Draw the logical connections between logical nodes

Assignment Help Other Engineering
Reference no: EM133558735

Substation Designs & Automation

Developing Substation Automation System (SAS) Utilizing IEC61850 Standard

In this task, you will have to develop a Protection Scheme for a typical substation system utilizing the IEC61850 standard. The instructions below (there are two procedures developing substation layout and GOOSE messaging engineering) provide steps for configuring a substation layout and GOOSE messaging using PCM600.

After reviewing the procedures, you are to develop and design the SAS for the illustrated single-line diagram (SLD) shown at the end of the instructions.

Task: Complete basic steps of starting a new project. Step 1. Create a new project structure.
Start PCM600. Select File - New Project. Fill in the project name and description to dialog window. Click Create.
If you want to rename a project later use File - Open/Manage project dialog. Project must be closed while renaming.
Construct the plant structure by adding Substation, Voltage level and Bay objects into the project container. Objects can be added from Object Types side menu or right clicking plant structure objects and selecting New -General.
Step 2. Add and configure a protection relay.

Task: Configure GOOSE communication to exchange blocking and interlocking information between two relays.
Task background and detail explanation: In this exercise the GOOSE message is used for blocking based busbar protection. The feeder relay is sending GOOSE message which includes start signal of PHIPTOC stage. The incomer relay receives the GOOSE message and blocks its own PHIPTOC stage. Earth-switch position is also sent and it is used in the interlocking scheme of the circuit breaker in incomer IED.
General GOOSE configuration can be broken into following steps:
1. Create a new project in PCM600, add needed relays
2. Open IEC 61850 Configuration tool
3. Do the GOOSE engineering Create data set
a. Add data to data set
b. Create GOOSE control block and assign data set to it
c. Select recipient (client configuration)
d. Test inputs in receiving IED
4. Use Application Configuration tool to connect signals in receiving IED
5. Connect GOOSE signals in Signal Matrix Tool in receiving IED

Questions:
1. How many IEDs have been used to implement the protection and control for SAS? What are the functionalities for each IED?

2. Based on existing primary equipment and required functionality, represent each IED through Logical Nodes (LNs) according to IEC61850 standard.

3. Draw the logical connections (links) between logical nodes, and include LNs from the process level and the station/control centre level.

4. Illustrate the GOOSE message configurations for each of the Protection and Control IEDs.

5. Illustrate the overall hierarchy of the SAS constituting communication network including Ethernet switches, communication links between IEDs (including LNs) in process levels with station computers and Network Control Centre (NCC).

6. Review Question 5 to illustrate a redundant protection scheme (only for protection scheme).

Attachment:- Substation Designs & Automation.rar

Reference no: EM133558735

Questions Cloud

Discuss what police services the city needs from department : Discuss what police services the city needs from the department. Describe your rationale for what the focus of the police department should be.
Introducing the new project to senior management : What will be the revenue gain? Speculate on an ROI that justifies the project for investors and/or senior management.
Criminal justice system : Select a legal issue relevant to individuals involved with the Criminal Justice System
Cnns jean cezares interviews samuel hamilton : CNN's Jean Cezares interviews Samuel Hamilton, a former inmate, and Stanley Richards, senior vice president of the Fortune Society.
Draw the logical connections between logical nodes : MEE606 Substation Designs & Automation, Engineering Institute of Technology - Draw the logical connections (links) between logical nodes, and include LNs from
What is the final expected outcome of the value chain : What is the final expected outcome of the value chain, customer satisfaction, market share, employee productivity, profit margin?
Are those errors human based errors such as input errors : How do you want it to reduce billing errors? Are those errors human based errors such as input errors? What do they mean by easy to use?
Increased flexibility and awareness of many possibilities : Has this led to increased flexibility and awareness of the many possibilities that are yours?
Define lone wolf terrorism : Define lone wolf terrorism and provide three examples of individuals who fit this mold.

Reviews

Write a Review

Other Engineering Questions & Answers

  Describe roles of engineering design in the manufacturing

Write an essay to describe the roles of engineering design in the manufacturing industry with consideration of one or more of the following factors

  What are the key components of a successful e-commerce

What are the key components of a successful e-commerce and m-commerce strategy? What are key components of technology infrastructure

  Identify and evaluate emergent technologies

Identify and evaluate emergent technologies and technology gaps and propose potential solutions - Analyse Commonly used technologies and critique the benefits

  Discuss business strategy to drive organizational strategy

Research on why is it important for business strategy to drive organizational strategy and IS strategy?What might happen if the business strategy wasnt driver

  What makes them potentially dangerous

A kind of genetic engineering happens in nature, with naturally occurring mutations and the dominance of certain strains. What is different about today's processes? What makes them potentially dangerous? What should we consider natural and what is..

  What is the binary equivalent

A NOR gate is called a universal gate element because-Digital computers are more widely used as compared to analog computers, because they are?

  Applications of artificial intelligence in cyber security

Analyse the trends of applications of Artificial Intelligence in cyber security and Identify the exact date and time. What approach did the attackers use?

  Dc analysis of transistor and dc load line

For the common emitter circuit shown below (see figure 1) the parameters are: VBB = 4 V, RB = 220 kΩ, RC = 2 kΩ, VCC = 10 V, VBE(on) = 0.7 V, and β = 200. Calculate the base current (IB), collector current (IC), emitter currents (IE), the VCEvoltage ..

  Develop a strategy for communication between stakeholders

One of the key aspects of developing a strategy for the human elements in information technology (IT) project is to identify the roles and responsibilities.

  Absolute and gauge pressures

A 975-kg car has its tires each inflated to "32.0 pounds (a) What are the absolute and gauge pressures in these tires in lb/in.', Pa, and atm?

  Write a subroutine that will divide a unsigned number

Write a subroutine that will divide a 32-bit unsigned number into another 32-bit unsigned number. Pass the divisor and Dividend in the stack.

  Schematic design of a multi storey building

Reflective lecture journal to be included with the final portfolio submission - schematic design of a multi storey building incorporating retail, office and car parking facilities.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd