BSI PD IEC/TR 61850-90-12:2015
$215.11
Communication networks and systems for power utility automation – Wide area network engineering guidelines
Published By | Publication Date | Number of Pages |
BSI | 2015 | 222 |
This Technical Report is intended for an audience familiar with electrical power automation based on IEC 61850 and particularly for data network engineers and system integrators. It is intended to help them to understand the technologies, configure a wide area network, define requirements, write specifications, select components and conduct tests.
This Technical Report provides definitions, guidelines, and recommendations for the engineering of WANs, in particular for protection, control and monitoring based on IEC 61850 and related standards.
This Technical Report addresses substation-to-substation communication, substation-to-control centre and control centre-to-control centre communication. In particular, this Technical Report addresses the most critical aspects of IEC 61850 such as protection related data transmission via GOOSE and SMVs, and the multicast transfer of large volumes of synchrophasor data.
The Technical Report addresses issues such as topology, redundancy, traffic latency and quality of service, traffic management, clock synchronization, security and maintenance of the network.
This Technical Report contains use cases that show how utilities tackle their WAN engineering.
PDF Catalog
PDF Pages | PDF Title |
---|---|
4 | CONTENTS |
13 | FOREWORD |
15 | INTRODUCTION |
17 | 1 Scope 2 Normative references |
22 | 3 Terms, definitions, abbreviations, acronyms and symbols 3.1 Terms and definitions |
27 | 3.2 Abbreviations and acronyms |
34 | 3.3 Network diagram symbols |
35 | Figures Figure 1 – Symbols |
36 | 4 Wide Area Communication in electrical utilities 4.1 Executive summary |
38 | 4.2 Use Case: ENDESA, Andalusia (Spain) Figure 2 – Substation locations in Andalusia |
39 | Figure 3 – Topology of the Andalusia network |
40 | 4.3 Typical interface between a substation and the WAN Figure 4 – Cabinet of the substation edge node |
41 | 4.4 WAN characteristics and actors Figure 5 – Communication interfaces in a SEN |
42 | 4.5 SGAM Mapping Figure 6 – Communicating entities |
43 | Figure 7 – SGAM communication model |
44 | 4.6 Network elements and voltage level Figure 8 – Principle of grid voltage level and network technology |
45 | 4.7 WAN interfaces in substation automation (IEC 61850-5) Figure 9 – Communication paths and interfaces |
46 | 4.8 Logical interfaces and protocols in the TC57 Architecture IEC TR 62357 Figure 10 – IEC TR 62357 Interfaces, protocols and applications |
47 | 4.9 Network traffic and ownership 5 WAN overall requirements and data transmission metrics 5.1 Traffic types |
48 | 5.2 Quality of Service (QoS) of TDM and PSN 5.3 Latency calculation 5.3.1 Latency components 5.3.2 Propagation delay |
49 | 5.3.3 Residence delay 5.3.4 Latency accumulation 5.3.5 Example: latency of a microwave system 5.3.6 Latency and determinism Figure 11 – Composition of end-to-end latency in a microwave relay |
50 | 5.3.7 Latency classes in IEC 61850-5 Figure 12 – Example of latency in function of traffic |
51 | Tables Table 1 – Latency classes in IEC 61850-5 Table 2 – Latency classes in IEC TR 61850-90-1 |
52 | 5.4 Jitter 5.4.1 Jitter definition Figure 13 – Jitter for two communication delay types. Table 3 – Latency classes for WANs |
53 | 5.4.2 Jitter classes in IEC 61850 5.5 Latency symmetry and path congruency 5.6 Medium asymmetry Table 4 – Jitter classes in IEC TR 61850-90-1 Table 5 – Jitter classes for WAN |
54 | 5.7 Communication speed symmetry 5.8 Recovery delay 5.9 Time accuracy 5.9.1 Time accuracy definition Figure 14 – Precision and accuracy definitions Table 6 – Recovery delay classes for WAN |
55 | 5.9.2 Time accuracy classes Table 7 – IEC TR 61850-90-1 time accuracy classes Table 8 – IEC 61850-5 time accuracy classes for IED synchronization |
56 | 5.10 Tolerance against failures 5.10.1 Failure 5.10.2 Reliability Table 9 – WAN time synchronization classes |
57 | 5.10.3 Redundancy principles 5.10.4 Redundancy and reliability |
58 | 5.10.5 Redundancy checking Figure 15 – Redundancy of redundant systems Figure 16 – Redundancy calculation |
59 | 5.10.6 Redundant layout: single point of failure 5.10.7 Redundant layout: cross-redundancy Figure 17 – Redundancy layout with single point of failure |
60 | 5.10.8 Maintainability 5.10.9 Availability Figure 18 – Redundancy layout with cross-coupling |
61 | Figure 19 – Availability definitions |
62 | 5.10.10 Integrity |
63 | Figure 20 – Residual error rate in function of the BER |
64 | 5.10.11 Dependability 5.10.12 Example: Dependability of GOOSE transmission 6 Applications analysis 6.1 Application kinds |
65 | 6.2 Teleprotection (IF2 & IF11) 6.2.1 Teleprotection schemes |
66 | 6.2.2 Teleprotection data kinds 6.2.3 Teleprotection requirements for latency 6.2.4 Teleprotection requirements for latency asymmetry 6.2.5 Teleprotection requirements for integrity Table 10 – Latency for line protection |
67 | 6.2.6 Teleprotection summary 6.3 Telecontrol (IF1, IF6) Table 11 – Summary of operational requirements of line protection Table 12 – Summary of communication requirements for teleprotection |
68 | 6.4 Substation to control centre (IF10) Table 13 – Communication requirements for CC to SS/PS Table 14 – Latency and timing requirements from IEC TR 61850-90-2 |
69 | 6.5 CMD (IF7) 6.5.1 CMD overview 6.5.2 CMD communication requirements 6.6 Control Centre to Control Centre (IF12) Table 15 – Communication requirements for CMD |
70 | 6.7 Wide Area Monitoring System (IF13) 6.7.1 WAMS overview 6.7.2 WAMS topology Table 16 – Communication requirements for inter-control centre communications |
71 | Figure 21 – Principle of synchrophasor transmission |
72 | 6.7.3 WAMS communication requirements Table 17 – Summary of synchrophasor requirements |
73 | 6.8 Wide area monitoring, protection and control (WAMPAC) IF13 6.8.1 WAMPAC overview 6.8.2 WAMPAC communication requirements Figure 22 – Target phenomena for WAMPAC Table 18 – Summary of communication requirements for wide area monitoring |
74 | Figure 23 – Example of main function and general information flow |
75 | 6.8.3 Use case WAMPAC Figure 24 – PMUs and data flow between TSO and regional data hubs Table 19 – Typical communication requirements for WAMPAC |
76 | 6.9 Wind turbines and wind virtual power plants 6.10 Distributed Energy and Renewables (DER) 6.11 Summary of communication requirements for WAN Table 20 – Classification of communication requirements Table 21 – Communication requirements of wide-area applications |
77 | 7 Wide-area and real-time network technologies 7.1 Introduction 7.2 Topology |
78 | 7.3 Overview Figure 25 – Network topology (Carrier Ethernet) |
79 | Table 22 – Communication technologies |
80 | 7.4 Layer 1 (physical) transmission media 7.4.1 Summary 7.4.2 Installation guidelines Table 23 – Physical communication media |
81 | 7.4.3 Metallic lines Table 24 – DSL communication over twisted pairs |
82 | 7.4.4 Power line carrier (PLC) Figure 26 – Phase-to-ground coupling for PLC Table 25 – Trade-offs in copper cable communication |
83 | Figure 27 – HV PLC coupling with suspended line traps Figure 28 – Phase to phase signal coupling for PLC |
84 | Figure 29 – Phase-to-phase signal coupling |
85 | Figure 30 – Power line carrier, line traps Table 26 – PLC communication technologies |
86 | 7.4.5 Radio transmission Table 27 – PLC communication advantages and disadvantages |
87 | Figure 31 – Terrestrial microwave link |
88 | Table 28 – Microwave link performance Table 29 – Terrestrial microwave advantages and disadvantages |
89 | Table 30 – Public mobile radio technologies Table 31 – Terrestrial radio advantages and disadvantages Table 32 – Satellite radio advantages and disadvantages |
90 | Figure 32 – Layer 2 transport on radio systems |
91 | 7.4.6 Fiber optics Figure 33 – Radio network in feeder automation |
92 | Figure 34 – ADSS fiber cable |
93 | Figure 35 – ADSS installation with splicing box Figure 36 – OPGW in ground cable |
94 | Figure 37 – OPGW with two “C”-tubes with each 32 fibers |
95 | Figure 38 – OPGW fibers |
96 | Figure 39 – Splicing box |
97 | Figure 40 – WDM over one fiber Figure 41 – OCh optical components |
98 | 7.4.7 Layer 1 redundancy Table 33 – Optical fibers: advantages and disadvantages |
99 | 7.4.8 Use case: Diverse redundancy against extreme contingencies (Hydro-Quebec) Figure 42 – Optical link with microwave back-up |
100 | 7.4.9 Layer 1 security 7.5 Layer 1,5 (physical) multiplexing Figure 43 – Picture of partially destroyed 735 kV line |
101 | 7.6 Layer 2 (link) technologies 7.6.1 Telephony technologies |
102 | Figure 44 – E1 and E2 channel Figure 45 – Digital Transmission Hierarchy (T – Standards) |
103 | 7.6.2 SDH/SONET Figure 46 – Digital Transmission Hierarchy (E-standard) |
104 | Figure 47 – Example of an SDH network for utilities |
105 | Figure 48 – SONET multiplexing hierarchy Figure 49 – SDH multiplexing hierarchy |
106 | Table 34 – SONET and SDH hierarchies |
107 | Figure 50 – SDH/SONET with point-to-point topology Figure 51 – SDH/SONET with linear topology |
109 | Figure 52 – BLSR/BSHR topology in normal conditions (from A to D) Figure 53 – BLSR/BSHR topology in failure conditions |
110 | Figure 54 – UPSR/USHR topology in normal conditions |
111 | Figure 55 – UPSR/USHR topology in failure conditions |
113 | 7.6.3 Optical Transport Network Table 35 – Summary of SDH/SONET |
114 | 7.6.4 Ethernet Figure 56 – Example of information flow relationship in OTN |
115 | Figure 57 – IEEE 802.3 (Ethernet) frame format Table 36 – Ethernet physical layers |
116 | Figure 58 – IEEE 802.3 (Ethernet) topology with RSTP switches (IEC TR 61850-90-4) |
117 | Figure 59 – IEEE 802.1Q-tagged Ethernet frame format |
118 | Figure 60 – Direct Ethernet with VLAN in substation-to-substation transmission |
119 | Figure 61 – Substation-to-substation Layer 2 transmission tunneled over IP |
120 | Figure 62 – PRP structure (within and outside a substation) Figure 63 – HSR ring connecting substations and control centre |
122 | Figure 64 – MACsec frame format |
123 | Figure 65 – IEEE 802.1X principle |
124 | 7.6.5 Ethernet over TDM Figure 66 – Ethernet for substation-to-substation communication |
125 | 7.6.6 Carrier Ethernet Figure 67 – Packets over TDM Table 37 – Payload mapping using SDH/SONET and Next Generation SDH/SONET |
127 | 7.6.7 Audio-Video Bridging 7.6.8 Provider Backbone Bridge (PBB) Table 38 – Carrier Ethernet summary |
128 | Figure 68 – IEEE 802.1Q/ad/ah network configuration |
129 | 7.6.9 Multiprotocol Label Switching (MPLS) Figure 69 – Case of IEEE 802.1Q/ad network for utility |
130 | Figure 70 – Basic MPLS architecture |
131 | Figure 71 – Example of MPLS frame format with IPv4 payload |
132 | Figure 72 – MPLS building blocks |
133 | Figure 73 – MPLS network architecture for utilities |
134 | Figure 74 – IP/MPLS and MPLS-TP features |
135 | Table 39 – IP/MPLS characteristics |
136 | Figure 75 – MPLS-TP redundant routing Table 40 – MPLS-TP characteristics |
137 | 7.7 Layer 3 (network) technologies 7.7.1 Internet Protocol (IP) Table 41 – MPLS summary |
138 | Figure 76 – Ethernet frame with IP network header |
139 | Figure 77 – Mapping of IPv4 to Ethernet frames |
142 | Figure 78 – Mapping of IPv6 to Ethernet frames |
143 | Figure 79 – IPv6 unicast address structure |
144 | Figure 80 – IPv6 ULA address structure Figure 81 – IPv6 link local address structure |
145 | Table 42 – Differences between IPv4 and IPv6 |
146 | Table 43 – IPv6 versus IPv4 addresses [RFC 4291] |
147 | Figure 82 – Mapping of IPv4 to IPv6 addresses |
149 | Figure 83 – IPv6 evolution |
150 | 7.7.2 IP QoS Figure 84 – IEC 61850 stack with IPv4 and IPv6 |
152 | Figure 85 – DiffServ codepoint field Table 44 – List of DiffServ codepoint field values |
153 | 7.7.3 IP multicast Figure 86 – Unidirectional protocol independent multicast |
154 | 7.7.4 IP redundancy 7.7.5 IP security Figure 87 – Bidirectional protocol independent multicast |
155 | Figure 88 – Frame format for IPsec (authenticated) Figure 89 – Frame format for IPsec (encrypted) |
156 | 7.7.6 IP communication for utilities Figure 90 – Layer 3 direct connection within same address space |
157 | Figure 91 – Connecting substations to SCADA by a NAT |
158 | 7.7.7 IP summary Figure 92 – Substation to SCADA connection over ALG Table 45 – IP Summary |
159 | 7.8 Layer 4 (transport) protocols 7.8.1 Transport layer encapsulation 7.8.2 UDP Figure 93 – Ethernet frame with UDP transport layer |
160 | 7.8.3 TCP Figure 94 – UDP header Figure 95 – TCP header |
161 | 7.8.4 Layer 4 redundancy 7.8.5 Layer 4 security 7.9 Layer 5 (session) and higher 7.9.1 Session layer |
162 | 7.9.2 Routable GOOSE and SMV 7.9.3 Example: C37.118 transmission Figure 96 – Session and presentation layers for MMS Figure 97 – Session and presentation layers for R-GOOSE |
163 | 7.9.4 Session protocol for voice and video transmission 7.9.5 Application interface redundancy Figure 98 – IEEE C37.118 frame over UDP Figure 99 – Redundant network transmission handled by the application layer |
164 | 7.9.6 Application device redundancy 7.10 Protocol overlay – tunneling 7.10.1 Definitions |
165 | 7.10.2 Tunneling principle 7.10.3 Tunneling Layer 2 over Layer 3 Figure 100 – Tunneling in IEC TR 61850-90-1 |
166 | 7.10.4 Use Case: Tunneling GOOSE and SMV in IEC 61850 Figure 101 – L2TP transporting Layer 2 frames over IP |
167 | 7.10.5 Circuit emulation service (CES) Figure 102 – Tunneling GOOSE over IP in IEC TR 61850-90-5 |
168 | Figure 103 – Pseudo-wire principle |
169 | Figure 104 – Non-IP voice communication over PSN |
170 | Figure 105 – Circuit emulation over PSN |
171 | 7.11 Virtual Private Networks (VPNs) 7.11.1 VPN principles 7.11.2 L2VPNs Table 46 – Pseudowire protocols |
172 | Figure 106 – L2VPNs VPWS and VPLS |
173 | 7.11.3 L2VPN multicast on MPLS 7.11.4 L3VPN Figure 107 – L3VPN |
174 | Figure 108 – Emulation of L3VPN by L2VPN and global router |
175 | 7.11.5 VPN mapping to application |
176 | Figure 109 – Tele-protection over VPWS, Table 47 – VPN services |
177 | Figure 110 – WAMS over VPLS |
178 | 7.12 Cyber Security 7.12.1 Security circles Figure 111 – VPN for IP-based SCADA/EMS traffic |
179 | 7.12.2 Network security |
181 | Figure 112 – VPN deployment options |
182 | 7.12.3 Access Control 7.12.4 Threat detection and mitigation |
183 | Figure 113 – IP network separator |
186 | 7.12.5 Security architecture |
187 | 7.12.6 Application (end-to-end) communication security Figure 114 – Security architecture (using segmentation and perimeter security) |
188 | 7.12.7 Security for synchrophasor (PMU) networks (IEC TR 61850-90-5) Table 48 – IEC 62351 series |
189 | 7.12.8 Additional recommendations 7.13 QoS and application-specific engineering 7.13.1 General 7.13.2 SDH/SONET QoS and SLA 7.13.3 PSN QoS and SLA |
190 | 7.13.4 Application and priority 7.13.5 QoS chain between networks Table 49 – Example of simple application priority assignment |
191 | 7.13.6 QoS mapping between networks Figure 115 – QoS chain |
192 | 7.13.7 QoS engineering |
193 | 7.13.8 Customer restrictions 7.13.9 Clock services 7.14 Configuration and OAM 7.14.1 Network configuration 7.14.2 OAM |
195 | 7.15 Time synchronization 7.15.1 Oscillator stability 7.15.2 Mutual synchronization Table 50 – Typical oscillator stability |
196 | 7.15.3 Direct synchronization 7.15.4 Radio synchronization Figure 116 – Timing pulse transmission methods of legacy teleprotection devices |
197 | 7.15.5 GNSS synchronization 7.15.6 Frequency distribution Figure 117 – SyncE application |
198 | 7.15.7 Time distribution Figure 118 – Synchronous Ethernet Architecture |
199 | Figure 119 – SNTP clock synchronization and network delay measurement |
202 | Figure 120 – Model of GMC, two BCs in series and SC over Layer 3 Figure 121 – Timing diagram of PTP (end-to-end, 2-step, BCs) |
203 | Figure 122 – Timing diagram of PTP (peer-to-peer, 2-step TCs) |
204 | Table 51 – IEC 61588 option comparison |
205 | 7.15.8 PTP telecommunication profiles 7.15.9 PTP over MPLS 7.15.10 Comparison of time distribution profiles based on IEC 61588 |
206 | Table 52 – Precision time distribution protocols based on IEC 61588 |
207 | 7.15.11 Use Case: Synchrophasor time synchronization 7.15.12 Use case: Atomic Clock Hierarchy Figure 123 – Substations synchronization over WAN |
208 | 8 Use cases 8.1 Use case: Current differential teleprotection system (Japan) Figure 124 – Example of synchronization network |
209 | Figure 125 – Current differential 1:1 configuration Figure 126 – Network configuration for centralized multi-terminal line protection |
210 | Figure 127 – Network configuration for distributed multi-terminal line protection Figure 128 – Current differential teleprotection for HV multi-terminal transmission line using Layer 2 network |
212 | 8.2 Use case: SDH / MPLS network (Japan) Figure 129 – Configuration of wide area current differential primary and backup teleprotection system employing Carrier Ethernet and IEC 61588 time synchronization |
213 | 8.3 Use Case: Wide area stabilizing control system (Japan) Figure 130 – Achieving protection for teleprotection services Table 53 – Requirements for the YONDEN IP network Table 54 – Technologies for the YONDEN IP network |
214 | Figure 131 – System configuration for wide area stabilizing control system |
215 | 8.4 Use Case: experimental PMU-based WAMPAC system Figure 132 – Appearance of typical CCE cabinet Table 55 – Main system specifications for wide area stabilizing control system |
216 | Figure 133 – Configuration for PMU-based WAMPAC system |
217 | Table 56 – Specifications for PMU-based WAMPAC system |
218 | Bibliography |