PSOC Unit 5 PDF
PSOC Unit 5 PDF
PSOC Unit 5 PDF
com
UNIT – V
COMPUTER CONTROL OF
POWER SYSTEMS
www.Vidyarthiplus.com
www.Vidyarthiplus.com
PART-A
PART-B
1. Briefly discuss the various functions of energy control centre
2. Explain the different operating states of power system with state transition diagram.
3. Explain the hardware components of SCADA with neat diagram and also mention the
functions of it.
4. Explain about power system security
5. What is EMS? What are its major functions in power system operation and control?
www.Vidyarthiplus.com
www.Vidyarthiplus.com
UNIT – V
1.Define state estimation.
State estimation is the process of assigning a value to an unknown system state variable based on
measurements from that system according to some criteria.
Security depends upon the reserve capacity available in a given situation and the
probability of disturbances.
Alert state
Emergency state
Extremis state
Restorative state.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Most areas today have a two-level hierarchy of ECCs with the Independent System
Operator (ISO) performing the high-level decision-making and the transmission owner ECC
performing the lower-level decision-making.
A high-level view of the ECC is illustrated.Where we can identify the substation, the
remote terminal unit (RTU), a communication link, and the ECC which contains the energy
management system (EMS). The EMS provides the capability of converting the data received
from the substations to the types of screens observed.
In these notes we will introduce the basic components and functionalities of the ECC. Note that
there is no chapter in your text which provides this information.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
ECC Components
The system control function traditionally used in electric utility operation consists of three main
integrated subsystems: the energy management system (EMS), the supervisory control and data
acquisition (SCADA), and the communications interconnecting the EMS and the SCADA
(which is often thought of as part of the SCADA itself). Figure 3 provides a block diagram
illustration of these three integrated subsystems. The SCADA and communications subsystems
are indicated in the dotted ovals at the top left hand corner of the figure. The rest of the figure
indicates the EMS. We will describe each one in the following subsections.
OPF
Display Alarms
www.Vidyarthiplus.com
www.Vidyarthiplus.com
We distinguish EMS from distribution management systems (DMS). Both utilize their own
SCADA, but for different functions. Whereas EMS/SCADA serves the high voltage bulk
transmission system from the ECC, the DMS/SCADA serves the low voltage, distribution
system from a distribution dispatch center. We are addressing in these notes the
EMS/SCADA.
A. 3 level control
1. Turbine –governor to adjust generation to balance changing load-instantaneous
control.
2. AGC (called load frequency control (LFC)) maintains frequency and net power
interchange.
3. Economic Dispatch Control (EDC) distributes the load among the units such that fuel
cost is minimum.
B. Primary Voltage control
1. Excitation control
2. Transmission voltage control, SVC, Shunt capacitors, transformer taps…
------------------------------------------------------------
Relays located within the RTU, on command from the ECC, open or close selected
control circuits to perform a supervisory action. Such actions may include, for example,
opening or closing of a circuit breaker or switch, modifying a transformer tap setting, raising
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Information gathered by the RTU and communicated to the ECC includes both analog
information and status indicators. Analog information includes, for example, frequency,
voltages, currents, and real and reactive power flows. Status indicators include alarm signals
(over-temperature, low relay battery voltage, illegal entry) and whether switches and circuit
breakers are open or closed. Such information is provided to the ECC through a periodic scan
of all RTUs. A 2 second scan cycle is typical.
Automaticfunctions such as load shedding, power restoration, and high speed bus bar
transfer
Time synchronization by radio and satellite clock signal
Monitoring functions:
Measurement and displaying ofcurrent, voltage, frequency, active and reactive
power, energy, temperature, etc.
Alarm functions. Storage and evaluation of time stamped events.
Trends and archiving of measurements
Collection and evaluation of maintenance data
Disturbance recording and evaluation.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Protection functions:
Substation protection functions includes the monitoring of events like start, trip
indication and relay operating time and setting and reading of relay parameters.
Protection of bus bars. Line feeders, transformers, generators.
Protection monitoring (status, events, measurements, parameters, recorders)
Adaptive protection by switch-over of the active parameter set.
Communication technologies
The earliest form of signal circuit used for SCADA telemetry consisted of twisted pair
wires; although simple and economic for short distances, it suffers from reliability problems
due to breakage, water ingress, and ground potential risk during faults
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Computer Indicating
Quantity meter
to Transducer A/D Telemeter Telemeter
be converter transmitter receiver
telemetere
d D/A Recording
converter meter
Signal circuit (wire line,
PLC, microwave, etc.)
Improvements over twisted pair wires came in the form of what is now the most
common, traditional type of telemetry mediums based on leased-wire, power-line carrier, or
microwave. These are voice grade forms of telemetry, meaning they represent
communication channels suitable for the transmission of speech, either digital or analog,
generally with a frequency range of about 300 to 3000 Hz.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
A more recent development has concerned the use of fiber optic cable, a technology capable
of extremely fast communication speeds. Although cost was originally prohibitive, it has now
decreased to the point where it is viable. Fiber optics may be either run inside underground
power cables or they may be fastened to overhead transmission line towers just below the
lines. They may also be run within the shield wire suspended above the transmission lines.
One easily sees that communication engineering is very important to power system
control. Students specializing in power and energy systems should strongly consider taking
communications courses to have this background. Students specializing in communication
should consider taking power systems courses as an application area.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
The EMS is a software system. Most utility companies purchase their EMS from one
or more EMS vendors. These EMS vendors are companies specializing in design,
development, installation, and maintenance of EMS within ECCs. There are a number of
EMS vendors in the U.S., and they hire many power system engineers with good software
development capabilities.
During the time period of the 1970s through about 2000, almost all EMS software
applications were developed for installation on the control centers computers. An attractive
alternative today is, however, the application service provider, where the software resides
on the vendor‟s computer and control center personnel access it from the Internet. Benefits
from this arrangement include application flexibility and reliability in the software system
and reduced installation cost.
One can observe from Figure 3 that the EMS consists of 4 major functions: network model
building (including topology processing and state estimation), security assessment,
automatic generation control, and dispatch. These functions are described in more detail in
the following subsections.
side
management, extends remote supervision and control to subtransmission and distribution
circuits, including control of residential, commercial, and industrial loads.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
• Logging: Logs all operator entry, all alarms, and selected information.
• Load shed: Provides both automatic and operator-initiated tripping of load in response to
system emergencies.
• Trending: Plots measurements on selected time scales.
Since the master station is critical to power system operations, its functions are
generally distributed among several computer systems depending on specific design. A dual
computer system configured in primary and standby modes is most common. SCADA
functions are listed below without stating which computer has specific responsibility.
• Manage communication circuit configuration
• Downline load RTU files
• Maintain scan tables and perform polling
• Check and correct message errors
www.Vidyarthiplus.com
www.Vidyarthiplus.com
The first and second objectives are met by monitoring an error signal, called area
control error (ACE), which is a combination of net interchange error and frequency error and
represents the power imbalance between generation and load at any instant. This ACE must
be filtered or smoothed such that excessive and random changes in ACE are not translated
into control action. Since these excessive changes are different for different systems, the filter
parameters have to be tuned specifically for each control area.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
The filtered ACE is then used to obtain the proportional plus integral control signal.
This control signal is modified by limiters, deadbands, and gain constants that are tuned to
the particular system. This control signal is then divided among the generating units under
control by using participation factors to obtain unit control errors (UCE).
These participation factors may be proportional to the inverse of the second derivative
of the cost of unit generation so that the units would be loaded according to their costs, thus
meeting the third objective. However, cost may not be the only consideration because the
different units may have different response rates and it may be necessary to move the faster
generators more to obtain an acceptable response. The UCEs are then sent to the various units
under control and the generating units monitored to see that the corrections take place. This
control action is repeated every 2 to 6 s. In spite of the integral control, errors in frequency
and net interchange do tend to accumulate over time. These time errors and accumulated
interchange errors have to be corrected by adjusting the controller settings according to
procedures agreed upon by the whole interconnection. These accumulated errors as well as
ACE serve as performance measures for LFC.
The main philosophy in the design of LFC is that each system should follow its own
load very closely during normal operation, while during emergencies; each system should
contribute according to its relative size in the interconnection without regard to the locality of
the emergency. Thus, the most important factor in obtaining good control of a system is its
inherent capability of following its own load. This is guaranteed if the system has adequate
regulation margin as well as adequate response capability. Systems that have mainly thermal
generation often have difficulty in keeping up with the load because of the slow response of
the units.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Data acquisition:
1. To process from RTU
2. To check status values against normal value
3. To send alarm conditions to alarm processor
4. To check analog measurements against limits.
Alarm processor:
1. To send alarm messages
2. To transmit messages according to priority
Status processor:
1. To determine status of each substation for proper connection.
Reserve monitor:
1. To check generator MW output on all units against unit limits
State estimator:
1. To determine system state variables
2. To detect the presence of bad measures values.
3. To identify the location of bad measurements
4. To initialize the network model for other programs
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Contingency analysis.
Optimal power flow.
Security enhancement-existing overload using corrective control action.
Preventive action.
Short circuit analysis.
System Security
1. System monitoring.
2. Contingency analysis.
3. Security constrained optimal power flow
Security Assessment
Security assessment determines first, whether the system is currently residing in an
acceptable state and second, whether the system would respond in an acceptable manner and
reach an acceptable state following any one of a pre-defined contingency set. A contingency
is the unexpected failure of a transmission line, transformer, or generator.Usually,
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Of course, with one less component, the overall system is weaker, and undesirable effects
may occur. For example, some remaining circuit may overload, or some bus may experience
an undervoltage condition. These are called static security problems.
Dynamic security problems may also occur, including uncontrollable voltage decline,
generator overspeed (loss of synchronism), or undamped oscillatory behavior.
Security Control
Power systems are designed to survive all probable contingencies. A contingency is defined
as an event that causes one or more important components such as transmission lines,
generators, and transformers to be unexpectedly removed from service. Survival means the
system stabilizes and continues to operate at acceptable voltage and frequency levels without
loss of load. Operations must deal with a vast number of possible conditions experienced by
the system, many of which are not anticipated in planning. Instead of dealing with the
impossible task of analyzing all possible system states, security control starts with a specific
state: the current state if executing the real-time network sequence; a postulated state if
executing a study sequence. Sequence means sequential execution of programs that perform
the following steps:
1. Determine the state of the system based on either current or postulated conditions.
2. Process a list of contingencies to determine the consequences of each contingency on the
system in its specified state.
3. Determine preventive or corrective action for those contingencies which represent
unacceptable risk.
Security control requires topological processing to build network models and uses large-scale
AC network analysis to determine system conditions. The required applications are grouped
as a network subsystem that typically includes the following functions:
• Topology processor: Processes real-time status measurements to determine an electrical
connectivity (bus) model of the power system network.
• State estimator: Uses real-time status and analog measurements to determine the „„best‟‟
estimate of the state of the power system. It uses a redundant set of measurements; calculates
voltages, phase angles, and power flows for all components in the system; and reports
overload conditions.
• Power flow: Determines the steady-state conditions of the power system network for a
specified generation and load pattern. Calculates voltages, phase angles, and flows across the
entire system.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
• Contingency analysis: Assesses the impact of a set of contingencies on the state of the
power system and identifies potentially harmful contingencies that cause operating limit
violations.
Optimal power flow: Recommends controller actions to optimize a specified objective
function (such as system operating cost or losses) subject to a set of power system operating
constraints.
• Security enhancement: Recommends corrective control actions to be taken to alleviate an
existing or potential overload in the system while ensuring minimal operational cost.
• Preventive action: Recommends control actions to be taken in a “preventive” mode before a
contingency occurs to preclude an overload situation if the contingency were to occur.
• Bus load forecasting: Uses real-time measurements to adaptively forecast loads for the
electrical connectivity (bus) model of the power system network
• Transmission loss factors: Determines incremental loss sensitivities for generating units;
calculates the impact on losses if the output of a unit were to be increased by 1 MW.
• Short-circuit analysis: Determines fault currents for single-phase and three-phase faults for
fault locations across the entire power system network.
------------------------------------------------------------------------
www.Vidyarthiplus.com
www.Vidyarthiplus.com
Operating states
1. Normal state
2. Alert state
3. Emergency state
4. Extremis state
5. Restorative state
Normal state:
A system is said to be in normal if both load and operating constraints are satisfied .It is one
in which the total demand on the system is met by satisfying all the operating constraints.
Alert state:
A normal state of the system said to be in alert state if one or more of the postulated
contingency states, consists of the constraint limits violated. When the system security level
falls below a certain level or the probability of disturbance increases, the system may be in
alert state .All equalities and inequalities are satisfied, but on the event of a disturbance, the
system may not have all the inequality constraints satisfied. If severe disturbance occurs, the
system will push into emergency state. To bring back the system to secure state, preventive
control action is carried out.
Emergency state:
The system is said to be in emergency state if one or more operating constraints are violated,
but the load constraint is satisfied .In this state, the equality constraints are unchanged. The
system will return to the normal or alert state by means of corrective actions, disconnection
of faulted section or load sharing.
Extremis state:
When the system is in emergency, if no proper corrective action is taken in time, then it goes
to either emergency state or extremis state. In this regard neither the load or nor the operating
www.Vidyarthiplus.com
www.Vidyarthiplus.com
constraint is satisfied, this result is islanding. Also the generating units are strained beyond
their capacity .So emergency control action is done to bring back the system state either to the
emergency state or normal state.
Restorative state:
From this state, the system may be brought back either to alert state or secure state .The latter
is a slow process. Hence, in certain cases, first the system is brought back to alert state and
then to the secure state .This is done using restorative control action.
www.Vidyarthiplus.com
www.Vidyarthiplus.com
www.Vidyarthiplus.com