Substation Automation System Introduction
Substation Automation System Introduction
Subbiahkannan
Mail id:[email protected]
1|Pa ge
Protection Control & Design Engineer
Subbiahkannan
Mail id:[email protected]
4.)BCU Catalog:-
Some of the BCU catalogue are shown here for the examples
In the above image, if you see that watch dog contact is F3 & F4.
Power supply card is F1 & F2.
For Time synchronization separate port is available which is mention as slot “A”.
some device like Fault Monitoring system to Master Unit communicates through Profibus which is mention as slot
“B”.
Fiber Optic port RS485 which is mentioned as slot “C”. Then finally Binary Input is available
2|Pa ge
Protection Control & Design Engineer
Subbiahkannan
Mail id:[email protected]
In the below image you will see the Binary Inputs, Binary outputs, Analog inputs are mentioned
5.)What are the Types of Soft Signals are used in the Substation Automation system
SPI-Single Point Indication
DPI-Double Point Indication
SCO-Single Command
3|Pa ge
Protection Control & Design Engineer
Subbiahkannan
Mail id:[email protected]
DCO-Double Command
AI-Analog Measurement
REG STP-Regulation Command
6.)What is the electrical interlock done in the substation?
Interlock is nothing but combination of NC & No contacts.
The electrical interlocking is done to make sure that the equipment as well as human safety
7.)What is the software interlock & how it is achieved in the substation?
An interlock achieved through Softlogic is called Software interlock
8.)What are the logic gates are used in the interlock?
The following logic gates are used in the Boolean function
4|Pa ge
Protection Control & Design Engineer
Subbiahkannan
Mail id:[email protected]
a.)OSI Layer 1
It is the physical layer.
Every data message is transmitted on some medium.
This medium usually takes the form of cables, wires or optical fibers
b.)OSI Layer 2
It is the data Link layer.
The physical layer provides the Data link layer with bits.
The data link layer now provides some intelligence to this sequence of bits by defining data frames.
A commonly used Data link layer is ethernet.
Examples
Equipment that work at this layer are Ethernet switches & bridges
c.)OSI Layer 3
It is the network layer.
The network layer is concerned with packet delivery.
Logical paths are established between the sending & receiving equipment by adding information onto the data frame
which defines where the packet has come from, and where the packet is going to.
This takes the form of a logical source and destination address for each packet of information. A commonly used
network protocol is IP(Internet Protocol).
d.)OSI Layer 4
It is the Transport Layer.
The transport layer is the first layer that is not concerned with the mechanics of the data transfer.
It is concerned with managing & sequencing the packets once they have arrive.
There is an array of transfer protocols ranging from the very simple, which simply accepts the data as it comes in, not
caring about whether the packets have errors nor even if they are in the right order
Through to quite complex protocols which check the data for errors, send out an acknowledgement to the sending
equipment, order the packets into the correct sequence and present the data to the next layer guaranteed error-free and
correctly sequenced.
A more sophisticated widely used transport layer protocol used is TCP(Transmission Control Protocol).
5|Pa ge
Protection Control & Design Engineer
Subbiahkannan
Mail id:[email protected]
e.)OSI Layer 5
It is the session layer.
The first four layers establish a means of reliable communication between two IED’s(computers), but they don’t deal
with intelligent management of the communication.
This is performed at the session layer.
It is the first layer that has user interaction.
Session layer software can implement password control, monitor system usage, and allow a user interaction with the
communication
f.)OSI Layer 6
It is the presentation layer.
As the name implies, the presentation layer concerns itself with how the data is presented
g.)OSI Layer 7
It is the application layer.
The Application layer is the layer that interacts with the user.
This is the main software that allows the user to define communication.
6|Pa ge
Protection Control & Design Engineer
Subbiahkannan
Mail id:[email protected]
7|Pa ge
Protection Control & Design Engineer
Subbiahkannan
Mail id:[email protected]
8|Pa ge
Protection Control & Design Engineer
Subbiahkannan
Mail id:[email protected]
14.)Types of FO cables:-
There are two types of FO cables
a.)Single Mode FO cables:-
Single mode fiber is used for long distance.
Laser has its light source.
It is used for remote end communication
b.) Multimode(MM) FO cable:-
Multimode fiber is used for short distance.
LED has its light source.
It is used for SCMS communication
Ring Topologies
a.)Star Topologies:-
In the star Topology, a physical connection runs from each device on the network to a central location, usually an
Ethernet switch.
b.)Ring Topology:-
In the Ring Topology, a physical connection is daisy-chained around the devices in the form of a ring
10 | P a g e
Protection Control & Design Engineer
Subbiahkannan
Mail id:[email protected]
Ring Topology connection due to the risk of traffic getting stuck in an endless loop around a ring and the consequent
paralysis of the network as the amount of stuck traffic increased.
Remedies:-
To overcome the Traffic limitation in the ring topology, the following protocols are introduced.
STP-Spanning Tree Protocol (IEEE 802.1D)
RSTP-Rapid Spanning Tree Protocol (IEEE 802.1W)
11 | P a g e
Protection Control & Design Engineer
Subbiahkannan
Mail id:[email protected]
12 | P a g e
Protection Control & Design Engineer
Subbiahkannan
Mail id:[email protected]
13 | P a g e
Protection Control & Design Engineer
Subbiahkannan
Mail id:[email protected]
13.)What is SCMS?
SCMS is Substation Control & Monitoring system.
SCMS also called as Substation Automation system.
Main task is to monitor and control an electrical grid system based on the information it collects from the substations
within that system.
SCMS is based on an Ethernet Network using IEC 61850 protocol.
14.)What is IEC 61850?
In the early 1990s the Electric Power Research Institute(EPRI) in the US started work on a Utility Communications
Architecture(UCA).
The goal was to produce industrial agreement regarding substation integrated control, protection, and data acquisition,
to allow interoperability of substation devices from different manufacturers
15.)Benefits of IEC 61850:
The major Benefits of the standards are as follows:
Lower Installation cost
Lower Transducer cost
Lower communication cost
Lower extension cost
Lower Integration cost
14 | P a g e
Protection Control & Design Engineer
Subbiahkannan
Mail id:[email protected]
15 | P a g e
Protection Control & Design Engineer
Subbiahkannan
Mail id:[email protected]
16 | P a g e