Shopping Cart

No products in the cart.

BSI PD IEC/TR 61850-90-12:2015

$215.11

Communication networks and systems for power utility automation – Wide area network engineering guidelines

Published By Publication Date Number of Pages
BSI 2015 222
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This Technical Report is intended for an audience familiar with electrical power automation based on IEC 61850 and particularly for data network engineers and system integrators. It is intended to help them to understand the technologies, configure a wide area network, define requirements, write specifications, select components and conduct tests.

This Technical Report provides definitions, guidelines, and recommendations for the engineering of WANs, in particular for protection, control and monitoring based on IEC 61850 and related standards.

This Technical Report addresses substation-to-substation communication, substation-to-control centre and control centre-to-control centre communication. In particular, this Technical Report addresses the most critical aspects of IEC 61850 such as protection related data transmission via GOOSE and SMVs, and the multicast transfer of large volumes of synchrophasor data.

The Technical Report addresses issues such as topology, redundancy, traffic latency and quality of service, traffic management, clock synchronization, security and maintenance of the network.

This Technical Report contains use cases that show how utilities tackle their WAN engineering.

PDF Catalog

PDF Pages PDF Title
4 CONTENTS
13 FOREWORD
15 INTRODUCTION
17 1 Scope
2 Normative references
22 3 Terms, definitions, abbreviations, acronyms and symbols
3.1 Terms and definitions
27 3.2 Abbreviations and acronyms
34 3.3 Network diagram symbols
35 Figures
Figure 1 – Symbols
36 4 Wide Area Communication in electrical utilities
4.1 Executive summary
38 4.2 Use Case: ENDESA, Andalusia (Spain)
Figure 2 – Substation locations in Andalusia
39 Figure 3 – Topology of the Andalusia network
40 4.3 Typical interface between a substation and the WAN
Figure 4 – Cabinet of the substation edge node
41 4.4 WAN characteristics and actors
Figure 5 – Communication interfaces in a SEN
42 4.5 SGAM Mapping
Figure 6 – Communicating entities
43 Figure 7 – SGAM communication model
44 4.6 Network elements and voltage level
Figure 8 – Principle of grid voltage level and network technology
45 4.7 WAN interfaces in substation automation (IEC 61850-5)
Figure 9 – Communication paths and interfaces
46 4.8 Logical interfaces and protocols in the TC57 Architecture IEC TR 62357
Figure 10 – IEC TR 62357 Interfaces, protocols and applications
47 4.9 Network traffic and ownership
5 WAN overall requirements and data transmission metrics
5.1 Traffic types
48 5.2 Quality of Service (QoS) of TDM and PSN
5.3 Latency calculation
5.3.1 Latency components
5.3.2 Propagation delay
49 5.3.3 Residence delay
5.3.4 Latency accumulation
5.3.5 Example: latency of a microwave system
5.3.6 Latency and determinism
Figure 11 – Composition of end-to-end latency in a microwave relay
50 5.3.7 Latency classes in IEC 61850-5
Figure 12 – Example of latency in function of traffic
51 Tables
Table 1 – Latency classes in IEC 61850-5
Table 2 – Latency classes in IEC TR 61850-90-1
52 5.4 Jitter
5.4.1 Jitter definition
Figure 13 – Jitter for two communication delay types.
Table 3 – Latency classes for WANs
53 5.4.2 Jitter classes in IEC 61850
5.5 Latency symmetry and path congruency
5.6 Medium asymmetry
Table 4 – Jitter classes in IEC TR 61850-90-1
Table 5 – Jitter classes for WAN
54 5.7 Communication speed symmetry
5.8 Recovery delay
5.9 Time accuracy
5.9.1 Time accuracy definition
Figure 14 – Precision and accuracy definitions
Table 6 – Recovery delay classes for WAN
55 5.9.2 Time accuracy classes
Table 7 – IEC TR 61850-90-1 time accuracy classes
Table 8 – IEC 61850-5 time accuracy classes for IED synchronization
56 5.10 Tolerance against failures
5.10.1 Failure
5.10.2 Reliability
Table 9 – WAN time synchronization classes
57 5.10.3 Redundancy principles
5.10.4 Redundancy and reliability
58 5.10.5 Redundancy checking
Figure 15 – Redundancy of redundant systems
Figure 16 – Redundancy calculation
59 5.10.6 Redundant layout: single point of failure
5.10.7 Redundant layout: cross-redundancy
Figure 17 – Redundancy layout with single point of failure
60 5.10.8 Maintainability
5.10.9 Availability
Figure 18 – Redundancy layout with cross-coupling
61 Figure 19 – Availability definitions
62 5.10.10 Integrity
63 Figure 20 – Residual error rate in function of the BER
64 5.10.11 Dependability
5.10.12 Example: Dependability of GOOSE transmission
6 Applications analysis
6.1 Application kinds
65 6.2 Teleprotection (IF2 & IF11)
6.2.1 Teleprotection schemes
66 6.2.2 Teleprotection data kinds
6.2.3 Teleprotection requirements for latency
6.2.4 Teleprotection requirements for latency asymmetry
6.2.5 Teleprotection requirements for integrity
Table 10 – Latency for line protection
67 6.2.6 Teleprotection summary
6.3 Telecontrol (IF1, IF6)
Table 11 – Summary of operational requirements of line protection
Table 12 – Summary of communication requirements for teleprotection
68 6.4 Substation to control centre (IF10)
Table 13 – Communication requirements for CC to SS/PS
Table 14 – Latency and timing requirements from IEC TR 61850-90-2
69 6.5 CMD (IF7)
6.5.1 CMD overview
6.5.2 CMD communication requirements
6.6 Control Centre to Control Centre (IF12)
Table 15 – Communication requirements for CMD
70 6.7 Wide Area Monitoring System (IF13)
6.7.1 WAMS overview
6.7.2 WAMS topology
Table 16 – Communication requirements for inter-control centre communications
71 Figure 21 – Principle of synchrophasor transmission
72 6.7.3 WAMS communication requirements
Table 17 – Summary of synchrophasor requirements
73 6.8 Wide area monitoring, protection and control (WAMPAC) IF13
6.8.1 WAMPAC overview
6.8.2 WAMPAC communication requirements
Figure 22 – Target phenomena for WAMPAC
Table 18 – Summary of communication requirements for wide area monitoring
74 Figure 23 – Example of main function and general information flow
75 6.8.3 Use case WAMPAC
Figure 24 – PMUs and data flow between TSO and regional data hubs
Table 19 – Typical communication requirements for WAMPAC
76 6.9 Wind turbines and wind virtual power plants
6.10 Distributed Energy and Renewables (DER)
6.11 Summary of communication requirements for WAN
Table 20 – Classification of communication requirements
Table 21 – Communication requirements of wide-area applications
77 7 Wide-area and real-time network technologies
7.1 Introduction
7.2 Topology
78 7.3 Overview
Figure 25 – Network topology (Carrier Ethernet)
79 Table 22 – Communication technologies
80 7.4 Layer 1 (physical) transmission media
7.4.1 Summary
7.4.2 Installation guidelines
Table 23 – Physical communication media
81 7.4.3 Metallic lines
Table 24 – DSL communication over twisted pairs
82 7.4.4 Power line carrier (PLC)
Figure 26 – Phase-to-ground coupling for PLC
Table 25 – Trade-offs in copper cable communication
83 Figure 27 – HV PLC coupling with suspended line traps
Figure 28 – Phase to phase signal coupling for PLC
84 Figure 29 – Phase-to-phase signal coupling
85 Figure 30 – Power line carrier, line traps
Table 26 – PLC communication technologies
86 7.4.5 Radio transmission
Table 27 – PLC communication advantages and disadvantages
87 Figure 31 – Terrestrial microwave link
88 Table 28 – Microwave link performance
Table 29 – Terrestrial microwave advantages and disadvantages
89 Table 30 – Public mobile radio technologies
Table 31 – Terrestrial radio advantages and disadvantages
Table 32 – Satellite radio advantages and disadvantages
90 Figure 32 – Layer 2 transport on radio systems
91 7.4.6 Fiber optics
Figure 33 – Radio network in feeder automation
92 Figure 34 – ADSS fiber cable
93 Figure 35 – ADSS installation with splicing box
Figure 36 – OPGW in ground cable
94 Figure 37 – OPGW with two “C”-tubes with each 32 fibers
95 Figure 38 – OPGW fibers
96 Figure 39 – Splicing box
97 Figure 40 – WDM over one fiber
Figure 41 – OCh optical components
98 7.4.7 Layer 1 redundancy
Table 33 – Optical fibers: advantages and disadvantages
99 7.4.8 Use case: Diverse redundancy against extreme contingencies (Hydro-Quebec)
Figure 42 – Optical link with microwave back-up
100 7.4.9 Layer 1 security
7.5 Layer 1,5 (physical) multiplexing
Figure 43 – Picture of partially destroyed 735 kV line
101 7.6 Layer 2 (link) technologies
7.6.1 Telephony technologies
102 Figure 44 – E1 and E2 channel
Figure 45 – Digital Transmission Hierarchy (T – Standards)
103 7.6.2 SDH/SONET
Figure 46 – Digital Transmission Hierarchy (E-standard)
104 Figure 47 – Example of an SDH network for utilities
105 Figure 48 – SONET multiplexing hierarchy
Figure 49 – SDH multiplexing hierarchy
106 Table 34 – SONET and SDH hierarchies
107 Figure 50 – SDH/SONET with point-to-point topology
Figure 51 – SDH/SONET with linear topology
109 Figure 52 – BLSR/BSHR topology in normal conditions (from A to D)
Figure 53 – BLSR/BSHR topology in failure conditions
110 Figure 54 – UPSR/USHR topology in normal conditions
111 Figure 55 – UPSR/USHR topology in failure conditions
113 7.6.3 Optical Transport Network
Table 35 – Summary of SDH/SONET
114 7.6.4 Ethernet
Figure 56 – Example of information flow relationship in OTN
115 Figure 57 – IEEE 802.3 (Ethernet) frame format
Table 36 – Ethernet physical layers
116 Figure 58 – IEEE 802.3 (Ethernet) topology with RSTP switches (IEC TR 61850-90-4)
117 Figure 59 – IEEE 802.1Q-tagged Ethernet frame format
118 Figure 60 – Direct Ethernet with VLAN in substation-to-substation transmission
119 Figure 61 – Substation-to-substation Layer 2 transmission tunneled over IP
120 Figure 62 – PRP structure (within and outside a substation)
Figure 63 – HSR ring connecting substations and control centre
122 Figure 64 – MACsec frame format
123 Figure 65 – IEEE 802.1X principle
124 7.6.5 Ethernet over TDM
Figure 66 – Ethernet for substation-to-substation communication
125 7.6.6 Carrier Ethernet
Figure 67 – Packets over TDM
Table 37 – Payload mapping using SDH/SONET and Next Generation SDH/SONET
127 7.6.7 Audio-Video Bridging
7.6.8 Provider Backbone Bridge (PBB)
Table 38 – Carrier Ethernet summary
128 Figure 68 – IEEE 802.1Q/ad/ah network configuration
129 7.6.9 Multiprotocol Label Switching (MPLS)
Figure 69 – Case of IEEE 802.1Q/ad network for utility
130 Figure 70 – Basic MPLS architecture
131 Figure 71 – Example of MPLS frame format with IPv4 payload
132 Figure 72 – MPLS building blocks
133 Figure 73 – MPLS network architecture for utilities
134 Figure 74 – IP/MPLS and MPLS-TP features
135 Table 39 – IP/MPLS characteristics
136 Figure 75 – MPLS-TP redundant routing
Table 40 – MPLS-TP characteristics
137 7.7 Layer 3 (network) technologies
7.7.1 Internet Protocol (IP)
Table 41 – MPLS summary
138 Figure 76 – Ethernet frame with IP network header
139 Figure 77 – Mapping of IPv4 to Ethernet frames
142 Figure 78 – Mapping of IPv6 to Ethernet frames
143 Figure 79 – IPv6 unicast address structure
144 Figure 80 – IPv6 ULA address structure
Figure 81 – IPv6 link local address structure
145 Table 42 – Differences between IPv4 and IPv6
146 Table 43 – IPv6 versus IPv4 addresses [RFC 4291]
147 Figure 82 – Mapping of IPv4 to IPv6 addresses
149 Figure 83 – IPv6 evolution
150 7.7.2 IP QoS
Figure 84 – IEC 61850 stack with IPv4 and IPv6
152 Figure 85 – DiffServ codepoint field
Table 44 – List of DiffServ codepoint field values
153 7.7.3 IP multicast
Figure 86 – Unidirectional protocol independent multicast
154 7.7.4 IP redundancy
7.7.5 IP security
Figure 87 – Bidirectional protocol independent multicast
155 Figure 88 – Frame format for IPsec (authenticated)
Figure 89 – Frame format for IPsec (encrypted)
156 7.7.6 IP communication for utilities
Figure 90 – Layer 3 direct connection within same address space
157 Figure 91 – Connecting substations to SCADA by a NAT
158 7.7.7 IP summary
Figure 92 – Substation to SCADA connection over ALG
Table 45 – IP Summary
159 7.8 Layer 4 (transport) protocols
7.8.1 Transport layer encapsulation
7.8.2 UDP
Figure 93 – Ethernet frame with UDP transport layer
160 7.8.3 TCP
Figure 94 – UDP header
Figure 95 – TCP header
161 7.8.4 Layer 4 redundancy
7.8.5 Layer 4 security
7.9 Layer 5 (session) and higher
7.9.1 Session layer
162 7.9.2 Routable GOOSE and SMV
7.9.3 Example: C37.118 transmission
Figure 96 – Session and presentation layers for MMS
Figure 97 – Session and presentation layers for R-GOOSE
163 7.9.4 Session protocol for voice and video transmission
7.9.5 Application interface redundancy
Figure 98 – IEEE C37.118 frame over UDP
Figure 99 – Redundant network transmission handled by the application layer
164 7.9.6 Application device redundancy
7.10 Protocol overlay – tunneling
7.10.1 Definitions
165 7.10.2 Tunneling principle
7.10.3 Tunneling Layer 2 over Layer 3
Figure 100 – Tunneling in IEC TR 61850-90-1
166 7.10.4 Use Case: Tunneling GOOSE and SMV in IEC 61850
Figure 101 – L2TP transporting Layer 2 frames over IP
167 7.10.5 Circuit emulation service (CES)
Figure 102 – Tunneling GOOSE over IP in IEC TR 61850-90-5
168 Figure 103 – Pseudo-wire principle
169 Figure 104 – Non-IP voice communication over PSN
170 Figure 105 – Circuit emulation over PSN
171 7.11 Virtual Private Networks (VPNs)
7.11.1 VPN principles
7.11.2 L2VPNs
Table 46 – Pseudowire protocols
172 Figure 106 – L2VPNs VPWS and VPLS
173 7.11.3 L2VPN multicast on MPLS
7.11.4 L3VPN
Figure 107 – L3VPN
174 Figure 108 – Emulation of L3VPN by L2VPN and global router
175 7.11.5 VPN mapping to application
176 Figure 109 – Tele-protection over VPWS,
Table 47 – VPN services
177 Figure 110 – WAMS over VPLS
178 7.12 Cyber Security
7.12.1 Security circles
Figure 111 – VPN for IP-based SCADA/EMS traffic
179 7.12.2 Network security
181 Figure 112 – VPN deployment options
182 7.12.3 Access Control
7.12.4 Threat detection and mitigation
183 Figure 113 – IP network separator
186 7.12.5 Security architecture
187 7.12.6 Application (end-to-end) communication security
Figure 114 – Security architecture (using segmentation and perimeter security)
188 7.12.7 Security for synchrophasor (PMU) networks (IEC TR 61850-90-5)
Table 48 – IEC 62351 series
189 7.12.8 Additional recommendations
7.13 QoS and application-specific engineering
7.13.1 General
7.13.2 SDH/SONET QoS and SLA
7.13.3 PSN QoS and SLA
190 7.13.4 Application and priority
7.13.5 QoS chain between networks
Table 49 – Example of simple application priority assignment
191 7.13.6 QoS mapping between networks
Figure 115 – QoS chain
192 7.13.7 QoS engineering
193 7.13.8 Customer restrictions
7.13.9 Clock services
7.14 Configuration and OAM
7.14.1 Network configuration
7.14.2 OAM
195 7.15 Time synchronization
7.15.1 Oscillator stability
7.15.2 Mutual synchronization
Table 50 – Typical oscillator stability
196 7.15.3 Direct synchronization
7.15.4 Radio synchronization
Figure 116 – Timing pulse transmission methods of legacy teleprotection devices
197 7.15.5 GNSS synchronization
7.15.6 Frequency distribution
Figure 117 – SyncE application
198 7.15.7 Time distribution
Figure 118 – Synchronous Ethernet Architecture
199 Figure 119 – SNTP clock synchronization and network delay measurement
202 Figure 120 – Model of GMC, two BCs in series and SC over Layer 3
Figure 121 – Timing diagram of PTP (end-to-end, 2-step, BCs)
203 Figure 122 – Timing diagram of PTP (peer-to-peer, 2-step TCs)
204 Table 51 – IEC 61588 option comparison
205 7.15.8 PTP telecommunication profiles
7.15.9 PTP over MPLS
7.15.10 Comparison of time distribution profiles based on IEC 61588
206 Table 52 – Precision time distribution protocols based on IEC 61588
207 7.15.11 Use Case: Synchrophasor time synchronization
7.15.12 Use case: Atomic Clock Hierarchy
Figure 123 – Substations synchronization over WAN
208 8 Use cases
8.1 Use case: Current differential teleprotection system (Japan)
Figure 124 – Example of synchronization network
209 Figure 125 – Current differential 1:1 configuration
Figure 126 – Network configuration for centralized multi-terminal line protection
210 Figure 127 – Network configuration for distributed multi-terminal line protection
Figure 128 – Current differential teleprotection for HV multi-terminal transmission line using Layer 2 network
212 8.2 Use case: SDH / MPLS network (Japan)
Figure 129 – Configuration of wide area current differential primary and backup teleprotection system employing Carrier Ethernet and IEC 61588 time synchronization
213 8.3 Use Case: Wide area stabilizing control system (Japan)
Figure 130 – Achieving protection for teleprotection services
Table 53 – Requirements for the YONDEN IP network
Table 54 – Technologies for the YONDEN IP network
214 Figure 131 – System configuration for wide area stabilizing control system
215 8.4 Use Case: experimental PMU-based WAMPAC system
Figure 132 – Appearance of typical CCE cabinet
Table 55 – Main system specifications for wide area stabilizing control system
216 Figure 133 – Configuration for PMU-based WAMPAC system
217 Table 56 – Specifications for PMU-based WAMPAC system
218 Bibliography
BSI PD IEC/TR 61850-90-12:2015
$215.11