
25
30
35
FDIR system can rely on real-time knowledge of the topology of the distribution system.
Figure 4 illustrates a block diagram of a system 400 that can be used when implementing certain embodiments of the systems and procedures disclosed herein. System 400 may include, among other things, one or more processors 402, random access memory (RAM) 404, a communication interface 406, a user interface 408 and a non-transient computer-readable storage medium 410. processor 402, RAM 404, communication interface 406, user interface 408 and computer readable storage medium 410 can be communicatively coupled to each other via a common data bus 412. In some embodiments, the various system components 400 can be implemented using hardware, software, firmware and / or any combination thereof.
The user interface 408 can include any number of devices that allow a user to interact with the system 400. For example, the user interface 408 can be used to display an interactive interface to a user. The user interface 408 can be an individual interface system communicatively coupled with the system 400 or, alternatively, it can be an integrated system, such as a display interface. The user interface 408 can also include any number of other input devices, including, for example, keyboard, trackball and / or pointer devices.
The communication interface 406 may be any interface capable of communicating with other computer systems, peripheral devices and / or other equipment communicatively coupled with the system 400. For example, the communication interface 406 may allow the system 400 to communicate with other computer systems. computer (eg, computer systems associated with external databases, a LAN, a WAN and / or Internet), supporting the transfer as well as the reception of data from such systems. The communications interface 406 may include, among other things, a modem, a satellite data transmission system, an Ethernet card and / or any other suitable device that allows the system 400 to connect to databases and networks, such as LAN, MAN, WAN and Internet.
Processor 402 may include one or more general purpose processors, application specific processors, programmable microprocessors, micro-
5
10
fifteen
twenty
25
30
35
controllers, digital signal processors, FPGA, other customizable or programmable processing devices and / or any other device, or any device arrangement, that are capable of implementing the systems and procedures disclosed herein.
The processor 402 may be configured to execute computer-readable instructions, stored in the non-transient computer-readable storage medium 410. The computer-readable storage medium 410 may store other data or information, as desired. In some embodiments, the computer readable instructions may include the 414 computer executable functional modules. For example, the computer readable instructions may include one or more functional modules configured to implement all, or part of, the functionality of the systems and procedures. described above. Specific functional models that can be stored in computer readable storage medium 410 include a module for temporary recording of voltage and current characteristics, a module for estimating massive activity parameters, a module for estimating mass transfer coefficients , a cell voltage estimation module, a battery control module and a voltage suppression module.
The system and procedures described herein may be implemented independently of the programming language used to create the computer readable instructions and / or any operating system operating in the system 400. For example, the computer readable instructions may be written in any suitable programming language, examples of which include, but are not limited to, C, C ++, Visual C ++ and / or Visual Basic, Java, Peri or any other appropriate programming language. In addition, the computer-readable instructions and / or the functional modules may be in the form of a collection of individual programs or modules, and / or a program module within a larger program, or a part of a program module. The data processing by the system 400 may be in response to user commands, to results of the prior processing or to a request made by another processing machine. It will be appreciated that the 400 system can use any suitable operating system, including, for example, Unix, DOS, Android, Symbian, Windows, OS, OSX, Linux and / or the like.
Figure 5A illustrates an electric power supply system 500 that includes a set of two radial feeders; each consisting of multiple switches
5
10
fifteen
twenty
25
30
35
closed. The system includes two sources 540 and 542 that can be connected using the feeders. A certain number of switching devices 502, 504, 506, 508, 510, 512 and 514 are placed on the feeders for the selective opening and closing thereof. Switching devices 502 to 508 and 512 to 514 are initially closed, while switching device 510 is initially open, resulting in the two radial feeders. Each switching device is in communication with an individual local IED 522, 524, 526, 528, 530, 532 and 534, as illustrated. An area IED 536 is in communication with local IEDs 522 to 534. Local IEDs 522 to 534 can be in communication using protection class communications, such as, for example, high-speed peer communications. Local IEDs 522 to 534 may be in communication with the area IED 536 using SCADA class communications. The system uses area IED 536 to track feeder topology and other extended area conditions. Each local IED 522 to 534 can disseminate small messages to neighboring local IEDs 522 to 534, through a communication network. Examples of such a network include the IED-61850 GOOSE and other well established communication procedures, usually used for the application of communication-assisted protection. The present disclosure refers to this type of network as a protection class network. Area IED 536 gathers greater amounts of data from local IEDs 522 to 534, through a slower network, commonly used for supervisory control and data acquisition (SCADA) applications. This disclosure refers to this type of network as a SCADA class network. For the purposes of this disclosure, a protection class network may include a network that provides desirable benefits such as speed, security and reliability over a SCADA class network. Note that the protection class network and the SCADA class network can be implemented as a single physical network, using modern bandwidth prioritization and management techniques.
The system illustrated in Figure 5A includes a permanent fault 550 in the system, near the open connection switch 510. Each of the local IEDs 502 to 508 upstream detects the fault current and activates a non-directional fault indication (FLT ). It is desirable that the local IED closest to the fault is triggered to clear the fault. Each local IED 522 to 528 that detects the fault sends a blocking signal to the local IED upstream of it. In the illustrated example, local IED 528 detects the fault and sends a blocking signal to local IED 526, which also detects the fault and sends a blocking signal to local IED 524, which also detects the fault and sends a blocking signal. to local IED 522. Thus, local IEDs 522 to 526 have the shot blocked, while local IED 528
5
10
fifteen
twenty
25
30
35
Trigger switch 508 to clear the fault. As described in more detail below, each local IED that receives a blocking signal 522 to 526 compares the Unique Identifier in the blocking signal with its own Identifier, and blocks the trip only if the Unique Identifier in the blocking signal matches with its own identifier. Each local IED is periodically updated with the Identifier of the local IED immediately upstream of it, by the area IED 536. The blocking signals can be communicated using the protection class communications, while updating the local IEDs of the Local IED identifiers upstream, by area IED 536, can be communicated using SCADA class communications. In addition, local IEDs 522 to 534 can send information to the area IED 536, such as, for example, the switching state, the load, the phasors and the like, using SCADA class communications.
Figure 5B illustrates the system 500 of Figure 5A, in which the open connection switch is switch 504. That is, initially, switch 502 is closed, switch 504 is open and switches 506 to 514 are closed. Area IED 536 has been updated with the states of switches 502 to 514, by local IEDs 522 to 534. Failure 552 occurs between switch 504 and 506. As in Figure 5A, each of the local IEDs 526 to 534 upstream detects the fault current and activates a non-directional fault indication (FLT). It is desirable that the local IED 526 closest to fault 552 triggers switch 506 to clear fault 522. Each local IED 526 to 534 that detects fault 552 sends a blocking signal to the local IED immediately upstream thereof. That is, IED 526 detects the fault and sends a blocking signal to local IED 528, which also detects the fault and sends a blocking signal to local IED 530, which also detects the fault and sends a blocking signal to the local IED. 532, which also detects the fault and sends a blocking signal to local IED 534. Each local IED 528 to 534 that receives the blocking signal does not trigger its associated switching device 508 to 514. Local IED 526 does trigger its associated switching device 506. As in Figure 5A, local IEDs 522 to 534 have received from the IED of area 536, through SCADA class communications, the unique Identifiers of the IEDs immediately upstream of them. After the detection of the fault, the IEDs 526 to 534 send blocking signals that include the unique Identifiers of the IEDs immediately upstream of them. Upon receipt of the blocking signals, IEDs 528 to 534 compare the unique Identifiers in the message with their own Identifiers. If the unique Identifiers in the message match their own Identifier, then local IEDs 528 to 534 block their trigger signals, and their switching devices 508 to 514
5
10
fifteen
twenty
25
30
35
Associates remain closed. Local IED 526 did not receive such a blocking message and, therefore, did not block the trip, and its associated switching device 506 opens, clearing fault 552.
Area IED 536 may contain a broader context of the surrounding power system 500 than individual local IEDs 522 to 534. The area IED 536 can use the switching state and other related data are collected from local IEDs 522 to 534 through the SCADA communication network, and combined with prior knowledge about the relationships between the devices, to form a model of the topology of the 500 energy system.
Area 536 IED uses unique identifiers (Identifiers) for local IEDs 522 to 534 in the system, to inform local IEDs 522 to 534 in the system of relevant aspects of the topology, to ensure proper interpretation of the signals from blocking. These Identifiers can be analog quantities or encoded Boolean points.
Figure 6 illustrates an embodiment of a method 600 for protection and control assisted by adaptive communication, with extended area context, consistent with the present disclosure. Procedure 600 begins 602 with the sending by each of the local IEDs (such as, for example, local IEDs 522 to 534 of Figures 5A and 5B) of their own unique Identifiers to the area IED (such as, for example , the IED of area 536 of Figures 5A and 5B). Each local IED in the system may have previously assigned a unique identifier, which can be set by a user or automatically generated by the device. The unique identifiers of each local IED can be communicated to the area IED using the SCADA speed communications network.
Local IEDs send 606 the switching status to the area IED. Using the switching state, the area IED updates the topology 608 stored and / or tracked by the area IED. With the topology information, the area IED can determine, for each Local Identifier, the Identifier of the local IED directly upstream of it. The area IED transmits to each local IED the unique Identifier of the local IED immediately upstream (UID) of the local IED 610. Such transmission may be using SCADA class communications. Each local IED proceeds to monitor the power supply system and, if the local IED does not detect a 612 fault, then the procedure returns to the local IED of the switching state to the area IED
5
10
fifteen
twenty
25
30
35
606, as illustrated. Although the procedure, as illustrated, resends the switching state to the IED of area 606, the procedure can return to any of steps 606 to 610. In a specific embodiment, the local IED simply continues to monitor the delivery system. electrical energy and determining if a fault is detected 612 or not.
Upon detection of a 612 fault, the local IED sends a blocking command (through protection class communications) that includes UID 614 (the blocking command includes the Local Identifier Identifier immediately upstream of the local IED that sends the block command, where the UID was originally provided to the local IED by the area IED). The local IED can send the blocking command to all neighboring devices through the protection class network. When the other local IEDs receive the blocking command, each local IED compares its own unique Identifier with the UID of the received 616 blocking command. If the UID in the received blocking command matches the unique Identifier of the receiving IED 618, then the receiving IED blocks the shot 622, and the procedure returns to step 606 (or to any of steps 604 to 614). However, if the UID in the received blocking command does not match the unique Identifier of the receiving IED 618, then the receiving IED does not block the trigger 620 (that is, it does not block a trigger signal to its associated circuit breaker, due to to the blocking command, although it should be understood that the local IED may have other algorithms running that can block the trigger signal). The procedure then returns to step 606.
Various systems and procedures, consistent with the present disclosure, may allow the extended area context (e.g., topology) to inform local decisions with limited degradation of the overall speed of the system response. Each local IED can make a comparison of whether the identifier embedded in the blocking message (BID) is the same as the local device identifier (ID).
In the described embodiment, the relevant topological information is simply the Identifier of the upstream protection device. The present disclosure may be extended to a wide variety of applications, including, but not limited to: Direct Transfer Triggering (DTT); Infraalcance Direct Transfer Shot (DUTT); Overreach Tolerant Transfer Shot (POTT); Infraalnce Tolerant Transfer Trigger (PUTT); Directional Comparison Lock (DCB); Unlock Directional Comparison (DCUB); and the like
5
10
fifteen
twenty
25
30
35
In addition, the previous example describes only trigger lock messages. It should be understood that various types of messages can be communicated with the unique Identifier of the device immediately upstream. For example, the message may be an increase or decrease message for a voltage regulator control, and include the local IED Identifier. Upon receipt, as set forth above, the receiving IED may compare the Unique Identifier in the message with its own Identifier and accept the command only if the Unique Identifier in the message matches its own Identifier. Any other command that can be communicated between the IEDs can be used, such as, for example, blocking tripping, opening switching device, closing switching device, transformer tap increment, transformer tap decrement, transformer tap blocking, connecting capacitor banks, disconnect capacitor banks, modify generator reference points, modify storage reference points, block reconnection, unlock reconnection, enable sensitive configurations, disable sensitive configurations, change configuration groups, adjust voltage reference points, adjust benchmarks of energy factors, cut distributed generation, release distributed generation and the like.
Figure 7 illustrates a simplified unilinear diagram of an electric power supply system 700 that includes an overload condition 750. As illustrated in relation to Figure 7, the present disclosure can also be applied to applications related to control. An embodiment related to control is automatic load transfer for the purpose of mitigating overload or load balancing. The power supply system 700 includes three origins 744, 746 and 748. Origins 744 and 746 are connected to line 752 (which can be a transmission line, a distribution line or the like). The origin 748 is connected, using line 754, with line 752. Line 752 includes a certain number of switching devices 702, 704, 706, 708, 710, 712 and 714. Line 754 is connected to line 752 between switching devices 708 and 710, and includes switching devices 716, 718, 720. Switching devices 710 and 716 are initially open and all other switching devices are initially closed. As in the previously described embodiments, each switching device 702 to 720 is associated with a local IED, such as local IEDs 722, 724, 726, 728, 730, 732, 734, 736, 738 and 740. Local IEDs 722 to 740 they can be configured to monitor the power supply system and control the associated switching devices. An area IED is also illustrated
5
10
fifteen
twenty
25
30
35
742 in communication with each of the local IEDs 722 to 740. As described in the previous embodiments, the area IED 742 may be in communication with the local IEDs 722 to 740, using a first communications network (or SCADA class) ), where each of the local IEDs can be in communication with each other, using a second communications network (or protection class).
Area 742 FDI contains a broader context of the surrounding energy system than individual 722-740 local FDI. Switching status, load levels, voltage levels and other related data are collected from local IEDs 722 to 740, through the SCADA class communication network. These data are combined in the IED of area 742 with prior knowledge about the relationships between devices, and with classifications of equipment / driver capacity, to form a model of the energy system.
Area 742 IED selects a load transfer action from the available possibilities. In the example shown in Figure 7, the load could be transferred by closing the switch 710 and opening the switch 702, 704, 706 or 708. Alternatively, the load could be transferred by closing the switch 716 and opening the switch 702, 704, 706 or 708. Area 742 IED has the necessary extended area context to select the best course of action. The selected action will include closing a switch, followed by the opening of a second switch. Area 742 IED could accomplish this using only the SCADA network, by sending the closing command to the first local IED, waiting for the first local IED to respond with the confirmation of the closing operation, then sending the opening command to the second IED local. This can result in two radial circuits connected to each other for several seconds, due to the temporary lag introduced by the SCADA network.
Alternatively, the protection class network can be used to complete the load transfer more quickly. The present disclosure can be used to allow the load transfer of the transition closure to be completed quickly, while taking advantage of the extended area context. In this case, the IED of area 742 initiates the load transfer by sending a message to the local IED associated with the switch to close selected. This load transfer message may include the Switch Identifier that should be subsequently opened. Once the first local IED confirms that the local switch associated with it is closed, it forms an opening message consisting of the opening signal and the associated IED Identifier
5
10
fifteen
twenty
25
30
35
to the switch to be opened, as previously reported by the area IED 742. The local IED then sends the opening message to all neighboring devices, through the protection class network, where the message includes the IED Identifier associated with the switch to be opened, as previously reported by area IED 742. Local IEDs that receive the opening message compare their own Identifier with the Identifier that is embedded in the received message. If the Identifiers match, then the opening signal is accepted. If the Identifiers do not match, then the opening signal is rejected.
In this way, the area IED 742 uses unique identifiers for the switches in the system, to inform the local IEDs in the system of the relevant aspects of the topology, to ensure proper interpretation of the opening signals.
In another embodiment, the Area Identifier can be used for opening transition switching. Area IED 742 selects the two switches 702 to 720 that must be operated to transfer load. In this case, the area IED 742 can initiate the load transfer by sending a message to the local IED associated with the selected open switch. This load transfer message may include the Identifier of the local IED associated with the switch that should be subsequently closed. Once the first local IED confirms that the local switch is open, it forms a closing message consisting of the closing signal and the IED Identifier associated with the switch to be closed, as previously reported by the area IED. The local IED then sends the closing message to all neighboring local IEDs, through the protection class network. Local IEDs that receive the closing message compare their own Identifier with the Identifier that is embedded in the received message. If the Identifiers match, then the closing signal is accepted by the local IED that receives the message. If the Identifiers do not match, then the closing signal is rejected by the local IED that receives the message.
In particular, the area IED 742 may determine that the switch 710 should be opened, followed by the closure of the switch 716. The area IED 742 may then send a message to the local IEDs 702 to 740, using the class communication network SCADA, where the message includes the unique identifier of local IED 730 (associated with switch 710) with the opening command, and the unique identifier of local IED 736 (associated with switch 716) with the close command. Upon receipt, each local IED 722 to 740 compares the first unique identifier in the message with its own unique identifier. FDI
5
10
fifteen
twenty
25
30
35
local 730 will determine that the first unique identifier in the message matches its own unique identifier. All other local IEDs will reject the message from the area 742 IED, while the local IED 730 will accept the message, order its associated switching device 710 to open, and then send a message that includes the unique Identifier of the local IED 736 and the closing command. Upon receipt of this second message from IED 730, each local IED will compare the unique Identifier in it with its own unique Identifier. Local IED 736 will determine that the Unique Identifier in the message matches its own Unique Identifier, and will accept the message, while the other IEDs will reject the message, because the Unique Identifier in it does not match the Unique Identifiers of the messages. Other local FDI. The local IED 736 will then order its associated switching device 716 to close. At each stage, or at various stages, local IEDs 722 to 740 can communicate the switching state to the area IED 742, and the area IED 742 can use the switching status information to update its topology (or context) of the electric power supply system.
Figure 8 illustrates an embodiment of a method 800 for adaptive communication assisted control of an electric power supply system. Procedure 800 starts 802 with each of the local IEDs (such as, for example, local IEDs 722 to 740 of Figure 7) by sending their own unique Identifiers to the area IED (such as, for example, the area IED 742 of Figure 7). Each local IED can send the switching state of the switch associated therewith, and information of the power system, to the IED of area 806. The information of the power system may include information such as current, voltage, frequency, load , the fasores, the syncro-fasores and the like. The area IED can use the switching status information to update the topology 808. The area IED can use the information of the electric power system from the local IEDs to calculate the control actions 810. The control actions may include , for example, close the transition load transfer, open the transition load transfer, fault isolation, fault restoration, load sectionalization, coordinated operation of voltage control devices and the like. The area IED can then send control actions that include the first local IED that opens or closes its associated switch; the unique identifier of the first local FDI; the second local IED that opens or closes its associated switch; and the unique identifier of the second local IED 812. The message can be sent using the SCADA class communication system.
5
10
fifteen
twenty
25
30
35
Upon receipt of the message from the area IED, local IEDs compare the first unique Identifier stated with its own unique Identifier. If the first unique Identifier stated does not match Identifier 814 of the local FDI, then the procedure returns to step 806. However, if the first unique Identifier stated does match Identifier 814 of the local FDI, then the first local FDI undertakes the first control action and sends a control action that includes a command for the second local IED to open or close its associated switch, together with the unique Identifier of the second local IED 816. This communication can be via protection class communications. Upon receipt of the second message, each IED compares its own Identifier with the Unique Identifier in the message. If the second Unique Identifier stated does not match Identifier 818 of the IED, then the procedure returns to step 806. However, if the second Unique Identifier stated does match Identifier 818 of the IED, then the second local IED undertakes the second control action 820 (opens or closes its associated switching device), and the procedure returns to step 806. It should be noted that, after returning to step 806 after steps 814, 818 or 820, local IEDs may update the associated switching status for the area IED 806, and the area IED updates its topology 808.
It should be noted that, although the above examples are provided with opening and closing operations, the embodiments herein may include any of the many available commands that can be issued from an IED to your monitored equipment. In addition, although the above examples indicate only two stages, several stages can be undertaken using the embodiments described herein. That is, the IED can determine commands such as tripping block, open switching device, close switching device, increase transformer socket, decrement transformer socket, block transformer socket, connect capacitor banks, disconnect capacitor banks, modify generator reference points, modify storage reference points, block reconnection, unlock reconnection, enable sensitive configurations, disable sensitive configurations, change configuration groups, adjust voltage reference points, adjust power factor reference points, cut generation distributed, release distributed generation and the like. The area IED can determine several stages to be undertaken, while the local IEDs exchange the stage information as described above, using the protection class communication network.
While specific embodiments and applications of the disclosure have been illustrated and described,
It is to be understood that the disclosure is not limited to the precise configuration and components disclosed herein. Various modifications, changes and variations, evident to those skilled in the art, can be made in the arrangement, operation and details of the procedures and systems of the disclosure, without departing from the spirit and scope of the disclosure.
What is claimed is:
权利要求:
Claims (1)
[1]
5
10
fifteen
twenty
25
30
35
1) An electrical power supply control system, comprising:
a plurality of switching devices for opening and closing in various locations an electric power supply system;
a plurality of local intelligent electronic devices (FDI), each local FDI of the plurality of local FDI:
in communication with one among the plurality of switching devices;
comprising a unique identifier;
in communication with the electric power supply system to obtain electrical energy information thereof; Y
comprising a communication module to send information of the electric power system and receive command information;
an area IED comprising:
a topology module to maintain and update a topology of the electric power supply system;
a communication module for receiving information of the electric power system from local IEDs, and transmitting to each local IED the unique Identifier of the local IED immediately upstream of the local IED; Y
a communication network in communication with the communication modules of the area FDI and each of the local FDI;
characterized in that, after the detection of a fault, each local IED that detected the fault transmits a blocking message that includes the unique Identifier of the IED immediately upstream thereof; Y
5
10
fifteen
twenty
25
30
35
wherein each local IED blocks the opening of its associated switching device upon receipt of a blocking message that includes its unique Identifier.
2) The system of claim 1, characterized in that each local IED does not block the opening of its associated switching device, by not receiving any blocking message that includes its unique Identifier.
3) The system of claim 1, characterized in that the communication network comprises:
a control class communication network for the communication of the Unique Identifier information; Y
a protection class communication network for the communication of protection information.
4) The system of claim 3, characterized in that the control class communication network and the protection class communication network comprise the same physical network.
5) The system of claim 3, characterized in that the control class communication network comprises a Supervisory Control and Data Acquisition (SCADA) network.
6) The system of claim 1, characterized in that the unique identifier of each of the local IEDs comprises unique identifiers of the switching devices associated with the local IEDs.
7) The system of claim 1, characterized in that the unique Identifier of each of the local IEDs comprises a MAC address of each of the local IEDs.
8) The system of claim 1, characterized in that the area IED topology module is configured to update the topology using information from the electric power system, coming from local IEDs.
9) The system of claim 1, characterized in that, after the topology update, the area IED is configured to communicate to each local IED an updated unique Identifier of the local IED immediately upstream of the particular local IED.
5
10
fifteen
twenty
25
30
35
10) The system of claim 3, characterized in that the area IED is configured to transmit to each local IED the unique Identifier of the local IED immediately upstream of the local IED, using the control class communication network.
11) An electric power supply control system, comprising:
a plurality of switching devices for opening and closing in various locations an electric power supply system;
a plurality of intelligent electronic devices (FDI), each local FDI of the plurality of local FDI:
in communication with one among the plurality of switching devices;
comprising a unique identifier;
in communication with the electric power supply system to obtain electrical energy information thereof; Y
comprising a communication module for sending and receiving information of the electric power system, and protection information;
an area IED comprising:
a topology module to maintain and update a topology of the electric power supply system;
a control module for calculating control actions that include opening and closing commands for specific switches; Y
a communication module to receive information from the electric power system from local FDI, and transmit the calculated control actions to local FDI; Y
a communication network in communication with the communication modules of the IED of
5
10
fifteen
twenty
25
30
35
area and of each of the local FDI;
in which, after the calculation of a control action, the area IED is configured to transmit a command comprising:
the unique identifier of a first local FDI;
a command for the first local IED to open or close its associated switching device;
a unique identifier of a second local IED; Y
a command for the second local IED to open or close its associated switching device; Y
characterized in that the first local IED, upon receipt of the command from the area IED and the coincidence of its unique Identifier with the Unique Identifier of the first local IED in the command, the local IED is configured to:
open or close its associated switching device; Y
transmit a command that includes:
the unique identifier of the second local FDI; Y
the command for the second local IED to open or close its associated switching device.
12) The system of claim 11, characterized in that, upon receipt of the command from the first local IED, and the coincidence of its unique Identifier with the unique Identifier of the second local IED in the command, the second IED is configured to open or Close your associated switching device.
13) The system of claim 11, characterized in that the communication network comprises:
5
10
fifteen
twenty
25
30
35
a control class communication network for the communication of the Unique Identifier information; Y
a protection class communication network for the communication of protection information.
14) The system of claim 13, characterized in that the control class communication network and the protection class communication network comprise the same physical network.
15) The system of claim 13, characterized in that the control class communication network comprises a Supervisory Control and Data Acquisition (SCADA) network.
16) The system of claim 13, characterized in that the command from the area IED is communicated using the control class communication network.
17) The system of claim 11, characterized in that the control module comprises the detection of an overload condition, and the calculation of which of the switches to open and which of the switches to close to improve an overload condition.
18) The system of claim 11, characterized in that the control module comprises load transfer calculations.
19) The system of claim 11, characterized in that the control module comprises one selected from the group consisting of: direct transfer trigger calculations; infraalcance direct transfer trigger calculations; overreach tolerant transfer trigger calculations; infraalcance tolerant transfer trigger calculations; directional comparison lock calculations; directional comparison unlock calculations; and combinations thereof.
20) A method of protecting an electrical power supply system, characterized in that it comprises:
obtain each local intelligent electronic device (IED), among a plurality of local IEDs, information of the local electric power system of the electric power supply system;
5
10
fifteen
twenty
25
30
35
obtaining each local IED switching status information of an associated switching device, between a plurality of switching devices;
transmitting each local IED switching status information and unique Identifier information of local IED to an area IED;
calculate the area IED a topology of the electric power system, using the switching status information from local IEDs;
calculate the area FDI, for each local FDI, the unique identifier of the local FDI immediately upstream of the local FDI, using the topology;
transmit the area FDI to each local FDI the unique identifier of the local FDI, calculated as located immediately upstream of the local FDI;
After the detection of a fault using the information obtained from the local electricity system, transmit each local IED a command that includes the unique identifier of the local IED immediately upstream of the local IED, as received from the area IED;
Upon receipt of a command, compare each local IED to its own unique identifier with the unique identifier in the command and, when the identifiers match, carry out the local IED the command.
21) The method of claim 20, characterized in that the area IED transmits the unique Identifier of the local IED, calculated as located immediately upstream of the local IED, using a control class communication network.
22) The method of claim 20, characterized in that each local IED transmits the blocking command using a protection class communication network.
23) The method of claim 20, characterized in that the command comprises a blocking command and, when the Unique Identifier and the Unique Identifier in the blocking command match, the local IED blocks the trip of its associated switching device.
5
10
fifteen
twenty
25
30
35
24) A method of protecting an electrical power supply system, characterized in that it comprises:
obtain each local intelligent electronic device (IED), among a plurality of local IEDs, information of the local electric power system of the electric power supply system;
obtaining each local IED switching status information of an associated switching device, between a plurality of switching devices;
transmitting each local IED switching status information, unique Identifier information of the local IED and electrical power system information to an area IED;
calculate the area IED a topology of the electric power system, using the switching status information from local IEDs;
calculate the area FDI control actions, using the calculated topology and the information received from the electric power system;
transmitting the area IED a command comprising: the unique identifier of a first local IED; a command for the first local IED; a unique identifier of a second local IED; and a command for the second local IED;
receive the first local IED the area IED command;
carry out the first local IED the command for the first local IED;
transmit the first local IED a command comprising:
5
10
fifteen
twenty
25
30
35
the unique identifier of the second local FDI; and a command for the second local IED; receive the second local IED the command of the first local IED; carry out the second IED the command for the second local IED.
25) The method of claim 24, characterized in that the area IED transmits the command using a control class communication network.
26) The method of claim 24, characterized in that the control actions comprise an overload protection that transfers load from a first power source to a second power source.
27) The method of claim 24, characterized in that the step of calculating control actions further comprises calculating a margin using a nominal capacity and a current load from the information of the electric power system transmitted from the local FDI.
28) The method of claim 24, characterized in that the command for the first local IED comprises opening or closing a switching device.
29) The method of claim 24, characterized in that the command for the first local IED comprises one selected from the group consisting of: trip lock, open switching device, close switching device, increase transformer socket, decrease the socket transformer, block transformer socket, connect capacitor banks, disconnect capacitor banks, modify generator setpoints, modify storage setpoints, block reconnection, unlock reconnection, enable sensitive configurations, disable sensitive configurations, change configuration groups , adjust voltage reference points, adjust energy factor reference points, restrict distributed generation, release distributed generation and combinations thereof.
类似技术:
公开号 | 公开日 | 专利标题
ES2556145B1|2017-01-26|Protection and control assisted by adaptive topology of electric power supply systems
US9383735B2|2016-07-05|Distributed coordinated electric power delivery control system using component models
AU2014260280B2|2015-11-05|Synchronized clock event report
US9400330B2|2016-07-26|Manipulation resilient time distribution network
US9599719B2|2017-03-21|Detection of manipulated satellite time signals
US10826324B2|2020-11-03|Mitigation of gratuitous conditions on electric power delivery systems
US9270109B2|2016-02-23|Exchange of messages between devices in an electrical power system
US20130073100A1|2013-03-21|Systems and methods for synchronizing distributed generation systems
US9705305B2|2017-07-11|Resilient communication for an electric power delivery system
Habib et al.2017|Decentralized multi-agent system for protection and the power restoration process in microgrids
ES2520490A2|2014-11-11|Systems and methods for blackout protection
US20140280713A1|2014-09-18|Proxy Communication Between Devices in an Electrical Power System
WO2009127817A1|2009-10-22|Self organising unit protection
Wang et al.2016|Multi intelligent agent based cyber attack resilient system protection and emergency control
US20140280714A1|2014-09-18|Mixed-Mode Communication Between Devices in an Electrical Power System
KR20210091141A|2021-07-21|Electrical protection system and method therefor
Bizumic et al.2014|interface Protection
Thorp et al.2013|Wide area monitoring, protection and control
US20210185081A1|2021-06-17|Systems and methods for mitigating electrical installation security threats
Udren2014|Principles for Practical Wide-Area Backup Protection with Synchrophasor Communications
Rahman et al.2014|Agent-based smart grid protection and security
Han2020|IEEE 1588 Time Synchronisation and Data Flow Assessment for IEC 61850 based Power Transmission Substations
Cardenas0|S. 1.1-1. Selective Backup Protection for AC HV and EHV Transmission Lines
同族专利:
公开号 | 公开日
AU2014241230A1|2015-09-17|
CA2902605A1|2014-10-02|
BR112015024581A2|2017-07-18|
MX2015013373A|2016-01-08|
US9257833B2|2016-02-09|
WO2014160761A1|2014-10-02|
ES2556145R1|2016-04-06|
ES2556145B1|2017-01-26|
US20140293494A1|2014-10-02|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题

US5097380A|1989-08-25|1992-03-17|Cooper Power Systems, Inc.|Sectionalizer control|
US4994934A|1989-12-01|1991-02-19|Abb Power T & D Company Inc.|Microcomputer based reclosing relay|
US5495384A|1990-04-02|1996-02-27|Square D Company|Apparatus and method for detecting a fault in a distributed line network|
US5303112A|1990-10-26|1994-04-12|S & C Electric Company|Fault detection method and apparatus|
US5237511A|1990-10-29|1993-08-17|Westronic, Inc.|Distribution automation smart remote terminal unit|
US5373411A|1991-09-30|1994-12-13|Eaton Corporation|Remote control circuit breaker system|
US5513061A|1993-12-09|1996-04-30|Long Island Lighting Company|Apparatus and method for distributing electrical power|
US6944555B2|1994-12-30|2005-09-13|Power Measurement Ltd.|Communications architecture for intelligent electronic devices|
US5896302A|1997-01-23|1999-04-20|Commonwealth Edison Company|System and method for providing integrated reclosing of circuit breakers in a power substation|
US6005759A|1998-03-16|1999-12-21|Abb Power T&D Company Inc.|Method and system for monitoring and controlling an electrical distribution network|
US6008971A|1998-03-23|1999-12-28|Electric Boat Corporation|Fault protection arrangement for electric power distribution systems|
US6239960B1|1998-04-03|2001-05-29|Basler Electric Company|Reconfigurable reclosing relay|
US5982596A|1998-05-05|1999-11-09|George Authur Spencer|Load center monitor and digitally enhanced circuit breaker system for monitoring electrical power lines|
US5973899A|1998-09-10|1999-10-26|Pacificorp|Automated power feeder restoration system and method|
US6341054B1|1998-12-23|2002-01-22|Mcgraw-Edison Company|Intelligent power distribution network|
US6459998B1|1999-07-24|2002-10-01|Gary R. Hoffman|Sensing downed power lines|
US6549880B1|1999-09-15|2003-04-15|Mcgraw Edison Company|Reliability of electrical distribution networks|
US6577963B1|2000-12-12|2003-06-10|International Business Machines Corp.|Programmatic resetting of circuit breakers|
US6707655B2|2000-12-27|2004-03-16|Abb Technology Ag|Adaptive protection for recloser control|
US6667866B1|2000-12-28|2003-12-23|Abb Technology Ag|Virtual ground following single-phase trip|
US6704181B2|2001-01-26|2004-03-09|Hewlett-Packard Development Company, L.P.|Adaptive power circuit protection apparatus and method|
US6735533B2|2001-03-16|2004-05-11|Abb Technology Ag|Only picked up phases recloser control|
US7415725B2|2002-08-29|2008-08-19|Power Measurement Ltd.|Multi-function intelligent electronic device with secure access|
US6816757B1|2002-09-19|2004-11-09|Abb Technology Ag|Control unit for a power-distribution network|
US7414819B2|2004-12-03|2008-08-19|Schweitzer Engineering Laboratories, Inc.|Methods and systems for sectionalizing a looped distribution line in a power distribution system|
US8730837B2|2010-06-21|2014-05-20|General Electric Company|System and method for control of power distribution networks|
US9053020B2|2012-10-11|2015-06-09|Abb Research Ltd.|Online protection coordination for distribution management system|
MX2015003880A|2012-10-12|2015-07-17|Schweitzer Engineering Lab Inc|Coordinated high-impedance fault detection systems and methods.|US9564757B2|2013-07-08|2017-02-07|Eaton Corporation|Method and apparatus for optimizing a hybrid power system with respect to long-term characteristics by online optimization, and real-time forecasts, prediction or processing|
CN104795892B|2015-03-13|2017-01-18|华南理工大学|GOOSE message implementation method applied to traditional electric microcomputer experiment device|
CN104950844B|2015-05-11|2017-09-01|国家电网公司|Intelligent substation station domain Protection control system detection method and device|
CN105429094B|2015-12-16|2018-02-16|南京南瑞继保电气有限公司|A kind of apparatus and method for ensureing intelligent substation trip protection reliability|
CN106026394B|2016-06-17|2018-05-15|国网江苏省电力公司常州供电公司|Distributed feeder automation fault message exchange method|
US10833507B2|2016-11-29|2020-11-10|Schweitzer Engineering Laboratories, Inc.|Island detection and control of a microgrid|
US10333301B2|2017-05-04|2019-06-25|Schweitzer Engineering Laboratories, Inc.|Transient simulation modeling for dynamic remedial action schemes using real-time protection setting updates|
US10826324B2|2017-05-18|2020-11-03|Schweitzer Engineering Laboratories, Inc.|Mitigation of gratuitous conditions on electric power delivery systems|
CN109391484B|2017-08-04|2021-11-23|四零四科技股份有限公司|Exchanger device suitable for transformer substation and fault warning method|
US10320641B2|2017-10-04|2019-06-11|Moxa Inc.|Switch device for substation and error warning method thereof|
US10498633B2|2018-03-01|2019-12-03|Schweitzer Engineering Laboratories, Inc.|Traffic activity-based signaling to adjust forwarding behavior of packets|
US10912104B2|2019-02-01|2021-02-02|Schweitzer Engineering Laboratories, Inc.|Interleaved, static time division multiple accessfor minimizing power usage in delay-sensitive applications|
US10992134B2|2019-05-10|2021-04-27|Schweitzer Engineering Laboratories, Inc.|Load shedding system for both active and reactive power based on system perturbation|
US10910835B1|2019-12-30|2021-02-02|The Florida International University Board Of Trustees|Systems and methods for protecting against fault currents|
US11177657B1|2020-09-25|2021-11-16|Schweitzer Engineering Laboratories, Inc.|Universal power flow dynamic simulator|
法律状态:
2017-01-26| FG2A| Definitive protection|Ref document number: 2556145 Country of ref document: ES Kind code of ref document: B1 Effective date: 20170126 |
2017-07-26| FA2A| Application withdrawn|Effective date: 20170720 |
优先权:
申请号 | 申请日 | 专利标题
US201361806308P| true| 2013-03-28|2013-03-28|
US61/806,308|2013-03-28|
PCT/US2014/031839|WO2014160761A1|2013-03-28|2014-03-26|Adaptive topology assisted protection and control of electric power delivery systems|
US14/225,796|US9257833B2|2013-03-28|2014-03-26|Adaptive topology assisted protection and control of electric power delivery systems|
US14/225,796|2014-03-26|
[返回顶部]