An Information Architecture for Future Power Systems and Its Reliability Analysis
|
|
|
- Marcia O’Connor’
- 10 years ago
- Views:
Transcription
1 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 17, NO. 3, AUGUST An Information Architecture for Future Power Systems and Its Reliability Analysis Zhaoxia Xie, Student Member, IEEE, G. Manimaran, Member, IEEE, Vijay Vittal, Fellow, IEEE, A. G. Phadke, Fellow, IEEE, and Virgilio Centeno, Member, IEEE Abstract Analysis of 162 disturbances from 1979 to 1995 reported by the North American Electric Reliability Council (NERC) indicates the importance of information systems under the regulated and competitive environment. This paper points out the major deficiencies in current communication and information systems and proposes a new power system information architecture aimed at correcting these deficiencies. The proposed architecture includes automation and control systems at all levels, from substation control system to independent system operator (ISO) operating center, taking into account the requirements of real-time data, security, availability, scalability, and appropriate Quality of Service (QoS). It uses multiple communication channels employing a wide variety of technologies to transmit real-time operating data and control signals. The real-time operating and control system is modeled with various redundancy configurations; the reliabilities of different configurations are studied and compared for practical values of component failure rates and repair rates. Index Terms Communication technology, EMS/SCADA, failure rate, fault-tolerance, information architecture, internet, multi-protocol label switching (MPLS), power system, real-time, reliability, repair rate, virtual private network (VPN). I. INTRODUCTION DEREGULATION and competitive markets for electricity have changed the organizational structures of the electricity supply industry as well as the operation of power systems. Interoperability between different entities requires adequate information to be brought to operators in a timely manner. All these requirements brought about by the electric market restructuring together with the unanticipated events that may occur indicate that the communication and information systems are becoming critically important for reliable and economic operation. However, the traditional isolated communication and information systems are not adequate for large amount of intercompany information exchanges and interoperation due to horizontal mergers and consolidation of many existing utilities. Poor coordination caused by lack of timely and adequate information exchange can exacerbate the effect of disturbances. A need exists for a better design of the communication and information architecture accommodating large information flow to facilitate smoother control and efficient decision making. Manuscript received October 30, 2001; revised January 24, This work was supported by the National Science Foundation (Grant-CMS ). Z. Xie, G. Manimaran, and V. Vittal are with the Department of Electrical and Computer Engineering, Iowa State University, Ames, IA USA. A. G. Phadke and V. Centeno are with the Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA USA. Publisher Item Identifier /TPWRS To understand and analyze the cause and impact of failures, we have carefully examined 162 disturbances reported by the North American Electric Reliability Council (NERC) from 1979 to 1995 [1] based on 11 possible contributing factors and damage assessment criteria. The analysis of these disturbances clearly indicates that problems in real-time monitoring and operating control system, communication system, and delayed restoration contribute to a very high percentage of large failures. Based on this analysis, an alternate architecture for the communication and information network is proposed. This architecture adopts suitable computing and communication techniques to take into account the requirements of real-time data, security, availability, scalability, and appropriate Quality of Service (QoS). In order to evaluate and compare the benefits of the different fault tolerance mechanisms proposed, the real-time operating and control system is modeled with various redundancy configurations using the HIMAP [2] software package. The reliabilities of different configurations are studied and compared for practical values of component failure rates and repair rates. Configurations that offer a high level of reliability are identified. This paper is organized as follows. After a brief introduction, Section II presents the analysis result of disturbances and identifies bottlenecks in current information systems; Section III presents the proposed information architecture and brief review of its key features, while detailed discussion can be found in [3]. Following the reliability analysis in Section IV, some conclusions and observations are made in Section V. II. DISTURBANCES ANALYSIS AND BOTTLENECK IDENTIFICATION NERC has published its findings on bulk electric system disturbances, demand reductions, and unusual occurrences since [1]. In order to understand and analyze the cause and impact of failures, we have carefully examined reviews of selected electric system disturbances in North America reported by NERC from 1979 to Our analysis provides detailed information for every disturbance from the initial faults that initiated the disturbances to the contributing factors that amplified the effect of the disturbances following the initial faults; a damage assessment is also given for each disturbance. Contributing factors are divided into ten analysis categories based on the NERC Operational Guides and Planning Policies [4]. Problems in each analysis category that contribute to the severity for every disturbance are also identified /02$ IEEE
2 858 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 17, NO. 3, AUGUST 2002 TABLE I STATISTICAL RESULTS FOR INITIAL FAULTS A. Disturbances Analysis Based on Initial Faults We divide the initiating events of power system disturbances into nine categories that could represent all possible causes and examine the percentages for each of the categories among the considered disturbances. The results are listed in Table I. From Table I, it can be observed that severe weather, unanticipated faults, and equipment failures are among the most common initial causes of disturbances. Stresses in the transmission system due to the increase in the number of transactions under competitive markets that were not foreseen and planned for will lead to more vulnerable systems if careful operational strategies based on real-time network analysis are not available. With the transmission system operating closer to its security limits, the ability to obtain better-controlled systems with the presence of predictable or unpredictable events becomes more critical. This requires accurate, fast, and reliable on-line security analysis to accurately determine the security limits and provide the operators timely and adequate operation and restoration guidelines. The proposed architecture suggests efficient on-line security analysis tools to be available at every level from the operations control center to the independent system operator (ISO) operating control center. Besides traditional state estimator (SE) and contingency analysis functions, these tools should also include some new applications such as voltage stability analysis (VSA), dynamic security assessment (DSA), and calculation of available transfer capability (ATC) [5] for evaluating real-time security and determining transmission system limits. With these security analysis tools, a better-controlled transmission system that can work closer to its limits without increasing the risks involved can be designed. B. Disturbances Analysis Based on Contributing Factors Following the initial faults, some system components may fail or malfunction, and potential deficiencies could be triggered. These deficiencies and failures definitely amplify the effects of the disturbances. In order to analyze these contributing factors, we have divided them into ten analysis categories based on the NERC Operational Guides and Planning Policies [4]. The percentage for each of these contributing factors among the considered disturbances is presented in Table II. The results show that problems in real-time monitoring and operating control systems (37.04%), communications and information systems (32.10%), and delayed restoration (38.27%) contribute to the highest percentage of considered disturbances other than protection systems. We did not rank power system facilities since almost all disturbances were exacerbated by either equipment failures or forced and planned equipment outages. These three aspects are closely related to power system performance and operation. They critically depend on a robust information infrastructure and real-time monitoring and analysis tools. Therefore, the need for efficient architectures, techniques, and tools for network contingency analysis, real-time operation, and future operational planning to deal with equipment outages gains significance. C. Identification of Bottlenecks Having identified the three key contributing factors in Table II, we further analyzed the disturbance data in [1] and identified the following key bottlenecks in the communication and information systems that led to the operation and restoration problems found in many disturbances: 1) inadequate exchange of real-time operating information and real-time coordination among control centers;
3 XIE et al.: INFORMATION ARCHITECTURE FOR FUTURE POWER SYSTEMS 859 TABLE II STATISTICAL RESULTS FOR CONTRIBUTING FACTORS 2) lack of automatic communication systems to receive rapid, and automatic information; 3) lack of timely communication and failure to use available communication systems; 4) large number of alarms and information overload on computer facilities; 5) inadequate transmission system security and communication facilities; 6) inadequate/improper communication or transmission circuits; 7) power supply failures to communication facilities and circuits; 8) lack of standard procedure and terms used to exchange real-time operating data; 9) lack of advanced communication equipment and emergency communication equipment; 10) lack of real-time security analysis and coordinated operation under adverse conditions, including the effects of simultaneous transfers in transmission interface. Existing communication and information system architectures lack coordination among various operational entities, which usually is the cause for delayed restoration. Moreover since the various subsystems are isolated, data and information sharing are limited. This is particularly important in the deregulated environment where the merger and consolidation necessitate large information exchange and interoperability. Load sharing between computational resources is of paramount importance during contingency situations. To overcome these drawbacks, Section III presents the proposed information architecture for power systems together with a brief review of the advantages and new functions of the proposed architecture. III. PREPOSED INFORMATION ARCHITECTURE A. Schematic of the Proposed Architecture The proposed information architecture, shown in Fig. 1, employs a distributed hierarchical computational structure to meet the goals of fault-tolerant and scalability requirements of power systems. The architecture shows a layers of abstraction of which the bottom two layers (substations and control center) are mainly concerned with the operational aspects of the power systems, while the top two layers [control center and ISO/energy trading system (ETS)] are concerned with both the operational and the planning aspects of the power systems. In this layered architecture, the granularity of real-time guarantees is coarse at the top layer (i.e., typical computation and communication deadlines are in hours) and it becomes fine-grain as we go down to lower layers (e.g., at substation, the deadline is in seconds). On the other hand, the amount of data processing involved increases as we go from the bottom layer to the top layer. This clear separation of the computations based on deadline granularity and data processing means that the proposed distributed computing architecture can efficiently integrate diverse algorithms and analysis techniques pertaining to operation and planning of power systems. The proposed architecture can reduce the communication and computation burden on higher level computer systems through data aggregation. More relevant and critical information is brought to the operators in the control center and ISO operating center, and this is especially important during contingencies for the operators to quickly understand the actual situation and make correct decisions. B. Key Features of the Proposed Architecture In the proposed architecture, suitable communication media for level-to-level and peer-to-peer information links are also identified [3]. In order to tolerate communication link faults, redundant communication links are employed using different communication technologies [6], [7]. Multi-protocol label switching (MPLS)-based [8] virtual private network (VPN) [9], [10] services employed in the proposed architecture allow timely and secure information exchange among entities, making it possible to share computational load between peer systems under failure or overload conditions. Local area networks (LANs) are connected to the MPLS-based VPN through firewall [11] while still keeping the traditional links from substation to control center, from control center to ISO
4 860 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 17, NO. 3, AUGUST 2002 Fig. 1. Proposed information architecture. operating center, and from ISO operating center to ETS. The demilitarized zone (DMZ) [12] in the corporate intranet is a specific area allowing external partners and customers to access needed information without sacrificing the security of the control center. This is similar to the concept of an extranet. The load sharing mechanism provides a possible solution for the presence of control system faults and/or large changes in computational loads. IV. FAULT-TOLERANT DESIGN AND RELIABILITY STUDIES The real-time operational and control system of power systems is modeled and analyzed with various redundancy configurations using HIMAP software package [2], for practical values of component failure rates and repair rates. HIMAP is a powerful modeling and analysis tool that allows the designer to specify the system as a fault tree, a fault tree with component repairs, a Markov chain, or a Petrinet. We studied the reliability of the following fault-tolerance designs: 1) operational and control system with varying computing and/or communication redundancies, and 2) operational and control system with different fault-tolerant designs for backup control center. The studies have been carried out with and without taking into account the repair rate. We assumed that the component failure rates are fixed, and the failures are independent, i.e., fault on one component does not induce a fault on another component. A. Computing and Communication Redundancy Design For modeling the control center substation interconnected control system, we assume the control center without fault-tolerance consists of one information/communication bus and two servers with the bus connecting the servers (one SCADA data acquisition server and one EMS database server). The control center is said to have failed if one of the bus, SCADA server, or EMS server have failed. Each substation without fault-tolerance consists of one bus and one server. Each substation is connected to the control center using a wide-area communication link. In our studies, we make the following realistic assumption on the reliabilities of the various system components: control center server has the highest reliability, and then control center and substation bus, followed by substation server, and the last one is the wide area communication link which has the lowest reliability among all the components. The repair rates for computing systems (servers and bus) are assumed to be lower than the repair rate of communication system (wide-area links). We study four configurations: 1) without redundancy; 2) with wide-area communication redundancy (1 primary 1 backup link); 3) with computer system redundancy (1 1 bus and 2 2 server at control center; 1 1 bus 1 1 server at substations); 4) with full redundancy (union of design configurations 2 and 3).
5 XIE et al.: INFORMATION ARCHITECTURE FOR FUTURE POWER SYSTEMS 861 Fig. 2. Full redundancy configuration of operation and control system. Fig. 4. Mutual backup control center configuration. in terms of their load handling capability and cost. It is to be noted that the cost of a given configuration is proportional to the number of computing nodes and communications links it uses. The four backup configurations for connecting two substations to the control centers are as follows. (a) (b) Fig. 3. (a) System reliability without repair. Failure rates: control center server (5E-5), Bus (7.5E-5), substation server (1E-4). Communication link (2.5E-4). (b) System reliability with repair. Failure rates are same as in Fig. 3(a). Repair rates: servers and bus (0.1). Communication link (0.02). Fig. 2 shows the full redundancy configuration of the operation and control system. Fig. 3(a) and (b) shows the results of the reliability study of the operation and control system without and with repair, respectively. From Fig. 3, it can be seen that full system redundancy configuration offers a very high reliability compared to other configurations. Furthermore, it can be observed that the system reliability can be significantly enhanced with repair. B. Redundancy Configuration for Backup Control Center Here, we propose four configurations for backup control centers and study their reliability. We will also evaluate the designs 1) No backup design: Each substation is connected to only one control center. Here, the number of substations and control centers are 2 and 2, respectively. 2) Exclusive backup design: Each substation is connected to a primary control center and an exclusive backup control center. Here, the number of substations and control centers are 2 and 4, respectively. 3) Shared backup design: Each substation is connected to a primary control center and a shared backup control center. That is, the backup control center is being configured as a backup for two substations. Here, the number of substations and control centers are 2 and 3, respectively. 4) Mutual backup design: Each substation has a primary control center that is also being configured as the backup control center for the other substation. Here, the number of substations and control centers are 2 and 2, respectively. Fig. 4 shows the mutual backup configuration. Fig. 5(a) and (b) shows the results of the reliability study for these four backup center designs. From Fig. 5, it can be observed that all the three fault-tolerant backup configurations indeed improve the overall system reliability, while the reliability of mutual backup configuration is the best with the least redundancy employed, and the reliability of exclusive backup configuration is the worst with the most redundancy employed. This study shows that higher redundancy does not necessarily offer high reliability. Therefore, the fault-tolerant configuration plays a crucial role in determining the overall reliability of the system as evident from our studies. It is important to point out that the difference in reliability among the three fault-tolerant configurations is very small for the failure rates studied; this is especially true when the reliability of subsystems is very high. Moreover, higher redundancy means higher service level with the presence of certain failure scenarios. For example, if both control centers fail, then the mutual backup can serve no applications, while shared backup with 50% the exclusive backup with 100% service; if one control center fails, then the mutual backup can serve 50% applications, while shared backup with 100% service and the exclusive with 100% service. Of course, higher redundancy also means higher cost.
6 862 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 17, NO. 3, AUGUST 2002 Our future work will focus on the reliability studies of operation and control system under common-mode failure model, hidden failure analysis, and techniques for intrusion detection and infrastructure security. (a) (b) Fig. 5. (a) System reliability without repair. 1 Server and 1 Bus in both control center and substation. Failure rate of components: 1E-5. (b) System reliability without repair. (1+1) Server in both control center and substation. Failure rate of components: 1E-5. V. CONCLUSIONS The proposed information architecture is capable of providing timely, secure, reliable information exchange among various entities in the system and is also scalable. The distributed nature of the computation in the proposed architecture reduces the burden on the higher level computer systems through data aggregation, providing better operation and restoration guidelines for operators with more relevant and critical information. The proposed information architecture can overcome most of the deficiencies of the current communication and information systems, it will promote the process of data integration and lead to standardization of data exchange for all power system entities. Reliability analysis of the different redundancy configurations indicates that for computation and communication redundancy design, high component failure rate implies lower system reliability, while the fully redundant system can use less reliable components without sacrificing much system reliability with repairable components. The reliabilities provided by the three backup control center schemes are very close with highly reliable subsystems, but schemes with higher redundancy can provide better service level with more cost. REFERENCES [1] Disturbance Analysis Working Group. ( ) Review of selected electric system disturbances in North America. NERC, Princeton, NJ. [Online]. Available: [2] M. Sridharan, S. Ramasubramanian, and A. K. Somani, HIMAP: Architecture, features, and hierarchical model specification techniques, in Int. Conf. Modeling, Techniques, and Tools for Computer Performance Evaluation, 1998, pp [3] Z. Xie, G. Manimaran, V. Vittal, and A. G. Phadke, Innovative information architecture for future power systems, in Proc. 33rd Annu. NAPS, Oct. 2001, pp [4] Operating Policies and Planning Standards, North Electric Reliability Council. [Online]. Available: [5] A. Moser, G. C. Ejebe, and J. G. Frame, Network and power applications for EMS within a competitive environment, in Proc IEEE Power Eng. Soc. Transm. Distrib. Conf., pp [6] D. J. Marihart, Communications technology guidelines for EMS/SCADA systems, IEEE Trans. Power Delivery, vol. 16, pp , Apr [7] Utility Telecom Consulting Group. Selecting the Proper Communications Media, Denver, CO. [Online]. Available: [8] B. Davie and Y. Rekhter, MPLS Technology and Application. San Mateo, CA: Morgan Kaufmann, [9] R. Cohen and G. Kaempfer, On the cost of virtual private networks, IEEE/ACM Trans. Networking, vol. 13, pp , Dec [10] I. Khalil and T. Brau, Edge provisioning and fairness in VPN-Diffserv networks, in Proc IEEE Computer Communications and Networks Conf., pp [11] T. Markham and C. Payne, Security at the network edge: A distributed firewall architecture, in Proc. DARPA Information Survivability Conf. & Expo. II, 2001, pp [12] M. Kaeo, Designing network security, Cisco, Indianapolis, IN, Zhaoxia Xie (S 01) received the B.S. degree from Huazhong University of Science and Technology, Wuhan, China, in She is currently pursuing the M.S. degree in the Department of Electrical and Computer Engineering, Iowa State University, Ames. She was an Electrical Engineer at Nanjing Automation Research Institute (NARI), Nanjing, China, from 1995 to 2000, working on power grid real-time monitoring, automation and control system. G. Manimaran (M 99) received the B.E. degree in computer science and engineering from Bharathidasan University, Thiruchirapalli, India, in 1989, the M.Tech. degree in computer technology from the Indian Institute of Technology (IIT), Delhi, in 1993, and the Ph.D. degree in computer science and engineering from IIT, Madras, in Since January 1999, he has been with the Department of Electrical and Computer Engineering at Iowa State University, Ames, as an Assistant Professor. His research interests include real-time systems, Internet QoS, and dependable systems and networks. He is a coauthor of the book Resource Management in Real-Time Systems and Networks (Cambridge, MA: MIT Press, 2001). Vijay Vittal (S 78 M 79 SM 87 F 97) received the B.E. degree in electrical engineering from B.M.S. College of Engineering, Bangalore, India, in 1977, the M.Tech. degree from the Indian Institute of Technology (IIT), Kanpur, in 1979, and the Ph.D. degree from Iowa State University (ISU), Ames, in Currently, he is the Harpole Professor in the Department of Electrical and Computer Engineering, ISU. Dr. Vittal was the recipient of the 1985 Presidential Young Investigator Award and the 2000 IEEE PES Outstanding Power Engineering Educator Award.
7 XIE et al.: INFORMATION ARCHITECTURE FOR FUTURE POWER SYSTEMS 863 A. G. Phadke (M 64 SM 67 F 80) received the B.Tech degree in electrical engineering from the Indian Institute of Technology, Kharagpur, India, in 1959, the M.S. degree in electrical engineeering from the Illinois Institute of Technology, Chicago, in 1961, and the Ph.D. degree in electrical engineering from the University of Wisconsin, Madison, in Currently, he is a University Distinguished Professor in the Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg. His primary research area is the microcomputer-based monitoring, protection, and control of power systems. He is a coauthor of two books on relaying: Computer Relaying for Power Systems (Taunton, U.K.: Research Studies Press) and Power System Relaying (Taunton, U.K.: Research Studies Press, 1995), and is the Editor of and contributor to Handbook of Electrical Engineering Computations (New York: Marcel Dekker, 1999). Dr. Phadke was awarded the IEEE Third Millennium Medal in 2000, named the Outstanding Power Engineering Educator by the IEEE in 1991, and received the Power Engineering Educator Award of the EEI in He received the IEEE Herman Halperin Transmission and Distribution Award in He is the Chairman of the Technical Committee of USNC CIGRE, and Editor-In-Chief of IEEE TRANSACTIONS ON POWER DELIVERY. He was elected to the U.S. National Academy of Engineering in Virgilio Centeno (M 92) was born in Tegucigalpa, Honduras, in He received the M.S. and Ph.D. degrees in electrical engineering from Virginia Polytechnic Institute and State University (Virginia Tech), Blacksburg, in 1988 and 1995, respectively. He worked as a Project Engineer at Macrodyne, Inc., Clifton Park, NY, in the development of phasor measurement units from 1991 to He joined the faculty of Virginia Tech as Visiting Professor in the fall of 1997 and became an Assistant Professor in the fall of His areas of interests are power system monitoring and synchronized measurement.
Developing an Agent-based Backup Protection System for Transmission Networks
Power Systems and Communications Infrastructures for the Future, Beijing, September 2002 Developing an Agent-based Backup Protection System for Transmission Networks X. R. Wang* Member IEEE, K. M. Hopkinson**
San Diego Gas & Electric Company FERC Order 717 Transmission Function Employee Job Descriptions August 10, 2015. Electric Grid Operations
San Diego Gas & Electric Company FERC Order 717 Transmission Function Employee Job Descriptions August 10, 2015 Electric Grid Operations Director Electric Grid Operations: Responsible for overall transmission
Cyber-Physical System Security of the Power Grid
Course on: Cyber-Physical System Security of the Power Grid April 9-11, 2013 at KTH Royal Institute of Technology, Stockholm, Sweden Background Cyber Security is essential to today s power grid operation
STUDY AND SIMULATION OF A DISTRIBUTED REAL-TIME FAULT-TOLERANCE WEB MONITORING SYSTEM
STUDY AND SIMULATION OF A DISTRIBUTED REAL-TIME FAULT-TOLERANCE WEB MONITORING SYSTEM Albert M. K. Cheng, Shaohong Fang Department of Computer Science University of Houston Houston, TX, 77204, USA http://www.cs.uh.edu
A Fast Path Recovery Mechanism for MPLS Networks
A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.
Real Time Test Bed Development for Power System Operation, Control and Cyber Security
1 Real Time Test Bed Development for Power System Operation, Control and Cyber Security Ram Mohan Reddi, Student Member, IEEE, and Anurag K Srivastava, Senior Member, IEEE Abstract--With ongoing smart
San Diego Gas & Electric Company FERC Order 717 Transmission Function Employee Job Descriptions June 4, 2015. Electric Grid Operations
San Diego Gas & Electric Company FERC Order 717 Transmission Function Employee Job Descriptions June 4, 2015 Electric Grid Operations Director Electric Grid Operations: Responsible for overall transmission
Recovery Modeling in MPLS Networks
Proceedings of the Int. Conf. on Computer and Communication Engineering, ICCCE 06 Vol. I, 9-11 May 2006, Kuala Lumpur, Malaysia Recovery Modeling in MPLS Networks Wajdi Al-Khateeb 1, Sufyan Al-Irhayim
data integration/exchange part 2: future technical and business opportunities
techtorial M. Kezunovic, A. Abur, A. Edris, D. Sobajic data integration/exchange part 2: future technical and business opportunities IIN THE UTILITY INDUSTRY, LIKE in many other major industries, it is
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations
Evolution of Control for the Smart Transmission Grid
Evolution of Control for the Smart Transmission Grid Anjan Bose Washington State University Pullman, WA SCE Smart Grid Research Symposium California Institute Of Technology October, 2011 The Past (before
Effect of Remote Back-Up Protection System Failure on the Optimum Routine Test Time Interval of Power System Protection
Effect of Remote Back-Up Protection System Failure on the Optimum Routine Test Time Interval of Power System Protection Y. Damchi* and J. Sadeh* (C.A.) Abstract: Appropriate operation of protection system
Effect of Remote Back-Up Protection System Failure on the Optimum Routine Test Time Interval of Power System Protection
Effect of Remote Back-Up Protection System Failure on the Optimum Routine Test Time Interval of Power System Protection Y. Damchi* and J. Sadeh* (C.A.) Abstract: Appropriate operation of protection system
Testing and Evaluating New Software Solutions for Automated Analysis of Protective Relay Operations
Testing and Evaluating New Software Solutions for Automated Analysis of Protective Relay Operations M. Kezunovic, X. Luo, N. Zhang, and H. Song Abstract This paper presents the test and evaluation environments
WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider
WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream
A Hybrid Electrical and Optical Networking Topology of Data Center for Big Data Network
ASEE 2014 Zone I Conference, April 3-5, 2014, University of Bridgeport, Bridgpeort, CT, USA A Hybrid Electrical and Optical Networking Topology of Data Center for Big Data Network Mohammad Naimur Rahman
THE FUTURE OF SMART GRID COMMUNICATIONS
THE FUTURE OF SMART GRID COMMUNICATIONS KENNETH C. BUDKA CTO STRATEGIC INDUSTRIES MAY 2014 THE GRID OF THE FUTURE WIDE-SCALE DEPLOYMENT OF RENEWABLES INCREASED ENERGY EFFICIENCY PEAK POWER REDUCTION, DEMAND
ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE
ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE Chandana Priyanka G. H., Aarthi R. S., Chakaravarthi S., Selvamani K. 2 and Kannan A. 3 Department of Computer
MPLS: Key Factors to Consider When Selecting Your MPLS Provider
White paper MPLS: Key Factors to Consider When Selecting Your MPLS Provider New Edge Networks June 2008 New Edge Networks 3000 Columbia House Blvd. Vancouver, WA 98661 360-693-9009 1-866-636-EDGE www.newedgenetworks.com
RSVP- A Fault Tolerant Mechanism in MPLS Networks
RSVP- A Fault Tolerant Mechanism in MPLS Networks S.Ravi Kumar, M.Tech(NN) Assistant Professor Gokul Institute of Technology And Sciences Piridi, Bobbili, Vizianagaram, Andhrapradesh. Abstract: The data
Symphony Plus Cyber security for the power and water industries
Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber Security_3BUS095402_(Oct12)US Letter.indd 1 01/10/12 10:15 Symphony Plus Cyber security for the power and water industries
Designing a Cloud Storage System
Designing a Cloud Storage System End to End Cloud Storage When designing a cloud storage system, there is value in decoupling the system s archival capacity (its ability to persistently store large volumes
Failsafe Protection for Utility Critical Infrastructure
Failsafe Protection for Utility Critical Infrastructure Introduction PUCs maintain a crucial part of the nation s CI that provide essential services to the public, business and government. Reliable CI
CONTROL LEVEL NETWORK RESILIENCY USING RING TOPOLOGIES. Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist
CONTROL LEVEL NETWORK RESILIENCY Written by: Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist DANGER 65 65 65 65 65 65 65 65 EtherNet/IP 1 3 4 5 6 LINK 1 LINK MOD NET 15 14 13 1 11
Nuclear Power Plant Electrical Power Supply System Requirements
1 Nuclear Power Plant Electrical Power Supply System Requirements Željko Jurković, Krško NPP, [email protected] Abstract Various regulations and standards require from electrical power system of the
SCADA Systems Automate Electrical Distribution
SCADA Systems Automate Electrical Distribution PC-based supervisory control and data acquisition systems increase uptime, cut costs and improve utilization. A White Paper from InduSoft Fabio Terezinho
A Grid Architecture for Manufacturing Database System
Database Systems Journal vol. II, no. 2/2011 23 A Grid Architecture for Manufacturing Database System Laurentiu CIOVICĂ, Constantin Daniel AVRAM Economic Informatics Department, Academy of Economic Studies
Analysis of Load Frequency Control Performance Assessment Criteria
520 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 16, NO. 3, AUGUST 2001 Analysis of Load Frequency Control Performance Assessment Criteria George Gross, Fellow, IEEE and Jeong Woo Lee Abstract This paper presents
Network Reconfiguration for Service Restoration in Shipboard Power Distribution Systems
IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 16, NO. 4, NOVEMBER 2001 653 Network Reconfiguration for Service Restoration in Shipboard Power Distribution Systems Karen L. Butler, Senior Member, IEEE, N. D.
Research and Development of IP and Optical Networking
: The Future of IP and Optical Networking Research and Development of IP and Optical Networking Kohei Shiomoto, Ichiro Inoue, Ryuichi Matsuzaki, and Eiji Oki Abstract This article presents the targets,
Study on Differential Protection of Transmission Line Using Wireless Communication
Study on Differential Protection of Transmission Line Using Wireless Communication George John.P 1, Agna Prince 2, Akhila.K.K 3, Guy Marcel 4, Harikrishnan.P 5 Professor, Dept. of EEE, MA Engineering College,
Opportunities to Overcome Key Challenges
The Electricity Transmission System Opportunities to Overcome Key Challenges Summary Results of Breakout Group Discussions Electricity Transmission Workshop Double Tree Crystal City, Arlington, Virginia
Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains P.Satheesh Associate professor Dept of Computer Science and Engineering MVGR college of
Cyber Security of the Smart Grid
Cyber Security of the Smart Grid Design Document May 12-21 11/4/11 Group Members John Majzner Daniel Kosac Kyle Slinger Jeremy Deberg Team Advisor Manimaran Govindarasu Graduate Students Adam Hahnad Siddharth
A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS
A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS K.B.Chandradeep Department of Centre for Educational Technology, IIT Kharagpur, Kharagpur, India [email protected] ABSTRACT This paper
Advanced High. Architecture. www.service-now.com
Advanced High Availability Architecture www.service-now.com Advanced High Availability Architecture WHITE PAPER Advanced High Availability Architecture Overview This document describes the ServiceNow Advanced
Load Balancing and Maintaining the Qos on Cloud Partitioning For the Public Cloud
Load Balancing and Maintaining the Qos on Cloud Partitioning For the Public Cloud 1 S.Karthika, 2 T.Lavanya, 3 G.Gokila, 4 A.Arunraja 5 S.Sarumathi, 6 S.Saravanakumar, 7 A.Gokilavani 1,2,3,4 Student, Department
How Much Cyber Security is Enough?
How Much Cyber Security is Enough? Business Drivers of Cyber Security Common Challenges and Vulnerabilities Cyber Security Maturity Model Cyber Security Assessments September 30, 2010 Business in the Right
REQUIREMENTS FOR A REAL-TIME RISK MONITORING TOOL TO REDUCE TRANSMISSION GRID NUCLEAR PLANT VULNERABILITIES
REQUIREMENTS FOR A REAL-TIME RISK MONITORING TOOL TO REDUCE TRANSMISSION GRID NUCLEAR PLANT VULNERABILITIES M. D. Muhlheim, 1 L. C. Markel, 2 F. J. Rahn, 3 and B. P. Singh 4 1 Oak Ridge National Laboratory,
A SWOT ANALYSIS ON CISCO HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN
A SWOT ANALYSIS ON CISCO HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN Eman Al-Harbi [email protected] Soha S. Zaghloul [email protected] Faculty of Computer and Information
IMPROVED NETWORK PARAMETER ERROR IDENTIFICATION USING MULTIPLE MEASUREMENT SCANS
IMPROVED NETWORK PARAMETER ERROR IDENTIFICATION USING MULTIPLE MEASUREMENT SCANS Liuxi Zhang and Ali Abur Department of Electrical and Computer Engineering Northeastern University Boston, MA, USA [email protected]
MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS
MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS 1 M.LAKSHMI, 2 N.LAKSHMI 1 Assitant Professor, Dept.of.Computer science, MCC college.pattukottai. 2 Research Scholar, Dept.of.Computer science, MCC college.pattukottai.
Substation Automation Systems. We are exceptional grid stability PSGuard Wide Area Monitoring System
Substation Automation Systems We are exceptional grid stability PSGuard Wide Area Monitoring System We are exceptional grid stability PSGuard Wide Area Monitoring System 2 We are exceptional grid stability
ISSN 2319-8885 Vol.04,Issue.19, June-2015, Pages:3633-3638. www.ijsetr.com
ISSN 2319-8885 Vol.04,Issue.19, June-2015, Pages:3633-3638 www.ijsetr.com Refining Efficiency of Cloud Storage Services using De-Duplication SARA BEGUM 1, SHAISTA NOUSHEEN 2, KHADERBI SHAIK 3 1 PG Scholar,
Hybrid processing of SCADA and synchronized phasor measurements for tracking network state
IEEE PES General Meeting, Denver, USA, July 2015 1 Hybrid processing of SCADA and synchronized phasor measurements for tracking network state Boris Alcaide-Moreno Claudio Fuerte-Esquivel Universidad Michoacana
Power System Security Monitoring, Analysis, and Control. George Gross
ECE 573 Power System Operations and Control Power System Security Monitoring, Analysis, and Control George Gross Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign
Hybrid Simulation von Kommunikationsnetzen für das Smart Grid
für das Smart rid Hanno eorg 15.11.2013 Faculty of Electrical Engineering & Information Technology Communication Networks Institute Prof. Dr.-Ing. Christian Wietfeld für das Smart rid Overview Motivation
Multi Protocol Label Switching (MPLS) is a core networking technology that
MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of
Operational Cost Factor Consideration of Path Management Method for MPLS Networks
Operational Cost Factor Consideration of Path Management Method for MPLS Networks Motoi Iwashita, and Masayuki Tsujino Abstract The recent improvements in broadband networks are enabling network carriers
Networking Topology For Your System
This chapter describes the different networking topologies supported for this product, including the advantages and disadvantages of each. Select the one that best meets your needs and your network deployment.
Quality of Service in Industrial Ethernet Networks
György Kálmán, ABB Corporate Research Norway, [email protected] Quality of Service in Industrial Ethernet Networks February 10, 2013 Slide 1 Can we provide appropriate Quality of Service for industrial
Networking Systems (10102)
Networking Systems (10102) Rationale Statement: The goal of this course is to help students understand and participate in the significant impact of computer networking in their lives. Virtually any career
WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services
WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most
November 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
IEEE biography samples
IEEE biography samples Bhim Singh (SM 99) was born in Rahamapur, India, in 1956. He received the B.E. degree in electrical engineering from the University of Roorkee, Roorkee, India, in 1977, and the M.Tech.
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
Cisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
Mladen Kezunovic Texas A&M University
INTEGRATING DATA AND SHARING INFORMATION FROM VARIOUS IEDs TO IMPROVE MONITORING, CONDITION-BASED DIAGNOSTIC, MAINTENANCE, ASSET MANAGEMENT AND OPERATION TASKS Introduction Mladen Kezunovic Texas A&M University
MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb
MP PLS VPN MPLS VPN Prepared by Eng. Hussein M. Harb Agenda MP PLS VPN Why VPN VPN Definition VPN Categories VPN Implementations VPN Models MPLS VPN Types L3 MPLS VPN L2 MPLS VPN Why VPN? VPNs were developed
An Efficient Fault Tolerance Model for Path Recovery in MPLS Networks
An Efficient Fault Tolerance Model for Path Recovery in MPLS Networks Arunkumar C K M.Tech student, Dept. of ECE, Dayananda Sagar College of Engineering, VTU, Banglore, India ABSTRACT: Increasing demand
Enterprise Network Virus Protection Research Yanjie Zhou 1, Li Ma 2 Min Wen3
4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Enterprise Network Virus Protection Research Yanjie Zhou 1, Li Ma 2 Min Wen3 1,2College of Mathematical
CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.
21, rue d Artois, F-75008 PARIS D2-102 CIGRE 2012 http : //www.cigre.org CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS Massimo Petrini (*), Emiliano Casale
Enabling the SmartGrid through Cloud Computing
Enabling the SmartGrid through Cloud Computing April 2012 Creating Value, Delivering Results 2012 eglobaltech Incorporated. Tech, Inc. All rights reserved. 1 Overall Objective To deliver electricity from
V&V and QA throughout the M&S Life Cycle
Introduction to Modeling and Simulation and throughout the M&S Life Cycle Osman Balci Professor Department of Computer Science Virginia Polytechnic Institute and State University (Virginia Tech) Blacksburg,
Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
A Resilient Path Management for BGP/MPLS VPN
A Resilient Path Management for BGP/MPLS VPN APNOMS2003 1 Introduction APNOMS2003 2 APNOMS2003 3 BGP/MPLS VPN Configuration MPLS/MP-iBGP VPN 1 VPN 1 VPN 2 VPN 2 BGP/MPLS VPN Overview BGP/MPLS Virtual Private
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT Soumya V L 1 and Anirban Basu 2 1 Dept of CSE, East Point College of Engineering & Technology, Bangalore, Karnataka, India
The Advantages of an Integrated Factory Acceptance Test in an ICS Environment
The Advantages of an Integrated Factory Acceptance Test in an ICS Environment By Jerome Farquharson, Critical Infrastructure and Compliance Practice Manager, and Alexandra Wiesehan, Cyber Security Analyst,
Market Growth and New Regulations Demand Network Modernization
CASE ESB NETWORKS: POLE TOP COMMUNICATION INCREASES EFFICIENCY IN IRELAND Viola s solution for remotely operating pole-top reclosers and switches increases reliability, cuts operating costs and helps to
Integration of Supervisory Control and Data Acquisition Systems Connected to Wide Area Networks
Hitachi Review Vol. 53 (2004), No. 3 169 Integration of Supervisory Control and Data Acquisition Systems Connected to Wide Area Networks Mitsuya Kato Katsufumi Watahiki Tatsuyuki Suzuki OVERVIEW: Continued
Convergence of Advanced Information and Control Technology in Advanced Metering Infrastructure (AMI) Solution
Convergence of Advanced Information and Control Technology in Advanced Metering Infrastructure (AMI) Solution 138 Convergence of Advanced Information and Control Technology in Advanced Metering Infrastructure
M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.
M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2. What are the different types of virtualization? Explain
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...
ATTACHMENT G. Network Operating Agreement
ATTACHMENT G Network Operating Agreement 1. PURPOSE OF NETWORK OPERATING AGREEMENT The purpose of this Agreement is to identify contractual requirements related to Network Integration Transmission Service
How To Build A Clustered Storage Area Network (Csan) From Power All Networks
Power-All Networks Clustered Storage Area Network: A scalable, fault-tolerant, high-performance storage system. Power-All Networks Ltd Abstract: Today's network-oriented computing environments require
Testing Intelligent Device Communications in a Distributed System
Testing Intelligent Device Communications in a Distributed System David Goughnour (Triangle MicroWorks), Joe Stevens (Triangle MicroWorks) [email protected] United States Smart Grid systems
Midwest Reliability Organization Procedure For NERC PRC-012
Midwest Reliability Organization Procedure For NERC PRC-012 A. Introduction The following procedure developed by the MRO Protective Relay Subcommittee (PRS) and Transmission Assessment Subcommittee (TAS)
Unifying the Distributed Enterprise with MPLS Mesh
Unifying the Distributed Enterprise with MPLS Mesh Technical Whitepaper June 2011 Copyright 2011 AireSpring Introduction Today s modern enterprise employs IT technologies that deliver higher value, resiliency,
Agenda do Mini-Curso. Sérgio Yoshio Fujii. Ethan Boardman. [email protected]. [email protected]
Agenda do Mini-Curso Sérgio Yoshio Fujii [email protected] Ethan Boardman [email protected] Agenda do Mini-Curso Sistemas de Distribuição (DMS) Characteristics of Distribution Network
Synchronized real time data: a new foundation for the Electric Power Grid.
Synchronized real time data: a new foundation for the Electric Power Grid. Pat Kennedy and Chuck Wells Conjecture: Synchronized GPS based data time stamping, high data sampling rates, phasor measurements
Infrastructure Interdependencies
Infrastructure Interdependencies Terrence K. (Terry) Kelly, Ph.D. Senior National Security Officer White House Office of Science and Technology Policy based in part on an article to appear in IEEE Control
Online Risk-Based Security Assessment
258 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 18, NO. 1, FEBRUARY 2003 Online Risk-Based Security Assessment Ming Ni, Member, IEEE, James D. McCalley, Senior Member, IEEE, Vijay Vittal, Fellow, IEEE, and
Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies
2011 International Conference on Computer Communication and Management Proc.of CSIT vol.5 (2011) (2011) IACSIT Press, Singapore Collaborative & Integrated Network & Systems Management: Management Using
Virtual Machine in Data Center Switches Huawei Virtual System
Virtual Machine in Data Center Switches Huawei Virtual System Contents 1 Introduction... 3 2 VS: From the Aspect of Virtualization Technology... 3 3 VS: From the Aspect of Market Driving... 4 4 VS: From
CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING
Journal homepage: http://www.journalijar.com INTERNATIONAL JOURNAL OF ADVANCED RESEARCH RESEARCH ARTICLE CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING R.Kohila
High Availability Design Patterns
High Availability Design Patterns Kanwardeep Singh Ahluwalia 81-A, Punjabi Bagh, Patiala 147001 India [email protected] +91 98110 16337 Atul Jain 135, Rishabh Vihar Delhi 110092 India [email protected]
CARRIER MPLS VPN September 2014
CARRIER MPLS VPN September 2014 SERVICE OVERVIEW The International MPLS IP-VPN service provides a full range of VPN connectivity solutions, including: Carrier MPLS IP VPN: dedicated to operators looking
