Meinberg products make frictionless power transportation possible. By accurately synchronizing your IT-Network and reliably monitoring your power line frequency
This document discusses wireless sensor network applications and energy consumption. It provides examples of WSN applications including disaster relief, environment monitoring, healthcare, and more. It then discusses various factors that influence energy consumption in sensor nodes, including operation states, microcontroller usage, radio transceivers, memory, and the relationship between computation and communication. Specific power consumption numbers are given for different components like radios, sensors, and microprocessors. The goals of optimization for WSNs are discussed as quality of service, energy efficiency, scalability, and robustness.
The document summarizes key aspects of cellular system operations:
1. Mobile unit initialization involves scanning for the strongest setup channel without loading the cell site. A self-location scheme is used when idle.
2. For mobile-originated calls, the user dials and the cell site selects an antenna and voice channel, requesting a channel from the MTSO.
3. For network calls, the MTSO pages cell sites to locate the mobile unit and direct it to an assigned voice channel.
4. The maximum number of calls per hour per cell depends on cell size and traffic conditions, and can be estimated based on vehicle density and call rates on roads within the cell.
HSPA is a mobile telecommunications protocol that extends 3G networks by improving data transmission rates. It consists of HSDPA for faster downloads and HSUPA for faster uploads. HSPA was designed for non-real time data and increases peak rates to 14Mbps down and 5.8Mbps up. It achieves these improvements through technologies like shorter transmission time intervals, link adaptation, advanced modulation schemes, and MIMO antennas. The architecture introduces new channels like HS-DSCH for user data and HS-SCCH for control information. Subsequent evolutions like HSPA+ and DC-HSDPA have further increased speeds through higher order modulation and dual-cell connections.
- GPRS is an upgrade to GSM that allows packet-based data services and efficient use of network bandwidth. It provides higher data rates than GSM and constant connectivity.
- The GPRS network architecture introduces new network elements like the SGSN and GGSN to route data packets. The SGSN manages packet data in its service area while the GGSN connects the GPRS network to external packet networks.
- Session management in GPRS includes establishing PDP contexts for data transfer sessions and location management tracks the routing area of mobile devices through routing area updates.
The document discusses different types of reusable components in system-on-chip (SoC) design including intellectual property (IP) cores. It describes synthesizable cores as having a high-level description but requiring synthesis and layout, soft cores as having a technology-dependent netlist but layout is required, and firm cores as having an encrypted netlist with layout and size/speed predictability. Hard cores are described as having a fixed, technology-specific layout with determined size and speed but lack portability between foundries. The document notes that hard cores provide benefits of high performance, low power consumption, and predictability for applications like processor cores, memories, and FPGAs.
This document discusses different types of small scale fading in wireless communication based on time delay spread and Doppler spread. There are four main types of fading: flat fading, frequency selective fading, fast fading, and slow fading. Flat fading occurs when the bandwidth of the signal is less than the bandwidth of the channel and the delay spread is less than the symbol period. Frequency selective fading occurs when the bandwidth of the signal is greater than the bandwidth of the channel and the delay spread is greater than the symbol period. Fast fading occurs when there is a high Doppler spread and the coherence time is less than the symbol period. Slow fading occurs when there is a low Doppler spread and the coherence time is greater than the symbol period.
The document discusses Local Interconnect Network (LIN), a simple automotive network protocol that can be used as an economical alternative to CAN bus in some applications. LIN uses inexpensive UART/SCI peripherals and internal oscillators. It has lower data rates and node counts than CAN but provides less error detection. LIN is best for low-speed applications like sensors and small actuators, with a single master and multiple slaves on a bus topology. The protocol uses 6-bit identifiers and 8-byte frames for messaging between nodes and different frame types. Common automotive applications mentioned include sensors, lighting, seating and door controls.
Power gating is the main power reduction techniques for the static power. As long as technology scaling is taking place, static power becomes paramount important factor to the VLSI designs.Therefore Power gating is the recent power reduction technique that is actively in research areas.
This document discusses wireless sensor network applications and energy consumption. It provides examples of WSN applications including disaster relief, environment monitoring, healthcare, and more. It then discusses various factors that influence energy consumption in sensor nodes, including operation states, microcontroller usage, radio transceivers, memory, and the relationship between computation and communication. Specific power consumption numbers are given for different components like radios, sensors, and microprocessors. The goals of optimization for WSNs are discussed as quality of service, energy efficiency, scalability, and robustness.
The document summarizes key aspects of cellular system operations:
1. Mobile unit initialization involves scanning for the strongest setup channel without loading the cell site. A self-location scheme is used when idle.
2. For mobile-originated calls, the user dials and the cell site selects an antenna and voice channel, requesting a channel from the MTSO.
3. For network calls, the MTSO pages cell sites to locate the mobile unit and direct it to an assigned voice channel.
4. The maximum number of calls per hour per cell depends on cell size and traffic conditions, and can be estimated based on vehicle density and call rates on roads within the cell.
HSPA is a mobile telecommunications protocol that extends 3G networks by improving data transmission rates. It consists of HSDPA for faster downloads and HSUPA for faster uploads. HSPA was designed for non-real time data and increases peak rates to 14Mbps down and 5.8Mbps up. It achieves these improvements through technologies like shorter transmission time intervals, link adaptation, advanced modulation schemes, and MIMO antennas. The architecture introduces new channels like HS-DSCH for user data and HS-SCCH for control information. Subsequent evolutions like HSPA+ and DC-HSDPA have further increased speeds through higher order modulation and dual-cell connections.
- GPRS is an upgrade to GSM that allows packet-based data services and efficient use of network bandwidth. It provides higher data rates than GSM and constant connectivity.
- The GPRS network architecture introduces new network elements like the SGSN and GGSN to route data packets. The SGSN manages packet data in its service area while the GGSN connects the GPRS network to external packet networks.
- Session management in GPRS includes establishing PDP contexts for data transfer sessions and location management tracks the routing area of mobile devices through routing area updates.
The document discusses different types of reusable components in system-on-chip (SoC) design including intellectual property (IP) cores. It describes synthesizable cores as having a high-level description but requiring synthesis and layout, soft cores as having a technology-dependent netlist but layout is required, and firm cores as having an encrypted netlist with layout and size/speed predictability. Hard cores are described as having a fixed, technology-specific layout with determined size and speed but lack portability between foundries. The document notes that hard cores provide benefits of high performance, low power consumption, and predictability for applications like processor cores, memories, and FPGAs.
This document discusses different types of small scale fading in wireless communication based on time delay spread and Doppler spread. There are four main types of fading: flat fading, frequency selective fading, fast fading, and slow fading. Flat fading occurs when the bandwidth of the signal is less than the bandwidth of the channel and the delay spread is less than the symbol period. Frequency selective fading occurs when the bandwidth of the signal is greater than the bandwidth of the channel and the delay spread is greater than the symbol period. Fast fading occurs when there is a high Doppler spread and the coherence time is less than the symbol period. Slow fading occurs when there is a low Doppler spread and the coherence time is greater than the symbol period.
The document discusses Local Interconnect Network (LIN), a simple automotive network protocol that can be used as an economical alternative to CAN bus in some applications. LIN uses inexpensive UART/SCI peripherals and internal oscillators. It has lower data rates and node counts than CAN but provides less error detection. LIN is best for low-speed applications like sensors and small actuators, with a single master and multiple slaves on a bus topology. The protocol uses 6-bit identifiers and 8-byte frames for messaging between nodes and different frame types. Common automotive applications mentioned include sensors, lighting, seating and door controls.
Power gating is the main power reduction techniques for the static power. As long as technology scaling is taking place, static power becomes paramount important factor to the VLSI designs.Therefore Power gating is the recent power reduction technique that is actively in research areas.
1. Layer 2 switches break up large collision domains into smaller ones by making each switch port its own collision domain, allowing a more efficient Ethernet LAN network than with hubs.
2. Bridges and switches learn MAC addresses and their associated ports by reading the source MAC address of each received frame and recording the port on which the MAC address was received.
3. The Spanning Tree Protocol provides a loop-free redundant network topology by placing certain switch ports in the blocking state and identifying one switch as the root bridge using BPDUs.
Webinar Slides: Probing Techniques and Tradeoffs – What to Use and Whyteledynelecroy
Engineers must commonly probe low and high frequency signals with high signal fidelity. Typical passive probes with high input impedance and capacitance provide good response at lower frequencies, but inappropriately load the circuit and distort signals at higher frequencies.
Join Teledyne LeCroy for this webinar as we discuss:
- Selecting the right probing techniques to maximize the accuracy of your measurements
- Probe specifications and their implications on the measured signal
- Variety of probes and accessories available for measurement
- Virtual probing software tools that allow the user to probe the signal when direct access is physically impossible
Controller Area Network (Basic Level Presentation)Vikas Kumar
The document discusses Controller Area Network (CAN) bus, which is a vehicle bus standard that allows microcontrollers and devices to communicate with each other within a vehicle without a host computer. Key points:
- CAN bus uses a serial communication protocol and multi-master message model to allow nodes to transmit and receive messages.
- It employs a bus topology where nodes are connected to a single cable with termination resistors at each end to eliminate signal reflections.
- CAN bus is used widely in automotive applications but also in other industries like shipping, manufacturing, etc. due to its robustness, error detection and flexibility.
This document outlines a student project to understand an OFDM transceiver using GNU Radio and USRPs. The project aims to learn digital signal processing concepts like sampling theory, analog-to-digital conversion, and signal reconstruction. It will also explore IEEE 802.11 frame formats, software defined radio, and how to set up the experimental system with GNU Radio and USRP devices. The student researcher expects to gain knowledge in digital communications, signal processing, programming, and using software defined radio tools which will benefit their computer engineering studies and potential future work.
This document discusses voltage standing wave ratio (VSWR) meters, which are used to measure impedance matching and standing waves in microwave systems. It describes the principles of VSWR meters, including their construction with normal, expanded, and dB scales. Two common types are directional VSWR meters and SWR bridge circuits. Applications include laboratories, live broadcast systems, and medical equipment. Problems with VSWR meters are also noted, such as their inability to measure reactance and sensitivity to signal attenuation.
This document provides an overview of the syllabus for the Cognitive Radios course offered by RMK College of Engineering and Technology. It discusses key topics that will be covered including SDR architecture, channel coding and decoding, RF access, IF processing, channel sets, multiple personalities, evolution support, joint control, and top level component interfaces. Standard interfaces in SDR systems are also described such as analog stream, source bit stream, clear bit streams, protected bit stream, IF waveform, RF waveform, and network interface.
Rectifiers and Back up Batteries at Telecom Sitesibrahimnabil17
Each telecom site requires a rectifier to convert the incoming AC voltage to DC voltage needed to power equipment. Rectifiers are also responsible for charging backup battery systems in the event of power cuts. Sites must have multiple battery strings providing -48V DC to power devices when utility power is lost. The number of battery strings depends on the site's load and importance. Rectifiers monitor voltage, current, temperature and have alarms to detect issues like low voltage, module failures or high battery temperature.
Overview Of I E C61850 Presentation..... W S Mginquesada
This document provides an overview of IEC 61850 and its benefits. IEC 61850 is a framework for substation automation that standardizes object models, data meanings, services, and device configurations. This standardization allows devices from different vendors to interoperate and reduces engineering and configuration costs. The benefits of IEC 61850 include lower installation, maintenance, wiring, and commissioning costs through the use of self-describing devices and a common configuration language.
The document discusses different channel assignment strategies for wireless networks, including fixed channel assignment where each cell is predetermined channels and dynamic channel assignment where channels are allocated on request based on factors like channel occupancy. It also describes a partially overlapping channel (FPOC) assignment strategy that aims to increase capacity while minimizing interference through intelligent channel allocation between neighboring nodes.
The HART protocol allows field instruments to communicate digitally by superimposing an FSK signal on top of the traditional 4-20mA analog signal. It operates at 1.2kbps using 1,200Hz and 2,200Hz frequencies to represent binary 1s and 0s. HART can be used in point-to-point or multidrop modes and supports both master-slave and burst communication modes. The physical layer defines cable and connector specifications while higher layers ensure reliable data transfer and define supported commands. HART is globally accepted as it preserves existing control strategies and infrastructure.
This document provides an overview of 4G LTE technology. It discusses key LTE concepts such as OFDM and MIMO used in the downlink and uplink, as well as requirements for IMT-Advanced systems. It describes the 3GPP releases that specified LTE and LTE-Advanced standards and components of the LTE network architecture including the E-UTRAN, EPC, and interfaces between nodes. The document also provides explanations of OFDM, MIMO, SC-FDMA, and the LTE physical layer frame structure and resource grid. Special features introduced in LTE-Advanced like carrier aggregation and relaying are also summarized.
A short introductory presentation/video explaining Bandwidth Parts in 5G and why are they needed.
There are two main reasons:
1. Cheaper devices may not want to support the large bandwidth in 5G, that can go up to 400 MHz for FR2 and 100 MHz for FR1
2. A device does not need to monitor the whole of bandwidth for power consumption reduction reasons, here BWP can help too
The document provides a technical overview of 3GPP LTE (Long Term Evolution), including:
1) An overview of cellular wireless system evolution from 1G to 4G, and the standardization bodies 3GPP and 3GPP2.
2) Key technologies enabling LTE such as OFDMA, SC-FDMA, MIMO, and the requirements and specifications of the LTE standard.
3) The network architecture of LTE consisting of the E-UTRAN, EPC, and protocols.
PWM is used to control motor speed and light dimming by varying the duty cycle of an output waveform. It can be generated using a timer, comparator, and waveform generator. The timer increments at a set rate while the comparator monitors the timer value and outputs a pulse while the timer is less than the compare value set by the output compare register. Different PWM modes and registers control aspects like waveform, frequency, and output compare functionality.
Topics covered in this presentation:
1. RF spectrum and GSM specifications
2. FDMA and TDMA
3. Digital Voice Transmission
4. Channel coding, Interleaving and Burst formatting
5. GMSK
6. Frame structure of GSM
7. Corrective actions against multipath fading
This document discusses SpaceVPX and SpaceVPXLite, which are standards for modular payload architectures for space applications. SpaceVPX was created to bridge existing VPX standards with the needs of the space market by defining module profiles to meet space application needs, adding features to the utility plane for fault tolerance, and defining the use of SpaceWire for the control plane. The document outlines key aspects of SpaceVPX including its goals, building blocks, development flow, involved organizations, and profiles for slots, backplanes and modules.
The document discusses the Unified Power Format (UPF) standard for defining power intent and managing low power design verification. It provides an overview of UPF and describes some key UPF commands for defining power domains, supply ports and nets, power switches, power state tables, and level shifter strategies. The UPF standard allows specifying power intent separately from the design itself using the Tool Command Language (TCL) and helps enable power-aware simulation, synthesis and other tools in the design flow.
The document discusses various aspects of physical design in VLSI circuits. It describes the physical design cycle which involves transforming a circuit diagram into a layout through steps like partitioning, floorplanning, placement, routing, and compaction. It also discusses different design styles like full-custom, standard cell, and gate array. Full-custom design allows maximum flexibility but has higher complexity, while restricted models like standard cell and gate array simplify the design process at the cost of less optimization in the layout. Physical design aims to produce layouts that meet timing and area constraints.
Programmable Load Shedding for the utility departmentMukund Hundekar
This document describes a programmable load shedding time management system that uses a microcontroller and real-time clock to automatically switch electrical devices on and off according to a pre-programmed schedule. The system allows multiple on/off times to be entered using a matrix keypad and displays the time on a 7-segment display. It takes over the manual task of switching loads with relays according to the programmed time settings. The document outlines the hardware components, software requirements, advantages including precise time control, and potential future enhancements such as remote control via GSM.
Network time sync for power generation, transmission and distributionMohd Amir
Meinberg offers solutions for synchronizing networks in power generation, transmission and distribution systems. Their products include NTP servers, frequency monitors, GPS clocks, and modular synchronization platforms that provide accurate timing via satellite receivers, radio clocks, and network time protocol. The solutions synchronize IT networks, reliably monitor power line frequency, and ensure accurate frequency control critical to preventing outages in power systems.
IRJET- Power Line Carrier CommunicationIRJET Journal
This document describes power line carrier communication (PLCC), which uses power lines as a communication medium. It discusses using PLCC to transmit electricity billing data from individual homes to the electricity company without site visits. Key components of the system include a real-time clock, energy meter, microcontroller, LCD display, and FSK transmitter and receiver. Data transmission is done by modulating a signal onto the power line using FSK modulation. The system is intended to reduce the burden on electricity companies by allowing remote transmission of billing data without the need for site visits.
1. Layer 2 switches break up large collision domains into smaller ones by making each switch port its own collision domain, allowing a more efficient Ethernet LAN network than with hubs.
2. Bridges and switches learn MAC addresses and their associated ports by reading the source MAC address of each received frame and recording the port on which the MAC address was received.
3. The Spanning Tree Protocol provides a loop-free redundant network topology by placing certain switch ports in the blocking state and identifying one switch as the root bridge using BPDUs.
Webinar Slides: Probing Techniques and Tradeoffs – What to Use and Whyteledynelecroy
Engineers must commonly probe low and high frequency signals with high signal fidelity. Typical passive probes with high input impedance and capacitance provide good response at lower frequencies, but inappropriately load the circuit and distort signals at higher frequencies.
Join Teledyne LeCroy for this webinar as we discuss:
- Selecting the right probing techniques to maximize the accuracy of your measurements
- Probe specifications and their implications on the measured signal
- Variety of probes and accessories available for measurement
- Virtual probing software tools that allow the user to probe the signal when direct access is physically impossible
Controller Area Network (Basic Level Presentation)Vikas Kumar
The document discusses Controller Area Network (CAN) bus, which is a vehicle bus standard that allows microcontrollers and devices to communicate with each other within a vehicle without a host computer. Key points:
- CAN bus uses a serial communication protocol and multi-master message model to allow nodes to transmit and receive messages.
- It employs a bus topology where nodes are connected to a single cable with termination resistors at each end to eliminate signal reflections.
- CAN bus is used widely in automotive applications but also in other industries like shipping, manufacturing, etc. due to its robustness, error detection and flexibility.
This document outlines a student project to understand an OFDM transceiver using GNU Radio and USRPs. The project aims to learn digital signal processing concepts like sampling theory, analog-to-digital conversion, and signal reconstruction. It will also explore IEEE 802.11 frame formats, software defined radio, and how to set up the experimental system with GNU Radio and USRP devices. The student researcher expects to gain knowledge in digital communications, signal processing, programming, and using software defined radio tools which will benefit their computer engineering studies and potential future work.
This document discusses voltage standing wave ratio (VSWR) meters, which are used to measure impedance matching and standing waves in microwave systems. It describes the principles of VSWR meters, including their construction with normal, expanded, and dB scales. Two common types are directional VSWR meters and SWR bridge circuits. Applications include laboratories, live broadcast systems, and medical equipment. Problems with VSWR meters are also noted, such as their inability to measure reactance and sensitivity to signal attenuation.
This document provides an overview of the syllabus for the Cognitive Radios course offered by RMK College of Engineering and Technology. It discusses key topics that will be covered including SDR architecture, channel coding and decoding, RF access, IF processing, channel sets, multiple personalities, evolution support, joint control, and top level component interfaces. Standard interfaces in SDR systems are also described such as analog stream, source bit stream, clear bit streams, protected bit stream, IF waveform, RF waveform, and network interface.
Rectifiers and Back up Batteries at Telecom Sitesibrahimnabil17
Each telecom site requires a rectifier to convert the incoming AC voltage to DC voltage needed to power equipment. Rectifiers are also responsible for charging backup battery systems in the event of power cuts. Sites must have multiple battery strings providing -48V DC to power devices when utility power is lost. The number of battery strings depends on the site's load and importance. Rectifiers monitor voltage, current, temperature and have alarms to detect issues like low voltage, module failures or high battery temperature.
Overview Of I E C61850 Presentation..... W S Mginquesada
This document provides an overview of IEC 61850 and its benefits. IEC 61850 is a framework for substation automation that standardizes object models, data meanings, services, and device configurations. This standardization allows devices from different vendors to interoperate and reduces engineering and configuration costs. The benefits of IEC 61850 include lower installation, maintenance, wiring, and commissioning costs through the use of self-describing devices and a common configuration language.
The document discusses different channel assignment strategies for wireless networks, including fixed channel assignment where each cell is predetermined channels and dynamic channel assignment where channels are allocated on request based on factors like channel occupancy. It also describes a partially overlapping channel (FPOC) assignment strategy that aims to increase capacity while minimizing interference through intelligent channel allocation between neighboring nodes.
The HART protocol allows field instruments to communicate digitally by superimposing an FSK signal on top of the traditional 4-20mA analog signal. It operates at 1.2kbps using 1,200Hz and 2,200Hz frequencies to represent binary 1s and 0s. HART can be used in point-to-point or multidrop modes and supports both master-slave and burst communication modes. The physical layer defines cable and connector specifications while higher layers ensure reliable data transfer and define supported commands. HART is globally accepted as it preserves existing control strategies and infrastructure.
This document provides an overview of 4G LTE technology. It discusses key LTE concepts such as OFDM and MIMO used in the downlink and uplink, as well as requirements for IMT-Advanced systems. It describes the 3GPP releases that specified LTE and LTE-Advanced standards and components of the LTE network architecture including the E-UTRAN, EPC, and interfaces between nodes. The document also provides explanations of OFDM, MIMO, SC-FDMA, and the LTE physical layer frame structure and resource grid. Special features introduced in LTE-Advanced like carrier aggregation and relaying are also summarized.
A short introductory presentation/video explaining Bandwidth Parts in 5G and why are they needed.
There are two main reasons:
1. Cheaper devices may not want to support the large bandwidth in 5G, that can go up to 400 MHz for FR2 and 100 MHz for FR1
2. A device does not need to monitor the whole of bandwidth for power consumption reduction reasons, here BWP can help too
The document provides a technical overview of 3GPP LTE (Long Term Evolution), including:
1) An overview of cellular wireless system evolution from 1G to 4G, and the standardization bodies 3GPP and 3GPP2.
2) Key technologies enabling LTE such as OFDMA, SC-FDMA, MIMO, and the requirements and specifications of the LTE standard.
3) The network architecture of LTE consisting of the E-UTRAN, EPC, and protocols.
PWM is used to control motor speed and light dimming by varying the duty cycle of an output waveform. It can be generated using a timer, comparator, and waveform generator. The timer increments at a set rate while the comparator monitors the timer value and outputs a pulse while the timer is less than the compare value set by the output compare register. Different PWM modes and registers control aspects like waveform, frequency, and output compare functionality.
Topics covered in this presentation:
1. RF spectrum and GSM specifications
2. FDMA and TDMA
3. Digital Voice Transmission
4. Channel coding, Interleaving and Burst formatting
5. GMSK
6. Frame structure of GSM
7. Corrective actions against multipath fading
This document discusses SpaceVPX and SpaceVPXLite, which are standards for modular payload architectures for space applications. SpaceVPX was created to bridge existing VPX standards with the needs of the space market by defining module profiles to meet space application needs, adding features to the utility plane for fault tolerance, and defining the use of SpaceWire for the control plane. The document outlines key aspects of SpaceVPX including its goals, building blocks, development flow, involved organizations, and profiles for slots, backplanes and modules.
The document discusses the Unified Power Format (UPF) standard for defining power intent and managing low power design verification. It provides an overview of UPF and describes some key UPF commands for defining power domains, supply ports and nets, power switches, power state tables, and level shifter strategies. The UPF standard allows specifying power intent separately from the design itself using the Tool Command Language (TCL) and helps enable power-aware simulation, synthesis and other tools in the design flow.
The document discusses various aspects of physical design in VLSI circuits. It describes the physical design cycle which involves transforming a circuit diagram into a layout through steps like partitioning, floorplanning, placement, routing, and compaction. It also discusses different design styles like full-custom, standard cell, and gate array. Full-custom design allows maximum flexibility but has higher complexity, while restricted models like standard cell and gate array simplify the design process at the cost of less optimization in the layout. Physical design aims to produce layouts that meet timing and area constraints.
Programmable Load Shedding for the utility departmentMukund Hundekar
This document describes a programmable load shedding time management system that uses a microcontroller and real-time clock to automatically switch electrical devices on and off according to a pre-programmed schedule. The system allows multiple on/off times to be entered using a matrix keypad and displays the time on a 7-segment display. It takes over the manual task of switching loads with relays according to the programmed time settings. The document outlines the hardware components, software requirements, advantages including precise time control, and potential future enhancements such as remote control via GSM.
Network time sync for power generation, transmission and distributionMohd Amir
Meinberg offers solutions for synchronizing networks in power generation, transmission and distribution systems. Their products include NTP servers, frequency monitors, GPS clocks, and modular synchronization platforms that provide accurate timing via satellite receivers, radio clocks, and network time protocol. The solutions synchronize IT networks, reliably monitor power line frequency, and ensure accurate frequency control critical to preventing outages in power systems.
IRJET- Power Line Carrier CommunicationIRJET Journal
This document describes power line carrier communication (PLCC), which uses power lines as a communication medium. It discusses using PLCC to transmit electricity billing data from individual homes to the electricity company without site visits. Key components of the system include a real-time clock, energy meter, microcontroller, LCD display, and FSK transmitter and receiver. Data transmission is done by modulating a signal onto the power line using FSK modulation. The system is intended to reduce the burden on electricity companies by allowing remote transmission of billing data without the need for site visits.
The Siemens 7SD61 Cable Differential Protection Relay provides differential protection for power lines and cables at all voltage levels with phase-segregated measurement. It can protect up to two line ends and incorporates functions for transformers within the protected zone. Digital communication via fiber optic cables or other media allows the line ends to be located far apart. The relay also provides backup protection functions and easy local or remote access and control.
Numerical relays provide several advantages over electromechanical and solid state relays including improved reliability, flexibility, and performance. They allow for advanced protection schemes through programming and use of microprocessors. Numerical relays also simplify interfacing with current and potential transformers, enable advanced functions like phasor measurement, and provide time-stamped fault data for analysis. Their main advantages are reliability, security, dependability, and ability to implement new protection schemes through programming.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
The document provides an overview of ZigBee/IEEE 802.15.4 wireless technology. It discusses the need for low-power, low-cost wireless connectivity for applications like home automation, medical devices, and industrial sensors. It describes the ZigBee Alliance's role in developing networking and application standards on top of the IEEE 802.15.4 physical radio specification. Key features of ZigBee networks include low power consumption, large network capacity, low data rates, and flexibility for many applications.
Published in the year 2014, this paper explains how interoperability and decentralized automation system can be achived in electrical distribution grid using IEC61850. Network information from neighboring nodes can help field controllers make decisions faster and more accurately thereby making the distribution network self- healing and reliable.
The document discusses implementing a Smart Communication System (SCS) using digital power line carrier (DPLC) technology to integrate traditional telecommunication networks with modern IP-based networks for electrical utilities. By using DPLC terminals with routing capabilities, the SCS can provide automatic switching between different communication links, such as fiber, radio, and power lines, to transport both TDM and IP protocols in a hybrid network with increased reliability compared to traditional linear networks. The SCS allows the electrical grid's inherent mesh structure to be leveraged for packet switching independent of the underlying technology of each individual link.
This document discusses enabling reliable transport of teleprotection traffic over IP/MPLS networks for power utilities. It explains that legacy mission-critical applications like teleprotection require stringent transport and differential protection requires symmetric delay. It describes how Nokia IP/MPLS networks can meet these requirements through features like Circuit Emulation Service and Asymmetric Delay Control to attain symmetric delay for teleprotection even over packet networks. It provides examples of Nokia IP/MPLS networks being tested and deployed for teleprotection applications.
The Siemens 7SD52/53 line differential protection relay provides full scheme differential protection for power lines with 2 to 6 line ends. It protects lines at all voltage levels and incorporates functions like high-speed fault clearance, distance protection, and communication features. The relay uses fiber-optic cables or communication networks to exchange information and can be used with pilot wires. It offers benefits like improved reliability and availability of the power system.
This document discusses communications network requirements for substation automation. It describes how utilities are adopting IP and Ethernet-based intelligent electronic devices (IEDs) to improve grid performance and efficiency. This requires new communications network infrastructures within substations and between substations and control centers to handle increased traffic. The document outlines architectures that segment intra-substation and wide area network communications according to standards like IEC 61850. It also provides an example case study of a smart substation project in France where Nokia is implementing digital substations for grid improvements.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Protection Technique for Complex Distribution Smart Grid Using Wireless Token...Power System Operation
Distributed generation is expected to increase sharply
as more and more renewable are integrated to power system with
the realization of smart grid, consequently complex distribution
smart grid is given. The traditional protection devices cannot
be able to protect complex power system configuration due to
many fault current loops will feed the fault point. Relays based on
standalone decisions cannot provide reliable and correct action
when used on a complex distribution system. This paper proposes
new protection philosophy using wireless technology. Data
sharing among relays to obtain reliable and accurate decision are
introduced. Wireless Token Ring Protocol (WTRP) as a wireless
local area network (LAN) protocol inspired by the IEEE 802.4
Token Bus Protocol is used for data sharing. WTRP is selected
to improve efficiency by reducing the number of retransmissions
due to collisions. WTRP architecture and protocol are described
to verify operation. MATLAB simulation program is used to
simulate the data exchange protocol between relays in a ring for
a specified amount of time.
unit 4 smartsensors and application.pptxAanshuSingh3
This document discusses smart sensors and their applications. It defines smart sensors as sensors that can perform ranging, calibration, and decision making for communication when combined with interface electronics. It describes the key components of smart sensors including primary sensors, excitation, amplification, filters, converters, compensation, information coding/processing, and data communication. It also discusses standards for smart sensor interfaces and gives examples of sensor applications in automobiles, homes, aerospace, manufacturing, and environmental monitoring.
Project Report on Optical Fiber Cables and Systems (MTNL Mumbai)Pradeep Singh
This document provides a summary of a project report on optical fiber cables and systems used by MTNL Mumbai. It discusses the basic optical fiber transmission system including digital distribution frames, multiplexers, optical line terminating units, and repeaters. It also covers topics like Pulse Code Modulation (PCM), digital transmission hierarchies including Synchronous Digital Hierarchy (SDH), data circuits, Dense Wavelength Division Multiplexing (DWDM), and the construction, maintenance and fault detection of optical fiber cables. Network elements of SDH like terminal multiplexers, add/drop multiplexers, and digital cross-connects are also described.
Integrated Mine Safety Monitoring and Alerting System Using Zigbee & Can BusIOSR Journals
1. The document describes an integrated mine safety monitoring and alerting system that uses Zigbee and CAN bus technology.
2. The system aims to improve mine safety monitoring by integrating personnel positioning, gas detection, and other functions into a single wireless network.
3. Sensors attached to miners' helmets would detect environmental parameters like temperature, gas levels, and transmit data via Zigbee to a base station for monitoring and alerting purposes if thresholds are exceeded. CAN bus is used to improve communication speed between nodes.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Design and Implementation of Low Cost Smart Web Sensors for Electric Power Qu...IJTET Journal
This document describes the design and implementation of a low-cost smart web sensor for electric power quality monitoring. The sensor is designed to acquire, process, and transmit power quality data over an 802.3 network. It uses a multi-microcontroller system with one microcontroller dedicated to data acquisition and another for data processing, dynamic webpage generation, and TCP/IP communication. The sensor allows for distributed power quality measurement in large industrial environments using a standard internet browser. It was tested and shown to accurately measure voltage, harmonics, and other power quality parameters within specifications. The low-cost design makes it suitable for wide deployment in power quality monitoring applications.
IEC61850: Use of IEC61850 to telecontrol MV grids (Article)iGrid T&D
This document discusses using IEC-61850 standards to remotely control medium voltage grids. It describes how TCP/IP networks allow integration of both private networks like Ethernet and TETRA, as well as public networks like GPRS and UMTS. IEC-61850 provides benefits for remote control by enabling data sharing between devices using common protocols. The document focuses on how IEC-61850 can be applied to remotely monitor and control MV switchgear using MMS, as well as for over-current fault detection. Short term challenges include retrofitting existing facilities and Control Centers supporting many IEC-61850 connections.
Performance Improvement of IEEE 802.22 WRAN Physical LayerIOSR Journals
The spectrum available for the wireless services is limited, the increased demand of wireless
application has put a lot of limitations on the utilization of available radio spectrum. For the efficient spectrum
utilization for wireless application IEEE 802.22 standard i.e. WRAN (Wireless Regional Area Network) is
developed which is based on cognitive radio technique that senses the free available spectrum. It allows sharing
of geographically unused channels allocated to the TV Broadcast Service, without interference.
In this paper we are evaluating the performance of WRAN over physical layer with QPSK, 16-QAM
and 64-QAM modulation with Convolution coding with code rate of 1/2, 2/3, 3/4, 5/6 and obtaining the BER
curves for rician channel. Simulation is performed in MATLAB
Similar to why time synchronization is important in power generation, transmission and distribution (20)
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
why time synchronization is important in power generation, transmission and distribution
1. Solutions for Power Generation, Transmission
and Distribution:
Meinberg products make frictionless power transportation possible. By accurately
synchronizing your IT-Network and reliably monitoring your power line frequency.
Accurate synchronization of your IT-Network
Reliable monitoring of your power line frequency
Accurate synchronization of your IT-Network
Normally power is not being produced where it is actually needed. So it is transported
from the generating plant to the end user. Due to that, power is often being transported
over long distances throughout power grids, which include medium-voltage power lines,
sub-stations, pole-mounted transformers and low-voltage wiring.
Such power networks require extensive controlling technology, like Supervisory Control
and Data Acquisition (SCADA) systems and a variety of Intelligent Electronic Devices (IED)
like protection relays, bay controller units, etc. . By and large, to be able to properly detect,
identify and solve problems, it is necessary to have your IT-Network synchronized. This
enables you to see exactly where and when a problem occurred in your power grid.
Meinberg radio clocks offers a range of solutions to accurately synchronize your IT-
Network:
Reliable monitoring of your power line frequency
Meinberg products will offer you reliable and accurate frequency control solutions
System frequency varies as load and generation change. It is therefore important to
detect changes in the network-wide frequency -in real-time- to be able to prevent
major outages...
1. Challenges in substation timing
Time synchronisation has been required in substations for many years to ensure consistent
time stamping of events, with a required accuracy of 1 millisecond (1 ms). More accurate time-
stamping, in the order of 1 microsecond (1 µs), is now required for advanced substation
automation applications such as wide area phasor monitoring and sampled value process
buses.
2. In substation automation, the following applications require time synchronization:
• Transmission of Ethernet protocols like GOOSE and MMS
• Real-time data acquisition from IEDs, RTUs and MUs
• Real-time process control of equipment like protection relays
• Fault recording for fault and performance analysis
Generally there are two kinds of time synchronization in substation automation:
Dedicated timing systems and synchronization over LAN.
1. Dedicated timing systems that use stand-alone cabling and repeaters.
2. Networked timing systems that use Ethernet networking cables and switches
shared with other automation applications.
The rest of this section discusses commonly used time synchronising systems and the
benefits and disadvantages of each.
Which Protocols can be applied for Time Synchronization in Substation
Automation?
Normally the internal clock within network devices will be synchronized according to a
synchronization time server that is connected to a GPS (Global Positioning Satellite) or a
redundant satellite. Depending on the substation network application, synchronization
time for events and faults can range from sub-microseconds to milliseconds. Factors
effecting time synchronization accuracy depend on the protocol, traffic load,
communication media and cable distance of the network.
Dedicated timing systems
Time synchronisation systems in substations have historically used a separate
distribution system with its own cabling (coaxial, twisted pair or fibre-optic). Two
common methods in use are: • IRIG-B time code, conveying time and date
information along with synchronisation pulses; and • 1 Pulse Per Second (1-PPS),
which is a very accurate synchronisation pulse that has no time of day or date
information. Data communications between protection relays and the SCADA
system have no influence on the accuracy of time synchronisation. Separate systems
3. increase the cost of construction through extra cable, terminal blocks and
documentation, and this can be significant for large transmission substations.
Figure 1 shows the use of IRIG-B for time synchronisation and Ethernet for data
transfer, however RS485 may be used in older substations in place of Ethernet.
Twisted pair cable is used instead of coaxial cables in many substations for IRIG-B.
Figure 1
1.1.1.IRIG-B
The time synchronisation method most commonly used in substations is the IRIG-B
time code, which uses a dedicated distribution network. This time code can be
transmitted as raw pulses over copper cables (coaxial or twisted pair) and fibre-
optic cables, or as an amplitude modulated (AM) 1 kHz carrier over coaxial cable.
IRIG-B has been extended over the years, primarily by IEEE standards for
synchrophasors (IEEE Std 1344-1995, IEEE Std C37.118-2005, and most recently
IEEE Std C37.118.1-2011 ). These extensions provide information such as year, time
zone offset from Coordinated Universal Time (UTC), daylight saving (Summer) time,
and time quality that are essential for substation automation. Unmodulated IRIG-B
is capable of sub-microsecond accuracy, however many client devices are limited to
millisecond accuracy because of their designs. IRIG-B has a number of options for
how the time code is formatted and transmitted. Unfortunately the time
synchronisation requirements of the various vendors of substation equipment can
be mutually exclusive and cannot be met with one IRIG-B signal. Such differences
include whether modulated or unmodulated signals are used, and whether the time
is referenced to local time or to Coordinated Universal Time (UTC).
4. The various “flavours” of IRIG-B are known by code values, for example: • B003:
pulse width code (unmodulated), no extensions for year or IEEE extensions; • B004:
pulse width code (unmodulated), extensions for year and IEEE extensions; • B124:
amplitude modulated on 1 kHz carrier, extensions for year and IEEE extensions.
Figure 2, reproduced from IRIG Standard 200-04, compares the unmodulated and
modulated signals that are used in the IRIG-B time code.
IRIG-B specification for the start of message reference and the data pulses (“0” and
“1”) for unmodulated and modulated signals.
Client devices, such as protection relays, need to be configured to match the master clock:
UTC vs local time, fixed time zone fixed or set by IEEE extensions and so forth. The
flexibility of configuration of protection relays varies significantly, even with protection
relays from the same manufacturer. Some protection relays can be configured to accept
almost all IRIG-B time codes, but many are limited in their flexibility.
Other challenges faced by substation designers when using IRIG-B include: the burden
(loading) on the time distribution network, transmission line termination, immunity to
noise, galvanic isolation and wiring maintenance. The output capability of master clocks
can range from 15 mA to 150 mA, but each make and model of protection relay presents a
different load (typically 5 mA to 10 mA) to the master clock. This complicates the timing
design with a moderate to large number of protection relays, such as in distribution or
industrial substations with medium voltage (6.6 kV to 33 kV) metal-clad switchgear.
5. 1.1.2.One Pulse per Second (1-PPS)
One pulse per second (1-PPS) can be used to provide an accurate synchronisation
reference, but does not include “time of day” information. This is sufficient for
sampled value process bus applications at present, but time of day information is
likely to be required in the future for event time stamping or cryptographic message
authentication (to prevent replay attacks). The 1-PPS specification most commonly
used for synchronising signals in substations comes from IEC 60044-8, and is
referred to by the IEC 61850-9-2 process bus implementation guideline commonly
referred to as “9-2 Light Edition”. The draft IEC 61869-9 standard for merging unit
communication retains 1-PPS over fibre-optic cable as an option for time
synchronisation.
Figure 3 illustrates the 1-PPS pulse specification. The rise and fall time (tf) between
the 10% and 90% levels must be less than 200 ns, and the high time (th) must be
between 10 µs and 500 ms (measured at the 50% level).
Graphical representation of 1-PPS signal specification
1-PPS requires a dedicated distribution network, which can use metallic (coaxial or
twisted pair) or fibre-optic (multi-mode or single-mode) cables.
1.1.3. Distribution and propagation delay
Distribution of IRIG-B and 1-PPS signals using electrical means is simpler than with
fibre-optics since multi-drop connections can be used (provided the loading of the
source is within limits), but this could result in potential rise between panels.
Optical distribution ensures galvanic isolation and eliminates inductive or capacitive
interference, but dedicated distribution repeaters are required to split the signal for
each protection relay. The 9-2LE guideline for IEC 61850-9-2 requires time
synchronisation to be performed using fibre-optic cable. This in turn requires the
6. use of a pulse distributor or a clock with multiple outputs if there is more than one
merging unit.
The propagation delay through copper and fibre-optic cables is approximately 5 ns
per metre. This can become significant with extended cable runs and may require
compensation by the connected devices. The 9-2LE guideline sets a limit of 2 µs
“error” before compensation is required. This would result from approximately 400
m of cable, and many large transmission substations will have signal cable lengths in
excess of this. Compensation is a manual process that requires specific cable lengths
distribution repeater delays to be known for each connected device.
1.2. Networked timing systems
The Ethernet networks now widely used for substation automation systems can be used
to synchronise the internal clocks of devices throughout a substation. This has the
advantage of not requiring additional cabling, but does require support for suitable
protocols by the various protection relays, power quality meters and other such devices.
Two network-based protocols are commonly used: the Network Time Protocol (NTP), and
the Precision Time Protocol (PTP). Both protocols, when used in substations, work
through the exchange of messages over Ethernet. NTP and PTP can compensate for
propagation delay through bidirectional communication. NTP is a more established
standard and is widely used, but PTP offers greater performance through the use of
special networking hardware. The topology, shown in Figure 4, is the same for NTP and
PTP.
Figure 4: Network topology for NTP and PTP time synchronisation. PTP requires specific types of Ethernet
switch, but NTP does not.
Both networked protocols support multiple master clocks, which improves redundancy
and reliability of a substation time synchronisation system. In addition, multiple master
7. clocks allows maintenance to take place without taking the timing system (and any
dependent protection equipment) out of service.
1.2.1. Network Time Protocol (NTP)
In recent years the Network Time Protocol (NTP) running over Ethernet networks has
been adopted for substation use. The combination of commercially available NTP servers
(clocks) and clients (protection relays) can achieve accuracies of 1-4 ms, but this requires
care to be taken in the design of the Ethernet network to minimize packet delay variation.
A significant advantage of NTP over IRIG-B for general purpose time synchronisation is
time is always transmitted with respect to UTC. This fits with standards such as IEC 61850
and IEEE Std 1815 (DNP3) that require event time stamps to be transmitted using UTC. If
it is desired to display local time on the front panel of a protection relay then the local
offset to UTC must be manually configured, along with any applicable Daylight Saving
transition dates. NTP supports the simultaneous use of multiple master clocks by a client
for more accurate and reliable operation. Unfortunately NTP does not achieve the
microsecond-level accuracy required for synchrophasors and sampled value process
buses.
1.2.2. Precision Time Protocol (PTP)
IEEE Std 1588-2008 specifies the second generation of PTP, which is also known as
“PTPv2” or “1588v2”. This is capable of very accurate time synchronisation by using
special Ethernet hardware that records the exact time a PTP synchronisation message is
received at the Ethernet card. This information can compensate for the uncertainty
introduced by real time operating systems and other processing delays in both the
synchronisation master and the devices that are to be synchronised. The time-stamping
hardware does not affect the operation of any other protocols running over Ethernet, and
so the same port can be used for IEC 61850, DNP3, IEC 60870-5-104, Modbus/IP and
other substation automation protocols. The PTP-specific hardware does marginally
increase the cost of Ethernet switches. Native support for PTP is only available in the
latest generation of protection relays, and may be an option to be specified at the time of
order (depending on the vendor).
PTP supports multiple master-capable clocks, but these vote amongst themselves to
choose a single clock to be the “grandmaster”. If the grandmaster fails or suffers degraded
performance any other master-capable clock on the network will step up to be the
grandmaster if it has better accuracy. The time required for this does vary, however if PTP
settings (known as a “profile”) optimised for the power industry are used this is usually
less than 5 seconds.
8. 2.1. PTP terminology
IEEE Std 1588-2008 defines a number of terms for PTP time synchronisation systems.
The key terms are:
• Grandmaster clock: the clock that is the ultimate source of time for synchronisation
using PTP, and usually has a GPS (or other satellite system) receiver built in.
• Master clock: a clock that is the source of time that other clocks on the network
synchronise to.
• Slave clock: the end-user of PTP, which may be a protection relay with native support
for PTP that generates a legacy time synchronisation signal such as IRIG-B or 1-PPS.
• Transparent clock: an Ethernet switch that measures the time taken for a PTP
synchronisation message to transit the device and provides this information to clocks
receiving the PTP event message.
• Boundary clock: a clock that has multiple PTP ports and may serve as a source of time,
i.e. be a slave clock to an upstream source and a master clock to downstream devices.
A timing network needs at least one grandmaster and one slave clock, however in all but
the most trivial situations, Ethernet switches will be required. Ethernet switches in a PTP
network will generally be transparent clocks, as this is the simplest configuration. It is
however possible for many Ethernet switches with PTP support to act as boundary clocks,
sometimes giving a better performance (this will vary between makes and models). Figure
5 illustrates a PTP timing network with a range of devices. The grandmaster in this
example has the ability to fall back to using PTP messages from a wide area network if the
satellite receiver fails (at which point it becomes a boundary clock). Two types of slave
clock are used: protection relays with native support for PTP, and translator devices that
regenerate conventional time codes such as IRIG-B and 1-PPS for devices that do not
support PTP.
PTP network with a master clock, transparent clock/switch and range of slave clock devices
9. 2.2. PTP Messages
When PTP used with the Power System Profile, uses four classes of message to perform
time synchronisation. These are:
1. Sync messages. These contain the time value from the master clock in the form of the
number of seconds and nanoseconds since midnight on 1 January 1970.
2. Peer Delay messages. These are exchanged between neighbors to estimate the
propagation delay of each path between devices. The Peer Delay mechanism uses two or
three separate message types to measure the propagation delay (depending on one-step
or two-step operation)
3. Follow Up messages. These contain the precise time stamp of when the previous Sync
message was sent, along with Correction information. The Correction is the sum of the
transparent clock residence times and propagation delays been the grandmaster and that
point in the network, and is represented as nanoseconds and fractions of nanoseconds.
4. Announce messages. These are information messages transmitted by the grandmaster
that provide details of time accuracy of the reference (e.g. GPS receiver) and other PTP
protocol information.
Figures 6–8 illustrate how the flow of messages in a small network using two-step clocks
(as most commercially available devices do not support one-step operation). The Sync
messages are transmitted unaltered by the transparent clocks. ta (as per the figure)
represents the time at the grandmaster clock. Announce messages are treated the same
way.
Figure 6:Graphical representation of Sync message travelling through a PTP network
10. Peer Delay (Peer Delay Request, Peer Delay Response and Peer Delay Follow Up)
messages are exchanged between neighbours, and are not passed on.
Figure 7: Peer Delay messages are exchanged across each link in the network and are not
propagated
Each transparent clock records the propagation delay of links between itself and it’s
immediate peers. As a Sync message passes through a transparent clock, the clock
calculates a local correction value by adding the propagation delay of the link the message
arrived on and the residence time of the message within the clock. This local correction
value is then added to correction field of the corresponding Follow Up message. When the
messages arrive at the slave clock it adds its recorded link propagation delay to the
correction value which then represents the total time taken for the Sync message to travel
from the Master to the slave, the path delay. Because the total path delay value is
contributed to by each component in the path the sync message takes, the peer-to-peer
mechanism used in the Power Profile is very responsive to changes in network topology. It
is important to note that while the Follow Up messages may look identical, they will be
different at each point in the network. Transparent clocks alter the contents of the
message while retaining the original source address of the grandmaster. In Figure 8 tb is
the actual time the Sync message left the grandmaster clock and will be close, but not
identical, to ta. Each slave clocks knows when it received the Sync message, and by using
the precise time stamp and correction information can compensate for variable network
delays
11. Figure 8:Follow Up messages contain information updated by transparent clocks in the network.
Follow Up messages will differ throughout the network, reflecting the different network delays to
each node.
2.3. One-step and two-step operation
PTP relies on knowing exactly when a PTP Sync message (this is the primary message that
transfers time) is transmitted and when it is received by the Ethernet interfaces of slave
clocks. The exact time a message is sent is not known until it is sent. The special time-
stamping hardware in an Ethernet interface that supports PTP then makes this
information available to the host CPU in the grandmaster. A Follow Up message is sent
that conveys this precise time-stamp to all the client devices. Transparent clocks add their
estimate of delays through the network into the “correction”field of the Follow Up
message. The combination of Sync and Follow Up messages is called “two step” operation.
PTPv2 introduced support for Ethernet hardware that could modify a PTP message on the
fly, updating the accurate time-stamp as it was transmitted. This mode of operation avoids
the need for Follow Up messages, and is called “one step” operation. A one step
grandmaster clock transmits the precise time stamp in the Sync message and transparent
clocks provide network delay estimates in the correction field of the Sync message rather
than in the Follow Up message. This reduces network traffic, but does require more
sophisticated Ethernet hardware.
PTP systems may include a combination of one-step and two-step grandmaster clocks, and
a combination of one-step and two-step transparent clocks. Slave clocks will need to take
into account the correction information that has been inserted directly into Sync messages
by one step transparent clocks and the updated information sent in Follow Up messages
by two step transparent clocks.
12. 2.4. The PTP Power System Profile
The PTP standard allows for a number of options, and as with IRIG-B, some options are
mutually exclusive. PTPv2 introduced the concept of “profiles” that restrict the available
options and may mandate certain features for specific applications.
The power industry has a profile, IEEE Std C37.238-2011, that provides a set of optimised
parameters and minimal options to deliver accuracy better than 1 µs with network
topologies typically found in substation automation systems. This “Power Profile” also
defines a Management Information Base (MIB) for the Simple Network Management
Protocol (SNMP) that allows key parameters of Power Profile devices to be monitored
with industry standard network management tools. The “health” and performance of a
time synchronisation system can be monitored in real-time, with alerts raised if there are
any issues or abnormalities.
This profile incorporates performance criteria for transparent clocks that require no more
than 50 ns of error be introduced by each transparent clock. This is to ensure that the 1 µs
performance target is met with 16 Ethernet switches (e.g. a ring network topology), while
allowing for up to 200 ns of GPS clock error. This covers most substation networks that
use a ring (as opposed to star) topology.
The Power Profile requires that “peer to peer” transparent clocks be used for all Ethernet
switching of PTP messages, and that all messages transmitted using multicast “layer 2”
Ethernet frames. “Peer to peer” means that each PTP device exchanges messages with its
neighbour to measure the path delay between them, rather than each slave clock
communicating directly with the active grandmaster clock. The overall network delay is
calculated by adding together the path delays and switch residence times between the
grandmaster and each slave clock. This has two benefits:
• The network traffic seen by the grandmaster clock does not increase as the network gets
larger. The grandmaster only communicates bidirectionally with the Ethernet switch
(transparent clock or boundary clock) that it is connected to.
• The PTP system automatically compensates if a network link fails and an alternative
path is used. Path delays are measured on all network links, even those that are blocked to
normal traffic by spanning tree protocols.
Not all manufacturers of PTP equipment support the C37.238 “Power Profile” however the
“default” peer-to-peer profile specified in Annex J.4 or IEEE Std 1588-2008 can achieve the
required accuracy if configured appropriately. If non Power Profile devices are used there
13. is no guarantee that information useful for substation applications, such as time error and
local time zone offset, will be made available to client devices, or that performance has
been tested and found to meet accuracy specifications (Annex J.4 does not specify
performance).
Boundary clocks can be used to “translate” between PTP profiles. One such application
would be to translate between the ITU-T Rec. G.8265.1 Telecommunications Profile (used
for wide area networks
2.5. Benefits and issues resulting from PTP and the Power Profile
The Power Profile provides a number of significant benefits for substation automation
systems:
• Synchronisation accuracy is not affected by other network traffic, provided PTP
messages are not lost due to overloading. This allows the same network infrastructure to
be used for PTP and for synchrophasors, sampled value process buses, IEC 61850 (GOOSE
and/or MMS), DNP3 and so forth.
• PTP messaging rates have been optimised to meet the 1 µs performance requirement of
power system applications without placing excessive traffic on the shared network, or
requiring overly complex slave clocks.
• Fibre-optic or twisted pair Ethernet can be used, and it is a matter of selecting Ethernet
switches with the appropriate port configuration.
• A single time reference is used, so there are no configuration issues regarding UTC or
local time.
All Power Profile devices use International Atomic Time (TAI), which avoids leap seconds
and daylight saving time issues.
The Power Profile transmits the local time offset, so there is no need to configure the local
time zone on protection relays. In addition, any changes to the dates of operation of
daylight saving time only need to be made to the grandmaster rather than to every
protection relay. The mechanism used is defined in IEEE Std 1588, so is compatible with
devices that may not necessarily support the Power Profile.
14. • Redundant grandmaster clocks can be used, with automatic failover if the active
grandmaster suffers loss of network connectivity or degradation of performance.
• Protocols that enable redundant Ethernet connections, such as Rapid Spanning Tree
Protocol (RSTP), Parallel Redundancy Protocol (PRP) and High-availability Seamless Ring
(HSR), can be used to improve the reliability of network connections between PTP
devices.
• Networks can be expanded without placing undue network load on the grandmaster
clock.
• Propagation delays resulting from long cable runs are automatically compensated for,
avoiding the need to hand-tune merging units and phasor measurement units in the field.
PTP is a moderately complicated protocol and some steps need to be taken to ensure a
time synchronisation system will meet expectations, and some additional risks are
introduced into the substation automation system. Points to note are:
• Ethernet switches used for PTP with the Power System Profile should have specific
Power Profile support if time error reporting is to be meaningful. Not all peer to peer
transparent clocks will meet the requirement to introduce no more than 50 ns of error, or
be able to estimate time inaccuracy.
• There is limited native support for PTP in protection relays, but this is improving. A
number of manufacturers have released protection relays with PTP support since 2013,
but this may be an option that must be specified at the time of order.
• Not all PTP grandmaster clocks or slave clocks (including translators) are designed for
use in high voltage substations, even though they may support the Power Profile.
Substation equipment should be tested for higher levels of electromagnetic compatibility
(EMC) than office or light industrial equipment.
• Time synchronisation is critical to the operation of synchrophasor monitoring and most
sampled value process buses. It is essential that only authorised people have the ability to
change the configuration and operation of PTP clocks, either through dedicated
configuration tools, embedded web servers or via SNMP. If clocks can be configured from
the front panel then this should require the use of a password. Policies and procedures in
place for protection relay configuration management should be adopted for timing
systems (master clocks, transparent clocks and boundary clocks).
15. • There are many PTP profiles, each optimised for certain applications. The needs of
substation automation systems are best met by the Power Profile, but default profiles may
work, but with no certainty that this is the case. Other application specific profiles, such as
the Telecoms Profile or IEEE Std 802.1AS Audio Video Profile, are most likely not going to
work as the application requirements are simply too varied.
How to Apply Time Synchronization in Substation Automation
Time synchronization for a station bus and a process bus has different requirements.
Figure 4 shows one example of how to realize time synchronization with different time
protocols in substation automation. Precise time is provided by a GPS to a time server unit
as a precise time source for communication devices like switches or IEDs. Normally a
redundant time source from another time satellite can be applied to enhance system
reliability. Star topology is very common for time synchronization in a station bus and a
process bus. Normally time synchronizations for IEDs at bay and process level are
implemented separately. However, a common precise time source can be applied.
SNTP is implemented to synchronize the switches and other remote devices, monitoring
PC and control system at station level. According to the accuracy requirement in a
substation, time synchronization with IEEE 1588 PTPv2 TC mode is applied for the IEDs at
bay and process level with IEEE 1588 switches from process level. Because there are no IP
packets in a process bus, transmission protocol IEEE 802.3 is used for PTP messages. IRIG-
B and 1PPS require separate cable and synchronize the IEDs(e.g. IED-1 and IED-5) at bay
and process level. In order to achieve high availability of time synchronization, some
point-to-point communication (e.g. IED-1 to IED-7) between IEDs and MUs can be applied
without any communication switch.
Figure 4: Time synchronization in substation automation