Documentos de Académico
Documentos de Profesional
Documentos de Cultura
IBEROAMERICANO
SOBRE PROTECCIÓN
DE SISTEMAS ELÉCTRICOS
DE POTENCIA
MEMORIA TÉCNICA
Monterrey. México. Mayo 2011
X SIMPOSIO
IBEROAMERICANO
SOBRE PROTECCIÓN
DE SISTEMAS ELÉCTRICOS
DE POTENCIA
Mayo de 2011 Monterrey, Nuevo León. México
Lunes 23 de mayo
Operation and Design of a Protection Relay for Transformer Condition Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . H. T. Yip, S. Hosseini, M. Moscoso, G. J. Lloyd, y K. Liu (Reino Unido) 1
Improvements to Transformer Differential Protection—Design and Test Experience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . H. T. Yip, M. Moscoso, G. Lloyd, K. Liu, y Z. Wang (Reino Unido) 9
Nuevo Algoritmo Para Protección Diferencial de Transformadores . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . H. Davila (Canadá) 17
Modern Line Current Differential Protection Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . H. Miller, J. Burger, N. Fischer, y B. Kasztenny (Estados Unidos) 29
Smarter Time Sync: Applying the IEEE PC37.238 Standard to Power System Applications . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C. Brunner, y G. S. Antonova (Estados Unidos) 55
An Experimental Analysis of High-Speed-Distance Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C. Dzienis, M. Kereit, J. Blumschein, M. Claus (Alemania) 65
Medición de la Impedancia de Línea y Tierra para una Estimación Correcta del Factor de Tierra (K0) en Líneas
de Transmisión y Mejora de la Confiabilidad de la Protección de Distancia . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M. Gutiérrez, y M. Krugger (Estados Unidos, Austria) 73
Empleo de Nomogramas para Localización de Fallas en Redes de Distribución . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A. González, A. Martínez, R. Mejía, y J. J. Mier (México) 81
Real-Time Multiterminal Fault Location System for Transmission Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Y. Gong, M. Mynam, A. Guzmán, G. Benmouyal, y B. Shulim (Estados Unidos) 89
Protección de Líneas de Transmisión de Doble Circuito con Relevadores de Sobre-Corriente . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A. Nájera, y D. Sebastián (México) 95
Metodología para el Análisis de Perturbaciones en Sistemas de Potencia Mediante ATPDRAW—Caso de Puente
Abierto en la Línea Esmeralda–Yumbo 2 a 230 kV . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D. A. Tejada, y S. S. Urbaez (Colombia) 103
Continúa en la página v. . .
iii
X SIMPOSIO IBEROAMERICANO SOBRE PROTECCIÓN DE SISTEMAS ELÉCTRICOS DE POTENCIA
COMITÉ ORGANIZADOR
Dr. Ernesto Vázquez Martínez, Presidente
Ing. José Abel Valdéz Campoy, Secretario Ejecutivo
Dr. Arturo Conde Enríquez, Responsable, Programa Técnico
Dr. Manuel Antonio Andrade Soto, Responsable, Logística
Dr. Marco Tulio Mata Jiménez, Logística
Dra. Gina María Idárraga Ospina, Responsable, Exposición Industrial
Ing. Ramiro Patiño Bedolla, Exposición Industrial
Ing. Sergio David González Cantú, Exposición Industrial
Ing. Gerardo manuel Robledo Leal, Exposición Industrial
c Copyright
Memoria del X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia (ISBN XXXX-XXXX).
2011 por la Universidad Autónoma de Nuevo León, todos los derechos reservados.
ISBN XXXX-XXXX
. . . continúa de la página iii
Martes 24 de mayo
Protecting Distribution Feeders for Simultaneous Faults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . J. Betanzos, H. E. Lemus, E. Alcázar, D. Sánchez, y H. J. Altuve (México) 113
Communications for the Smart Grid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M. Adamiak, y P. Sanza (Estados Unidos) 123
Wide Area Monitoring with Phasor Measurement Units . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M. Wache, y H.-J. Herrmann (Alemania) 133
Implementación de la Smartgrid en Redes de Distribución Existentes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A. Arzuaga, y R. Quintanilla (España) 137
Esquema de Proteccion y Control para la Interconexion en 13.8 kV del Permisionario Mexico-Carbon. .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M. A. Ortiz, L. del Á. Diego, y P. Martínez (México) 145
El Mantenimiento Centrado en Confiabilidad con el Apoyo de los Sistemas de Protecciones de las
Subestaciones de Distribución . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . J. Betanzos, y J. C. López (México) 153
Using Fault Tree Analysis to Evaluate Protection Scheme Redundancy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. R. Sandoval, C. A. Ventura, H. J. Altuve, R. A. Schwartz, D. A. Costello, D. A. Tziouvaras, y D. Sánchez 159
(México, Estados Unidos)
Experiencias Operativas y Criterios para Determinar Fallas de Alta Impedancia en Lineas de Transmi-
sión de Energía a Alto Voltaje . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C. S. Urbaez, J. A. Calderon, y L. E. Llano (Colombia) 179
Abatimientos de Voltaje Prolongados en la Red de Media Tensión Ante Fallas en la Red de 230 Y 115
kV en Zona de Distribución Culiacán División Noroeste . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E. Acosta, e I. Soto (México) 199
Energy Production Using the Co-Generation of Methane Gas Connected to Copel’s Distribution Grid—
Tests and Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E. J. Rufato, C. M. V. Tahan, y C. C.B. de Oliveira (Brasil) 205
Miércoles 25 de mayo
Optimal Energy Resource Allocation in a Microgrid Environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . A. Hajimiragha, A. Palizban, S. Allan, M. Adamiak, y M. Zadeh (Estados Unidos, Canadá) 209
CALBECK: Un Software para Calibraciones Totalmente Automatizadas de Relevadores de Protección en
Centrales Generadoras. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . M. V. González, A. Ahumada, C. Moreno, J. Lizárraga, Á. E. Gómez, D. I. Zamorano, y J. A. Castro 219
(México)
Increased Sensitivity of Loss of Field Protection Based on Admittance Measurement. . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . H.-J. Herrmann, y A. Smit (Alemania, Estados Unidos) 225
New Algorithm for Transformer Diferential Protection That Will Detect Turn-To-Turn Faults in Windings
Transformers in a Secure Manner and Faults Within the Diferential Protection Zone in Transformers
and Generators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . R. A. Cordova (México) 235
Why We Should Measure Line Impedance? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B. Vandiver, y A. Apostolov (Estados Unidos) 247
Event-Driven Load Shed Scheme and Operation Tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M. Adamiak, M. Schiefen, G. Schauerman, y B. Cable (Estados Unidos) 257
Protection of Battery Energy Storage Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . R. Hedding, y P. Hayes (Estados Unidos) 263
Power System Protection Testing—Exploring the IEEE C37.233 Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . V. Madani, H. DoCarmo, M. Adamiak, R. Beresh, D. Novosel, P. McLaren, J. Verzosa, M. Kezunovic, 269
A. Apostolov, J. Ariza, E. Udren, y G. Henneberg (Estados Unidos)
IEC 61850 Goose Applications to Distribution Protection Schemes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A. Apostolov, y B. Vandiver (Estados Unidos) 283
IEC 61850 - Impact on Protection Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .M. C. Janssen (Países Bajos) 295
Ethernet as a Channel for Protective Relaying. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . J. Benckenstein (Estados Unidos) 301
Testing Ethernet Network for Goose Tripping. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D. Espinosa, R. Aguilar, J. Ariza, y J. Mendoza (México, Estados Unidos) 317
v
Mensaje del Comité Organizador
El Comité Organizador del X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos
de Potencia, SIPSEP, da la más cordial bienvenida a los participantes. Es un honor para
nosotros recibirlos en la ciudad de Monterrey y tener la posibilidad de compartir estos días
con ustedes.
El Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia es un
evento en el cual los ingenieros de toda Iberoamérica pueden intercambiar experiencias entre
sí y con especialistas de los países de mayor nivel de desarrollo tecnológico. Se mantienen
vigentes los objetivos originales del Simposio y su intención de promover el acercamiento
entre universidades, centros de investigación, fabricantes de equipos, y empresas eléctricas
de diversos países.
En las nueve ediciones anteriores del evento, han participado poco más de 1500 ingenieros
de 25 países, se han presentado 313 ponencias, se han dictado 23 conferencias magistrales y se
han desarrollado 10 meses redondas. La exposición de equipos ha sido un elemento importante
del evento, en la que se ha contado con la participación de las firmas más reconocidas en la
especialidad, a nivel mundial. Más de 600 ingenieros de una diversidad de países han asistido
a los 19 cursos tutoriales que se han impartido en el marco de estos nueve Simposios.
En el X SIPSEP se presentarán 33 ponencias por especialistas de 11 países, se dictarán tres
conferencias magistrales y un panel, que estarán a cargo de personalidades reconocidas inter-
nacionalmente y versarán sobre conceptos de Smart Grid y experiencias en la implementación
de redes inteligentes. Nuevamente, se contará con una exposición industrial, en la que partici-
parán los fabricantes más innovadores del mundo. Además, se dictarán dos cursos tutoriales,
dedicados a los temas de protección de líneas de transmisión y calidad de la energía.
El Comité Organizador desea hacer patente su reconocimiento y gratitud a la Universidad
Autónoma de Nuevo León, la Facultad de Ingeniería Mecánica y Eléctrica, y a la Comisión
Federal de Electricidad por el apoyo y estímulo que han brindado en la organización de este
evento.
Esperamos que el efecto satisfaga las expectativas de todos los participantes y constituya
una experiencia útil para su desarrollo profesional.
Comité Organizador,
Monterrey, México. Mayo de 2011.
vii
Empresas Representadas en la Exposición Industrial
• ABB México, S. A. de C. V.
• Allectro, S. A. de C. V.
• ENOSERV
• ERL
• Fonkel Mexicana, S. A. de C. V.
• INDUSTRIA SIGRAMA, S. A. de C. V.
• ISA S. R. L.
• Ivesco, S. A. de C. V.
• MABREX, S. A. de C. V.
• Ontario Instruments, S. A. de C. V.
• Oropeza Ingenieros, S. A. de C. V.
• PROTECSA Ingeniería, S. A. de C. V.
• Siemens, S. A. de C. V.
ix
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 1
e-mail: graeme.lloyd@alstom.com
KEYWORDS
1 INTRODUCTION
Power transformers are a critical link in the ac transportation of electricity from the generating stations
to end users. In terms of total investment, electric power utilities invest at least as much in
transformers as they do in generating stations. Transformers are expected to last 20 to 30 years, and in
many cases, even longer.
The application of monitoring systems to transformers offers benefits in more cost-effective utilization
by detecting faults that can be fixed before causing irreparable damage or in diagnosing faults and
determining if they can be repaired, lived with, or require transformer replacement.
Overloading power transformers beyond the nameplate rating can cause a rise in temperature of both
transformer oil and windings. If the winding temperature rise exceeds the transformer limits, the
insulation will deteriorate and may fail prematurely. Prolonged thermal heating weakens the insulation
over time, resulting in accelerated transformer loss-of-life. Through-fault currents create forces within
the transformer that can eventually weaken the winding integrity. Transformer overexcitation causes
transformer heating and increases exciting current, noise, and vibration.
A comprehensive transformer protection scheme needs to include protection against transformer
overload, through-fault and overexcitation, as well as protection for internal faults.
Measurable indicators of transformer serviceability include electrical load; top-oil, hottest-spot and
ambient temperatures; fault history; and measured excitation. Utilities that use these indicators can
make intelligent profit/risk decisions and plan optimal transformer loading and maintenance. Also
smart IEDs with standard flexible communications can ease integration of these devices into the
customer control system.
Although transformer monitoring systems have been on the market for some years and have achieved
success in detecting and diagnosing problems, their adoption is far from universal. The perceived
barriers to the more general application of transformer monitoring include high costs of installation
and maintenance, incompatibility between systems and transformers of different manufacture and the
difficulty of collecting an assimilating the output of diverse systems across a network.
Including many of the transformer monitoring features in a standard protection relay reduces the cost
barriers. Also, the flexibility and standardization of the protection relay communications allows data
easier collection and interfacing to the customers existing SCADA systems.
This paper discusses the operation and design of a transformer protection relay that includes many of
the common transformer condition monitoring features required making condition monitoring a more
economical option.
2
Losses of a
Transformer
Load No-Load
Losses Losses
Hysteresis Losses
Eddy-Current Losses
P4318ENa
Figure 2: Transformer Losses
The rating of a transformer usually depends upon the maximum permitted working temperature of the
transformer insulation [1]. The steady-state temperature rise is reached when these losses are balanced
4
by the transformer cooling due to radiation, convection and conduction of heat. The losses increase
with output and the maximum output or transformer rating is based on the losses that give the
maximum permitted temperature Tp. The permitted temperature rise θp also depends upon the ambient
temperature of the surrounding air Ta:
Maximum temperature rise θp = Tp - Ta
During energization, the transformer inrush current causes the transformer to be overloaded for a short
duration until its temperature reaches Tp. The inrush current is well in excess of the full-load current
(perhaps up to 10 times) but the transient time is sufficiently short to ensure that θp is not exceeded.
ΘTO = Θ A + ∆ΘTO
Θ H = ΘTO + ∆Θ H
Where:
ΘH = Hot spot (winding) temperature
ΘTO = Top oil temperature
∆ΘH = Hot spot rise above top oil temperature
4.3 Cooling modes
Four cooling modes are available in the relay - Natural, Forced A ir, Forced O il, Forced Air O il.
The oil exponent and winding exponent can be set independently for each mode. These exponents are
empirically derived and are required to calculate the variation of ∆ΘH and ∆ΘTO with load changes.
The oil and winding exponent values changes for each mode of cooling to approximately account for
changes in the resistance and viscosity with changes in load.
The cooling mode selection can be made in the relay by using digital inputs or can be set to a fixed
mode in the setting file. The digital inputs enable the thermal characteristic to be changed to match the
different cooling modes as fans and pumps are switched on and off.
B
A + B B
L(Θ H , r ) e ΘH ,r + 273 −
ΘH ,r + 273 ΘH + 273
FAA = = =e
L(Θ H )
A +
B
ΘH + 273
e
Where:
The residual life hours at reference hottest-spot temperature is updated every hour as follows:
3600
∑ FAA,i (Θ H )
i =1
Lres (Θ H ,r ) = Lres,p (Θ H ,r ) −
3600
Where:
Lres,p(ΘH,r) = residual life hours at reference temperature one hour ago.
FAA,i(ΘH) = mean aging acceleration factor, as calculated above. It is calculated every second.
The accumulated loss of life (LOL) is updated in non-volatile memory once per hour. It is possible to
reset and set a new loss of life figure, in the event that a relay is applied in a new location with a pre-
aged resident transformer.
Daily rate of loss of life (ROLOL) in percentage per day is given as follows and it is updated every
day:
24
ROLOL = ⋅ FAA,m (Θ H ) ⋅100%
L (Θ H , r )
The mean aging acceleration factor FAA,m is updated per day and is given by:
N N
∑ FAAn ⋅ ∆t n ∑ FAAn
n =1 n =1
FAA, m = N
=
N
∑ ∆t n
n =1
Where:
FAAn is calculated every cycle
∆tn = 1cycle
FAA, m states the latest one-day statistics of FAA. When the relay is energized for the first time, FAA, m
default value is 1.
The residual life in hours at FAA,m is updated per day and is given by:
Lres (Θ H , r )
Lres (FAA, m ) =
FAA, m
Through fault
current for fault 2
Equivalent Source 1 Through fault Equivalent source 2
0.024∠84° pu 275kV 132kV current for fault 2 0.096∠84° pu
10000MVA HV LV 25
00 MVA
600:1 1200:1
CT1 CT2
Through fault 2
Through fault 1 Single phase fault
Single phase fault 275/132/33 kV Three phase fault
Three phase fault 240MVA
Positive and Negative sequence
impedances:
XHV = j0.134pu
XLV = j0.075pu
XTV = -j0.024pu
Zero sequence impedance:
XHV = j0.067pu
XLV = j0.0375pu
XTV = -j0.012pu
As fault duty and feeder exposure increase, the incidence and severity of through faults
experienced by a transformer will tend to go up over time. IEEE Std. C57.12 [5] provides
construction guidelines for short-circuit withstand for transformers. The standard states that a
transformer shall withstand 2 seconds of a bolted fault at the transformer terminals.
In the relay design the through fault monitoring element can monitor the HV, the LV or the TV
winding. In three winding applications, the winding through which the highest current would flow
during an external fault should be monitored. The through fault current monitoring function gives the
fault current level, the duration of the faulty condition and the date and time for each through fault.
An I2t calculation based on the recorded time duration and maximum current is performed for each
phase. This calculation is only performed when the current is above the provided setting and if the
differential protection element has not started. Cumulative stored calculations for each phase
can be monitored so that the user may schedule the transformer maintenance based on this
data. This may also justify possible system enhancement to reduce through fault level.
A single stage alarm is provided for through-fault monitoring. The alarm is issued if the
maximum cumulative I2t in the three phases exceeds the relevant setting. A through fault event
is recorded if any of the phase currents is bigger than a trigger setting. This setting should be
greater than the overload capability of the transformer. According to IEEE Std. C57.109-1993
[4], values of 3.5 or less multiples of normal base current may result from overloads rather than
faults. IEEE Std. C57.91-1995 [2], states that the suggested limit of load for loading above the
nameplate of a distribution transformer with 65°C rise is 300% of rated load during short-time
loading (0.5 hours or less). On the other hand, the suggested limit of load for loading above the
nameplate of a power transformer with 55°C rise is 200% maximum.
Transient overfluxing conditions can cause unwanted operation of the transformer differential
protection if stabilization is not provided. Overexcitation of a power transformer is a typical case of
a.c. saturation of the core that produces odd harmonics in the exciting current. The third harmonic is
the most suitable for detecting overexcitation conditions, but either the delta connection of the CTs or
the delta connection compensation of the differential relay filters out this harmonic. The fifth
harmonic, however, is a reliable quantity for detecting overexcitation conditions.
The relay filters the differential current and determines the fundamental component and the fifth
harmonic component. If the ratio (5th harmonic component)/(fundamental component) exceeds the set
value in at least one phase in two consecutive calculations, and if the differential current is larger than
0.1 pu, differential tripping is blocked selectively per phase.
The 5th harmonic element can also be used to raise an alarm due to persistent overfluxing that may be
caused by geomagnetic disturbances that may not be detected by the conventional a.c. overfluxing
protection.
8 CONCLUSION
Power transformers are a critical link in the ac transportation of electricity from the generating stations
to end users. The application of monitoring systems to transformers offers benefits in more cost-
effective utilization by detecting faults that can be fixed before causing irreparable damage or in
diagnosing faults and determining if they can be repaired, lived with, or require transformer
replacement. Although transformer monitoring systems have been on the market for some years and
have achieved success in detecting and diagnosing problems, their adoption is far from universal. The
perceived barriers to the more general application of transformer monitoring include high costs of
installation and maintenance, incompatibility between systems and transformers of different
manufacture and the difficulty of collecting an assimilating the output of diverse systems across a
network.
This paper discusses the operation and design of a transformer protection relay that includes many of
the common transformer condition monitoring features required making condition monitoring a more
economical option.
9 REFERENCES
[1] Guide for Loading Mineral-Oil-Immersed Power Transformers Rated in Excess of 100
MVA (65ºC Winding Rise), IEEE Std. C57.115-1991.
[2] IEEE Guide for Loading Mineral-Oil-Immersed Transformers, IEEE Std C57.91-1995.
[3] W. H. Bartley, “An Analysis of Transformer Failures—1988 through 1997,” The
Locomotive, Hartford Steam Boiler Inspection and Insurance Company.
[4] Guide for Liquid-Immersed Transformer Through-Fault-Current Duration, IEEE Std
C57.109-1993 (R2008).
[5] IEEE Standard General Requirements for Liquid-Immersed Distribution, Power, and
Regulating Transformers, IEEE Std. C57.12.00-1993.
[6] CIGRE Technical Brochure Ref. 343, Recommendations for Condition Monitoring and
Condition Assessment Facilities for Transformers, Working Group A2.27, April 2008.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 9
KEYWORDS
1 INTRODUCTION
Percentage Bias characteristics have been commonly applied for transformer differential
protection. Traditional protection schemes use dual slope or multiple slope characteristics
to provide stability during CT saturation, together with second harmonic as a restraining
or blocking quantity for inrush conditions. However, studies have shown that there is a
limitation with the dual slope characteristic for stability, to avoid requiring excessive over-
dimensioning of the CTs. The second harmonic blocking has also been shown to slow
down the protection for internal faults if CT saturation occurs [1], [2]. This is because CT
saturated waveforms can also contain a high second harmonic component. Early studies
on magnetizing inrush indicates that the second harmonic content might be 15% or more
of the fundamental current [3]. Recent studies indicate that improvements in the
transformer design and core steel result in low content of second harmonic (as low as
7%) [3].
This paper presents new algorithms that have been developed to improve the
performance of transformer biased differential protection. A transient bias algorithm has
been implemented which increases the operating threshold momentarily when there is a
sudden increase in the bias current, thus enhancing stability during external faults. This
approach will not affect the performance during internal faults, since the differential
current will rise much faster than the bias currents. A novel CT saturation detection
algorithm has been developed. It is based on the fact that magnetising inrush and
saturated current waveforms are distorted and discontinuity patterns can be observed on
both waveforms. This new technique emphasizes the discontinuity pattern by
differentiating the differential current making it possible to distinguish magnetising inrush
from CT saturation within a cycle. A no gap detection algorithm has been applied to
complement the CT saturation detection. It considers the number of samples above a
dynamic threshold within the last “N” executions. The assertion of CT saturation or no
gap detection unblocks the differential protection from the second harmonic blocking. As
a result, the restrained differential element is allowed to trip even during CT saturation,
giving faster tripping times for internal faults.
10
To provide further stability for external faults, additional measures are considered on the
calculation of the bias current: delayed bias, maximum bias and transient bias.
The delayed bias is calculated on a per phase basis and it is the maximum of the
fundamental bias quantities calculated within the last cycle. The delayed bias provides
added stability when an external fault is cleared and the fault currents drop off.
Ibias A_delayed = Maximum [Ibias, A(n), Ibias,A (n-1), ........., Ibias,A (n – (k-1))] Equation 1
Ibias B_delayed = Maximum [Ibias, B(n), Ibias,B (n-1), ........., Ibias,B (n – (k-1))] Equation 2
Ibias C_delayed = Maximum [Ibias, C(n), Ibias,C (n-1), ........., Ibias,C (n – (k-1))] Equation 3
The maximum bias is the maximum of the delayed bias currents from all three phases.
The maximum bias is used to prevent mal-operation under external faults conditions,
when spill current could flow into a healthy phase the CT of which is partially saturated.
Ibias,max = Maximum [IbiasA_delayed, Ibias,B_delayed, Ibias,C_delayed] Equation 4
The maximum bias is used to calculate the differential operating current Iop, using the
following equations by considering the multiple slope characteristic shown in Figure 1:
I s1
Characteristic equation for the range: 0 ≤ I bias ,max ≤ Equation 5
K1
Iop = I s1 Equation 6
I s1
Characteristic equation for the range: ≤ I bias , max ≤ I s 2 Equation 7
K1
Iop = K1 ⋅ I bias , max Equation 8
I s1
K1: characteristic slope in range ≤ I bias , max ≤ I s 2 Equation 11
K1
K2: characteristic slope in range I bias , max ≥ I s 2 Equation 12
Idiff (pu)
Restraint region
K2
Operating region
K1
Is1
The transient bias is introduced when there is a sudden increase in the mean bias
measurement. The transient bias decays exponentially and it resets to zero once the
relay trips, or if the mean bias quantity is below the restrained element setting. The
operating current threshold is calculated at the maximum bias current. The transient
bias is calculated on a per phase basis and it is added to the operating current
calculated at the maximum bias. Therefore, the following differential current thresholds
are available:
Diff threshold phase A = Iop at max bias + transient bias_phase A Equation 13
The differential current is compared against the differential current threshold given above
on a per phase basis. If the differential current is above the threshold, then the biased
differential element might trip as long as the second harmonic and fifth harmonic
blockings are not asserted.
The transient bias technique considers a time decay constant, stability coefficients and
the differential function settings to provide a dynamic bias characteristic. Figure 2 shows
the differential thresholds calculated by the relay on a per phase basis for a AN external
fault on the star side of a Ynd11 transformer. It can be observed that the transient bias
has enhanced relay stability. For the relay to trip, the differential current should be
above the operating current at max bias + transient bias.
2 2
Transient bias - phaseB
Transient bias - phase A
Ibdiff - Phase B differential
1.5 Iadiff - Phase A Diff current 1.5 current
Differential threshold Phase B
1 1
0.5 0.5
0 0
0 0.5 1 1.5 0 0.5 1 1.5
t(s) t(s)
2
Transient bias - phase C
0.5
0
0 0.5 1 1.5
t(s)
Figure 3 shows the nominal biased characteristic, the dynamic threshold and the
differential current loci. The differential currents increment from A to B, meanwhile the
differential current thresholds also increase from A’ to B’. It can be observed that
considering the nominal characteristic for phases A and B results in a mal-operation
because Iadiff and Ibdiff are above the nominal characteristic. Taking into account the
transient bias quantities prevents an unwanted trip because Iadiff and Ibdiff are below
the dynamic threshold. From B to C the differential currents are below the dynamic
threshold from B’ to C’.
12
3.00 3.00
Nominal characteristic
2.50 2.50 Nominal characteristic
Iadiff - Phase A diff current
Ibdiff - Phase B Diff Current
2.00 B' Differential threshold phase A 2.00
Diff (pu)
Diff (pu)
Differential threshold phase B
B B'
1.50 1.50
B
1.00 1.00
C' A'
0.50 A' 0.50
C'
C C
A A
0.00 0.00
0.00 1.00 2.00 3.00 4.00 5.00 0.00 1.00 2.00 3.00 4.00 5.00
Bias (pu) Bias (pu)
3.00
Nominal characteristic
2.50
Icdiff - Phase C Diff Current
2.00
Diff (pu) Differential threshold phase C
1.50
B'
1.00
A' B
0.50
C'
C
A
0.00
0.00 1.00 2.00 3.00 4.00 5.00
Bias (pu)
The transient bias enhances the stability of the differential element during external
faults and allows for the time delay in CT saturation caused by small external fault
currents and high X/R ratios. For single-end or double-end fed faults the differential
current is dominant and the transient bias has no effect.
Figure 4 shows the differential thresholds calculated by the relay on a per phase
basis for a BN internal fault on the delta side of a Ynd11 transformer. The transient
bias does not prevent the operation of the differential element as the differential
current is above the operating current at max bias + transient bias.
2
6
transient bias - Phase A transient bias - Phase B
5
1.5 Iadiff - Phase A Diff Current Ibdiff - Phase B diff current
4
Differential threshold phase A Differential threshold phase B
I (pu)
I (pu)
1 3
2
0.5
1
0 0
0 0.5 1 1.5 0 0.5 1 1.5
t(s) t(s)
0
0 0.5 1 1.5
t(s)
Figure 5 shows that the dynamic threshold coincides with the nominal characteristic
because the transient bias for phase A is zero. For phases B and C the operating
currents have been increased due to the transient bias, but since this is an internal
fault the dynamic thresholds are well below the differential current loci.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 13
6.00
3.00
Nominal characteristic
B
2.50 5.00
Ibdif - Phase B diff current
Diff (pu)
Diff (pu)
1.50 3.00
Nominal characteristic B'
1.00 2.00
Iadiff - Phase A diff current
0.00 0.00 A
C
0.00 1.00 2.00 3.00 4.00 5.00 0.00 1.00 2.00 3.00 4.00 5.00
Bias (pu) Bias (pu)
6.00
Nominal characteristic
B
5.00
Icdiff - Phase C diff current
4.00
Differential threshold phase C
Diff (pu)
3.00
B'
2.00
1.00
C'A'
0.00 A
C
0.00 1.00 2.00 3.00 4.00 5.00
Bias (pu)
When second harmonic blocking is used to stabilize the restrained differential element
during inrush conditions, the CT saturation detection technique can be used to enhance
the restrained differential element operating time during internal faults with CT
saturation. The content of second harmonic may be above the second harmonic
threshold during internal faults with CT saturation. As a result, the biased differential
element may be blocked during an internal fault. If the fault level is not high enough,
then the unrestrained differential element will not be asserted; thus a fast trip cannot be
achieved. When the CT comes out of saturation, the biased differential element would
be operative. The result is a delayed differential trip [1], [2]. The delayed trip can be
avoided either by unblocking the biased differential element during internal faults or by
using a CT with a sufficiently high knee point voltage to avoid CT saturation (which might
not be possible).
The CT saturation detection technique distinguishes between magnetising inrush and
saturation; therefore, the relay stability is maintained during inrush conditions. To detect
a CT saturation condition the differential current samples on a per phase basis are
considered. The relay analyzes the differential current waveforms considering their
derivatives and dynamic and fixed thresholds that were determined by RTDS (real time
digital simulator) tests. The CT saturation detection logic unblocks the low set
differential element during CT saturation to allow the biased differential element
operation.
The no gap detection technique compliments the CT saturation technique. It considers
the number of samples on a per phase basis above a dynamic threshold within the last
N executions. This threshold is a function of the second harmonic content. If the
summation of the number of samples above the dynamic threshold is above or equal to
a fixed threshold (determined by RTDS tests) then there is no gap, and the blocking of
low set differential element is prevented.
The differential biased trip is affected by the CT saturation and no gap detection
techniques. If the second harmonic blocking is asserted and either the CT saturation
detection or no gap detection technique is asserted, then the biased differential trip is
14
unblocked. A biased differential trip will occur if the fifth harmonic blocking is not
asserted and the bias differential start signal is asserted. The differential biased trip logic
is described in Figure 6.
Is CrossBlock enabled?
5th Har Blk A
Yes = 1
No = 0
≥
No Gap A 5th Har Blk B
&
≥
5th Har Blk C
No Gap B
&
&
2nd Har Blk C
≥
CT Saturation C &
≥ ≥
&
No Gap C
&
External fault C
Extensive real time simulation testing has been done to evaluate these techniques.
Figure 7(a) is the disturbance record for a AN internal fault from a relay with CT
saturation and No gap detection enabled, the operating time of the low set differential
element is 28 ms. It can be observed that both the CT saturation logic and the no gap
detection logic are asserted. The CT saturation and No gap detection logics
complement each other. Figure 7(b) is the disturbance record for a AN internal fault
from a relay with CT saturation and No gap detection disabled. The operating time is 57
ms. Hence, the relay is 29 ms faster if the CT saturation and No gap detection is
enabled.
Figure 7 (a) CT saturation and no gap detection enabled (b) CT saturation and no
gap detection disabled
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 15
4 CT REQUIREMENTS
To determine the CT requirements for the differential function through fault injection tests
were performed under different X/R ratios, CT burdens, fault currents, fault types and
point on wave fault inception. The fault current waveforms considered a six fault
sequence, where the second set of three faults was controlled to generate the opposite
flux movement in the CT than the first set [4].
To establish the CT requirements the burden was incremented and the six fault
sequence repeated, until either the burden limit had been reached, or the relay mal-
operated.
Figure 8 shows the CT requirements when the transient bias technique is applied and
when it is not. It can be observed that when the transient bias technique is not included
the K factor is more than 5 times the K factor when the transient bias technique is
included.
K
150.0
20.0
15.0 100.0
10.0
5.0 50.0
0.0 0.0
0 8 16 24 32 40 48 56 64 0 8 16 24 32 40 48 56 64
If If
Considering the results shown in Figure 8 when the transient bias technique is applied
the CT requirements might be quoted as follows:
System K
Knee point voltage
conditions (CT dimensioning factor)
In < IF ≤ 64In K = 25 VK ≥ 25 × In × (RCT + 2RL + Rr)(1)
5 ≤ X/R ≤ 20 VK ≥ 25 × In × (RCT + RL + Rr)(2)
In < IF ≤ 64In K = 40 VK ≥ 40 × In × (RCT + 2RL + Rr) (1)
20 <X/R ≤ 120 VK ≥ 40 × In × (RCT + RL + Rr) (2)
Table1 CT requirements
Where:
K = CT dimensioning factor
IF = maximum external fault current
X/R = primary system X/R ratio
In = Relay rated current
Rr = resistance of any other protective relays sharing the current transformer (Ω)
(1)
= single phase fault or phase-phase-ground fault
(2)
= three phase fault or phase-phase fault
To ensure that through fault stability is achieved the following ratios:
16
5 CONCLUSIONS
It has been demonstrated that the transient bias algorithm improves the stability of the
biased differential element because the biased characteristic varies dynamically taking
into consideration the increase in bias current as well as the differential settings. In
addition, the CT requirements for a biased differential element are much lower when the
transient bias technique is included.
The CT saturation and no gap detection techniques improve the operating times as the
biased differential element is not longer blocked during internal faults with CT saturation.
6 REFERENCES
[1] IEEE Std C37.91-2000 Guide for Protective Relay Application to Power Transformers
[3] BLACKBURN J. L., 1997. Protective Relaying Principles and Applications. 2nd ed.
New York: New York
Resumen—Este documento presenta un nuevo algoritmo, sus Las técnicas comunes aplicadas para la protección de
fundamentos, resulta dos de p ruebas de validación p or transformadores serán rápidamente revisadas en la Sección-II.
simuladores en tiemp o real (RTDS) , además de los conceptos
básicos de protección convencional, est a t écnica comb ina los En los últimos años, la tecnología de protección basada en
principios de la prot ección diferencial porcentu al y protección microprocesadores ha ayudado al desarrollo y mejoras de las
direccional de corriente, y usando conceptos muy fundamentales
técnicas de protección y han ganado confiabilidad debido a los
como la ley de Kirchoff (corriente que entra=corriente que sale),
estas técnicas p odrán s er t ambién im plementada para la avances tecnológicos (doble procesador, comunicaciones por
protección dif erencial de barras de b aja impedan cia, se verá fibra óptica), haciendo de la protección mas sofisticada.
claramente como los efectos tradicionales de saturación de TCs y
niveles de cor riente directa (DC of fset) no tendrán mayor
incidencia en la decisión final de la operación del rele, con la cual II. PROTECCION DIFERENCIAL CONVENCIONAL
el reto de ignorar las operaciones en falso debido a los fenómenos
indicados sean de ay uda a la confiabilidad y seguridad de la A. Diferencial Porcentual
operación de los transformadores de potencia dentro del sistema,
estas técni cas mant ienen la característica porcentual diferencial
de doble pendiente y es su pervisado por el Nuevo alg oritmo Los reles de protección diferencial con restricción porcentual
Delta-Phase/ROCOD. han estado en servicio por muchos años. La Fig. 1 muestra el
diagrama de conexiones del rele diferencial típico. Los reles
Índice Términos—Transformador, Des fase Angular, Delta- diferenciales suman las Corrientes de cada entrada o salida
Phase, ROCOD, Registro de fallas, Diferencial, Oscilografias, IO asociado al dispositivo, para determinar la diferencia entre las
(Corriente de operación), IR (Corriente de restricción). Corrientes entrantes y salientes al rele. Una diferencia
sustancial indicara una falla en el elemento protegido o entre
los transformadores de corriente (TCs) localizados alrededor
I. INTRODUCION del transformador.
La protección de transformadores de potencia, es muy critica,
dado su importancia dentro del sistema, así como la magnitud
de la inversión que el mismo demanda, por tanto su protección
deberá ser segura, confiable y altamente sensible para la
detección de fallas de alta impedancia dentro de la zona de
protección, la presencia de saturación debido a fallas externas
de alta capacidad, la presencia de contenido de corriente
directa, y el bloqueo frente a fenómenos de inserción y
sobreexcitación.
Hugo Davila works for ERLPhase Power Technologies, Winnipeg, Canada (e-mail: hdavila@erlphase.com).
18
Saturación de TCs:
Si un TC es sometido a corrientes altas en el lado primario que
causa la saturación de la corriente secundaria, esta corriente
secundaria no será representativa de la corriente primaria y
por tanto puede causar la operación diferencial incorrecta, un
ejemplo de la saturación de TC se muestra en la figura
siguiente.
Como se puede ver en la Fig-4 la forma de onda senoidal de la El desfase angular es usado para supervisar la
corriente secundaria esta distorsionada durante varios ciclos. característica tradicional de doble pendiente para
Este error en la corriente secundaria puede crear una cantidad protección diferencial.
de corriente IO para una falla externa y tener como El ángulo entre las entradas es calculada muy
consecuencia un falso disparo. Varias técnicas se han usado rápidamente y fácilmente usando el producto
para detector la saturación de TCs para bloquear el rele de vectorial I1.I2=I1xI2 Cos ().
falsos disparos.
A. DELTA-PHASE ( Δ-Ø)
.…EC-02
Casos de Prueba
Figure C1: Energizacion del transformador en paralelo con carga Figure C3: Ángulos de las corrientes de fase en AT y BT durante la
pasiva en el lado BT. energizacion de transformador en paralelo con carga pasiva en el
lado de BT.
Figure D3: Corrientes en el lado AT y BT durante energizacion de Figure E2: Característica Diferencial durante energizacion de
transformador con falla interna sin carga en el lado de BT. transformador con falla interna y con carga pasiva en el lado de BT.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 25
Figure E3: Ángulos de las corrientes de fase en AT y BT durante la Figure F2: Corrientes en los lados AT y BT durante falla interna en
energizacion de transformador en paralelo con carga pasiva en el lado AT (100% del debando, Fase A) con carga pasiva en el lado de
lado de BT. BT.
F.- Caso (iv) Transformador Alimentando una carga radial-Con falla G.- Caso (v) Falla Externa sin saturación de CTs
interna
Figura I2: Falla interna de alta impedancia (200Ohm), podemos ver Figura J2: Falla interna de baja impedancia, se puede observa como
la presencia de corriente de operación. la corriente de operación es muy significativa.
VI. CONCLUSIONES
Dentro de las conclusiones de la aplicación de este Nuevo
algoritmo podemos mencionar lo siguiente:
La combinación de las tecnicas Delta-Phase/ROCOD
aplicado a la caracterisitca diferencial porcentual,
incrementa la confiabilidad para el caso de fallas
internas de alta impedancia
Incrementa la Seguridad para el caso de fallas de alta
magnitud externas y cercanas a la zona de protección
en condición de alto cometido de corriente directa
(DC offset) , la cual corresponde a la región de la
pendiente-2 en el esquema tradicional de doble
pendiente.
No hay dependencia en las magnitudes diferenciales
solamente. En el pasado aun con reles diferenciales
numéricos se han tenido falsos disparos o falta de
disparos durante fallas.
La técnica Delta-Phase proporciona información si la
falla es interna o externa, mientras que la técnica
ROCOD determina la sensibilidad de la falla dentro
de la zona de operación.
La combinación de estas técnicas mejora la
Confiabilidad, Sensibilidad y Seguridad tanto para
Fallas externas, internas de baja y alta impedancia.
VII. REFERENCES
VIII. BIOGRAPHY
Hugo Davila
Tiene el grado de Inegniero Mecanico-Electrico de la
Universidad Nacional de Ingenieria (UNI) en Lima-Peru.
Hugo es un miembro activo del IEEE, actualmente es Gerente
Regional de ERLPhase Power Technologies Ltd(inicialmente
NXTPhase) para la Region Centro America, Mexico y El
Caribe, Antes de unirse a NXTPhase, El trabajo para
Beckwith Electric Company como Ingeniero de Soporte
Tecnico en Proteccion y Control. Tambien tiene experiencia
trabajando como Ingeniero de campo en proteccion y control
para las principales empresas utilitarias de su pais, y es autor y
coauthor de varios documentos tecnicos sobre aplicaciones en
proteccion de sistemas de potencia. (e-mail:
hdavila@erlphase.com).
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 29
Abstract—Line current differential protection creates digital microwave and direct fiber-optic connections as well as
challenges for relay design and application. From a design synchronous optical network (SONET) or synchronous digital
perspective, the distributed nature of the line current differential hierarchy (SDH) systems, applications of line current
system imposes limits on the amount of data that can be
exchanged between the system terminals and calls for data
differential schemes kept expanding.
alignment schemes to enable the differential protection principle. The key benefits of differential protection as applied to
From the application perspective, line current differential power lines include good performance on multiterminal and
schemes are concerned with CT saturation, particularly in dual- series-compensated lines and lines of any length as compared
breaker applications; in-zone reactors and line-charging current; with distance or directional comparison schemes; considerable
in-line and tapped transformers; sensitivity to high-resistive immunity to changing system conditions, long-term evolution
faults; single-pole tripping; security on channel impairments;
of the system, or nontraditional short-circuit current sources,
application to lines with more than three terminals; and so on.
This paper reviews technical solutions to the line current
such as wind generators, photovoltaic sources, or power
differential design and application, addressing the common electronic-based sources in general; good sensitivity; and
design constraints and utility-driven application needs. The simplicity of application, at least from the protection
paper is a tutorial in this challenging area where protection perspective.
principles and applications mix with communications and signal The art of microprocessor-based line current differential
processing. protection advanced with the first generation of relays
bringing achievements in data synchronization, working with
I. INTRODUCTION wide-area communications equipment, enhancing protection
As a unit protection having its zone delimited by location principles (e.g., the Alpha Plane line differential element), or
of current transformers (CTs), the differential protection standardizing physical interfaces between relays and
principle is considered superior with respect to selectivity, multiplexers (IEEE C37.94).
sensitivity, and speed of operation as compared with Many lessons were learned during this period. Originally
directional comparison, phase comparison, or stepped distance designed for direct fiber connections, line current differential
schemes. schemes were mostly deployed over multiplexed channels
The differential function responds to the sum of all the because high-bandwidth fiber pairs were utilized for shared
currents of its zone of protection. Ideally, this sum equals zero data traffic. Protection engineers needed to learn new skills
under all events except for internal faults. Practically, related to digital communications. The communications
measurement errors and shunt elements inside the zone may equipment originally designed around carrying voice data
create a spurious differential signal, calling for adequate needed some adjustments to support protection applications.
countermeasures. These countermeasures became more Post-event analysis related to communications impairments
sophisticated with advancements in the field of differential was difficult because of the lack of recording and data-
protection and progressed from adding an intentional time gathering facilities at the interface between relays and
delay, percentage restraint, and harmonic restraint and multiplexers or modems.
blocking to sophisticated external fault detection algorithms Looking at both the lessons learned from the first
and adaptive restraining techniques. generation of line differential relays and at the emerging needs
As applied to line protection, the differential principle for new functions and features, this paper outlines general
faced the limitations of line length. Analog schemes using design directions for a next generation line current differential
pilot wires can only be applied to very short lines because of protection system.
signal attenuation due to series resistance and the shunt The paper provides a utility perspective on needs and
capacitance of the pilot. These applications are still beneficial expectations for a new line current differential relay. These
because the very short lines cannot be adequately protected new functions include better security against CT saturation in
with distance relays. applications with dual-breaker terminals, line-charging current
The development of microprocessor-based line current compensation, multiterminal applications, a redefined role of
differential schemes utilizing digital communications channels backup functions, and accommodating in-line transformers, to
redefined the field of line protection. name a few.
When suitable long-haul digital communications channels From the relay design point of view, this paper addresses
became more readily available because of the deployment of the stated requirements and describes an optimized line
30
F. Multiterminal Applications
A modern relay should provide protection for lines with
more than three terminals. This need is driven by tapped loads
or distributed generation tapped to transmission lines.
G. Auxiliary Functions
A modern relay should support modern and emerging
functions in a variety of areas. This includes but is not limited
to state-of-the-art Ethernet connectivity, synchrophasors,
IEC 61850, secure point-to-point digital signaling, user-
programmable math, customizable user interfaces, and cross-
tripping.
The relay must also support current CIP (Critical
Infrastructure Protection) requirements for passwords,
security, and disturbance monitoring, including digital
disturbance recorder (DDR), Sequential Events Recorder
(SER), and digital fault recorder (DFR) requirements.
Fig. 1. Simplified architecture of a typical line current differential system.
H. Single-Pole Tripping and Reclosing
We expect that under congested transmission, increased The multiple relays in the system depend on each other in
penetration of distributed generation, and the overall order to serve their purpose of providing the line current
expansion of the North American power system, more and differential protection but are located at different substations
more transmission lines will be protected using the single-pole and operate autonomously in terms of sampling, frequency
tripping and reclosing philosophy. tracking, transmission and reception of data, filtering, and
A modern line current differential relay should be capable protection calculations.
of single-pole tripping and reclosing. This applies to tripping Each relay samples its analog input currents via an analog-
from the differential, as well as backup functions. to-digital (A/D) converter to obtain a digital representation
(iD) of the analog inputs (iA). The sampling rate may vary from
I. Self-Monitoring and Relay Maintenance a few kilohertz to less than 20 samples per cycle, depending
A new trend of extending maintenance intervals based on on the design. Typically, the same digital data feed the line
the amount of self-monitoring in microprocessor-based relays current differential subsystem of the relay, as well as all the
has gained momentum. other local functions—metering, fault recording, and
The concept supported by the emerging NERC (North protection (distance backup, breaker failure, overcurrent, and
American Electric Reliability Corporation) standards so on). Therefore, the sampling is typically of high resolution
encourages relay manufacturers to quantify the extent and and rate, even though the line current differential function may
strength of self-monitoring in their microprocessor-based utilize these data at lower sampling rates.
relays so that adaptive maintenance programs can be formally The sampling may be performed at a constant rate or at a
established at the user organizations. variable rate, tracking the power system frequency. The
As a logical consequence of this trend, the next generation samples may be taken asynchronously with the local relay
relays should be designed with the ease of quantification of time or synchronously with the absolute time to simplify
the embedded self-monitoring in mind and with the goal of implementation of synchrophasor measurements.
making the self-monitoring as strong as possible without Some implementations allow the relays in the differential
impacting the availability of the device. The ultimate goal is system to sample asynchronously from each other, while some
the option to “run to fail” with all relay failures being fail safe implementations use the communications channel to force
and detectable by the self-monitoring tests. synchronization of the relay sampling clocks.
Line current differential schemes offer extra opportunities To facilitate the line current differential function, the local
in this respect. Because multiple, independent relays constitute current data must be communicated to the remote terminals
the protection system, data are shared and can be crosschecked ( i TX → i RX in Fig. 1). Each relay that receives a full set of
between the relays in the differential system.
data from all its remote peers can align the data, run its
differential trip equations, and operate autonomously in the
III. A TYPICAL LINE CURRENT DIFFERENTIAL SYSTEM so-called master mode. Each relay that only serves the data
With reference to Fig. 1, the most distinctive feature of a but does not receive all the remote data because of a
line current differential protection system is that it consists of permanent lack of communication (channel not installed) or a
multiple relays operating independently and linked by a digital temporary loss of communication is referred to as working in
communications channel. the slave mode. Direct transfer tripping (DTT) from masters
allows the slave relays to issue the trip command to their
breakers.
32
Channels traditionally used for line current differential goal to null out the offset, meaning to force synchronization of
protection are limited in bandwidth (64 kbps is a typical the two clocks. This approach works satisfactorily in two-
value), and therefore only limited amounts of data can be terminal applications but becomes complex in multiterminal
exchanged between the relays at different line terminals. In applications.
this respect, various line current differential designs differ Another method is to time-stamp the transmitted data with
considerably. the local time and, knowing the clock difference between the
Some relays exchange samples of currents, some relays two relays, resample the data to align them to the same time
work on phasors, and yet others work on nonconventional instants. This method works naturally for any number of
quantities such as a positive or negative current charge terminals as it allows each relay to freewheel without forcing a
between consecutive zero crossings of the current. larger group of relays into relative synchronism.
This variety of approaches is driven by the substantial The channel-based synchronization method works well if
design challenge of conveying sufficient amounts of data to the channel is symmetrical. If the transmit and receive delays
facilitate adequate protection performance, meeting channel differ, the alignment becomes less accurate, leading to a
bandwidth limitations, and providing for robust data phantom shift between the local and remote current
synchronization, all at the same time. measurements. Various protection algorithms have different
When working with current samples, the system can collect immunity to such shifts if they are minor, but with major
and exchange samples at a rate that is high enough for asymmetry, both dependability and security are impacted to
accurate interpolation (e.g., 1 kHz). As a result, the design the point of a complete loss of function.
challenge of data synchronization can be met by measuring In such cases, line current differential relays employ
the data latency between the remote and local relays and synchronization, if needed, based on an external time
interpolating (resampling) the remote current samples to align reference to augment or substitute for the channel-based
them with the local samples. While resampling, the relay can synchronization. Until now, the Global Positioning System
perform frequency tracking (i.e., take new virtual samples at (GPS) has been the only practical way to provide for common
the rate following the actual system frequency). As an extra timing across wide areas. Reliance on a satellite system and
advantage, the actual sampling clocks of the individual relays additional devices is not an ideal protection solution.
in the system do not have to be synchronized. Therefore, applications with symmetrical channels have been
When working with phasors, the system faces a considered superior, while the need for GPS assistance has
disadvantage that twice as much bandwidth is required to send been considered the least preferred solution.
the real and imaginary parts of the currents. As a result, the However, terrestrial systems are emerging for providing a
phasor exchange rate cannot be high enough to facilitate common time reference [1]. These systems are synchronized
phasor interpolation, and the relay sampling clocks must be to GPS—for the benefit of using true time under normal
synchronized. This complicates the design, particularly in conditions—via multiple receivers located at multiple
multiterminal applications where more than two relays need to geographical locations but continue to provide common
stay synchronized. Also, in order to track system frequency, timing independently should all the GPS inputs be lost. These
this kind of design must control relay sampling clocks with systems are a part of the communications infrastructure that is
the concurrent goals of staying synchronized and following used for line current differential communications in the first
the power system frequency. Additionally, filtered phasors place. Therefore, they are a safe means of providing for
suppress high-fidelity information in the input currents, such external time reference without introducing more devices,
as harmonics or rate of change of currents, making certain unnecessary interdependencies, or reduced reliability or
applications more difficult, such as in-line transformers or fast availability.
detection of CT saturation. There are two distinct communications channel
Data synchronization (alignment) is one of the key applications for line current differential protection: dedicated
elements of a line current differential system. Commonly, a point-to-point channels (typically fiber based) and multiplexed
channel-based synchronization method known as a “ping- channels.
pong” algorithm is used to estimate clock offset between two Dedicated point-to-point channels remove any third-party
relays working via a communications channel. This well- devices between the two communicating relays and, with
established timing method for communications networks them, all the associated failure modes. Such channels are
measures a two-way travel time by time-stamping the sending inherently symmetrical, and any communications impairments
and receiving of communications events and exchanging some are caused only by the relays themselves or the passive media
of the time stamps. Assuming that the channel is symmetrical between the relays.
(meaning it is of the same latency in both directions), the total As long-haul-dedicated channels are more expensive and
channel time can be recalculated into the clock offset between are usually available only under special circumstances,
the two relays (see Section XI for more information). With the multiplexed channels are used, typically within a
knowledge of this offset, the system is capable of aligning the SONET/SDH infrastructure. Multiplexed channels put third-
data. party devices between the communicating relays with all their
One method of alignment is to use the measured clock complexity, failure modes, and ride-through attempts often
offset to control the local sampling time at both ends with the designed for nonprotection applications. This requires the line
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 33
current differential relays to be designed for a variety of Note that when sending packets 16 times a 60 Hz power
failure modes caused by the active communications cycle over a 64 kbps channel, we can only use 66 bits, having
infrastructure between the relays. practically no room for payload even when significantly
This paper elaborates on a number of aspects briefly optimizing the payload and the overhead.
introduced in this section, while reviewing design directions Still, when designing relays for high-speed operation, it is
for a new line current differential system. beneficial to keep the rate at which fresh data are passed from
subsystem to subsystem high so that the total data latency is
IV. RELAY DESIGN CONSTRAINTS BECAUSE OF AVAILABLE minimized. Therefore, it is advantageous to exchange the
CHANNEL BANDWIDTH analog data between line current differential terminals
From the relay design perspective, the primary constraint multiple times per cycle.
of a microprocessor-based line current differential system is As shown by our simple calculations, the task of passing
the requirement to work with a communications channel of a the right data at a high rate is not trivial. It is clear that the
limited bandwidth. protection-driven payload and the communications-driven
Today, line current differential relays must work with constraints must be addressed in a concurrent design in order
64 kbps channels. Even though direct point-to-point fiber to yield a high-performance scheme. It is very important
connections allow bandwidths in the range of tens of megabits which quantities are sent, how often, and how they are
per second, and multiplexed channels can be requested with a encoded, packetized, and protected for integrity.
bandwidth of Nx64 kbps, the 64 kbps bandwidth continues to When moving data within a single relay using internal data
be a common application scenario. buses designed adequately, we do not have to apply as much
To realize the amount of data that can be conveyed for optimization. When working with a low-bandwidth channel in
protection purposes over a 64 kbps channel, let us assume a a line current differential system, however, an important part
sampling rate of 16 samples per cycle and review the of protection design is to select protection algorithms that
following: maximize the available bandwidth.
• 64,000 bits per second = In general, the following solutions aid the design:
• 1,067 bits per a 60 Hz power cycle = • Smart encoding. Properties of the sent data, if studied
• 267 bits per quarter of a 60 Hz power cycle = carefully, may allow reducing the number of bits
• 66 bits per each of 16 sample sets in a 60 Hz power required to convey their values. For example, a
cycle negative-sequence restraint can be sent as per unit of
The 267 bits available every quarter of a cycle or 66 bits the highest phase current restraint. Or the value of
available 16 times a cycle may seem sufficient. However, as current can be encoded on a log-based scale rather
with any digital communications scheme, there is always than a linear scale to recognize the wide range of
certain overhead in the communications packet on top of the current signals.
actual payload. In a line current differential system, the • Interleaving, or sending small fragments of slowly
digitally encoded values of currents are the payload. The changing data in consecutive packets. For example,
major components of the overhead include the following: the channel-based synchronization calculations can be
• A header is required to tell consecutive packets apart run at a rate lower than the packet rate.
at the receiving end. A total of 15 bits may be needed. • Sending various pieces of data at optimum rates
• The integrity of the data must be protected by required by the applied protection equations.
redundancy checks such as Bose, Ray-Chaudhuri, • Increasing the packet size so that the payload-to-
Hocquenghem (BCH) Code or Cyclic Redundancy overhead ratio becomes more favorable.
Code (CRC). A total of 32 bits is typically needed. • Selecting the payload in a way that maximizes the
• Channel-based synchronization methods need to information content in it, given the intended protection
append certain time values to the packet. A total of algorithms.
16 bits or more may be required. In order to illustrate the concept, consider the packet and
• The packet must support basic addressing to prevent protection equations presented in this paper. This solution
accidental cross-connection of line differential relays. works with 1 kHz samples of currents and utilizes proven
A total of 4 to 8 bits may be required for basic Alpha Plane protection equations [2].
addressing.
• DTT and other flags must be supported. A total of 4 to
8 bits may be used for this purpose.
The above can add 50 to 80 bits of overhead.
34
Table I summarizes the packet content. • Restraint quantities are magnitudes that can be
TABLE I encoded using fewer bits. In addition, the restraint
PACKET PAYLOAD DEFINITION quantities are auxiliary terms and can be encoded with
lower accuracy without sacrificing security.
Symbol Meaning
• The five restraint terms can be interleaved, saving
iA(k) Present (k-th) sample of the line current, A-phase extra communications bandwidth.
iA(k-1) k-1 sample of the line current, A-phase • The negative- and zero-sequence restraint terms can
iA(k-2) k-2 sample of the line current, A-phase be encoded as per-unit values with respect to the
highest phase restraint, further reducing the bandwidth
iB(k)
requirement.
iB(k-1) As above, B-phase • The packet format makes the solution scalable, as it
iB(k-2) works with any number of local currents at a given
iC(k)
line terminal. The packet always contains the partial
differential and partial restraint terms.
iC(k-1) As above, C-phase
The following sections explain how this packet format
iC(k-2) enables fast detection of saturated CTs, provides for proper
IAR Restraint term, A-phase restraint in dual-breaker applications, and supports line-
charging current compensation and protection of in-line power
IBR Restraint term, B-phase
transformers.
ICR Restraint term, C-phase
IQR Negative-sequence restraint term V. DUAL-BREAKER TERMINALS AND PROTECTION SECURITY
IGR Zero-sequence (3I0) restraint term A. Introduction
Dual breaker refers to a line configuration where the line is
The payload of Table I can be encoded using slightly more
terminated in a double-bus double-breaker, breaker-and-a-
than 100 bits, allowing us to send packets every
half, or ring-bus substation (Fig. 2). Modern line protection
3 milliseconds (3 milliseconds at 64 kbps allows 192 bits).
relays support two three-phase sets of current inputs and
The following sections of this paper explain in detail how
measure the two currents independently. These relays work
the individual data items in the packet are calculated prior to
with the internally summed current for the main protection
transmission and consumed upon reception. In short, the
function—distance, ground directional overcurrent in a pilot-
instantaneous values are total line currents at the sending
assisted scheme, or the line current differential. At the same
terminal (a sum of all the local currents, such as from the two
time, it provides for two independent breaker failure functions,
breakers of a dual-breaker termination), while the restraint
two independent autoreclosers, metering, recording, and time-
terms are sums of magnitudes of all the local currents (such as
coordinated backup, all responding to the individual breaker
from the two breakers of a dual-breaker termination). Simply
currents.
put, the instantaneous values are partial line differential
currents, and the restraint terms are partial line restraint
currents.
The selected payload provides the following benefits:
• Fresh data are sent every 3 milliseconds, or more than
five times a 60 Hz cycle, minimizing latencies and
speeding up operation of the relay.
• A packet lost just before or during an internal fault
erases only 3 milliseconds of data, allowing for fast
recovery and preventing delayed operation of the Σ
relay.
• Working with 1 kHz samples offers good fidelity of
differential current measurements and allows the
calculating of harmonics for in-line transformer
applications and fast detection of saturated CTs.
• Sending three samples of instantaneous current per
packet improves the payload-to-overhead ratio.
• Sending one value of a restraint per packet (or per
three samples of instantaneous values) reduces Fig. 2. Dual-breaker line termination and application of dual CT input
relays.
bandwidth requirements, while it is sufficient for
protection applications.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 35
As a result, dual CT input line relays enable a complete differential functions. Two approaches are used independently
protection, metering, monitoring, and fault recording solution and simultaneously in order to secure these functions.
for dual-breaker line terminals. First, the notion of a through-fault current is developed via
Dual-breaker applications working with breaker currents proper restraint terms. These terms are inserted into the
may create some protection challenges. communications packet, utilizing a minimum possible
First, the two CTs may be rated much higher as compared bandwidth. The restraints are not used directly for tripping but
with the load of the protected line, challenging protection feed into generalized Alpha Plane trip equations (see
sensitivity and calling for low settings compared with the CT Section VII).
secondary values. Second, an external fault detection logic is implemented to
Second, a through fault across the two breakers may signal the occurrence of an external fault and increase security
challenge protection security, particularly if the remote line beyond the natural level provided by the restraint terms.
terminals are weak and/or the applied settings are sensitive.
B. Partial Differential and Restraint Terms
With reference to Fig. 3, an external fault below CT-2
draws a fault current from the local system via CT-1 and from Consider the three-terminal line configuration of Fig. 4,
the remote terminal(s) via the protected line. The local relay with each line end terminated as a dual-breaker connection.
responds to the internally summed iCT-1 and iCT-2 currents T1 T2
(iL(MEAS)). With no CT errors, this virtual current is the line
current at the local terminal. When considering CT errors, i1 CT-1 CT-3 i3
however, this current is measured with a finite accuracy as
i(T1) i(T2)
compared to the real line current (iL(TRUE)).
Strong
system i2 CT-2 CT-4 i4
i(T3)
Fig. 3. A through-fault scenario challenging protection security of a dual- i B( T1) = i1B + i 2B (1b)
breaker line application.
i C( T1) = i1C + i 2C (1c)
If the fault current is high and the CT carrying the current
away from the line terminal saturates (CT-2, in this case), I AR ( T1) = I1A + I2A (2a)
enough error can develop in the measured line current, and its
direction may be reversed with respect to the true current, I BR ( T1) = I1B + I2B (2b)
especially if the true current is low because the remote line
ICR ( T1) = I1C + I 2C (2c)
terminal(s) are relatively weak.
Close-in reverse faults depress the voltages, while CT IQR ( T1) = I1Q + I2Q (3a)
errors can reverse the measured line current. With enough CT
saturation, any line protection method can be defeated in this IGR ( T1) = I1G + I2G (3b)
situation: distance, ground directional overcurrent, line current
differential, phase comparison, and so on, unless the relay where lowercase symbols stand for instantaneous values, and
design and/or the application logic address the issue explicitly. uppercase symbols denote magnitudes.
Ground (zero-sequence) and negative-sequence elements Similar terms are calculated for Terminals T2 and T3.
are particularly vulnerable during faults that do not produce a If required, CT ratio matching between the local CTs and
sequence component in the primary currents (three-phase remote CTs of the protected line is performed prior to the
symmetrical faults and line-to-line faults for ground elements, calculations.
and three-phase faults for negative-sequence elements). Under The above quantities constitute the core protection payload
these fault conditions, the true primary sequence current is per Table I. Each terminal calculates its partial terms and
zero, but a CT error will generate a secondary sequence sends them to its peers.
current. Assume now that an external fault occurs at the T1
This paper is concerned with the phase (87LP), ground terminal. Under CT saturation, the partial differential current
(87LG), and negative-sequence (87LQ) line current sent by this terminal may have a considerable error in it.
However, at the same time, this terminal sends a restraint term
36
that reflects the external fault current, feeding the Alpha Plane Σ
trip equations with information to counterbalance the errors in
the differential signal.
Upon receiving and aligning all the partial terms, each
relay calculates the total line differential and restraint currents
Σ
for the 87LP function (A-phase is shown; B- and C-phases are
similar):
i ADIF = i A ( T1) + i A ( T2 ) + i A ( T3) = ... Fig. 5. External fault detection logic.
(4)
... = i1A + i 2A + i3A + i 4A + i5A + i 6A A simplistic implementation of this method would require
I ARST = I AR ( T1) + I AR ( T2) + I AR ( T3) = ... instantaneous values of all the currents of the line differential
(5) zone to be communicated between the relays. This
... = I1A + I 2A + I3A + I 4A + I5A + I6A requirement is not practical and has been overcome as follows.
and for the 87LQ and 87LG functions: Each terminal uses (8) to derive its own instantaneous
restraining current based on its local currents and the partial
IQRST = IQR ( T1) + IQR ( T2) + IQR ( T3) = ...
(6) differential terms from the remote terminals (refer to Fig. 4;
... = I1Q + I2Q + I3Q + I4Q + I5Q + I6Q the phase index—A, B, or C—is omitted).
IGRST = IGR ( T1) + IGR ( T2) + IGR ( T3) = ... i RST ( T1) = i1 + i 2 + i( T2 ) + i( T3) (8a)
(7)
... = I1G + I 2G + I3G + I 4G + I5G + I6G
i RST ( T2 ) = i3 + i 4 + i( T1) + i( T3) (8b)
In this way, each relay in the line current differential
system derives the true value of the restraint current,
i RST ( T3) = i5 + i 6 + i( T1) + i ( T2) (8c)
regardless of the location of the fault and the short-circuit
capacity behind any given relay. For example, the T3 terminal where x stands for the absolute value of an instantaneous
may be very weak, therefore producing very little restraint for
a fault at T1. However, it will receive the T1 partial restraint signal x.
values to counterbalance possible errors in the T1 partial The above terms are not communicated between the relays
differential current. but used locally. Each relay executes the logic of Fig. 5 using
Note that the proposed design is scalable and works with its instantaneous local restraint (8) and the line differential
any number of local currents without the need to modify the current (4).
communications package or increase the bandwidth. The other The relay at the terminal with an external fault is
local currents can be line reactor currents, calculated line- guaranteed to detect the fault because it measures the through-
charging currents, or currents of a small bus included in the fault current. The other relays may or may not detect the fault,
line protection zone, as long as the relay hardware supports depending on the current flow between the terminals. If a
extra current inputs. given terminal is weak, it may not detect the external fault
The line differential and restraint currents feed into located at the remote strong terminal.
generalized Alpha Plane trip equations, as explained in Therefore, the EFD flag derived locally is added to the
Section VII. communications payload and consolidated with the other
terminals upon reception, as shown in Fig. 6.
C. External Fault Detection Logic
Stub bus To outgoing packets
In addition to relying on natural levels of restraint, the
solution described in this paper incorporates an explicit EFDA
external fault detection (EFD) logic with the intent to increase Local terminal EFDB
EFD
security further during external faults and relax the CT EFDC
requirements and related engineering effort of verifying the Remote terminals EFD1
CTs. (incoming packets)
EFD2
Fig. 5 presents the EFD logic. This method is successfully EFD3
used in bus and transformer differential relays [3] [4]. An ...
explicitly about the external fault. As a result, a differential The EFD logic is scalable and works seamlessly with any
term in any given packet with a potential error because of an number of local currents at any given terminal without the
external fault and CT saturation is always accompanied by the need to modify or expand the packet.
EFD flag and an elevated restraint term. In our example, the Upon asserting the EFD flag, the relay increases security
T3 terminal is fully prepared to deal with the event at T1, even by intentionally raising its natural restraint terms. This may
though it does not have any direct visibility into this event include harmonic restraint—adding harmonics in the
(i.e., it does not measure the i1 and i2 currents directly). differential current to the restraint or adding a portion of the
Fig. 7 presents a simulation example illustrating the phase restraints to the negative- and zero-sequence restraint
restraint terms and the EFD logic. The terminal with the terms to secure these elements under external faults that do not
external AB fault asserts the EFD flag safely before CT produce any natural sequence restraint. The intentionally
saturation impacts accuracy and produces considerable errors amplified auxiliary restraint term feeds into the Alpha Plane
in the A-phase current sent by this terminal. Note that the trip equations as explained, further increasing protection
restraint term in the A-phase is considerable, already security.
stabilizing the 87LP function.
VI. MULTITERMINAL LINE APPLICATIONS
Line current differential relays have been primarily
designed to cover two- and three-terminal line applications.
iCT-2, A
application.
Recently, reasons to provide for more than three-terminal
line applications became more compelling.
Some utilities tap subtransmission and transmission lines to
feed distribution stations and larger industrial loads. In some
i, A
Because lines tapping new generation are essential to In this solution, the external time reference synchronization
having the generation available in the first place, they may method is used (see Section XI), while deterministic Ethernet
apply single-pole tripping and reclosing. This complicates with guaranteed bandwidth and latency becomes the data
protection applications further. transport mechanism (Fig. 8). In a way, the next generation
Very often, however, lines connecting distributed SONET/SDH built for utility applications, including
generation have digital communications channels available. protection and synchrophasors, becomes a part of the line
Line current differential protection is a natural solution in this current differential system. This is a simple and robust
case, eliminating complexity and uncertainty related to the solution for N-terminal line current differential relaying
behavior of nontraditional sources, while reducing the danger because of the following:
of overtripping and increasing availability of the added • The SONET/SDH network is entirely under the
generation. control of the user. It can be deployed and configured
In order to provide multiterminal (N-terminal) line current for redundancy and is operated and maintained as a
differential protection, a differential relay must first resolve protection-grade system.
the following issues: • The common time reference provided by the system is
• Consolidation of all the terminal currents for independent from GPS. Even if all dispersed receivers
protection calculations. are lost, the system maintains common time across the
• Connectivity between N terminals. wide area.
• Synchronization between N terminals, given their • With the SONET/SDH deterministic communications
actual connectivity pattern. backbone, a portion of Ethernet traffic is isolated for
The solution outlined earlier in this paper of sending partial deterministic delivery across a wide area. In this way,
differential and partial restraint terms from each relay solves Ethernet is more of a connectivity media between the
the first problem. Regardless of the number of local currents at line current differential relays and the multiplexers,
each line terminal (single breaker, dual breaker, small bus), while the actual transport is rigorously controlled by
the same optimized packet conveys all the information the next generation SONET, using its deterministic
required to provide a high-performance line current backbone.
differential function. The next section explains how the Alpha • Using the same system for timing and data transport
Plane principle is applied to an arbitrary number of terminals. improves reliability by reducing the total number of
Another challenge is the connectivity between N terminals. devices and associated failure modes.
Direct point-to-point connections require each relay to support
N – 1 communications ports for exchange of data with all its
peers (e.g., six ports for a seven-terminal application). This
M
increases the relay part count and, as a result, impacts cost,
UX
availability, and reliability.
MUX
MUX
MU
VII. GENERALIZED ALPHA PLANE FOR MULTITERMINAL This paper introduces a generalized N-terminal Alpha
APPLICATIONS Plane concept. This method calculates a two-terminal
A. Introduction equivalent for a general N-terminal case and applies the tried-
and-true Alpha Plane principle to the two equivalent currents.
The Alpha Plane current differential protection principle
compares individual magnitudes and angles of the zone B. Mapping N-Terminal Currents Into Two-Terminal
currents. The principle is easy to understand for the case of a Currents
two-terminal line. Under balanced conditions, the two currents The general N-terminal Alpha Plane works with two
of the zone (IL and IR) are equal in magnitude and opposite in equivalent currents (IL EQ and IR EQ) calculated from the N
phase. This yields an operating point on the Alpha Plane of currents of an arbitrary N-terminal zone, using the differential
k = 1∠180°. Under internal faults, the complex current ratio, and restraint terms as a transformation tool.
k, departs from this ideal blocking point, allowing the Alpha Consider a general N-terminal differential zone of
Plane element to operate. Blocking and operating regions are protection, as shown in Fig. 10a. The classical differential
shaped as pictured in Fig. 9, with typically two easy-to-set principle derives the following differential and restraining
parameters. currents for this zone (all currents are phasors in the following
equations, and | | stands for the phasor magnitude):
Im(k)
I DIF( N ) = ∑ nN=1 In (9a)
Re(k) I1
I3
–1
IDIF(N) IDIF(2)
s
IRST(N) IRST(2)
diu
Ra
IN
I4 IR EQ
significant, will be approximately located along the line of the Solving for the two-current equivalent, we obtain:
fault current. Therefore, by selecting the reference current IP IL EQ = 11.1 A∠11.7° and IR EQ = 18.9 A∠160°
that is closest in phase to the differential current, we position Note that when calculated for this two-terminal equivalent,
the two equivalent Alpha Plane currents along the lines of the
the differential and restraining currents are 11.2 A∠128° and
current flowing in and out of the zone. 30 A, exactly as in the original three-terminal system.
To select the reference current IP, the following auxiliary
The above two equivalent currents give the operating point
numbers are calculated first:
on the Alpha Plane of 1.71∠148.3°. Fig. 11 presents this case
(
R n = real In • I*DIF( N ) ) (11) graphically.
Three-terminal application Two-terminal equivalent
where n = 1..N.
The current with the highest value of R becomes the IRST IRST
Imaginary
Imaginary
I3 IR EQ
I1 IL EQ
β = angle ( Ip ) (12) I2
And the two currents of the two-terminal equivalent are Fig. 11. Graphical illustration of the numerical Example 1.
now calculated as follows: 2) Example 2
I L EQ = Continue the simulation example of Fig. 7, and refer to
Fig. 12, presenting the zone differential and restraining
⎛
( ) ⎞
2
⎜ Im ( I X ) – I RST( N ) – Re ( IX )
2
currents in the A-phase. The equivalent Alpha Plane yields an
⎟ (14a)
⎜ + j• Im ( IX ) ⎟ •1∠β
( )
operating point of about 0.5∠170°. Note that in this case, the
⎜ 2 • I RST ( N ) – Re ( IX ) ⎟ IP current is selected with some approximation, as the line
⎝ ⎠
current differential system does not work directly with the
(
I R EQ = IRST ( N ) – IL EQ •1∠β ) (14b) individual currents at the faulted terminal. Still, the large
restraint term compared with the spurious differential keeps
The traditional Alpha Plane protection principle takes over the equivalent Alpha Plane in the blocking region.
from here, working with the IL EQ and IR EQ currents. 100
The classical differential principle has been used in this
0
iCT-2, A
150
and ground differential elements with the filtered differential
100
and restraint currents obtained via (4) through (7) from the
partial terms communicated between the relays. 50
0
C. Numerical Examples 0.2 0.25 0.3 0.35
1) Example 1
kMAG (87LP)
1
Consider the following three-terminal application:
0.5 Set point:
I1 = 10.0 A∠160° Radius = 5
I2 = 8.0 A∠–175° 0
0.2 0.25 0.3 0.35
I3 = 12.0 A∠30°
200
kANG (87LP)
If high sensitivity is required from the 87LP function, line- The average line voltage can be approximated by the
charging current is, however, a significant concern. average terminal voltage, and therefore:
Line-charging current can be compensated for in a line 1 d
current differential relay using voltage signals. This section i C _ TOTAL = CTOTAL • • ( v1 + v 2 + v3 ) (15b)
3 dt
explains and illustrates the basic principles of compensation
and presents a method to make the compensation immune to Rearranging further:
problems with voltage transformers (VTs). 1 d 1 d
i C _ TOTAL = • CTOTAL • v1 + • CTOTAL • v 2 + ...
B. Principle of Line-Charging Current Compensation 3 dt 3 dt
(15c)
The purpose of line-charging compensation is to remove 1 d
... + • CTOTAL • v3
the charging current from the differential current. Ideally, the 3 dt
method applied should work under balanced and unbalanced In other words, the total charging current is the sum of
conditions, transposed and nontransposed lines, energization, three components:
external faults, internal faults, and other events.
i C _ TOTAL = i C1 + i C2 + i C3 (16a)
With reference to Fig. 13, a multiterminal line draws a
charging current through its distributed capacitances. The each derived from a single line terminal voltage:
exact distribution of this current depends on the line and 1 d
system parameters, as well as on the voltage profile along the i C1 = • CTOTAL • v1 (16b)
3 dt
line and its segments. Higher voltages draw larger charging
currents. Open-ended lines develop an overvoltage at the open 1 d
i C2 = • C TOTAL • v 2 (16c)
end while not drawing any current from that end. During 3 dt
faults (internal or external) voltages change and become
1 d
unbalanced, causing changes in the charging current, with the i C3 = • CTOTAL • v3 (16d)
charge flowing out and into the line. 3 dt
The above explains that each terminal can calculate a share
of the total charging current based on local voltage and a
portion of the total line capacitance proportional to the number
of line terminals that perform the compensation at any given
time.
These fractions of the charging current when summed up
by the final differential current will null out the actual
Fig. 13. Distributed capacitance three-terminal line. charging current.
This principle is key—the line current differential system
From the differential protection point of view, however, the
effectively calculates the charging current based on the
total charging current is of primary interest. Contributions to
average voltage from all line terminals, without sending any
the differential current from the individual line terminals are
voltages between the relays. Instead, each terminal subtracts
secondary. If so, the total line-charging current can be well
its share of the charging current from the measured current
approximated as a current drawn by the total line capacitance
and sends it to its peers (TX is transmitted to the peers; RX is
under the average line voltage. The former is known and
received from the peers):
becomes a user setting. The latter can be calculated from the
measured line terminal voltages. i TX = i MEASURED – i C (17a)
With reference to Fig. 14, the line capacitance can be and calculates the line differential current as:
represented by a lumped parameter model at each terminal of
i DIF = i TX + ∑ i RX (17b)
the line that allows the line current differential relay to
measure the voltage. Using Fig. 14 as an example, the differential current is
calculated as follows:
i DIF = ( i MEASURED1 – i C1 ) + ( i MEASURED2 – i C2 ) +
(18a)
( iMEASURED3 – iC3 )
or
i DIF = i MEASURED1 + i MEASURED2 + i MEASURED3 –
(18b)
Fig. 14. Lumped parameter three-terminal line. ( iC1 + iC2 + iC3 )
or
d
i C _ TOTAL = CTOTAL • vAVERAGE (15a) i DIF = i MEASURED1 + i MEASURED2 + i MEASURED3 – iC _ TOTAL (18c)
dt
The share of the charging current estimated at a given
terminal may not equal the actual charging current supplied by
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 43
v1, kV
terminal estimates its share of the total charging current based
on the voltage at the open end, provided line-side VTs are
installed. At the same time, the closed terminal underestimates
its share. When added up in the differential calculations, all
the estimates of the charging current will, however, match the
actual total charging current of the line.
In general, for a line with N terminals performing charging
iC1, A
current compensation, each terminal uses 1/N of the total line
capacitance and its own voltage to estimate its share of the
charging current.
C. Three-Phase Implementation
As indicated by (15), the charging current is calculated as a Fig. 15. Sample line energization: Terminal 1 voltage and the calculated
derivative of the voltage signal, assuming known capacitance share of the charging current.
of the line. Fig. 16 shows the voltage and the calculated share of the
A microprocessor-based relay uses digital filtering to charging current for the second terminal. Again, the actual
calculate the time derivative. current supplied by this terminal is zero.
In general, the following equation is used to calculate the
phase-charging currents:
⎡i A ⎤ ⎡C AA CAB CAC ⎤ ⎡ vA ⎤
v2, kV
⎢ ⎥ ⎢ ⎥ d ⎢ ⎥
i
⎢ B⎥ = ⎢ CBA CBB CBC ⎥ • ⎢ v B ⎥ (19)
dt
⎢⎣ i C ⎥⎦ ⎢⎣ CCA CCB CCC ⎥⎦ ⎢⎣ vC ⎥⎦
C
Fig. 18 compares the actual and calculated charging E. Charging Current Compensation and Alpha Plane
currents. The actual charging current is the current measured The operating point on the Alpha Plane is derived from the
at the energizing terminal (Terminal 3, in this example). The differential and restraining auxiliary terms, as explained in
calculated current is the total of the charging current shares Section VII.
calculated at each of the line terminals. By reducing the differential signal, the charging current
compensation shifts the Alpha Plane operating point toward
the blocking position. In an ultimate case of removing all the
iC (actual), A
1000
1000
component to be reduced by the capacitive charging current.
0 This compensation shifts the operating point on the Alpha
–1000 Plane away from the blocking region as expected.
As a result, the differential elements (phase elements, in
0.05 0.1 0.15 0.2
time, s particular) can be set more sensitively when the charging
Fig. 18. Sample line energization: actual and calculated charging currents.
current compensation is enabled.
An interesting design question arises regarding adding the
To illustrate the effect and accuracy of the compensation, calculated charging current to the restraint terms. On the
Fig. 19 compares the differential currents without and with surface, this is yet another current that feeds into differential
compensation. The differential current without compensation calculations and as such should be included in the restraining
is the current measured at the energizing terminal. The terms that normally mirror the differential calculations. In this
differential current with compensation is the current calculated case, however, the proper design choice is not to include the
following (17). Note that a vast portion of the charging current calculated charging current in the restraint terms for the
is removed from the differential signal, and the remainder is of following reasons.
higher frequencies and will be further suppressed by the relay The actual charging current is measured by the relays and
filtering algorithms. already contributes to the restraint terms. The calculated
charging current is the countermeasure and should not be
included, or else the charging current would be counted twice
iDIFA, A
performs the compensation (charging current compensation in This scheme makes the charging current compensation
progress, CCC). feature more immune to problems with VTs. In a way,
A relay at a given terminal may not calculate and subtract individual relays in the line current differential system work as
its share of the charging current for the following reasons: remote backup voltage sources for each other. If all voltages
VTs are not installed or not wired to the relay; a problem is are lost, the relay automatically desensitizes to ensure security
detected with the VTs (loss of potential), and the charging and continues working with currents only.
current compensation logic suspends compensation based on
this voltage; or bus-side VTs are used while the line breaker is IX. IN-LINE TRANSFORMERS
opened, and the logic suspends usage of this voltage as not
A. Introduction
representative for the line.
Each set of received currents is either compensated or not In some applications, a line and a transformer are installed
as per the accompanying CCC flag. Each receiving terminal without a breaker in between to separate the two pieces of
therefore knows how many terminals actually subtract their equipment (see Fig. 23). This is often driven by economics,
share of the charging current and can calculate its own share particularly in cases when the line is not tapped or
of compensation in order to make up for the full charging multiterminal, and the transformer does not feed any other
current of the line. loads. Thus, installing a separating breaker does not add any
In this way, the system works with a variable number of operational flexibility. The lack of a separating breaker puts
compensating terminals and is partially immune to the loss of both the line and the transformer into the same trip zone,
one or more sets of VTs. regardless of which element actually requires isolation from
Consider the following examples. the rest of the system.
It is still beneficial to apply two measuring zones in this
1) Example 1 case, as shown in Fig. 23a, even if they both trip both the line
Assume a three-terminal application and one terminal with and the transformer. By using relays designed for a given type
no voltage source. The relay with no voltage does not of apparatus, we maximize the overall performance of the
compensate its currents and permanently sends CCC = 0 to the protection system, sensitivity to transformer faults in
other peers. Each of the receiving peers sees that the said particular.
terminal does not compensate, and there are a total of two
(a)
terminals that do compensate. As a result, each of them will
apply a multiplier of 1/2 in their equations for the share of the
charging current. In this way, the charging current is
compensated fully, using an average of the two terminal Communications
87 channel 87
voltages that are available to the line current differential 87 L L
system. Note that the terminal with no voltage still works with T
DTT
a fully compensated differential current.
2) Example 2 (b)
Assume a three-terminal application and one terminal with
a bus-side voltage. Normally, each terminal performs the
compensation by applying the multiplier of 1/3 and asserting
the CCC bit. At the moment the terminal that uses a bus-side 87 Communications channel 87
L+T L+T
voltage detects any pole open, it deasserts its CCC flag and
ceases to compensate its current. The other two terminals Fig. 23. Transformer and line protection—individual (a) and combined (b)
recognize that from the received CCC flag, switch their measuring zones.
multipliers from 1/3 to 1/2, and the compensation continues,
There is a trend, however, to combine the two measuring
using the two voltages that are representative of the line
zones in a line current differential relay with an in-line
voltage profile.
transformer feature, as shown in Fig. 23b. This approach
3) Example 3 simplifies the application because fewer relays, less wiring,
Continue the second example, and assume that and less labor are required.
subsequently one of the other terminals detects loss of This section elaborates on the relay design to support in-
potential. It deasserts the CCC flag and stops compensating its line transformers.
outgoing current. The only terminal with a healthy voltage
B. Transformer Protection Using the Alpha Plane Differential
now knows that the second peer lost the compensation and
Element
switches its multiplier from 1/2 to 1. In this way, the
compensation is done with the single voltage that is still Being a differential principle, the Alpha Plane technique
available. As such, it will be less accurate but still useful. The can provide short-circuit protection for power transformers.
other two terminals still receive CCC = 1 from the last First, the local currents are compensated for transformer
terminal capable of compensation and know that the line connections to follow the art of transformer differential
differential current is fully compensated. protection. Commonly referred to as ratio (tap) matching,
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 47
zero-sequence removal, and vector group compensation, the For example, the line terminal associated with the delta
differential current equations actually match ampere-turns for winding in this example performs the following operations to
a healthy transformer. For example, for a delta/wye obtain its instantaneous currents for transmission:
transformer, the following equations describe the differential i A = k Δ • i ΔA (22a)
signal:
i B = k Δ • i ΔB (22b)
1
i DIF(1) = k Δ • i ΔA + k Y • • ( i YA – i YB ) (20a) i C = k Δ • i ΔC (22c)
3
1 while the terminal associated with the wye winding obtains its
i DIF( 2 ) = k Δ • i ΔB + k Y • • ( i YB – i YC ) (20b) terminal currents using the following equations:
3
1
1 iA = k Y • • ( i YA – i YB ) (23a)
i DIF( 3) = k Δ • i ΔC + k Y • • ( i YC – i YA ) (20c) 3
3
1
The taps, kΔ and kY, are based on the CT and transformer iB = k Y • • ( i YB – i YC ) (23b)
ratios, and indices 1, 2, and 3 refer to the loops of the 3
differential function. 1
The restraining terms are created as mirror equations to the iC = k Y • • ( i YC – i YA ) (23c)
3
differential terms (20):
After operations (22) and (23), the resulting currents can be
1
i RST (1) = k Δ • i ΔA + k Y • • i YA – i YB (21a) processed as if there were no in-line transformer. In particular:
3 • The charging current is subtracted after being
1 compensated for transformer connections.
i RST ( 2 ) = k Δ • i ΔB + k Y • • i YB – i YC (21b) • The phase and sequence restraint terms are calculated.
3
• The partial differential and restraint terms are created
1 based on the number of local currents.
i RST ( 3) = k Δ • i ΔC + k Y • • i YC – i YA (21c)
3 • The partial differential and restraint terms are sent,
For a general case on an N-winding transformer, the received, and aligned.
differential and restraining signals are sums of ratio-matched • The total line differential and restraint terms are
and vector-compensated winding currents. The above calculated.
observation leads to a simple relay implementation of At this point, the nature of transformer differential
compensating the individual currents for transformer protection needs to be recognized by addressing the inrush and
connections based on the position of the current with respect overexcitation phenomena.
to the various transformer windings and running the regular Inrush and overexcitation harmonic blocking are naturally
line current differential communications and processing performed by measuring the second and fifth harmonics in the
algorithms based on the transformer-compensated currents differential current and comparing them with user thresholds.
(Fig. 24). Cross-phase blocking or the fourth harmonic can be used,
depending on the design and user preferences [4] [6].
Harmonic restraint is also easy to implement using the
generalized Alpha Plane principle of Section VII. The
harmonics of interest in the differential current (second,
Local terminal currents
VY IX
87L-3
IW
X. SPEED OF OPERATION
The following delays limit the operating speed of a line
current differential relay:
• Internal relay data latencies
• Algorithm delay
• Channel delay
Relay designers have no control over the last component.
Direct fiber connections add negligible delay to the scheme.
Multiplexed channels can add a delay in the range of a few
milliseconds to tens of milliseconds, depending primarily on
the number of devices passing the data between the relays and,
to a degree, on the length of the fiber path linking the
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 49
multiplexers or modems. Selection of a communications differential protection is feasible in the proposed scheme
channel in terms of the worst-case latency is one of the because the key signals are available as samples. In a
engineering steps needed to fulfill the required fault clearance differential scheme, most of the transients cancel in the
time. operating signal, and therefore it is secure to make trip
Internal relay data latency adds to the trip time as well. decisions based on less than a full cycle of data. CT saturation
This includes collecting and passing samples from the A/D may cause problems, but this issue is addressed by fast and
converter, processing the local data for transmission, reliable EFD logic. If the EFD asserts, the high-speed path is
assembling outgoing packets, accepting incoming packets, inhibited.
aligning the data, processing the global differential As a result of careful design, the relay architecture
calculations, and asserting the outputs. Modern relay minimizes data latencies. The applied protection algorithms
platforms optimize the above processes for speed. The are fast under internal fault conditions because they are
presented solution sends and receives packets every restrained in a way that does not penalize speed. Overall, the
3 milliseconds, allowing for lower relay latencies and faster presented solution provides for subcycle trip times if used
operation. with fast communications channels.
The algorithm time refers to the length of a data window
that must be available before a trip decision can be made. It XI. DATA HANDLING AND SYNCHRONIZATION
should not be mistaken for the length of the filter data
A. Introduction
windows—it is simply a point in time when enough
information is available to make a reliable trip decision. Proper data handling and synchronization are the
In this respect, the 87LQ and 87LG functions are very fast. foundation on which a line current differential relay is built.
Even when using full-cycle filters, these functions assert their This is as important as the protection algorithms and logic. A
outputs in a fraction of a cycle (see Fig. 26, for example). This careful design is required because this part of the relay relates
short response time is because they are not biased by the load to the channel and associated third-party equipment that are
current prior to the fault. Owing to the proper restraining often only under limited control of protection engineers.
techniques, the external fault detection logic, and the charging The following requirements apply to the data handling and
current compensation, these functions can be operated at their synchronization subsystem:
natural speed without introducing much intentional delay for • Unified packet structure and near-identical processing
security purposes. for the channel-based synchronization and the external
time reference synchronization methods.
10 IARST
• Minimum requirement for extra payload to
IADIF, IARST, A
2.5
2 • Ability to work with channels having a total round trip
1.5 delay of 80 milliseconds or less.
1
0.5
• Accuracy of data alignment better than about 1.0
0 electrical degree (this yields a spurious differential
0.2 0.25 0.3 0.35
current of less than 1 percent of the through current).
1 • Quick startup, in the order of a few tens to few
kMAG (87LQ)
150
100 Set point: The presented solution is based on estimating the clock
50 Stability angle = 140° offset and compensating the data time stamps for this offset.
0 The sent current data are time-stamped according to the time
0.2 0.25 0.3 0.35
87LQ PKP of the relay that took the data. This time is synchronized to an
87LQ
7 ms
external source (typically GPS) if such an external source is
0.2 0.25 0.3 0.35 available. Otherwise, the relay time is freewheeling, and the
time, s
time difference between any two relays may drift.
Fig. 26. Operation of the 87LQ function for a 100 Ω AG fault. The line current differential system measures the clock
In addition, the 87LP element uses a high-speed element in offset and augments the time stamps to express both the local
parallel with the full-cycle filtered path. The high-speed and the remote data in the same consistent time.
50
In its packet, Relay 2 includes a time stamp for the current The clock offset value is used to correct the remote time
samples tDATA (assume the time stamp of the newest sample in stamp into the local time:
the set of three). In a practical implementation, the packet t DATA(@ relay1) = t DATA + t OFFSET (29)
sequence number and this time stamp can be the same
number. C. External Time Reference-Based Synchronization
Relay 1 receives the packet after the channel delay (few Refer to Fig. 28. With both relays synchronized to the same
milliseconds to tens of milliseconds). It captures the time of external time source, their local times are mutually
reception as t3 using its own clock. From the sequence number synchronized. The relays take samples at the same points in
received, Relay 1 knows this is a reply to the message sent out time (relative to the top of a second) and assign the same time
at time t0. stamps to the simultaneously taken data. The data are
At this point, Relay 1 can finish the key calculations related therefore used by the scheme directly based on the time
to channel delay, clock offset, and data alignment. stamps, applying the same equations as in the channel-based
Assuming symmetrical channel delay, the one-way channel synchronization mode, except for the clock offset not
delay is: calculated, but known:
( t3 – t0 ) – tH t OFFSET ≡ 0 (30)
t CH = (24)
2
Note that the difference between t3 and t0 is the time Relay 1 Relay 2
elapsed at the local relay, and the hold time is the time
measured by the remote relay and communicated back Data
tDATA
Backdating further by the known delay in transmitting a tTX tTX
t2
t2
packet after capturing the data, we obtain the data time stamp
expressed in time of Relay 1:
t DATA(@ relay1) = t 3 – t CH – t TX (26) tH, tDATA
tCH-RX
The data time stamp expressed in Relay 2 time is included
in the packet. This allows calculating of the time offset (i.e.,
the difference in time between the two relays):
t3
t OFFSET = t DATA(@ relay1) – t DATA = ...
(27)
... = t 3 – t CH – t TX – t DATA
Fig. 28. Illustration of the external time reference-based synchronization
Positive values of the offset time mean the local clock method.
(Relay 1) is leading the remote clock; negative offset means
The rest of the scheme works the same way as in the
the remote clock is ahead.
channel-based synchronization mode. In particular, the
Inserting (24) into (27) gives the following key equation:
message transmit and receive times are captured, and the hold
1
• ( t 0 + t 3 + t H ) – t TX – t DATA
time is communicated.
t OFFSET = (28)
2 These values have a different usage, however. They allow
Note that the clock offset value is a very stable number the relay to characterize the communications channel as
because it reflects a difference between clocks of the two follows.
relays, regardless of data latency and therefore regardless of The channel delay in the receive direction at Relay 1 is
the channel delay at any given moment. This number may calculated as:
change at a rate of a few parts per million, depending on the t CH – RX = t 3 – t 2 = t 3 – ( t DATA + t TX ) (31)
stability of the oscillators used in the relay hardware.
Therefore, it is both possible and recommended to average the The channel delay in the transmit direction at Relay 1 is
relay clock offset given by (28) over a number of calculated as:
measurements. This allows riding through channel t CH –TX = t 3 – t 0 – t H – t CH – RX (32)
impairments and increases accuracy by letting the rounding-up The two channel times are made available to the user for
errors and jitter average out. alarming and overall channel monitoring.
52
Also, these channel measurements can be used to control source does not recover after some time, the danger of
the response of the differential system to the loss of the the clocks drifting apart increases, and the scheme
external time reference, as discussed later. needs to take other steps, as explained below.
• In applications with only some channels being
D. Sources of External Time Reference
asymmetrical, the line current differential system can
Historically, the common time reference has been provided mark the asymmetrical channels that lost a time
via an IRIG-B connection from a GPS-synchronized reference at either end as unavailable. With enough
substation clock. This dependency on time reference used to remaining connections between the relays, a master-
create some concerns for protection applications in terms of slave operation may be possible, retaining the
relying on extra equipment and exposing the differential functionality of the system at the expense of slightly
system to the failure modes thereof. The failure points delayed tripping at the slave sites.
included the connection between the relay and the clock,
• The 87L function can disable itself automatically if
including copper-to-fiber conversion, if any, the clock itself,
any of the required time references are lost.
its cabling and antenna, and finally the broadcast of the GPS
• The 87L function can desensitize itself to a degree if
signal itself.
any of the required time references are lost.
Availability of the GPS signal concerned some users,
• If the used channel was symmetrical just prior to
particularly outside of North America, while the GPS
losing the external time reference, the line current
infrastructure that was originally designed for military use
differential system may switch to the channel-based
migrated into civilian applications. Presently, GPS
synchronization mode. This mode continues
applications are so widely spread that the long-term viability
indefinitely, assuming the channel stays symmetrical
of GPS is not questioned anymore.
until the time reference recovers. Or this mode can
Still, good protection solutions utilize as little equipment
stay in place until the total (round trip) channel time
and connections as possible in order to maximize availability
changes, signifying the fact that the channel has been
and remove unnecessary failure modes.
switched and may become asymmetrical as a result of
In this respect, it is worth noticing that terrestrial wide-area
the switching.
systems emerged recently that provide for precise timing
independently from the GPS time. One solution uses the • Similarly, if the channel displayed a stable limited
internal precise timing of a SONET system to serve common asymmetry prior to losing the time reference, this
time at individual multiplexer nodes. Normally, this common asymmetry can be used to predict the worst-case
time is synchronized to GPS via an array of receivers placed at measurement errors and put in place appropriate
different geographical locations, but if all GPS receivers are protection countermeasures (stability angle setting for
lost or the GPS system itself becomes unavailable, the the Alpha Plane). The channel may switch into
common wide-area time continues to be generated internally channel-based synchronization, applying enough
by the SONET system [1]. protection countermeasures to fight the possible
This enhances the availability of line current differential spurious differential current. This situation may
schemes operating in the external time reference continue indefinitely or until the total channel time
synchronization mode. changes, signifying channel switching and possible
Even with this improvement, we need to consider a failure increase in asymmetry.
mode of losing the time reference because of problems with • Similarly to the above option, the worst-case channel
connections for the timing signal (IRIG-B or IEEE 1588 via asymmetry can be tracked and stored in the relay. This
Ethernet). worst-case asymmetry can be used to calculate secure
87L settings, and the system can switch to channel-
E. Fallback Strategies for Loss of External Time Reference based synchronization upon losing the external time
In the external time reference mode, the line current reference. The initial value of the worst-case
differential system loses synchronization if the external time asymmetry is a user estimate, but during the life of the
reference is lost for an asymmetrical channel. installation, channels with common time references at
Misoperation is not an option, and the complete loss of both ends can be characterized by the relays for the
protection is not a preferred solution. Therefore, a fallback worst-case asymmetry.
strategy should be considered in order to provide security and
some protection functionality under such a contingency. XII. CONCLUSIONS
The following options could be considered: This paper outlines general design directions for a next
• The 87L function can be left as is for a certain period generation line current differential protection scheme.
of time after losing the common time reference. It will Regarding synchronization and data alignment, the
take some time for the internal relay clocks to drift presented solution is unified for the channel-based and the
apart, and the system will stay synchronized at least external time reference-based synchronization methods. By
for few seconds. During that time, the clock offset not forcing the sampling clocks to sample synchronously, the
remains zero even if one of the relays does not presented solution works naturally and is more robust in
synchronize to the common time. If the external time multiterminal applications.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 53
A terrestrial, GPS-independent time source was introduced, [6] K. Behrendt, N. Fischer, and C. Labuschagne, “Considerations for Using
Harmonic Blocking and Harmonic Restraint Techniques on Transformer
making line current differential applications with
Differential Relays,” proceedings of the 33rd Annual Western Protective
asymmetrical channels safer and more dependable. Relay Conference, Spokane, WA, October 2006.
A number of fallback strategies were presented to allow the
system to ride through the temporary loss of the timing source. XIV. BIOGRAPHIES
A reliable Alpha Plane restraining technique was proposed
Henry (Hank) Miller has a BSEE and a BEE from The Ohio State University
for multiterminal applications with any number of local and a BA degree in philosophy from The Pontifical College Josephinum. He
current inputs to the relays. The size and structure of the is a registered professional engineer in the state of Ohio and holds a patent for
communications payload are independent from the number of a substation steel design. Hank has over 31 years of utility experience in
station and line protection and control. Hank is currently working as a staff
terminals or the number of local currents in the system, engineer and supervisor in the protection control asset engineering group of
making the implementation simple and thus the solution more American Electric Power (AEP) with responsibilities for developing
robust. protection and control standards and application guides and supporting the
relay setting project work. With John Burger, he shares the responsibility for
The system works with high-fidelity current information, ensuring that devices new to the AEP system are protected and controlled
allowing a fast external fault detection logic as well as properly. Hank is a member of the IEEE.
harmonic measurements for in-line transformer applications.
The combination of the high-performance external fault John Burger has a BSEE from Case Institute of Technology and an MSEE
from Fairleigh Dickinson University. He is a registered professional engineer
detection logic capable of detecting external faults based on as in the states of Ohio and New Jersey. John has over 35 years experience in
little as 3 milliseconds of unsaturated current waveforms and station and line relay protection and control. He has worked for American
the proper restraining techniques makes the relay both very Electric Power (AEP), primarily in the protection and control group, for the
secure and fast. As in the case of modern bus or transformer last 29 years. John is currently serving as a staff engineer and supervisor in
the protection control asset engineering group, with responsibilities for
relays, application of the external fault detection relaxes CT developing protection and control standards and application guides and
requirements considerably and simplifies application by supporting the relay setting project work.
eliminating a cumbersome analysis of suitability of the He shares the responsibility for ensuring that devices new to the AEP system
applied CTs and settings. are protected and controlled properly with Hank Miller. John is a Senior
The presented solution applies the Alpha Plane differential Member of the IEEE, past chairman of the Columbus Chapter of the PES, a
member of the IEEE Power System Relay Main Committee, Substation and
trip equations, carrying forward all tried-and-true advantages Communications Subcommittees and chairman of Working Group H6. He is
of this approach, but enhances the original concept to also currently serving as Chairman of the UCA International Users Group,
multiterminal applications and allows for harmonic restraining providing technical support for IEC 61850.
of the Alpha Plane to facilitate in-line transformer protection.
Normann Fischer received a Higher Diploma in Technology, with honors,
Line-charging current compensation was incorporated, from Witwatersrand Technikon, Johannesburg in 1988, a BSEE, with honors,
enhancing security during line energization and improving from the University of Cape Town in 1993, and an MSEE from the University
sensitivity to internal faults. A novel concept of dynamic of Idaho in 2005. He joined Eskom as a protection technician in 1984 and was
a senior design engineer in Eskom’s protection design department for three
selection of voltage sources for the compensation was years. He then joined IST Energy as a senior design engineer in 1996. In
introduced, minimizing dependence of the scheme on VTs. 1999, he joined Schweitzer Engineering Laboratories, Inc. as a power
Communications packets and data handling internal to the engineer in the research and development division. Normann was a registered
professional engineer in South Africa and a member of the South Africa
relays were designed for low latencies. Combined with high- Institute of Electrical Engineers. He is currently a member of IEEE and
speed performance of the applied protection equations, this ASEE.
enables subcycle trip times in applications with fast
communications channels. Bogdan Kasztenny is a principal systems engineer in the research and
development division of Schweitzer Engineering Laboratories, Inc. He has 20
years of experience in protection and control, including his ten-year academic
XIII. REFERENCES career at Wroclaw University of Technology, Poland, Southern Illinois
[1] K. Fodero, C. Huntley, and D. Whitehead, “Wide-Area Time University, and Texas A&M University. He also has ten years of industrial
Synchronization for Protection,” proceedings of the 36th Annual experience with General Electric, where he developed, promoted, and
Western Protective Relay Conference, Spokane, WA, October 2009. supported many protection and control products.
[2] J. Roberts, D. Tziouvaras, G. Benmouyal, and H. Altuve, “The Effect of Bogdan is an IEEE Fellow, Senior Fulbright Fellow, Canadian member of
Multiprinciple Line Protection on Dependability and Security,” CIGRE Study Committee B5, and an Adjunct Professor at the University of
proceedings of the 55th Annual Georgia Tech Protective Relaying Western Ontario. He has authored about 200 technical papers and holds 16
Conference, Atlanta, GA, May 2001. patents. He is active in the Power System Relaying Committee of the IEEE
[3] A. Guzmán, C. Labuschagne, and B.-L. Qin, “Reliable Busbar and and is a registered professional engineer in the province of Ontario.
Breaker Failure Protection With Advanced Zone Selection,”
proceedings of the 31st Annual Western Protective Relay Conference,
Spokane, WA, October 2004.
[4] A. Guzmán, N. Fischer, and C. Labuschagne, “Improvements in
Transformer Protection and Control,” proceedings of the 62nd Annual
Conference for Protective Relay Engineers, College Station, TX, March
2009.
[5] G. Benmouyal, “The Trajectories of Line Current Differential Faults in
the Alpha Plane,” proceedings of the 32nd Annual Western Protective
Relay Conference, Spokane, WA, October 2005.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 55
Keywords: IEEE 1588, precise time synchronization, There are basically two solutions for this problem. The first is
IEC 61850, process bus, synchrophasors. the approach of a constant acquisition delay. In that case, the
delay from the acquisition of the sampled value (the moment,
Abstract where the value is sampled at its source) until the reception in
the data sink (e.g. the protection equipment) needs to be
Synchronization plays an important role for many functions constant and known with a jitter below the required accuracy.
of the electric power systems. The PC37.238 draft standard The receiving unit can then put the values in a time relation to
specifies precise time distribution for power system each other based on the reception time and the known delay.
applications. As the standard is nearing completion, its usage
for specific applications needs to be better understood. This The second approach is to use synchronized or time related
paper explains how this new time distribution applies to the sampling. All units performing sampling are globally
most demanding applications, namely synchrophasors and synchronized with the required accuracy. The samples are
IEC 61850 process bus. either taken all at the same time or the samples are tagged
with a timestamp indicating their sampling time. Only this
1 Introduction approach can deal with variable communication delays that
are inevitable when using a network topology for the
Synchronization requirements for power system applications communication. IEC 61850 has therefore chosen this second
differ significantly. Some applications require relative approach. According to the concepts of IEC 61850, the
synchronization (synchronization of merging units), others samples are all taken at the same time and each sample is
need traceability to universal time coordinated (UTC) either identified by a number that provides the time reference. The
locally or over a wide area (event recorders, synchrophasors). approach is illustrated in Figure 1.
Synchronization of sampled analogue values and
measurements used for protection is critical and demands
high security and dependability.
n-1 n
1.1 Timing requirements for IEC 61850 process bus
IEC 61850 introduced the concept known as “process bus” to n-4 n-3 n-2 n-3 n-2
n-2 n-1 n
substation automation systems. Although not necessarily a n-4
different acquisition points. With elaborated system Synchrophasor measurements are normally relative to UTC
architectures the dependency of the critical functions on the time, and their precision greatly depends on time
synchronization network can be removed. The drawback of synchronization accuracy. Note that these measurements can
such approach is that this limits the benefits from a process be collected over small or very large geographical area, and
bus implementation. measurements from remote devices need to be correlated for
system analysis and protection decisions. Time sources and
1.2 Timing requirements for synchrophasors time distribution must be reliable, available and accessible by
PMU devices in the whole system.
Phasors have been commonly used for representations of
periodic signals in computations and power system analysis. Accuracy limits for the synchrophasor measurements, as
The use of synchrophasors was first specified in defined in [6] shall not exceed 1% Total Vector Error (TVE).
IEEE 1344-1995 Standard for Synchrophasors for Power This translates to a maximum time error of
Systems, which after a revision became IEEE C37.118-2005. ± 26 microseconds for 60 Hz system and
This standard is currently being revised and harmonized with ± 31 microseconds for 50 Hz system. To provide
IEC 61850. synchrophasor measurements with specified measurement
accuracy, much tighter requirements are placed on system
Synchrophasor, as defined in [6], is the estimate of magnitude time synchronization. It has been generally agreed that
and instantaneous phase angle of a signal relative to the
± 1 microsecond time accuracy of UTC is desired at device
cosine function at nominal system frequency synchronized to inputs to achieve the specified measurement accuracy of
UTC time. UTC second rollovers coincide with rising edges 1% TVE.
of 1 PPS signal. These are used for estimations of 0 degrees
and -90 degrees synchrophasors. Synchrophasor definition is
Both IEC 61850 process bus and IEEE C37.118
illustrated on Figure 2.
synchrophasors require reliable and available time
synchronization with down to ± 1 microsecond time
v(t) = 2 V cos (ω0 t + ϕ) accuracy. Both currently use separate synchronization
networks and 1 PPS signals.
v
Start of the second This paper describes how time synchronization requirements
for IEC 61850 process bus and IEEE C37.118
2V synchrophasors, outlined in this section, can be met using the
PC37.238 draft standard. A basic description of the new time
t distribution mechanism is provided in Section 2. Section 3
V ∠ 0° describes the use of PC37.238 draft standard for
synchrophasor and IEC 61850 process bus applications,
v
including known challenges and issues.
Start of the second
Synchrophasors provide real-time information on power The second version of the IEEE 1588 Standard specifies
system currents and voltages, and can be used for various many new features of the Precision Time Protocol (PTP),
applications, including local or wide area monitoring, mandatory and optional, including conceptually new devices
synchrocheck and protection functions. A major statement on (transparent clocks), new message formats, etc. Development
the usefulness of synchrophasors is the 2003 blackout of this version was driven by five main industries: test and
synchrophasor data collected over Eastern US area that measurement, telecom, industrial automation, power and
clearly indicated faulty conditions, which, if timely analyzed, military. As a result, it was impossible to specify a single set
could have prevented this major outage. of interoperable functions, as requirements for these
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 57
industries differ significantly. To address this challenge a Group to develop IEEE 1588 power profile. The PSRC
concept of IEEE 1588 profile was introduced, as a clearly H7/Sub C7 Working Group functions in close co-ordination
defined subset of protocol features, the use of which will meet with IEC TC57 WG10 and other committees with similar
specific industry requirements. Two default profiles are interests. The group develops PC37.238 Draft Standard for
defined in the Annex J of the second version of the IEEE Use of IEEE Std. 1588 in Power System Applications [5].
1588 Standard [4]. Industries are expected to define their own The PC37.238/D5.5 is completed and released for IEEE
profiles to address specific requirements of their applications. Sponsor ballot, which will close on November 21, 2010.
Comment resolution and recirculation ballot will follow prior
IEEE 1588 profile development work was launched for to the final approval. During standard’s development profile
different industries. Among the most developed profiles are interoperability tests, called plug-fests, were conducted [3].
the LAN eXtensions for Instrumentation (LXI) profile for test The profile as well has been evaluated for the IEEE 1588
and measurements [12], the profile for time-sensitive Testbed project [9].
application in bridged local area networks, specified in
P802.1AS/D7.2 [15], and the power profile, specified in PSRC WG H7/Sub C7 plans to write a summary paper on the
PC37.238/D5.5 [5]. Other profiles are being developed for PC37.238 standard that will describe in detail the selected
telecom and Internet communities under ITU-T and IETF IEEE 1588 features and their justification. The paragraphs
respectfully [8, 16]. Four paragraphs below provide more below provide a summary of the supported features plus why
information about IEEE 1588 profiles, and clause 2.2 and how the PC37.238 draft standard can be used for power
describes IEEE 1588 power profile in more detail. system applications, namely synchrophasors and IEC 61850
process bus.
The LXI profile was developed to address the needs of test
and measurement community (these applications may require Main Function
nanosecond and sub-nanosecond levels of time accuracy). It PC37.238 specifies how to distribute time from a device that
is interesting to note that this profile uses IEEE 1588 is synchronized to universal time (e.g. to UTC via GPS) to
management messages for configuration, status and control. devices that require time to support their application functions
The LXI consortium also developed comprehensive (e.g. IEDs with line differential protection, phasor
documented test procedures, a big effort that should be measurement units, merging units, digital event recorders).
acknowledged.
Devices
IEEE 1588 profile for time-sensitive applications in bridged A device that is synchronized to the universal time is called a
Local Area Networks is being developed by the Audio/Video grandmaster clock. Devices that can only receive time from
Bridging Task force of the IEEE 802.1, the main standards grandmaster clock are called slaves or slave-only clocks.
body of the IEEE 802.3/Ethernet standards. The initial Network devices that interconnect grandmaster and slave
applications included time synchronization for home theatre clocks are called transparent clocks, these are usually
and audio / video entertainment systems. The latest version of Ethernet switches.
this profile is specified in the P802.1AS / D7.2 Draft
Standard, which passed the initial IEEE ballot and is Performance requirements
undergoing comment resolution before the final approval. The Normative performance requirements are specified in
profile defines a Simple Network Management Protocol PC37.238 Annex B. As depicted in Figure 3 time at a slave
(SNMP) Management Information Database (MIB) for device connected to grandmaster clock over 16 network hops
configuration, status and control. shall be within +/-1 microsecond from grandmaster time, with
an out-of-range probability of 10-4. Note that all devices,
IEEE 1588 profile for telecom industry is being developed including intermediate nodes have to support PC37.238.
under ITU-T Study Group 15. An approach with separate
frequency profile and phase profile has been chosen, where
GPS
the frequency profile is being defined first. Results of these
800 ns
developments, including use cases, performance metrics
200 ns
analysis, etc can be found in ITU-T G.8261 [8].
Hop 1 Hop 2 Hop 3 ... Hop 15 Hop 16
Time
The Internet community has also launched IEEE 1588 profile Switch Switch Switch IED
Source
development in TICTOC group, where various PTP protocol 50 ns
mappings, including mapping into Multiprotocol Label
Switching (MPLS) have been discussed [16] ± 1 µ s time accuracy with 10 −4 probability of failure
Layer 2 / Ethernet frames and are transmitted over Ethernet Figure 4. Compensation for variable delay sources
cables (fibre or copper). Multicast Destination MAC address
and IEEE 802.1Q VLAN tags are used for per-VLAN traffic Variable delay introduced by communication protocol stack
separation, if desired. (1) is avoided by timestamping Sync messages just before
they are transmitted into physical media. Timestamp point is
Best grandmaster selection and redundancy between Media Access Control (MAC) block and Physical
For redundancy there should be two or three devices capable interface, typically called PHY at the Media Independent
of being grandmasters. These devices are called grandmaster- Interface (MII), in case of 100Mb/s Ethernet. Some PC37.238
capable clocks. On start-up, failure or planned maintenance devices can support “on-the-fly” timestamping, i.e. inserting
outage, an automatic selection of the best master is performed the precise actual grandmaster time while Sync message is
that results in one device being a system’s grandmaster. being transmitted over MII interface. Other devices may
Selection of the grandmaster is based on device support two-step operation mode with a Follow_up message
qualifications, including achievable clock accuracy. transmitted right after Sync message. Follow_up message
contains the precise grandmaster time when its associated
Grandmaster identification Sync messages was transmitted over grandmaster’s MII
A feature unique to PC37.238 is the addition of an extension interface.
to communicate grandmaster identification. This information
helps to minimize the effects of transient states, when Two other variable delay sources are dealt with using peer-to-
distribute time is not traceable, on synchronization and peer transparent clock functionality. These devices are
operation. It communicates to applications if data they require typically Ethernet switches that measure cable delay and
used the time from the same grandmaster. residence time then provide these in a special field, called
CorrectionField, to the end devices, so that they can add these
Local Time delays to the received grandmaster time before adjusting their
Local time extension is also provided, as some applications clocks.
may require this, e.g. for reporting (not operation) functions.
Cable delay (2) is measured using peer-to-peer delay
Management measurement mechanism. It uses PDelay message exchange
A PC37.238 SNMP MIB is defined for device configuration to measure the delay on each point-to-point link. Point-to-
and status information. MIB support is mandatory only for point delay measurements enable faster convergence times
grandmaster-capable devices. upon grandmaster changes, as cable delays are measured for
all links, including those blocked by Spanning Tree Protocols,
“Smart” features regardless of whether the link is currently on time distribution
Time accuracy in sub-microsecond range can be achieved path or not. Cable delay correction is very important as each
because of the following “smart” features offered by 100m copper link introduces approximately 500ns delay,
IEEE 1588 and supported by PC37.238 draft standard: which is half of the full time accuracy budget of
1 microsecond.
(1) Correction for variable delays in the protocol stack
(2) Correction for cable delay Transparent clocks, which are Ethernet switches supporting
(3) Correction for residence time in intermediate devices PC37.238, also measure residence time, the time that Sync
message carrying grandmaster time actually spends inside the
All three above remove sources of non-deterministic latency, switch. This time is variable and depends on traffic loads that
making more precise time synchronization possible. Figure 4 lead to varying store-and-forward queuing delays.
illustrates these features. Transparent clock and residence time concepts are shown in
Figure 4.
3 The use of PC37.238 for power applications connected to the IEC 61850 communication or in the case of
intelligent switchgear, the electronics may be directly
The PC37.238 draft standard was developed with included in the switchgear. IEC 61850 GOOSE messages can
requirements of power applications in mind. Time be used to transmit a trip signal from the protection relay to
synchronization can now be performed using the same the circuit breaker.
communication network that provides data exchange for the
applications. This eliminates the need for a physically With IEC 61850 sampled value transmission, it is possible to
separate synchronization network. This new time distribution replace the analog signals from CTs (current transformers)
mechanism also delivers the time quality and traceability to and VTs (voltage transformers) with serial communication.
universal time information required by core applications. This Instrument transformers based on new technologies like
information is made available via management parameters, optical sensors can directly be equipped with a
and can be mapped directly into parameters, specific to a communication interface according to IEC 61850. However,
given application. The mapping of these parameters is also conventional instrument transformers may be connected
specified in PC37.238/D5.5 Annex C [5]. Finally, local time to a communication network using a “merging unit” as a
and grandmaster identification are provided. The later was communication interface. A merging unit can transmit the
added specifically to minimize the effect of transient states sampled values of the three voltages and the three currents in
when distributed time is not traceable to absolute time on one communication message. The concept of a merging unit
synchronization and operation, as well as to support system is shown in Figure 6.
separation into operation islands. Two sections below
describe the use of PC37.238 draft standard for IEC 61850
process bus and IEEE C37.118 applications.
Line
Protection
3.1 IEC 61850 process bus
IEC 61850-9-2
Station bus
Router
Bay Relay Relay Bay Relay Relay
Controller X1 X2 Controller X1 X2
Process bus
Intelligent Intelligent
CT/VT CT/VT
Switchgear Switchgear
Bay Relay RelayRelay Bay Relay Relay
Relay
Controller X1 X2 Y Controller X1 X2 Y
A communication-based process connection provides – Different topologies for process bus are evaluated in [11].
besides the reduction of copper wires – some additional Two examples of a topology are shown in Figure 8 and
advantages. The wiring between the IEDs interfacing the Figure 9. The topology of the communication network
process (merging units, remote I/Os) and the process may be follows typically the topology of the substation. That means
done and tested during manufacturing. In other words, instead that devices that belong to one bay typically are grouped
of handling many wired connections during engineering, together.
commissioning and testing, only a few communication
connections could be tested at a factory.
Challenges for implementing an IEC 61850 process bus are In Figure 8, a topology without redundant network on station
covered in [2]. These include the real time behaviour, bus level is shown. In order to have the main 1 and main 2
reliability, transient behaviour of a merging unit and time protection functions independent, there is a main 1 system
synchronization. The time synchronization issue is described shown in blue consisting of a merging unit (MU), a protection
in [2] as follows. relay (P) and a switch, and an independent main 2 system
shown in red with its own protection relay, merging unit and
- Time Synchronization: One of the challenging topics is switch. The bay controller (C) is connected to one of the two
the accurate synchronization of the data sources switches. The station level connection is non-redundant star
providing the sampled values. The communication network.
network used to transmit the sampled values does not
support a constant or predictable transmission delay. Figure 9 is a topology that includes a redundant
Therefore, the mechanism chosen assumes a communication network for the station bus. While the
synchronized sampling at the source. All devices sample protection system with main 1 and main 2, consisting of the
at the same time and add a reference to the sampling merging unit and the relay, is redundant as such, the bay
time. With the help of that reference, the application controller is now connected to two independent ring
using the sampled data can correlate the samples received networks.
from multiple sources. Depending on the application and
the requirements concerning acceptable phase errors, the
BP
required synchronization accuracy may be as accurate as
1 microsecond.
time synchronization. Figure 10 is an example that illustrates value. During transient states while distributed time is not
the different requirements for time synchronization. traceable to the absolute time, the knowledge of which
grandmaster a merging unit is synchronized to can help to
Feeder 1 Feeder 2 Feeder 3 Feeder 4
minimize the effect of such change on synchronization and
zone1 zone1 zone1 zone1
operation. For example, decisions that are based on sampled
MU1b MU2b MU3b MU4b
zone3 values coming from different merging units, if these are
C1 P1 C2 P2 C3 P3 C4 P4 synchronized to different grandmasters not traceable to
absolute time, could be avoided or delayed until
synchronization to the same grandmaster or a traceable time
MU1a MU2a MU3a MU4a is re-established.
zone2
Busbar
PC37.238 draft standard provides mechanisms for mapping
PB its local time accuracy and traceability to the global time
source into IEC 61850 parameters, such as timestamps for all
Figure 10. Synchronization requirements IED data, SmpSync attribute for global / local time synch, etc.
This is described in PC37.238 / D5.5 Annex C [5].
- The line protection function P1 needs information from
MU1a. The only synchronization requirement that exists 3.2 IEEE C37.238 Synchrophasors
here is internal to the IED MU1a – the samples from the
three currents and three voltages need to be synchronized Synchrophasor measurements provide instantaneous
to each other. magnitude and angle information relative to UTC for power
- The control function C1 needs information from MU1a system currents and voltages. Measurements for zero
and MU1b to perform the synchrocheck functionality and sequence, positive and negative sequence values can be
the two merging units need to be synchronized. This is supported, if desired. Synchrophasor data is assembled by
indicated as synchronization Zone 1. PMU devices into a defined frame format, and transmitted to
- For the example, it is assumed that Feeder 3 and Feeder 4 control centre possible via PDC(s) for further forwarding,
are connected to two power lines that run in parallel. In archiving or control actions.
that case, the protection IEDs P3 and P4 implement an
additional function called parallel line compensation. An overview of a phasor measurement system is shown in
That function needs information from both merging units Figure 11. It shows multiple PMUs and PDCs, and a control
MU3a and MU4a. These merging units need to be centre that receives synchrophasor data and uses it for real
synchronized which is indicated as Zone 2. time monitoring, control and archiving.
- The differential busbar protection function PB needs
information from all four merging units MU1b to MU4b.
GPS Satellite Time Synchronization
These merging units need to be synchronized which is
indicated as Zone 3. Power System
Another time distribution mechanism typically used in power For the PC37.238 time distribution, timestamp as well is the
substations is IRIG-B and 1 PPS signals. These require time of an event (the measurement for the PMU case), but the
separate wiring for synchronization purposes only, which event is the message transmission. Thus, timestamp of the
could be avoided if time is distributed on the same network PC37.238 Sync message is the time when this message was
with synchrophasor data. sent by the grandmaster, i.e. grandmaster time at that
moment. In PC37.238 world timestamps contain the actual
Figure 12 shows a typical PMU with embedded GPS receiver, absolute time, which is conceptually different, but similar to
like those depicted in Figure 13. This device has an Ethernet the test and measurement approach, if one considers
link for transmitting synchrophasor data (but not for time transmission of a synchronization message as an
synchronization). A serial interface may also be used, but its event/measurement point.
use is deprecated, and considered a legacy. The device can
also have an IRIG-B input for synchronizing to an external Further clarifications should be given to other function
source. potentially expected from the PC37.238 draft standard, such
as how frequently (multiple times in a given power cycle) and
when synchrophasor measurements shall be taken, etc. The
GPS Antenna PC37.238 draft standard does not provide any specification
for these; neither do IRIG-B and GPS. The scope of these
protocols is limited to time distribution function.
Binary I/O
• Alarms to SCADA One more remark should be made in respect to PC37.238
• Local Control functionality and 1 PPS signal. This signal may be provided
for testing purposes, but vendors are not required to support
Ethernet Link
Analog Inputs it. It is possible, however, to generate such signal internally
• 2 – 3Φ Voltage based on precise time provided by the PC37.238 protocol
• 4 – 3Φ Currents
IRIG-B
using the UTC second rollover. Vendors adding PC37.238
• Data Concentrator • Input support to their PMU devices should be aware of this.
• Remote access • Time Sync
First, it should be explained that the PC37.238 draft standard Binary I/O
only specifies time distribution mechanism. It is similar to • Alarms to SCADA
IRIG-B, which provides time codes, GPS and Network Time • Local Control
It should be noted that for achieving a time accuracy in the power applications, e.g. synchrophasors and IEC 61850
range of 1 microsecond, all devices in the network process bus. Reaching such understanding will raise industry
infrastructure that interconnect time source(s) and PMUs have awareness on the applicability of the profile; it will speed up
to support the PC37.238 draft standard. This means that and widen its acceptance and adoption.
Ethernet switches must be peer-to-peer transparent clocks that
measure their residence time and cable delay. For a direct
connection to a time source over short distances cable delay References
measurements and corrections are optional, this simplifies
implementations of slave-only devices, but also limits their [1] Ch. Brunner “The impact of IEC 61850 on protection”,
usability. IET DPSP Glasgow, April 2008.
[2] Ch. Brunner "Will IEEE 1588 Finally Leverage the
IEC 61850 Process Bus”, IET DPSP, Manchester,
GPS Satellite Time Synchronization
March 30, 2010.
Power System [3] G. Antonova “First IEEE PSRC WG H7 C7 Plug-fest”,
PAC World Magazine, March 2010,
GM http://www.pacw.org/fileadmin/doc/MarchIssue2010/in
PMU PMU
dustry_reports_march_2010.pdf.
Streaming synchrophasor
data on the network to the [4] IEEE Std. 1588-2008 IEEE Standard for Precision
IEEE 1588 Time
PDC for archiving . . . Clock Synchronization Protocol for Networked
PMU
Synchronization
PMU Measurement and Control Systems, August 24, 2008.
PMU
[5] PC37.238/D5.5 Draft Standard for Use of IEEE 1588
ETHERNET Precision Time Protocol in Power System Applications,
APPLICATIONS
September 15, 2010.
. . . data display [6] IEEE Std. C37.118 – 2005 IEEE Standard for
PDC/Server PDC/Server and real time
control actions Synchrophasors for Power Systems.
[7] “Implementation guideline for digital interface to
instrument transformers using IEC 61850-9-2”, UCA
Figure 14. Replacement of GPS modules international users group (www.ucainternational.org).
[8] ITU-T G.8621 Timing and synchronization aspects in
For the timing parameters required for encapsulation into packet networks
IEEE C37.118 data frames, the PC37.238 mechanism provide http://www.itu.int/rec/T-REC-G/recommendation.asp?lang=e
all of these. The PC37.238/D5.5 Annex C describes the n&parent=T-REC-G.8261
mapping between PC37.238 local clock accuracy and IEEE [9] J. Amelot, et al “An IEEE 1588 Time Synchronization
C37.118 time quality nibble [5]. Most importantly PMUs Testbed for Assessing Power Distribution Requirements,
need to know if the time received is in fact traceable to UTC. ISPCS 2010 New Hampshire, September 2010.
This information is provided in PC37.238 TimeTraceable [10] J.C. Tournier, K. Weber “Differences and Similarities
flag. Note that physical connection (Ethernet) may still be between the Audio Video Bridges and Power System
functional, but grandmaster (time source) may not be Profiles for IEEE 1588”, ISPCS 2010, New Hampshire,
traceable to UTC anymore. In this case no valid September 2010.
synchrophasor measurements can be performed. Bit 13 in [11] J.C. Tournier, T. Werner “A Quantitative Evaluation of
synchrophasor STAT word indicates whether PMU time is IEC 61850 Process Bus Architectures”.
locked to UTC (as opposed to just having valid timing input [12] LXI IEEE 1588 Profile, Draft 2, April 26, 2008.
or not). [13] K. Fodero, etc “Secure, Wide-Area Time
Synchronization”, WPRC 2009, Spokane, October 2009.
Although traceability to UTC time is the most important for [14] M. Goraj, R. Moore “First Practical Experience with
PMU applications, the knowledge of grandmaster IEEE 1588 High Precision Time Synchronization In
identification, provided by the PC37.238 mechanism can be High Voltage Substation with IEC 61850 Process Bus”,
useful during transient states as well. PAC World Conference, Dublin, June 2010.
[15] P802.1AS/D7.2 Draft Standard for Local and
The local time information provided by the PC37.238 Metropolitan area Networks – Timing and
protocol can be useful for applications requiring local time, Synchronization for Time-Sensitive Applications in
including day-light savings adjustments. Bridged Local Area Networks, August 18, 2010.
[16] TICTOC Transporting PTP messages (1588) over
4 Conclusion MPLS networks, September 22, 2010
http://www.ietf.org/id/draft-davari-tictoc-
IEEE 1588 Power profile is specified in the PC37.238 draft 1588overmpls-00.txt
standard as a mechanism for precise time distribution. While
approval of this standard is under way an effort should be
made to understand better how it can be applied to specific
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 65
Abstract—In this paper the High-Speed-Distance Protection called High-Speed-Distance (HSD). The procedure is based on
algorithm will be discussed. The principle of this novel function is delta-quantities which reflect the electrical state change in the
based on the so called dynamic delta-quantities resulting from network due to the short circuit event [5]. The paper will
splitting the electrical circuit after a short circuit event by means discuss the theoretical background of the method. Detailed
of the superposition technique. Due to fact that the estimation of discussion of the sensitivity of the function will be carried out
the fault localization takes place in a time domain, the algorithm as well. The method was successfully implemented in a
presents a good alternative to the conventional distance prototype device, and the response of the algorithm to different
protection, where response speed of the relay plays an important fault types will be presented. The test version of the algorithm
role (high voltage network). The test results of the High-Speed-
was successfully tested on a complex hardware network model.
Distance will be discussed and application areas of this function
Thus, the acquired results of the algorithm responses are
presented.
representative and comparable with a practical application.
Keywords: Protection System, High-Speed-Distance, Loop
Selector, Directional Element, Distance Element, Testing the II. BACKGROUND OF THE METHOD
Distance Protection
A. Theoretical Consideration
I. INTRODUCTION As already mentioned, the electrical fault at the line is a
The electrical short circuit is one of the most dangerous dangerous event that results from rapid, undesirable change in
phenomena in power systems. It results in system instability the physical network structure with a significant impact on the
and, in the worst case, outage. Therefore, it is imperative that energy transmission in entire system. Because of that, such
short circuits be selectively eliminated from the system phenomenon should be recognized as quickly as possible and
operation. This task is taken over by the protection devices [1]- then the faulty network area eliminated from system operation.
[2]. Especially in high voltage networks, stability must be To do so the conventional distance protection has been
ensured by fast protection systems, which allow for detection designed, the task of which is to measure the impedance of the
and clearance of the faults in as short a time as possible. Since fault contained in the electrical loop and to compare it with the
the high voltage networks often distribute energy over impedance settings that define the operation range of the
hundreds of kilometers, the most popular fault detection protection. In order to calculate impedance the following
instrument for this voltage level is the so called distance simplified expression, based on Figure 1, can be applied:
protection. Amongst others, its significant advantage is that it f cos [u A ] + j ⋅ f sin [u A ] ,
can be installed at any network node and can work aZ L =
f cos [i A ] + j ⋅ f sin [i A ] (1)
autonomously to protect or be responsible for a specific
network line. The communication with other devices is not where aZL is the fault impedance fcos, and fsin are the cos and
necessary here. The principle of the common distance sin filters respectively. The response time of the (1) depends on
protection is to measure short circuit impedance in the the filter length. Therefore, time performance of this method is
electrical loop containing the fault and, based on this limited mostly by the applied filter length. Normally the
information, the protection device should decide if the short calculation technique to determine the short circuit impedance
circuit is localized in so called protected zones applied with the can require more samples than those contained in the half cycle
settings [1]-[3]. The impedance measurement process has a interval of the fundamental period of the system. Depending on
negative influence on the tripping time and thereby on the the short circuit location and conditions before short circuit
system operation [4]. In this article a further method for the occurred, the number of samples required is sometimes more
short circuit distance estimation will be presented. The than those in one or two fundamental cycles [4]. Therefore,
estimation of the fault location takes place by analyzing the another method with better performance can be applied.
samples. As a result of the estimative nature with regard to the Namely, by analyzing the situation before and after the fault
fault location contained in the described method, it can attain event, the exact fault localization can be carried out without
significantly faster operation compared with conventional needing to determine the short circuit impedance. This method
distance protection. Therefore, this computation technique is is based on so called delta-quantities. The principle of the
66
where uA(t), iA(t) are measured voltage and current at point A. The calculation of the pre-fault currents ip,A(t), pre-fault
The up,A(t) and ip,A(t) are quantities which reflect pre-fault voltages up,A(t), delta-voltages Δuf,A(t) and delta-currents
conditions. The Δuf,A(t) , Δif,A(t) delta-quantities represent fault Δif,A(t) can be carried out if the network structure and its
conditions with decoupling of the load flow. parameters are known. In a normal case, only the measured
values after and before short circuit are available. Therefore the
relevant delta-quantities can be approximated based on fault
and pre-fault values of iA(t) and uA(t) as expressed in (3):
Δu f , A (t ) ≈ u A (t ) − u A (t − T ) ,
Δi f , A (t ) ≈ i A (t ) − i A (t − T ) (3)
with the slope of 45° appears. Since in the range of small delta- capacitive then the curve develops in the defective opposite
quantities, high uncertainty appears, (e.g. mostly measurement direction. This results from the fact that, the assumed model for
error) the so called dead-zone must be introduced. It delta-voltage calculation is not matched with the physical
contributes certain limitation to the method that can be condition in the network. Since the source impedance is
annulled if the delta-voltages are simply filtered by an integral inductive and the line impedance, also by series compensated
function in the following way [8]-[10]: line, is inductive as well, the direction calculation can be
τ
interpreted as a stable method. In the normal case (three phase
F (τ ) = ∫ Δu f (t ) ⋅ ΔuR (t ) dt . (6)
system) delta-voltages are calculated for the defective
0 phase/phases. As a result, a directional element is activated for
the faulty loop only. The six loops are not calculated in
If the function F(τ) is negative (for τ=τ1) then forward fault parallel. Which loop is activated, depends on the signal from
will be concluded. For the reverse fault a positive integral the loop selector, shortly described above. For the phase-to-
function F(τ) (for τ=τ2) should appear. The uncertainty of the phase defective loops the delta-voltages uf and uR are created
method is then reflected by the non directional area as from phase-to-phase voltages and currents respectively. For the
presented in Figure 6. Depending on the availability of the fault phase-earth loops, the delta-voltages uf and uR are built from
quantities after short circuit, the given threshold for reverse or phase-to-earth voltages and phase currents respectively. Since
forward fault recognition can vary. The replica impedance ZR the loop in the phase-earth mesh is inductive, the earth current
is the main factor that has impact on the sensitivity of this with appropriate influence of the replica zero-sequence
direction estimation method. Thereby two components play impedance ΔZ0 is not taken into account because it
central role: there is magnitude and angle of the replica insignificantly influences the directional element algorithm
impedance ZR. The magnitude can contribute so called under- (see general consideration in Figure 7 and Figure 8). Besides
function only, e.g. if the chosen magnitude for replica this replica zero-sequence impedance ΔZ0 is unknown and
impedance is too low. However, significant deviation of the similar to the common line replica impedance ZR must be
angle from the real delta-impedance ΔZ can introduce over- assumed. It can be an additional error source. The mutual
function. The influence is presented in Figure 7 and Figure 8. coupling also has low influence on the directional element,
because during this effect the loop character is still inductive
Integral [-]
and consideration from Figure 7 and 8 can be applied.
0
Source replica impedance angle 86°
The calculation of the fault localization is based on the
-0.2
comparable analysis of the equivalent voltage uK at the location
-0.4
-0.6
of the short circuit. Since this location is unknown, the
-0.8
reference voltage uref must be calculated. This voltage results
-1 from the theoretical voltage at the end of the protected zone as
0 0
4 20
10 if the fault would appear exactly at end of the protected zone.
8 30
12 50
40 Hereby, the protected zone is characterized by high-speed-
60
Sample number [-] 16
80
70
Source impedance angle [°] distance impedance (HSD) ZHSD, particularly lower then the
20 90
line impedance ZL. Applying Kirchhoff’s laws for equivalent
Figure 7. Sensitivity of the direction method for a different replica circuit resulting from the superposition principle (Figure 2), the
impedance angle reference voltage uref can be expressed as follows (7):
u ref = u p , A − Z HSD D i p , A , (7)
Integral [-]
2
where ZHSD is the differential operator in form of (LHSDd/dt +
Source replica impedance angle 86°
1.5 RHSD). Usage of this differential operator allows for calculation
1 of the reference voltage uref in the time domain. The index A
0.5
0
denotes the measurement point in the network (in this case the
-0.5
-30
station A). It must be noted here that all computations must be
-1
0 -24 preformed in the time domain. In the normal case, formula 7
4 -18
8
-12
must be fitted into an appropriate defective electrical loop that
Sample number [-] 12 Source impedance angle [°]
16 -6 is annunciated by the phase selector. Hereby the differences in
20 0
equation between single-pole short circuit to earth and multiple
Figure 8. Sensitivity of the direction method for a different replica pole phase faults appear. Expression 7 presents the
impedance angle simplification that is valid for the single-phase system if,
additionally, the earth line impedance is equal to zero. For
It was assumed here that the replica impedance ZR has a double-phase and three-phase faults the phase-to-phase loop is
constant angle of 86°. Also, the forward fault was simulated in selected and calculation takes place on phase-to-phase
a network with a different angle of reverse source impedance. quantities for voltage and current respectively. When the
The angle of this impedance varied between 90° (inductive) phase-earth loop is selected, the appropriate phase-to-earth
and -30° (capacitive). It can be noted that even if angle voltage with suitable phase current and earth current is
deviation is big, the integral curve has correct tendency. Only involved in the calculations. In such case the expressions from
the oscillated form can be observed. If the source impedance is 7 and 8 must be completed with the zero-sequence
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 69
compensation factor that reflects non-homogeneity between by the source impedance in reverse direction ZS,A and radius as
phase and earth impedances. Since the selector chooses one the sum of the source impedance ZS,A and HSD-impedance
loop only, only one loop is calculated by the distance element. ZHSD. Since the fault impedance Zf is placed in quadrant I of
The equivalent voltage at the end of the high-speed-distance the complex plane, only the characteristic in quadrant I is
zone can be also calculated from delta-quantities (see section applicable. Depending on the source impedance ZS,A, the
II) like (8): distance characteristic can vary in R direction (real axis). The
reach in direction of the line impedance ZL is always constant.
u HSD = − Δu f , A + Z HSD D Δi f , A . (8) Therefore, the best performance of the HSD-algorithm is
obtained if a metal short circuit without transition resistance
In order to detect where the fault is localized, comparison appears.
between these two voltages, uref and uHSD, must be carried out.
Thereby, the following conclusions can be made:
- if uHSD > uref then the equivalent source uK must be
situated in the zone ZHSD, (internal fault)
- if uHSD < uref then the equivalent source uK must be
situated outside zone ZHSD (external, forward or
reverse fault)
- if uHSD = uref then the equivalent source uK is situated
exactly at the zone ZHSD (fault at zone limit)
In order to achieve good stability of the distance element with
good time performance the calculation of the voltages uHSD and
uref is realized by means to of the average rectified values.
These values are obtained in the moved constant window with
the length of the half of fundamental period. Since the building Figure 9. Distance characteristic for the forward fault (HSD-method)
of the average rectified value for the voltage ukHSD is not
always possible, the missing samples of the voltage ukHSD are Similar considerations can be carried out for the reverse faults.
replaced by samples of the uref. This happens only for the short The mathematical equation for description of the voltage in
time after fault. Additionally, the dynamic pick-up form of UK and UHSD quantities is given in (11):
characteristic for distance element is applied, that introduces U K = −ΔU f , A − Δ I f , A ⋅ Z f
stabilization in case of disturbances which can be amplified by .
the derivation element in expression 7 and 8. = −Δ I f , A ⋅ ( Z f + Z L + Z S , B )
The sensitivity investigation of the distance prediction method U HSD = − ΔU f , A + Δ I f , A ⋅ Z HSD (11)
based on delta-quantities can be performed using the complex = Δ I f , A ⋅ ( Z L + Z S , B − Z HSD )
static values. At first the situation of the fault in forward
direction will be considered. From a measurement point of If we compare the magnitudes of both voltages UK and UHSD
view the complex equivalent voltage source can be computed with each other and assume that the line impedance ZL is
as given in (9). For this task the equivalent circuit from Figure approximately equal to HSD-impedance ZHSD the following
3 should be applied: expression is can be written:
U K = −ΔU f , A + Δ I f , A ⋅ Z f = Δ I f , A ⋅ ( Z S , A + Z f ) U ref ≈ U K ≥ U HSD
, .
U HSD = −ΔU f , A + Δ I f , A ⋅ Z HSD = Δ I f , A ⋅ ( Z S , A + Z HSD ) (9) 2 (12)
( RS , B + R L + R f ) + ( X S , B + X L + X f ) ≥ Z S , B
2 2
(66
kM
kM
(6
92
4X
exceeds the reference voltage uref. Hereby it can be suggested faults can happen, the HSD-function was programmed in such
that the fault is inside the HSD-zone and a defective trip can way that its operation during these fault types is possible as
happen. Based on this example it can be concluded that well. The performance of the method according to the tripping
prevention of the overreach effect during the disturbances is a time is also very good. This is shown in Figure 15. The
big challenge for the HSD-function. transferring of the reverse to forward fault was simulated. In
most cases the tripping time took place in less than half of the
fundamental period. The only time the HSD-algorithm didn’t
trip after 20ms was for the evolving fault BCN. This is due to
the occurred condition according to the earth current.
Moreover, the other fault transferring possibilities were tested
like: internal to internal and internal to external fault with
different delay times. The HSD-function operates very stable
and no over-function is detected.
Figure 13. External Fault at >100% line length with significant disturbances
content
HSD-function operation, because this method is based on over-function of the HSD-method. Therefore switching
delta-quantities. However, during the strong short circuit more operation in the network can be dangerous for time based
affected delta-quantities are created that contribute to detection distance protection. Many such diverse dynamic and static
of the fault direction and its localization. This is shown in network states were simulated and no over-function of HSD-
Figure 17. After fault the voltage uHSD is higher than uref. algorithm was detected. Therefore, this function can be
Therefore, it is correctly concluded as an internal fault. In order confirmed as stable. Disturbed operation of the measurement
to avoid the mis-operation of HSD-function during power system, in addition to an undesired network state, can influence
swing some stabilization rules were designed for this network negatively the HSD-algorithm and contribute to mis-operation.
state as well. It should be noted here that effects can appear that These disturbances regarding measurement problem include
are similar to those of faults during disturbances. Since lower CT saturation, CT broken or fuse failure. Extensive tests were
frequency components appear during a power swing, the carried out in the range of these phenomena and proper HSD-
stabilization algorithm has a more static form. Moreover the reactions were recognized.
relevant states of different networks were simulated and the
reaction of the HSD-algorithm was investigated. These IV. SUMMARY
network states include switching on fault, external and internal
fault clearance, frequency deviation, weak in-feed, etc. In this paper the High-Speed-Distance protection function was
discussed in detail. The theoretical background of the method,
its sensitivity investigation as well as test results were
presented. As can be concluded, this time based distance
function is characterized by very good time performance and
robustness. Also, the application range of the method is huge.
It spreads from the simple faults through evolving faults to
more complex faults during, e.g., power swing. Nevertheless,
the HSD-algorithm should operate in combination with
conventional distance protection because its under-function
reaction can not be excluded. The HSD-algorithm exhibits
under-function reaction particularly when very complex faults
appear or if there is a strong deviation from the conformed
network operation before the fault occurred. Therefore, HSD
Figure 16. Evolving fault during the same phase AN reverse to AN forward can not completely replace conventional distance protection,
but it can operate as secure support for conventional distance
protection.
REFERENCES
[1] H. Ungrad, W. Winkler and A. Wiszniewski, “Protection techniques in
electrical energy systems,” Marcel Dekker, INC New York 1995.
[2] A. G. Phadke and S. H. Horowitz, “Power System Relaying,” Wiley
Inc., 1995.
[3] G. Ziegler, “Numerical distance protection: principles and applications”,
Publicis Corporate Publishing, 3rd edition 2008.
[4] H.-J. Herrmann, “Digitale Schutztechnik: Grundlagen, Software,
Ausführungsbeispiele,“ VDE-Verlag GMBH, Berlin, Offenbach 1997.
[5] M. Vitins, “A fundamental concept for high speed relaying,” ,” IEEE
Transactions on Power Apparatus and Systems, vol. 100, No. 1. pp. 163-
173, January 1981.
Figure 17. Internal fault during power swing [6] M. Chamia and S. Liberman, “Ultra high speed realy for EHV/UHV
transmission lines – development, design and application,” ,” IEEE
Each of these mentioned effects can have a negative influence Transactions on Power Apparatus and Systems, vol. 97, No. 6. pp. 2104-
on HSD-function. Therefore during implementation numerous 2112, Nov/Dec 1978.
stabilization and plausibility rules for detection of non [7] F. Engler, O.E Lanz, M. Hanggli and G. Bacchini, “Transient signals
and their processing in an ultra high-speed-directional relay for
conformed network operation were designed and successfully EHV/UHV transmission line protection,” IEEE Transactions on Power
tested. The importance of such tests can be considered based Apparatus and Systems, vol. 104, No. 6. pp. 1463-1473, June 1985.
on the analysis of external fault clearance process. After [8] G. Benmouyal and S. Chano, “Characterization of the phase and
external fault the HSD-algorithm is picked up. Because the amplitude comparators in UHS directional relays,” IEEE Transactions
fault is not in the protected zone no reaction is expected. on Power Systems, vol. 12, No. 2, pp. 646-653, May 1997.
Through the external fault clearance in a short amount of time, [9] G. Benmouyal, “Amplitude-independent comparators for UHS
from HSD point of view, conditions similar to those of a directional relays,” Developments in Power System Protection,
Conference Pubplication IEE, no. 434, pp. 78-82, 25-27th March 1997.
normal fault occur. The voltage will be recovered and current
will drop rapidly down, so that big delta-quantities for these [10] K. S. Prakash, O.P Malik and G.S Hope, “Amplitude comparator based
algortihm for directional comparison protection of transmission lines,”
values appear. Additionally during fault clearance, relative big IEEE Transactions on Power Delivery, vol. 4, No. 4, pp. 2032-2041,
disturbances can be recognized, which can contribute to an October 1989.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 73
RESUMEN
I NTRODUCCI ÓN
Para proteger líneas aéreas o cables
de potencia son necesarios los
74
CASO REAL
y la Universidad de Kaiserslautern
donde se graduó en el año 1976. En
1990 recibió doctorado en la
Universidad de Viena, Austria.
Michael Krugger tiene más de 28 años
de experiencia en ingeniería de
potencia especialmente en ingeniería
de alta tensión y diagnóstico de
aislamiento. El es miembro del VDE
e IEEE.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 81
Resumen – En el p resente t rabajo s e p ropone el e mpleo localizar una falla son por lo general mucho mayores que para
de nomogramas para la localización de fallas en redes de líneas de distribución.[5, 9-10]
distribución u tilizando v alores d e d istancia a la f alla,
calculados mediante e l al goritmo d e T akagi y val ores d e Además de esto, estas líneas tienen características cómo
distancia a la falla, simulados para tres clases de redes de homogeneidad, topología, etc. que las hacen susceptibles de
igual topología pero de diferente co nstitución. Se muestra soluciones relativamente sencillas y económicas en términos
cómo es posible mediante el e mpleo de estos nomogramas de recursos de medición y de capacidad de cómputo. En esta
obtener una estimación adecuada de la distancia a l a falla clase entran los algoritmos de reactancia como el de Takagi[2]
a pesar de que el algoritmo de Takagi da valores erróneos con los cuales es posible obtener precisiones por debajo del
de localización. 2% de error siempre que se realice una adecuada estimación
de los fasores de tensión y corriente involucrados en la falla.
Palabras clave – Localización de fallas, redes de distribución.
Otros algoritmos de reactancia que emplean medición en
I. INTRODUCCIÓN ambos extremos de la línea, sincronizadas o no, proveen
mayor nivel de precisión siempre que se cuente con la
El empleo de técnicas de localización de fallas en centros de
posibilidad de utilizarlos.
gestión de la distribución es una necesidad impuesta en la
actualidad por el desarrollo de las clases de estrategias de
Adicionalmente en este entorno se han empleado otras
gestión utilizadas para el desarrollo de las llamadas redes
clases de métodos tales como:
inteligentes o Smart Grid. Términos como continuidad del
servicio, calidad del servicio, fiabilidad etc juegan un
1. Redes neuronales artificiales.
importante rol en la interpretación que se hace hoy del papel
2. Métodos de onda viajera.
de los sistemas de provisión de energía eléctrica lo que
3. Métodos de componentes de alta frecuencia.
implica mejorar la precisión de los métodos de localización de
4. Algoritmos Genéticos.
fallas aplicados en redes de distribución ya que hace más fácil
el trabajo de detección y eliminación de las fallas al disminuir
Para los sistemas de distribución sin embargo no se han
el tiempo empleado para estas tareas. [1]
encontrado todavía soluciones suficientemente generales que
permitan de manera fácil e intuitiva obtener la localización de
Numerosas técnicas han sido propuestas en la literatura a
la falla. Esto se debe a múltiples razones como: [9, 11-12]
lo largo de los años para resolver la problemática de la
localización de fallas en sistemas eléctricos de potencia.[2] [3-
1. La falta de homogeneidad de las líneas de
8]La mayoría de estas técnicas se enfocan en la localización
distribución.
de fallas para líneas de transmisión de energía. Esto se debe a
2. La clase de topología de las redes de distribución que
que los grandes niveles de potencia transportados por estas
provoca en muchos casos la existencia de lazos los
líneas hacen que las fallas en las mimas tengan consecuencias
cuales crean conocidos problemas para localizadores
graves sobre la estabilidad del sistema y por lo general son
que empleen información de un solo terminal de la
capaces de afectar a grandes grupos de consumidores. Por otro
línea.
lado las distancias a recorrer en líneas de transmisión para
3. La existencia de cargas variables entre los
localizadores de fallas y el lugar de ocurrencia de las
mismas.
Gómez González Abel, labora en Arteche Medición y Tecnología, S.A.
de C.V. Industria Mecánica México (e-mail: abgonzalez@arteche.com.mx) 4. El hecho de que los localizadores no estén ubicados
Martínez del Sol Alexis labora en Arteche Centro de Tecnología, A.I.E directamente sobre las líneas sino comúnmente sobre
Derio Bidea, 2, 48100 Mungia, (Bizkaia), España (e-mail: amds@arteche.es) alimentadores lo cual dificulta la evaluación de las
Mejía Preciado Roberto, labora en Arteche Medición y Tecnología, S.A. contribuciones de corriente de falla.
de C.V. Industria Mecánica 2173, Zapopan, 45132, Jal. México (e-mail:
rmejia@arteche.com.mx) 5. La relativamente alta influencia que ejerce la
Mier García Jorge Javier, labora en Arteche Medición y Tecnología, S.A. resistencia de falla y la clase de aterramiento en este
de C.V. Industria Mecánica (e-mail: jmier@arteche.com.mx) tipo de redes sobre los valores de corrientes y tensión
de cortocircuito.
82
6. La imposibilidad de disponer en gran cantidad de Este perfil de reactancia se obtuvo mediante la realización
casos de valores de corriente directamente de la rama de un estudio paramétrico de simulación de tres circuitos de
fallada, etc. igual topología pero de diferentes valores de impedancia las
7. En contraste con los sistemas de transmisión las líneas cuales se muestran en la TABLA 1.
de distribución alimentan cargas relativamente
pequeñas por lo que disponen de poca capacidad de En el estudio se simularon, utilizando SimPowerSystems
medición y/o instrumentación limitada en la mayoría cortocircuitos, monofásicos, bifásicos, bifásicos a tierra y
de los casos a medidores de tensión y corriente, trifásicos cada 100 metros a lo largo de cada una de las líneas.
relevadores de protección de sobrecorriente de bajas En total durante el desarrollo del trabajo se generaron y
prestaciones y otros como restauradores, analizaron 18000 casos de estudio diferentes.
seccionalizadores y fusibles conectados aguas abajo.
Esto ha provocado que se empleen técnicas disimiles de Xvs Distancia Linea Mixta CC3F
relativamente poca complejidad y efectividad tales como:
Distancia Real
Takagi
Figura 4 Reactancia vs Distancia Línea Subterránea Figura 6 Distancia a la Falla y Takagi CC3F. Línea Mixta
localización de fallas siempre y cuando los niveles de El empleo de estas gráficas permite, a pesar de los errores
precisión de la aplicación del algoritmo se mantengan propios del algoritmo de Takagi vistos en el epígrafe anterior,
constantes. Esto se verá en la próxima sección. obtener estimaciones adecuadas de la distancia a la falla.
V. CONCLUSIONES
IV. USO DE NOMOGRAMAS La aplicabilidad de los algoritmos de reactancia a redes de
Aplicando el algoritmo de Takagi, para obtener la distancia distribución se restringe a sistemas de baja complejidad.
a la falla en los circuitos de distribución mostrados
anteriormente es posible obtener las gráficas de distancia La múltiple localización o múltiple estimación de lugar de
calculada contra distancia real a la falla mostradas en las falla es un problema de los métodos de impedancia o distancia
Figuras 9, 10 y 11. con medición desde una sola punta aplicados a redes de
distribución y no puede ser eliminado a no ser que se disponga
de información adicional.
Distancia Calculada vs Distancia Real CC3F
Linea Aérea El empleo de nomogramas permite obtener localización de
fallas en redes de distribución con niveles de exactitud
aceptables a pesar de los errores de los algoritmos de
reactancia a partir de los cuales se generan dichos gráficos
siempre y cuando la precisión del .del algoritmo de reactancia
se mantenga constante.
VI. BIBLIOGRAFÍA
[1] Y. Zhang and M. Prica, "Toward Smarter Current Relays for Power
Grids," in IEEE PES General Meetin, Montreal, Canada, 2006, p. 8.
[2] T. Takagi, et al., "Development of a New Type Fault Locator Using
the One Terminal Fault-Voltage and Current Data," IEEE
Figura 9 Nomograma Línea Aérea Proceedings on Power apparatus and Systems, vol. PAS 101, p. 7,
August, 1982 1982.
[3] D. Novosel, et al., "Unsynchronized two-terminal fault location
estimation," IEEE Trans. on Power Delivery, pp. 130-138, 1996.
Distancia Real vs Calculada Línea Mixta CC3F [4] M. M. Saha, et al., "Review of fault location techniques for
distribution systems," presented at the Power Systems and
Communications Infrastructures for the Future, Beijing, 2002.
[5] T. Bouthiba. FAULT LOCATION IN EHV TRANSMISSION
LINES USING ARTIFICIAL NEURAL NETWORKS.
[6] A. S. Bretas, et al., "A BP neural network based technique for HIF
detection and location on distribution systems with distributed
generation," presented at the Proceedings of the 2006 international
conference on Intelligent computing: Part II, Kunming, China, 2006.
[7] M. Kezunović, et al., "A Novel Method for Transmission Network
Fault Location Using Genetic Algorithms and Sparse Field
Recordings," in IEEE PES Summer Meeting, ed, 2002.
[8] S. Vasilic and M. Kezunovic, "New Design of a Neural Network
Algorithm for Detecting and Classifying Transmission Line Faults,"
in IEEE PES Transmission and Distribution Conf, ed, 2001.
[9] M. M. Saha, et al., Fault Location on Power Networks, 1st ed.
Figura 10 Nomograma Línea Mixta London: Springer, 2010.
[10] A. Gopalakrishnan, et al., "Fault Location Using Distributed
Parameter Transmission Line Model," IEEE Trans. on Power
Distancia Calculada vs Distancia Real CC Delivery, pp. 1169-1174, 2000.
[11] IEEE, "C37.114-2004 - IEEE Guide for Determining Fault Location
Trifásico Línea Subterránea on AC Transmission and Distribution Lines," ed, 2004.
[12] J. J. Mora Flores, "Localizacion de faltas en sistemas de distribución
de energía eléctrica usando metodos basados en el modelo y métodos
basados en el conocimiento," PhD Doctoral, Escola Politécnica
Superior, Universitat de Girona, Girona, 2006.
VII. BIOGRAFÍAS
Abel González Gómez, nació en Santa Clara, Cuba.
Ingeniero Electricista, egresado de la Universidad
Central de Las Villas, Cuba en 1996. Master en
Sistemas Eléctricos en 2000 por la Universidad
Central de Las Villas. Laboró como profesor de la
Facultad de Ingeniería Eléctrica de dicha Universidad
Figura 11 Nomograma Línea Mixta y como Ingeniero de Control en la Empresa de
Telecomunicaciones de Cuba.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 85
Desde el año 2010 se desempeña como Ingeniero de Diseño en la empresa Roberto M ejía P reciado nació en Guadalajara,
Arteche Medición y Tecnología S.A. de C.V. Su área de investigación está México en 1961. Recibió el grado de ingeniero
relacionada con el análisis de la operación, control y protección de sistemas electrónico en la Universidad ITESO de Guadalajara
eléctricos de potencia y el desarrollo de software de aplicación en 1982. Entre 1982 y 1989 trabajó en diferentes
empresas relacionadas al ramo de computación. A
Alexis Martínez del Sol nació en Cienfuegos Cuba partir de 1989 se ha dedicado al desarrollo de equipos
en 1964. Recibió el grado de Doctor en Ciencias de medición y control para subestaciones.
Técnicas en la Universidad Central de Las Villas,
Cuba en 1997. En el período de 1987 -1999 trabajó Desde el año de 2005 labora en Arteche Medición y Tecnología, S.A. de C.V.
en la Facultad de Ingeniería Eléctrica de la y es integrante del grupo de investigación, desarrollo e innovación de la
Universidad Central de Las Villas donde fue profesor empresa. Su área de investigación está relacionada con el diseño electrónico,
Asistente y Jefe del departamento de Electroenergé- análisis de la operación, control y protección de sistemas eléctricos de
tica. potencia y el desarrollo de software de aplicación
De 1999- 200 fue Profesor Investigador Titular C del Departamento de
Ingeniería Mecánica Eléctrica de la Universidad de Guadalajara. A partir del Jorge Javier Mier G arcía nació en Báez, Placetas,
año 2005 se vinculo al desarrollo de investigaciones científicas en la empresa Cuba. Recibió el grado de Doctor en Ciencias
Arteche Medición y Tecnología S.A. de C.V. y durante los años 2007-2010 Técnicas en la Universidad Central de Las Villas,
fue su Director General. Actualmente es el Director de Protección, Control y Cuba en 2002. En el período de 1988 – 2005 trabajó
Medición del Grupo Arteche. Su área de investigación está relacionada con el en la Facultad de Ingeniería Eléctrica de la
análisis de la operación, control y protección de sistemas eléctricos de Universidad Central de Las Villas donde fue profesor
potencia y el desarrollo de software de aplicación. Fue Miembro del Sistema Asistente y Miembro del Tribunal Nacional de
Nacional de Investigadores (Nivel I) del 2004-2007 Grados Científico.
Desde el año 2006 labora en la empresa Arteche, Medición y Tecnología S.A.
de C.V. y actualmente es Gerente de Diseño. Su área de investigación esta
relacionada con el análisis de la operación, control y protección de sistemas
eléctricos de potencia y el desarrollo de software de aplicación.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 87
Abstract—Fault location information is critical for operating Two-end fault location methods minimize these errors.
and maintaining transmission networks. Some of the challenges Reference [3] describes a two-end method based on negative-
in calculating accurate fault location include fault resistance, sequence quantities that can be implemented within line
zero-sequence mutual coupling, load, system nonhomogeneity,
and transmission lines composed of multiple sections with
protection relays using the relay programming abilities.
considerably different characteristics. This paper presents a fully Reference [4] describes an implementation of this algorithm
automated real-time fault location system that provides accurate using two line relays with relay-to-relay communication to
fault location information for multiple transmission lines and calculate the fault location in real time.
makes the results available to system operators and maintenance Variable fault resistance introduces errors in fault location
personnel. The system is capable of the following: estimation; accurate time stamping of the measurements aids
• Retrieves all triggered event reports from relays and in minimizing these errors when using two-end methods.
digital fault recorders (DFRs) automatically. With these
Synchrophasor technology is promising; however,
reports, the system identifies the faulted transmission
line(s) within the transmission network. available message rates make using this technology
• Determines the fault type and calculates the fault challenging, especially in applications with fast fault-clearing
location and fault resistance using multiterminal fault times.
location methods for different types of power lines, Alternative traveling wave fault location technology is
including overhead lines, underground cables, and available and provides good results, but deployment has been
composite lines that include both overhead line and limited to extra-high-voltage applications because of its high
underground cable sections. cost. One of the objectives of the system proposed in this
• Uses fault location methods that are accurate under fault paper is to provide an economical solution using relays that
resistance, parallel-line mutual coupling, system perform line protection functions.
nonhomogeneity, and load. While present two-end fault location methods provide good
• Supports event reports with a fixed sampling rate or a results in applications where the X/R ratio of the line is
variable sampling rate that is a multiple of the power constant, they are not suitable for lines with multiple sections.
system operating frequency.
These sections have different impedance characteristics,
• Supports event reports generated by relays and DFRs especially for applications that combine overhead lines and
connected to an IRIG-B time source.
underground cables. This paper presents a method that is
This paper compares fault location results calculated from
field event reports and reports that are obtained from models of based on the negative-sequence voltage profile along the line
real power systems with actual fault locations. and is suitable for composite lines.
We use field and laboratory cases where the fault location
I. INTRODUCTION is known to determine the accuracy of the proposed method.
Fault location in protective relays has been available for The field case shows that the fault location estimation is off by
over 20 years. These relays use impedance-based fault 475 feet in a 26.3-mile composite line application.
location algorithms, typically from one terminal of the We introduce a real-time fault location system that uses
transmission line [1] [2]. While these relays have been very line protection relays and displays fault location information at
useful in locating the majority of faults, the following the control center within 1 minute after the fault occurrence
conditions can affect their fault location accuracy: when using Ethernet-based communication. The fault location
system automatically retrieves event reports from relays after
• High-resistance faults
a fault occurs. The system accommodates event reports with
• Heavy load conditions
both fixed and variable sampling rates.
• Zero-sequence mutual coupling
Orange and Rockland Utilities, Inc. (ORU) plans to deploy
this system in its transmission network and communicate the
fault location results to the ORU Energy Control Center.
88
VZ
VX and IX correspond to the voltage and current phasors at III. CONSIDERATIONS FOR VARIABLE FAULT RESISTANCE
Terminal X. VY and IY correspond to the phasors at
Variable fault resistance affects the voltages and currents
Terminal Y. These phasors can be obtained from symmetrical
that the relays at each terminal measure. Fig. 3 shows the sum
or Clarke components or phase quantities. ZL is the line
of the local and remote residual currents (total residual
impedance. We can compensate ZL in (1) according to the
current) and the estimated fault resistance for a B-phase-to-
distributed parameter line model to accommodate long
ground fault. The total residual current is approximately equal
transmission lines [1].
to the total fault current at the fault location. The fault
Alignment of local and remote measurements is critical for
occurred on a 400 kV transmission line with a line length of
obtaining accurate fault location using two-end-based
225 kilometers; wildfires close to the transmission line caused
algorithms for faults with variable resistance. Methods based
the fault condition. Observe that the fault current starts with a
on (1) are sensitive to the errors in measurement alignment.
peak value lower than 828 A that increases to a peak value of
Reference [3] describes a two-end method that uses only
3,860 A in 4 cycles at a rate of 758 A per cycle. The
negative-sequence quantities and solves a second-order
corresponding resistance that we calculate according to (2)
polynomial equation to estimate the distance to the fault.
changes at the beginning of the fault and settles to
These quantities include local current and voltage
approximately 3 Ω after 4 cycles [1].
measurements, as well as remote source impedance and
current magnitudes. Reference [5] presents a method that uses ⎧⎪ V I + VYB IXBk0 − ZL1I YBk0 IXBk0 ⎫⎪
an iterative process to estimate a factor that compensates the R F = real ⎨ XB YBk0 ⎬ (2)
error in alignment and then solves the distance to the fault. ⎩⎪ ( IXBk0 + IYBk0 )2 ⎭⎪
Reference [6] uses time-synchronized phasor where:
measurements for multiterminal-based fault location.
I XBk0 = IXB + k 0 I XR
However, most phasor measurement units (PMUs) offer a
maximum data transfer rate of 60 messages per second. Fast I YBk0 = IYB + k 0 I YR
clearing times reduce the available fault data, making the ZL0 − ZL1
k0 =
synchrophasor-based fault location calculation challenging. 3ZL1
We can use two-end methods to calculate fault location on
VXB is the B-phase voltage at Terminal X.
three-terminal lines by reducing the three-terminal network to
a two-terminal network [3]. Fig. 2 shows a typical VYB is the B-phase voltage at Terminal Y.
three-terminal line. For a fault on Section X, the voltages at IXB is the B-phase current at Terminal X.
the tap (VTAP) calculated from Terminal Y and Terminal Z are IYB is the B-phase current at Terminal Y.
equal, and the voltage calculated from Terminal X is different IXR is the residual current at Terminal X.
from the voltages calculated from the other two terminals. IYR is the residual current at Terminal Y.
Based on this concept, Section X can be identified. ZL1 is the positive-sequence line impedance.
ZL0 is the zero-sequence line impedance.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 89
V2k_R_Y is the negative-sequence voltage at the right C. Fault Location for Three-Phase Faults
junction of line section k that is calculated from For three-phase faults, we calculate the positive-sequence
Terminal Y. impedance to the fault, Ztotal, from either terminal using
Fig. 5 illustrates the negative-sequence voltage magnitude positive-sequence voltage, V1, and current, I1, according
profiles from Terminal X and Terminal Y of the transmission to (10). The algorithm identifies the faulted line section, k,
line shown in Fig. 4. Because the two voltage profiles using (11). Equation (12) determines the total distance to the
intersect at the fault location, the negative-sequence voltages fault, L, where Lengthi is the length of line section i.
at the junctions of the faulted line section meet the two criteria
V1
stated in (7) and (8). Ztotal = (10)
I1
V2k _ L _ X ≤ V2k _ L _ Y (7) k −1
∑ i =1 Z1i ≤ Ztotal < ∑ i =1 Z1i
k
(11)
V2k _ R _ Y < V2k _ R _ X (8) k −1
k −1 Ztotal − ∑ i =1 Z1i
L = ∑ i =1 Length i + • Length k (12)
Z1k
The breaker statuses and trip signals are exchanged among 0.025
the RTDS and relays via the digital I/O interface, as Fig. 8
illustrates. The system setup emulates the real-time, closed- LG Fault
0.02
loop controlled power system. LL Fault
0.01
0.005
0
5.7 13.3 20.16
A
sampling methods have similar performance.
Absolute Error in Miles
kV
Fig. 14. Current and voltage measurements of the relay at Terminal Y.
TABLE II Fig. 15. Negative-sequence voltage profiles for the B-phase-to-ground fault.
ABSOLUTE ERRORS OF THE ESTIMATED FAULT LOCATION IN MILES
New Traditional Two- Relay at Left Relay at Right VI. AUTOMATED FAULT LOCATION SYSTEM
Method Terminal Method Terminal Terminal
Most of the existing multiterminal fault location methods
0.09 2.18 3.91 4.25 are mainly for post-event analysis. To perform this analysis,
we need to collect event reports from all line terminals, align
these data, and estimate the fault location, which is time-
consuming and inefficient. The automated fault location
system (AFLS) that we present in this paper can monitor
A
D. System Latency
The AFLS latency depends on the event retrieval time and
fault location computation time. The event retrieval time
depends on the communications medium between the
computer and the relays. For serial communication, the event
retrieval time is a function of the data transfer rate and the file
size. Typically, event retrieval times are in the order of 1 to
Fig. 16. AFLS monitoring three transmission lines. 3 minutes. For Ethernet-based communication, event retrieval
times are in the order of seconds. The computer performs fault
A. System Configuration location calculations in less than 1 second. For systems with
The initial system configuration requires specifying the Ethernet communication, the overall system latency is less
number of terminals of the monitored line, the number of than 1 minute.
sections, the section impedances, the communications
parameters of the relays, and the association of the relay with VII. AFLS DEPLOYMENT
the corresponding line terminal. After the system is
Orange and Rockland Utilities, Inc. (ORU) proposed the
configured, it does not require additional user intervention.
installation of fault-locating equipment at transmission line
The software also accommodates line terminals with dual
terminals in order to implement the two-end fault location
breakers and compensates for shunt reactors based on their
system as part of the ORU Smart Grid Project. The majority
impedances.
of ORU 345/138 kV transmission lines are overhead
B. Fault Record Retrieval and Archiving conductors, and some of them are underground cables. These
The user can configure the fault location software to transmission lines are relatively short, approximately 9 to
retrieve event reports from the protective relays via event- 10 miles; however, the lines are not easily accessible for
driven or polling mechanisms. When using the event-driven inspection during faults due to difficult terrain. Therefore, a
mechanism, the software initiates the retrieval process tool to precisely calculate the fault location is important for
immediately upon receiving a message from the relay every quick restoration of the faulted transmission line.
time a new event is triggered. When using the polling The algorithm presented in this paper for fault location on
mechanism, the software polls the relays for new events transmission lines using a two-ended technique, as per ORU
periodically at user-defined intervals and retrieves the new design requirements, was tested, and the results are within
event reports. Compared to the polling mechanism, the event- 1.5 percent accuracy. Based on successful testing results,
driven mechanism offers lower latency and minimum ORU allocated funding to implement this fault location
communications traffic. The software stores the retrieved technique on critical transmission lines.
event reports with filenames consisting of the device name ORU is planning to use relays with fixed sampling rates
and event trigger time stamp. and accurate time stamping for fault locating. These relays can
have up to six sets of three-phase current and two sets of
C. Fault Location Calculation and Results Display three-phase voltage inputs. Thus, the relays can monitor
After successfully retrieving all of the event reports for a multiple lines within a substation.
particular fault, the fault location software automatically ORU is in the process of implementing its first double-
indentifies the faulted line, estimates the fault location, and ended fault location system. This system will include relays at
displays the results. Fig. 17 shows the display of the fault each terminal of the transmission line and will communicate
location information. This display can be available at the with a workstation located at the ORU Energy Control Center
control center. The reported fault location information via serial communication over optical fiber. The workstation
includes the line name, reference terminal, distance to the will process the fault data recorded by relays. The results,
fault, fault type, and time of the fault. The software can also including calculated fault location, will be emailed to the
send the fault location information to maintenance personnel system operator.
via email.
94
Resumen –– En e ste a rtículo s e muestran el ef ecto q ue que garanticen la dependabilidad y la seguridad del sistema
presentan e l a coplamiento mutuo de l as l íneas de de protección [1].
transmisión de do ble c ircuito c on bus es c omunes e n l a
protección d e s obre co rriente. T ambién s e p resenta u n En el presente artículo se analiza el efecto que tiene el
ejemplo del ajuste y coordinación de dicha protección en acoplamiento mutuo en los relevadores de sobre-corriente.
líneas acopladas magnéticamente.
En las líneas de transmisión de doble circuito y que
Palabras Clave – Línea d e Tr ansmisión, P rotección, además converjan en las mismas instalaciones, deben de
Relevador d e s obre-corriente, p rotección d ireccional, hacerse consideraciones especiales como es el caso de los
acoplamiento mutuo, i mpedancia d e s ecuencia cer o acoplamientos mutuos de secuencia cero, así como las
mutua. inversiones de las corrientes en caso de falla. La reactancia
mutua provoca una variación en la reactancia de secuencia
Abstract –– In this article they are the effect that presents positiva entre un 3% a un 5%, así mismo los acoplamientos
the mutual c oupling of t he l ines of transmission of mutuos provocan sobre corrientes de secuencia cero y la
double circuit with buses common in the protection of on aparición de impedancias mutuas de secuencia cero que
current. Also one appears an example of the adjustment llegan a afectar entre un 50% y un 70% de la impedancia de
and c oordination o f t his p rotection i n c onnected l ines secuencia cero de la línea [2]. Entonces él no tomar en
magnetically. cuenta estos factores ha ocasionado un sin número de
disparos incorrectos, por esta razón es necesario realizar un
Keywords –– Transmission L ine, P rotection, rel ay o n- análisis que conlleve a proponer ajustes que garanticen la
current, directional pr otection, m utual coupling, operación correcta de los relevadores instalados en las líneas
impedance of mutual sequence zero. de transmisión en paralelo.
Si una falla llega a presentarse en la línea adyacente (fallas del par mínimo es alcanzado para todas las fallas, pero
hacia atrás) el ángulo del voltaje permanece casi sin cambios llevado a la práctica en el momento en el que alguno de los
y el ángulo de la corriente cambia alrededor de 180°, esta interruptores asociado al bus común abre, se presenta el
información es utilizada por el elemento direccional para efecto como si se tuviera una fuente de secuencia cero
discriminar entre fallas hacia delante y hacia atrás como se aislada afectando los elementos direccionales de secuencia
muestra en la figura 1. La entrada de voltaje actúa como cero. Él problema anterior puede resolverse utilizando los
referencia del ángulo de desfasamiento y es denominado elementos de secuencia negativa, los cuales tienen una
como voltaje de polarización del relevador, así mismo la aplicación común en las instalaciones donde se tienen
señal de corriente contiene la información para determinar la transformadores de potencial conectados en delta abierta o
ubicación de la falla y es denominada como cantidad de bien donde se tienen transformadores de potencial
operación del relevador. disponibles en el lado opuesto de un banco de
transformación con conexión estrella-delta.
En este artículo se da un énfasis especial en la protección Se puede decir que es indistintamente del tipo de elemento
direccional de sobrecorriente para fallas a tierra (67N), en direccional que se use y de su conexión, el elemento de
este tipo de fallas todas las cantidades de secuencia están sobrecorriente siempre responde a la corriente residual 3I0
presentes, por lo tanto pueden utilizarse estas componentes [1 ].
para la polarización del elemento direccional. En algunos
casos se utilizan las cantidades de secuencia cero debido a Actualmente las protecciones digitales integran la
que son relativamente fáciles de obtener, la corriente información del voltaje y la corriente, realizando los
residual que se obtiene de tres transformadores de corriente cálculos de los elementos direccionales y evaluando los
conectados en estrella representa la corriente de secuencia datos, a fin de adoptar la decisión direccional correcta, es
cero. decir que los relevadores modernos permiten utilizar
múltiples elementos direccionales, según las condiciones del
Así mismo la tensión que se obtiene de tres transformadores sistema.
de potencial con el primario conectado en estrella aterrizada
y el secundario en conexión delta abierta representa una Estas razones conducen a elegir elementos de secuencia
tensión de secuencia cero. Tanto la corriente de secuencia negativa para la polarización del elemento direccional
cero como la tensión de secuencia cero, pueden ser debido a que dichos elementos no son sensibles a la
utilizadas como cantidad de polarización para un elemento impedancia de acoplamiento mutuo de secuencia cero para
direccional de secuencia cero. topologías de líneas paralelas, inclusive con aquellas que
poseen fuentes de impedancia de secuencia cero aisladas.
Como se mencionó anteriormente el comportamiento de las
fallas depende de la configuración que tengan las líneas, por El elemento que actúan para fallas a tierra es el 51N que
ejemplo para líneas paralelas en un doble circuito, los corresponde al elemento residual de sobre-corriente y se
efectos de acoplamientos mutuos con una alta impedancia define con las siguientes características:
de secuencia cero y que además tengan fuentes de secuencia
aislada como es el caso de líneas con un solo bus en común, 51NC.- Tipo de curva del elemento residual de sobre-
afectan directamente a los elementos direccionales de corriente, en la figura 2 se muestra el tipo de curva utilizada
secuencia cero y por lo tanto el relevador puede dar una en los ajustes de las líneas ANG1 y ANG2.
mala operación, en las siguientes secciones se hará una 51NTD.- Tiempo de dial del elemento de sobrecorriente.
mención puntual sobre el efecto de los acoplamientos 51NP.- “Pickup” del elemento de sobre-corriente.
mutuos. Entre otros datos de ajuste del relevador se deben colocar
los valores de relación de transformación de corriente
Sin embargo, cuando se habla de líneas paralelas que poseen (CTR), relación de transformación de voltaje (PTR). Para
buses comunes en ambos extremos de la línea como es el ajustar los elementos que brindan la direccionalidad del
caso del articulo, se ha demostrado que los elementos relevador se deben ingresar los datos de: ángulo de torque
direccionales polarizados con secuencia cero no producen máximo de la línea (MTA) y la sensibilidad con un valor
una declaración incorrecta de la dirección de la falla para proporcional al “pickup” del elemento sobre-corriente 51P
éste tipo de configuraciones, esto suponiendo que el umbral siendo 4 A<51pp<12.6 A
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 97
=
V01 Z 01 I 01 + Z 0 m I 02 (1)
En el último caso (figura 7) cada línea de transmisión estará Otra situación que requiere se tome en cuenta son los
acoplada con las otras dos en parte de su trayecto y no en efectos de acoplamientos mutuos cuando una de las líneas
todo. Estos acoplamientos también se pueden presentar entre paralelas esta fuera de servicio y aterrizada en ambos
líneas de diferente nivel de tensión, como es el caso de extremos, en caso de existir una falla a tierra en la línea que
líneas en paralelo, en un camino común de líneas, o el poco está en servicio esta puede inducir una corriente en el
frecuente caso de circuitos con diferente nivel de tensión en circuito aterrizado del alimentador, causando una señal de
una misma torre. En los dos últimos casos hay una dificultad compensación mutua engañosa.
práctica para llevar las señales necesarias que permitan
incorporar las corrientes de secuencia cero mutuas a los La corriente producida por el acoplamiento mutuo varía
relés. inversamente con la distancia de separación de las líneas y
directamente con el voltaje que llevan las mismas. [5]
la línea fallada. Cuando existe una diferencia grande en las En las siguientes figuras se muestra las mismas condiciones
fuentes de ambos extremos, la magnitud de la corriente en que la simulación anterior solo que ahora se considera el
ambas líneas del lado de la fuente débil es similar. Los acoplamiento mutuo.
relevadores de sobrecorriente de tierra se ve afectado por los
acoplamientos con condiciones de secuencia cero y los
ajustes de “Pick up” deben calcularse bajo condiciones de
operación diferentes [6].
V SIMULACIÓN Y PRUEBAS
Z0M=0.11074+j0.27506
REFERENCIAS
[1] P. M. Anderson “Power System Protection” John Wiley, 1998.
3.1 EQUIVALENTES DE CORTO CIRCUITO 11la configuración del modelo creado en ATPDraw
Para los equivalentes de corto circuito se para la simulación.
emplearon los elementos LINESY_3 (para modelo
de las redes de secuencia) y ACSOURCE (para la Parámetro Línea Esmeralda – Yumbo 2
fuente de tensión trifásica), ver Figura 10. Longitud [km] 193.3
Año de entrada 1971
R0 [ohm/km] 0.4013
X0 [ohm/km] 1.3275
B0 [µS/km] 2.1592
R1 [ohm/km] 0.0547
X1 [ohm/km] 0.4618
B1 [µS/km] 3.4880
Fuente: XM – Parámetros Técnicos (PARATEC)
En la Figura 18, se presenta una comparación de En este artículo hemos planteado una
las corrientes de falla punto a punto entre la metodología para la caracterización de la falla
simulación y el registro real de falla. mediante el programa de simulación ATPDraw
con resultados satisfactorios.
Abstract—Overhead distribution systems may experience analyze the operation of a protection scheme for an actual
faults involving more than one feeder. During simultaneous fault involving two feeders of the Oaxaca Uno Substation
faults, the transformer low-voltage-side overcurrent relay located in Oaxaca de Juárez, Oaxaca, Mexico.
measures a current greater than the current measured by faulted
feeder relays. Therefore, the transformer relay may trip faster
than faulted feeder relays. Transformer relay misoperation II. SIMULTANEOUS FAULTS
affects service availability in circuits not involved with the fault. The need to improve service availability has increased the
In this paper, we describe the causes of simultaneous faults on complexity of distribution network topology. Disconnect
distribution feeders and discuss overcurrent protection
switches allow transferring loads to alternate sources under
coordination problems caused by these faults. We then propose
low-cost protection schemes using multifunction relays with emergency conditions. Limitations on the rights of way make
communications and logic programming abilities. We summarize it necessary to use multicircuit overhead lines or single-circuit
the operation experience of 19 simultaneous fault protection lines that run close to each other. As a result, simultaneous
schemes installed in several substations of two Comisión Federal faults involving more than one circuit are becoming quite
de Electricidad (CFE) distribution divisions in Mexico. Finally, common. Typical causes of simultaneous faults include:
we analyze the operation of a protection scheme for an actual
simultaneous fault.
• Multicircuit lines or lines sharing the same right of
way
I. INTRODUCTION • Switching operations
• Thunderstorms
In radial distribution substations, feeder relays typically
Fig. 1 shows a distribution system with four feeders and
include instantaneous and inverse-time overcurrent elements.
normally open (NO) disconnect switches between adjacent
The transformer low-voltage-side relay provides backup for
feeders.
feeder faults and typically includes inverse-time overcurrent
elements. Utilities normally use automatic reclosing of B1
Feeder 1
T
overhead feeder breakers. The transformer low-voltage-side
breaker lacks automatic reclosing. S1 (NC)
S12 (NO)
T
For feeder faults, the faulted feeder relay and transformer B2
Feeder 2
T
relay measure practically the same current. The feeder relays BT
are set to operate faster than the transformer low-voltage-side S2 (NC)
T
B3 S23 (NO)
relay to trip only the faulted feeder. However, for Feeder 3
T
simultaneous feeder faults, the current measured by the
S3 (NC)
transformer relay is greater than the current measured by each
T
B4 S34 (NO)
faulted feeder relay. The transformer relay may operate faster Feeder 4
T
than the faulted feeder relay and undesirably trip the
S4 (NC)
transformer low-voltage-side breaker. Transformer breaker
misoperation affects service to the loads of healthy feeders. Fig. 1. Operation of tie disconnect switches may cause simultaneous faults
Given the growing incidence of simultaneous faults, in distribution systems.
Comisión Federal de Electricidad (CFE), the Mexican national
Under normal conditions, the system shown in Fig. 1
electric utility, decided to apply simultaneous fault protection
operates radially. For a permanent fault on Feeder 2 between
schemes in distribution substations several years ago. For
Breaker B2 and the normally closed (NC) Disconnect
example, the CFE Southeastern Distribution Division has
Switch S2, Breaker B2 trips and recloses to lockout. Operation
18 schemes in operation, and the CFE Jalisco Distribution
personnel open Disconnect Switch S2 to isolate the fault and
Division recently commissioned one scheme.
then close either Disconnect Switch S12 or Disconnect Switch
In this paper, we discuss the overcurrent protection
S23 to restore service to the Feeder 2 load connected beyond
coordination problems caused by simultaneous faults. We
Disconnect Switch S2. When remote access to motor-operated
describe two types of simultaneous fault protection schemes
disconnect (MOD) switches is available, the system operator
for distribution substations and summarize the operation
can send control commands to MOD switches from the
experience of the schemes installed in several substations of
distribution system dispatch center, in which case, service
the CFE distribution divisions mentioned above. Finally, we
114
restoration may take minutes. When remote access is not plus load currents from unfaulted feeders. The relay of each
available, the system operator dispatches field personnel to faulted feeder measures only the feeder fault current. Hence,
manually perform the switching operations, in which case, the transformer relay inverse-time overcurrent element may
service restoration may take hours. trip faster than or simultaneously with the feeder relay
Because switching operations are infrequent events, it is inverse-time overcurrent element. Transformer relay
necessary to periodically close and open the NO disconnect misoperation for simultaneous feeder faults disconnects the
switches as a preventive maintenance operation. This faulted and healthy feeders. All of the loads fed by the
operation may cause a simultaneous fault in two ways: transformer lose service for permanent or temporary faults,
• The disconnect switch fails during the test. because the transformer low-voltage-side breaker lacks
• A feeder fault occurs while the disconnect switch is automatic reclosing. Operation personnel must travel to the
closed. substation to manually reclose the transformer breaker, in
which case, service restoration may take hours, even for a
III. RELAY COORDINATION PROBLEMS temporary fault.
For a feeder fault in a radial distribution system, the
transformer low-voltage-side overcurrent relay and the faulted
feeder overcurrent relay measure practically the same current
(see Fig. 2).
Fig. 2. For a feeder fault, the transformer relay and faulted feeder relay
measure practically the same current.
Fig. 5 illustrates a protection coordination problem for the feeder instantaneous overcurrent elements are set to 3,000 A.
simultaneous fault shown in Fig. 4. We assume that the feeder For a 6,750 A simultaneous fault causing currents of 3,375 A
inverse-time overcurrent elements have identical time-current in both faulted feeders, the feeder relays trip instantaneously,
curves, and we disregard load currents for simplicity. For a and the transformer inverse-time overcurrent element does not
6,750 A simultaneous fault causing equal currents in both operate.
feeders, IT = 6,750 A and I1 = I2 = 3,375 A. The operating time
of each feeder inverse-time overcurrent element is
0.42 seconds. The operating time of the transformer inverse-
time overcurrent element is 0.6 seconds. The operating time
margin is 0.6 – 0.42 = 0.18 seconds (smaller than the CTI).
The transformer relay may misoperate for this fault.
In distributed schemes, the simultaneous fault protection detectors) to identify the faulted feeders. Pickup current
logic resides in the faulted feeder relays. In centralized settings of the 51P and 51G fault detectors should be equal to
schemes, the logic may reside in the transformer relay or logic the settings of the phase and ground inverse-time overcurrent
processor. In any scheme, the devices must have elements of the corresponding feeders. For a simultaneous
communications and logic programming abilities. fault involving Feeder 1 and Feeder 2 (see Fig. 4), the 51P
Simultaneous fault protection schemes require and/or 51G fault detectors of the Feeder 1 relay and Feeder 2
communication between the devices. Fig. 7 shows two relay operate, and OR Gate 1 asserts. Each relay sends the OR
methods of communication between the devices used in the gate output bit to one of the adjacent relays, and this
scheme. The method shown in Fig. 7 (a) consists of wiring a information is sequentially communicated to all of the feeder
relay output contact to a logic input of a relay or logic relays. In the Feeder 1 and Feeder 2 relays, the OR Gate 2 and
processor. An advantage of this method is that relays from AND gate assert to declare a simultaneous fault (bit SV1
different manufacturers can be used in the scheme with no asserts). After a security delay (TPU), the timer asserts bit
additional equipment. The other method, shown in Fig. 7 (b), SV1T. A typical TPU setting is 3 to 6 cycles. The timer reset
uses direct digital communication between devices over time (TDO) must be greater than the total fault-clearing time.
copper wire or fiber-optic cable. An advantage of this method A typical TDO setting is 9 cycles. The bit SV1T assertion
is that the relays and logic processor may continuously initiates the feeder breaker tripping. The almost instantaneous
monitor the communications channel condition and issue an breaker operation at the faulted feeders guarantees
alarm in case of problems. This method can be applied with coordination with the transformer low-voltage-side relay.
relays from different manufacturers by adding remote I/O The faulted feeder relays also initiate reclosing of the
modules to the scheme. faulted feeder breakers. The reclosing times of breakers in
double-circuit lines should be different so that they reclose
sequentially. If the first feeder breaker recloses successfully,
the second feeder breaker is allowed to reclose. For permanent
OUT101 IN101 faults, the first feeder breaker recloses and trips again, and the
Transmit
Receive
Copper
first feeder relay issues a reclosing-blocking signal to the
Relay Output Relay Logic second feeder relay to prevent reclosing of the second feeder
Contact Input
breaker onto a fault.
Relay 1 Relay 2 The simultaneous fault protection scheme clears faults in
(a) 3 to 6 cycles plus the breaker operating time. The fault-
clearing time is comparable to instantaneous tripping, even for
faults that fall out of the reach of the feeder relay
instantaneous overcurrent elements. In addition, this logic
discriminates between single and simultaneous faults and
TMB1A RMB1A issues an alarm for simultaneous faults (not shown in Fig. 8).
Transmit
Receive
Copper
or The alarm helps operation personnel to quickly and safely
Relay Relay
Transmitted Bit Optical Received Bit restore service to the loads.
Fiber
The logic of the distributed scheme using hardwired
Relay 1 Relay 2
connections is similar to the logic shown in Fig. 8. This
(b)
scheme requires wiring the output contact of each feeder relay
Fig. 7. Two methods of communication between the devices include to the logic inputs of all other feeder relays. The resulting
(a) wiring a relay output contact to a logic input of another device and (b) scheme is more complex and less reliable than the scheme in
direct digital communication between the devices over copper wire or fiber-
optic cable. Fig. 8. In addition, the relays cannot supervise the condition of
the copper wires.
Fig. 8 depicts the logic diagram of a distributed scheme for The distributed simultaneous fault protection scheme is
four feeders using direct digital communication. Feeder relays easy to apply as an enhancement to existing installations.
communicate via copper wires or fiber-optic cable in a looped When existing relays have logic programming abilities,
scheme, and each feeder relay communicates with two implementing the scheme requires only wiring and relay
adjacent feeder relays. The scheme uses phase (51P) and programming.
ground (51G) instantaneous overcurrent elements (fault
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 117
A B C D
RMB1A
RMB2A
RMB3A
RMB4A
Phase
Fault 51P Reclose
79RI
Detector Initiate
1 TPU
SV1 SV1T
Ground TDO
Fault 51G 2 To Tripping
TR
Detector Logic
TMB1A
TMB2A
TMB3A
TMB4A
Feeder 1 Relay
RMB1A
RMB2A
RMB3A
RMB4A
Phase
Fault 51P Reclose
79RI
Detector Initiate
1 TPU
SV1 SV1T
Ground TDO
Fault 51G 2 To Tripping
TR
Detector Logic
TMB1A
TMB2A
TMB3A
TMB4A
Feeder 2 Relay
RMB1A
RMB2A
RMB3A
RMB4A
Phase
Fault 51P Reclose
79RI
Detector Initiate
1 TPU
SV1 SV1T
Ground TDO
Fault 51G 2 To Tripping
TR
Detector Logic
TMB1A
TMB2A
TMB3A
TMB4A
Feeder 3 Relay
RMB1A
RMB2A
RMB3A
RMB4A
Phase
Fault 51P Reclose
79RI
Detector Initiate
TPU
1 SV1 SV1T
Ground TDO
Fault 51G 2
TR
To Tripping
Detector Logic
TMB1A
TMB2A
TMB3A
TMB4A
Feeder 4 Relay
A B C D
Fig. 8. Logic diagram of a distributed simultaneous fault protection scheme using direct digital relay-to-relay communication.
118
Phase
Timer 1
Fault 51P 79RI Reclose
Detector Initiate
TPU
TMB1A R1P1 SV1 SV1T T1P1 RMB1A
1
Ground TDO
Fault 51G 1 To Tripping
TR
Detector Logic
Phase
Fault 51P Timer 2 Reclose
79RI
Detector Initiate
TPU
TMB1A R1P2 SV2 SV2T T1P2 RMB1A
2
Ground TDO
Fault 51G 2 To Tripping
TR
Detector Logic
Phase
Timer 3
Fault 51P 79RI Reclose
Detector Initiate
TPU
TMB1A R1P3 SV3 SV3T T1P3 RMB1A
3
Ground TDO
Fault 51G 3 To Tripping
TR
Detector Logic
Phase
Timer 4 Reclose
Fault 51P 79RI
Detector Initiate
TPU
TMB1A R1P4 SV4 SV4T T1P4 RMB1A
4
Ground TDO
Fault 51G 4 To Tripping
TR
Detector Logic
Fig. 9. Logic diagram of a centralized simultaneous fault protection scheme using direct digital communication between the devices.
Fig. 9 depicts the logic diagram of a centralized scheme for The centralized simultaneous fault protection scheme
four feeders using direct digital communication between the concentrates all fault information in one device. This device
devices. Feeder relays communicate radially with the may provide sequential event reporting, which facilitates fault
transformer relay or logic processor via copper wires or fiber- analysis. When the scheme uses a logic processor, the
optic cables. For a simultaneous fault involving Feeder 1 and processor can provide additional functions, such as fast bus
Feeder 2 (see Fig. 4), the fault detectors 51P and/or 51G and tripping, breaker failure protection, and automatic restoration
the OR gate of these relays assert. Each relay transmits bit of unfaulted transformers [1].
TMB1A to the transformer relay or logic processor, where
received bits R1P1 and R1P2 assert. As a result, OR Gate 1, V. FIELD OPERATION EXPERIENCE
OR Gate 2, AND Gate 1, and AND Gate 2 assert in the Table I summarizes the simultaneous fault protection
transformer relay or logic processor. After a security delay, schemes operating in the CFE Southeastern Distribution
Timer 1 asserts bit SV1T, and Timer 2 asserts bit SV2T. The Division and the CFE Jalisco Distribution Division. The first
transformer relay or logic processor then transmits bit T1P1 to scheme was commissioned in 2003.
the Feeder 1 relay and bit T1P2 to the Feeder 2 relay to initiate
TABLE I
tripping and sequential reclosing of the faulted feeder SIMULTANEOUS FAULT PROTECTION SCHEMES
breakers. OPERATING IN TWO CFE DISTRIBUTION DIVISIONS
The logic of a centralized scheme using hardwired
Southeastern Jalisco
connections is similar to the scheme shown in Fig. 9. Scheme Type Distribution Distribution Total
However, the scheme is more complex and less reliable, Division Division
because two copper wires run between each feeder relay and
Distributed 17 0 17
the transformer relay or logic processor. In addition, the relays
cannot supervise the condition of the copper wires. Centralized 1 1 2
Total 18 1 19
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 119
These schemes have operated correctly for all distribution feeders OAX-4010 and OAX-4020. The fault
46 simultaneous faults that have occurred on feeders of both current contributions were 2,001 A on the OAX-4010 feeder
distribution divisions. The causes of the faults are as follows: and 823 A on the OAX-4020 feeder. The prefault demands
• Faults in double-circuit lines: 20 were 5.9 MVA on the OAX-4010 feeder, 6.8 MVA on the
• Thunderstorms: 19 OAX-4020 feeder, and 28.9 MVA on the transformer.
• Faults during circuit-looped operation: 7 From the sequential event report of the OAX-4010 feeder
No scheme misoperations have occurred for faults relay (see Fig. 11), we conclude the following:
involving only one feeder, cold load pickup conditions, or • The phase fault detector 51P operated at
other abnormal conditions. 20:29:16.918 hours.
• The feeder relay transmitted fault detection
VI. EXAMPLE OF SCHEME OPERATION FOR AN ACTUAL FAULT information (bit TMB1A asserted) to the logic
processor at 20:29:16.918 hours.
A. Scheme Operation Analysis
• The feeder relay received a tripping command (bit
The Oaxaca Uno Substation (see Fig. 10), located in the RMB1A asserted) from the logic processor at
city of Oaxaca de Juárez, state of Oaxaca, Mexico, has a 20:29:17.051 hours.
12/16/20 MVA, 115/13.8 kV transformer and an
• The feeder relay sent a trip signal to the breaker (bit
18/24/30 MVA, 115/13.8 kV transformer. Each transformer
TRIP asserted) at 20:29:17.055 hours.
feeds four radial feeders. This substation has a centralized
• The breaker opened (bit 52A deasserted) at
simultaneous fault protection scheme using a protection
20:29:17.130 hours. Breaker operating time is
processor and direct digital communication between the
75 milliseconds (4.5 cycles).
devices.
The sequential event report of the OAX-4020 feeder relay
During a severe thunderstorm on May 18, 2009, a
is almost identical to the report shown in Fig. 11.
temporary phase-to-phase simultaneous fault occurred on
120
Abstract
As the smart grid drives into the main stream of the utility enterprise, it becomes incumbent on the industry to iden-
tify an architecture based on what is the smart grid, what are the communication pieces involved, and how do they
fit together. The “pieces” are the existing communication standards. The choice of a standard, however, is not a
random process. There is an engineering process for the selection of relevant standards and subsequent migration to
an Architecture. Such a process was funded by the Electric Power Research Institute and the output of this process
is the IntelliGrid architecture [1]. This paper examines the architecture process of identifying the system require-
ments and the subsequent process of linking the requirements with candidate standards. Finally, the standards al-
ready chosen by the NIST as Smart Grid standards are presented.
As an example in this paper, the Demand Response use case is reviewed. The IntelliGrid Architecture considered
the Demand Response system as part of the Customer Services functional area. While it is clear that Demand Re-
sponse functionality operates within this domain, it is important to note that Demand Response is not an isolated
island of functionality. The entire premise of the IntelliGrid Architecture is that each of these envisioned applica-
tions must interact with other domains and functional areas within the Energy industry. Interoperability between and
among other Demand Response systems and other Energy industry applications can be seen as one of the key driv-
ers behind the IntelliGrid Architecture.
Given that a communication channel will exist into the home, commercial, or industrial electrical grid, the Intelli-
Grid Architecture identified a number of applications that directly touch the Demand Response system. The com-
124
plete list can be found on the IntelliGrid Architecture website, but Customer Domain specific functions are listed
here as follows[2]:
In addition, the customer communications infrastructure will enable other IntelliGrid “cross domain” activities such
as:
and a good architecture must be flexible enough to accommodate such incongruous anomalies. To realize this, the
IntelliGrid Architecture invented what were called “Environments”.
An IntelliGrid Architecture Environment is defined as an information environment, where the information exchang-
es of power system functions have essentially similar architectural requirements, including their configuration re-
quirements, quality of service requirements, security requirements, and data management requirements. These Envi-
ronments reflect the requirements of the information exchanges, not necessarily the location of the applications or
databases (although these may affect the information exchanges and therefore the environment). Since functions can
have multiple types of information exchanges, these functions often operate across multiple Environments.
The IntelliGrid Architecture defined twenty-one Environments that completely describe the communication re-
quirements for the information exchanges as shown in the following figure[3]:
Demand Response and all of the ancillary services it provides, enables, or directly touches, operates in several of
these environments. A brief synopsis of the relevant environments and typical applications follows[3]:
126
Environment 15: DER Monitoring and Control encompasses the communication re-
quirements between distributed energy resources and the organizations that must moni-
tor and operate them. Typical applications include an ESP aggregating data from or
operating multiple small generators including renewable power, small hydro, co-
generation or any other mini-grid. This may also include demand response and adjust-
ment of power quality. This environment is characterized by the fact that it is vital that
these message exchanges are not tampered with, monitored, or interfered with by unau-
thorized persons.
Environment 16: Intra-Customer Site defines requirements for communications that are local
to customer sites (residential, commercial, or industrial). Typical applications include a cus-
tomer printing processes online or offline in response to RTP, a customer locally managing a
distributed energy resources in response to external factors (environment, price, regulations,
etc.). Additionally this also includes building and home automation systems. This environ-
ment is characterized by critical data with local scope and limited impact on the overall power
grid. Data is real-time potentially peer-to-peer with application specific security.
Environment 18: Customer to ESP. This environment encompasses the communication, dis-
tributed processing, security, and data management requirements for applications that exist
between ESPs, typically the distribution level energy utility, and the end-use point-of-sale
energy customers like residential homeowners and apartment dwellers. Typical applications
include automatic (or manual) meter reading, monitoring and control of DER, demand re-
ESP sponse and RTP. It is characterized by extremely large volumes of data with frequent config-
uration and topology changes to the communications network. Commands are often broadcast
due to the large number of end users but address space must be massively scalable.
Configuration Requirements
• Support interactions between a few "clients" and many "servers"
• Support peer to peer interactions
• Support interactions across widely distributed sites
• Support the frequent change of configuration and/or location of end devices or sites
• Support multi-cast or broadcast capabilities
• Support interactions within a contained environment (e.g. substation or control center)
Security Requirements
• Provide Identity Establishment Service (you are who you say you are)
• Provide Authorization Service for Access Control (resolving a policy-based access control decision to en-
sure authorized entities have appropriate access rights and authorized access is not denied)
• Provide Information Integrity Service (data has not been subject to unauthorized changes or these unauthor-
ized changes are detected)
• Provide Confidentiality Service (only authorized access to information, protection against eavesdropping)
• Provide Inter-Domain Security Service (support security requirements across organizational boundaries)
• Provide Non-repudiation Service (cannot deny that interaction took place)
• Provide Security Assurance Service (determine the level of security provided by another environment)
• Provide Audit Service (responsible for producing records, which track security relevant events)
• Provide Security Policy Service (concerned with the management of security policies)
• Provide Path and Routing Quality of Security (being able to determine a secure communication path)
• Provide Firewall Transversal
• Provide Privacy Service (the ability to ensure person information is not disclosed)
• Provide User Profile and User Management (combination of several other security services)
• Provide Security Protocol mapping (the ability to convert from one protocol to another)
• Provide Security Discovery (the ability to determine what security services are available for use)
One of the most important system integration principles in IntelliGrid is the concept of Technology Independent
Architecture (TIA). TIA is technology neutral or technology agnostic. It can insure successful integration of the var-
ious utility enterprise applications without requiring changes to the application’s internal operation. It can also
achieve high level of interoperability and interworkability with the built-in intelligence of auto-configuration and
self-discovery. Figure 2 illustrates the TIA framework.
Utility
Local Legacy Field
Applications Devices
Common Services/Interfaces *
Discoverable
Information
Models
These common information-modeling elements are the key to achieving higher-level interoperability of power sys-
tem distributed information systems.
Common Services
Common Services are commonly defined functionality derived by identifying the crosscutting distributed infor-
mation requirements. Common Services allow components to be treated as black boxes. This facilitates greater flex-
ibility, as components are less dependent on how each works internally.
However, the use of Common Services does not by itself substantially reduce the complexity of dealing with differ-
ent platforms such as Java, .Net or Web Services. Also, Common Services do not necessarily deal with the disconti-
nuity of the meaning of data. Lastly, Common Services do not deal with the discontinuity caused by different data
access mechanisms such as “read/write data” or “subscribe to data”.
To overcome semantic heterogeneity a common information model is used as the common language that all services
use to communicate. To overcome platform heterogeneity, the generic interface is required. The generic interface
can be implemented on any platform. While the different implementations of the generic interface are not interoper-
able, “off the shelf”, the mapping from one platform specific implementation to another is simple and well known.
The EPRI/IEC Common Information Model (CIM) describes data typically used in the power system. The CIM con-
tains object types such as substations, breakers, and work orders as well as other data typically found in an EMS,
SCADA, DMS, or work, and asset management system. More recently, the CIM is being extended to include trans-
mission reservation and energy scheduling information. In general, the benefit of creating an information model
include:
Generic Interfaces
The mechanism used to exchange data is determined by an application’s interface. However, the native interface
provided by an application is typically limited. For example, typically existing interfaces:
• Do not expose data within the context of a common inter-application data model.
• Do not provide a means to discover what business object instances are serviced by a particular component
instance other than a rudimentary listing of legacy IDs (tags) that cannot be viewed within the context of an
inter-application data model such as a power system network model.
Without a means to discover what data an application processes, plug and play is nearly impossible to achieve. To
address these impediments to plug and play and the need for a common exchange mechanism, “Generic Interface” is
introduced to specify how data are exchanged. The phrase “Generic Interface” is an umbrella term for four interfac-
es types:
• Applications use the generic interfaces to connect to each other directly or to an integration framework
such as a message bus or data warehouse. A technology neutral interface allows applications to be designed
independently of the capabilities of the underlying infrastructure.
Generic interfaces provide the following key functionality required for creation of a plug and play infrastructure:
• Interfaces are generic and are independent of any application category and integration technology. This fa-
cilitates reusability of applications supporting these interfaces.
• Interfaces support schema announcement/discovery – The schemas are discoverable so that component
configuration can be done programmatically at run time. Programmatically exposing the schema of applica-
tion data eliminates a great deal of manual configuration.
• Interfaces support business object namespace presentation – Each component describes the business object
instances that it supports within the context of a common namespace shared among all applications such as
a power system network model like the EPRI Common Information Model (CIM). It is not enough to mere-
ly expose the application data schema, one must also expose what specific breakers, transformers, etc., that
an application operates on. This also eliminates manual configuration as well as provides a means for a
power system engineer to understand how enterprise data is organized and accessed.
• Harmonize the existing common services, information models, and interfaces, as well as create new stand-
ards where they are needed, so the power industry speaks a common communications language of ‘nouns’
and ‘verbs’ that can be translated into different technologies. This is a key requirement for the higher levels
of system integration now emerging across the energy industry
• Integrate security, systems, network management, and technical development (i.e. new technologies),
which have too often been considered separate tasks.
• Unify technologies between power system automation networks, corporate networks, and inter-business
networks, again by linking them to common information models, services, and interfaces.
• Remember that developing an industry-level architecture is a process – not an end point. Requirements and
enabling technologies are constantly changing. Although the guiding principles should remain constant, in-
dividual solutions will change over time.
Based on the identified design principles, IntelliGrid makes a link from design guidelines to recommended technol-
ogies that best embody the stated principles and meet the identified requirements. IntelliGrid makes a point of rec-
ognizing that many needed technologies may not exist and encourages the identification and subsequent standardiza-
tion of such technologies. The list below is a first level summary of the “primary” recommended technologies for
the identified environments. The list is organized by functional layer. For the complete list of applicable technolo-
gies, please refer to the IntelliGrid.info website[3]:
Data Exchange:
• IEC61850 – Communication Networks and Systems in Substations
o Data Models
o Abstract Services
o Substation Configuration Language
• ANSI C12.19 Metering Tables
• AEIC Guidelines for Implementation of ANSI C12.19
• IEC61970 Part 3 Common Information Model (CIM)
• IEC61970 Part 4 Generic Interface Definition
• IEC61968 SIDM System Interfaces for Distribution Management
• IEC60870-6 Inter Control Center Protocol
• IEC62325 on Framework for Energy Market Communications
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 131
• NERC e-tagging
• NAESB OASIS for Market Transactions
• IEC62056 – Data Exchange for Meter Reading, Tariff, and Load Control
• Universal Description, Discovery, and Integration (UDDI)
• Simple Object Access Protocol (SOAP)
• EbXML
• XML Metadata Interchange (XMI)
• Meta Object Facility (MOF)
• Globally Unique Identifiers (GUID)
• S/NTP (Simple/Network Time Protocol)
• ANSI/ISO/IEC 9075 – Structured Query Language (SQL)
Security
• ISO/IEC 10164-8:1993 Security Audit Trail Function - Information technology - Open Systems Intercon-
nection - Systems Management - Security,
• ISO/IEC 18014-1:2002 Time-Stamping Services - Information technology - Security Techniques - Part 1:
Framework - Security, Data Management
• ISO/IEC 10181-7:1996 Security Audit and Alarms Framework - Information technology - Open Systems
Interconnection -- Security Frameworks for Open Systems - Security,
• FIPS PUB 112 Password Usage - Security,
• FIPS PUB 113 Computer Data Authentication - Security,
• RFC 1510 The Kerberos Network Authentication Service (v5)
• RFC 2196 Site Security Handbook - Security,
• RFC 2401 Security Architecture for the Internet Protocol - Security,
• RFC 2527 Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Frame-
work - Security,
Transport:
• TCP / Internet Protocol IPV4 / IPV6
Network Management:
• Simple Network Management Protocol (SNMP)
Physical/Data Link:
• IEEE 802.x (LAN, WAN, WiFi, WiMax, Ethernet)
• SONET
• ATM
This list will continue to grow as new standards are identified and as new standards are developed to meet the identi-
fied gaps in the existing standards.
Conclusion
The IntelliGrid Architecture provides a foundation for the operation of the Smart Grid and offers an optimized ap-
proach to build future visions. There are many long-term benefits to the energy industry that will be realized
through implementation of the IntelliGrid principles and recommended technologies. Clearly the IntelliGrid Archi-
tecture has profound ramifications for a broad range of advanced power systems applications. Careful planning of an
open and standards-based system designs will support integration of advanced systems thus realizing the IntelliGrid
vision for the Smart Grid of the future.
References
[1] Peter Sanza, Joe Hughes, et. al.; “IntelliGrid Architecture Volume I ‘User Guidelines and Recommendations’
Final Report”, 2004, Electricity Innovation Institute (E2I) Consortium for Electric Infrastructure to Support a
Digital Society (CEIDS); www.IntelliGrid.info.
[2] Peter Sanza, Joe Hughes, et. al.; “IntelliGrid Architecture Volume II Appendix F ‘Task 1 Enterprise Activities’
Final Report”, 2004, Electricity Innovation Institute (E2I) Consortium for Electric Infrastructure to Support a
Digital Society (CEIDS); www.IntelliGrid.info.
[3] Peter Sanza, Joe Hughes, et. al.; “IntelliGrid Architecture Volume IV Appendix E ‘Environments’ Final Re-
port”, 2004, Electricity Innovation Institute (E2I) Consortium for Electric Infrastructure to Support a Digital
Society (CEIDS); www.IntelliGrid.info.
[4] Peter Sanza, Joe Hughes, et. al.; “IntelliGrid Architecture Volume IV ‘Technical Analysis’ Final Report”, 2004,
Electricity Innovation Institute (E2I) Consortium for Electric Infrastructure to Support a Digital Society
(CEIDS); www.IntelliGrid.info.
[5] NIST Recognized Standards for inclusion in the Smart Grid Interoperability Standards Framework – Release
1.0; www.nist.gov/smartgrid/standards.html
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 133
for example [1]. The following applications have been part which collects the phasor data from the PMUs or from a
discussed previously: sub-PDC. The PMUs are widely spread in the power system to
- Verification of dynamic model: Comparison of simulated get a complete picture of the system state. The PDC controls
dynamic network data with measurements from PMUs (for an Archive for storage of data. It contains a system monitor for
example described in [5]) control of the communication connections, internal data flow
- Detection of subsynchronous oscillations and analysis of and valid PMU data. The HMI is working with online data
their damping directly from the PMUs or for analysis of disturbances or other
- Combining slow EMS data with synchro phasor events from the past also with offline data from archive.
measurements on control center level to identify significant
dynamic performance issues
- Improvement of state estimation with PMU data
- Increasing of Overhead Line Capacity
- Calculation of Voltage Stability Index
Application of PMU is mainly discussed in transmission
systems up to know, but the interest of the operators of
distribution systems is rapidly growing.
PMUs have to be provided with a highly accurate time
synchronization on GPS basis. Only with a precise time base,
the synchrophasor data from a large area is comparable and Figure 3: Structure of a Phasor Data Processing System
valid for information about the system state. The precision of a
PMU is expressed with the Total Vector Error TVE which is a The Phasor Data Processing System may have interfaces to the
measurement for the combined error of measurement and time following components:
precision of the device. To be compliant with the IEE C37.118 SCADA System. A SCADA System may improve its state
standard, a PMU may have a maximum TVE of 1%. estimation with the additional use of phasor measurements.
With the use of the highly precise PMU measurements which State estimation may become faster and more precise and
are transmitted at a rate of 10 to 50 Hz (for a 50 Hz system), convergence of calculations is improved.
not only slow load changes can be monitored but also fast and Wide Area Control System. This summarizes different types of
transient power swings. The area supervised by PMU systems with automated response to disturbances which are
measurements can be one single transmission line, but also a detected by using wide area measurements, for example
large geographic area like the UCTE network. synchrophasor measurements. For example capacitor banks are
controlled on base of results from PMU measurements.
IV. PHASOR DATA PROCESSING SYSTEM Wide Area Protection System. Under this headline the
This chapter is dealing with a synchrophasor based monitoring following applications are described:
software which gives support to the system operator for getting Voltage Stability protection
an overview on network stability situation. Power swing detection and starting of countermeasures
The phasor data processing software provides additional Supervision of coupling between large area networks
awareness for the wide area dynamic conditions in the These applications are in pilot phase and currently research
network. The gap between fast but local acting protection work is going on.
devices and slow acting control center applications as shown Additionally, there may be an exchange of PMU data with
in Fig. 2 is closed by the phasor data processing systems. other PDP systems to share synchrophasor data with
neighboured transmission system operators. This would be
done also via IEEE C37.118 protocol.
In the following, the HMI part of the Phasor Data Processing
System is described. The HMI has to support the control
center operator to gain awareness about critical situations and
to find the reason for problems. So it has to be intuitive and
simple. It has to fulfill the following requirements:
General indication about power system stability (ok / critical).
Online Configuration of the measurement view with respect to
selection of measurements, phasor or timebased view and
setting of the limits to be supervised
Figure 2 Wide Area Monitoring System in comparison to protection and Easy change between online and offline mode to be able for
SCADA quick analysis of archive data
Geographical representation of the network for quick detection
Figure 3 shows the structure of a Phasor Data Processing of problem zones
System. The Phasor Data Concentrator (PDC) is the central Data Export for customer specific analysis and reports
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 135
The following screenshots show how these requirements have easily reconfigured online if other measurements shall be
been fulfilled by the Phasor Data Processing System supervised. The archive is configured to one week so that
“SIGUARD” (all using simulated process data). Figure 4 critical occurences can be analyzed in offline mode. The
shows the general layout of the Main Screen of the System. It practical experiences will grow over the time, especially
is divided into four parts: waiting for ocurrances in the network to be analyzed. In ETG
Power System Status. Here a summary value for the status of conference “intelligent networks” in October 2009,
the supervised power system is shown. The nearer the curve is Düsseldorf, Germany, a first summary of experiences will be
coming to the limit, the more critical is the system stability presented.
status.
Geographical View. This view contains the overview over the
VI. INTEGRATION TRENDS IN BAY LEVEL
whole monitored network with all substations and lines. The
operator can see at once in which region the critical incidents Intelligent electronic devices (IED) for protection, control and
occur since the colour of substations and lines is changing measurement are characterized by a modularity and flexibility
depending on voltage (for substation colour) and current (for in hard- and firmware. The microprocessor allows multitasking
line colour). operation in real time for the different functions. The hardware
Data Area. This area in the center of the HMI is reserved for is freely scalable and can be adapted regarding the application
requirements. All this leads to a reduction of devices in the
Measurement charts (time based view or phasor view). The
field and reduces costs of the device hardware, in the cubicle
measurements are selected via drag and drop from the
manufacturing and finally in the wiring. The functionality is
configuration area. So this area is not a static predefined
activated via parameterization. This means the configuration
selection, it can be adapted at any time to the needs of the of the device (masking of the hardware regarding the
situation. application, selection of the needed functions) and the setting
Configuration Area. It contains the list of all measurements of the different functions. All these tasks are supported by
sent by the PMUs to the system. There are two types of powerful engineering tools.
measurements: Analogs (for example frequency, active and Figure 5 shows an example for a feeder. The IED has multiple
reactive power) and Phasors (Voltage, Current). If necessary current inputs for connecting to protection and measurement
also nose curves can be defined and offered for selection here. current transformers. The voltage should be connected on a
measuring voltage transformer with the required accuracy. Via
the engineering tool the device is completely parameterized.
This means the routing of the analog inputs and the masking of
functions to these inputs. Figure 5 illustrates two containers,
which include the necessary functions. All protection
functions, which are required by the application, are in the
container “Protection”. The container “Measurements” covers
the measurement functions and additionally the function
“Phasor Measurement – PMU”. The IED is synchronized via
GPS or an equivalent synchronization method, e.g. according
IEEE 1588. The available serial interfaces allow a flexible
communication. A separate port can be used for
communication with a phasor data concentrator via IEEE
C37.118.
V. APPLICATION EXAMPLE
The first application of the SIGUARD system is running since
three months at a german TSO with 7 PMUs on 400 kV level,
distributed in the whole geographic area of the TSO. The
system is configured for supervision of voltage angles between
Figure 5: Integration of PMU functionality into a multifunctional IED
north and south area and for frequency supervision. It can be
136
[3] A.G. Phadke, J.S. Thorp: Synchronized Phasor Measurements and their
Applications, Springer Verlag 2008
A further progress is the local operation of PMU data. In
[4] C. Rehtanz, K. v. Sengbusch, T. Sezi, R. Simon.: Schutz- und
modern schemes, the IEDs are linked together and can Überwachungskonzepte auf Basis zeitsynchroner Messungen,
exchange information in the substation or between substations. ETG/BDEW-Tutorial „Schutz- und Leittechnik“, Fulda, 11.-12. Nov.
The IEC61850 supports this via GOOSE mechanism. On the 2008 (in German)
other hand modern line differential relays have a powerful [5] CIGRE Session 2008 Paper C2-101: B. Ayuev, P. Erokhine, Y.
Kulikov: PMU Application for IPS/UPS Dynamic Performance
communication between the devices. The extended bandwidth Monitoring and Study
allows the transmission of additional information. In a cost [6] CIRED 2009 Prague 8-11 June 2009, Round Table 3b “PMU and Wide
effective way, phasors can be transmitted from the remote line Area Measurements in Distribution Systems”, Prof. Styczynski, Prof.
end via the protection data interface. Figure 6 illustrates the Sauvain, Dr. Buchholz, Dr. Wache
new possibilities.
As a decentralized solution (locally in a device), in a first step
the realization of monitoring functions can be implemented,
e.g. load angle supervision. An alarm can be given if the
stability limit will be reached. Another application is the
detection of a power swing and the realization of interrupting
the power system on predefined points or intelligent control
solutions. Especially the control solutions require interaction
between different parties. For example the access to the
control equipment of a power plant must be possible. Research
work is necessary particularly in the field of the intelligent
control with PMU data to find the right balance between what
is theoretically possible and practically feasible.
VII. CONCLUSION
The phasor measurements are currently on their way from
theory to practical applications. Monitoring Software helps the
transmission system operators and the manufacturers to
understand dynamic behaviour of the transmission networks
and to create further applications with the goal to build wide
area control and wide area protection systems. The technical
evolution in device and communication technology gives a
good base for powerful support by the bay devices for the new
applications.
BIBLIOGRAPHY
[1] CIGRE Session 2008, Special Report for Group C2 “System Operation
and Control”, by Special Reporters Paulo Gomes, Gerhard Krost, Rui
Pestana
[2] CIGRE Session 2008 Paper C2-112: T. Sezi, J. Warichet, B. Genet, J.-
C. Maun: Bringing New Vizualization Tools for the Detection and
Mitigation of Dynamic Phenomena in the Transmission System
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 137
La llegada de las Smartgrids a las redes de distribución de energía Este cambio de paradigma conlleva cambios que no son
eléctrica está dotando a las infraestructuras de un nivel de sencillos, y se basa en la utilización masiva de las tecnologías
tecnología y modernización desconocido hasta el momento. Todo de información y comunicación ya en uso desde hace tiempo
ello viene fruto de la necesidad de modernizar y dotar de en otros ámbitos. Y la parte de distribución de media y baja
inteligencia a la infraestructura para lograr las mejoras de tensión es la que más inversión precisa para cumplir los
eficiencia y reducción de emisiones de CO2, integración de objetivos.
renovables, mejora de la calidad del suministro y gestión de
perfiles de carga. La introducción de la Smartgrid en la red de distribución
de media y baja tensión y centros de transformación, con el
Todas estas innovaciones se están poniendo en práctica en las objetivo de automatizar y supervisar la red, requiere la adición
nuevas secciones de redes de distribución eléctrica en construcción de funciones adicionales a la infraestructura existente. Tal es
actualmente, donde toda la instalación es nueva. Sin embargo, la el caso de los concentradores de datos de medida, funciones
mayoría de la red de distribución ya está ya desplegada, y si es de automatización, supervisión de MT/BT, comunicaciones,
preciso lograr los objetivos mencionados anteriormente, va a ser sensores, sistemas de alimentación de respaldo… Todas estas
preciso modernizarla completamente. Esto plantea un reto funciones son innovadoras, y están en muchos casos en su
superlativo, debido a que estas infraestructuras son muy diversas y etapa de introducción al mercado, o incluso en fase de
de diferentes épocas, no fueron concebidas para ser modernizadas
desarrollo.
en un futuro, han recibido históricamente poca inversión, en
muchos casos cuentan con un mantenimiento mínimo, y están en Este artículo analiza el problema de la integración de las
operación. funciones de Smartgrid en los centros de transformación de la
red de distribución de MT/BT existentes, que son la gran
Este trabajo resume los aspectos más importantes a tener en mayoría de las redes y que están actualmente en explotación, y
cuenta al acometer un proyecto de modernización de red de que por tanto son los que presentan el principal problema de
distribución existente con las funciones avanzadas más habituales integración por su casuística y diversidad.
en un sistema de Smartgrid, como son telegestión de contadores,
supervisión de red, automatización de media tensión y Los problemas que aparecen son completamente distintos
comunicaciones. a los que pueden ocurrir en un despliegue de un segmento de
red completamente nuevo, que serían básicamente
I. INTRODUCCIÓN tecnológicos. En este caso, estamos combinando el problema
de la novedad tecnológica con el problema logístico de una
Estamos en el inicio de una nueva etapa en el sector de la red que está en operación, es diversa, no está actualizada, no
distribución de energía eléctrica. En paralelo se están cuenta con supervisión (más que por parte de los propios
acometiendo despliegues de nuevas tecnologías y funciones en clientes), es una especie de “museo viviente” de la historia de
lo que se ha venido a llamar la “Smartgrid”. Además el sector la empresa eléctrica, y además tiene un nivel de
se encuentra en un escenario convulso y de innovación mantenimiento mínimo para seguir operando. Por todo ello, el
acelerada, fruto de los objetivos de reducción de emisiones de tratamiento que requiere el problema es específico.
CO2, la integración de las fuentes de generación distribuida,
los requisitos crecientes de calidad de suministro, los II. OBJETIVOS DE LA SMARTGRID
despliegues de contadores de energía inteligentes que
permiten gestionar la demanda, la llegada del vehículo El objetivo de la implantación de la Smartgrid en la red de
eléctrico… todos estos factores no hacen sino acelerar la distribución de MT y BT consiste en proporcionar a la
adopción de la Smartgrid. empresa eléctrica nuevos servicios y funciones de valor
añadido que le permitan mejorar la operatividad de su red y
138
básicamente gestionar su negocio de forma más eficiente [1]. por tanto una gestión real de la curva agregada de demanda,
A continuación se destacan algunos de ellos: aplanando los picos de consumo que tan costosos son para el
sistema, y por tanto aumentando la eficiencia del sistema y
• Implementar un sistema de telegestión de contadores reduciendo las emisiones de CO2 (por permitir un mejor
de clientes que permita una comunicación aprovechamiento de las energías renovables) [2].
bidireccional y en tiempo real con el cliente, y por
tanto establecer modelos de gestión de demanda. La clave de los contadores inteligentes se basa en que
incorporan tecnologías de comunicaciones para un
• Localizar de forma precisa las faltas producidas en la intercambio de datos bidireccional con el sistema central de
red de MT y analizar la respuesta y diagnóstico que se medida, permitiendo por tanto recoger remotamente las
le pueda dar. lecturas de consumo, pero también por ejemplo efectuar una
• Reducir los tiempos de respuesta a incidencias y por orden de desconexión remota del cliente. La tecnología de
tanto mejorar los ratios de prestación de servicio a los comunicación empleada para conectar con los contadores
clientes. inteligentes puede ser diversa dependiendo de la topología de
la red de distribución y la densidad de clientes por
• Mejorar la gestión de las instalaciones de distribución, transformador. Las tecnologías utilizadas de forma más usual
homogeneizando soluciones y actualizando son las siguientes:
inventarios.
• Tecnologías PLC. Se utilizan principalmente en
• Prolongar la vida de las instalaciones actuales en entornos urbanos, con contadores ubicados tanto en el
servicio por medio de sistemas de supervisión y interior como en el exterior de las viviendas de los
monitorización avanzados. clientes, y en los que la concentración de clientes por
centro de transformación es elevada. Esto es bastante
Estos resultados por si solos justifican sin duda el reto
común en muchos países europeos. Se distinguen las
planteado. Sin embargo, la magnitud de la tarea que es
tecnologías de primera generación, de baja capacidad
necesario acometer es titánica. Se trata de redes que pueden
(SFSK y similares), y las de segunda generación
consistir de millones de clientes, con decenas de miles de
(PRIME, G3, Meters&More), que permiten tasas de
centros de transformación en operación, y con un nivel de
transmisión mucho más elevadas al utilizar
diversidad muy elevado.
modulaciones más complejas. Además, algunas como
A continuación se detallan los aspectos funcionales PRIME [3] incorporan mecanismos de autodetección
contemplados en el despliegue de Smartgrid, centrándolo en de la mejor topología de la red para que la misma se
las tres áreas de aplicación: baja tensión, media tensión y establezca de forma plug&play.
comunicaciones.
• Radio mesh. Se utiliza en entornos residenciales de
III. FUNCIONALIDAD EN BAJA TENSIÓN densidad media o baja, cuando los contadores se
encuentran generalmente fuera de las viviendas de los
En baja tensión se concentran los puntos de suministro de clientes. Este es el caso en algunos países de América.
los clientes finales de la compañía eléctrica, y es este hecho el
que está sirviendo de detonante para lanzar los proyectos de • Tecnología celular (GPRS), de aplicación en entornos
Smartgrid y las inversiones que llevan asociadas. En efecto, en rurales de baja densidad de clientes, donde las otras
numerosos países se están poniendo en práctica medidas para tecnologías no logran una cobertura suficiente.
fomentar el despliegue de contadores inteligentes, que
permiten discriminar los patrones de consumo en distintos Clientes – Smart meter
horarios y tarifas, transmitiendo señales de precio a los
clientes, y por tanto dando un primer paso necesario para
implementar sistemas activos de gestión de la demanda. PLC – BT
Sin embargo, en una Smartgrid en una red de distribución
existente se pueden implementar múltiples funciones
adicionales a los contadores inteligentes, que van a ser tratadas Centro Transformación – Concentrador
a continuación.
A. Smart Meters
GPRS
PLC - MT
Los contadores que permiten las funcionalidades Fibra óptica
avanzadas de gestión de tarifas, cargas y clientes (también
conocidos como contadores inteligentes o smartmeters) son
actualmente el núcleo de todos los proyectos de Smartgrid. Es
a través del contador que el cliente adquiere consciencia del
precio de la energía, y es a través de la variación dinámica del Oficinas Centrales - Sistema
precio que el cliente será consciente de la variación temporal
de los costes de la energía, lo que permitirá establecer por
Figure 1. Comunicaciones como clave de los Smartmeters
tanto mecanismos de reacción de los usuarios a los precios, y
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 139
Actualmente, tal como se puede ver en la figura 1, el centro de transformación posee la información de la
consenso de la mayoría de los proyectos de despliegue es que energía suministrada por ese centro en un intervalo de
será necesaria una solución mixta (PLC, radio, fibra, GPRS) tiempo determinado. Como a su vez va a recoger la
para llegar a un 100% de cobertura, dada la diversidad información de consumo de cada uno de los
existente en las redes de distribución (y por tanto en las áreas contadores de cliente que se conectan a dicho centro,
geográficas de prestación de servicio de la empresa eléctrica). esto permite detectar las pérdidas o posible fraude de
forma muy sencilla. En efecto, realizando el
Por tanto, en función de la arquitectura de comunicaciones sumatorio de las energías consumidas por todos los
utilizada, será necesario un equipo especial en el centro de clientes, esto debe ser igual (con una mínima
transformación, denominado concentrador de datos, que incertidumbre dada por la precisión de los equipos de
recoge (vía PLC o radio) los datos de consumos y curvas de medida y las pérdidas de la red de distribución) a la
carga de cada uno de los contadores, y por otro lado recibe las energía suministrada por el centro. En el caso de que
órdenes desde el sistema central y las reenvía hacia cada la diferencia supere un valor umbral, se pueden
contador. Este elemento físico no se utiliza si los contadores establecer alarmas.
tienen acceso IP desde el sistema de medida (por ejemplo con
comunicaciones GPRS), aunque si puede existir un elemento • Identificación de línea y fase a la que pertenece cada
lógico que realice la misma función de agregación en el contador. Uno de los problemas más comunes que se
sistema (concentrador virtual). La información entre el encuentran las compañías eléctricas en las redes de
concentrador y el sistema central se puede intercambiar en distribución es que no tienen ningún registro de en
múltiples formatos, siendo uno comúnmente utilizado el qué línea de salida o incluso fase está conectado cada
formato XML, utilizando protocolos basados en IP para la uno de los clientes, e incluso qué edificios se
transmisión (FTP,. HTTP, web services). alimentan a través de un centro de transformación
determinado. Una forma de solventarlo es provocar un
B. Otras funcionalidades avanzadas en baja tensión corte de tensión a cada una de las líneas y fases, de
Además de los contadores inteligentes, existen múltiples forma que se sepa qué abonados quedan sin
funcionalidades adicionales que se pueden añadir en baja suministro. Sin embargo, en los nuevos sistemas de
tensión, incluso en redes existentes con las dificultades que smartmetering, al disponer de equipamiento
eso conlleva. A continuación se detallan las más inteligente en ambos extremos del enlace (centro y
representativas: abonado) se pueden establecer mecanismos que
permiten identificar la fase, e incluso la línea, a la que
• Monitorización de la red de BT. Al disponer de pertenece cada abonado. Esto es debido a que las
elementos de monitorización en la salida de baja señales de comunicación por Powerline
tensión del transformador, se puede monitorizar la Communications (PLC) que intercambian pueden
tensión y corriente en la línea de baja, y por tanto referenciarse temporalmente a los pasos por cero de
vigilar la calidad de onda, sobretensiones y huecos, cada una de las fases, o de la fase a la que está
armónicos y todos los parámetros significativos de la conectado el contador mediante un mecanismo
onda. Además esta monitorización abre la puerta a la denominado “zero crossing detection” [4]
integración de generación distribuida (renovable), ya
que se establece el punto de control necesario en la IV. FUNCIONALIDAD EN MEDIA TENSIÓN
salida del transformador (y por tanto entrada en la red
de distribución). Una vez de lanzado el despliegue, fruto de la necesidad de
instalar contadores inteligentes, y dado que será preciso
• Detección de desequilibrios entre fases. Al instalar equipamiento en el centro de transformación, con las
monitorizar de manera independiente las tres fases del dificultades que ello conlleva, la pregunta natural que surge
suministro, resulta muy sencillo detectar el equilibrio es: ¿qué más funcionalidades se pueden aportar para la
o desequilibrio de la carga de las fases y así poder empresa eléctrica, una vez de instalar equipamiento en el
tomar medidas correctoras que lleven a la centro? La respuesta evidente consiste en dotar al centro de
compensación y equilibrado del transformador, para equipamiento que permita supervisar las magnitudes de media
reducir su stress y pérdidas. tensión, y ejecutar acciones, integrado como un equipo de
remota o telecontrol más del SCADA de la compañía.
• Detección de averías. El elemento gestor de baja
tensión (concentrador de medidas), ubicado en el Para poder supervisar las magnitudes de media tensión es
centro de transformación, posee un enlace de datos preciso poder captar las tensiones y corrientes presentes en las
activo con cada uno de los contadores de cliente que líneas de MT, respetando los aislamientos de seguridad. Por
cuelgan de dicho CT. Por tanto, un suceso como una ello se precisan sensores específicos, que pueden ser distintos
pérdida de conexión con un contador o grupo de para cada tipo de celda, en función del tamaño y modo de
contadores permitirá lanzar una alarma de posible conexión que permita [5]. Este es uno de los mayores retos a
avería, antes incluso de que los clientes afectados lo la hora de implementar esta función en centros existentes. Las
notifiquen. tensiones se pueden recoger con divisores, bien resistivos o
capacitivos, que adapten la señal de MT. Las corrientes se
• Detección de pérdidas y fraude por balance de capturan con transformadores toroidales o bobinas de
energías. El equipo concentrador residente en el Rogowski, en función de la precisión requerida o el nivel de
140
dificultad que sea asumible en el montaje. Con divisores y (interruptores). Un ejemplo de mecanismo sencillo de
toroides es posible llegar a niveles de precisión del 1% ó automatización consiste en un aislamiento automático
mejor en tensión, y similar en corriente. de una falta detectada, una vez detectado el paso de la
falta y su direccionalidad. Otro mecanismo de
Las remotas o equipos que supervisan y actúan sobre los automatización más complejo puede ser una
elementos de media tensión pueden ser capaces de comandar reposición automática del servicio tras el aislamiento
los interruptores que conectan el centro, y por tanto de quitar y de la falta.
reponer el servicio. Además, ante el evento de una falta, tienen
que ser capaces de funcionar con normalidad, por lo que en • Funciones de protección. Teniendo la información en
estos casos la alimentación tiene que estar respaldada por un tiempo real de la forma de onda de tensiones en las
sistema de batería que garantice un periodo de funcionamiento tres fases, y corrientes en las fases y neutro, se pueden
durante un tiempo suficiente (varias horas) en ausencia de aplicar los algoritmos y funciones de protección que
alimentación primaria. son de aplicación en las líneas de salida de la
subestación, por parte del relé que controla la
Las funcionalidades que se pueden implementar en media
cabecera.
tensión para una red de distribución en funcionamiento son las
siguientes:
V. COMUNICACIONES
• Supervisión de corrientes y tensiones de MT.
Evidentemente se pueden comprobar los niveles de A. Comunicaciones desde el CT hacia el despacho
distorsión, armónicos, huecos, sobretensiones, etc. que Uno de los elementos catalizadores de la revolución en las
se producen en la línea de media tensión. La redes de distribución de energía eléctrica son las
aplicación más inmediata es el control del flujo de comunicaciones. Para llevar la Smartgrid a todos los rincones
potencia en la línea, de cara a controlar su capacidad, de la red de distribución, es preciso ser capaz de dotar de
la del transformador del centro, y a optimizar el comunicaciones a los centros de transformación existentes. En
funcionamiento del sistema. su gran mayoría, dichos centros no están comunicados
actualmente, ya que las empresas eléctricas han restringido el
• Detección de paso de falta. Al controlar en tiempo real acceso de comunicaciones a ciertos centros de reparto más
el estado de las tensiones y corrientes, es posible importantes en la red de media tensión. Por el contrario, todas
realizar una detección de un paso de falta de forma las subestaciones de media y alta tensión están comunicadas y
direccional (si ha pasado una falta por la línea, y con telecontroladas.
qué sentido). Así se puede saber en qué lugar está la
falta relativo a la posición del centro de
transformación en la línea de MT. Si en el SCADA
central se recoge la información agregada para todos
los centros, se puede determinar de forma muy
sencilla la ubicación física de la falta, entre dos
centros.
económicas. Por tanto esto supone una ruptura con la forma presta un operador de telecomunicaciones). En el caso
tradicional de comunicar con los nodos clave de la red y de las redes de distribución ya existentes, puede
subestaciones, que en muchos casos se realiza con medios ocurrir que los centros de transformación sean
propios para asegurar la disponibilidad. En el caso de la subterráneos. En ese caso la cobertura celular puede
Smartgrid, es necesario recurrir a medios externos para ser limitada, aun en entornos urbanos, y complicada
proporcionar el enlace de red de área extensa (WAN). Esto de mejorar.
amplía las posibilidades de utilización disponibles.
• ADSL. Sobre todo en los entornos urbanos, debido a
La siguiente tabla resume los requisitos de comunicación la penetración masiva de la banda ancha xDSL en los
requeridos para aplicaciones de Smartgrid, para diversas hogares, es posible que sea viable la instalación de
aplicaciones: puntos de conexión ADSL en los centros de
Capacidad Latencia Disponibilidad
transformación, contratados a una compañía de
Tipo telecomunicaciones. La disponibilidad y capacidad es
Requerida Requerida Requerida
óptima (velocidad de varios Mbps y latencias de
Vertical
Telemedida de (uplink más Medio
pocos ms), a costa de unos costes de operación
<5s Media-alta elevados. Además la disponibilidad de equipamiento
contadores ancho (100Kbps)
banda) xDSL adecuado a las condiciones de utilización en
Bajo centros de transformación es limitada. Esto hace que
Supervisión y Vertical, su utilización sea limitada, salvo que la criticidad de
(<50Kbps <1 s Alta
control de MT simétrico
) algún servicio lo justifique.
Automatización
Horizontal y
Alto • Powerline Communications (PLC) sobre líneas de
vertical, <50ms Muy alta
de Distribución
simétrica.
(>1Mbps) media tensión. Esta es una posibilidad muy interesante
para las compañías eléctricas ya que posibilita la
Vertical comunicación a través de medios propios (las líneas
Medio
Gestión de (uplink más
infraestructura ancho
(>200Kbp <1s Media de MT), de forma que los costes de operación son
s) mínimos. Esta tecnología se basa en la utilización de
banda)
modulaciones apropiadas a las características del
Tabla 1. Requisitos técnicos de comunicaciones para diversos medio, como por ejemplo OFDM o Spread Spectrum
servicios en Smartgrid [6] [8], obteniendo velocidades dependientes del medio,
Como se puede observar en la tabla 1, a partir de los pero que pueden superar 1Mbps, con latencias en el
servicios que se implementen en la Smartgrid, las necesidades orden de 50ms. Los centros de transformación que se
de comunicaciones serán distintas, y por tanto se requerirán agrupan a lo largo de la misma línea de media tensión
arquitecturas de comunicaciones de distinto tipo, y con unos se convierten en celdas de una misma red de
costes de inversión y mantenimiento muy diferentes. Por otro comunicaciones, que comparte un medio común. En
lado, como en todo proyecto real, un requisito básico es que un punto de la celda se añade una salida WAN hacia
los costes de inversión de despliegue y mantenimiento sean lo el exterior (GPRS, fibra, ADSL…) para completar la
más reducidos posible. Ello hace que se tengan que conectividad. Las señales de comunicación se acoplan
seleccionar entre las diversas tecnologías disponibles, y que no a las líneas de MT a través de unos dispositivos de
haya una única válida para todas las ocasiones, sino que se acoplamiento que permiten salvaguardar el
emplean distintas soluciones tecnológicas para cada tipo de aislamiento galvánico. La utilización de PLC sobre
centro de subestación, en función de su relevancia en la red, MT en centros de transformación existentes es
ubicación, antigüedad y servicios soportados en el mismo. compleja, ya que requiere de soluciones de
acoplamiento específicas en función de que las celdas
Las tecnologías que se emplean más usualmente son las del centro sean de mampostería, de aire o de gas SF6
siguientes: [9].
• Tecnología celular (GPRS). La penetración masiva de • Satélite. Cuando no existe otro modo de
los teléfonos móviles en la sociedad, con los servicios comunicación, siempre se puede recurrir a servicios
avanzados de datos que llevan aparejados, ha de comunicación de datos por satélite (como VSAT),
significado que los operadores han desplegado una red que permiten establecer enlaces con cobertura global
de comunicaciones prácticamente ubicua en todas las y una tasa de transmisión dependiente del contrato
zonas habitadas [7]. Al querer aumentar sus líneas de solicitado, pero que puede alcanzar los centenares de
negocio, proporcionan una oportunidad para Kbps Sus desventajas son que requieren la instalación
aprovechar dicha capacidad para otras aplicaciones a de una infraestructura considerable (antenas), y los
las empresas, que puede ser aprovechada por la costes de operación son elevados. Como las redes de
eléctrica. En concreto, la presencia casi universal de la distribución eléctrica van, usualmente, ligadas a
tecnología GPRS, que permite velocidades de hasta centros de población humana, no suele ser preciso
80Kbps en el enlace descendente y 20Kbps en el recurrir a comunicaciones por satélite para
ascendente, proporciona un canal de comunicaciones comunicaciones en Smartgrid.
adecuado (tal vez algo escaso para algunas
aplicaciones) y razonablemente barato (el servicio lo
142
• Radio. Algunas empresas eléctricas poseen redes de años no ha recibido el mismo nivel de inversiones que las
radio en bandas de frecuencia asignadas (canales VHF redes de transporte y distribución en alta tensión, al ser su
o similar), para aplicaciones de telecontrol y criticidad para el sistema menor. Adicionalmente, las
monitorización. Dichas bandas se pueden utilizar instalaciones no están telegestionadas ni supervisadas, ni se
también para las comunicaciones derivadas de la visitan cada poco tiempo como es el caso de las subestaciones.
Smartgrid, porque además las condiciones de
Por otro lado, en casi todos los países las compañías
propagación y cobertura en esas partes del espectro es
eléctricas han ido creciendo por fusiones o adquisiciones, de
muy buena. Sin embargo, requieren la construcción y
forma que la red de distribución resultante es bastante
mantenimiento de la infraestructura por la propia
heterogénea en cuanto a topologías y equipamientos. No solo
empresa eléctrica, y la capacidad obtenida es baja
por provenir de organizaciones distintas, sino por provenir de
(pocos Kbps).
la misma organización pero en distinta época. Ello hace que la
B. Comunicaciones dentro del CT variabilidad que se encuentra y para la que hay que estar
preparado sea enorme. Un primer paso inicial del proyecto
Otra parte clave del sistema de comunicaciones consiste en consiste en la selección previa de qué instalaciones o centros
la interconexión de todos los elementos inteligentes que son son susceptibles de ser actualizados con la nueva
instalados en el centro de transformación. Los distintos funcionalidad, y cuales son simplemente demasiado antiguos y
servicios requeridos (telegestión de contadores, supervisión y precisan ser sustituidos completamente o dejados a un lado.
automatización de MT, servicios auxiliares…) deben ser
concentrados en un equipo de comunicaciones que permita La conclusión a todo esto es que en muchos casos, cuando
enrutar el tráfico hacia el despacho de control. se plantea el despliegue de la Smartgrid, la información que se
verifica al realizar un replanteo en cada uno de los centros
En la práctica, todos los elementos presentes en el centro difiere de la que figuraba en los archivos de la compañía
se conectan utilizando una red Ethernet en el propio centro. eléctrica. Por ello aparecen errores, desajustes,
Las razones para hacerlo son múltiples: modificaciones, sorpresas… que pueden complicar
• Es una tecnología madura, probada y barata, pero aun sobremanera el despliegue, pero con las que hay que convivir.
con una larga vida por delante. Es muy común que celdas de gas se conviertan en aire y
viceversa, lo que puede requerir el empleo de sensores y
• Sus prestaciones (100mbps) cubren de sobra todas las acoplamientos distintos a los inicialmente acopiados. Siempre
aplicaciones que puedan venir en un futuro a un merece la pena un replanteo previo, su coste queda
centro de transformación. amortizado.
• Se comporta perfectamente en entornos adversos Otro punto importante es el descargo en el que se realiza la
como puede ser un centro de transformación. actualización del centro de transformación con los nuevos
equipamientos. Habitualmente se pone todo el foco en el coste
• Existe una multitud de equipamiento disponible de del equipamiento, pero el coste del descargo supone una parte
muchos proveedores distintos. importante del total, por lo que es preciso tener en cuenta su
• Permite segmentar los distintos servicios de forma duración. Por tanto la solución de Smartgrid a utilizar
muy sencilla utilizando VLANs. (equipamientos, armarios) tiene que ser lo más integrada
posible [10], de forma que se facilite el tiempo y la mecánica
Para salir del centro hacia el despacho, se puede construir de la instalación. Asimismo, todo en el despliegue tiene que
una red a nivel 3 (con lo que haría falta un router, por ejemplo estar organizado de forma que se produzca una instalación y
con tecnología GPRS), o se puede construir una red a nivel 2 validación rápida del centro.
(con lo que haría falta un bridge, por ejemplo con tecnología
PLC de MT). Esto depende de la arquitectura elegida a nivel Adicionalmente, las dificultades que se encuentran en la
de celdas de CT, ya que, en último caso, todas las instalación son notables, ya que las infraestructuras de los
comunicaciones hacia el despacho se realizarán a nivel IP y centros no se diseñaron para que nuevos equipamientos
por tanto habrá un router de comunicación, bien sea a nivel de pudieran ser añadidos a posteriori. Por tanto los espacios
centro o de cabecera. disponibles son en muchas ocasiones mínimos, y es preciso
desarrollar equipos y sensores que se adapten específicamente
VI. INSTALACIÓN E INTERACCIÓN CON EL CENTRO DE a la diversidad de celdas y centros existentes en la red de
TRANSFORMACIÓN distribución, que pueden ser bastantes.
A la hora de acometer el despliegue de un sistema de Por último, no debe olvidarse que la red de distribución es
Smartgrid en una red de distribución existente y en operación, muy distinta de una subestación, en la que todos los elementos
en muchas ocasiones se pone todo el foco del proyecto en los están probados y en perfecto orden de revista. En un centro de
aspectos tecnológicos del mismo, y sin embargo toda la parte transformación, es probable que por ejemplo un interruptor de
de despliegue es un problema logístico que no hay que un transformador no haya sido maniobrado en más de diez
olvidar, y bastante complejo como se va a analizar a años, y no existe ningún mecanismo que permita verificar su
continuación. estado. Por tanto, pueden ocurrir situaciones como que el
interruptor falle a la hora de reponer el servicio tras el
La red de distribución se puede considerar como la descargo. Este tipo de situaciones deben estar previstas. No
“hermana pobre” del sistema eléctrico, ya que durante muchos
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 143
hay que perder de vista que las instalaciones pueden tener • Es necesario planificar visitas a las instalaciones,
bastantes años a sus espaldas. revisiones de los planes, actualizaciones, replanteos,
etc… ya que a largo plazo son rentables.
VII. CONCLUSIONES • Los gestores del proyecto y la dirección de la
A modo de resumen, para afrontar con garantías la empresa debe prepararse para la variabilidad e
implementación de funcionalidades avanzadas de Smartgrid incidencias que pueden ocurrir en una red de
en una red de distribución es útil tener en cuenta las distribución con decenas de años de servicio.
siguientes conclusiones: • Diferentes escenarios (por ejemplo zonas urbanas,
rurales, etc) requerirán de diferentes soluciones. En
• La solución de arquitectura de la Smartgrid debe ser las redes existentes no hay una solución homogénea
sencilla, al menos al comienzo. que sirva para todo un despliegue.
• Hay que poner unos requisitos comunes al proyecto
que permitan actualizar de una misma forma el 90 ó
95% de las instalaciones, para evitar caer en REFERENCIAS
personalizaciones excesivas para cada tipo de [1] R. Quintanilla, T. Yarza, “Making the Smartgrid Real: a case study”,
CIGRE SEAPAC Conference, 2011.
infraestructura de centro de transformación.
[2] ESMIG, “A guide to Smart Metering”, Brussels, 2009.
• Los requisitos funcionales y operacionales deben
[3] A. Arzuaga, I. Berganza, A. Sendin, M. Sharma, V. Varadarajan,
identificarse claramente antes del comienzo de los “PRIME interoperability tests and results from field”, IEEE Smartgrid
trabajos. Es imprescindible trazar una raya de Conference 2010.
separación entre los requisitos necesarios y los [4] http://www.prime-alliance.org/
deseables. [5] J.A. Moreno, A. Arzuaga, C. Coca, “Advanced Sensors for the
• El foco del coste debe contemplar el sistema Smartgrid”, CIRED Conference 2011, unpublished.
completo, teniendo en cuenta los costes de [6] A. Arzuaga, T. Arzuaga, J. Salat, “Enabling Smartgrid
Communications over MV Lines”, CIGRE SEAPAC Conference, 2011
instalación, validación y puesta en servicio,
[7] A. Arzuaga, T. Arzuaga, M. Zamalloa, “Implementation of Telecontrol
adicionalmente a los costes de los equipamientos, ya Applications over GPRS Networks”, PAC World Magazine, winter
que pueden ser una parte importante del total. 2010
• Los servicios que se quieren implementar son los que [8] A. Arzuaga, T. Arzuaga, J. Salat, “Enabling Smartgrid
determinan de forma última los requisitos de Communications over MV Lines”, CIGRE SEAPAC Conference, 2011
capacidades de comunicaciones requeridos, y por [9] A. Arzuaga, T. Arzuaga, J. Salat, “Enabling Smartgrid
tanto la arquitectura que se necesita. Communications over MV Lines”, CIGRE SEAPAC Conference, 2011
• Existe un compromiso necesario entre prestaciones [10] A. Arzuaga, J. Arriola, Z. Ojinaga, T. Arzuaga, M. Zamalloa,
“Integrated solution for the Smartgrid”, PAC World Conference 2011,
del sistema y coste de la solución, que debe de unpublished..
afrontarse al inicio del sistema de forma que se
establezcan objetivos realistas (de presupuestos y
plazos) al proyecto.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 145
I. INTRODUCCION
PUO-72010 PUO-72018
DIAGRAMA UNIFILAR SIMPLIFICADO
Dentro de la División Golfo Centro se tienen 30 MVA
115/13.8 KV
S.E. PUERTO
interconectados 23 permisionarios, con las
diferentes modalidades. PUO-42015 PUO-42018
las cuales son adecuadas solo para líneas con en la línea, ya que al estar sincronizados los
operación radial, es decir donde el flujo de generadores del permisionario con el Sistema
corriente en condiciones de carga normal y en se debe asegurar el disparo del punto de
condiciones de falla siempre es en el mismo interconexión, con tiempos de operación
sentido. Figura 3 adecuados.
Figura 3
SE Puerto
PUO-4115
El equipo instalado en las instalaciones del
permisionario esta enfocado en controlar y
proteger sus equipos y sus generadores, 67/67N
59/27/25
además no se tienen equipos que no están
aprobados por el LAPEM en sus funciones de
T1 6 MVA
protección. 13.8/ 4.16kv
D-Y
G
Los equipos no están enfocados a la Permisionario México Carbón
protección del sistema al que se
interconectarán (SEN). Figura 4 Figura 5
SE Puerto
PUO-4115
La segunda adecuación es en el Punto de
Punto de Interconexión
El permisionario no cuenta con
interconexión POSCO MEXICO, con la
50/51 79 equipo de protección para el instalación de un Interruptor de Potencia con
sistema donde se interconecta
Línea Subterránea
Corriente Interruptiva 31 KA y Esquema de
Protección equipado con las siguientes
T1 6 MVA funciones de protección hacia la carga:
13.8/ 4.16kv
D-Y
Protección de Sobrecorriente con unidad
direccional de secuencia positiva, negativa y
G Permisionario México Carbón
cero, (67F/67N), Equipado con funciones de
bajo voltaje, alto voltaje, Potencia inversa,
Funciones de sincronismo Alta Y Baja
Frecuencia, Oscilación de Potencia, recierre
automático, localización de fallas, Oscilografía,
Figura 4 Registro secuencial. Esquema de Protección
Equipado con las siguientes funciones hacia la
La operación del circuito cambia por lo que línea: Protección de Sobrecorriente con unidad
será necesaria la adecuación de los esquemas direccional de secuencia positiva, negativa y
de protección del punto de interconexión, para cero, (67F/67N), Equipado con funciones de
salvaguardar la integridad del personal que bajo voltaje, alto voltaje, Potencia inversa,
labore en la operación y mantenimiento de la localización de fallas, Oscilografía, Registro
línea de distribución, la integridad del sistema secuencial. Figura 6.
eléctrico y de los demás usuarios conectados
148
PUO-4115
SE Puerto
67/67N
59/27/25 67/67N PUO-4115
67/67N 59/27/25
59/27/25 SE Puerto 2.- Opera el punto de interconexión
Figura 8
Las figuras 9 y 10, muestran los valores de
Adecuación a los equipos de medición. voltaje alcanzados mientras se mantuvo la
aportación a la falla de los generadores del
Las adecuaciones a los equipos de medición permisionario.
consisten en la instalación de un medidor
principal y un medidor de respaldo en el punto
de interconexión, el medidor debe tener la
capacidad de medir energía activa y reactiva
en los cuatro cuadrantes, para determinar el
consumo y la aportación del permisionario a la
red de CFE.
PUO-42015 PUO-42018
Figura 11
Figura 9
PUO-72018
Fibra Óptica
PUO-73148 (Canal principal)
Lógica
PUO-73158
de
PUO-73428 Procesador Procesador relé de
Lógico Radio Espectro Disperso Lógico
S.E. PUO S.E. MXC protección
PUO- 42018 (Canal respaldo) Cogenerador
PUO- 4118
S.E. MXC
PUO- 42015 Cogenerador
PUO- 4115
Monitores de estado de
interruptores a través de
protocolo.
PUO-73140
PUO-73150 Enlace de comunicación Disparo de interruptor de llegada a S.E. MXC
PUO-73420 por puertos seriales
PUO-72010
Sobre voltajes detectados por los relevadores del punto de interconexión, PUO-4115
el voltaje nominal de fase a tierra es de 7.9 KV, los voltajes detectados
de fase a tierra hasta 14.9 KV.
Figura 12
Figura 10
PUO-73420 PUO-73140 PUO-73150
sistema de CFE.
MXC
PUO-4115 PUO-4118
MXC-4115
En 1997 se incorpora al Departamento
Punto Interconexión CFE - MXC
G
Divisional de Subestaciones y Líneas, como
profesionista en Entrenamiento de la Oficina
Figura 14 de Protecciones.
Con este arreglo complementario el En 1997 se le asigna la Jefatura de la Oficina
permisionario controla su generación al de Protecciones de la Zona Victoria.
momento de perderse la interconexión, A partir de Septiembre del año 2005, se
evitando problemáticas en sus generadores desempeña como Jefe de Oficina de
como rechazos de carga y fluctuaciones en el Protecciones, en el Departamento Divisional
voltaje y la frecuencia. de Subesbestaciones Y Líneas de la División
Golfo Centro.
III. CONCLUSIONES
Teléfono: (01-833) 226-2932 E-Mail
Es muy importante establecer y mantener los : marco .ortiz01@cfe.gob.mx
esquemas de protección y control de manera
conjunta con los permisionarios, para
salvaguardar la integridad del personal, las
instalaciones y la estabilidad del sistema ING. PEDRO MARTINEZ
eléctrico. LOPEZ
A partir del 14 de Julio 2010 se cuenta con el
Procedimiento de Atención a las Solicitudes de
Interconexión de Permisionarios a la Red del
Servicio Público de Energía Eléctrica en el Egresado del Instituto Tecnológico de Cd.
cual se establecen los requerimientos mínimos Madero en la carrera de Ingeniería Eléctrica en
para la correcta operación de los Potencia.
permisionarios y generación distribuida. Ingreso a C.F.E. en 1992 al Depto. Divisional
de Proyectos y Construcción con el puesto de
IV. REFERENCIAS Supervisor de Construcción “C”.
En 1993 se incorpora al Depto. Divisional de
[1] “Protective Realying. Principles and Subestaciones y Líneas, específicamente a la
Aplications. Third Editiion. J. Lewis Ofna. de Protecciones, fungiendo como
Blackburn. Ingeniero Sustituto.
En 1997 se le asigna la Jefatura de la Ofna. de
[2] ”Moderm Solutions for Protección. Protecciones de la Zona Tampico, puesto que
Control, and Monitoring of Electric Power desempeña actualmente.
Systems.Hector J. Altuve Ferrer, Edmund
O. Schweitzer, III. Teléfono: (01-833) 226-09-24
E-Mail : pedro.martinez02@cfe.gob.mx
[3] “PAC Word Magazine, Summer 2008.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 151
Abstract—In this paper, we apply fault tree analysis to In this paper, we compare the dependability and security of
compare the dependability and security of transformer and transformer and generator protection schemes with different
generator protection schemes with different degrees of degrees of redundancy. We also compare the scheme costs.
redundancy. We also compare the scheme costs. For each
scheme, we use a single protection scheme as the reference. We
We start from a single protection scheme and add equipment
then evaluate schemes with dual redundancy and two-out-of- to create dual- and triple-redundant (with two-out-of-three
three voting schemes. We also evaluate the effect of voting logic) schemes. We also evaluate how comprehensive
comprehensive commissioning testing, hidden failures, and commissioning testing, hidden failures, common-mode
common-mode failures, as well as using relays from the same or failures, and the use of relays from the same or different
different manufacturers in redundant schemes. manufacturers influence scheme reliability.
I. INTRODUCTION
II. RELIABILITY CONCEPTS
In a redundant protection scheme, all of the components
Reliability is the ability of an item to perform a required
except the breaker are redundant. Breaker failure protection
function under stated conditions for a stated period of time.
provides a functional duplication of the breaker. Redundant
Reliability and related variables are time-dependent
scheme design must consider both aspects of reliability:
probability quantities. In many applications, reliability
dependability and security. Dual-redundant schemes enhance
analysis using time-independent quantities provides results
dependability because two independent schemes operating in
that are approximate but still of practical value. Table I
parallel are less likely to fail to clear a fault. However, dual-
defines the measures often used to describe product reliability
redundant schemes can also reduce security because there are
performance, assuming constant failure and repair rates [1].
two schemes that could operate for an out-of-zone fault. A
fully redundant two-out-of-three voting scheme enhances TABLE I
COMMONLY USED RELIABILITY MEASURES
security without impairing dependability. However, such a
scheme would be very expensive, considering the cost of dc Measure Definition
power systems, channels, and instrument transformers. Termination of the ability of an item to perform
Failure
Sharing these scheme components affects the voting scheme its required or specified function.
dependability and security. In addition, voting schemes are Total number of failures divided by total unit
more complex than dual-redundant schemes and require Failure rate (λ) operating time or uptime. Data are collected
redundant relays to have similar sensitivities to ensure the from field observations or tests.
operation of at least two of the three relays. Total number of repairs divided by total unit
Repair rate (μ)
In the past, protection schemes were composed of several operating time or uptime.
discrete relays, with each relay performing a single function. Average time between start of operation or
Mean time to failure
These traditional multirelay schemes provided no redundancy. (MTTF)
return after repair and failure. For a constant
Today, microprocessor-based relays provide many protection failure rate, MTTF = λ–1.
functions. One relay can replace a whole scheme of discrete Average time to correct a failure and restore a
relays at a much lower cost. Adding a multifunction relay Mean time to repair unit to operating condition. Includes
(MTTR) preparation, active maintenance, and logistics
provides redundancy, without significantly increasing cost. time. For a constant repair rate, MTTR = μ–1.
Fault tree analysis is a practical tool for system reliability
evaluation. Engineers can use fault tree analysis to compare Mean time between Average time between failures for units
failures (MTBF) repaired and returned to use.
the relative reliability of proposed protection schemes.
Analyzing protection scheme dependability and security MTBF is the sum of MTTF and MTTR. Because MTTR is
requires different fault trees. When constructing each tree, the usually small compared to MTTF, we assume that MTBF is
protection engineer identifies which component failure causes approximately equal to MTTF and that MTBF = λ–1.
a failure to trip or an undesired trip. This analysis leads to Protective relays and protection systems are designed to be
different tree topologies and different unavailabilities or repairable. Therefore, measures of reliability should include
failure rates. the possibility of failure and repair. Availability is a measure
that considers repeated cycles of failure and repair.
160
Availability is the probability or fraction of time that a Redundant system architecture actually reduces the
device or system is able to operate. Equation (1) defines complexity of many tasks, such as coordination and designing
availability A for constant failure and repair rates. to eliminate single points of failure. It also enables the design
μ MTTF MTBF of continuous self-testing features that reduce the chance of
A= = ≈ (1) hidden failures and eliminate most periodic maintenance and
λ + μ MTTF + MTTR MTBF + MTTR
inspection [2].
Relay users are often concerned with the amount of annual Redundant protection systems may include dual or triple
downtime that may occur in a protection system. sets of relays. Dual-redundant schemes typically use OR
Unavailability is the probability or fraction of time a device or tripping logic to ensure fault clearing. This bias toward
system is unable to perform its intended function. Equation (2) dependability comes from the assumption that delayed fault
defines unavailability U for constant failure and repair rates. clearing may be more dangerous to the power system than
λ MTTR tripping healthy power system elements. However, modern
U = 1− A = = ≈ λ MTTR (2) power systems operate close to their security limits. For
λ + μ MTBF
example, an undesired trip of a heavily loaded transmission
From (2), observe that we can lower unavailability by line, or a large generating unit or transformer, may cause
decreasing the MTTR (monitor the self-testing of transient stability problems or trigger a cascading breaker-
microprocessor-based relays, and keep spares in stock). We tripping event. Several large power system blackouts have
can also lower unavailability by increasing the MTBF (use been triggered or compounded by undesired line and/or
equipment with low failure rates and robust designs). generator tripping. In protection systems with three sets of
As probabilities, availability and unavailability are relays, two-out-of-three voting logic is an alternative to
dimensionless numbers from 0 to 1. However, we can convert improve security. Some wide-area protection schemes, where
them to minutes or seconds per year by multiplying by the an undesired trip may have devastating consequences for the
appropriate factors. power system, use two-out-of-three voting schemes.
III. PROTECTION SCHEME REDUNDANCY Redundant protection systems may use identical or
different relays. Some engineers consider that using relays
Protection systems consist of devices that detect faults on with different operation principles and hardware platforms
the power system (protective relays) and apparatus that reduces the risk of incorrect operations caused by common-
interrupt fault current (circuit breakers) [1] [2]. In some cases
mode and hidden failures [3]. As a consequence, some of them
(fuses and automatic circuit reclosers), both functions are recommend using relays from different manufacturers.
combined.
However, modern multifunction relays allow the application
The protection system design philosophy for responding to
of different protection principles even with identical relays. In
the failure to detect faults and the failure to interrupt faults is
addition, the same manufacturer usually provides similar
generally in one of two categories [1]:
protection functions in different relays (different hardware
• Redundant systems. platforms). Some utilities use two different relays from the
• Overlapping relays tripping different interruption same manufacturer in redundant systems. Furthermore, relay
devices (remote backup protection). manufacturers use many common types of components from
Redundant protection systems use redundant components the same suppliers. Finally, the probability for the same
to eliminate single points of failure for detecting faults. component to fail at the same time in two identical (or
Redundant systems are typical in transmission lines of different) relays is very low.
networked systems, because relays are less able to detect Many industries requiring high reliability use dual-
faults in adjacent zones and because the result of delayed redundant systems with identical components. The aviation
tripping is more severe Redundant protection system are industry is one example [4].
increasingly used in large transformers and generators. Increasingly, utilities and other electric power users are
A redundant protection system may include the following: adopting the redundant system approach of the aviation
• Redundant primary relays. industry. According to an independent survey, 55 percent of
• Redundant communications channels. utilities in the United States and Canada use the same
• Redundant instrument transformers or separate voltage manufacturer in dual primary systems for high-reliability
secondary circuits for each set of primary relays. protection designs [5].
• Redundant dc control power systems. Historically, utilities provided dual-redundant primary
• Breakers with redundant trip coils. protection by applying two electromechanical relays with
A breaker failure protection scheme covers failure of the different operating principles for protection either by zone or
breaker to interrupt the fault. by phase. Today, each primary system can include different
The application of redundant systems is now economical principles of operation: line differential and directional
at all voltage levels because of the low cost of modern comparison primary protection, for example, complemented
multifunction relays and the elimination of most other by breaker failure protection and distance and/or directional
equipment by using the ancillary features of these relays. overcurrent backup protection.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 161
Using identical relays in a dual primary protection system Analyzing the dependability and the security of a
provides the following advantages [1]: protection system requires different fault trees. For
• Two identical systems allow engineers to design one constructing each tree, we should identify which component
system and use it twice—lower settings labor, higher failures may cause a failure to trip (a dependability problem)
settings reliability, and lower incidence of human or an undesired trip (a security problem). This analysis leads
error. to different tree topologies and different failure rate (or
• Common designs, algorithms, and settings ensure unavailability) values. For example, any relay failure could
optimum protection coordination. cause a failure to trip if a fault occurs during the relay
• Common automation and integration simplify downtime. However, not all relay failures cause an undesired
architecture and reduce cost. trip. Hence the relay failure rate or unavailability value to use
• A common operator interface makes system operators for dependability analysis is higher than the value to use for
more comfortable. security analysis.
• Personnel can analyze data with the same skills and In this paper, we use unavailability for dependability fault
tools. trees because failures to clear faults depend on component
• Personnel can train in depth on one relay instead of downtime per failure. We use failure rate for security fault
having to learn how to use two relays for the same trees because undesired trips typically occur at the instant a
purpose. component fails [7].
Fault trees allow comparing the relative unavailability of
• Troubleshooting is simpler because it is easier for
various protection schemes. By keeping the fault trees simple
users to compare the reports of two identical relays for
and making simplifying assumptions, engineers can analyze
the same fault.
the fault trees easily with hand calculations. The advantages of
IV. FAULT TREE ANALYSIS fault tree analysis include the following [1]:
Fault tree analysis is a practical tool for evaluating how a • While the failure rate or unavailability data of
component failure contributes to a specific failure event [1] individual components are approximate, some are
[6]. Fault tree analysis is useful for comparing the relative substantiated by field measurements, so fault trees
reliability of proposed protection schemes. It is appropriate for give useful order-of-magnitude results.
considering the top-down reliability performance of a system • With different top events and fault trees, engineers can
for specific failure events. easily evaluate dependability-related failures versus
The failure event of interest is called the top event. A security-related failures.
system may have more than one top event that merits • Fault tree analysis is a critical step in ensuring the best
investigation. The failure rate for the top event is a application of limited engineering resources.
combination of the failure rates of the basic events (the tree
V. TRANSFORMER PROTECTION EVALUATION
roots) that contribute to the top event. Basic events are
individual component failures with identified failure rates. We A. Transformer Protection Schemes
use AND, OR, and other gates to represent combinations of In this paper, we compare the reliability of three schemes
failure rates. OR gates express the idea that any of several for protecting a delta-wye transformer with single breakers at
failures can cause the protection system to fail. The OR gate both sides. All schemes use multifunction transformer relays
output is the sum of the failure rates of the input events. AND with only current inputs.
gates express the idea that failures must occur simultaneously Fig. 1a shows the single protection scheme, which includes
to cause the protection system to fail. The AND gate output is one relay, one set of current transformers (CTs) on the
the product of the failure rates of the input events. We can also transformer high-voltage (HV) and low-voltage (LV) sides,
use availability, unavailability, or MTBF figures instead of one dc power system, and breakers with single trip coils.
failure rates in fault tree analysis. Fig. 1b shows the dual-redundant protection scheme, which
The power system performance requirements (preserving includes two relays, two sets of CTs on each side of the
transient stability, for example) determine the top event of the transformer, two dc power systems, and breakers with
fault tree. If, for example, the power system requires high- redundant trip coils. The scheme has only one CT on the
speed fault clearing to preserve transient stability, the top transformer neutral grounding conductor, but we also evaluate
event should only consider high-speed protection. However, if the effect of adding another CT to the neutral circuit. To create
the power system remains stable after a breaker failure a two-out-of-three voting scheme, we add a third relay to the
protection operation, the top event should also consider Fig. 1b scheme, connected to the same CTs and the same dc
breaker failure protection. power system as one of the other two relays. In redundant
Fault tree analysis helps in analyzing the security or schemes, we assume all the redundant components are of
dependability of a protection system. Security is the ability of similar quality. We assume relays have the same reliability
a system to never trip for an out-of-zone fault or when no fault indices, sensitivities, and speeds of operation.
is present. Dependability is the ability of a system to never fail
to clear an in-zone fault.
162
HV Bus LV Bus
52-HV 52-LV
HV Bus LV Bus
52-HV 52-LV
125 Vdc-1
Main 1 Transformer
Protection Relay
Transformer Protection
Relay
125 Vdc-2
Main 2 Transformer
Protection Relay
125 Vdc
(a) (b)
Fig. 1. Single and dual-redundant transformer protection schemes using multifunction relays.
B. Fault Tree Analysis relay application or settings errors, breaker failures, dc power
We created 24 fault trees (12 for dependability analysis and system failures, CT failures, dc system and CT wiring errors,
12 for security analysis) for the following combination of and hidden failures. We assign to these events the
transformer protection schemes and other factors: unavailability values shown in Table VI in the appendix. In
• Single scheme. this fault tree, the OR gate reflects the fact that, in a single
• Dual-redundant scheme with two neutral CTs. protection scheme, the failure of any component causes a
• Dual-redundant scheme with one neutral CT. scheme failure to clear a fault. We can modify the fault tree as
required to consider other scheme configurations, to include
• Dual-redundant scheme with relays from different
other events of interest, or to use other unavailability values.
manufacturers.
• Dual-redundant scheme that experiences common-
mode failures.
• Redundant two-out-of-three voting scheme.
For each of these schemes, we created a fault tree that
considers the normal process of commissioning testing of the
protection scheme and another fault tree that reflects the effect
of comprehensive commissioning testing. Reference [8]
describes a process with a checklist for consistent and
thorough commissioning tests. Reference [9] reviews best
practices and provides a list of lessons learned from
commissioning protective relay systems.
Table VI in the appendix shows the reliability indices that
we used in the fault trees and includes an explanation of the
method we followed to determine each value.
We describe several fault trees in this section and then
summarize the results obtained from all the fault trees in Fig. 2. Dependability fault tree for the single transformer protection scheme.
Table II in the next section. According to [9], we include in a separate fault tree the
1) Single Schemes effect of comprehensive commissioning testing by modifying,
Fig. 2 shows the dependability fault tree for the single as explained in the appendix, the unavailabilities
scheme (see Fig. 1a). The top event is “protection fails to clear corresponding to the following:
an in-zone fault,” which means that this fault tree considers • Relay application or settings errors.
only protection for faults inside the differential zone defined • DC power system failures.
by the CT location. We assume the relay provides differential • DC wiring errors.
and restricted earth fault (REF) protection functions [1]. The • CT wiring errors.
basic events considered in this fault tree are: relay failures, • Hidden failures.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 163
Fig. 3 shows that comprehensive commissioning testing In the fault tree shown in Fig. 5, we assume the breakers to
reduces the single scheme unavailability from 1,807 • 10–6 to have redundant trip coils, so we split the breakers into two
821 • 10–6, a significant improvement. parts. We represent breaker trip coil failures or dc circuit fuse
821
operations at the basic level (under OR Gate 1). Their
contribution to a failure to clear the fault is practically
Note: Numbers shown are Protection Fails to Clear eliminated by the AND gate. If the trip coils operate correctly,
unavailabilities • 106 an In-Zone Fault
a breaker failure to interrupt current (a stuck contact
mechanism or a failure of the contacts to extinguish the arc)
will cause a failure to clear the fault, no matter the redundancy
of the scheme. Hence we represent breaker failures to interrupt
current above the AND gate in Fig. 5 as inputs to OR Gate 2.
Because the other input to this OR gate has a very low
unavailability value (because of redundancy), the breaker
failures to interrupt current become the dominant factor in the
scheme dependability. This fact emphasizes the importance of
Relay Relay HV LV DC CT DC CT Hidden
Fails App. or Breaker Breaker System Fails Wiring Wiring Failures
good breaker maintenance and monitoring and the need for
137 Settings Fails Fails Fails 7•9 Errors Errors 5 breaker failure protection. A more expensive solution would
Errors 200 200 6 = 63 10 0
200
be to install two breakers in series in a critical system.
Fig. 3. Effect of comprehensive commissioning testing on the dependability
fault tree for the single transformer protection scheme.
Fig. 4 shows the security fault tree for the single scheme.
The top event is “protection produces an undesired trip.” This
security fault tree considers the same events as the
corresponding dependability fault tree shown in Fig. 2 but
uses the security failure rates shown in Table VI in the
appendix.
4981
Fig. 4. Security fault tree for the single transformer protection scheme.
2) Redundant Schemes
Fig. 5 depicts the fault tree for the dual-redundant
transformer protection scheme, which results from adding a
Fig. 5. Dependability fault tree for the dual-redundant transformer
second neutral CT to the scheme shown in Fig. 1b. The AND protection scheme, using relays from the same manufacturer.
gate reflects the fact that the failure of any redundant
component does not cause a failure to clear a fault. The inputs Fig. 6 depicts the fault tree for the dual-redundant
to this gate have slightly different values because, in a scheme transformer protection scheme with only one neutral CT (see
with relays from the same manufacturer, we assign slightly Fig. 1b), which is a typical scheme. All the scheme
different unavailabilities to relay application and settings components are redundant, except the neutral CT, which
errors, as explained in the appendix. The multiplication of constitutes a single point of failure for the scheme. Neutral CT
unavailabilities reduces the output of the AND gate to a value failures affect REF protection, but not differential protection.
close to zero. We can modify this fault tree as required to
represent systems with lower redundancy (single neutral CT or
dc power system or breaker trip coil, for example).
164
The right side of the Fig. 6 fault tree represents the REF protection) represent 10 percent of all transformer
differential protection. The output of OR Gate 2 is the internal faults. The output of OR Gate 1 represents all the
unavailability value resulting from differential protection other events that affect REF protection. This output does not
failing to operate. We multiply this value by 0.9 under the include the contribution of the phase CTs connected on the
assumption that differential protection detects 90 percent of all transformer delta side because REF protection does not use
internal faults (AND Gate 2). The output of AND Gate 2 is an currents from the delta side. We use the output of OR Gate 1
input to AND Gate 5, which represents differential protection (represented by the triangle symbol) multiplied by 0.1 in AND
redundancy. AND Gate 5 practically eliminates the Gate 1 as an input to AND Gate 4. This AND gate, which
contribution of differential protection to the top event. represents protection redundancy, practically eliminates the
The left side of the Fig. 6 fault tree represents the REF contribution of this part of REF protection to the top event.
protection. We represent neutral CT failures and neutral CT The single neutral CT represents the greatest contribution of
wiring errors as inputs to OR Gate 3. We multiply the value of REF protection to the top event. Adding a second neutral CT
the OR Gate 3 output by 0.1 (AND Gate 3) under the moves the failure events related to this CT to the lowest level
assumption that ground low-current faults (detected only by in the fault tree, as shown in Fig. 5.
165
3 0 2
3 4 5
HV Breaker LV Breaker
Fails to Fails to
26 154 180 1459 1684
Interrupt Interrupt
Current Current
3 Main 1 REF Main 2 REF Main 1 Differential Main 2 Differential
80 80
Protection Fails Protection Fails Protection Fails Protection Fails
Fault
Detected
by REF 1459
0.1
1 2
Neutral Neutral
CT Fails CT Wiring
9 Errors
17
1621
Fault 2
Fault
Detected 1544 Detected
by REF by Differential
0.1 0.9
1544
CT CT
Fails Wiring
3•9 Errors
1 = 27 50
Fig. 6. Dependability fault tree for the dual-redundant transformer protection scheme with one neutral CT.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 165
The topology of the fault tree for the dual-redundant scheme. To create this fault tree, we started from the Fig. 5
scheme using relays from different manufacturers is identical fault tree and added the common-mode failures at the same
to that of Fig. 5. In this fault tree, we use a higher level as breaker failures to interrupt current. We split
unavailability value for relay application and settings errors common-mode failures into two types: failures that result
than for the case of relays from the same manufacturer, as from the hardware or firmware of two devices failing
explained in the appendix. simultaneously and those that result from common errors in
Fig. 7 represents the effect of common-mode failures on device settings or in system design.
the dependability of the dual-redundant transformer protection
Fig. 7. Dependability fault tree for the dual-redundant transformer protection scheme, considering common-mode failures.
166
Fig. 8 shows the security fault tree for the dual-redundant undesired trip. The result is lower security (a higher failure
transformer protection scheme. OR Gate 2 reflects the effect rate) than that of the single scheme (see Fig. 4).
of redundancy: any of the two schemes may cause an
Fig. 8. Security fault tree for the dual-redundant transformer protection scheme.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 167
Fig. 9 shows the dependability fault tree for the two-out-of- Gate 3. The result is lower dependability (a higher failure rate)
three voting transformer protection scheme. The scheme has than in a fully redundant voting scheme. We keep dc system
three multifunction relays. Tripping occurs when at least two wiring errors at the lowest level in the fault tree because we
of the relays operate. The effect of the voting logic is that the assume that dc circuits for the Main 2 and Main 3 schemes are
output of AND Gate 3 is practically zero. A fully redundant independent even with a common battery. We keep breaker
voting scheme (having three sets of each scheme component) trip coil failures at the lowest level in the fault tree because we
would have a very high dependability, only limited by the assume that the voting scheme is arranged to energize both
breaker failures to interrupt current [10]. However, in Fig. 9, breaker trip coils [10]. In this analysis, we assume the three
we assume that two of the schemes (referred to as Main 2 and schemes have the same sensitivity. If the schemes had
Main 3) share the dc power system and the CTs. The shared different sensitivities (because of different settings, principles
components become single points of failure for the Main 2 of operation, or manufacturers) and if two of the schemes did
and Main 3 schemes. When one of these components fails, not detect a high-resistance in-section fault, the two-out-of-
both schemes fail simultaneously and the voting scheme fails three voting scheme would fail to clear the fault. For this
to clear the fault. For this reason, we represent dc power reason, we recommend that voting schemes use relays with the
system failures, CT failures, and CT wiring errors at the same same sensitivity.
level as breaker failures to interrupt current, as inputs to OR
370
0
HV Breaker LV Breaker DC CT CT
Fails to Fails to System Fails Wiring
Interrupt Interrupt 3 Fails 7•9 Errors
Current Current 30 = 63 117
80 80
3 3 3
1 2
Same as Main 3
Transformer Protection
1 2
Fig. 9. Dependability fault tree for the two-out-of-three voting transformer protection scheme.
168
Fig. 10. Security fault tree for the two-out-of-three voting transformer protection scheme.
Fig. 10 shows the security fault tree for the two-out-of- • Comprehensive commissioning testing improves
three voting transformer protection scheme. AND Gates 1 security between 1.9 and 2.2 times.
and 2 reflect the fact that two schemes need to misoperate to • The dependability of the dual-redundant scheme is
cause an undesired trip. The result is high security (a low 1,807/163 = 11.1 times that of the single scheme.
failure rate). However, the shared dc system and CTs, which • In a dual-redundant scheme, adding a second neutral
we represent as inputs to OR Gate 3, impair the scheme CT does not significantly improve dependability. If
security. we assume that breaker failure protection meets the
C. Protection Scheme Reliability Comparison performance requirements of the power system, the
second neutral CT improves the scheme dependability
Table II summarizes the results obtained from the
5/3 = 1.7 times. We calculated these values by
24 transformer protection fault trees.
considering the unavailability value for breaker
From Table II, we conclude the following:
failures to interrupt current to be zero.
• Comprehensive commissioning testing improves the
• If we assume that breaker failure protection meets the
single scheme dependability 2.2 times.
performance requirements of the power system, the
• In dual-redundant schemes, the effect of breaker
dependability of the dual-redundant scheme is
failures to interrupt current significantly reduces the
6/3 = 2 times higher when using relays from the same
impact of comprehensive commissioning testing on
manufacturer than when using relays from different
dependability. When considering common-mode
manufacturers. We calculated these values by
failures, comprehensive commissioning testing
considering the unavailability value for breaker
improves the dual-redundant scheme dependability
failures to interrupt current to be zero.
3.1 times. It also improves the voting scheme
• The dependability of the voting scheme is
dependability 1.6 times.
1,807/370 = 4.9 times that of the single scheme.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 169
TABLE II
TRANSFORMER PROTECTION RELIABILITY COMPARISON
Note: The numbers in parentheses represent the effect of comprehensive commissioning testing. These numbers are the ratios of the unavailabilities or failure
rates with normal testing to the unavailabilities or failure rates with comprehensive testing.
• The dependability of the dual-redundant scheme is Table III summarizes the cost estimation results. It shows
370/163 = 2.3 times that of the voting scheme. Sharing that, for this example, converting the single scheme into a
the dc power system and the CTs affects the voting dual-redundant scheme costs $13,480 and converting the
scheme dependability. single scheme into a two-out-of-three voting scheme costs
• Common-mode failures impair the dependability of $21,110. This is a low price to pay for the protection scheme
the dual-redundant scheme 668/163 = 4.1 times. reliability improvement provided by redundancy, given the
Comprehensive commissioning testing and detailed high costs of transformer outages and repairs. However, if we
setting and design reviews reduce the dependability require the addition of a dc power system or a set of CTs to
impairment to 229/160 = 1.4 times. achieve full redundancy, we must consider their cost in the
• The security of the single scheme is comparison.
9,946/4,981 = 2.0 times that of the dual-redundant TABLE III
scheme. COST COMPARISON OF TRANSFORMER PROTECTION SCHEMES
• The security of the voting scheme is Protection Scheme
4,981/2,999 = 1.7 times that of the single scheme. Item Dual
Sharing the dc power system and the CTs affects the Basic Voting
Redundant
voting scheme security.
• The security of the voting scheme is Relays $5,860 $11,720 $17,580
9,946/2,999 = 3.3 times that of the dual-redundant Engineering $4,000 $5,000 $6,000
scheme. Wiring and testing $1,790 $2,510 $3,280
• The security of the dual-redundant scheme is
Field wiring $9,300 $15,200 $15,200
11,196/9,946 = 1.1 times higher when using relays
from the same manufacturer than when using relays Total cost $20,950 $34,430 $42,060
from different manufacturers. Incremental cost – $13,480 $21,110
D. Cost Comparison
We evaluated the costs resulting from adding redundancy VI. GENERATOR PROTECTION EVALUATION
to the single transformer protection scheme. We used a A. Generator Protection Schemes
computer program for protection system cost estimation to We compare the reliability of three schemes for protecting
determine the cost of the basic, dual-redundant, and voting a high-resistance-grounded generator connected in a unit
schemes. Our cost evaluation includes the following: arrangement with the step-up transformer. The unit has a
• Relays. single breaker on the transformer HV side and no generator
• Engineering (relay programming and panel wiring breaker. All the schemes use multifunction relays that provide
design). generator protection and include the step-up transformer in the
• Panel wiring and testing. unit differential zone. The relays do not provide dedicated
• Field wiring, including cable and labor costs transformer protection.
(assuming the distances from the instrument Fig. 11a shows the single protection scheme, which
transformers and breakers to the relays to be includes one relay, single sets of CTs and voltage transformers
300 meters). (VTs), one dc power system, and one breaker with a single
170
trip coil. Fig. 11b shows the dual-redundant protection provides a voltage input signal to the relay. This fault tree
scheme, which includes two relays, two sets of instrument considers all the generator protection functions that the
transformers, two dc power systems, and a breaker with multifunction relay can provide using the current and voltage
redundant trip coils. To create a two-out-of-three voting inputs shown in Fig. 11a. The fault tree does not include other
scheme, we add a third relay to the Fig. 11b scheme, possible scheme modules, such as resistance temperature
connected to the same instrument transformers and the same detector (RTD) modules for thermal protection, ground
dc power system as one of the other two relays. In redundant modules for field ground fault protection, or signal injection
schemes, we assume all the redundant components are of modules for stator ground fault protection. In this fault tree,
similar quality. We also assume relays have the same we use the unavailability values shown in Table VI in the
reliability indices, sensitivities, and operation speeds. appendix. We can modify the fault tree as required to consider
other scheme configurations, to include other events of
interest, or to use other unavailability values. The other fault
trees for the single generator protection scheme (dependability
fault tree considering the effect of comprehensive
commissioning testing and security fault trees) have the same
topology as that of Fig. 12 but different reliability indices.
Fig. 13 depicts the dependability fault tree for the dual-
redundant generator protection scheme shown in Fig. 11b. All
the scheme components are redundant, except the generator
grounding system, composed of a transformer with a resistor
connected to its secondary. The transformer provides a voltage
input signal to the relays. The relays use this signal and the
zero-sequence voltage measured at the generator terminals to
provide 100 percent stator ground fault protection. This
protection combines a neutral overvoltage element with a
third-harmonic voltage differential element [1]. The generator
grounding system is a single point of failure for stator ground
fault protection. As a result, the fault tree topology is similar
to that of the dual-redundant transformer protection scheme
Fig. 11. Single and dual-redundant generator protection schemes using with one neutral CT (Fig. 6).
multifunction relays. The left side of the Fig. 13 fault tree represents the stator
B. Fault Tree Analysis ground fault protection. We assume stator ground faults to be
We created 20 fault trees (10 for dependability analysis and 30 percent of all generator internal faults and abnormal
10 for security analysis) for the following combinations of operating conditions, so we use a 0.3 multiplier as an input to
protection schemes and other factors: AND Gates 1 and 3.
• Single scheme. The right side of the Fig. 13 fault tree represents all the
other generator protection functions. The output of OR Gate 2
• Dual-redundant scheme.
is the unavailability value resulting from these other protection
• Dual-redundant scheme with relays from different
functions failing to operate. We use a 0.7 multiplier as an
manufacturers.
input to AND Gate 2 in this case. AND Gates 4 and 5
• Dual-redundant scheme that experiences common-
practically eliminate the contribution of the redundant
mode failures.
protection scheme to the top event. Hence the breaker failures
• Redundant two-out-of-three voting scheme. to interrupt current and the generator grounding system
Table VI in the appendix shows the reliability indices that failures determine the protection scheme dependability.
we used in the fault trees. We created the other fault trees for the dual-redundant
Fig. 12 shows the dependability fault tree for the single generator protection scheme (security fault trees and
generator protection scheme (see Fig. 11a). The top event is dependability fault trees considering the effect of
“protection fails to trip unit for in-zone faults or abnormal comprehensive commissioning testing and common-mode
conditions.” The fault tree includes the basic events failures) using the same methodology as for dual-redundant
considered for transformer protection (see Fig. 2) and the transformer protection schemes.
failures of the generator grounding system because this system
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 171
Fig. 12. Dependability fault tree for the single generator protection scheme.
87
5 0 2
3 4 5
Breaker
Fails to
432 508 Interrupt 1225 1400
Current
Main 1 Stator Ground Main 2 Stator Ground 80 Main 1 Generator Main 2 Generator
Fault Protection Fails Fault Protection Fails Protection Fails Protection Fails
Fault Neutral
Detected Grounding
by Ground System
Fault 1 1225
Fails
Protection 15
0.3 2
1750
CT CT
Fails Wiring
4 • 27 Errors
1442 = 108 4 • 50
= 200
Fig. 13. Dependability fault tree for the dual-redundant generator protection scheme using relays from the same manufacturer.
172
Fig. 14 shows the dependability fault tree for the two-out- redundancy, the outputs of AND Gates 2 and 5 are zero.
of-three voting generator protection scheme. The scheme has Hence the shared component, the breaker failures to interrupt
three multifunction relays. Tripping occurs when at least two current, and the grounding system failures determine the
of the relays operate. We assume that two of the schemes scheme dependability. In this analysis, we assume that the
(referred to as Main 2 and Main 3 in Fig. 14) share the dc three schemes detect the same faults and abnormal conditions.
power system and instrument transformers, which become If the schemes had different fault or abnormal condition
single points of failure for the voting scheme. We represent dc coverage (because of different settings, principles of
power system failures, instrument transformer failures, and operation, or manufacturers) and if two of the schemes did not
wiring errors at the same level as breaker failures to interrupt detect an event, the two-out-of-three voting scheme would fail
current, as inputs to OR Gate 2. We represent the neutral to trip the generator. For this reason, we recommend that
grounding system, another single point of failure of the voting voting schemes use relays with the same fault and abnormal
scheme, as another input to OR Gate 2. Because of the scheme condition coverage.
518
Breaker DC CT CT VT VT
Fails to System Fails Wiring Fails Wiring 0
Interrupt Fails 4 • 27 Errors 3 • 15 Errors
Current 30 = 108 200 = 45 50 5
80
Fault Neutral
Detected Grounding 2 2 1
by Ground System
Fault Fails Main 1 and Main 2 Main 1 and Main 3 Main 2 and Main 3
Protection 15 Generator Protection Fails Generator Protection Fails Generator Protection Fails
0.3 0
Output of
2 AND Gate 5 in Fig. 13 3
0 0 0 1097 1097
Main 1 and Main 2 Stator Main 1 and Main 3 Stator Main 2 and Main 3 Stator Main 2 Generator Main 3 Generator
Ground Fault Protection Fails Ground Fault Protection Fails Ground Fault Protection Fails Protection Fails Protection Fails
Output of
AND Gate 4 in Fig. 13
1567
Fault 1
Detected
by Generator
Protection
0.7
Fig. 14. Dependability fault tree for the two-out-of-three voting generator protection scheme.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 173
TABLE IV
GENERATOR PROTECTION RELIABILITY COMPARISON
Note: The numbers in parentheses represent the effect of comprehensive commissioning testing. These numbers are the ratios of the unavailabilities or failure
rates with normal testing to the unavailabilities or failure rates with comprehensive testing.
Table V shows that, for this example, converting the single • In transformer and generator protection schemes, the
scheme into a dual-redundant scheme costs $13,240 and voting scheme has the highest security, and the dual-
converting the single scheme into a two-out-of-three voting redundant scheme has the lowest security.
scheme costs $21,830. This is a low price to pay for the • Adding a second neutral CT improves the
protection scheme reliability improvement provided by dependability of redundant transformer protection
redundancy, given the high costs of generator outages and schemes when breaker failure protection meets the
repairs. However, if we require the addition of a dc power power system requirements.
system or a set of instrument transformers to achieve full • Breaker failures to interrupt current have a significant
redundancy, we must consider their cost in the comparison. impact on the dependability of redundant schemes. A
breaker failure to interrupt current causes a failure to
VII. CONCLUSIONS trip the transformer or generator, no matter the
From the transformer and generator protection schemes redundancy of the rest of the scheme. To improve the
studied in this paper, we conclude the following: redundant scheme dependability, we recommend
• Fault tree analysis is an excellent tool to compare the providing good breaker maintenance and applying
relative reliability of protection schemes. The breaker failure protection.
topologies and reliability indices of fault trees used for • In generator protection schemes, the grounding system
dependability analysis are different from those used represents a single point of failure that limits the effect
for security analysis. of redundancy on the scheme dependability.
• This paper shows dependability and security fault • Using relays from the same manufacturer improves
trees for typical single, dual-redundant, and voting the dependability and security of redundant protection
protection schemes for transformers and generators. schemes.
We also show how to consider the effect of • Hidden and common-mode failures do not
comprehensive commissioning testing, hidden significantly affect the reliability of redundant
failures, common-mode failures, and the use of relays protection schemes.
from the same or different manufacturers in redundant • Common-mode failures affect the reliability of
schemes. redundant protection schemes. Comprehensive
• The paper provides a table of reliability indices for use commissioning testing and detailed setting and design
in fault trees. We calculated some indices from reviews significantly reduce the dependability
measured field data. However, other indices come impairment.
from technical literature or were estimated based on • The costs of converting a single transformer or
experience. Utility engineers can refine these indices generator protection scheme into a dual-redundant
by using field data from their power systems. scheme or a voting scheme are relatively low, unless
• Comprehensive commissioning testing improves the this conversion requires adding a dc power system or
dependability of single and voting protection schemes. instrument transformers.
When considering common-mode failures, this testing
also improves the redundant scheme dependability. VIII. APPENDIX
• Comprehensive commissioning testing improves the This appendix shows the reliability indices that we used in
security of all transformer and generator protection the dependability and security fault trees in this paper. We
schemes. also explain how we calculated or estimated these indices. We
• Dual-redundant transformer and generator protection have confidence in the relay failure rates because we have
schemes have higher dependability and lower security measured them for many years. We estimated other indices
than single schemes. based on our experience and the information available in
technical literature.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 175
A. Reliability Indices Used in Fault Trees 45 percent of the incorrect operations, while relay failures
Table VI shows the unavailability values that we used for caused only 4.5 percent of the incorrect operations. Using this
dependability fault trees and the failure rate values that we information, we assume U = 1,000 • 10–6 for relay application
used for security fault trees. We also show the MTBF values or settings errors.
that we used to calculate the failure rates. We assume this value falls 80 percent (U = 200 • 10–6) with
comprehensive commissioning testing and by analyzing relay
TABLE VI
RELIABILITY INDICES USED IN FAULT TREES event reports to find application or settings errors.
For two identical relays, we use U = 1,000 • 10–6 for one
Dependability Security relay and U = 1,250 • 10–6 for the other relay to account for
Event MTBF Failure possible additional errors when manually applying settings to
Unavailability • 106
(Years) Rate • 106 this other relay. For two relays from different manufacturers,
Relay fails 137 3,000 333 we assume the resulting unavailability to be close to the sum
of the relay unavailabilities because of the differences in
Relay application
or settings errors
1,000 1,000 1,000 application considerations and settings rules. Hence we use
U = 1,750 • 10–6 for each relay. We assume these values fall
Breaker fails 200 3,000 333
80 percent (U = 200 • 10–6, U = 250 • 10–6, and U = 350 • 10–6,
Breaker fails to
80 – – respectively) with comprehensive commissioning testing and
interrupt current by analyzing relay event reports to find application or settings
DC power
30 1,000 1,000
errors.
system fails
3) Breaker Fails
CT fails 9 6,370 157
References [13] and [14] provide utility breaker failure data
VT fails 15 3,600 278 collected in a CIGRÉ survey for the 1988 to 1991 period for
Generator breakers between 62.5 kV and greater than 700 kV. The
grounding 15 3,600 278 reported failure rate for all the breakers is λ = 6,720 • 10–6,
system fails which gives MTBF = 149 years. Assuming that half of these
DC system
50 4,000 250
failures are failures to open (a dependability problem), we can
wiring errors use MTBF = 300 years for dependability analysis.
CT or VT Hence, for breakers with one tripping coil, we use MTBF =
50 4,000 250
wiring errors 300 years and calculate the unavailability assuming the
Hidden failures 10 20,000 50 following [7]:
Common-mode
• Ninety percent of failures are detected by the usual
failures (hardware 5 40,000 25 monitors in the breaker and in some relays (breaker
or firmware) monitoring, event reporting, trip and close circuit
Common-mode monitoring) and other devices.
failures (settings 500 2,000 500 • Another 5 percent of failures are detected by visual
or design errors) inspections every two months.
B. Comments on the Reliability Indices for Dependability • The remaining 5 percent of failures are detected by
Fault Trees (Unavailabilities) maintenance every two years.
1) Relay Fails U=
Our calculation using observed field failure data gives 1 ⎛ 0.90 • 2 days 0.05 •1 month ⎞
MTBF = 100 years (λ = 10,000 • 10–6) for dependability •⎜ + + 0.05 •1 year ⎟
300 years ⎝ 365 days/year 12 months/year ⎠
analysis. This MTBF value includes hardware and firmware
failures and the effect of taking the relay out of service for = 197 •10 –6
corrective actions derived from service bulletins. Hence, for breakers with one trip coil, we use U = 200 • 10–6.
Reference [11] gives an interval from 30 minutes to 2 weeks For breakers with redundant trip coils, we use U = 80 • 10–6 to
for MTTR. Assuming an average value of MTTR = 5 days, we account for the increased reliability resulting from trip coil
have: redundancy and from the lower impact of blown fuses in the
U = λ • MTTR = (0.01 failures/year) (120 hours) (1/8,760 dc power circuits.
hours/year) = 137 • 10–6
4) Breaker Fails to Interrupt Current
2) Relay Application or Settings Errors In redundant schemes, a breaker failure to interrupt current
Experience shows that relay application and settings errors causes a failure to clear the fault, no matter the redundancy of
cause more protection dependability problems than relay the rest of the scheme. For this reason, in dependability fault
failures. For example, [12] analyzes incorrect protection trees, we represent breaker failures to interrupt current
operations in a utility during an 18-month period and separately from trip coil failures and blown fuses in the dc
concludes that settings errors and other human errors caused tripping circuits. According to [14] and [15], which report
176
breaker failure data collected in a CIGRÉ survey for the 1974 commissioning features available in modern relays) and by
to 1977 period, mechanical failures are around 70 percent of analyzing relay event reports to find CT or VT wiring errors.
all breaker failures. Assuming that half the mechanical failures
11) Hidden Failures
are caused by stuck trip coils, we can estimate that breaker
Hidden failures are very infrequent events. We assume the
failures to interrupt current after the trip coil operates
unavailability caused by hidden failures is less than 10 percent
represent around 40 percent of all breaker failures. Hence we
of that caused by a relay failure. This is based on experience
use U = 0.4 • 200 • 10–6 = 80 • 10–6 for breaker failures to
and the assumption that hidden failure unavailability must be
interrupt current and U = (200 – 80) • 10–6 = 120 • 10–6 for all
less than known and measured data. Hence we use
the other breaker failures.
U = 10 • 10–6 for hidden failures. We assume this value falls to
5) DC Power System Fails U = 5 • 10–6 with comprehensive commissioning testing and
We use U = 30 • 10–6 according to [16]. We assume this by analyzing relay event reports.
value falls 80 percent (U = 6 • 10–6) when we provide proper
12) Common-Mode Failures
battery maintenance, monitor the system voltage and the
Common-mode failures may result from the hardware or
battery charger, and use efficient ground detection systems.
firmware of two devices failing simultaneously or from
We consider redundant dc power systems to have redundant
common errors in device settings or in system design.
batteries, battery chargers, and wiring.
We assume the common-mode failures caused by hardware
6) CT Fails or firmware problems to be even less frequent than hidden
Reference [14] provides instrument transformer failure data failures. For example, the probability of a relay component
collected in a CIGRÉ survey for the 1985 to 1995 period. The failing at the same time in two redundant relays is very low,
reported failure rate for all CT failures that result in a CT even if this component has an abnormally high failure rate.
outage is λ = 1,570 • 10–6, which gives MTBF = 637 years. Hence we use U = 5 • 10–6 for these common-mode failures.
For an MTTR = 2 days, we get U = 8.6 • 10–6 and will use We assume this value falls to U = 3 • 10–6 with comprehensive
U = 9 • 10–6 per CT. commissioning testing and by analyzing relay event reports.
We assume the common-mode failures caused by settings
7) VT Fails
or design errors to be around half the failures caused by relay
According to [14], the failure rate for all VT failures that
application and settings errors. Hence we use U = 500 • 10–6
result in a VT outage is around λ = 2,800 • 10–6. Hence MTBF =
for these common-mode failures. We assume this value falls
360 years. For an MTTR = 2 days, we get U = 15.2 • 10–6 and
90 percent (U = 50 • 10–6) by carefully reviewing settings and
will use U = 15 • 10–6 per VT.
designs and analyzing relay event reports.
8) Generator Grounding System Fails
The generator grounding system consists of a transformer C. Comments on the Reliability Indices for Security Fault
Trees (Failure Rates)
with its primary connected between the generator neutral and
ground and with a resistor connected to its secondary. 1) Relay Fails
Generator stator ground fault protection receives voltage Relays are typically designed to fail in a safe mode, not to
information from the secondary of the generator grounding trip. Our calculation using observed field failure data gives
transformer. A transformer or resistor failure could cause the MTBF = 3,000 years (λ = 333 • 10–6) for security analysis.
stator ground fault protection to fail to operate. Assuming that
2) Relay Application or Settings Errors
the frequency of generator grounding transformer or resistor Experience shows that relay application and settings errors
failures is comparable to that of VT failures, we use cause more protection security problems than relay failures.
MTBF = 360 years, which gives U = 15 • 10–6 for MTTR = Hence we assume MTBF = 1,000 • 10–6 (λ = 1,000 • 10–6) for
2 days. relay application or settings errors. We assume this value falls
9) DC System Wiring Errors to λ = 200 • 10–6 with comprehensive commissioning testing
Experience shows that dc system wiring errors cause more and by analyzing relay event reports to find application or
protection reliability problems than dc power system failures. settings errors.
We assume the unavailability caused by dc system wiring
3) Breaker Fails
errors to be U = 50 • 10–6. We assume this value falls Assuming that the breaker failures that cause undesired
80 percent (U = 10 • 10–6) with comprehensive commissioning closures are around ten times less likely than the breaker
testing and by analyzing relay event reports to find dc system failures that cause failures to open, we define MTBF =
wiring errors. 10 • 300 = 3,000 years (λ = 333 • 10–6) for breakers with one
10) CT or VT Wiring Errors trip coil. For breakers with redundant trip coils, we define
We assume the unavailability caused by CT or VT wiring MTBF = 3,000 / 0.4 = 7,500 years (λ = 133 • 10–6).
errors to be equal to that caused by dc system wiring errors.
4) DC Power System Fails
Hence we use U = 50 • 10–6 per CT or VT three-phase circuit. The U = 30 • 10–6 value that we adopted for dependability
We assume this value falls to zero (U = 0) with analysis represents MTBF = 100 years for an MTTR of
comprehensive commissioning testing (using the advanced one day, which is typical for battery systems. Assuming that
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 177
the dc power system failures that cause undesired trips are 11) Common-Mode Failures
around ten times less likely than the dc power system failures Assuming it takes around six months to detect a common-
that cause failures to trip (a conservative assumption), we mode failure (MTTR = 0.5 years), the U = 5 • 10–6 and
define MTBF = 1,000 years (λ = 1,000 • 10–6) for security U = 500 • 10–6 values that we adopted for dependability
analysis. We assume this value falls 80 percent (λ = 200 • 10–6) analysis represents MTBF = 100,000 and MTBF = 1,000 years,
when we provide proper battery maintenance, monitor the respectively. We assume that common-mode failures have the
system voltage and battery charger, and use efficient ground same likelihood of causing failures to clear faults as causing
detection systems. undesired trips. Hence, for security analysis, we assume a
conservative value of MTBF = 40,000 years (λ = 25 • 10–6) for
5) CT Fails
failures caused by hardware or firmware problems and
Assuming that the CT failures that cause undesired trips are
MTBF = 2,000 years (λ = 500 • 10–6) for failures caused by
around ten times less likely than the CT failures that cause
settings or design errors. We assume these values fall to
failures to trip, we define MTBF = 6,370 years (λ = 157 • 10–6)
λ = 15 • 10–6 and λ = 50 • 10–6, respectively, with
for security analysis.
comprehensive commissioning testing and by analyzing relay
6) VT Fails event reports.
Assuming that the VT failures that cause undesired trips
are around ten times less likely than the VT failures that cause IX. REFERENCES
failures to trip, we define MTBF = 3,600 years (λ = 278 • 10–6) [1] H. J. Altuve Ferrer and E. O. Schweitzer, III (eds.), Modern Solutions
for security analysis. for Protection, Control, and Monitoring of Electric Power Systems.
Schweitzer Engineering Laboratories, Inc., Pullman, WA, 2010.
7) Generator Grounding System Fails [2] M. J. Thompson, “The Power of Modern Relays Enables Fundamental
Assuming that the generator grounding transformer or Changes in Protection and Control System Design,” proceedings of the
resistor failures that cause undesired trips are around ten times 60th Annual Conference for Protective Relay Engineers, College
less likely than those failures that cause failures to trip, we Station, TX, March 2007.
[3] J. Sykes, V. Madani, J. Burger, M. Adamiak, and W. Premerlani,
define MTBF = 10 • 360 = 3,600 years (λ = 278 • 10–6) for
“Reliability of Protection Systems – What Are the Real Concerns?,”
security analysis. proceedings of the 63rd Annual Conference for Protective Relay
Engineers, College Station, TX, March 2010.
8) DC System Wiring Errors
[4] D. Costello, “Fly Safe and Level: Customer Examples in Implementing
Experience shows that relay application and settings errors Dual Primary Protection Systems.” Available: http://www.selinc.com.
cause more protection security problems than dc system [5] Newton-Evans Research Company, Worldwide Study of the Protective
wiring errors. Hence we assume MTBF = 4,000 years Relay Marketplace in Electric Utilities, 2006–2008, Volume 1, North
(λ = 250 • 10–6) for dc system wiring errors. We assume this American Market, 2008.
value falls 80 percent (λ = 50 • 10–6) with comprehensive [6] P. M. Anderson, Power System Protection. New York: IEEE
commissioning testing and by analyzing relay event reports to Press/McGraw-Hill, 1999.
find dc system wiring errors. [7] E. O. Schweitzer, III, B. Fleming, T. J. Lee, and P. M. Anderson,
“Reliability Analysis of Transmission Protection Using Fault-Tree
9) CT or VT Wiring Errors Methods,” proceedings of the 24th Annual Western Protective Relay
Conference, Spokane, WA, October 1997.
Experience shows that relay application and settings errors
[8] K. Zimmerman, “Commissioning of Protective Relay Systems,”
cause more protection security problems than CT or VT proceedings of the 34th Annual Western Protective Relay Conference,
wiring errors, which are comparable with dc system wiring Spokane, WA, October 2007.
errors. Hence we assume MTBF = 4,000 years (λ = 250 • 10–6) [9] K. Zimmerman and D. Costello, “Lessons Learned From
for CT or VT wiring errors. We assume this value falls to zero Commissioning Protective Relay Systems,” proceedings of the 62nd
(λ = 0) with comprehensive commissioning testing (using the Annual Conference for Protective Relay Engineers, College Station, TX,
March 2009.
advanced commissioning features available in modern relays)
[10] E. O. Schweitzer, III, D. Whitehead, H. J. Altuve Ferrer,
and by analyzing relay event reports to find CT or VT wiring D. A. Tziouvaras, D. A. Costello, and D. Sánchez Escobedo, “Line
errors. Protection: Redundancy, Reliability, and Affordability,” proceedings of
the 37th Annual Western Protective Relay Conference, Spokane, WA,
10) Hidden Failures October 2010.
Assuming it takes around six months to detect a hidden [11] IEEE PSRC Working Group I-19, “Redundancy Considerations for
failure (MTTR = 0.5 years), the U = 10 • 10–6 value that we Protective Relaying Systems,” A Report to the IEEE Power System
adopted for dependability analysis represents MTBF = Relaying Committee, 2010. Available: http://www.pes-psrc.org/.
50,000 years. Assuming that hidden failures have the same [12] R. Moxley, “Analyze Relay Fault Data to Improve Service Reliability,”
proceedings of the 30th Annual Western Protective Relay Conference,
likelihood of causing failures to trip as causing undesired Spokane, WA, October 2003.
trips, we assume a conservative value of MTBF = [13] Study Committee 13, Working Group 13.06, “Final Report of the
20,000 years (λ = 50 • 10–6) for security analysis. We assume Second International Enquiry on High Voltage Circuit-Breaker Failures
this value falls to λ = 25 • 10–6 with comprehensive and Defects in Service,” CIGRÉ Technical Brochure No. 83, 1994.
commissioning testing and by analyzing relay event reports. [14] C. E. Sölver, “Past Cigré Surveys on Reliability of HV Equipment,”
CIGRÉ presentation, June 2006. Available: http://www.mtec2000.com/
cigre_a3_06/Rio/past.pdf.
178
[15] G. Mazza and R. Michaca, “The First International Enquiry on Circuit- David A. Costello graduated from Texas A&M University in 1991 with a
Breaker Failures and Defects in Service,” Electra (CIGRÉ), No. 79, BSEE. He worked as a system protection engineer at Central Power and Light
pp. 21–91, December 1981. and Central and Southwest Services in Texas and Oklahoma. He has served
[16] R. Sandoval and J. Leon, “Evaluation of Methods for Breaker Flashover on the System Protection Task Force for ERCOT. In 1996, Mr. Costello
Protection,” proceedings of the 31st Annual Western Protective Relay joined Schweitzer Engineering Laboratories, Inc., where he has served as a
field application engineer and regional service manager. He presently holds
Conference, Spokane, WA, October 2004.
the title of senior application engineer and works in Boerne, Texas. He is a
senior member of IEEE and a member of the planning committee for the
X. BIOGRAPHIES Conference for Protective Relay Engineers at Texas A&M University.
Ramón Sandoval is a protection engineer for Comisión Federal de
Electricidad (CFE) at the Topolobampo Thermal Power Station. He has Demetrios A. Tziouvaras received his BSEE from the University of New
worked for CFE since 1992 in the electrical maintenance of power and Mexico and MSEE from Santa Clara University. He is an IEEE senior
industrial equipment such as induction motors, synchronous generators, member and a member of the Power System Relaying Committee (PSRC) and
breakers, automatic voltage regulators (AVRs), and step-up transformers. For CIGRÉ. Mr. Tziouvaras previously worked at Pacific Gas and Electric
the last five years, Mr. Sandoval has been a power station protection engineer, Company, where he held various protection engineering positions, including
installing, testing, and applying different types of protective equipment principal protection engineer for 18 years. In 1998, he joined Schweitzer
commonly used in industrial plants and power systems. This includes a Engineering Laboratories, Inc., where he currently holds the position of senior
variety of electromechanical, static, and digital multifunction relays. He research engineer. Mr. Tziouvaras holds four patents and has authored and
received training in power system modeling and simulation from LAPEM coauthored more than 50 technical papers. He served as the convener of
using ATP and has worked on developing field procedures for protective relay CIGRÉ working group B5.15 on “Modern Distance Protection Functions and
testing using power system simulators and transient simulation software. Applications” and is a member of several IEEE PSRC and CIGRÉ working
groups.
César A. Ventura Santana received a BSEE degree and an M.Sc. degree in
Electrical Engineering from the Guadalajara Autonomous University in 1981 David Sánchez Escobedo received his BSEE degree in 1994 from the
and 1997, respectively. He joined Comisión Federal de Electricidad (CFE) in University of Guanajuato, Mexico, and his M.Sc. degree in 2005 from the
1983. Mr. Ventura served as a construction supervisor in the Nayarit University of Guadalajara, Mexico. From 1994 until 1998, he was head of the
Transmission Zone until 1984. From 1984 until 1997, he was a protection, Protection and Metering Office in the Western Transmission Area of
control, and metering engineer at the Jalisco Transmission Zone of the CFE Comisión Federal de Electricidad (CFE) in Guadalajara, Jalisco, Mexico.
Western Transmission Region. From 1997 until 1998, Mr. Ventura was in the Mr. Sánchez served on the faculty of the Autonomous University of
extra-high-voltage and high-voltage network studies department of the Guadalajara in 1998. From 1998 until 2000, he worked for INELAP-PQE in
protection and metering division. Since 1998, he has been head of the Guadalajara, Mexico, as a protection system design engineer. In 2000,
metering department of the protection and metering division. Since 2006, Mr. Sánchez joined Schweitzer Engineering Laboratories, Inc., where he is
Mr. Ventura has worked as head of the Western Metrology Laboratory of the currently the electrical engineering manager in San Luis Potosí, Mexico. He
CFE Western Transmission Region. He leads projects on power quality has authored and coauthored several technical papers.
monitoring, measurement and instrumentation, and metering connectivity in
the CFE Western Transmission Region.
Héctor J. Altuve Ferrer received his BSEE in 1969 from the Central
University of Las Villas, Santa Clara, Cuba, and his Ph.D. in 1981 from Kiev
Polytechnic Institute, Kiev, Ukraine. From 1969 until 1993, he served on the
faculty of the Electrical Engineering School at the Central University of Las
Villas. He served as a professor of the Graduate Doctoral Program in the
Mechanical and Electrical Engineering School at the Autonomous University
of Nuevo León, Monterrey, Mexico, from 1993 to 2000. From 1999 to 2000,
he was the Schweitzer Visiting Professor at Washington State University’s
Department of Electrical Engineering. In January 2001, Dr. Altuve joined
Schweitzer Engineering Laboratories, Inc., where he is currently a
distinguished engineer and director of technology for Latin America. He has
authored and coauthored several books and more than 100 technical papers
and holds four patents. His main research interests are in power system
protection, control, and monitoring. Dr. Altuve is an IEEE senior member.
Ronald A. Schwartz earned a BSEE from Ohio State University in 1968 and
an M.Sc. in Electrical Engineering from the University of Maryland in 1970.
He has served in the Oregon Quality Award Program as Senior Examiner. In
addition, Mr. Schwartz joined Schweitzer Engineering Laboratories, Inc. in
1998 and has served on the board of directors since February 1994. He is
currently a senior vice president for quality. Mr. Schwartz founded and served
as principal for International Quality Associates, Inc. of Beaverton, Oregon, a
consulting and training firm helping companies develop and implement
effective management systems. Prior to founding International Quality
Associates, he was employed for eight years by Sequent Computer Systems,
also of Beaverton, as component engineering manager as well as a reliability
engineer.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 179
Sadul S. Urbaez Gonzalez Jhon Albeiro Calderon Serna Luis Everley Llano Zuleta
Especialista Operación Red Especialista Operación Red Director Gestión de la Operación
surbaez@isa.com.co jacalderon@isa.com.co lellano@isa.com.co
Análisis de Perturbaciones, Alta Impedancia Este artículo tiene como finalidad dejar unos
Registros de fallas en líneas de transmisión, criterios ó pasos que se deben tener en
Descubrimiento de Conocimiento desde cuenta en los análisis de registros de fallas
Datos (Knowledge Discovery from Data: para poder determinar si una falla se puede
KDD), Minería de Datos, Inteligencia considerar de comportamiento de alta
Artificial, Algoritmos de Localización de impedancia y de esta manera tratar de
Fallas, Experiencias Operativas. obtener un dato posible de la localización del
sitio de la falla.
diagnóstico de las fallas que se presentan en A partir del proyecto anterior se generó un
el Sistema de Transmisión Colombiano. prototipo que fue aplicado por ISA para el
Dentro de todo este contexto se han logrado desarrollo del programa DAE (Diagnóstico
avances importantes en algunos proyectos Automático de Eventos) y el Diagnóstico
de investigación y desarrollo los cuales se Distribuído de Eventos (DDE).
mencionan a continuación:
Programa para Diagnóstico Automático de
“Sistema de Información de la Gestión Operativa Eventos (DAE) [5].
(SIGO)” [2].
El programa DAE actualmente se encuentra
Esta es una aplicación con la que se ha en el proceso final de pruebas para su
logrado elaborar una base de datos con puesta en servicio en el CSM y en el análisis
información especializada asociada con el
postoperativo en la Dirección Gestión de la
diagnóstico de fallas de todas las
perturbaciones que se presentan en la red Operación de ISA.
de ISA. Es decir, en la actualidad hay una
minería de datos importante del sistema de “Diagnóstico Distribuído de Eventos (DDE)” [6].
transmisión Colombiano que se encuentra El DDE es un proyecto de investigación que
disponible para ser utilizada en diversos se viene adelantando entre ISA, Colciencias
proyectos de investigación. y la Universidad Nacional. Este proyecto
pretende automatizar el proceso de análisis
“Formulación plan piloto para diagnóstico de eventos mediante el procesamiento
automático de eventos” [3]. distribuido y en tiempo real de las diversas
fuentes de información disponible en la red
ISA presentó en Julio de 2004 un trabajo en de ISA (SOE, registradores de fallas,
el cual se obtuvo la formulación para el registros de relés, Sistemas de
desarrollo de un sistema automático de Automatización de Subestaciones (SAS)
análisis de eventos a nivel de subestación entre otras).
para la subestación Ancón Sur de ISA,
basado en información de señales digitales Modelo Adaptativo de Inteligencia Artificial
de la RTU (Unidad Terminal Remota) y de (MAIA) [7].
los relés de protección SEL-321. En este
trabajo se realizó la modelación del esquema Como parte del proyecto de investigación [4]
de protección y se definieron reglas de se definieron los lineamientos generales para
diagnóstico para el análisis de los eventos procesar los registros de oscilografía con el
mediante Redes de Petri Coloreadas. Este fin de determinar los tópicos más relevantes
proyecto se desarrolló también con la para un diagnóstico automático de eventos.
participación de la Universidad Nacional de Para ello se Analizó, Diseñó, Construyó y
Colombia, sede Medellín. Validó un Modelo Adaptativo de Inteligencia
Artificial (MAIA) [7] el cual es un modelo
“Herramientas informáticas para el diagnóstico inspirado en las capacidades de hardware
automático de eventos en líneas de transmisión (conocimiento conexionista de bajo nivel:
redes neuronales) y software del cerebro
de energía eléctrica” [4]. humano (conocimiento intuitivo de alto
nivel: intuición y experticia).
Este proyecto se formuló ante COLCIENCIAS
por parte de Interconexión Eléctrica S.A. En la Figura 1 se ilustra un diagrama
E.S.P. como entidad beneficiaria y ejecutora conceptual del procedimiento para
y la Universidad Nacional de Colombia sede determinar los tópicos fundamentales del
Medellín como entidad ejecutora. El diagnóstico automático de fallas.
proyecto finalizó con éxito en el año 2008. Inicialmente los registros de
osciloperturbografía ingresan a un módulo
182
6. Clasificación y predicción: Se
seleccionaron los algoritmos más apropiados
y se obtuvieron los resultados más
representativos de clasificación de datos
orientados a la identificación de la causa de
Figura 8: Clusters que se pueden formar a partir de los
falla mediante los registros de falla.
3556 patrones analizados.
7. Combinación de algoritmos: Se evaluaron
Partiendo del conjunto de datos ilustrado en los resultados de mezclar los mejores
la Figura 8 se llevó a cabo el siguiente algoritmos identificados en el punto anterior,
procedimiento de KDD y Minería de Datos para así dar la posibilidad de mejorar la
cuyo detalle se encuentra descrito en [10] y exactitud de predicción.
en [11]:
8. Variación de parámetros: Se efectuó un
análisis de sensibilidad de los resultados
186
comparable con la inductancia de la línea entonces Figura 16. Angulo entre el voltaje y corriente de falla
el ángulo entre el voltaje y la corriente de falla en la línea Torca – Guavio 2 del evento del 21 de
estará relativamente cerca a cero: septiembre de 2004 a las 05:27 horas.
Para el método de Red Neuronal la investigación El número adimensional PI 3 está relacionado con
de [15] encontró que para la localización de las la variable de localización de la falla, por tanto es
fallas de alta impedancia resulta apropiado posible a partir de PI 1 obtener una primera
seleccionar como variables de entrada las aproximación al punto falla. Sin embargo la
cantidades superimpuestas de la magnitud del 1er gráfica presenta una pequeña inclinación en la
armónico de voltaje y corriente, |ΔVA1φ|, |ΔIA1φ|, primera mitad, por lo que para un valor de PI 1,
de la magnitud del 3er armónico de corriente existen un amplio rango de valores de PI 3, y por
|ΔIA3φ| y del cociente entre la magnitud de los consiguiente del punto de incidencia de la falla.
fasores de voltaje y corriente de 1er armónico Para la segunda mitad de la curva la inclinación
|ΔVA1φ| / |ΔIA1φ|. aumenta lo que disminuye la franca de posibles
valores para PI 3, aun así todavía es amplia, siendo
Estas variables se obtienen directamente del necesario la utilización de técnicas de Inteligencia
programa de simulación ATP mediante la Artificial (IA) para lograr disminuir la
utilización de un “MODEL”, en el que se realiza un incertidumbre asociada con estas franjas.
“script” con la transformada de Fourier para el 1er
y 3er armónico, previa obtención de la variable
superimpuesta, realizando la diferencia de un ciclo
de la señal de interés en prefalla y postfalla.
(|ΔIA1φ| y |ΔVA1φ|) debido a que, después de presente en los SEP, para presentar una solución al
hacer un análisis con las combinaciones entre problema de localización de FAI.
todas las variables que componen el sistema, se
encontró que estas dos tienen un buen Se pudo concluir que el acondicionamiento de las
señales eléctricas, realizando el proceso de
comportamiento, es decir, que puede ser
fácilmente ajustado y los datos no contienen superimposición, consistente en la diferencia en
mucho ruido, además la relación entre las dos un ciclo de la variable en prefalla y postfalla, y
posteriormente la obtención del fasor de los
variables es bastante lineal, y es posible sólo con
estas dos variables determinar el valor de la armónicos 1 y 3, permite describir mejor el
comportamiento de las variables ante falla en el
resistencia de falla, que es la variable de salida.
sistema de transmisión en comparación con los
La metodología con el sistema difuso ANFIS, acondicionamientos tradicionalmente realizados
permite la obtención por inferencia del valor de la en estas variables.
resistencia de falla para los valores de entrada
(|ΔIA1φ| y |ΔVA1φ|) calculados a partir de los El análisis adimensional suministró una práctica
herramienta para el estudio de las tendencias de
registros de osciloperturbografía. A continuación,
con este valor se selecciona la correspondiente las variables, señalando el camino para la
curva de aproximación de la Figura 19 y con ello se extracción de la máxima cantidad de información
ante una falla en el SEP. De tal manera que en la
determina la distancia a la cual se ubica la falla. En
Figura 19 de PI 1 vs PI 3, se aprecia una relación
la Figura 20 se describe este proceso.
que le permite al analista de perturbaciones tener
cierta idea de la localización del punto de falla.
CONCLUSIONES Y RECOMENDACIONES
Con relación al conocimiento intuitivo en [1] Idárraga, G.; Valencia, R.; Hernandez, J.
torno de la localización de fallas de alta “Algoritmos para Localización de Fallas en
impedancia, en ISA se ha avanzado en la Líneas de Transmisión, Análisis para el Caso
formulación de criterios prácticos para el Colombiano”. Dyna, noviembre, año/vol. 71,
análisis de los registros asociados número 143 Universidad Nacional de
mejorándose con ello la efectividad en la Colombia Medellín, Colombia pp. 95-100.
búsqueda de este tipo de fallas. Así
entonces, a partir del análisis del [2] Llano, Luis Everley. “Sistema de
comportamiento de un registro de falla Información de la Gestión Operativa
desde el punto de vista de la variación del (SIGO)”. Metodología para el Análisis de
voltaje y de la corriente desde una Perturbaciones. Interconexión Eléctrica S.A.
subestación cualquiera, se ha podido Medellín. 2000.
determinar si la falla es de alta impedancia y
con ello establecer con cierto grado de [3] ISA-UNAL. “Formulación plan piloto para
certeza un dato posible de localización. Lo diagnóstico automático de eventos”.
anterior se logra, realizando un análisis Interconexión Eléctrica S.A. Medellín. 2004.
integral considerando diversos aspectos [4] ISA-COLCIENCIAS-UNAL. “Herramientas
tales como: ángulo de fallas, deltas de informáticas para el diagnóstico automático
voltajes y corrientes, conocimiento de la de eventos en líneas de transmisión de
configuración y longitudes del circuito fallado energía eléctrica”. 2005.
y por último de la topografía por donde
cruza dicha línea. [5] Arias, Francisco; Hoyos, Andrés y
Calderón, Jhon Albeiro. “Construcción,
Finalmente, como resultado de todo el Validación y Evaluación de desempeño del
contexto anterior se ha logrado analizar, Programa DAE (Diagnóstico Automático de
diseñar, construir y validar un prototipo para Eventos)”. Interconexión Eléctrica S.A.
un sistema informático integrado [16] con el 2009-2010.
196
[7] Calderón, Jhon Albeiro. “Modelo [15] Quintero Crespo, Erwin. “Desarrollo de
Adaptativo de Inteligencia Artificial para el un Modelo para la Localización de Fallas en
Diagnóstico Automático de Fallas a partir de Sistemas de Transmisión de Energía
Registros de Osciloperturbografía”. Tesis de Eléctrica Utilizando Técnicas de Inteligencia
Maestría en Ingeniería de Sistemas. Artificial”. Tesis de Maestría. Universidad
Universidad Nacional de Colombia Nacional de Colombia. Medellín. 2010.
(Medellín). 2007.
[16] Mendoza, José D.; Calderón Jhon
[8] Llano, Luis Everley. “Diagnóstico Albeiro. “Sistema Informático para la
automático de eventos en tiempo real en un Localización Semiautomática de fallas en el
sistema de transporte de energía a través Sistema Eléctrico de Potencia Colombiano
del SOE y SCADA usando técnicas de Usando Técnicas de Inteligencia Artificial”.
inteligencia artificial”. Tesis de Maestría en Interconexión Eléctrica S.A. 2008.
Ingeniería de Sistemas. Universidad
Nacional de Colombia (Medellín). 2007.
[9] Ballesteros, David Nereo; Calderón Jhon Sadul Segundo Urbaez González
Albeiro. “Clasificación y Procesamiento de los
registros de perturbaciones de la red de Ingeniero electricista de la Universidad
transmisión de ISA”. Interconexión Eléctrica Industrial de Santander – Bucaramanga,
S.A. 2007. Colombia, en 1994, y terminó sus estudios
de maestría en sistemas de potencia
[10] Gómez, Carlos Andrés; Calderón Jhon
eléctrica en La Universidad Industrial de
Albeiro. “Análisis de Eventos de Líneas de
Transmisión [2001-2006] para la Santander-. Empleado de Interconexión
Identificación Automática de la Causa de Electrica S.A E.S.P desde 1997, donde ha
Falla Aplicando Técnicas de Minería de desempeñado los cargos de Analista de
Datos”. Interconexión Eléctrica S.A. 2007 Operación y actualmente desempeña el
cargo de Especialista de Operación de la
[11] Gómez, Carlos Andrés; Lobo, Oscar
Dirección Gestión de la operación de la
Ortega; Calderón Jhon Albeiro.
Subgerencia Técnica de Interconexión
“Identificación Automática de la Causa de
Falla de Líneas de Transmisión usando un Eléctrica S.A E.S.P.
proceso KDD”. Interconexión Eléctrica S.A-
Universidad de Antioquia. 2008.
Jhon Albeiro Calderón Serna
[12] Análisis de perturbación de la
Ingeniero Electricista de la Universidad
ocurrencia 6092003 en el circuito LT Torca –
Guavio 2 del 16 de septiembre de 2003 a las Nacional de Colombia en el año 1988 con
21:36 horas. Interconexión Eléctrica S.A. Maestría en Ingeniería de Sistemas de la
2003. Universidad Nacional de Colombia en el año
2007. Entre 1989-1993 trabajó como
[13] Análisis de perturbación de la Ingeniero de diseño en la firma consultora
ocurrencia 1532007 en el Los Palos – Ocaña
Ingeniería Especializada Blandón S.A. Desde
del evento 02 de abril del 2007 a las 17:22
horas. Interconexión Eléctrica S.A. 2007. 1993 se encuentra vinculado a Interconexión
Eléctrica S.A. donde se ha desempeñado
[14] Análisis de perturbación de la como Ingeniero del Centro Nacional de
ocurrencia 5682004 en el circuito LT Torca – Despacho (CND), Analista Postoperativo,
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 197
II. DESARROLLO
En esta grafica se observa que al momento del
FALLA TC 91030 MZD disparo no se ha recuperado el voltaje.
5 DE AGOSTO DEL 2009
1
.7
1
.7
• El día 22 de Septiembre se presenta
.5
.4
.5
.4
disturbio en Zona Culiacán provocado
.3
.2
.3
.2
por falla en TC fase B de la línea CUC-
73950-CSA en la S.E. Culiacán Cuatro
.1 .1
.07 .07 (CUC), operando protección diferencial
.05 .05
.04
.03
.04
.03
de barras de 115 kV (87B) librándose
.02 .02 la falla en 160 mseg, afectándose 199
.01
Fault I=6.6 A
.01
MW y 125,585 usuarios.
1 2 3 4 5 7 10 2 3 4 5 7 100 2 3 4 5 7 1000 2 3 45 7
CURRENT (A) • Al despejarse la falla en la S.E.
For
TIME-CURRENT CURVES @Voltage By
No.
Culiacán Cuatro se presenta un
abatimiento de Voltaje en la Zona, el
cuál tarda aproximadamente 7
Registro de medidor ION de 52030 CUC segundos en recuperarse provocando
ajustado a + - 10 % del Voltaje nominal que los bancos de las Subestaciones
Pericos (SPE T-2), Navolato (NTO T-
1), Culiacán Sur (CUS T-1) y Culiacán
Milenium (CMI T-1) se disparen por
operación de sus relevadores de
sobrecorriente de Neutro de respaldo
de baja tensión (51N).
• Adicionalmente a esta carga, operan
fusibles en 70 transformadores de
distribución (sectores) en Zona
Culiacán derivado del abatimiento de
voltaje, así mismo se dispararon
algunos elementos fusibles en
Se observa que en el registro del medidor del arrancadas de ramales de circuitos de
TR1 de S.E. CUC se detecta un disturbio de distribución y algunos fusibles de
duración 5 seg subestaciones particulares del sistema
de agua potable en la Ciudad de
Culiacán.
202
is detected. Islanding occurs when part of the electrical grid III VECTOR JUMP RELAY
is disconnected from the rest of the distribution company’s
system, but is still energized by one or more distributed The vector jump relay or voltage jump relay is installed to
generators connected to it, forming an isolated subsystem of operate the generator’s circuit-breaker coupling to the
the distribution company. Such occurrence should be distribution system, the operation principle of which is
avoided as it is a safety hazard to both people and based on angle displacement of the phase between the
equipment, as well as it can deteriorate the quality of power generator’s internal voltage “Eg” and the voltage at the
delivered by the distribution company to their customers. generator’s terminals “Vtg”.
This study analyses and presents the main adjustments made As shown in Figure 1, under the permanent regime there is
and tests run to assess and adjust anti-islanding protection dVi voltage drop between the generator’s terminal voltage
relays for synchronous generators. “Vtgi” and the generator’s internal voltage “Egi”, due to
The main relays used for this type of generation connection voltage drop caused by the generator’s current during its Xd
are small-sized, comprising phase-shift relays or “jump synchronized reactance. There is “θ” angular discrepancy
relay”, conventional sub/over-frequency relays and between the generator’s terminal voltage and the generator’s
sub/over-voltage relays. internal voltage, Figure 1a.
• Due to the new configuration that will result from Manufacturers of those relays recommend values within 4-
generator islanding, after the circuit-breaker that 12 degrees range, depending on the type of generator and
services the feed circuit substation is opened, it is grid to which they will be connected.
possible that protection equipment that still remain
in the system will suffer decrease of sensitivity and IV CONFIGURATION UNDER STUDY
incoordination, among which: fuse links, repeater
fuse keys, reclosers and circuit-breakers with The 34.5kV distribution system that was tested is located in
protection relays. the Foz do Iguaçu region, as shown in the single-wire
• The new resulting configuration may cause diagram in Figure 2, comprising the following elements.
variation of value for the supplying of voltage and
frequency for other consumers that continue to be
fed by the islanded generator, whereby those values
could be outside limits set forth by the regulating
agency, either in excess or in the lack of.
• As the distribution company’s protection
equipment has recloser relays that enable the circuit
to be reactivated should short-circuit situations
occur up to 3 times, it is necessary to install devices
to enable generators to reconnect only after they
have been checked for synchronism and voltage in
the generator’s circuit-breaker connection.
• If generators continue to feed part of the
distribution circuit after a failure has occurred and
if the protection located at the point where the
generator connects to the distribution system fails Figure 2 – Configuration of the System under Study – São
to lockout, safety problems may occur involving Vicente Feeder.
technical personnel from power companies and
outsourced personnel, as there will be energized V PROTECTION SYSTEM TO CONNECT
cables on the ground lacking activated support to
GENERATORS TO 34.5 KV FEEDERS
eliminate this type of fault.
The diagram presented in Figure 3 shows the minimum
protection system with trip points for coupling small-size
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 207
VI LAB TESTS
VIII TEST RESULTS whereby time of operation of protection units were 60-80
milliseconds.
Test 4 consists in mounting the generating unit in parallel Considering that is a low-cost type of protection compared
with COPEL’s distribution grid. to a complete protection system for generator connection
ACTION: To cause a single-phase short-circuit on the 34.5 operating in parallel with distribution systems, and based on
kV distribution grid, São Vicente circuit, at the test point, as results observed during simulations and field tests, we deem
per the single-wire diagram in Figure 2, next to the circuit that the protection system in place using a jump vector relay
source. performed as anticipated; operation involved a motor-
ANTICIPATED RESULT – Protections on the generator’s generator unit run on methane gas in parallel with COPEL’s
circuit-breaker are triggered causing it to halt operation distribution circuits for the Granja Colombari pilot project.
before the feeder is automatically started up again. The system is still operating in parallel, and quantities and
TEST RESULT – Circuit Breaker was opened when the occurrences in the generator and feeder are being monitored
vector jump relay was triggered, with 61 ms operating time via test, so that throughout a one-year period it will be able
as shown by oscillography in Figure 6, when the generator’s to define if the system is performing satisfactorily for all
current was halted. occurrences observed, thus making it possible to define that
system as a standard to create a Standard Norm for this type
of connection.
Acknowledgments
REFERENCES
X CONCLUSIONS
SUMMARY
The DOE’s vision of the future electric power infrastructure, GRID 2030, identifies microgrids as one
of three major technical cornerstones for a more reliable and congestion-free energy delivery system,
and describes distributed intelligence and clean power as key technologies needing development[1].
Microgrids are envisioned as local power networks that utilize DER and manage the local energy
supply and demand. The DERs are relatively small in size, and consequently, there is a trend towards
their integration at the distribution level. As such, microgrids increase the viability of DER in the
distribution grid by aggregating these resources into clusters that have better grid stability properties
than a collection of standalone generators. While microgrids would typically operate connected to the
national bulk power transmission and distribution system, they would have the ability to disconnect
from the grid and function in “island mode” when necessary. This would increase customer reliability
by reducing their susceptibility to grid disturbances, while offering desirable security features. In the
long term, a move towards a more decentralized power infrastructure has the potential to guarantee a
more resilient and survivable grid where faults and/or infrastructure damage remain localized.
Historically, a distribution network consisted passive loads dispersed along radial feeders originating
from a substation with one or more connections to the bulk electricity system. A typical feeder would
have reclosers or sectionalizers spaced down its length with manually operated tie switches to other
feeders. Automatic control was limited to basic reclosing operations. SCADA control and monitoring
was minimal. Communications, if available, was limited to low bandwidth radio or dial-up circuits.
Local distributed generation was virtually nonexistent. A microgrid is essentially a distribution
network wherein local distributed energy resources (DERs) are utilized to supply some portion of the
electric power and/or local heating demands and can be operated in an autonomous mode. Microgrids
will often have no pre-existing communications network or control system. Microgrids may not have
dedicated operating personnel. A microgrid could be formed from a utility distribution network, an
industrial complex, a university campus, or a remote community.
Recently, new forms of renewable generation technologies utilizing non-traditional energy sources
such as wind, solar, biomass, or waste heat have been developed. As well, energy storage
technologies such as electrolyzers and hydrogen generators (e.g., fuel cells) have emerged and have
been coupled to the renewable generation as a way to mitigate renewable intermittency. In addition to
210
renewables, conventional (dispatchable) generation may also be integrated into the distribution
system. The resulting evolution in the makeup of the distribution network leads to the concept of a
microgrid.
Widely recognized technology gaps discourage the use of microgrids. In particular, their low inertia
environment is not presently conducive to the interconnection of inverter-based assets typically used
by renewable or clean power/energy sources, and existing protection systems are inadequate.
Furthermore, the limited generation capacity in these grids, coupled with the intermittent nature of
renewable energy sources, creates the need for more intelligently coordinated operation of generation
and loads to ensure a more stable and effective use of the available energy. Finally, controls and
protection to allow more autonomous separation and re-integration with the bulk grid have been
developed, but need to receive regulatory and end user acceptance and be fielded and commercialized
more rapidly.
KEYWORDS
BENEFITS
At a high level, the interest in microgrid power systems is driven by a growing desire to locate DER
closer to load centers. This interest in DER is being fuelled by a number of factors, including:
• Transmission congestion, and logistical problems with siting new transmission lines make it
appealing to site DER in distribution systems to cope with new loads.
• Utilization of DER can help utilities defer investments in generation and transmission capacity.
• DER have the potential to offer increased total energy efficiency when used with combined heat
and power (CHP) or combined cooling heat and power, and can therefore reduce energy costs.
• When appropriately integrated, DER have the potential to improve power availability and quality.
• Distributed systems offer potential security advantages over centralized systems.
• DER promote fuel diversity (e.g., biomass, landfill gas, flare gas, wind, solar) and therefore reduce
overall energy price volatility.
• Renewable DER such as wind and solar photovoltaics provide emissions-free energy.
• DER offer a quicker solution with regards to installation, lead time and siting relative to
centralized generation.
While all of these benefits make DER attractive, the primary concern at the utility level is the system
operation and protection issues associated with the existence of a large number of independent power
producing assets operating without coordination. Microgrids offer a framework that resolves this
concern through the aggregation of DER into well-behaved entities that can be dispatched by the
utilities.
ENERGY STORAGE
The previously mentioned benefits are augmented through the incorporation of energy storage. With
proper control, energy storage can offset the intermittency/variability inherent in renewables -
achieving a higher utilization of these resources; allow dispatchable generators to operate closer to
their maximum theoretical efficiencies; and improve microgrid transient stability by responding
quickly to power imbalances.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 211
OPTIMAL DISPATCH
Economic Dispatch is the process of allocating the required load demand between the available
generation units such that the cost of operation is minimized. Cost of operation is typically defined by
fuel cost but can include maintenance or other costs. Furthermore there may be additional constraints
imposed such as the need to minimize the production of greenhouse gas or the need to accommodate
CHP applications. While considerable work has been done on similar problems in the power system
community[2],[3], the important contributions of this work are:
1. The ability to include future predicted values of loads, renewable generation, and fuel and
electricity prices
2. The ability to In addition to dispatch power while simultaneously dispatching heat, optimally.
3. The ability to commit and de-commit various assets such as diesel gensets, hydrogen (fuel cells
plus electrolyzers), solar, wind, and hydro renewable generation, combined heat and power (CHP)
units, and electrical and thermal storage.
The microgrid optimal dispatch algorithm uses a technique known as model predictive control. This
technique makes use of historical data in the form of daily, weekly, and annual load profiles; hydro,
wind, and solar forecasts; and fuel or electricity market pricing information (if a bulk grid connection
exists). Given these predictions the algorithm determines the cost of operation for a fixed time period
into the future, typically 24 hours. Then, it optimizes the objective function of an optimization
problem that models this cost of operation in order to determine the required control actions. These
control actions include selecting the machines to be operated at any given time, selecting a machine
for isochronous control and selecting the remaining machines for droop control. The algorithm
determines when energy should be stored and when it should be returned to the system. It determines
the best power reference point for each droop machine and for each storage device.
Forecasts
Model
The dispatch algorithm includes an advisory mode whereby the algorithm recommends the optimal
operating point for each resource to the HMI but does not automatically carry out control actions.
OPTIMIZATION
The cost function data required to compute the costs associated with a particular dispatch profile
includes the following:
5. Startup costs for each of the three different types of units (pure electric generation, CHP, and pure
heat generation) depends on the unit and the time it has been off. Note that the startup cost is only
applied at the first time step at which the generator is turned on.
The total predicted cost for the system, neglecting the startup costs of the units, is given by
N + t0
∑ (∑ C f (i, t )) + (∑ Cl (iel , t )) + C g (t ) (1)
t =t0 i iel
where, Cf (i, t) represents the fuel consumed by unit i at time t, Cl(iel, t) represents load shedding cost
at load iel at time t, and Cg(t) represents the cost of importing from the grid (or the price of exporting to
the grid).
This cost must be minimized subject to various (linear) constraints such as upper and lower bounds on
power generation from various machines, ramp rate constraints. The following assumptions are made
to the problem to allow it to be formulated in the manner described:
1. Fuel curves are approximated by affine or convex quadratic functions. In many important cases,
the fuel consumption is in fact an affine function of power generated. This is also true in all cases
where the efficiency is constant over the operating range of the unit.
2. It is assumed that cost of import form the grid is always greater than or equal to price of export.
This is true in practice.
3. For CHPs, the relation between heat and power is assumed to be linear.
4. Startup costs are taken into account outside the convex optimization routine.
The overall optimal dispatch problem can be formulated as a convex optimization problem in dual
form by converting each of the constraints and cost functions into convex constraints.
For a background in convex optimization theory sufficient for the discussion in this section, see [4].
Assume that u(i, t) are given over the prediction horizon {t ∈ Z : t0 ≤ t ≤ t0 + N}. A convex
optimization problem is described by:
max(b′y ) (2)
subject to
A′y ≤ K ⋅ c (3)
where
Note that each of these variables is defined at every time step. For example, if there are Ne pure
electric units, all of which are dispatchable, and we are using a prediction horizon of N steps, then Ye
is of dimension Ne × N.
In order to solve an optimal dispatch problem for a specific microgrid using the optimization code
developed by the GE Global Research Center, only a few high-level details of the assets in the
problem need to be specified. The algorithm generates the appropriate matrices and vectors of the
large-scale optimization problem, and calls an open-source solver CLP (Coin-or-Linear Programming)
solver distributed under the common public license (CPL) [4]to solve it. The solution provides
supervisory control set points for all dispatchable generations, loads, and grid generation as a function
of time.
Each DER will include local control loops that regulate real and reactive power, or alternately,
frequency and voltage at given reference points. The central controller provides a supervisory control
layer for the microgrid. The central controller monitors the state of all resources in the system. The
dispatch algorithm is processed, and resulting control actions are sent back to each DER. Inputs to the
system include the power generated by each DER and the power consumed by each load Control
actions include starting/stopping a DER, Changing the power reference point of a DER, changing the
control mode of a DER (isochronous or droop), opening/closing a breaker, or changing an IED setting.
The microgrid control system (MCS) is composed of a central controller, a communications network,
and a local HMI for configuration and monitoring.
Setup Tool
Loads
Power generated,
Renewable On-line status
generators Availability Microgrid
Controller
Power generated
Power consumed Power generated, Start/Stop Start/Stop
State of charge On-line status Isoc/Droop Input Pref
Online status Availability Output Pref Output Pref
Availability
Dispatchable
generators
Storage
Devices
The dispatch algorithm is implemented on an embedded processing platform. The main processor is a
Freescale PowerPC 8270 running the VxWorks operating system with 64 MB of nonvolatile RAM
(disk on chip). The processor has a native floating-point engine. A separate processor handles
communications. The Modbus RTU protocol is chosen in order to support a wide range of devices
including PLCs, smart meters and protective relays. Both Ethernet and serial media are available. The
214
Since DERs and loads are likely to be dispersed across the microgrid, a communications network is
required to transport data between the central controller and remote devices. The communications
network should be well suited to application in the distribution system. It should support both
centralized and distributed control schemes. Ethernet is envisioned as the best choice in terms of
topography, reliability, cost, and ease of installation and maintenance.
Ethernet provides a flat architecture that is easily extendable and supports multiple protocols in order
to accommodate a broad range of devices. Ethernet provides encapsulation over IP (tunneling) for
serial asynchronous multi-drop protocols including Modbus. For ranges of 100-2000 metres, multi-
mode fiber-optic cable is recommended. This medium is immune to ground potential differences and
transients generated by faults or switching events. For longer distances (up to 10 km) Ethernet radios
are used to extend the communications network. These devices employ frequency hopping, spread
spectrum radio. This transmission method is highly immune to interference. The topology is point-to-
multipoint with a provision for multiple access points for further reliability. Security features include
encryption using RC4-128 with automatic key rotation and authentication using 802.1x, and CHAP.
The Bella Coola project is an initiative to install a hydrogen assisted renewable power (HARP) system
in community of Bella Coola which is part of BC Hydro’s non-integrated service area. The Hydrogen
storage system has been designed by Powertech Labs and the microgrid control system by General
Electric with key components supplied by Hydrogenics Inc. and Dantherm Power.
The Bella Coola power system is comprised of two generating plants and two communities. The Ah
Sin Heek (ASK) generating station has six diesel generators ranging in size from 300 to 2500 kVA.
Clayton Falls is a run-of-river, hydro-electric plant with two generators having ratings of 700 and 1400
kVA. A single 25 kV feeder connects the two generating stations with the community of Bella Coola
tapped from this circuit. The community of Hagensborg is tapped from a second feeder which is fed
from the ASK station. Bella Coola and Hagensborg have summer/winter peaks of 2.1/1.5 MW and
2.6/1.7 MW respectively.
There is no interconnection with the bulk power system. A hydrogen energy storage system has been
installed at the ASK station. This system is made up of a 320 kW Hydrogenics electrolyzer capable of
converting electricity to hydrogen at a production rate of 60m3/h, a 100 kW fuel cell which uses
Ballard Power’s air cooled stacks that have been packaged by Dantherm Power, and a hydrogen
storage system. The storage system receives hydrogen from the electrolyzer at low pressure (150 psi).
A 50 horsepower compressor compresses the hydrogen to high pressure (500 – 2850psi) and feeds a
storage system with a capacity of 13920 litres.
The compression of hydrogen requires energy, however a much larger footprint and larger number of
storage tanks are required if hydrogen is stored with no additional compression.All of the hydrogen
storage components have been containerized and factory tested in order to simplify installation and
commissioning at site. The hydrogen storage system also provides energy for a hydrogen-powered
service vehicle to be used by the operating staff.
The aim of this project is to increase the utilization of the Clayton Falls hydro plant by storing energy
as hydrogen when appropriate and returning this energy to the system at optimal periods in order to
reduce the consumption of diesel fuel and the corresponding emission of green house gas.
216
SIMULATION RESULTS
The dispatch algorithm has been tested using Matlab. The input to the simulation is the system loading
and renewable contribution captured by the Bella Coola logging system. The response of the diesels
and storage is modeled within Matlab. The plot of Figure 6 shows the results over 1 day period. Note
that the electrolyzer operates during periods where the load is at a minimum. The fuel cell provides
power to the system during the period of peak loading. The overall action of the storage system serves
to produce a relatively flat output from the diesels.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 217
CONCLUSIONS
This paper described a Microgrid Control System (system architecture, control algorithms and
hardware) that offers: optimal dispatch of distributed energy resources (DER), intentional islanding
capability, and electrical load / energy management. The MCS technology addresses the complexity of
electrical demand, heat and power generation, and power distribution challenges. It also addresses the
need for energy security, continuous operation, and environmental concerns by reducing carbon
footprint. DERs within the microgrid are equipped with communications and local controllers that
respond to supervisory commands to regulate real power, reactive power, frequency, and/or voltage.
Intelligent electric devices located elsewhere in the microgrid provide system loading, voltage, and
frequency information and carry out switching operations. The MGS implements a centralized,
supervisory control layer. It polls all resources, executes central control algorithms, and sends
resulting control commands back to each resource. The core of the MCS technology is currently under
development by GE Digital Energy on an MCS product platform that enables:
BIBLIOGRAPHY
[1] GRID 2030—A National Vision for Electricity’s Second 100 Years”, United States Department of
Energy, Office of Electric Transmission and Distribution, July 2003.
218
[2] Electric Power Systems Applications of Optimization. James A Momoh, Marcel-Dekker, 2001
[3] MatPower software, Ray Zimmerman et al., http://www.pserc.cornell.edu/matpower/
[4] Lectures on Modern Convex Optimization. Aharon Ben-Tal and Arkadi Nemirovski, MPS-SIAM
Series on Optimization, 2001.
[5] COIN-OR LP, a simplex solver; https://projects.coin-or.org/Clp
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 219
RESUMEN
Derivado a los avances tecnológicos actuales que tienen El sistema de apoyo para la calibración de instrumentos de
los equipos relevadores de protección multifunción protección se desarrolló para los relevadores de protección
digitales así como de los modernos equipos de prueba de generadores y considera la verificación contra los errores
para comunicarse y ser controlados por medio de un definidos por el fabricante del equipo. Utilizando como
protocolo definido, es posible diseñar con las funciones plataforma de desarrollo LabVIEW se diseñaron las
necesarias para crear una aplicación que se comunique a funciones de calibración automatizada para los relevadores
los equipos para modificar la configuración, enviar de protección Beckwith M3425, Beckwith M3425A, Sel300G
comandos y extraer datos de todos los dispositivos que y Sel387, el sistema se denomina “CalBeck” y se emplea
intervienen en el proceso de una evaluación operativa que para obtener información de las lecturas de los diversos
se le realiza a un relevador de protección. Este parámetros a tomar en cuenta para calcular el porcentaje de
documento presenta las características del software de error de los equipos mencionados anteriormente, también
calibración automatizada de relevadores de protección obtiene y almacena información de los relevadores en un
denominado CalBeck, el cual fue diseñado en lenguaje informe en formato Excel. El sistema configura la fuente de
grafico LabVIEW con el fin de optimizar las tareas y alimentación para aplicarlo al relevador de protección
reducir tiempos de ejecución en las evaluaciones seleccionado, respalda la configuración actual del relevador,
operativas a los relevadores de protección y utilizando las configura al equipo para su correcta operación
macros de un sistemas de poder DOBLE F6150 con el (dependiendo de la función a verificar), aplica el
que se generaran las condiciones de falla para las procedimiento de calibración automáticamente, se obtienen
protecciones con las que cuentan estos equipos, limitando las lecturas y finalmente genera un informe de calibración
los errores humanos en la captura de información y en la en los formatos establecidos.
programación de los equipos.
DESARROLLO
INTRODUCCION
El sistema de calibración automatizada de relevadores de
La correcta operación de las funciones de protección protección CalBeck surge de la necesidad de facilitar el
dentro del proceso de generación en la CFE, requiere de trabajo rutinario del personal de protecciones, entre otras:
equipos que se encuentren en óptimo estado de
operación y dentro de los rangos de exactitud Automatizar las pruebas, eliminando en gran parte el error
establecidos por el fabricante del equipo de protección humano que se presentaba en calibraciones manuales.
digital multifunción. En el método tradicional de Permitir a los usuarios realizar otras actividades sin
calibración, la captura de la información se hace en forma necesidad de estar sujetos a estar realizando mediciones
manual, lo que lo hace una tarea meticulosa y expuesta a cada cierto tiempo (durante la elaboración del presente
errores por parte del personal que realiza la calibración. documento, un relevador de protección Beckwith M3425
Con la verificación de operación automatizada de los se encontraba en proceso de calibración).
relevadores de protección multifunción se aprovecha la
tecnología con que cuentan los equipos digitales para El software de calibración automatizada de los
realizar los comandos y extraer la información relativa al relevadores de protección, es un sistema informático que
sistema de protección. sustituye funcionalmente las tareas que se realizan de
manera manual, actividad en que se empleaban hasta dos
días por cada relevador. Actualmente con este desarrollo,
un relevador de protección se calibra en todas sus
funciones en aproximadamente 12 hrs (dependiendo de
las funciones existentes en el equipo).
• Software de calibración.
• Equipo Doble F6150
• Relevador de Protección Beckwith o Schweitzer (SEL)
Los componentes del sistema de calibración pueden ser proceso de calibración, a éstos se les respalda toda su
descritos como sigue: configuración interna en un archivo con extensión “CSV”.
La aplicación tiene la capacidad de leer y modificar los
La PC es en donde se encuentra el software desarrollado parámetros de cada función y así calcular en función de
para la calibración de los relevadores de protección ellos los valores de las señales aplicadas por el equipo de
Beckwith ó SEL soportados; debe enviar de acuerdo a los referencia para tener los puntos de operación programadas.
procedimientos de prueba del relé, datos específicos al Se establece la comunicación a través de un puerto RS232
equipo de referencia (DOBLE F6150) para aplicar señales utilizando el protocolo propietario. Al terminar las pruebas
analógicas de corriente y voltaje al equipo en prueba ó de calibración se les restablece la configuración original.
sometido a calibración (SEL ó Beckwith). Al mismo tiempo
debe establecer comunicación vía RS232 con los equipos CARACTERISTICAS
bajo prueba para leer, modificar y restablecer la
configuración y parámetros de cada una de las funciones Las principales características del software CalBeck se
que se calibran en el equipo. La PC es la encargada de describen a continuación.
calcular el error en la prueba y de generar el reporte
correspondiente. Durante el proceso de calibración es necesario enviar datos
El equipo de referencia (DOBLE F6150), es el encargado e instrucciones necesarias para controlar la operación de
de generar voltajes y corrientes con las características de cada uno de los equipos tanto para el equipo de referencia
amplitud, frecuencia y fase, necesarios para originar las como el equipo en prueba. Los mecanismos de
condiciones de operación del equipo en prueba, todos comunicación para cada equipo son diferentes, funciona de
estos datos son enviados por medio de un puerto RS232 manera distinta por lo que se realizan procesos separados y
y utilizando las DLL´s proporcionadas por el fabricante diferentes para su comunicación.
para establecer los mecanismos de comunicación. El
equipo F6150 tiene además integrada una variedad de El equipo DOBLE F6150 es en este caso el equipo de
algoritmos especializados para realizar pruebas sobre los referencia, es un simulador de sistemas de potencia que
equipos, dichas algoritmos son llamados MACROS. Con cuenta con alta potencia, flexibilidad y un software para
las MACROS se pueden hacer pruebas para determinar correr pruebas de simulación sobre esquemas de protección
el tiempo de operación (DELAY), el valor en el que entra y relevadores tanto electromecánicos como los
en operación la función (PICKUP). microprocesados.
Para los fines de calibración se aplican las siguientes Los mecanismos de comunicación para el equipo Doble
macros: F6150 se realiza a través de una DLL. La DLL recibe
información acerca del equipo y el puerto de
comunicaciones que se utilizará y con esta información
BSRHOI = BUSQUEDA BINARIA DE CORRIENTE realiza el trámite con el sistema operativo para solicitar los
BSRHOV = BUSQUEDA BINARIA DE VOLTAJE
TIMEI = TIEMPO DE CORRIENTE
servicios de comunicación. Además también se le envía
TIMEV = TIEMPO DE VOLTAJE datos de configuración como son el número, tipo, rango,
PHROTI = RAMPA DE FASE nombre de las fuentes.
SSIMULT= PRUEBA DE TRES ESTADOS
LRAMPF = RAMPA DE FRECUENCIA Los relevadores de protección del Generador M-3425 y M-
3425A, SEL300G y de grupo SEL387 son unidades
Los equipos en prueba (SEL300G, SEL387, Beckwith microprocesadas que usa tecnología de procesamiento
M3425 ó M3425A), son los que estarán sometidos al
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 221
digital de señales para proporcionar más de veinte programa y al final es este mismo archivo que se utiliza para
funciones de protección de generadores. restablecer la configuración del equipo. En dado caso que
exista un error en la ejecución del programa y no se
La nomenclatura sigue los estándares de ANSI/IEEE restablezca correctamente el equipo de prueba, existe la
C37.2-1991, Estándar de Números de Función de opción de manera automática que se detecte que no se ha
Dispositivos de Sistema de Potencia Eléctrica. Los seis restablecido correctamente y no se realiza un nuevo
contactos de entrada pueden ser programados para respaldo, se solicita que se realice una restauración manual
bloquear cualquier función de relevador y/o disparar el solicitando el nombre y ubicación del archivo de respaldo al
registrador de Oscilografía. Cualquiera de las funciones terminar esto se sale del programa. También en esta parte
o los contactos de entrada pueden ser programados si la comunicación y el archivo de respaldo es correcto, se
individualmente para activar uno o más de los ocho modifica la configuración para apagar todas las funciones
contactos de salida programables. disponibles ajenas a la función a probar en el equipo para
que en el proceso de calibración no influyan con disparo
El mecanismo de comunicación para estos equipos es a erróneo. Solo se enciende la función a probar.
través de un protocolo de comunicación documentado e
implementado por el fabricante, el protocolo es el BECO
2200 para los relés Beckwith y ASCII SEL para los relés EJECUCIÓN DE LA PRUEBA DE CALIBRACIÓN.
SEL con el cual se pueden ejecutar comandos tanto de
lectura como de escritura hacia el equipo. Para la Aquí se selecciona la función a calibrar del equipo Beckwith,
implementación de este mecanismo no se requiere el de esta se leen los parámetros de configuración. Con los
uso de alguna DLL, por lo que el trámite de solicitud de parámetros de configuración se calculan los valores de
recursos con el sistema operativo para el manejo de un prueba que serán aplicados por el equipo de referencia
puerto de comunicación se realiza directamente desde F6150, se enciende la función a probar y se envía la
la aplicación desarrollada. información al equipo de referencia de la macro a utilizar para
activar la macro de prueba, se espera el resultado de la
Para la calibración se realizan una serie de pasos con los prueba y se calcula el error según criterios del fabricante para
que se pretende seguir correctamente los procedimientos determinar si el equipo pasa o no la prueba. Una vez
de prueba y calibración de CFE. En esencia estos pasos ejecutada la prueba y calculado el error se genera el reporte
pueden dividirse en 4 grupos de tareas de salida y luego se apaga la función seleccionada a fin de
que esta no opere en alguna otra prueba y garantizar que la
prueba que se realizo es únicamente de esta función.
CONFIGURACIÓN DE EQUIPOS.
Estos pasos se realizan en cada función a calibrar. Se pueden
enumerar de la siguiente forma:
En esta parte del algoritmo se realiza la identificación de
los equipos tanto de referencia como del equipo en Selección de la función a calibrar.
prueba, estableciendo los mecanismos de
Lectura de los parámetros del equipo para la función
comunicaciones necesarias. Durante esta etapa se realiza seleccionada.
una búsqueda del equipo de referencia y de prueba de Se selecciona el tipo de prueba, PICKUP o DELAY.
dos modos en forma manual y en forma automática. En la Se calculan los valores de prueba según los parámetros
forma automática, el usuario le indica al software en que
de la función.
puerto se encuentra cada equipo para que realice la Se envía estos valores de prueba a la macro a utilizar en
búsqueda en esos puertos, en dado caso en que el la calibración, esto es si la prueba es de PICKUP O
usuario seleccione el modo automático el software DELAY.
realizara la búsqueda de un equipo en todos los puertos
Se enciende la funciona a calibrar y se hacer correr la
disponibles hasta encontrarlo, si encuentra el equipo en macro de prueba.
algún puerto quitara este puerto de la lista de búsqueda Se calcula el error según el resultado obtenido y la
para el siguiente equipo. En dado caso que no encuentre exactitud del fabricante.
el equipo informará que no se encuentra disponible y
Se genera el reporte de la calibración y se apaga la
terminará el programa. función seleccionada.
RESPALDO DE PARÁMETROS DEL EQUIPO EN Existen 5 modos de ejecutar las pruebas, en estos modos
PRUEBA. básicamente la diferencia es la ejecución de manera
automática. Los modos son los siguientes:
Al encontrar los equipos en la búsqueda se establecen
los mecanismos de comunicación con el equipo a través Calibrar prueba: en este modo de operación solo se
del sistema operativo y ya se está en posibilidad de ejecuta una de las pruebas seleccionadas en la
enviar la configuración al equipo de referencia. También función que se está trabajando al colocarse sobre la
en este punto ya se tiene la comunicación con el equipo macro a utilizar, si no hay macro seleccionada no se
en prueba lo que permite empezar a generar una ejecutará la prueba y marcara un error en el modo.
lectura de todos los parámetros del equipo y guardarlos Solo se puede ejecutar una prueba al dar inicio, no se
en un archivo de respaldo con extensión “CSV”. La ruta podrán correr más de una de manera consecutiva.
del archivo se mantiene durante toda la ejecución del
222
PRUEBA. Estos botones operan de manera general en envían al reporte final. Cada tabla es diferente y dependen de
toda la aplicación. El botón “Inicio” inicia propiamente la función seleccionada.
dicho el proceso de calibración según el modo de
operación, habilita la función a calibrar y enciende la
macro de la prueba, si se desea abortar la prueba se
oprime el botón “Abortar Prueba” que estará habilitado
al momento de iniciar una prueba. El botón “Salir” es
para abandonar la aplicación y automáticamente se
inicia el proceso de restauración de la configuración del
equipo en prueba.
En la pestaña de resultados se muestran las tablas con La comunicación se realiza a través de puertos seriales.
los datos y resultados de cada una de las pruebas La integridad de los datos es verificada con cálculos
realizadas, esta una vista preliminar de los datos que se frecuentes de códigos de seguridad CRC´s.
CONCLUSIONES
224
Abstract-- This contribution focuses on loss of field protection phase system. In addition the large reactive power
and introduces the admittance measuring technique. The consumption can trigger an wide area voltage collapse. To
theoretical background is covered extensively to facilitate a prevent, or at least limit the duration of these harmful effects
clear description of the factors associated with loss of field loss of field protection (Siemens call it under-excitation
(under-excitation). Apart from deriving the stability limits, the protection) is required to detect this under-excited condition,
transformation is described of the capability diagram to the and initiate timely disconnection of the machine.
admittance plane and consequently the admittance and
impedance measuring techniques are compared. After The protection function may be implemented in different ways.
introducing the „Admittance measuring technique“ and typical The impedance measurement [1, 2], is a widely applied
protection characteristics some practical applications are measurement principle. Amongst other reasons this technique
described. These are primarily focused on the different was chosen due to the widespread and proven use of
methods for deriving the setting values. The simplicity of impedance measuring elements in electro-mechanical relays.
converting impedance setting values of existing relays to Approximately 40 years ago, Siemens however adopted a
admittance settings is also illustrated. Setting and test different route [3, 4]. A solution was found, which on the one
recommendations are given. With examples from transient hand may be directly derived from the capability diagram of
tests with a RTDS system and real loss of field faults the the generator and on the other hand was immune to
transient behavior and the reaction of the protection is fluctuations of the generator voltage. This required a
demonstrated. transformation of the generator diagram to the admittance
plane and the processing of admittance measured values.
KEYWORDS-- Generator protection, numerical protection, II. THE CAPABILITY DIAGRAM OF GENERATORS
loss of field, under-excitation, static stability, impedance To aid the following dissertation, the definition of the
measurement, admittance measurement fundamental electrical quantities is provided hereunder:
EV V2 xd - xq
P =3 sin ϑ + 3 sin2ϑ
xd 2 xd xq
(1)
EV V2 xd - xq
Q =3 cosϑ − 3 (1 + sin 2ϑ )
xd xd xq
(2)
Figure 3: Vector and capability diagram of the salient pole generator (xd ≠
with: E rotor voltage (field e.m.f.) as a phase to star point xq)
voltage in p.u.
V terminal voltage (a phase to star point voltage) of the From these diagrams it is apparent that the operating range of
generator in p.u. the generator is limited:
xd synchronous direct axis reactance in p.u.
xq synchronous quadrature axis reactance in p.u. In the over-excited range:
ϑ rotor angle (angular displacement) by the power supplied by the turbine and the excitation (rotor
values) and in the under-excited range:
Note: If the phase-to-phase voltage representation is used in by the power supplied by the turbine, the stator limits or the
equation (1) to (4) the factor 3 must be removed. stability limit.
For operation on an interconnected system, the actual
In the case of turbo generators the equations (1), (2) are (practical) stability limits apply. These take into consideration
simplified as the direct axis (xd) and quadrature axis (xq) the superseding reactances (e.g. unit transformer) which are
reactance are approximately the same. always present, and a security margin (approximately 10%
reserve at changing load). The actual admissible value for
stability is therefore smaller than the theoretical value. The
EV
P=3 sin ϑ manufacturer of the generator specifies the limits that must be
xd (3)
adhered to with the capability diagram. As in figure 1, various
representations and scales of the axes can be found. These may
have dimensions (MW, Mvar) or be dimensionless or per unit
EV V2 values (p.u.). The latter representation is preferred. If the
Q=3 cosϑ − 3 values in a dimensioned characteristic are divided by the
xd xd (4) nominal apparent power, the result is the p.u. representation.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 227
The following figures 4 and 5 provide an example of a turbo Compared to the value at nominal voltage, the stability limit is
generator and salient pole generator capability diagram. shifted to the right during under-voltage conditions and further
limits the amount of reactive power that may be imported. The
influence is proportional to the square of the voltage. The
over-voltage conditions are not critical as the stability limit is
shifted to the left in this case.
The foregoing explanations apply to slow variations of system
conditions. During sudden changes of load or system
conditions, transient quantities apply, and a transient response
will occur. Therefore a dynamic stability limit also exists. To
reach a simplified approximation, the transient values (x’d, x’q
and E‘) are applied to equation (1) and (2) [5]. In figure 6 the
basic result is shown. For this purpose it was assumed that the
steady state and transient quadrature axis reactance is the
same. From the diagram it is apparent that the machine may
Figure 4: Capability diagram of a turbo generator
even remain stable in the “dynamic” condition with a rotor
angle >90°. An analogy with the turbo generator can also be
found. In this case the dynamic stability limit is determined by
the transient direct axis reactance. In practice the limit is also
greater than 90° and is in the range between 110 and 120°.
V2 0,9 2 0.81
theorectical stability
At : V = 0.9 : Q = − =− =−
dynamic limit
stability
xd xd xd limit
under over
excited excited
2 2
V 1,1 1.21 Q [p.u.]
At : V = 1.1 : Q = − =− =−
xd xd xd V2
xd
V2
x’d
Figure 7: Summary of the statements regarding stability limits
228
For both generator types - salient pole and turbo generator - limit is exceeded. As a result of the slip an additional flux
the stability limits (steady-state and dynamic) are calculated in appears in the excitation circuit or an additional induced rotor
an example by using equation 1 and 2. voltage appears which attempts to maintain the armature
The following data are used: reaction of the machine at a constant level. This is apparent
from figure 10 where in the range between 90° and 180° the
Salient pole generator: excitation current increases significantly again. Only shortly
Generator terminal voltage V =1.0; before 180° is the rotor accelerated towards the stator pole
Rotor voltage E = in steps (0; 0.25; 0.5; 0.75; 1.0; 1.68) (zero load state with inverted pole). This large acceleration
Reactances: xd = 1.0; xq = 0.6; xd’ = 0.3; causes large slip and thus increased influence by the damper
windings. When ϑ = 180° the flux change and therefore the
Figure 8 shows the calculation results. The “half” circles (no longer measurable) rotor voltage becomes equal to zero.
represent the P= f (Q) for different angles (from 0° to 180°) As this takes place in an inductive circuit, the zero crossing of
and the selected rotor voltage E. The stability is reached at the the excitation current and the measured rotor voltage is
maximum of the active power (dP/dϑ = 0). The practical delayed. The rotor is now decelerated until it almost reaches
steady-state stability is calculated with a safety margin of 9 %. synchronous speed as the synchronising torque shortly after ϑ
For the dynamic stability limit the same calculation was done = 180° becomes very large. The result of this is a high torque
with the transient direct axis reactance. impulse that is also noticeable as a significant real power
Turbo generator: impulse (refer to Figure 10a). The mechanical power driving
Generator terminal voltage V =1.0; the machine is however too large to allow a recovery and the
Rotor voltage E = in steps (0; 0.4; 0.8; 1; 1.5; 2.51) machine will continue slipping. Between ϑ = 180° and 360°
Reactances: xd = 1.919; xq = 1.885 xd’ = 0.35; and also between n 180° and (n+1) 180° this sequence is
repeated. Some deviations apply during the transient state
Figure 9 shows the calculation results for turbo generator. before the steady state slip condition is reached. The reactive
power minimum following the first torque impulse therefore
has a different value compared to the following swing cycles.
Dynamic Theoretical Practical
stability limit steady-state steady-state
2.0
stability limit stability limit
2
The swing and transient conditions are particularly severe in
P[p.u]
P1
i
the salient pole machine due to the difference in direct axis and
P3
i
1.5
quadrature axis reactance. The slip changes dramatically
during one cycle.
P5
i
E=1,68
P6
i
1
P dy 1 E=1,0
i E’=0
P dy 2
i
E=0,5
Sthy 0.5
a
Spry
a
Stdy
a
E=0 Q[p.u]
3.5 3 2.5 2 1.5 1 0.5 0 0.5 1
cosφ 1/xd
E’=0,25
1/xq
0.5 0.5
1/x’d
3.5 Q 1 , Q 3 , Q 5 , Q 6 , Q dy 1 , Q dy2 , Sthx , Sprx , Stdyx , Q N 1
i i i i i i a a a
2
2.0
P3
i E=2,51
P6
E’=0
i
a)
1
P dy1
i
P dy2
i
Sthy
a
0.5
Spry
a
Stdy E=0,8
a
cosφ
E’=0,4
1/xd Q[p.u]
1/x’d
0.5 0.5
P Q
G= B=−
V2 V2 (8)
b)
Figure 10: Loss of synchronism condition on a 30-MVA-salient pole
generator (caused by rapid loss of excitation) with P= 0.8, ie =1.3*ie0 [3]
[a) course of power flow; b) excitation signals (ie =excitation current, ie0=
zero load nominal excitation current, ve = excitation voltage, ve0 = zero load
excitation nominal voltage]
Figure 11: Capability diagram of the generator and admittance diagram
III. ADMITTANCE MEASURING PRINCIPLE The protection measuring algorithms are based on the
equations (5) and (8). The vector signals are derived from the
As mentioned in the introduction, the transformation of the sampled instantaneous values in the 3 phase to ground voltages
capability diagram into the admittance plane has the distinct and the 3 phase currents. The positive sequence components
advantage that when using the p.u. representation, a direct are calculated from these vectors. According to the definition
reference to the generator capability diagram is provided, that in equation (5), the positive sequence voltage and current
is independent of the actual generator voltage. components are employed to calculate the active and reactive
The transformation is explained by the following equation: power. Division by the positive sequence voltage V1
according to equation (8), results in the transformation from
The equations (5) and (6) describe the fundamental definition the power plane into the admittance plane. To avoid over
of the complex power and the complex admittance. functions in the case short circuits close to the generator
terminals an undervoltage blocking is implemented. The
S = V ∗ I* S = P + jQ (5) threshold is fixed at V1 = 25 % of the nominal voltage.
Figure 7 can be used to extract the characteristics required by
the protection functions. The given static stability limit must
I be monitored. Generally 2 lines are sufficient for this purpose.
Y= Y =G + jB
V An additional threshold value which depends on the dynamic
(6)
with: Y admittance stability limit applies. From the area of extreme under-
G conductance (real component of the admittance) excitation (on left of char. 3), it is highly unlikely that the
B Susceptance (reactive component of the admittance) machine will recover to the stable operating range. Fast
tripping is therefore required in this case. This is different if
The relationship for the transformation can be derived by the static stability limit is exceeded (char. 1 and 2 in figure
multiplying in equation (6) with the conjugated complex 12). In this case, if the excitation voltage is still sufficiently
large, a recovery by the machine to the stable operating range
voltage.
is not inconceivable. The monitoring of the excitation voltage
(Vexc <) is therefore introduced as an additional criterion.
I ⋅ V* S* P − j Q P Q This criterion controls the tripping time of char. 1 and 2. In
Y= = = = 2 −j 2
V⋅V *
V 2
V 2
V V this way, over functions as result of transient transgression of
(7)
the static stability limit due to dynamic impulses that are
followed by a recovery to statically stable conditions, are
Comparing the coefficient in equation (6) and (7) it results prevented.
in the definition of the admittance values. To set these characteristics, the setting parameters that consist
of the intersection with the B-axis as base point of the line, and
the inclination, are applied. The angle of inclination may be
derived from the generator capability diagram (refer also to
230
section 5). The setting should be such that it is close to the the origin), the transformation of the theoretical stability
given stability characteristic. The excitation circuit controller characteristic to the impedance plane results in the section of a
characteristic supersedes this. circle. This transformation is illustrated in Figure 13. All
The setting threshold of excitation voltage supervision is points to the left of the stability limit in the capability diagram
approximately 50% of the no-load excitation voltage (Vexc0). are located inside the semi-circle (shaded area) in the
impedance plane.
Figure 12: Characteristic of the admittance protection (turbo generator) Figure 13: Transformation in the impedance plane
[8](At salient pole generators char.1 is approximately 1/xd +1/2(1/xq -1/xd)
and char.2 is approximately 1/xd with α2 = 100°) Conversely, the characteristics in accordance with IEEE [1]
can be converted to the per unit generator capability diagram.
The protection response resulting from the characteristics in The following rule must be observed here: circles which do
figure 12 is the following. To avoid over functions by the loss not pass through the origin, will again give circles when
of field protection due to transient phenomena (e.g. out of step inverted. Figure 14 shows the transformation. It is apparent
conditions) a time delay is recommend. that in comparison to the admittance principle (refer to figure
characteristic 1, 2 exceeded, excitation voltage monitoring 12) this provides a much rougher approximation of the
(Vexc <) not picked up stability characteristic. This measuring principle cannot detect
This condition must be alarmed, and when configured, if the stability limit provided by the generator manufacturer is
tripping with long time delay (approx. after 10 s) is carried continuously exceeded by a small amount. The control system
out. (MEL) or the operating personnel must be relied upon to
characteristic 1, 2 exceeded, excitation voltage monitoring detect such failures. Alternatively, additional monitoring (e.g.
(Vexc <) picked up additional impedance circle) must be provided.
For this condition, tripping with short time delay (approx. The greater margin is however of advantage during dynamic
0.5 s to 1.5s) is required. situations (transient transgression of the stability
characteristic 3 exceeded characteristic). Such incidences do not result in pick up, or
only result in transient pick up, by the protection. Additionally,
For this condition, tripping with short (0.3 s), or no time
the significant points, as well as the rules for the
delay (after transient studies) is required.
transformation are indicated in figure 14.
Figure 12 shows additional the characteristic of the
minimum excitation limiter (MEL), which is a control
function. The MEL acts to limit the reactive power (Var) flow
into the generator. When the reactive power flow into the
generator excesses the MEL setpoint, the MEL becomes active
to increase terminal voltage which reduces the reactive power
in-flow. The voltage increase continues until the reactive
power flow is reduced below the MEL setting [9]. The loss of
field protection must be coordinated with the MEL. The MEL
realization should also consider the voltage behavior due to a
reduced terminal voltage (see figure 7).
Figure 13: Transformation in the impedance plane
phase system. The current is leading (capacitive). For testing To get from the users practical loss of field failures is very
the behaviour during an undervoltage situation (shift of the seldom. Figure 20 shows such a record and the analysis with
characteristic to right (see figure 7)) the test voltage and the graphic tool SIGRA. During the commissioning of a pump
current must be reduced by the same ratio. Shall be the test storage station it was not possible to open the generator circuit
done with 90% of the rated voltage, than the voltage and breaker. The generator was in the pump mode (motor
current for the 100% case must be multiplied by the factor 0.9 operation). By the operator the field breaker was opened. On
(e.g. test point (I): V = 0.9 * 120V/√3 = 108V/√3 and I = 0.9 the left side of the figure the phase voltage and current is
* 2.8 A = 2.52 A).
shown in RMS values. Below are the binary traces. The pickup
and the trip event are recorded. The event “Exc<U< Trip”
means that the trajectory is over characteristic 1 and additional
the field voltage supervision (Vexc<) picked up. The time
delay was set 1 sec. The loss of excitation voltage can be seen
by trace TD3. The right side of the figure shows the calculated
impedance and power. The cross in the P, Q plane marks the
trip by loss of field protection. While the generator CB was out
of service the breaker failure protection becomes active and
tripped the high voltage CB after a delay of 0.5 sec. The open
Figure 17: Testing of the loss of field characteristic
high voltage CB can be seen by the interrupted phase current.
Ch1 ( l )
Load
was simulated with a RTDS system. The protection measures Ch2 ( l )
point
the phase current from the star point side and the phase to
Ch3 ( m )
50
characteristic 3, because for the characteristic 1 and 2 a time Figure 19: Calculated admittances
delay of 10 s was set. Figure 18 shows the stored fault record
from the device. To get a better overview only one phase (B =
L2) plus the important binary traces are drawn. A reduction in
the voltage and increased phase current can be seen. The
binary traces show the pickup (trajectory is over char. 1) and
the trip via char. 3 (Exc<3 TRIP). In addition figure 19 shows
the calculated admittance and the used characteristic 1 and 3.
The time between the crosses is 50ms. The longer distance
indicates an increasing of the slip, which can be clear seen if
the trajectory crosses char. 3 (left straight line).
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 233
VIII. CONCLUSION
The static stability limit is given by the generator capability
diagram. This limit is closely matched by the admittance
measurement. It correctly takes into consideration the
influence of the generator voltage on the capability diagram.
The loss of field of both basic generator types, salient pole and
turbo generator, was explained at length. The fundamentals of
the stability limit and the signals that influence it were
discussed. Subsequently the transformation from the capability
diagram to the admittance plane, admittance measuring
technique and implementation of the under-excitation
protection function, was looked at. Furthermore the differences
relative to the impedance measurement and the transformation
of the capability diagram to the impedance plane were dealt
with. The section “Applications” was dedicated to the
calculation of the setting values and showed the different
solutions. The scope of testing is reduced to a minimum by
employing numerical technology. A method for the
verification of characteristic setting values was shown.
Additionally the transient performance of the loss field
protection was briefly demonstrated with two examples.
BIBLIOGRAPHY
Summary: Currently the detection of The oil samples taken from the top and
turn to turn faults in Transformers are bottom of the tank during testing were not
hard to detect because transformer conclusive to assure that this unit had any
differential relays are set to detect faults internal problems since at the moment of
in the Differential zone using positive the trip, the unit only had 20 MW. In
sequence components. If the negative addition to the low load condition, the
sequence component is added to the ambient temperature was mild and this did
differential protection, turn to turn faults not allow the oil to be uniform inside the
can be detected in a secure way. This tank.
report introduces a new algorithm for
transformer differential protection, And in this way, with the analysis of the
which will guarantee the detection of event records by protection personnel, and
both, turn to turn faults and faults within tests performed by substation personnel
the zone of protection. This algorithm and chemical engineer, it was not clear that
works in transformers and generators. the A phase unit was damaged, so the
question was still in the air…..
The analysis of the validation of the The current angle of the negative
protection model, which will be sequence, before and during the fault, is
demonstrated below, will focus only on the shown on Figure 4.
magnitudes and angles of the negative
sequence currents before, during and after
the fault (validation of protection model was
done with all three sequence components).
The sample rate of the oscillography is 240 Figure 4 IW12 and IW22 angles values a) before
Hz or 4 samples per cycle. fault b) during fault
Low side windings from the Mathcad With the above charts, the protection model
model. is validated.
IA _ H 2
I 22 = Eq. 1
IA _ X 2
IA _ H 1
I11 = Eq. 2
IA _ X 1
Where:
I22 is the result obtained from the relation
Figure 6 Low side negative sequence current
angles vs. Low side current angle
of two negative sequence phasors
IA_H2 is the negative sequence phasor of
high side winding
IA_X2 is the negative sequence phasor of
low side winding
The angle that results from the difference Figure 19 shows phasor I22 with a value of
of the High side and Low side negative 1 during an external fault.
sequence phasors show a similar behavior.
This is shown in Fig 16.
Figure 18 Negative sequence differential phasors Figure 20 Voltage chart at generator terminals
during through fault
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 241
Figure 21 shows all six currents which do As it can be seen in Figures 22 & 23, the
not seem to register any change due to this positive sequence relationship value has
failure. little change during this type of fault. Is this
small change sufficient to detect the fault
by the relay?
In Figure 26 it can be seen that the Figure 28 shows current fault information
algorithm has detected and is ready to with low resistance and Figure 29 shows
send a trip signal in less than a 1 cycle the same fault with high resistance with
from when the fault occurred and it does cosine complete cycle algorithm and half
not have to wait 325.6 ms that it takes with cosine cycle algorithm outputs.
the traditional protection method that is
used in almost all power plants for
insulation failures. It fits to mention that the
differential relays did not operate for this
fault, due that they only work with positive
sequence phasors.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 243
Annex 1
Annex 2
INTRODUCTION
The performance of transmission line protection relays when a fault occurs in the system is
important for improvements in the stability of the system and reduction of their effect on
sensitive loads. Reducing the fault clearing time for more possible fault conditions is one of the
main goals in the development, application and setting of such relays.
The operating time of a transmission line protection relay is a function of many different factors.
Some of them are related to the operating principle and the design of the relay itself. The paper
analyzes the impact of errors in the line impedance parameters on the accuracy of the short
circuit currents and voltages calculation, the settings of the distance and overcurrent relays and
the fault clearing times for different line lengths and fault locations. The accuracy of the fault
location calculation is also affected. This paper explains the difficulty of k-Factor settings and
points out cost effective solutions for preventing incorrect behaviour of distance protection
schemes.
The inaccurate values of the mutual coupling of parallel transmission lines are another important
factor that may affect the operation of the relays for faults involving ground. This is also
discussed in the paper.
The transmission line impedances used for short circuit currents calculation and the setting of
distance relays are normally derived from the results of a line constants program calculation or
systems studies. Due to the large number of influencing factors (e.g. wire types, spiraling and
average sag of the wires, shield handling on cables, specific soil resistivity) these calculations
can be prone to error.
Actual measurement of the fault-loop impedance is the best way to ensure that the distance and
overcurrent relay settings are correct. The second part of the paper describes an advanced
method for these measurements and calculations that provide the impedance data for the
different applications that use it. Comparisons of estimated and measured line impedances are
presented at the end of the paper.
Measuring mutual coupling between power lines can be done using a similar method.
IMPORTANCE OF K-FACTORS
To protect an overhead line or a power cable protective relays are needed. When a fault occurs
on the line, such as an arc between phases or against ground, it has to be cleared safe, selective
and fast. Selectivity means that the line is only switched off, if the fault is really on this very line
[1].
There are two basic methods to obtain selectivity on power lines, differential protection or
distance protection. The better principle is the first one, but there is by far more effort involved,
because the relays on both ends of the line need to communicate with each other. This paper does
248
not further discuss this method. For cost reasons on most power lines distance protection relays
are used.
One of the most important settings of a distance protection relay is the Positive Sequence
Impedance, which is half of the complex impedance of the phase to phase loops (Figure 1).
When a fault occurs the distance relays on both ends measure the impedance. If the impedance is
(typically) below 80% or 90% of the line impedance they switch off as fast as possible (zone 1),
because it is for sure that the fault is on this very line. If the impedance is higher the relay
switches off delayed (≥ zone 2), to give another relay that might be closer to the fault the chance
to clear it first.
On faults of one or more phases against ground, the impedance of the fault loop is different
(Figure 2). Because the impedance of the ground path, or to be more precise, of this ground loop,
is different, a factor within the relay gives the relation between the line and the ground
impedance. This factor is called ground impedance matching factor or simply k-factor, as it is
often referred to.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 249
If the impedances or k-factors of a relay are not set properly, zone over- or under-reaches will
occur (Figure 4).
In the example above three relays instead of two see the fault in zone 1 and trip, a second power
line is dead. The customer lost power for no reason. Besides the damage of customers having no
power, the risk of loosing system stability becomes also higher by such false trips.
Z0
k0 = (1)
Z1
Because Z1 is the impedance of one line it is also referred to as ZL quite often.
ZL = Z1 (2)
The ground (or British "earth") impedance ZE can be calculated from the Zero Sequence
Impedance as follows:
Z0 − ZL
ZE = (3)
3
Defining the ground impedance this way, obviously leads to strange results with a negative
inductive component in ZE, as soon as the three-phase to ground inductance is much smaller than
the inductance between two phases. This is the case on some power cables when the shield is
close to the conductors but the conductors are relatively far from each other. This fact is of no
further concern; it is just good to know that it can happen.
Another possibility to express the relationship is the ratio of ground to line impedance.
ZE
kL = (4)
ZL
kE or sometimes referred to as k0 are other common names for this definition. One has to be
careful how a k-factor is defined before using it.
Splitting the complex impedances ZE and ZL into their real and imaginary parts R and X defines
real ratios, this leads us to the third commonly used definition.
RE X
and E (5, 6)
RL XL
Conversions between the different k-factor formats are possible.
k 0 = 1 + 3k L (7)
For converting from the format (5) and (6) to the other formats the other line constants (or at
least the line angle) have to be known.
RE / RL XE / XL
kL = + (8)
1 + jX L / R L 1 − jR L / X L
The line angle can be used to obtain the ratio XL / RL that is needed for the conversion in (8).
tan(ϕL ) = X L / R L (9)
Distance protection relays use algorithms that make use of these different k-factors to convert all
phase to ground faults, so they can be assessed as if they were phase to phase faults. This allows
using the same zone polygons independent from the line geometry. Because different relays can
use different algorithms, identically measured voltages and currents may lead to different
calculated impedances depending on the algorithm used.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 251
Details of these algorithms [2] are not further discussed in this paper; it is only to mention that
the entry format of the k-factor does not allow deducing which algorithm is used by the relay.
CALCUALTION OF K-FACTORS
Up to now the effort to measure line impedances and k-factors was so great that it has hardly
been done. To obtain the this data it had been calculated manually using physical constants, or by
using appropriate software tools [3] like PowerFactory from DIgSILENT, PSS from Shaw PTI or
CAPE from Electrocon, to name a few. The parameters needed to calculate the line impedance
are many.
The geometrical configuration is needed (Figure 5):
• height above ground and horizontal distance for each phase conductor and each ground
wire
• average sag of the line and ground wires at mid-span
for old installations where often a mixture of different cable types is used – and not documented
too well either.
In general it can be said that the calculation of the Positive Sequence Impedance works quite
well and in general sufficient for the Zero Sequence Impedance as long as the ground or ground
wire is a consistent good one. When the ground wire or shield is not a very good conductor and a
large component of the fault current is flowing back through the soil, things tend to become
complicated. The influence of the ground/soil resistivity, pipes, other buried metal structures, and
the accurate distance of the wires above ground, make it very difficult to determine the
impedance along the whole length of the line (especially in complicated landscape geometry and
multiple infrastructure crossings).
Another cause for concern is that a huge number of parameters are involved in the calculation of
line parameters. If one parameter is wrong this might cause a substantial error. In the Positive
Sequence Impedance there are several, but even more prone to error is the Zero Sequence
Impedance or k-factor, because they need accurate parameters for their calculation.
On several occasions when our team found incorrect relay settings it was the Zero Sequence
Impedance or the k-factor that was in error. But we also had the situation that two similar lines
were just mixed up.
MEASUREMENT OF K-FACTORS
Compared to the effort for accurate calculations, the actual measurement of line parameters
including the k-factor is today relatively
simple.
The measurement of the line impedance
requires the use of specialized equipment
that includes several components:
• test set comprising a frequency
variable amplifier
• signal coupling unit
• ground protection device Fig. 6 – Test equipment for line Z measurement
The test set used for the line impedance measurements is multi functional, frequency variable
device for various tests on primary equipment. It may be required to generate currents up to
800A or voltages up to 2000V. Support for various automated tests on CTs, VTs, power
transformers or other primary equipment is necessary to improve the efficiency of the primary
testing process.
In the application of line impedance measurement it is used as a frequency variable power
generator, measurement tool and analyzer. Due to the variable frequency generation it is possible
to generate signals first below then above mains frequency. Using a digital filter algorithm
allows measuring frequency selective at the frequency that is currently generated, this means all
other frequencies but the generated one are filtered out. Any disturbances at the mains frequency
from nearby equipment or lines are therefore ignored during the testing.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 253
The coupling unit is used for galvanic decoupling of the generated signals in the output direction
and analyzed signals in the input direction. The decoupling is needed mainly for safety reasons.
For optimization of the performance it is an advantage to have a range selector switch and a built
in voltmeter for a quick check of any induced voltages or high burdens.
The protection device is a safety tool for easy connection to the overhead line or power cable.
Existing grounding sets of the substation may be used. In case of unexpected high voltage on the
power line due to faults on a parallel system, lightning discharges or transients due to switching
operations, the protection device should be capable of discharging short transients or
permanently shorting fault currents of up to 30kA for at least 100ms. These safety features are
necessary to allow the user safe operation even in critical situations.
The measurement is performed with currents between 1 and 100A depending on the line length.
Using frequency selective measurement allows using injected currents a fraction of the size of
the nominal currents. To ensure high accuracy of the measurement the highest current range for
the given line length is chosen. Measurements on lines up to 270km (123 miles) have been
performed so far.
Overall seven measurements per system are made, three for each combination of phase to phase
loops, three for each phase against ground and one for all three phases against ground. There is
some redundancy in these measurements, allowing reliability crosschecks and calculation of
individual k-factors for each phase. The latter seems strange at a first glance, but especially for
short lines having a symmetrical line is not a priority, leading to very different values for the
phases. This results in smaller k-factors and avoids zone overreaches in most cases.
The actual measurement results can be loaded into Microsoft Excel allowing easy post
processing; the results are displayed in a format for direct usage in relay settings (Fig. 7).
Results are shown in the graph of Figure 9, and it is interesting to note that the positive sequence
impedance measured values matched the calculated values within 3.5% on average. This
validated the overall measurement results in the mind of the utility.
Comparison of Z Meas to Calc
16.000
14.000
12.000
10.000
Ohms
8.000 Z1 Meas
Z1 Calc
6.000 Z0 Meas
Z0 Calc
4.000
2.000
0.000 Z0 Meas
B- U- O- D- Z1 Meas
V- L- O-93 G-
262 151 301 212 Z- U- A-27 O-67 I-269 Z-26
568 272 163 182 411 A- Q-
573 225
Line Name
2.50
2.00
1.50
Mag
1.00 k0 Meas
k0 Calc
0.50
0.00
B- U- O- D- k0 Meas
V- L- O-93 G-
262 151 301 Z- U- A-27 O-67 I-269
212 568 272 Z-26 A- Q-
163 182 411
573 225
Line Name
In the analysis of the results the utility wanted to arrive at a conclusion as to why the traditional
method of calculated zero sequence was so far off. It was previously thought that the physical
data was accurate and sufficient for good results. The conclusions drawn were:
1) The ground resistivity "assumption" of 100 ohm-meters may be in error.
2) How often the cable circuits are actually bonded to ground and where.
3) Neutral wires are not run on overhead construction; however no consideration is given
to under-built distribution (4 or 13kV with a neutral cable).
4) Is there a big water pipe, gas pipe, railway, or other infrastructure in the ROW?
If these variables can be accounted for then the calculated values may become closer to the
measured values results.
CONCLUSION
Today the costs and effort for Line Impedance and k-Factor measurements are a fraction of what
they used to be. Measurements showed that for several reasons calculations often gave wrong
results. Therefore, both measurement and calculation will be done in future. Safe, selective and
fast failure clearance is only possible, if all relay parameters are set properly. Line impedance
and k-Factor are of highest importance for a fully operational distance protection relay.
REFERENCES
[1] A. Apostolov, B. Vandiver, "WhyShould We Measure Line Impeadence?", Proceedings
Georgia Tech Relay Protection Conference 2007, OMICRON electronics Corp, USA.
[2] W. Doemeland, Handbuch Schutztechnik, Huss-Medien GmbH, Berlin, Germany, 48-49
[3] S. Kaiser, 2004, "Different Representation of the Earth Impedance Matching in Distance
Protection Relays", Proceedings OMICRON User Conference in Germany 2004, OMICRON
electronics GmbH, 11.1-11.5
[4] A. Dierks, 2004, "Accurate Calculation and Physical Measurement of Transmission Line
Parameters to Improve Impedance Relay Performance", Proceedings Southern African Power
System Protection Conference 2004, Eskom Enterprises, 143-149
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 257
When in island mode, if one of the internal generating sources to shed, the controllers can implement the secondary shed
trips off-line, the load-shed scheme must compensate for the criteria based on under frequency and under voltage. Typical
lost internal generation. settings for these quantities would be:
The decision as to whether to shed load and how much load Then shed the next priority of load.
to shed is based on the measurement of the dynamic load- Note that it is necessary to coordinate the underfrequency
generation balance. The internal plant load is calculated by elements on the generator protection relays with the islanded
summing the power flows on feeds into the plant, specifically: underfrequency load-shed values. As is shown in Figure 5 in
the test results, the setting engineer also needs to take into
Load = PG1 + PG 2 + ... + PGn + Ps1 + PS 2 + ... + PSn (1) account frequency undershoot under certain control situations.
Controller 1 Controller 2
failures in the breaker monitoring system and/or failure in the as are typically available on the system IEDs. Examples of the
break racking system. In the double-point implementation, in type of information that can be mapped to an LED include
order for a breaker to be declared “open”, the “a” contact has to system status, breaker status, scheme operational information,
be open and the “b” contact has to be closed. If both the “a” device status/alarms, and communication system alarms.
and “b” contacts report the same value, a ”Breaker a/b
Mismatch” alarm can be issued. For dependability, a critical Pushbuttons on the controllers can be used to:
breaker status can be monitored by two different relays and an • Enable/Disable the system
“OR” used to detect a breaker open. • Reset latched LEDs/Alarms
When detecting an open condition, it is desirable to include • Reset events
debounce timing to the contact to provide a better level of • Change operating breakers
security that the open condition was not a result of a transient
coupled voltage in a parallel conductor. For shorter lengths of In addition to status and alarm information, high and low-
wire (less than 50m), a 8ms debounce time is adequate. For speed oscillography can be provided with high sample rates up
longer runs, debounce times as long as 20ms may be required. to 15,360 samples per second and low-speed rates (based on
Debounce time can be shortened through the use of an active Synchrophasors) of up to 60 samples per second. The high-
impedance on the digital input. When a change of voltage is speed oscillography is designed to capture faults whereby the
detected on such an input, the impedance of the input takes on low-speed oscillography can provide a view into the dynamics of
a low value to more quickly drain any capacitive charge. After a plant. The various oscillographies can be triggered by
some time, the impedance is raised resulting in a current draw functions such as over or under frequency, over or under
in the 1 to 2ma range. voltage, and rate of change of frequency. A single
Additionally, line outage detection can be validated by looking synchrophasor record can span over 40 minutes in length.
at the line current. Given that the measured line current is less Fifteen-minute phase current, MW, and MVar demand
than a set value AND the fact that a breaker open was detected, information can typically be logged and retrieved for load
a line outage can be more securely declared. Note that a value analysis.
of “Zero” for the current is not used as current from a CT can
often have a residual tail that would significantly delay the
detection of zero current. With the tail described, a zero current G. Live Islanding Tests
detection could take 10 to 12 ms – adding security and only
slightly slowing down the overall declaration of an island Below are results from a load-shed system that was tested in
condition. two actual plant-grid separation situations, namely: - Scenario 1,
Generator
Slowing
∆t = 1.66 sec
Island Created
Nominal - 180°
Voltage ∆t = 1.78 sec
0.87% Fig. 5 V1 Synchrophasor Angle Response to Over-powered Island
Voltage Drop Creation
MW less than the internal plant load. This scenario was 59.50
designed to execute the “shed” commands. As mentioned
59.00
earlier, the arming levels were temporarily lowered to force the
arming of the respective load shed tiers. Prior to islanding, it was 58.50
noted that all 3 Tiers were “armed” and ready to operate upon
58.00
detection of the island condition. The recovery from the 4.55 MW
deficit was to be made up of two sources, namely, a 3.5 MW 0.00 10.00 20.00 30.00 40.00
motor shed and spinning reserve (chosen at 5%) of the gas Tim e (sec)
turbines.
V. Vita
In today’s power systems, growing demand, aging infrastructure, system constraints as well as the
increasing renewable energy portfolio have increased the need for utilities to find new ways to
manage their system and increase reliability. One area that is surfacing as a potential solution to
this is what is commonly referred as the “holy grail” of the industry or energy storage. The utility
industry is the only industry that does not have a common warehouse or inventory of the product
they produce. When a customer turns on a light switch, the power is generated immediately. To
store this power in a warehouse has not been done economically in the past.
That all being said, energy storage is not a new market as we have seen many types of systems
over the years, such as compressed air, pumped hydro, flywheel, Ultra-capacitors and
Uninterruptible Power Supply (UPS) systems. They all have various levels of storage capability
and have a purpose where they can add value to a utility grid.
The applications for energy storage has been well documented by a report written by Sandia
National Laboratories1 and has broken it down to the following areas: Electric Supply, Ancillary
Services, Grid Systems, End User/Utility Customer and Renewables Integration. Some of the
largest benefits to the utility market have been discussed to be in the areas of ancillary services,
capital deferrals, load shifting, peak shaving and renewable energy.
Energy Storage has two components that are the basis of the design. Each Energy Storage
System (ESS) needs to have a power component (kW rating) and an energy component (kWh
rating). Another way to look at it is how much power do you need and for how long do you need
it? A 1MW system for 15 minutes of storage would have a 250kWh energy rating.
The development of batteries has helped grow momentum in the energy storage market. A
typical Battery Energy Storage System (BESS) has three main areas: 1) Battery and Battery
Management System; 2) Power Conditioning System (PCS) and 3) AC Grid. The type of
battery used in the system defines the amount of power and energy ratings of the BESS system.
A typical system can look like the Figure 1 below.
The inverter lineups are sized to handle the power rating of the battery string. The DC battery
connections are bussed to the individual inverter modules where it is converted to a regulated AC
voltage. The AC output from the inverter modules is connected to a common AC bus and then to
the low voltage AC circuit breaker where it is available as a three phase AC output. The line side
of the AC breaker can be connected to the secondary side of the step-up transformer. Each
inverter lineup is connected to its own secondary winding on the transformer which acts as an
isolation.
The power conversion from DC power to AC power in the PCS is performed by using IGBT-
based inverter modules. The module is a four-quadrant switching-mode converter, i.e. the power
flow through the converter is reversible. Shown in Figure 2 is an inverter module with the side
cover removed. The AC power output from the inverter needs a combination of reactors and
capacitors for filtering to minimize harmonics. See schematic of a three-phase inverter bridge
and filter scheme in Figure 3.
Typically the individual inverter modules can be hard paralleled to add up to the kW output
needed for the system. The inverters are sized for the power, temperature, altitude, additional
reactive power support as needed for the application.
RFI
In case of an internal failure, the faulty module can be automatically disconnected and the
remaining system can continue operation at slightly reduced power. If the inverter modules are
complete three phase units, it is also possible to remove complete modules within a PCS lineup
and continue operation at proportionately reduced power.
The PCS system allows control of both real power (P) and reactive power (Q) based on the
system requirements. Advanced control features in the “Generator Emulation” mode of operation
make the PCS look like a traditional synchronous machine to the power system. In addition the
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 265
The PCS can have Statcom capability (VAr control). Additional control modes could include
high and low voltage ride through, auto-island functionality and black start capability.
There are two areas of concern when discussing the protection of the Battery Energy Storage
System. First, protection of the BESS system itself, second, removing the BESS from the system
for external faults.
Figure 5
Typical 2MW BESS System
Each of the batteries is controlled by a Control unit (Battery Management System or BMS). The
Control unit is in turn controlled by the Power Conditioning system Master Controller. The PCS
Master Controller determines if the batteries are needed to supply real power (discharging), or if
not fully charged, to charge the batteries. The Master Controller with BMS, based on the system
needs and past history, can determine which battery to use. The battery modules are protected by
a DC breaker, contactor, or a fuse.
Using a combination of high speed semiconductor fuses, and dc and ac breakers, the BESS
system is covered for most conceivable internal fault contingencies.
Before discussing external fault performance of the BESS system let’s examine the overload
capability.
266
Table 1
BESS Overload Capability
From table 1 it can be seen that the output of the BESS is limited to 200% rated power for 3
seconds. A 2 MW BESS can supply 4 MVA short circuit power for 3 seconds before shutting
down.
Islanding Detection
One of the criteria in IEEE 1547 is to detect an Islanding condition in 2 – 4 seconds. Often times
decaying frequency has been used as a measurement of the islanding condition. In contrast to a
synchronous generator whose frequency will decrease if the electrical power needed exceeds the
available mechanical power. A BESS maintains constant frequency under overload conditions.
Classical means of detecting an islanding condition where the load is much greater than the
generation is to use under frequency relays. This approach isn’t viable in BESS applications.
It’s possible through the Master Controller to impress a small high frequency ripple on the 60 Hz.
Under normal non-islanding conditions, the output of the BESS is just a small portion of the total
generation, so the percent of this high frequency current in relation to the 60 Hz current in small.
However, during islanding conditions, when the BESS is separated from the system, even though
the amount doesn’t change, the percent becomes much higher, and is easily detected by frequency
relays.
During normal operating conditions a BESS can either supply MW into the utility system
(discharge) or it can absorb watts from the system to charge the batteries,
Figure 6
Charging/Discharging Characteristic of BESS
Figure 6 shows the typical charging and discharging currents for a Battery Energy Storage
System. Note the currents are mostly resistive. Applying a directional overcurrent relay to detect
a fault condition doesn’t look promising at first glance. Since overhead lines, cables, and
transformers are mostly inductive in nature, we know that fault current in a given phase lags the
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 267
phase voltage by 75º to 85º. A directional relay can be used to detect external faults as shown in
figure 7.
Fig. 7
Directional Overcurrent Relay Setting
The directionality of modern microprocessor relays can be defined by setting the Relay Operate
Angle, and Maximum Torque Angle to achieve the desired response. The fault current is limited
to twice normal current, and the duration fault current is supplied from the BESS is limited to 3
seconds. These factors must be taken into account when setting the directional overcurrent relay.
Other relays can be used for the detection of faults and isolation of the BESS from the system.
For instance, an impedance relay can be used looking into the system from the BESS system.
Although feasible, it’s not economically desirable on small 2MW systems.
Conclusion
With the advent of more and more wind generators, and solar projects being placed on the utility
grid, Battery Energy Storage Systems will find there way to level out the peaks and valleys these
devices generate. It’s a prudent protection engineer that understands these new concepts before
they are placed on their system. This paper introduced a typical BESS, and discussed its
construction, operation, limitations, and finally, protection.
Since these are solid state devices, not rotating machines, some rethinking of the normal
protection philosophy needs to be done to assure the BESS gets disconnected in a timely manner.
References
1) “Energy Storage for the Electricity Grid: Benefits and Market Potential Assessment Guide”,
Sandia National Laboratories Report # SAND2010-0815, February 2010. Jim Eyer and Garth
Corey.
2) “Application of Battery Energy Storage In Power Systems” W.R Lachs, D. Sutano , IEEE
Catalog Number 95TH8025
4) PCS100 ESS Grid Connect Interface for Energy Storage Systems User Manual,
2UCD19000E001
Biographies
Roger Hedding graduated from Marquette University and joined Westinghouse Electric Corp. After
receiving a Masters degree in Electrical Engineering from the University of Pittsburgh, Roger became a
District Engineer, and eventually moved to Milwaukee where he currently resides. As a Relay
Development Consultant he guides the development of relay products for the North American market.
Roger is a IEEE senior member, and Secretary of the IEEE Power Systems Relay Committee. Roger has
authored or co authored many papers in power systems protection. His hobbies include playing golf,
traveling with his wife, and playing with his grandchildren.
Pat Hayes is currently an Account Manager for Energy Storage Systems for ABB Inc. Pat has been in this
position for the past eight (8) months and is responsible for Sales and Marketing of Energy Storage
Systems in the North American market. Prior to this, Pat was an Account Manager for ABB Inc, where he
had been employed for the past thirteen (13) years. At this role, Pat was responsible for managing sales,
developing commercial contracts, supporting ABB and ABB legacy products from specification through
retirement and providing technical assistance for projects associated with large Investor-Owned Utilities
(IOU's). Prior to ABB, Pat worked with WESCO for five (5) years in a few different roles. The last role
was a Sales Engineer supporting utilities in the Minnesota and Wisconsin areas, with main responsibilities
including sales and technical support with primary interest on metering systems. Pat has taught at metering
schools held at the Chippewa Valley Technical College in Eau Claire, WI. Pat has been an IEEE member
for 20 years and served on the Planning Committee for the Minnesota Power Systems Conference for the
past 10 years. Pat has a BS in Electrical Engineering from the University of North Dakota.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 269
Abstract— This paper s ummarizes t he co ntent o f th e I EEE II. BENEFITS & JUSTIFICATION FOR DIFFERENT TYPES OF
C37.233 Guide f or P ower S ystem P rotection T esting. T he TESTING
guide pr esents t est a pproaches, de finitions, a nd pr ocedures
both for the components and the overall protection and control Traditionally, the protection and control systems are designed
systems. I t co vers s uggested req uirements f or P ower S ystem to identify local faults based on voltage, current, and frequency
Protection Scheme Testing, S ystem A pplication T ests determined at a specific point on the utility system. The
(including the scope and level of tests) , and benefits of testing protection and control system is designed to isolate the faulted
the overall p rotective s chemes. T he G uide d escribes t he area. Changes in the operation of the power system, in terms of
methods, extent, a nd ty pes o f s ystem te sts fo r p rotection location and connection of generation sources, transmission
applications at var ious vol tage l evels. C ontrol f unctions capacity, and load demand, and changes in power system
inherent to the protective systems a re i ncluded. D esign t ests, equipment such as the growing availability of reliable wide
commissioning tests, r outine m aintenance t ests, a nd o ngoing
area communications result in changes in some basic
performance a ssessment t ests a re d escribed w ith d iscussion o f
what each of t hese t est categories aims to accomplish. T est of philosophies of the protection and control system. For
equipment u sed i n t he s ystem p rotection s cheme, associated example, wide-area protection schemes and system integrity
communications equipment, auxiliary po wer s upplies, a nd t he protection schemes (SIPS) are applied more frequently to
control of power apparatus are also addressed. prevent failure of the utility system during widespread events,
or to prevent local faults from cascading into adjacent
Index Terms—protection system t esting, p rotective rel aying equipment or power systems. Application of SIPS coupled by
schemes, System Integrity Protection Schemes, certification tests, the narrower operating margins of the power system is
maintenance tests, protection system communications testing, IEC commonplace today and requires a comprehensive look at
61850, unconventional instrument transformers.
traditional localized practices and focus more on testing of the
protection and control schemes as a system, as opposed to
I. INTRODUCTION individual components.
The IEEE C37.233 guide covers suggested test requirements
for Power System Protection Scheme Tests, System The goal of testing the entire protection and control system is
Application Tests, and benefits of the Overall Protective to validate the performance of the entire scheme, including the
Schemes Tests. The guide encompasses overall system testing individual components to backup, redundant, and auxiliary
procedures (generators, line, line reactors, transformer, components. The test methods should include verifying the
capacitors, special protection schemes, end-to-end testing, designed interactions between components work correctly in
distributed application within substation, etc.) and data terms of maintaining the dependability and security of the
collection requirements as well as the test procedure scheme at a desirable level of performance. The benefit of
definitions. Methods, extent, and types of system tests for testing individual components is known from years of
protection applications at various voltage levels are also experience: if the individual parts work and the scheme is
covered. Control functions inherent to the protective systems designed and installed correctly, there is a high probability the
are included. Importance of line testing, indirect trip system will work correctly. However, protection system testing
applications, open / closed loop tests, and dynamic / non-linear verifies that the scheme is correct in both concept and
tests are also covered. application settings. An example is end-to-end testing of
transmission line protection, using test conditions based on
General approach and specific procedures for testing fault contingency studies. The different test cases, run
protective relaying systems that include multiple interacting simultaneously at each end of the line, confirm that all relays,
relay components, auxiliary devices, and power apparatus are communications equipment, and auxiliary equipment work for
covered. The procedures focus separately on design tests, commonly anticipated events and worst-case scenarios. It is
commissioning tests, routine maintenance tests, and ongoing even possible to simulate typical modes of failure of the
performance assessment tests with discussion of what each of individual components to ensure the protection and control
these test categories aims to accomplish. The Guide has a system will still identify and manage fault events.
comprehensive reference list of type tests for protective
devices as well as overall protection scheme performance tests The key benefit of the system tests includes verification of the
for various types of protection schemes. protection and control scheme in its entirety. A proper test
documents the performance of the protection and control
system and identifies limitations of performance. The test
270
documentation also serves as a baseline for evaluating future Functional conformance tests: Functional conformance
performance during actual events versus the expected tests verify if the functionality of a protective function is as
performance. Baseline performance is used to compare expected. Tests are focused on verifying the general
differences between expected and actual events. Testing the characteristics against specification by means of signals
performance of the overall protection system, especially wide- without transients and DC-components. Functional
area protection schemes or SIPS, is dependent on static and conformance tests are generally steady state accuracy tests.
dynamic system models. As these schemes and the system
behavior during events the schemes are designed to protect are Technological conformance tests: Technological
very complex, testing can provide the engineer a better conformance tests verify the response of the protective
understanding of the protection system, the limits of function to external disturbances and internal failures.
performance, and the possible modes of failure. One type of Technological tests cover the verification of the hardware
testing for system SIPS is to install the system, while blocking quality, a reliability assessment and an evaluation of the self-
any control actions, to analyze the performance of this supervision. The verification of the hardware quality includes
protection system during actual system events. Such actual test insulation properties and environmental conditions
data can be used to improve the static and dynamic models of (electromagnetic compatibility, mechanical and climatic).
the power system. A further benefit is actually illustrating or
understanding the protection and control system performance Performance tests
during certain types of events and where and why failures may
occur. The importance of written test procedures and A performance test (also referred to as acceptance or type test)
documentation are described in the “Considerations for is a type of certification test that describes the limits of
Testing and Self-Monitoring” section of this guide. performance of protective devices used in a specific
application. The test is a generic way to rate the performance
The design of the protection and control system requires of a specific device. The test results clearly describe the ability
careful consideration of the performance requirements for the of the device to perform according to its specifications and the
specific location, analysis of power system behavior, and an performance of the relay during certain types of common
understanding of the actual performance limits of components performance requirements and fault conditions. A simple
available for use in this application. Testing for the protection power system model is generally used to simulate various
and control system at a specific location should be performed conditions to derive the test quantities. These types of tests are
to prove the assumptions made during the design phase, typically performed when evaluating a new relay for use on a
starting with the individual components and working towards specific power system, or, in some cases, when evaluating new
testing total system performance. firmware. See IEEE C37.231 for additional information
regarding firmware revision control. The severity of firmware
III. TYPES OF TESTS changes can be used to determine whether new suites of tests
Different types of tests are described in the Guide. Some of are needed. The general results from certification tests include
the tests are device specific and others are application operating speed, consistency and repeatability of performance,
oriented. boundary conditions for optimal performance, understanding
of settings methodology, and the suitability of this relay for
Certification tests typical applications. As an example, certification tests of a
distance relay will illustrate operating speed of the distance
Certification tests, also referred to as Acceptance Tests or element, and the reliability of the distance element for zone
Type Tests, are performed by a certification organization or boundary faults and during CCVT transients. These tests,
application tests on demand of a user. Certification tests are therefore, determine the general suitability of a distance relay
objective and can be accepted by a wide range of users. for EHV and HV protection applications.
Certification tests are normalized tests under normalized
procedures and with normalized equipment. For numerical The goal of performance tests is to verify the behavior of the
protection devices, type tests cover hardware as well as protection under realistic network conditions. It includes
software. Each hardware or software version can be a aspects like dc offset, source-to-impedance ratio (SIR), fault
different type. The results of these tests are acceptable to a resistance, various types of faults, etc. In contrast to
wide range of users, independent of the application. conformance tests, performance tests do not focus on how a
certain function is performed within the protection, rather on
Certification tests consist of conformance tests and what is to be expected from a function under certain power
performance tests. system conditions. In case of multi-function protection,
distinction can be made between function tests and scheme
Conformance tests tests.
The goal of conformance tests is to verify the performance of Functional performance tests: During functional
the protective device or protection system against a set of pre- performance testing, each function is tested and evaluated
defined specifications. separately. The performance of an individual protective
function is examined in detail.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 271
That the new or changed function works correctly Commissioning tests are intended to ensure that the protection
system will operate as designed after field installation. These
That no other functions are declining. This is more tests verify the individual components, interactions between
complicated because of the number of functions and components, device set points, communications system, and
possible combinations. scheme redundancy along with wiring and installation. These
are basic tests that must be performed for any new installation
Some probabilistic analysis may help to determine which or significant modification to an existing installation and are
elements or hardware components need retesting. typically combinations of certification and application tests.
Certification tests performed during commissioning verify that
Application tests elements perform in a field installation in a manner consistent
with laboratory results. This step is very important for
Application tests are specific tests to determine the suitability equipment with performance that varies due to environmental
of a relay for a specific protection system design application or conditions or age of components such as electro-mechanical
location. Application tests are mainly driven by the user. relays. Application tests performed during commissioning
Application tests are based on a detailed model of the power verify that the total installed scheme works as designed and
system and include performance testing against a wide variety intended, especially in regard to installation accuracy and
of possible fault conditions. This type of test typically uses interaction between various protection and control system
transient simulation to better replicate the behavior of the components.
power system. The goal is to ensure a specific relay will
perform for a specific application or location before actual Commissioning tests are vitally important as these are the tests
installation. While certification tests focus on specific relays, that prove that the actual installed system will work as
which are the basic building blocks, application tests may also designed. Commissioning tests can become very advanced.
be used to verify the entire protection scheme. Application End-to-end tests ensure that all terminals and the overall
tests are typically performed during the evaluation and design communication system function properly. The most important
phases. benefit of commissioning tests is verifying that the protection
and control system works in the field as it was designed. A
Application tests have many benefits. Application tests second benefit is documentation of field performance as a
document that a specific relay, algorithm, or protection scheme benchmark for verifying performance for future tests.
is the correct choice for a certain set of power system
conditions or criteria. It is typical, for example, to use a For the elements or features that have been set on a device, the
transient model of the specific power system, using multiple tests normally follow the functional hierarchy of the protection
fault conditions, to determine the suitability of a distance relay. system in the following order:
System integrity protection schemes require significant
application tests as various contingency transient system Check the available system parameters and measurements
modeling is inherently used to design the scheme and specify and make sure that they meet the technical specifications.
the scheme response to power system events. Test the enabled and configured protection elements.
Test the built-in protection schemes.
Another benefit of application tests can be determination and Test the multi-relay protection schemes.
documentation of appropriate settings. Application tests verify
the performance of a protection system in total response and Commissioning tests of an entire system are also intended to
will highlight the failure or overlap of specific elements of the verify the hard-wired or communication-based interfaces
272
between the multiple microprocessor-based devices included the testing. Periodic testing may include review of recent
in a protection scheme, or other distributed applications. The power system activities on the particular terminal and whether
interface with the auxiliary contacts of the breaker and its trip the entire protective system has operated correctly since last
coils are generally included as part of the tests. scheduled interval. If determined that a protection system and
scheme has performed correctly, the interval may be adjusted
Commissioning tests may require the use of multiple based on most recent operational experience on the respective
synchronized test devices in order to verify the performance of terminal. Similar to performance-based maintenance,
protection schemes or other distributed applications. Proper condition-based maintenance includes examination of the relay
simulation of abnormal conditions for each of the devices in a system, history of specific systems and devices, and operating
scheme is essential for the testing. experience to perform maintenance only when necessary to
ensure adequate performance of the protection system.
In summary, commissioning tests are performed to make sure
the protection system is properly installed and working as Intelligent electronic devices such as microprocessor based
expected in a substation based on the design. protective relays add an additional form of maintenance
testing, which is the ability to perform continuous self-
Maintenance tests monitoring for correct performance of the device. Self-
monitoring capabilities vary between devices and may include
Maintenance tests are specific tests to validate that the the ability to monitor the incoming analog measuring circuits,
protection and control system is operating correctly after a the device output contacts, time synchronization signals,
period of time of field installation. Some of these tests are communications signals, internal hardware (including battery
calibration tests to confirm that individual components are still status and system board voltages), non-volatile EEPROM
operating within desirable performance parameters. This type memory, and the internal software algorithms. Failure of a
of test is especially vital for the components susceptible to self-test routine typically generates an alarm available through
degraded or changing characteristic due to aging and wear. SCADA communications and output contacts. Certain self-test
Application tests may be performed during maintenance alarms may disable the functioning of the device.
testing to verify that the total protection system works, from
measurement of power system values, to properly identifying Troubleshooting operating problems, from a protection system
fault characteristics, to the operation of the interrupting device testing perspective, is generally a combination of
and associated interlocking with automatic or manual commissioning tests and calibration tests, designed to identify
restoration devices and schemes. One form of maintenance specific components or specific parts of the protection system
testing involves performing forced outage of protective design that do not provide the desired operation results.
equipment when performance of the respective scheme is Troubleshooting always involves good engineering practices
identified as questionable and immediate attention to servicing and experience to identify the cause of operating problems.
the relay or the scheme is needed.
IV. MAINTENANCE PRACTICES
There are different philosophies concerning when it is It is very important to the reliability of the electric system that
appropriate to perform maintenance tests in an attempt to best protection and control systems function properly.
balance assurance that the protection system will perform Malfunctioning systems can contribute to major power system
correctly versus the costs involved in maintaining the system. outages and widespread cascading events. Maintenance
Aside from forced outage testing, there are two basic programs have demonstrated benefits in uncovering problems
methodologies in use which are time-based (periodic) and allowing the problems to be addressed under controlled
maintenance and condition-based maintenance practices. power system environment. Maintenance and test programs
often incorporate the following types of maintenance practices:
Periodic maintenance testing is performed to ensure that the
protection and control system is operating correctly after a 1. Time-base maintenance (TBM) – These test intervals
period of time of field installation. These tests may include are applied to components or groups of components.
calibration tests as described earlier. Full system performance The intervals may have been developed from prior
tests may be used to confirm that the total protection system experience or manufacturers’ recommendations. The
functions from measurement of power system values, to TBM verification interval is based on a variety of
properly identifying fault characteristics, to the operation of factors, including experience of the particular asset
the interrupting device and associated interlocking with owner, collective experiences of several asset owners
automatic or manual restoration devices and schemes. who are members of a country or regional council,
etc. The maintenance intervals are fixed, and may
Time-based maintenance is based on scheduled intervals for range in number of months or in years..
review and maintenance of the system, to demonstrate that
routine testing of the system and system components are TBM can include review of recent power system
performed. Test schedules are generally determined by events near the particular terminal. Operating records
operating experience with a system or device, manufacturer’s may prove that some portion of the protection system
recommendations, and the availability of resources to perform
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 273
has operated correctly since the last tests were Region 2: The TBM intervals that are adjusted up or
performed. If specific protection scheme components down based on results of analysis of maintenance history
have demonstrated correct performance within of statistically significant population of similar products
specifications, the maintenance test time clock may that have been subject to TBM.
be reset for those components. Region 3: Optimal TBM intervals based on regions 1 and
2.
2. Performance-based maintenance (PBM) –
Maintenance intervals are established based on
analytical or historical results of TBM failure rates on TBM
a statistically significant population of similar
components. Some level of TBM is generally
followed to justify continued use of PBM-developed
extended intervals for low occurrence of test failures
or in-service failures.
1 2
3. Condition-based maintenance (CBM)– Continuously
3
or frequently reported results from non-disruptive self
monitoring of components demonstrate operational
status as those components remain in service.
CBM PBM
Whatever is verified by CBM does not require
manual testing, but taking advantage of this requires
precise technical focus on exactly what parts are
included as part of the self diagnostics.
Microprocessor-based protective relays perform
continuous self-monitoring to verify correct operation
Figure 1 - Relationship of time based maintenance types
of most components within the device. Self-
monitoring capabilities may include the ac signal
Regulatory Considerations
inputs, analog measuring circuits, processors and
memory for measurement, protection, and data
The effectiveness of a maintenance program is often tracked
communications, the trip circuit monitoring, and
and determined by the asset owner. These tracking
signals for protection and data communications. For
mechanisms allow the owner to optimize the program based on
those conditions, failure of a self-monitoring routine
the application. However, when the performance of a
generates an alarm and may inhibit operation to avoid
protective device or system has a greater impact to the overall
false trips. When internal components, such as
power system, the proper performance of the protective system
critical output relay contacts, are not equipped with
will benefit the entire electrical grid which may be composed
self-monitoring, they can be manually tested. Method
of several interconnected power systems, or in some cases
of testing may be local or remote, or through
possibly part of a regulatory controlled electric system. In
inherent performance of the scheme during a system
some countries or electrical grid systems, the regulatory
event.
agency may require evidence that the asset owners each have
established a prudent maintenance program that meets a
The TBM is the overarching maintenance process of which the
minimum level of standards and practices established by the
other types are subsets. Unlike TBM, PBM intervals are
regulatory body. Furthermore, the regulatory agency may
adjusted based on good or bad experiences. The CBM
require evidence that the owner is performing maintenance
verification intervals can be hours or even milliseconds
based on the program. Depending on the level of regulatory
between non-disruptive self-monitoring checks within or
oversight, the asset owners may be asked periodically to either
around components as they remain in service.
voluntarily, or through a cohesive and collective established
audit process, or both, demonstrate that they have met their
TBM, PBM, and CBM can be combined for individual
obligations to maintain the protection and control system.
components, or within a complete protection system. Figure 1
illustrates the relationship between various types of
In a regulatory system, the owner may be asked to certify that
maintenance practices described in this section. In the Venn
they can:
diagram, the overlapping regions show the relationship of
TBM with PBM historical information and the inherent
Demonstrate and submit detailed maintenance records and
continuous monitoring offered through CBM. This figure
that asset owners are cognizant that regulatory agencies
shows:
may require verification of the maintenance program
including evidence that protection systems and
Region 1: The TBM intervals that are increased based on
components are being maintained and tested per the
known reported operational condition of individual
owners program.
components that are monitoring themselves.
274
Submit a program documenting the methodology or laboratory by injecting simulated voltage and current
philosophy behind the owner’s program. waveforms into relays under test. Relay input signals are
Show a tracking mechanism and archiving system for the generally derived from transient simulation software tools.
maintenance records related to the protection and control Transient simulation techniques also provide tools for
equipment and systems. evaluating the overall performance of protective relaying
schemes because they assist in testing the hardware, relay
V. TEST REQUIREMENTS FOR PROTECTION SCHEMES AND algorithms, settings, configuration, speed of operation, and
SYSTEMS transient performance of the scheme. Transmission-line relay
evaluation is based on line topology and length—short-line,
A. Line protection testing medium-line, and long-line models. All three transmission-line
models may have a similar topology and may consist of
Relay protection schemes for transmission lines can be parallel lines to introduce mutual coupling between them.
generalized into nonpilot and pilot protection schemes. The Simulation of a strong source at one end with a relatively weak
nonpilot relaying system is used on radial transmission lines or source at the remote end will assist in comparing relay
other lines where high-speed tripping is not required. It is also performance under different conditions. Relays are required to
used in conjunction with a pilot relaying scheme as a backup be tested for internal and external faults during a maximum
line protection. The most commonly used relays in nonpilot power flow situation. Faults at different inception angles will
schemes are phase and ground overcurrent and stepped demonstrate relay performance under different dc offset
distance relays. Refer to the normative references in IEEE Std conditions. Likewise, varying fault resistances will also
C37.113-1999 for further details. validate relay response. Relays are also to be tested for
evolving faults and current reversal conditions. It is desirable
The types of line protection covered under this section include: to evaluate relay performance under stressed conditions, such
as CT saturation and CCVT transients.
Non-pilot protection schemes
o Overcurrent relaying Relays designed for series-compensated line are often tested
o Distance relaying with system models incorporating a series compensated line
Pilot Protection schemes with the metal-oxide varistor (MOV) and bypass breaker. It is
Directional comparison blocking and unblocking desirable to verify the performance of communication-
dependent relay systems with degraded or corrupted
schemes
communication networks. Some of the commonly practiced
Direct underreaching transfer trip scheme
methods include the injection of noise in audio-tone
Permissive overreaching transfer trip scheme
communication systems or introduction of bit-error rates in
Permissive underreaching transfer trip scheme digital communications networks.
Phase comparison relaying scheme
Line current differential scheme Real-time or model-based power system testing provides a
Direct Transfer trip measure for evaluating the overall dependability and security
Automatic reclosing schemes of the scheme. In the case of transmission-line protection
performance evaluation, these tests can be used to validate
Throughout the life cycle of a relay, the relay is subjected to a performance on heavily loaded long lines, lines with series
certification or factory acceptance test, application test, capacitors and shunt reactors, especially for bulk transmission
commissioning test, and preventive maintenance test. applications. Model-based power system testing is practiced
where the response of the schemes cannot be evaluated
Certification test analytically or by conventional test methods due to the
Certification tests may be conducted in the relay supplier complex interaction of various power system components
factory or at another independent facility to verify the during faults and the high-speed communications schemes
performance of the relay against established parameters and required. In addition, model-based power system testing
specifications. provides a means of thoroughly investigating the transient
performance of the relay system without subjecting the system
Application test to primary fault condition (such as stage tests).
The application test typically involves bench testing of the
relay to confirm that its elements are in working order for a It is important that the instrument transformers used in the
given application before the relay gets installed at a substation. model have accuracy class such that the relay system burdens
Relay schemes and logic can also be tested in the laboratory do not cause errors in the magnitudes or distortion of
prior to field implementation. Transient tests using digital waveforms of the currents and voltages of the model during
simulators have been developed mainly to emulate the testing. This does not preclude changes to permit investigation
traditional model power system concept in order to evaluate of performance on saturated waveforms.
protective relay response to power system transients. Nonpilot
as well as communication-based transmission-line relaying Transient simulation tools such as the Electromagnetic
schemes (i.e., current differential, DCB, etc.) can be tested in a Transient Program (EMTP), the Alternative Transient Program
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 275
(ATP), or the EMTDC allow the user to prepare relay signal relays with no vector compensation. It is suggested that for
playback via power amplifiers in automated fashion repeatedly three-phase numerical transformer differential relays that have
and with varying system conditions (i.e., fault resistance, fault vector compensation settings, especially those that involve
inception angle, etc.) if desired. Development of an adequate zero-sequence removal, three phase current injection into both
transient power system model is required to generate signals two relay windings be performed. The restraint coil is tested
for different applications. Transient tests are sometimes by applying a low mismatch current to see whether the
referred to as dynamic or application tests. restraint coil blocks the relay from tripping. A high-mismatch
current is then applied to the operate coil to verify it trips the
For more thorough or complete application tests, “closed- external devices. A harmonic test includes simulating a second
loop” digital simulators can be used. Closed-loop tests require and a fifth harmonic current to verify the relay(s) will not
transient model and power system simulation where output operate for overexcitation or inrush current. Relays that
signals from the simulation are used as inputs to the relaying employ waveform recognition, for example, to block the
system under test. Relay outputs responding to these signals differential function from operating during inrush conditions,
can then be fed back to the simulated power system, in turn can be tested by use of COMTRADE files or real-time
changing the model configuration. This mechanism provides simulation techniques. Similar types of test file cases could
the means for testing both the relay system’s response to generally be applied to devices that do not have harmonic
power system disturbances as well as the modeled power waveform recognition.
system’s response to the relay operation. Therefore, closed-
loop tests can provide a realistic testing environment for a For relays with internal compensation, three-phase testing will
relaying system but require hardware to handle exchange of simplify the evaluation of the relay performance.
many input and output signals during a simulation. Closed-
loop simulator software tools must also provide adequate For minimum pickup tests, a current source is used to inject
means for accurate transient modeling, simulation control, and current into the overcurrent relay(s) to verify the threshold for
reporting results. tripping. The timing of the overcurrent relay in a transformer
protection scheme is typically slower and is used as a backup
protection to the current differential relay.
B. Transformer protection schemes
For transformer protection, several types of protective schemes Voltage tests verify operation for voltage-dependent elements.
are commonly applied, including current differential, time Where overexcitation is applied, system testing may involve
overcurrent, overexcitation, and sudden pressure. The the testing of threshold set points under steady-state conditions
transformer protective relay location and technology applied as an initial set of tests followed by simulated volts/Hertz
may also influence the type of protection design and testing. (V/Hz) conditions using transient simulation tools or use of
For example, consider a two-windings transformer when some COMTRADE files from system events to verify the
level of protection for each high-voltage winding is located in overexcitation performance for a generator step-up transformer
the respective control building, and the buildings are large or for a true power system condition with high magnitudes of
distances apart. Fiber optics may be used as a means of volts/Hertz. The sudden pressure relay is tested by applying
interface between protective devices in the different buildings pressure to the pressure switch and observing the alarm and
to communicate decisions or information between the devices. trip contacts for proper operation. A manual trip is initiated to
There are also transformers that are part of a transmission line, test the auxiliary and lockout relays for proper operation of the
and testing may involve communication equipment; refer to above relay schemes. Also, SCADA tests are applied to ensure
the Guide for additional information. When redundant all alarms and targets are operating properly.
equipment of communication interfaces is designed, testing
often is conducted with one complete system at a time. Maintenance tests for transformer protection may need to be
conducted with the transformer energized. Therefore, the
Transformer differential protection testing proper isolation of the elements under test is critical. It is
During commission testing, company personnel conduct visual important to keep some levels of overlapping protection in
inspections of the relays, wire connections, and design service when maintenance tests are performed with the
schematics. There are also several different current transformer energized. The tests involve periodic checking of
transformer tests performed in order to verify proper CT the transformer protective scheme. The tests may not be as
condition and connections. These tests are done when the comprehensive as the commissioning test; however, they
transformer is out of service. By applying voltage and current, cover checking out all critical functions of the protection
several tests are performed including ratio, polarity, and system. Steady-state tests are widely used when applicable for
saturation. A ground test is performed to check for undesired relay periodic maintenance and involve the use of current and
grounds. voltage elements. Output contacts are also verified for proper
Relay testing is done by applying settings and verifying the functioning.
desired outcome. Typical tests include differential/slope,
harmonic, minimum pickup, voltage protection, and sudden
pressure. For the differential/slope test, two current sources are
used to inject current into single-phase relays or three-phase
276
Different tests are designed to monitor the relay operation for For the high-impedance bus differential, the tests are as
fault conditions, such as follows: follows:
Verifying correct operation of breaker failure protection functions provided by the relays, some reactors have a pole
(certification test, acceptance test, and commissioning disagreement scheme to ensure all three phases are energized.
test). Pole disagreement schemes can be provided through a
Selectivity bus section operation (certification test, combination of overcurrent elements and breaker contact
acceptance test, and commissioning test). logic. Reactor protection and control schemes may be
integrated with an automated trip and insertion scheme to aid
Other types of bus differential protection schemes, such as system operators with the burden of managing system voltage.
those that use paralleled CT connections as input to the bus Refer to IEEE Std C37.109TM-2006 or shunt reactor
differential, and most low impedance schemes that use protection guide.
individual restraint inputs, can also be verified for open and
shorted CT connections. Testing of the reactor protection will be similar regardless
whether it is a voltage control, current limiting, or a line
Additional commissioning and maintenance testing reactor. The most thorough testing is completed at the time of
considerations are included in IEEE Std C37.103TM- energizing new equipment. The testing should include all the
2004. equipment that the relay is wired to or can be expected to
impact. Because the relay action is based on currents and
voltages, it is imperative that the relay input sources are tested
F. Breaker failure protection and control
and the performance characteristics of the sources (i.e., current
Circuit breakers can fail to trip for various reasons. When this transformers and potential transformers or CCVTs) are known.
happens, breaker failure protection detects the continued A wide range of simulation tests covering common to
presence of the fault and trips adjacent breakers to isolate the uncommon faults as well as various operating conditions
fault after a predetermined length of time. Breaker failure should be performed. If the power system configuration or
protection is used in transmission and distribution systems conditions will allow, all breakers energizing the reactor
where delayed backup clearing can threaten system stability or should be tripped at least once to verify the continuity of the
cause outage of too many circuits because of remote backup. trip path.
Fast fault clearance and minimization of outages also improves
power quality.
H. Generator protection
Breaker failure protection, when properly designed, applied, Generators are a key part of a power system. It is most critical
tested, commissioned, and maintained, enhances power system that generator protection systems operate properly to clear
reliability and stability. However, when it misoperates, it can faults and trip the machine for abnormal operating conditions.
easily have disastrous consequences; hence, the security of the Refer to IEEE Std C37.102TM-2006 for an ac generator
breaker failure protection system is of paramount importance, protection guide for further details.
and comprehensive testing is required for any breaker failure
protection system. Refer to IEEE Std C37.119TM. Wide area schemes that employ generator tripping should
include that function in the testing of the overall scheme,
The testing of any protection function should be performed in preferably at times when the generator is offline.
a way that matches as closely as possible real-life power
system conditions. The sequence of steps in a test is a function The following elements will require phase checks with the
of the requirements for the specific scheme and system machine at some load level to allow checks of the phase angle
condition. This is especially important in the case of breaker between voltage and current: 21 V, 32 V, 40 V, and 51 V. It
failure protection because of the importance of this function as should be noted that many microprocessor-based generator
well as because it can be implemented in many different ways. protection relays will allow this check to be done using a
computer connected to the relay, with the appropriate
Breaker failure protection testing requires a good software, to allow the user to observe what quantities the relay
understanding of the operating principles that are used in is measuring. This precludes the need to use external
developing the function implemented in the protection under equipment (phase angle meter, etc.) connected to test facilities
test. (switches, blocks, etc.) to verify phasing.
Extreme caution should be used when testing generator such as blocking or unblocking schemes, direct transfer
protection on a machine that has a generator breaker between tripping, phase comparison, etc. Other less common
the generator step-up transformer (GSU) and the transmission applications include voice and data traffic in addition to the
system to avoid unnecessarily tripping the GSU by any backup protection, based on the bandwidth a trap is designed for, or
elements. Considering that there are different methods of the type of coupling (single-phase or multi-phase) to the
connecting a generator to the power system, different transmission line. For the purpose of system testing, the
protection and interlocking strategies are considered. For following section covers single-phase coupling. The same
example: techniques are used in phase-to-phase and three-phase
coupling.
When the generator is unit connected, the GSU is
connected to the generator and is likely shut down when The types of tests include:
the associated protection is being tested.
When there is a generator breaker between the generator Line Trap
and the GSU, and different zones of protection are Carrier Transmit Measurement Terminated and Bridged
applied. Carrier Receive Measurement Terminated and Bridged
Measurement specification
In any case, the protective scheme test procedures often Amplifier impact of power line carrier testing
incorporate considerations of the functions that overlap with
protection between the GSU and the power system. Some Line trap
protection schemes may include breaker failure, bus
differential and generator load reduction logic, and any This test requires the transmission or distribution line to be de-
interlocking scheme that blocks generator protection from energized. The trap tuning (resonant frequency set point) is
tripping switchyard breakers when the isolation device is open. verified by checking impedance versus frequency. The center
frequency is tuned to the maximum impedance, measured
Testing of the lockout relays (LORs) associated with generator using the impedance meter and signal generator. When
protection is common practice. Initial tests generally include verifying the trap frequency set point or points it is best to use
allowing the LOR to trip all intended devices (generator the highest impedance possible for the used spectrum. Refer
breakers, field breakers, turbine stop valves, etc.). Some to the IEEE C 37.233 for additional details.
generator protective functions may perform some control
action other than tripping the machine (e.g., volts/Hertz
K. System Integrity Protection Scheme (SIPS) Test
operates voltage regulator to reduce excitation) and should be
Requirements
allowed to perform this action at least on initial testing.
Reverse power protection can involve interlocks with turbine The SIPS encompasses Special Protection System (SPS),
stop valve limit switches. Testing this scheme can include Remedial Action Schemes (RAS) and schemes such as
online testing, during which the turbine is tripped just prior to Underfrequency (UF), Undervoltage (UV), Out-of-Step
taking a machine offline, waiting for the stop valves to close (OOS), etc. These schemes provide reasonable
and the machine to motor briefly, and then allowing the countermeasures to slow and/or stop cascading outages caused
reverse power relay to trip the machine (of course, with an by extreme contingencies. They stabilize interconnected
operator standing by in case the protection does not operate). power systems by preventing overloading of the lines,
This provides a good test of the overall operation of the arresting voltage decline, initiating pre-planned separation of
reverse power protection as an entire scheme. the power system, etc.
The SIPS, armed for pre-defined outages, initiate pre-planned,
automatic, and corrective actions. Their design is based on
I. Trip circuit logic scheme studies of pre-defined outages for variety of conditions.
The trip circuit logic scheme includes the logic and circuits
needed to trip the required breakers in a substation in order to SIPS cover a wide range in the scale of the individual
clear a fault. In some cases, the reach of this scheme is not schemes. For example, a local area protection scheme may
confined to the substation but also to the remote substations. provide thermal overload protection for a single transmission
line. Such local schemes may involve testing requirements and
Typically, this scheme can be found in bus and breaker failure procedures more analogous to those used for testing equipment
protections. When these two protections exist in the same for fault protection in contrast to schemes designed to provide
substation, it is not unusual that the trip circuit logic scheme is wide area protection. Such a thermal SIPS may monitor
shared. atmospheric or conductor temperature, wind speed and load
current, provide a thermal model of the protected equipment,
J. Communication Testing - Power line carrier testing
and send a signal to one or more locations to open line
Power line carrier equipment is used in many protection and terminals or shed load based on the application. A thorough
control applications (refer to IEEE Std 643). The most test program will challenge the specific functions of the
common applications include pilot transmission line protection scheme design, but the limited scheme functionality will
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 279
naturally also determine the scale and complexity of the testing VI. TESTING PROTECTION & CONTROL SYSTEMS WITH
necessary. UNCONVENTIONAL VOLTAGE AND CURRENT SENSING INPUTS
Within the Guide, there are examples and architectures for A. Testing inputs to relays and microprocessor-based devices
comprehensive monitoring and arming systems. The with low-level analog inputs per IEEE C37.92-2005.
complexity is attributed to:
Selection of various equipment The purpose of IEEE C37.92-2005 is to define a low-level
Identification of monitoring points standard interface between relays, and unconventional sensors
Types of alarms and priority classification which cannot easily generate the high-level signal outputs like
Various contingencies associated with equipment the conventional current and voltage instrument transformers.
abnormal conditions The sensors are typically designed with analog electronic
Types and availability of real time data signal generating circuits operating at less than ±15 V and
Considerations for various categories of input and output delivering signals to relatively high input impedances of
tests electronic circuits in the relays. Other types of sensors, such
Development of the test scenarios, coupled by provisions as Rogowski coils, have passive low-energy outputs that are
for automated testing also compatible with these same high-impedance electronic
inputs. This section discusses testing of the relays and their
One form of SIPS is wide-area protection and control type inputs. Testing the sensor outputs is covered in the section on
schemes. Wide-area protection schemes typically cover large testing outputs of unconventional sensors.
geographic and/or electrical areas to protect against a wide
range of system problems. Test objectives typically include a Relays and other microprocessor-based devices with low level
broader range and volume of equipment and system models analog inputs per IEEE C37.92-2005 are typically
than for local schemes. For example, SIPS that remediate microprocessor based, with analog electronic input circuits
transient stability conditions are based on extensive system interfaced to analog-to-digital converters. Beyond the low-
modeling, include detailed monitoring of critical facilities, energy input circuits for voltage and current signals, these
system load levels or other conditions, and may take a variety relays are identical to those designed for conventional
of actions such as system islanding, load shedding, generator instrument transformer secondary signal inputs of 69 Volts or
shedding, and shunt capacitor and reactor switching. 120 Volts and 5 Amperes. The overall functional testing or
Furthermore, such wide area protection schemes may involve verification strategy is the same.
many different entities with different background and
practices. This complexity requires very stringent and detailed Instrument transformer standards IEC 60044-7 and IEC
test procedures to confirm both security and dependability of 60044-8 specify similar types of low-level interfaces for
those schemes. voltage and current signals, although these standards list
several normal values in lieu of a single standard value.
System variables, measurement inputs, sources of current and Testing approaches are the same.
voltage location, status inputs and outputs plus types of control
signals are examined with comprehensive testing solutions to The major design difference is that the input isolating
various types of schemes. transformers are wound differently (or deleted entirely) so that:
The complexity of the scheme, its purpose, space availability, The relay has a high impedance input (50k ohms typical)
and other factors may drive some of the decisions associated and accepts a low-energy signal of about 200 mV RMS to
with the scheme applied and the levels of tests to be represent a primary current corresponding to 1 per unit
performed. Types of tests listed below are explained further in primary load. This is scaled so that the instantaneous
the Guide: peak of a 20 per unit fault current fully offset will be
slightly over 11 volts, and within amplification range of
Proof-of-concept/lab tests. commonly used operational amplifier circuits.
Field commissioning tests.
Detailed system-wide performance tests. The relay has a high impedance input and accepts a low-
Validation through State Estimation. energy signal of about 4 V RMS to represent a primary
voltage of 1 per unit.
SIPS performance can be more sensitive to system additions
and modifications than other protection systems. It is critical It is important to note that, with this type of low-level
that scheme tests include assessment of the system models interface, primary current signals are represented by a voltage
upon which the SIPS design is based. These assessments need signal. This is fundamentally different from conventional
to be performed in conjunction with major system additions as relays, whose current inputs require a CT secondary current
well as periodically, e.g. every five years, to include effects of proportional to primary power system current.
more routine system changes and growth.
Such a relay can be tested via injection testing methods that
are used for conventional relays, except that the signals must
280
be scaled to these lower standard levels, and the current input as if connected to the real system. Outputs to controls are to
signal must be converted to voltage across a burden resistor. If be executed as defined in the IEC 61850 standard.
the test set is based on microprocessor or computing
technology, the modification may include removing or
D. PC-based test TMU
bypassing the power amplifier needed to drive conventional
relays needing large signal inputs from the low level electronic - This path uses a standard PC either connected to the Ethernet
signal sources in the test set. switch or directly connected to the RUT. Note that in the
latter configuration, the PC may be required to support
It is easy to test these relays using a conventional relay test set multiple Ethernet ports/data streams to the RUT.
with a simple transformer based adaptor. Transformers and
interface circuits similar to or exactly like those installed in the E. Primary/secondary injection
front end of a conventional microprocessor relay can be used
to build the adaptor. The normal voltage signal of 69 V RMS Another possible test mode is primary or secondary signal
is scaled with a small wound transformer or a resistive divider injection. In this mode of testing, a signal is injected either
to the 4 V signal used by the relay with IEEE C37.92 voltage into the inputs of the existing MU or injected at the High-
interface. The 5 A current signal is passed through a small Voltage interface of the process equipment.
current transformer with a resistive burden, such that the
voltage developed across the burden is 200 mV. Alternatively GOOSE testing
the test set 5 A current output can be directly connected to a 40 It should be noted that although the process bus is designed
milliohm burden resistor, if such an accurate burden resistor is primarily for communication from a MU to a relay, there is a
available. need to send control signals (e.g. – breaker trip and close
signals) from the relay to the MU. In this circumstance, it is
It is similarly easy to scale signals to several of the many logical that the IEC 61850 GOOSE mechanism be used over
alternate low-energy signal levels given in IEC 60044-7 or the same physical medium. GOOSE messages would contain
IEC 60044-8. Test signals for a relay having this interface are status values that would be mapped into output contacts in the
also easy to generate with a personal computer and a low-level MU.
electronic analog output – even a small electronic amplifier
connected to a sound card could produce adequate energy to In the first mode of operation, an output bit is set in the
simulate faults. Real-time digital simulators can be connected GOOSE message and it is observed that the respective output
to these relays without power amplifiers. Some optical current of the MU operates. Operation may be observed by actions
and voltage sensors with electronic analog outputs offer the such as a breaker actually opening or closing or the operation
user the convenience of operating in a test mode generate 50 of an auxiliary relay.
Hz or 60 Hz standard signals that can verify connections from
the sensor to the relay and relay measurement accuracy. In the second mode of operation, the TEST bit in the GOOSE
is set. In this mode of operation, the TEST GOOSE is sent
and the MU sets a Sequence of Events message to the effect
B. Testing inputs to relays with digital interfaces per IEC that a TEST GOOSE was received for a particular output
61850-9-2 process bus. contact. The contact, however, is not operated. Refer to the
IEC 61850 standard for details.
This section of the Guide introduces process bus test
architecture using test merging units GPS clock The Edition 2 of the standards series IEC 61850 has made
synchronization. some changes. One of the changes in the Edition 2 is related
with the test mode function.
C. Auxiliary TMU “The test mode function allows the local or remote operator to
In this test configuration, a set of spare Merging Units (MU) check at any time any function of the system using process
located in the control house are connected to the relay either signals also but avoiding any impact on the process (blocking
through an Ethernet switch or direct connected (as dictated by of process outputs).”
the implemented process bus architecture). Current, voltage,
and status signals are then injected into the MU in the To allow detection of simulated data on a low layer of
appropriate form (standard analog signals or low level analog communication a “simulation-bit” (S) has been introduced into
signals) and the TMUs then process the inputs and stream the Ethernet frame. If this is set, S: when the bit is set, the
them accordingly to the connected Relay Under Test (RUT). GOOSE message has been issued by a publisher located in a
Note that the TMUs must be appropriately synchronized. test device and not by the publisher as specified in the
configuration file of the device. Simulation” is a Boolean
If mapped in the dataset, the Test bit in the Quality flag shall value (TRUE/FALSE) in the header of all GOOSE messages,
be set – indicating to the RUT that the data being received is this parameter shall indicate with the value TRUE that the
Test data. If the RUT is also in Test mode, it shall process the message and therefore its value have been issued by a
received data and provide protections and measurement values simulation unit. The GOOSE subscriber will report the value
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 281
of the simulated message to its application instead of the “real” pickup and timing; assessment of 87L through fault security
message depending on the setting of the receiving IED. Refer and dependability; single-pole tripping applications; and 87L
IEC 61850-8-1 Ed. 2, IEC 61850-9-2 Ed. 2 and IEC 61850 – on-load tests.
7-2 Ed 2 for details. The impact of high impedance faults to protective relay
performance and system testing is discussed in Annex C. The
The annex A of the standard covers steps to follow detail for a main types of power system grounding are discussed, as well
certain mode as their impact on the performance evaluation of the fault
location function in line protection relays. A fault-resistance
Output of status based classification of faults is presented, followed by a
Response to controls discussion of the sensitivity limits and coordination
How to process incoming data of different qualities (as considerations of relevant protection elements, such as
"test", blocked"…) negative and zero-sequence TOC and IOC, as well as ground
quadrilateral elements, to detect various types of resistive
faults. Transient simulation and short circuit programs are
VII. TESTING OUTPUTS OF UNCONVENTIONAL SENSORS suggested tools for generating test cases for ground distance
The standard method for verifying the accuracy of an elements in particular. Annex C also discusses the efficacy of
unconventional sensor is the same as that used for some pilot schemes in detecting high resistance faults. For
conventional CTs and PTs – a primary injection test with testing such schemes, the use of GPS-synchronized tests and
accurate measurement of the output using accurate playback of pre-recorded resistive fault simulations
instruments, or the relays and meters connected to its outputs. (COMTRADE files) is the preferred evaluation technique.
In general, such injection testing is used only during Annex D presents transformer oil and winding temperature
commissioning or apparatus-outage maintenance. computational methods using temperature profile assumed in
the IEEE transformer loading guide.
For a typical installation of an optical sensor, the optical losses Finally, Annex E explains how time delays can be
of all fibers are measured along with the losses of the optical compensated for when using relay test sets with different
columns, using, for example, a hand held optical power loss performing characteristics for GPS-synchronized end-to-end
meter. After connecting the fibers with the optical columns testing.
and the electronics the losses are measured by means of the
electronics itself. If both measurements are within acceptable IX. CONCLUSIONS
levels the unit is commissioned. Calibration is set at the The benefit of testing individual components is well known
factory, but a field recheck is conducted with primary injection from years of experience. Different types of schemes, local or
as for a conventional CT. communication assisted, and their intended applications
determine the types and level of testing and verification of
Primary injection with some vendors’ optical current interlocking. As modern power systems operate with narrower
transformers may be easier than for conventional CTs. The margins and are becoming more complex, it has become more
effective transformation ratio of the optical CT can be changed common to apply SIPS and to consider protection and control
on site via software so that a lower primary current injection schemes for wide-areas of a power system. Some of these
can be used to achieve target output signal levels. This allows schemes utilize reliable wide area communications that result
testing the protection and instrument transformer together with in changes in some basic philosophies of the protection and
more compact primary-source current generators. control system. As a result, in addition to testing individual
protection and control equipment, it has become necessary to
test the overall protection and control systems.
VIII. REVIEW OF ANNEXES
The IEEE C37.233 includes a comprehensive review of The goal and the key benefit of testing the entire protection
supplementary information regarding protection system testing and control system are to validate the performance of the
in five annexes. entire scheme. These tests are performed starting from the
Annex A comprises of an informative bibliography of up-to- individual components level to backup, redundant, and
date ANSI, IEEE, IEC and Cigré standards and reports, auxiliary component. The purpose is to validate the
conference papers and other technical articles, including North interaction between these components work correctly in terms
American Electric Reliability Corporation (NERC) documents, of maintaining the dependability and security of the scheme at
that supplement the normative references found in the main a desirable level of performance. As described in this paper,
body of the Guide. the Guide encompasses overall system testing definitions and
Annex B includes a detailed example of a line current procedures for generators, line, line reactors, transformer,
differential (87L) protection scheme testing procedure, with capacitors, special protection schemes, field commissioning
guidelines to assess the integrity of communication channels and end-to-end testing, distributed application within
used in the differential scheme; check for channel asymmetry; substation, etc., as well as data collection requirements. It is
testing of supervising and blocking elements, and stub bus also important to include indirect trip applications, open /
protection; testing of the differential characteristic, minimum closed loop tests, and dynamic / non-linear tests.
282
X. ACKNOWLEDGMENT
This paper is based on the report created by IEEE Power
System Relaying Committee Working Group C 37.233. The
authors acknowledge contributions by the Working Group
members that have made this summary paper possible. IEEE
C 37.233 working group members are:
XI. REFERENCES
OMICRON electronics
USA
INTRODUCTION
The industry is going through significant changes due to the increased requirements
for improved quality of power supplied by the utility in order to avoid costly
interruptions of manufacturing or other processes caused by voltage sags, swells or
unbalanced conditions when a short circuit fault occurs in the distribution system.
The paper discusses the requirements for reduction in the duration of different short
circuit faults.
The behavior of typical distribution feeder protection or substation protection systems
is analyzed from the perspective of the definitions of voltage related power quality
events.
The use of IEC GOOSE in the development and implementation of distribution
protection schemes is analyzed from the point of view of improvement in the
performance of the distribution protection schemes and the reduction of the overall
fault clearing time.
The effect of changes of the system configuration on the performance of the
protective relays is then analyzed. Multifunctional protective IEDs are then
considered and it is demonstrated that by using all available protection and
programmable logic functions combined with the exchange of GOOSE messages
between different distribution protection IEDs, the user can significantly reduce the
effect of short circuit faults on sensitive loads supplied from the distribution
substation.
Adaptive protection based on detected changes in the system configuration,
combination of instantaneous, definite time and inverse time-delayed phase, ground
and negative sequence elements will result in significant reduction in the duration of
the fault. This will lead to changes in the voltage level/time characteristics of the fault
condition and reduced probability for the costly interruption of voltage sensitive
processes.
The following schemes using GOOSE messages are described:
• Distribution bus protection
• Selective backup tripping
• Sympathetic tripping scheme
• Breaker Failure protection
The requirements and tools for testing of such schemes are described at the end of
the paper.
284
The case of two or three-phase faults is quite different. For three-phase faults all
phases experience a voltage sag, while for a two-phase fault - the two faulted
phases will have lower voltages, with the healthy phase without a significant change
compared to the pre-fault levels.
Fig. 2 shows a plot of depth vs. duration of actual cases from a high-volume
manufacturing plant, with some of them resulting in process shutdown due to
variable speed drives and vacuum pumps failures.
There are several factors that determine the voltage level during a short circuit fault
on the transmission or distribution system:
• System configuration
• Fault location
• Fault resistance
The first characteristic of a voltage sag – the depth – is something that we can’t
control, but we have to study in order to be able to predict or estimate the effects of
different faults on the sensitive equipment.
The second characteristic of the voltage sag – the duration – is the parameter that
we can control by properly applying the advanced features of state-of-the-art
multifunctional distribution feeder protection relays. The focus of this paper is the
impact of IEC 61850, and especially the use of GOOSE messages in distributed
protection schemes that can reduce the fault clearing time in distribution substations.
Bay
computer P..
IF 8
LC2 R...
IF 8
Protection LC1
IED P...
R...
Protection
P... IED
Distributed
function
The functions in the substation can be distributed between IEDs on the same, or on
different levels of the substation functional hierarchy. IEC 61850 defines three such
levels:
• Station
• Bay/Unit
• Process
These levels and the logical interfaces are shown by the logical interpretation of
Figure 4. IEC 61850 focuses on a subset of the interfaces shown in Figure 4 with
Interface 8 (shown in red) being used for high-speed peer-to-peer communications.
The logical interfaces IF8 is defined as direct data exchange between the bays
especially for fast functions like interlocking.
The benefit of this scheme is that instead of clearing the bus fault with the long time
delay of a coordinated backup transformer protection, the only time delay required
will be the longest possible overcurrent element starting time plus a safety margin.
The benefit of the peer-to-peer communications based distributed bus protection is
that it provides fast fault clearance for distribution bus faults without the need for any
additional protection equipment.
Each of the relays on the healthy feeders subscribes to GOOSE messages from all
adjacent feeder protection IEDs and when it receives a message indicating adjacent
feeder fault, it adapts its settings for the period of time that the expected inrush
condition is going to last. Two options are usually available:
• block the sensitive overcurrent setting
• reduce the sensitivity by increasing the pickup setting for the duration of the
inrush
The benefit of using GOOSE messages in such a scheme is that instead of the large
number of required wires between the binary inputs and relay outputs of all
distribution feeder protection IEDs, the just need to publish and subscribe to GOOSE
messages from the adjacent feeders' IEDs.
The conventional implementation of this scheme is based on the use of the normally
closed contact of an output relay that closes when the relay fails. This
implementation requires hardwiring between all feeder relays and the dedicated opto
inputs of the transformer relay.
The IEC 61850 GOOSE repetition mechanism can be used to eliminate the need of
the above described hard wiring. If the transformer protection IED subscribes to
GOOSE messages from all feeder protection IEDs, within the maximum repetition
time interval it will receive a GOOSE message from all healthy IEDs.
If one of the feeder protection IEDs fails, it will stop sending GOOSE messages. This
will cause the enabling of the selective backup trip logic in the transformer protection
IED.
multifunctional protection IEDs and the increasing requirements for decrease in the
duration of distribution faults.
The distributed breaker protection scheme can be implementation using two different
approaches depending on the location of the breaker failure detection element.
In the first case the breaker failure protection element is in the multifunctional
transformer protection relay. When the distribution feeder protection relay operates,
it sends a GOOSE message indicating the change of state of any of the protection
functional elements.
The transformer protection relay subscribes to this message, and when it receives
the change of value of a feeder protection functional element Operate data object to
True, initiates the breaker failure protection function. If the breaker fails to trip, the
fault current will keep the level of the current above the pickup setting of the breaker
failure detection element, the timer will time out and the relay will trip the required
breakers to clear the fault as shown in Figure 8.
Another implementation of the scheme is based on a built-in breaker failure
protection in each of the distribution feeder protection IEDs.
In this second when the distribution feeder protection relay operates, it initiates the
built-in breaker failure protection function. If the breaker fails to trip the breaker
failure protection function will operate and send a GOOSE message indicating the
change of state of this protection functional element.
The transformer protection relay subscribes to this message, and when it receives
the change of value of a breaker failure protection function element Operate data
object to True, will trip the required breakers to clear the fault as shown in Figure 8.
292
Functional Testing Of IEC 61850-8-1 And IEC 61850-9-2 Based Bay And
Substation Level Distributed Applications
The testing of distributed protection functions that are based on IEC 61850 GOOSE
are similar functionally to the testing of hardwired schemes. The main difference is
that in this case the test devices need to be able to act as IEC 61850 devices, i.e. to
be able to publish and subscribe to GOOSE messages.
If the distributed scheme includes devices located remotely from each other in the
substation, we may need multiple test devices with virtual simulators or analog
outputs. The simulation of the substation and system environment required for the
functional testing of bay and system level functions will require the simulation of
multiple IEDs.
A test system designed for IEDs or distributed applications based on IEC 61850
have multiple components that are needed for the testing of the individual functions,
as well as a complete application. A simplified block diagram of such a system is
shown in Figure 9.
The first component of the test system is the test Configuration Tool. It takes
advantage of one of the key components of the IEC 61850 standard – the Substation
Configuration Language. The Configuration Tool is used to create the files required
for configuration of different components of the test system. It imports different
configuration files defined by Part 6 of IEC 61850.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 293
The test system Configuration Tool reads the information regarding all IEDs,
communication configuration and substation description sections. This information is
in a file with .SCD extension (for Substation Configuration Description) and is used to
configure the set of tests to be performed.
The overall functionality of any IEC 61850 compliant device is available in a file that
describes its capabilities. This file has an extension .ICD for IED Capability
Description.
The IED configuration tool sends to the IED information on its instantiation within a
substation automation system (SAS) project. The communication section of the file
contains the current address of the IED. The substation section related to this IED
may be present and then shall have name values assigned according to the project
specific names. This file has an extension .CID (for Configured IED Description).
The second component of such a system is a Simulation Tool that generates the
current and voltage waveforms. The specifics of each simulated test condition are
determined by the complete, as well as the configured functionality of the tested
device or application.
The simulation tool requirements will also be different depending on the type of
function being tested. For example, if the tested function is based on RMS values or
phasor measurements, the simulation tool may include a sequence of steps with the
analog values in each of the steps defined as Phasors with their magnitude and
phase angle. Based on these configuration parameters the simulation tool will
generate the sine waveforms to be applied as analog signals or in a digital format to
the tested components or systems.
If the tested functions are designed to detect transient conditions or operate based
on sub-cycle set of samples from the waveform, an electromagnetic transients
simulation will be more appropriate.
The third component of the test system is the Virtual IED simulator that is used to
represent components of the system that are not available at the time of testing, for
example during factory acceptance testing. During the testing this module send
GOOSE messages that the function or Subfunction under test uses as inputs that
determine its behavior under the test conditions applied.
The fourth component of the test system is the Test Evaluation Tool that includes the
monitoring functions used to evaluate the performance of the tested elements within
a distributed sampled analog value based system. Such evaluation tool requires
multiple evaluation sub-modules that are targeted towards the specifics of the
function being tested. In our case they are based on monitoring the GOOSE
messages from a tested IED.
The fifth component of the test system is the Reporting Tool that will generate the
test reports based on a user defined format and the outputs from the simulation and
evaluation tools.
CONCLUSIONS
The application of IEC 61850 GOOSE messages allows significant improvements in
the protection of distribution substations that reduce fault clearing times and
minimize the effect of short circuit faults on sensitive loads.
294
Using such high-speed messages eliminates the need for multiple hard wired
connections.
In some cases the implementation of a hard-wired distribution protection scheme
(such as sympathetic trip logic) in a large substation requires also that all protection
IEDs have a significant number of binary opto inputs and relay outputs. The
publisher/subscriber mechanism used with GOOSE messages eliminates this
problem.
The testing of distributed applications requires the use of testing equipment that can
simulate and subscribe to GOOSE messages. In some cases multiple test devices
need to be synchronized in order to test a distribution protection scheme.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 295
These cables are cut to a specific length and bundled, Considering the requirements for the reliability,
which makes any required future modification very labor availability and maintainability of functions, it is clear that in
intensive. This is especially true in the process of refurbishing conventional systems numerous primary and backup devices
old substations where the cables insulation is starting to fail. need to be installed and wired to the substation. The
The large amount of copper cables and the distances that equipment as well as the equipment that they interface with
they need to cover to provide the interface between the must then be tested and maintained.
different devices exposes them to the impact of The interface requirements of many of these devices
electromagnetic transients and the possibility for damages as a differ. As a result specific multi core instrument transformers
result of equipment failure or other events. were developed that allow for accurate metering of the energy
The design of a conventional substation needs to take into or other system parameters on the one hand and provide a high
consideration the resistance of the cables in the process of dynamic range used by e.g. protection devices.
selecting instrument transformers and protection equipment, as With the introduction of IEC 61850 different interfaces
well as their connection to the instrument transformers and have been defined that can be used bys substation applications
between themselves. The issues of CT saturation are of special using dedicated or shared physical connections - the
importance to the operation of protection relays under communications links between the physical devices. The
maximum fault conditions. Also Ferro resonance in voltage allocation of functions between different physical devices
transformers has to be considered with relation to the correct defines the requirements for the physical interfaces, and in
operation of the protection and control systems. some cases may be implemented in more than one physical
Failures in the cables in the substation may lead to Local Area Network (LAN) or by applying multiple virtual
misoperation of protection or other devices and can represent a network on a physical infrastructure.
safety issue. In addition open CT circuits, especially when it The functions in the substation can be distributed between
occurs while the primary winding is energized can cause Intelligent Electronic Devices (IEDs) on the same, or on
severe safety issues as the induced secondary e.m.f. can be different levels of the substation functional hierarchy –
high enough to present a danger to people’s life and Station, Bay or Process as shown in Figure 2.
equipment insulation.
The above is definitely not a complete list of all the issues
that need to be taken into consideration in the design of a
conventional substation. It provides some examples that will
help better understand the impact of IEC 61850 in the
substation.
In order to take full advantage of any new technology, it
necessary to understand what it provides. The next part of the
paper gives a short summary of some of the key concepts of
the standard that have the most significant impact on the
substation design.
Substation Substation throughout the high voltage installation. However with the
HMI Computer capability to send voltage and current measurements as
sampled values over a local area network it is possible to
Router WAN eliminate some of these instrument transformers. One example
is the voltage measurements needed by distance protections.
Ethernet Switch Substation Bus
Traditionally voltage transformers are installed in each
outgoing feeder. However if voltage transformers are installed
IED IED IED IED SCADA Master on the busbar, the voltage measurements can be transmitted
over the local area network to each function requiring these
measurements. An example of such a solution is shown in
Ethernet Switch Process Bus
Figure 10. These concepts are not new and have already been
applied in conventional substations. In conventional
MU IO U IO U MU substations however it requires large amounts of (long) cables
Fig. 8: Communications architecture for process and station bus and several auxiliary relays limiting or even eliminating the
benefit of having less voltage transformers.
Another device, the IO Unit (IOU) will process the status
inputs, generate status data, format a communications message
and multicast it on the substation LAN using GOOSE
messages.
All multifunctional IEDs will receive the sampled values
messages as well as the binary status messages. The ones that
have subscribed to this data then process the data make a
I 21 I 21
decision and operate by sending another GOOSE message to
the to trip the breaker or perform any other required action. IU IU U
Fig. 8 shows the simplified communications architecture
of the complete implementation of IEC 61850. The number of
Ethernet Switch
switches for both the process and substation busses can be
more than one depending on the size of the substation and the Fig. 10 Alternative substation design with process bus
requirements for reliability, availability and maintainability.
Process bus based applications offer important advantages
over conventional hard wired analog circuits. The first very
important one is the significant reduction in the cost of the
system due to the fact that multiple copper cables are replaced
with a small number of fiber optic cables.
Using a process bus also results in the practical
elimination of CT saturation of conventional CTs because of
the elimination of the current leads resistance. As the
impedance of the merging unit current inputs is very small,
this results in the significant reduction in the possibility for CT
saturation and all associated with it protection issues. If non-
conventional instrument transformers can be used in
combination with the Merging Units and process bus the issue
of CT saturation will be eliminated completely as these non-
conventional CTs do not use inductive circuits to transduce the
current.
Process bus based solutions also improve the safety of the
substation by eliminating one of the main safety related
Fig. 9 Substation design with process and station bus problems - an open current circuit condition. Since the only
current circuit is between the secondary of a current
Figure 9 is an illustration of how the substation design transformer and the input of the merging unit is located right
changes when the full implementation of IEC 61850 takes next to it, the probability for an open current circuit condition
place. All copper cables used for analog and binary signals is very small. It becomes non-existent if optical current
exchange between devices are replaced by communication sensors are used.
messages over fiber. If the DC circuits between the substation Last, but not least, the process bus improves the flexibility
battery and the IEDs or breakers are put aside, the “copper- of the protection, monitoring and control systems. Since
less” substation is a fact. current circuits can not be easily switched due to open circuit
The next possible step when using station and process bus concerns, the application of bus differential protection, as well
is the optimization of the switchgear. In order for the as some backup protection schemes becomes more
protection, control and monitoring functions in a substation to complicated. The above is not an issue with process bus,
operate correctly several instrument transformers are placed because any changes will only require modifications in the
300
VII. REFERENCES
[1] IEC 61850, Communication networks and systems for power utility
automation
[2] IEC 61850-9-2 LE: Implementation Guideline for Digital Interface to
Instrument Transformers Using IEC 61850-9-2, UCA International
Users Group
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 301
Ethernet as a Channel for Protective exclusively over Ethernet. The speed at which
Ethernet takes over your relay channels will
Relaying depend on you, because the technology for this
John Benckenstein is here today. Now let’s talk about the relay
“It was only as recently as 1960 when the engineer’s unique thought process.
concept of using glass fibers for Most of us are Engineers, and we are all
communications was first proposed by “techies” to some degree. We think with logic
researchers at Standard Telecommunication and leave quick uninformed decisions are for
Laboratories.” In 1995 I wrote a paper called others with less important jobs. We have all
“System Reliability Improvements through use been called cheap or conservative more than
of Fiber Optics” and that was the first sentence. once in our lives and that does not bother us. We
In that paper I suggested that traditional relay are just being practical by retaining our assets.
communications, like pilot wire, audio tone, We think it natural when our children point out
power-line carrier and direct fiber optics, would to us that in two separate vacation photos, taken
all lose popularity to Time Division Multiplexed 10 years apart, we are wearing the same shirt.
(TDM) fiber optic channels. Subsequently, the Why waste money when it still works?
use of TDM has rapidly expanded within nearly We will actually read and understand the
every Electric Utility in the world. Apparently I specifications. We study numerous reports
was right. before we buy a car, house, mountain bike,
I know there are those who prefer the single home theater or anything expensive. That is our
fiber, single function approach for relaying. I cautious and analytical side that we carry
also believe this is the right choice for many proudly into the office. It is why our companies
situations, especially when there are multiple hired us in the first place. At the office, we
backups using different communication won’t buy into the latest technology until it is
mediums and/or routes. We were forced away proven; or until we study it long enough to be
from dedicated fibers by either lack of enough 100% sure buying it won’t make us look bad.
fiber, or the desire to get revenue for those We stayed with electromechanical relays well
fibers. However, multiplexed channels have into the microprocessor age. Only when the cost
worked out okay and are even an improvement and proven benefits outweighed the fear of
adding channel redundancy for most failure change did we accept them. Multiplexing
modes. channels over fiber is another example you did
not quickly accept and I am sure you can think
Back in 1995, nobody I knew thought anything of others. Maybe relaying over Ethernet will be
would replace TDM; and especially not for next.
protective relaying. However, this new and
mysterious Ethernet is offering benefits worth Contrary to this thinking, for the really cool and
your consideration for mission critical high tech stuff outside of the office, we will buy
applications. Today I am telling you that the first version out. The first PDA, smart phone,
Ethernet is ready to take over as your new IPOD, IPAD, X10–controlled Christmas lighting
favorite communication channel for protective or pocket calculators are good examples. We
relaying. may not buy the car with the most luxury, but
call them features and we are sold. We will keep
Ethernet is largely reported to have been that car for ten years, because it still works. We
invented in the mid 1970s by Robert Metcalfe, will buy the toaster; washer or dryer with the
who was a member of the Xerox research staff. most digital displays and features, even if it
Since its beginnings as a way to connect costs a little more and even if our spouse does
computers to copiers, Ethernet has continued to not appreciate it. It has to be better because it
evolve. By the end of this decade, most of your has more gadgets, right? And if it breaks
substation communications will be done because of all those gadgets, we can probably fix
302
it from spare parts in our garage. If you are like a track record that lets us sleep soundly at night.
me you still have the power adapter from every As is often the case, there is something new,
device you owned since college somewhere in right here, right now. It is something that better
that garage. interfaces with smart grid devices and makes
even better use of fiber than SONET. It is TDM
Today’s Ethernet is similar to that. Not the
packets over Ethernet. This can provide you
frequently breaking part, but the myriad of
with the same level of comfort, flexibility,
gadgets and features to catch our interest part. It
capacity and performance as SONET. The
follows then that this is what makes us interested
question is; can you trust it?
and wary of Ethernet at the same time. It is
undeniably higher tech than TDM. But this high Several utilities are building IEC61850-enabled
tech truly adds value and is mostly automatic; so substations today. This involves using Ethernet
you do not need to fully understand it to use it. I and fiber to replace copper wiring within the
know this goes against our grain; but a lot of substation. Clearly this already indicates some
very smart people have spent a lot of time and level of acceptance for Ethernet carrying relay
money getting Ethernet right over the past 35 data.
years. They have done this so you would feel
Utility IT departments replace their
comfortable trusting it with your network assets.
infrastructure every 5 to 10 years. As those
It has a specification sheet with more acronyms
systems are being replaced, they are finding less
than any other industry, including system
SONET and more Ethernet systems to choose
protection.
from. T1 and SONET will be around for many
RMON, SNMP, Telnet, VLANs (Port- years, but clearly Ethernet is beginning to take
based and Tag-based), GVRP, Port- over.
mirroring, CLI, Port Security, SNTP,
Example: Most of you probably have a Voice
BootP, DHCP, IGMP Snooping, 802.1p,
over IP phone network (VoIP) in place which
QoS, RSTP
was purchased as a less-costly alternative to
I am asking you to ignore 80% of those traditional switched telephone services. VoIP
acronyms because they are not features you need was a technology driven by the telecom
to understand to apply relaying over Ethernet. industry. Since utilities are a small segment of
However, some of these items are what will the telecom industry, we are forced to follow
ultimately provide you with the security to trust their technology lead or risk losing support
this new technology. Remember RSTP, VLAN down the road. Do you buy and install new
and QoS. (Spanning Tree Protocol, Virtual relays every 5 to 10 years? My guess is the
Local Area Network and Quality of Service) relays you are replacing today were installed 20
These are all part of today’s Ethernet and all to 25 years ago. But what are you going to do
play a role in making it suitable for relaying. with your channel equipment when your
“This is not your Father’s Ethernet.” It is up to communications group starts replacing your
those of us producing this technology to prove to backbone SONET with Ethernet? You will need
you that it is worthy of your trust. a way to interface those relays with Ethernet.
The much talked about, desired, and dreaded Fortunately you do have some choices today.
“smart grid” requires even more bandwidth from Several manufacturers now offer multiplexers
our networks. Those responsible for these that interface standard communication protocols
networks are facing the decision of what will like C37.94, RS232 and audio tones to TDM
that network look like. Will it be based on past packets over Ethernet. Even the
proven SONET technology? We feel safe with electromechanical pilot wire relays can function
SONET. It brings us predictable results and has properly through an Ethernet channel.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 303
All of these channels, plus telephone and video Routable protocols are more difficult to secure
as direct IP traffic, can be carried on special and must be interfaced to the outside world
broadband packet-based multiplexers designed through firewalls. Layer 2 packets contain
for use in power substations. Unlike a lot of the Media Access Control (MAC) addresses to
telecom-based systems, these multiplexers meet guide the packets from source to destination. A
the strict environmental and EMC standards unique MAC address is assigned by the
specified in IEEE1613. manufacturer and generally cannot be changed
by the user. Layer 2 packets are switched, but
I do not expect to make believers out of you
are not routable so they are inherently more
with just this one paper. I do hope that when this
secure and common for substation to substation
presentation is over you will better understand
communications. We will limit discussion to
what the potential is for today’s TDM-packet
layer 2 packets in this paper, but there is a place
over Ethernet solutions.
for both types within the Utility.
Basics of Ethernet and how it can carry TDM
channels: When any type of channel is
transferred over a digital media, the data must
first be converted into a series of bytes sent
every 125 uSec. Since there are 8 bits in every
byte, this is the equivalent of 64Kbps, which is
known as a DS0. It is the function of channel
modules to convert the actual data into this
series of bytes or samples. This is true for a
simple contact, voice, audio tone, RS232 stream,
or 64kb synchronous channels. TDM and Packet
technologies are the same up to this point. The
difference starts after the DS0 samples/bytes are Several companies make Ethernet switches
created. designed for the harsh substation environment
Similar to DS0 channels that carry data over that meet the requirements of IEEE1613.
TDM, packets carry data over Ethernet. The The transport or backbone
basic Layer 2 or 3 packets are similar. The connections are typically
difference is that layer 3 packets contain IP made through SFP
addresses and as such are said to be routable. transceivers, which stand for
304
you add a node or channel module, every node is and known primary and backup routes
updated with the type and location of every through complex Ethernet networks.
channel module in every chassis. This is why
b. QoS: Quality of Service: This is
configuration of end to end channels is so easy.
optional, but very important to ensuring
Every node is completely aware of the entire
deterministic delays/latency across a
network and any changes as they happen,
network for critical channels. Eight QoS
automatically.
levels are available with the highest
Settings for channel cards fall into two level 7 generally reserved for switch to
categories, application and control. switch management messaging. QoS
becomes a factor in latency when a
1. Application settings: These vary with
network is over 65% loaded. Above this
channel type and are coordinated with the
it is likely that several packets will
relay or other end devices passing data
occasionally want to be multiplexed
across the channel. They are applied to one
onto the transport fibers at nearly the
end at a time. These same setting options are
same time. Quite simply, those packets
used when channels are part of a TDM-
with the higher QoS settings are
based system. Examples are:
permitted to pass first, thereby assuring
a. The settings for a four-wire voice card your relay channels will have the
would be transmit and receive gain and latency you expect. The preference
whether or not signaling is enabled. given to higher QoS channels is
b. A transfer trip relay card would have weighted so even with very high traffic
settings for contact bounce, security, trip present, lower priority packets will
hold delay, addressing and guard before eventually pass. If you know your
trip logic. network loading will always be under
50%, then it is less important to apply
2. Control Settings: These control how that QoS as almost all packets will be passed
data is passed through the network and are without delay.
applied to both ends simultaneously. They
are unique to the packet network and a big c. Bandwidth E conomy: This allows the
reason why Ethernet is now considered user to choose between having a lower
suitable for protective relaying. latency channel using relatively high
bandwidth, or a longer latency channel
a. VLAN: Virtual Local Area Network: using less bandwidth.
This setting is optional and is used in
conjunction with your switch network. If a single DS0 byte was included in
VLAN tags allow a group of packets to each packet, the effective bandwidth for
reside on a common switch network that channel would be about 5.5 Mbps
alongside other packets with different with a latency of under 1 mS. This is
VLAN tags. The packets appear as if because you must send each packet
isolated on their own private network. every 125 uSec and each packet
Proper use of VLAN tags provides contains about 87 byes. 87 bytes x 8
better control over the route packets take bits/byte = 696 bits. 696 bits / 125 uSec
through the network. They are = 5.5 Mbps. 87 bytes is the minimum
mandatory for providing what is sized packet that can be considered
advertized as bumpless or hitless standard. By including more bytes in
switching on ring networks and for each packet you can reduce the
when using packet-based multiplexers frequency that packet is sent thereby
as inputs to MPLS networks. MPLS spreading the effective overhead across
stands for multi-protocol label switching more data bytes. When a more typical
and is useful for providing deterministic setting of 16 bytes (TDM frames) per
packet is selected, the bandwidth is
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 307
because all of the framing is set to repeat on 125 etc. This is all fairly well known and was the
uSec boundaries. The timing for this primary subject of my last paper.
synchronization is embedded in the overhead of
It is accepted that TDM systems configured in
the TDM frame sequence. Packet networks do
rings (loops) will effectively reroute channels
not have a common overhead frame to pass
broken by a failed fiber. They do this by
clock between nodes. What they do have is a
remapping the affected channels in the opposite
highly accurate internal oscillator to establish
direction around the ring, thereby avoiding the
clock packets that are multi-cast to all remaining
broken fiber. The engineer will always know
nodes at precise intervals. All “remote” nodes
exactly what path their channels are taking
will use the intervals between clock packets to
before and after the break. In some systems,
calibrate their own internal oscillators to match
manual setup of alternate paths may be required
the master oscillator’s frequency. It is this
for optimum switching performance. Switching
recovered clock frequency that each node uses to
times for TDM systems will range from 5 mS to
take packets out of the bottom of the jitter
250 mS with 50 mS being most common. TDM
buffers. This allows every node to look at the
systems designed with relaying in mind will
same relative data at exactly the same time,
hedge towards the lower settings.
which by definition makes it synchronous.
Ethernet handles redundant path switching very
Even if the clock signal is momentarily lost, the
different from TDM. To understand this, you
local oscillator, which you remember has
need to know Rapid Spanning Tree Protocol
already been offset to match the master
(RSTP). This was one of the three important
frequency, will step in to ensure this timing stays
switch specifications mentioned earlier. Let’s
100% solid. For private networks over fiber, this
consider an Ethernet network configured in a
has been proven to be equal to or better than
ring. In the telecom world, costs are assigned to
TDM timing performance.
each link between switches, which are used to
There were three main obstacles to overcome find the least cost route for any connections. For
before Ethernet could be considered acceptable utility private network applications this cost
for carrying your critical relay channels. factor is not normally important, but the ability
to select a root node is still important.
Ethernet Acceptance Hurdle Number One
Is there a redundant path option when my most When we talk about ring or loop architecture we
direct channel route is broken? are referring to the physical structure and not the
When a main fiber, patch cord or transceiver path data will take within this structure. It is a
requirement of Ethernet that no packet is
fails in a single fiber pair solution, you lose that
allowed to circle endlessly around a physical
relay channel. Of course you will
also have backups so this is not
completely unacceptable. Your
planned redundancy is without
question compromised until
repairs are made. Designing with
alternate routes and self-healing
rings can add redundancy with
minimal effort or cost making it
easier for the engineer to accept
using a single fiber pair for
multiple functions.
TDM systems implement self-
healing rings with labels and
acronyms like, APM, ILS, Mini-
DACS, FFHS, UPSR, BLSR,
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 309
ring. There must be only one unique route networks take a little longer. Then in 2004, a
between any two nodes. This would cause what new version of RSTP was released that could
is known as a firestorm and will bring the meet similar switching times and was an open
network to its knees in milliseconds by blocking standard anyone could adopt. Subsequently, the
all traffic. RSTP is a standard feature of use of proprietary protocols diminished allowing
managed switches and simply enabling it some interoperability between switch vendors.
effectively prevents firestorms even when the
Now you know that switching times for rings are
physical configuration contains rings. RSTP
comparable between TDM and Packet networks
settings allow you to select the one port on the
configured in rings.
ring network that will be blocked for all data.
(Multiple ports will be blocked for mesh • 15 to 50 mS for packet networks of 3 to 10
networks.) So the “allowed” data path on a ring nodes
looks more like a “C”. Since no data can pass • 5 to 150 mS for TDM networks
through the blocked port, some traffic will
Either is generally considered acceptable for
necessarily be directed the long way around the
most relay applications.
ring to reach its destination.
Multiple Spanning Tree Protocol (MSTP) is a
When a path break is detected by one of the non-
relatively new variation of RSTP. MSTP-
blocked ports, the system will automatically
enabled switches have the ability to set different
enable the previously blocked port. This causes
ports as blocking for different VLANs. By
any packet stream previously using the newly
prudent selection of VLANs for each channel,
blocked port to find a new route. This is
you can ensure the primary path will be the
automatic and requires no preconfiguration or
shortest route. If you choose to route primary
interaction by the user.
and secondary channels opposite directions
So how long does it take to reroute your critical around the same ring, then you never have to
circuits? When STP was first introduced, you wait for rerouting delays on both channels for a
could expect switching delays of 20 to 30 fiber break.
seconds. Rapid Spanning Tree Protocol (RSTP)
Some vendors are taking advantage of an
was adopted a few years later, reducing the
additional possibility with MSTP that allows for
switching time to 1 to 2 seconds. Some of the
near zero switching delay for breaks. The
switch manufacturers who specialized in Utility
principle involves sending the same channel
applications developed their own proprietary
information both directions around a ring in two
versions of RSTP called S-Ring, ERSTP, etc.
nearly identical packet streams. Logic at the
These implementations lowered switching times
receiving end listens to both directions, but only
for rings to less than 5 mS per node. MESH
accepts data from one of the packet streams.
With this system, it is likely that no data
will be lost and there will be essentially
zero delay to “reroute” to the alternate
path. This performance has been called
bumpless, hitless or zero-delay switching.
The only drawback to this feature is that it
doubles the bandwidth used within the
network.
This is one benefit that TDM simply
cannot match. Packet over Ethernet
systems can give you better channel
availability than TDM right when you need
it; when your fiber breaks concurrent with
a line fault.
310
Ethernet Acceptance Hurdle Number Two For medium to large systems, with a lot of nodes
between the ends, Ethernet can actually provide
Is channel latency consistent and low enough for
a faster channel due to the way data is passed-
relaying? Is it deterministic?
through at in-between nodes. In TDM, you can
Latency is defined as the time it takes a channel have 125 to 250 uSec of delay to receive,
input at the originating node to reach the output reframe and transmit the DS0 channel at every
at the destination node. This could be a transfer pass-through node. In Ethernet, this function is
trip contact, an RS232 data byte, or any piece of handled completely by the switch with pass-
data. Latency in a TDM system is always the through delays of under 10 uSec. Remember that
same low value. This can be calculated by in most cases, this delay is tolerable anyway so
knowing: the fiber distance the data must travel, either system will still satisfy the time
the pass-through delay at in-between nodes, and requirements.
the internal processing delay of the channel
Ethernet Acceptance Hurdle Number Three
cards themselves.
What about Bandwidth?
I can understand how you could be somewhat
surprised by the amount of bandwidth used to
send a single DS0 over Ethernet compared to
TDM. But what is the right way to compare
bandwidth?
Only a few relays require latency of less than 1
millisecond and those will use about 5.5 Mbps
of bandwidth, or 0.55% of the GigE channel.
Some older pilot wire or less sophisticated
current differential relays fall into this category
and must be set for 1 frame per packet to
function properly. These relays cannot
compensate for channel latency like modern
current differential relays.
If this same channel were running over an OC-
12 SONET network that DSO will use only 64
Kbps, or 0.01% of the total bandwidth
(622Mbps). On the surface this looks like
Ethernet uses 50 times more bandwidth than
TDM.
Due to the need for the jitter buffers, channels
sent over Ethernet are not as fast as channels But that is not 100% correct.
over TDM, but are generally considered Rarely are channels required to be under 1 mS in
acceptable. The tables here show typical channel latency. More than one relay engineer has told
latency for RS232 and PRS (transfer trip) me back to back channel latency of 6 to 10mS,
modules exclusive of any relay processing was completely acceptable for Blocking, DTT or
delays. Note that because you have control over POTT schemes. From the chart, a latency of 6
how many DS0 samples you put into each mS will require about 392 Kbps of bandwidth
packet (shown in Bandwidth Economy); you for the RS232 channel, which equates to 0.04%
have full control over latency and bandwidth of the 1.0 Gbps channel.
used for each individual channel. The faster
This is only six times greater bandwidth than for
channel settings will use more bandwidth, while
normal TDM channels. However, most SONET
the slower settings will use less bandwidth.
systems cannot protect individual DS0 channels
for redundant loop switching. Instead they must
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 311
specification could be met for a 20-node required working through some challenges
network says a lot about the capabilities of during the installation; but it was all worth it
packet over Ethernet technology for low latency according to Pete. The system currently is
and consistency. providing reliable channels for several HCB,
311L and 387L relays. More channels will be
Pete Baker became skilled at maintaining the
added in the coming months.
previous T1 FOCUS system over the years
including making adjustments to time slot maps.
He will tell you now that the mapping
configuration process for the BB FOCUS is
more intuitive and faster than the previous
system. Being a beta site for this new technology
314
References:
1. System Reliability Improvements through use of Fiber optics, Benckenstein, John R., Pulsar
Technical Publication 96-1, Coral Springs, FL, 1996.
2. IEEE Std. 802.1Q-2005, Virtual Bridged Local Area Networks.
3. Pete Baker, Relay Supervisor, Ocala Utility Services, Substation Group
4. Mark Majka, Senior Engineer, Protection and Control, AEP
5. HVBPL (BPLC) Communications over Transmission Lines, EEI TD&M Conf., 10-5-2010
Bruce Renz, President, Renz Consulting LLC and Nachum Sadan, CEO , Amperion, Inc
John Benckenstein
AMETEK Power Instruments
Pulsar Division
4050 NW 121st Ave.
Coral Springs, FL 33065
Email: john.benckenstein@ametek.com
Telephone: +1.954.344.9822, ext 204
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 317
I. INTRODUCTION
There are two types of failures on this ring configuration that - Store and Forward Latency, Switch (Lsf)
can produce time delays on GOOSE message transmission: - Switch Fabric Latency (Lsw)
- Wireline Latency (Lwl)
Case 1. Cabinet’s LAN switch fails.
- Queuing Latency (Lq)
Protection relays are unable to send GOOSE messages through
the LAN switch where they are connected. The communication With a 100MB Ethernet connection from the devices to the
is recovered when both relay and MES has used its standby switch and a frame length of 137 bytes, the total ideal delay is
Ethernet port on the backup LAN switch. The switching time approximately 18.96 microseconds (LSF=10.96µs, Lsw=8µs,
between hot and standby port was not measured in this test set Lwl=0 and Lq=0) In other cases, with up to 24 switches, the
up. By specification, the backup switch must start to transmit total delay could be around 500 microseconds depending on
as soon as the first packet is sent from the devices; therefore, network architecture and background traffic. During the
the Ethernet link between the switch and device must be following tests background traffic was added to the network
established. equivalent to Lq = 2 µs, so all calculated results could have an
error of +/- 2 µs.[5]
Case 2. Any other LAN switch in the ring fails.
III. TESTING
Due to RSTP and switch capabilities, the communication can
be affected in two ways: A. Measuring the Operation Time of the Protection Relay
In any electrical power system, the less time required to clear a
a) Communication between switches is truncated, but fault, the less damage will be received by the switchgear. Due
communication between local ports continues. to this, any protection scheme must take into account the
b) Communication between switches and local ports is operation time required to energize the circuit breaker’s trip
truncated. coil. In some schemes, the protection relays close a built-in
contact to energize the trip coil. In other cases, auxiliary relays
Communication between local ports is the traffic between are used for this purpose, which increases the operation time
devices connected to the same switch, and for trip purposes is of the scheme up to 10 ms.
the most critical one on the network topology shown in Fig 1.
A. LAN Switch Considerations Based on CFEs previous project experiences, tripping by using
GOOSE messages through MES are equivalent to schemes
The following considerations should be taken into account using auxiliary relays.
when designing LANs using GOOSE messages for trips.
To determine the operation time of the protective relay using
a) Local traffic in the LAN switch must continue and no GOOSE message, the time is measured from the inception of
time delay must be admitted when a RSTP the fault up to the moment the test set detects the GOOSE
reconfiguration is in progress. That means, time message.
delivery must be consistent and just depend on relay
transmission time processing. In order to analyze the network performance, it is necessary to
measure the operation time of the scheme in the best
b) RSTP reconfiguration due to a failure on one ring’s conditions. To achieve better time delay, due to network
switch will affect traffic from one device to others latency, a scheme where the relay and test set are connected to
located in a different switch on the network. Breaker the same LAN Switch will be used.
failure is one example of protection scheme that
requires the transmission of GOOSE messages from
one cabinet to another (inter bay trips). Time delay is
accepted if reconfiguration is in progress and no
transmission is possible.
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 319
configured with the edge port set to FALSE. The ports used to
connect the IED and test set were set to TRUE. Setting up the
ports with this configuration will avoid the RSTP
reconfiguration process to consider the Edge ports as a
possible path to the network, speeding up the network healing
process upon a link or switch failure. The RSTP Bridge
Priorities of the switches were setup to ensure SW1 to be the
RSTP root, and SW2 to be the Root Bridge backup. Using this
topology the ring was logically opened between SW5 and
SW6.
Figure 2 Test Setup for measuring the operation time of the To avoid proprietary protocol dependency, only standard
protection relay RSTP protocol was considered during this test. RSTP healing
process will get longer delay after the Root switch fails and
In this scenario, the test set will measure the time taken from before the close of the link between SW5 and SW6 is decided.
the inception of the fault to the instant the relay publishes the In fact, a power failure of the RSTP root switch leads to the
trip GOOSE message. This will require that the test set be able worst case scenario for recovery time and this is what the test
to subscribe to the trip GOOSE message. was trying to accomplish.
The protection relay is configured as a impedance element to Due to the test conditions, SW1 starts the test with the power
publish a GOOSE message when a fault is detected on zone 1. source disconnected. Then, in order to get stable conditions on
The relay test set is configured to simulate a fault at 50% of the network, SW1 is energized for one minute before a source
the line length of the distance protection. failure is simulated on the root switch and a zone 1 fault is
applied to the relay. The power source SW1 failure initiates
The operation time of the relay was measured between 13.19 the reconfiguration process while at the same time a trip
and 14.39 ms. Twenty tests were performed which gave an GOOSE message is being published by the protection relay.
average of 13.63 ms, with no background traffic.
If the RSTP reconfiguration process affects any local or
As can be seen above, the protection relay tripped in less than switches intercommunication, a time delay on trip GOOSE
a cycle. This was caused by the sub cycle tripping algorithm in transmission is expected.
the relay.
B. Network Failure Test Setup
In order to verify the performance of the network, nine (9)
LAN switches, one protection relay and one relay test set with
GOOSE support, were used. All Ethernet ports used UTP-5
rated cables at 100 MB/s communication speed.
The protection relay and the relay test set are configured as
described in section A. In the test method described below a
power source failure on the LAN switch was simulated. No
other network failure events were simulated such as link
failure
Root Switch
OUT1 Relay Test Set
LAN Switch
Figure 4 Test's network topology and configuration
115 V
C. Determining Root Switch Fault Instance physically disconnected due to the time required to de-
One of the biggest challenges before the test was executed; energize its integrated circuits. After 193 ms, the message has
was to determine the right instance to disconnect the root a probability of 1 to NOT TRANSMIT, because SW1 hasn’t
switch. The first tests performed did not give accurate results any power to perform its task.
because the ring did not add any time delay. This was due to
not knowing the correct instance for simulating the root switch With this latency and no deterministic processing times on
failure. relay and switches, a ±3 ms window is a huge one because
SW1 can transmit the test message in just 94.8 µs, that is 31
In order to determine the exact instance when SW1 does not times smaller than the window the fail can happen, if the nine
transmit any package, the link between SW5 and SW6 was switches’ latency is taken in account that represents 17 times.
physically disconnected. The protection relay is connected to
SW5 and the test set to SW6, as shown in Figure 5. In this test, If we consider the probability of an Electrical Power System
when SW1 fails, there is no communication path between the and this network topology fault coincidence, including the
relay and the test set. Therefore, no GOOSE message will be switch’s capability to continue working for a long time on
detected by the test set. power fail, we will find a very low value. Even that, taken into
account statistics from the Utility power system’s faults and
more accurate samples using this test procedure, it is possible
to know the probabilities and help to adopt Ethernet networks
for circuit breaker trips.
D. Determining Time Delay in network due to RSTP
Two tests were performed in order to determine the time delay
added by RSTP on GOOSE message circuit breaker trips.
Consider that the ring is closed physically but no logical link
exists between SW5 and SW6.
Test 1: Local Communication on Ring Fault
This test will verify that no delay exists for local traffic when a
RSTP reconfiguration is in progress. For this test the test set
and relay are connected to SW5 as shown above in Figure 4
The test sequence is as follows:
Instant (t) was started at 500 milliseconds before fault As can be seen from table 1, no time delay was added to
inception and was reduced gradually up to a range between protection relay operation time and the tolerance of the relay
193 and 196 ms. 196 ms before a GOOSE message is operation time is ± 2 ms. The LAN switch meets the design
published, the message has a Probability of 1 to be consideration (a) criteria described in section A.
transmitted. SW1 is able to perform its task even when it is
X Simposio Iberoamericano Sobre Protección de Sistemas Eléctricos de Potencia 321
IV. CONCLUSIONS
Los números en negrita indican los artículos en los que el autor aparece como primer autor.
A Hedding, R. 263 Sanza, P. 123
Acosta, E. 199 Henneberg, G. 269, 317 Schauerman, G. 257
Adamiak, M. 123, 257, 209, 269 Herrmann, H.-J. 225, 133 Schiefen, M. 257
Aguilar, R. 317 Hosseini, S. 1 Schwartz, R. A. 159
Ahumada, A. 219 Sebastián, D. 95
Alcázar, E. 113 J Shulim, B. 87
Allan, S. 209 Janssen, M. C. 295 Smit, A. 225
Altuve, H. J. 113, 159 Soto, I. 199
Antonova, G. S. 55 K
Apostolov, A. 283, 247, 263 Kasztenny, B. 29 T
Ariza, J. 269, 317 Kereit, M. 65 Tahan, C. M. V. 205
Arzuaga, A. 137 Kezunovic, M. 269, 317 Tejada, D. A. 103
Krugger, M. 73 Tziouvaras, D. A. 159
B
Benckenstein, J. 295 L U
Benmouyal, G. 87 Lemus, H. E. 113 Udren, E. 269, 317
Beresh, R. 269 Liu, K. 1, 9 Urbaez, C. S. 179, 103
Betanzos, J. 113, 153 Lizárraga, J. 219
Blumschein, J. 65 Llano, L. E. 179 V
Brunner, C. 55 Lloyd, G. J. 1, 9 Vandiver, B. 247, 283
Burger, J. 29 López, J. C. 153 Ventura, C. A. 159
Verzosa, J. 269
C M
Cable, B. 257 Madani, V. 269 W
Calderon, J. A. 179 Martínez, A. 81 Wache, M. 133
Castro, J. A. 219 Martínez, P. 145 Wang, Z. 9
Claus, M. 65 McLaren, P. 269
Cordova, R. A. 235 Mejía, R. 81 Y
Costello, D. A. 159 Mendoza, J. 317 Yip, H. T. 1, 9
Mier, J. J. 81
D Miller, H. 29 Z
Davila, H. 17 Moreno, C. 219 Zadeh, M. 209
De Oliveira, C. C. B. 205 Moscoso, M. 1, 9 Zamorano, D. I. 219
Diego, L. del Á. 137 Mynam, M. 87
DoCarmo, H. 269
Dzienis, C. 65 N
Nájera, A. 95
E Novosel, D. 269
Espinosa, D. 317
O
F Ortiz, M. A. 145
Fischer, N. 29
P
G Palizban, A. 209
Gómez, Á. E. 219
Gong, Y. 87 Q
González, A. 81 Quintanilla, R. 137
González, M. V. 219
Gutiérrez, M. 73 R
Guzmán, A. 87 Rufato, E. J. 205
H S
Hajimiragha, A. 209 Sánchez, D. 113, 159
Hayes, P. 263 Sandoval, R. 159
323