Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
Intelligent Substations
Prepared by:Edward Lu / Business Development Manager
AgendaAgenda
� Overview
� Structure
� Recommended Products
Confidential
OverviewOverview
Confidential
OverviewOverview
Power Utility AutomationPower Utility Automation
Confidential
Power Generation
Power Transmission and Distribution
Power Substation
Power Transmission & DistributionPower Transmission & DistributionGlobal Market Potential• 1.5 to 2 Trillions USD investment in the US on T&D by 2030( EEI, 2008)• Global T&D investments reach 110 Bn USD per year starting 2011(OCED, 2008)
25%
29%
58%
33%Growth 07-12
Confidential
29%133%
50%
33%
Growth 07-12
Areva, 2009
Global T&D Challenges, Trends, and Global T&D Challenges, Trends, and Opportunities Opportunities
Global Market Opportunities• 1.5 ~ 2 trillions USD investment in the US on T&D by 2030• China’s electricity consumption will exceed the US by 2030• China: 58% in T&D Growth from Y2007 to Y2012• US: 33% in T&D Growth from Y2007 to Y2012• EU: 25% in T&D Growth from Y2007 to Y2012• India: 133% in T&D Growth from Y2007 to Y2012
Challenges and Trends• Global T&D Infrastructure are aging (built around World War II) (i.e. Over 75% of US infrastructures are more than 25 years old)
• Traditional T&D system will migrate to meet digitalization tech. (substation automation requirements such as IEC61850)
• India: 133% in T&D Growth from Y2007 to Y2012
New Distributed SystemNew Distributed System
Structure Structure
Confidential
Structure Structure
Substation Utilities StructureSubstation Utilities Structure
Backend
Host
Tele-Control
Computer
Front-end
Communication
Computer
Local Network A
Dispatch A
Dispatch B
3
45
Confidential
Protection
Mgt.
Computer
Protocol
Converter
Local Network B
Local Network A
12
Serial
Devices
Protection IED
1. Protocol Converters1. Protocol Converters
� Requirements• Basic data processing abilities• To be able to connect to a numbers of serial devices• To be able to convert protocols from different
sources
Confidential
Substation Utilities StructureSubstation Utilities Structure
Tele-Control
Computer
Front-end
Communication
Computer
Local Network A
Dispatch A
Dispatch B
3
4
Backend
Host
5
Confidential
Protection
Mgt.
Computer
Local Network B
Local Network A
Serial
Devices
Protection
IED
2
2. Protection and Management of 2. Protection and Management of ComputersComputers
� Requirements:
• Convert protocol from different IEDs
• Management function
• Monitor function (optional)
• Able to connect different IEDs with protocols
Confidential
• Able to connect different IEDs with protocols
• Able to react and deal with emergency instantaneously
Substation Utilities StructureSubstation Utilities Structure
Tele-Control
Computer
Front-end
Communication
Computer
Local Network A
Dispatch A
Dispatch B
3
4
Backend
Host
5
Confidential
Local Network B
Local Network A
Serial
Devices
Protection IED
3. Front3. Front--end Communication end Communication ComputersComputers
� Requirements:
• Collect information from other protocol converting computers and delivery them to control center
• Powerful processing compared to normal protocol converters
• HMI support (optional)
Confidential
• HMI support (optional)
Substation Utilities StructureSubstation Utilities Structure
Tele-Control
Computer
Dispatch A
Dispatch B
4
DA-682/683
Backend
Host
5
Confidential
Local Network B
Serial
Devices
Protection IED
4. Tele4. Tele--control Communication control Communication ComputersComputers
� Requirements:
• Support a minimum of 4 to 6 LANs
• A high performance processor.
• Requires a high level of system reliability and a fanless design.
Confidential
Substation Utilities StructureSubstation Utilities Structure
Traditional Intelligent Substation
Tele-control Center
Tele-control Center
Modem: PSTN LAN or Fiber
Confidential
Tele-Control
Computer
Local Network B
Local Network A
Tele-Control
Computer
DA-681/683
Substation Utilities StructureSubstation Utilities Structure
DA-682/683
Dispatch A
Dispatch B
Backend
Host
5
Confidential
Local Network B
Serial
Devices
Protection IED
5. Backend Hosts5. Backend Hosts
� Requirements:
• HMI interface – display function
• Control function
• SCADA software support
• Powerful processing abilities
Confidential
Substation Utilities StructureSubstation Utilities Structure
DA-682/683
Dispatch A
Dispatch B
DA-681/683DA-710
Confidential
Local Network B
Serial
Devices
Protection IED
Recommended ProductsRecommended Products
Confidential
Performance
IEC61850IEC61850--33
IEEE1588IEEE1588
DA Series Product MatrixDA Series Product MatrixHigh
DA-6831.66GHz
DA-7102.0GHz
IEC61850IEC61850--33
Coming soon!
Confidential
Performance
Low High
DA-66x533MHz
Low
DA-6811GHz
DA-6821GHz
Pricing
Substation Utilities StructureSubstation Utilities Structure
Local Network A
Dispatch A
Dispatch B
Front-end
Communication
Computer
3
Tele-Control
Computer
4
Backend
Host
5
DA-682/683DA-681/683DA-710
Confidential
Local Network B
Local Network A
Protocol
Converter
1Protection
Mgt.
Computer
2
Serial
Devices
Protection IED
Target Segment Target Segment D
em
an
d
•Control & Monitor
•X86 computing
•Different interfaces
CAN / serial /LAN..
Backend HostBackend Host
•6 LANs for
redundancy
•Protocol conversion (IEC61850����IEC61970)
TeleTele--Control Control
ComputerComputer
•Protocol conversions
•Control & Monitor
•X86 computing
•Different interfaces
CAN / serial /LAN..
FrontFront--endend
Communication Communication
ComputerComputer
•Protocol conversion
•Control or Monitor
•X86 computing
•Different interfaces
CAN / serial /LAN..
Protection Protection
Mgt.Mgt.
ComputerComputer
•Protocol conversion
•Low speed IED
connections
Protocol Protocol
ConverterConverter
Confidential
De
ma
nd
MO
XA
So
lutio
n
DA-710 DA-681
DA-682
DA-681
CAN / serial /LAN..CAN / serial /LAN..
DA-682
DA-681
DA-660
Thanks Thanks