SlideShare a Scribd company logo
1 of 33
Download to read offline
Power system operation &
control
Department of Electrical Energy Engineering
Al-Balqa Applied University
Dr.Audih M.alfaoury 1
Part 5
Power System Modeling
Operation and Control
2
Dr.Audih M.alfaoury
Communication Needs of Power System and an
Introduction to SCADA Fundamentals
and Implementation
Supervisory Control And Data Acquisition
3
Dr.Audih M.alfaoury
Operation Control Room:
 Reliability.
 Stability.
 Security.
 Quality.
 Economy.
•Main target is to provide electric energy to the loads in
an appropriate Voltage & Frequency levels considering
circuits loading & tie lines exchange.
4
Dr.Audih M.alfaoury
Voltage Control
 Transformers tap changer.
 Capacitor Banks & inductors .
 Excitation of Generating Units
 Synchronous Condenser.
 Circuit paralleling.
 Voltages to be maintained:
±5% for 400 kV
±10% for 132 kV
5
Dr.Audih M.alfaoury
Reactive Droop Curves
Frequency Control
The power system
frequency
according grid code
Interconnected)
)
49.90 Hz- 50.10 Hz
(Isolated)
49.95 Hz- 50.05 Hz
Mainly the Egyptian system is the primary controller
of the unified frequency.
6
Dr.Audih M.alfaoury
Frequency Demand Control
Reduction in Demand would be required when:
• insufficient generation from available Generating Units on the Power
System or transfers across Interconnectors, or
• Transmission Network not being able to meet the Demand requirements
of Users due to operational constraints
Demand control methods include:
•Automatic under frequency load shedding (UFLS) scheme.
•Demand Control initiated by the transmission system operation (TSO).
•Consumer Demand Management (CDM).
Demand control is implemented according to the Grid Code
7
Dr.Audih M.alfaoury
SUPERVISORY CONTROL AND DATA ACQUISITION
There are two parts to the term SCADA:
 Supervisory control (SC): indicates that the operator
in energy control center (ECC), has the ability to
control remote equipment.
 Data acquisition (DA) : indicates that information is
gathered characterizing the state of the remote
equipment, and sent to the ECC for monitoring purposes.
The monitoring equipment is normally located in the
substations (slave) and is consolidated in what is known as
the remote terminal unit (RTU).
8
Dr.Audih M.alfaoury
(SCADA)
Main Functions of SCADA
9
Dr.Audih M.alfaoury
RTU
SCADA : Data communication architecture
computer
Panel
Multi-port
Stallion
Adapters
Panel
multi-Port
Stallion
adapters
Splitter
Modem
computer
Modem
Modem
Modem
RTU
Modem
RTU
Modem Modem
Modem
10
Dr.Audih M.alfaoury
master station
Communication system
Slave
Mainly a SCADA system consists of :
1- master station : Communicates with remote terminal
units (RTUs) that allowing operators to observe and
control physical plants.
2- Communication system : generally is via circuits
operating in the range of 600 to 4800 bits/s with the
RTU responding to periodic requests, initiated from the
master station every 2 to 10 s, depending on the criticality
of the data.
3- RTUs transmit device (Slave) : responsible to status and
measurements , and receive control commands and set
point data from, the master station.
11
Dr.Audih M.alfaoury
Dr.Audih M.alfaoury 12
System Concept of SCADA
13
Dr.Audih M.alfaoury
1) Data acquisition: Provides telemetered measurements and
status information to operator.
2) Supervisory control: Allows operator to remotely control
devices, (open and close circuit breakers).
3) Tagging: Identifies a device as specific operating
restrictions , and prevents unauthorized operation.
4) Alarms: for unplanned events and undesirable
operating conditions. (Alarms are sorted by criticality area
of responsibility. Acknowledgment may be required).
5) Logging: Logs all operator entry, all alarms, and selected
information.
6) Load shed: Provides both automatic and operator
initiated tripping of load in response to system
emergencies.
7) Trending: Plots measurements on selected time scales.
14
Dr.Audih M.alfaoury
The traditional functions of SCADA systems are summarized:
Master Station Mainly Function
The master station in SCADA system functions mainly are:
• Manage communication circuit configuration.
• Down line load RTU files.
• Check and correct message errors .
 Convert to engineering units.
• Detect status and measurement changes.
• Monitor abnormal and out-of-limit conditions.
• Log and time-tag(label) sequence of events.
• Detect and annunciate alarms.
15
Dr.Audih M.alfaoury
Dr.Audih M.alfaoury 16
RTUs FUNCTION (slave)
RTUs are equipped with microprocessors having memory
and logic capability.
Older RTUs are equipped with modems to provide the
communication link back to the ECC, whereas newer RTUs
generally have intranet or internet capability .
Relays located within the RTU, on command from the
ECC, open or close selected control circuits to perform a
supervisory action.
RemoteTerminal Unit, RTU
17
Dr.Audih M.alfaoury
RTU actions may include :
 opening or closing of a circuit breaker or switch.
 modifying a transformer tap setting.
 raising or lowering generator MW output or terminal
voltage.
 switching in or out a shunt capacitor or inductor.
 starting or stopping of a synchronous condenser.
Information gathered by the RTU and communicated to the
ECC includes both:
18
Dr.Audih M.alfaoury
a) Analog information: This includes frequency, voltages,
currents, real and reactive power flows , etc.
b) Status indicators : Which includes alarm signals (over-
temperature, low relay battery voltage, illegal entry) and
whether switches and circuit breakers are open or closed.
Such information is provided to the ECC through a periodic
scan of all RTUs. Two second scan cycle is typical.
MONITORING FUNCTIONS OF SCADA
Measurement and displaying of :current, voltage, frequency,
active and reactive power, energy, temperature, also storage
and evaluation of time stamped events and archiving of
measurements ,collection ,evaluation of maintenance data. As
well as disturbance recording and evaluation.
PROTECTION FUNCTIONS OF SCADA
Substation protection functions :
This includes monitoring of events (like start or trip
indication) , relay operating time , setting and reading of relay
parameters ,protection of bus bars, line feeders, transformers,
generators, protection monitoring (status, events,
measurements, parameters, recorders).
19
Dr.Audih M.alfaoury
COMMUNICATION TECHNOLOGIES OF SCADA
The form of communication required for SCADA is
telemetry.
Telemetry: is the measurement of a quantity to allow
interpretation of that measurement at a distance from the
primary detector. The feature of telemetry is the nature of
the translating (means, converting the measure into a
representative quantity of another kind). Telemetry may be
analog or digital.
IN ANALOG TELEMETRY :
Voltage, current, or frequency proportional to the quantity
being measured is developed and transmitted on a
communication channel to the receiving location, where
the received signal is applied to indicate the quantity
being measured, forms of analog telemetry include
variable current, pulse-amplitude and pulse-length.
20
Dr.Audih M.alfaoury
IN DIGITAL TELEMETRY:
The quantity being measured is converted to a code in
which the sequence of pulses transmitted indicates the
quantity.
One of the advantages to digital telemetering is
accuracy of data (is not lost in transmitting the data
from one location to another).
 Digital telemetry requires analog to digital (A/D) and
possible digital to analog (D/A) converters as illustrated
in the next figure.
21
Dr.Audih M.alfaoury
Block Diagram of Telemetering System
22
Dr.Audih M.alfaoury
COMMUNICATION BETWEEN MASTER CONTROL
STATION AND REMOTE CONTROL STATION:
a)Leased-wire : means a standard telephone (careful
coordination between the user and the telephone company).
b)Power-line carrier (PLC) offers an inexpensive and
typically more reliable alternative to leased-wire. (the
transmission circuit itself is used to modulate a
communication signal at a frequency occurs in the range
of 30-500 kHz. The security of PLC is very high since
the communication equipment is located inside the
substations.
23
Dr.Audih M.alfaoury
TYPICAL PLC ARRANGEMENT PHASE-GROUND COUPLING
CD
CKT-I
E/W
B
R
Y
E/W
B
R
Y
CVT/CC
CD
CVT/CC
24
Dr.Audih M.alfaoury
c) Microwave radio : refers to ultra-high-frequency (UHF)
radio systems operating above 1 GHz. (microwave
telemetry was analog, but digital microwave
communication is now quite common for EMS/SCADA
applications
d) Fiber optic cable : A more recent development has
concerned the use of fiber optic cable, a technology
capable of extremely fast communication speeds. Although
cost. ( Fiber optics may be run underground power cables
or to overhead transmission line towers just below the lines or
be run within the shield wire suspended above the
transmission lines).
25
Dr.Audih M.alfaoury
e) VSAT Communication : Very small aperture terminals
26
36,000 km
Dr.Audih M.alfaoury
UTILITY
CONTROL
CENTER
SHARED HUB
SATELLITE
VSATs
NETWORK
MANAGEMENT
CENTER
 Various frequency bands:
C-band (4/6 GHz), Ku-band (12/14 GHz),Ka-band(30/20 GHz)
 Advantages
 Near-universal coverage
 Good reliability
 Fast installation
 Disadvantages
 Cost
 Transmission delays
 Blackout periods due to eclipses
 Attenuation in heavy rain (Ku band)
f) Mobile Communication
27
 Several competing technologies
 Use of control channel on analog AMPS (Advanced
Mobile Phone Service), 800 MHz CDPD (Cellular
Digital Packet Data)
 Recently also being offered for applications in feeder
automation
Dr.Audih M.alfaoury
Dr.Audih M.alfaoury 28
Restoration power system
after contingences
SCADA VARIOUS OPERATING STATES:
29
Dr.Audih M.alfaoury
1. Normal state
2. Alert state
3. Emergency state
4. Extremis state
5. Restorative state
Normal state:
A system is said to be in normal if both load and
operating constraints are satisfied .It is one in which the
total demand on the system is met by satisfying all the
operating constraints.
Alert state:
A normal state of the system said to be in alert state
if one or more of the postulated contingency states,
consists of the constraint limits violated.
When the system security level falls below a certain
level or the probability of disturbance increases, the
system may be in alert state .
30
Dr.Audih M.alfaoury
If severe disturbance occurs, the system will push into
emergency state. To bring back the system to secure
state, preventive control action is carried out.
Emergency state:
The system is said to be in emergency state if one or
more operating constraints are violated, but the load
constraint is satisfied .
In this state, the equality constraints are unchanged.
The system will return to the normal or alert state by
means of corrective actions , disconnection of faulted
section or load sharing.
31
Dr.Audih M.alfaoury
Extremis state:
When the system is in emergency, if no proper
corrective action is taken in time, then it goes to either
emergency state or extremis state.
In this regard neither the load or nor the operating
constraint is satisfied, this result is islanding.
Also the generating units are strained beyond their
capacity .
So emergency control action is done to bring back the
system state either to the emergency state or normal state.
Restorative state:
From this state, the system may be brought back either to
alert state or secure state .The latter is a slow process.
Hence, in certain cases, first the system is brought
back to alert state and then to the secure state .
This is done using restorative control action.
32
Dr.Audih M.alfaoury
33
Dr.Audih M.alfaoury

More Related Content

What's hot

SCADA Presentation
SCADA PresentationSCADA Presentation
SCADA PresentationEric Favetta
 
Industrial Control System Security Overview
Industrial Control System Security OverviewIndustrial Control System Security Overview
Industrial Control System Security Overviewpgmaynard
 
Mission Impact Assessment for Industrial Control Systems
Mission Impact Assessment for Industrial Control SystemsMission Impact Assessment for Industrial Control Systems
Mission Impact Assessment for Industrial Control SystemsMarina Krotofil
 
Scada Security & Penetration Testing
Scada Security & Penetration TestingScada Security & Penetration Testing
Scada Security & Penetration TestingAhmed Sherif
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended Larry Vandenaweele
 
DEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSDEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSChris Sistrunk
 
Blackhat USA 2016 - What's the DFIRence for ICS?
Blackhat USA 2016 - What's the DFIRence for ICS?Blackhat USA 2016 - What's the DFIRence for ICS?
Blackhat USA 2016 - What's the DFIRence for ICS?Chris Sistrunk
 
Scada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsScada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsAleksandr Timorin
 
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...PECB
 
BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseChris Sistrunk
 
SCADA hacking industrial-scale fun
SCADA hacking industrial-scale funSCADA hacking industrial-scale fun
SCADA hacking industrial-scale funJan Seidl
 
Industrial protocols for pentesters
Industrial protocols for pentestersIndustrial protocols for pentesters
Industrial protocols for pentestersPositive Hack Days
 
Scada Industrial Control Systems Penetration Testing
Scada Industrial Control Systems Penetration Testing Scada Industrial Control Systems Penetration Testing
Scada Industrial Control Systems Penetration Testing Yehia Mamdouh
 
Protecting Your DNP3 Networks
Protecting Your DNP3 NetworksProtecting Your DNP3 Networks
Protecting Your DNP3 NetworksChris Sistrunk
 
BruCON 2015 - Pentesting ICS 101
BruCON 2015 - Pentesting ICS 101BruCON 2015 - Pentesting ICS 101
BruCON 2015 - Pentesting ICS 101Wavestone
 
Defcon through the_eyes_of_the_attacker_2018_slides
Defcon through the_eyes_of_the_attacker_2018_slidesDefcon through the_eyes_of_the_attacker_2018_slides
Defcon through the_eyes_of_the_attacker_2018_slidesMarina Krotofil
 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghOWASP Delhi
 
Security testing in critical systems
Security testing in critical systemsSecurity testing in critical systems
Security testing in critical systemsPeter Wood
 
If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...
If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...
If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...Marina Krotofil
 

What's hot (20)

SCADA Presentation
SCADA PresentationSCADA Presentation
SCADA Presentation
 
Industrial Control System Security Overview
Industrial Control System Security OverviewIndustrial Control System Security Overview
Industrial Control System Security Overview
 
Mission Impact Assessment for Industrial Control Systems
Mission Impact Assessment for Industrial Control SystemsMission Impact Assessment for Industrial Control Systems
Mission Impact Assessment for Industrial Control Systems
 
Scada Security & Penetration Testing
Scada Security & Penetration TestingScada Security & Penetration Testing
Scada Security & Penetration Testing
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended
 
DEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSDEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICS
 
Blackhat USA 2016 - What's the DFIRence for ICS?
Blackhat USA 2016 - What's the DFIRence for ICS?Blackhat USA 2016 - What's the DFIRence for ICS?
Blackhat USA 2016 - What's the DFIRence for ICS?
 
Improving SCADA Security
Improving SCADA SecurityImproving SCADA Security
Improving SCADA Security
 
Scada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsScada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanisms
 
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
 
BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA Defense
 
SCADA hacking industrial-scale fun
SCADA hacking industrial-scale funSCADA hacking industrial-scale fun
SCADA hacking industrial-scale fun
 
Industrial protocols for pentesters
Industrial protocols for pentestersIndustrial protocols for pentesters
Industrial protocols for pentesters
 
Scada Industrial Control Systems Penetration Testing
Scada Industrial Control Systems Penetration Testing Scada Industrial Control Systems Penetration Testing
Scada Industrial Control Systems Penetration Testing
 
Protecting Your DNP3 Networks
Protecting Your DNP3 NetworksProtecting Your DNP3 Networks
Protecting Your DNP3 Networks
 
BruCON 2015 - Pentesting ICS 101
BruCON 2015 - Pentesting ICS 101BruCON 2015 - Pentesting ICS 101
BruCON 2015 - Pentesting ICS 101
 
Defcon through the_eyes_of_the_attacker_2018_slides
Defcon through the_eyes_of_the_attacker_2018_slidesDefcon through the_eyes_of_the_attacker_2018_slides
Defcon through the_eyes_of_the_attacker_2018_slides
 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep Singh
 
Security testing in critical systems
Security testing in critical systemsSecurity testing in critical systems
Security testing in critical systems
 
If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...
If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...
If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...
 

Similar to Power system modeling, operation, control and SCADA fundamentals

Toaz.info robotics-monitoring-of-power-system-pr 7b66f49ce3cf8399dc58f65e3174...
Toaz.info robotics-monitoring-of-power-system-pr 7b66f49ce3cf8399dc58f65e3174...Toaz.info robotics-monitoring-of-power-system-pr 7b66f49ce3cf8399dc58f65e3174...
Toaz.info robotics-monitoring-of-power-system-pr 7b66f49ce3cf8399dc58f65e3174...KittuKiran3
 
SEG 3 unit ppt.pptx
SEG 3 unit ppt.pptxSEG 3 unit ppt.pptx
SEG 3 unit ppt.pptxIshuIswarya3
 
SCADA only for the advance version of the module
SCADA only for the advance version of the moduleSCADA only for the advance version of the module
SCADA only for the advance version of the moduleAJITTHAKUR68
 
KAGITHALA YASASWINI
KAGITHALA YASASWINIKAGITHALA YASASWINI
KAGITHALA YASASWINIMAHESH294
 
fault detection of transformer using GSM,,,,by YASASWINI.KAGITHALA
fault detection of transformer using GSM,,,,by YASASWINI.KAGITHALAfault detection of transformer using GSM,,,,by YASASWINI.KAGITHALA
fault detection of transformer using GSM,,,,by YASASWINI.KAGITHALAMAHESH294
 
MISSILE DETECT AND DESTROY SYSTEM
MISSILE DETECT AND DESTROY SYSTEMMISSILE DETECT AND DESTROY SYSTEM
MISSILE DETECT AND DESTROY SYSTEMIRJET Journal
 
Distribution Automation based on IEC61850
Distribution Automation based on IEC61850Distribution Automation based on IEC61850
Distribution Automation based on IEC61850Nirmal Thaliyil
 
Power line carrier communication(with awesome animation work)
Power line carrier communication(with awesome animation work)Power line carrier communication(with awesome animation work)
Power line carrier communication(with awesome animation work)Mohit Agarwal
 
20BEE042 5th semester Internship PPT.pptx
20BEE042 5th semester Internship PPT.pptx20BEE042 5th semester Internship PPT.pptx
20BEE042 5th semester Internship PPT.pptxSumitRajput83
 
Power system automation introduction
Power system automation introductionPower system automation introduction
Power system automation introductionMohammed Naser
 
Iskra Medium Voltage Automation and Protection (Protection relays)
Iskra Medium Voltage Automation and Protection (Protection relays)Iskra Medium Voltage Automation and Protection (Protection relays)
Iskra Medium Voltage Automation and Protection (Protection relays)Minka Grdesic
 
Design and Implementation of Low Cost Smart Web Sensors for Electric Power Qu...
Design and Implementation of Low Cost Smart Web Sensors for Electric Power Qu...Design and Implementation of Low Cost Smart Web Sensors for Electric Power Qu...
Design and Implementation of Low Cost Smart Web Sensors for Electric Power Qu...IJTET Journal
 
An introduction to scada fundamentals and implementation
An introduction to scada fundamentals and implementationAn introduction to scada fundamentals and implementation
An introduction to scada fundamentals and implementationRahul Mehra
 

Similar to Power system modeling, operation, control and SCADA fundamentals (20)

Toaz.info robotics-monitoring-of-power-system-pr 7b66f49ce3cf8399dc58f65e3174...
Toaz.info robotics-monitoring-of-power-system-pr 7b66f49ce3cf8399dc58f65e3174...Toaz.info robotics-monitoring-of-power-system-pr 7b66f49ce3cf8399dc58f65e3174...
Toaz.info robotics-monitoring-of-power-system-pr 7b66f49ce3cf8399dc58f65e3174...
 
Scada
ScadaScada
Scada
 
SEG 3 unit ppt.pptx
SEG 3 unit ppt.pptxSEG 3 unit ppt.pptx
SEG 3 unit ppt.pptx
 
Scada
ScadaScada
Scada
 
Communicating to Your Meters
Communicating to Your MetersCommunicating to Your Meters
Communicating to Your Meters
 
SCADA only for the advance version of the module
SCADA only for the advance version of the moduleSCADA only for the advance version of the module
SCADA only for the advance version of the module
 
KAGITHALA YASASWINI
KAGITHALA YASASWINIKAGITHALA YASASWINI
KAGITHALA YASASWINI
 
fault detection of transformer using GSM,,,,by YASASWINI.KAGITHALA
fault detection of transformer using GSM,,,,by YASASWINI.KAGITHALAfault detection of transformer using GSM,,,,by YASASWINI.KAGITHALA
fault detection of transformer using GSM,,,,by YASASWINI.KAGITHALA
 
MISSILE DETECT AND DESTROY SYSTEM
MISSILE DETECT AND DESTROY SYSTEMMISSILE DETECT AND DESTROY SYSTEM
MISSILE DETECT AND DESTROY SYSTEM
 
Distribution Automation based on IEC61850
Distribution Automation based on IEC61850Distribution Automation based on IEC61850
Distribution Automation based on IEC61850
 
TESCO Tuesday: Communication Equipment
TESCO Tuesday: Communication EquipmentTESCO Tuesday: Communication Equipment
TESCO Tuesday: Communication Equipment
 
Scada
ScadaScada
Scada
 
Power line carrier communication(with awesome animation work)
Power line carrier communication(with awesome animation work)Power line carrier communication(with awesome animation work)
Power line carrier communication(with awesome animation work)
 
20BEE042 5th semester Internship PPT.pptx
20BEE042 5th semester Internship PPT.pptx20BEE042 5th semester Internship PPT.pptx
20BEE042 5th semester Internship PPT.pptx
 
Power system automation introduction
Power system automation introductionPower system automation introduction
Power system automation introduction
 
Iskra Medium Voltage Automation and Protection (Protection relays)
Iskra Medium Voltage Automation and Protection (Protection relays)Iskra Medium Voltage Automation and Protection (Protection relays)
Iskra Medium Voltage Automation and Protection (Protection relays)
 
Design and Implementation of Low Cost Smart Web Sensors for Electric Power Qu...
Design and Implementation of Low Cost Smart Web Sensors for Electric Power Qu...Design and Implementation of Low Cost Smart Web Sensors for Electric Power Qu...
Design and Implementation of Low Cost Smart Web Sensors for Electric Power Qu...
 
An introduction to scada fundamentals and implementation
An introduction to scada fundamentals and implementationAn introduction to scada fundamentals and implementation
An introduction to scada fundamentals and implementation
 
132 kv seminar ppt
132 kv seminar ppt132 kv seminar ppt
132 kv seminar ppt
 
132 kv
132 kv132 kv
132 kv
 

Recently uploaded

Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docxRodelinaLaud
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxtrishalcan8
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 

Recently uploaded (20)

KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docx
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 

Power system modeling, operation, control and SCADA fundamentals

  • 1. Power system operation & control Department of Electrical Energy Engineering Al-Balqa Applied University Dr.Audih M.alfaoury 1
  • 2. Part 5 Power System Modeling Operation and Control 2 Dr.Audih M.alfaoury
  • 3. Communication Needs of Power System and an Introduction to SCADA Fundamentals and Implementation Supervisory Control And Data Acquisition 3 Dr.Audih M.alfaoury
  • 4. Operation Control Room:  Reliability.  Stability.  Security.  Quality.  Economy. •Main target is to provide electric energy to the loads in an appropriate Voltage & Frequency levels considering circuits loading & tie lines exchange. 4 Dr.Audih M.alfaoury
  • 5. Voltage Control  Transformers tap changer.  Capacitor Banks & inductors .  Excitation of Generating Units  Synchronous Condenser.  Circuit paralleling.  Voltages to be maintained: ±5% for 400 kV ±10% for 132 kV 5 Dr.Audih M.alfaoury Reactive Droop Curves
  • 6. Frequency Control The power system frequency according grid code Interconnected) ) 49.90 Hz- 50.10 Hz (Isolated) 49.95 Hz- 50.05 Hz Mainly the Egyptian system is the primary controller of the unified frequency. 6 Dr.Audih M.alfaoury
  • 7. Frequency Demand Control Reduction in Demand would be required when: • insufficient generation from available Generating Units on the Power System or transfers across Interconnectors, or • Transmission Network not being able to meet the Demand requirements of Users due to operational constraints Demand control methods include: •Automatic under frequency load shedding (UFLS) scheme. •Demand Control initiated by the transmission system operation (TSO). •Consumer Demand Management (CDM). Demand control is implemented according to the Grid Code 7 Dr.Audih M.alfaoury
  • 8. SUPERVISORY CONTROL AND DATA ACQUISITION There are two parts to the term SCADA:  Supervisory control (SC): indicates that the operator in energy control center (ECC), has the ability to control remote equipment.  Data acquisition (DA) : indicates that information is gathered characterizing the state of the remote equipment, and sent to the ECC for monitoring purposes. The monitoring equipment is normally located in the substations (slave) and is consolidated in what is known as the remote terminal unit (RTU). 8 Dr.Audih M.alfaoury (SCADA)
  • 9. Main Functions of SCADA 9 Dr.Audih M.alfaoury
  • 10. RTU SCADA : Data communication architecture computer Panel Multi-port Stallion Adapters Panel multi-Port Stallion adapters Splitter Modem computer Modem Modem Modem RTU Modem RTU Modem Modem Modem 10 Dr.Audih M.alfaoury master station Communication system Slave
  • 11. Mainly a SCADA system consists of : 1- master station : Communicates with remote terminal units (RTUs) that allowing operators to observe and control physical plants. 2- Communication system : generally is via circuits operating in the range of 600 to 4800 bits/s with the RTU responding to periodic requests, initiated from the master station every 2 to 10 s, depending on the criticality of the data. 3- RTUs transmit device (Slave) : responsible to status and measurements , and receive control commands and set point data from, the master station. 11 Dr.Audih M.alfaoury
  • 13. System Concept of SCADA 13 Dr.Audih M.alfaoury
  • 14. 1) Data acquisition: Provides telemetered measurements and status information to operator. 2) Supervisory control: Allows operator to remotely control devices, (open and close circuit breakers). 3) Tagging: Identifies a device as specific operating restrictions , and prevents unauthorized operation. 4) Alarms: for unplanned events and undesirable operating conditions. (Alarms are sorted by criticality area of responsibility. Acknowledgment may be required). 5) Logging: Logs all operator entry, all alarms, and selected information. 6) Load shed: Provides both automatic and operator initiated tripping of load in response to system emergencies. 7) Trending: Plots measurements on selected time scales. 14 Dr.Audih M.alfaoury The traditional functions of SCADA systems are summarized:
  • 15. Master Station Mainly Function The master station in SCADA system functions mainly are: • Manage communication circuit configuration. • Down line load RTU files. • Check and correct message errors .  Convert to engineering units. • Detect status and measurement changes. • Monitor abnormal and out-of-limit conditions. • Log and time-tag(label) sequence of events. • Detect and annunciate alarms. 15 Dr.Audih M.alfaoury
  • 16. Dr.Audih M.alfaoury 16 RTUs FUNCTION (slave) RTUs are equipped with microprocessors having memory and logic capability. Older RTUs are equipped with modems to provide the communication link back to the ECC, whereas newer RTUs generally have intranet or internet capability . Relays located within the RTU, on command from the ECC, open or close selected control circuits to perform a supervisory action.
  • 18. RTU actions may include :  opening or closing of a circuit breaker or switch.  modifying a transformer tap setting.  raising or lowering generator MW output or terminal voltage.  switching in or out a shunt capacitor or inductor.  starting or stopping of a synchronous condenser. Information gathered by the RTU and communicated to the ECC includes both: 18 Dr.Audih M.alfaoury a) Analog information: This includes frequency, voltages, currents, real and reactive power flows , etc. b) Status indicators : Which includes alarm signals (over- temperature, low relay battery voltage, illegal entry) and whether switches and circuit breakers are open or closed. Such information is provided to the ECC through a periodic scan of all RTUs. Two second scan cycle is typical.
  • 19. MONITORING FUNCTIONS OF SCADA Measurement and displaying of :current, voltage, frequency, active and reactive power, energy, temperature, also storage and evaluation of time stamped events and archiving of measurements ,collection ,evaluation of maintenance data. As well as disturbance recording and evaluation. PROTECTION FUNCTIONS OF SCADA Substation protection functions : This includes monitoring of events (like start or trip indication) , relay operating time , setting and reading of relay parameters ,protection of bus bars, line feeders, transformers, generators, protection monitoring (status, events, measurements, parameters, recorders). 19 Dr.Audih M.alfaoury
  • 20. COMMUNICATION TECHNOLOGIES OF SCADA The form of communication required for SCADA is telemetry. Telemetry: is the measurement of a quantity to allow interpretation of that measurement at a distance from the primary detector. The feature of telemetry is the nature of the translating (means, converting the measure into a representative quantity of another kind). Telemetry may be analog or digital. IN ANALOG TELEMETRY : Voltage, current, or frequency proportional to the quantity being measured is developed and transmitted on a communication channel to the receiving location, where the received signal is applied to indicate the quantity being measured, forms of analog telemetry include variable current, pulse-amplitude and pulse-length. 20 Dr.Audih M.alfaoury
  • 21. IN DIGITAL TELEMETRY: The quantity being measured is converted to a code in which the sequence of pulses transmitted indicates the quantity. One of the advantages to digital telemetering is accuracy of data (is not lost in transmitting the data from one location to another).  Digital telemetry requires analog to digital (A/D) and possible digital to analog (D/A) converters as illustrated in the next figure. 21 Dr.Audih M.alfaoury
  • 22. Block Diagram of Telemetering System 22 Dr.Audih M.alfaoury
  • 23. COMMUNICATION BETWEEN MASTER CONTROL STATION AND REMOTE CONTROL STATION: a)Leased-wire : means a standard telephone (careful coordination between the user and the telephone company). b)Power-line carrier (PLC) offers an inexpensive and typically more reliable alternative to leased-wire. (the transmission circuit itself is used to modulate a communication signal at a frequency occurs in the range of 30-500 kHz. The security of PLC is very high since the communication equipment is located inside the substations. 23 Dr.Audih M.alfaoury
  • 24. TYPICAL PLC ARRANGEMENT PHASE-GROUND COUPLING CD CKT-I E/W B R Y E/W B R Y CVT/CC CD CVT/CC 24 Dr.Audih M.alfaoury
  • 25. c) Microwave radio : refers to ultra-high-frequency (UHF) radio systems operating above 1 GHz. (microwave telemetry was analog, but digital microwave communication is now quite common for EMS/SCADA applications d) Fiber optic cable : A more recent development has concerned the use of fiber optic cable, a technology capable of extremely fast communication speeds. Although cost. ( Fiber optics may be run underground power cables or to overhead transmission line towers just below the lines or be run within the shield wire suspended above the transmission lines). 25 Dr.Audih M.alfaoury
  • 26. e) VSAT Communication : Very small aperture terminals 26 36,000 km Dr.Audih M.alfaoury UTILITY CONTROL CENTER SHARED HUB SATELLITE VSATs NETWORK MANAGEMENT CENTER  Various frequency bands: C-band (4/6 GHz), Ku-band (12/14 GHz),Ka-band(30/20 GHz)  Advantages  Near-universal coverage  Good reliability  Fast installation  Disadvantages  Cost  Transmission delays  Blackout periods due to eclipses  Attenuation in heavy rain (Ku band)
  • 27. f) Mobile Communication 27  Several competing technologies  Use of control channel on analog AMPS (Advanced Mobile Phone Service), 800 MHz CDPD (Cellular Digital Packet Data)  Recently also being offered for applications in feeder automation Dr.Audih M.alfaoury
  • 28. Dr.Audih M.alfaoury 28 Restoration power system after contingences
  • 29. SCADA VARIOUS OPERATING STATES: 29 Dr.Audih M.alfaoury
  • 30. 1. Normal state 2. Alert state 3. Emergency state 4. Extremis state 5. Restorative state Normal state: A system is said to be in normal if both load and operating constraints are satisfied .It is one in which the total demand on the system is met by satisfying all the operating constraints. Alert state: A normal state of the system said to be in alert state if one or more of the postulated contingency states, consists of the constraint limits violated. When the system security level falls below a certain level or the probability of disturbance increases, the system may be in alert state . 30 Dr.Audih M.alfaoury
  • 31. If severe disturbance occurs, the system will push into emergency state. To bring back the system to secure state, preventive control action is carried out. Emergency state: The system is said to be in emergency state if one or more operating constraints are violated, but the load constraint is satisfied . In this state, the equality constraints are unchanged. The system will return to the normal or alert state by means of corrective actions , disconnection of faulted section or load sharing. 31 Dr.Audih M.alfaoury
  • 32. Extremis state: When the system is in emergency, if no proper corrective action is taken in time, then it goes to either emergency state or extremis state. In this regard neither the load or nor the operating constraint is satisfied, this result is islanding. Also the generating units are strained beyond their capacity . So emergency control action is done to bring back the system state either to the emergency state or normal state. Restorative state: From this state, the system may be brought back either to alert state or secure state .The latter is a slow process. Hence, in certain cases, first the system is brought back to alert state and then to the secure state . This is done using restorative control action. 32 Dr.Audih M.alfaoury