Final Year Project Book
Final Year Project Book
Final Year Project Book
SESSION 2006-2010
Project Advisor
AUTHORS
(July 2010)
Implementation of SCADA in Power Plant
By
NAUMAN AHMAD 06-EE-61
KHUZAIMA ASLAM KHAN 06-EE-127
HAFIZ MUHAMMAD FAYYAZ 06-EE-133
Supervised by Approved by
Today SCADA is the most important part of industry, water distribution, hydro power
plants, substations, electric distribution and number of other relevant fields all over the world.
SCADA has become the most advanced technology in field of automation and control.
Wherever automation and control is required, SCADA is the first priority.
ABB has commissioned SCADA in AttockGen. For numerical protection ABB has
used IED670. IED670 also provides control and monitoring for busbar, feeder, transformer
etc. IED670 can be configured and monitored with the help of Protective and Control IED
Manager PCM600 toolbox which is also overviewed. PCM600 is also the product of ABB.
From PCM600 IEDs can be easily adapted according to power system requirement. Data
from IEDs travels to the remote terminal unit (RTU). ABB uses RTU560 that is provided
with different telecontrol functions. These telecontrol functions are used when RTU560 is at
remote location. RTU560 system and module concept are also studied. Medias for the
communication of RTU and remote control center are also overviewed.
We dedicate this humble effort, the fruit of our thoughts and study, to our
magnificently precious parents whose hands always raised in prayers for us, who taught us
the lesson of patience, perseverance, self confidence and self reliance.
We also dedicate to our respectable teachers, close friends and family members
whose support led us to success.
The Authors
ACKNOWLEDGEMENTS
______________________________________________________
We would like to express our profound gratitude, most sincere appreciation and
special thanks to our Project Advisor Prof. Dr. AFTAB AHMAD, without whose moral
support, invaluable suggestions and continual enthusiasm, it would have been extremely
difficult to work on this project. We also thank to Mr. Qadir Bakhsh and Mr. Shehriar
Khan for their humble suggestions and guidance.
We also like to thank our Family Members, friends, class fellows and faculty
members for their invaluable suggestions and critical review of our project. This support is
commendable.
ABBREVIATIONS
______________________________________________________
Chapter 1 Introduction
Introduction
SCADA is an acronym that stands for supervisory control and data acquisition.
SCADA refers to a system that collects data from various sensors at a factory, plant or in
some remote locations and then sends this data to a central computer which then manages and
controls the data.
SCADA systems are used to control dispersed assets where centralized data
acquisition is important. These systems are used in distribution systems such as water
distribution and wastewater collection systems, oil and gas pipelines, electrical utility
transmission and distribution system, and rail and other public transportation systems.
SCADA systems integrate data acquisition systems with data transmission systems and HMI
software to provide a centralized monitoring and control system for numerous process input
and outputs. SCADA systems are used to collect field information, transfer it to central
computer facility and display the information to the operator graphically or textually, thereby
allowing the operator to monitor or control an entire system from a central location in real
time. Based on sophistication and setup of the individual system, control of any individual
system, operation, or task can be automatic, or it can be performed by operator commands.
1
Figure 1.1 shows the components and general configuration of a SCADA system. The
control center houses a control server (MTU) and communication routers. Other control
center components include the HMI, engineering workstations, and the historian, which are
all connected by a LAN. The control center collects and logs information gathered by the
field sites, displays information to the HMI, and may generate actions based upon detected
events. The control center is also responsible for centralized alarming, trend analyses and
reporting. The field site performs local control of actuators and monitor sensors. Field sites
are often equipped with a remote access capability to allow field operators to perform remote
diagnostics and repairs usually aver a separate dial up or WAN connection. Standard and
proprietary communication protocols running over serial communications are used to
transport information between the control center and field sites using telemetry techniques
such as telephone line, cable, fiber and radiofrequency such as broadcast, microwave and
satellite.
2
needed for each connection. In a series connection, the number of channels used is reduced;
however, channel sharing has an impact on the efficiency and complexity of SCADA
operations. Similarly, the series-star and multi-drop configurations’ use of one channel per
device results in decreased efficiency and increased system complexity.
3
1.5 Modules of SCADA
Some of the modules of SCADA are discussed below briefly:
i. Copper Cable
Twisted pair copper cable is the most popular medium used for SCADA
communications and it has been used in its present form for many years.
4
iii. Power Line Carrier (PLC)
v. Satellite
Inside a plant communication is done with the help of optical fiber. It has
large bandwidth, so it can carry large data from plant which is de-
multiplexed by RTU. As this mode of communication is expensive on
large scale, so, it is not in use in Pakistan over large distances.
5
1.6 SCADA Security
SCADA networks were initially designed to maximize functionality, with little
attention paid to security. As a result, performance, reliability, flexibility and safety of
distributed control/SCADA systems are robust, while the security of these systems of often
weak. This makes some SCADA networks potentially vulnerable to disruption of service,
process redirection or manipulation of operational data that could result in public safety
concerns and/or serious disruptions to the nation’s critical infrastructure. Action is required
by all organizations, government or commercial to secure their SCADA networks as part of
effort to adequately protect the nation’s critical infrastructure.
6
1.8 SCADA Future
Research and technology development is required to fill the technology gaps between
the problems of today and the industry solutions of tomorrow. The direction of SCADA is
towards fully automated, distributed and self healing infrastructures. More intelligence and
system level security is needed to illuminate the issues associated with optimizing at a local
level and main-in-the-middle limitations. Constant efforts are being made to push the
capability of the infrastructure to a point where humans will not be able to respond quickly
enough to prevent or secure against an outage or attack.
¾ Mass Group
¾ OPTO 22 (Automation made simple)
¾ red lion
¾ Cal Amp
¾ IPS (INVENSYS PROCESS SYSTEMS)
¾ gridconnect
¾ ABB (Asea Brown Bowery)
7
Chapter 2
Literature Review
The primary sources of literature for this project were books, manuals and internet.
The help files provided with SCADA components and implementation are comprehensive
and covers all topics related to this project. Prof. Dr. Aftab Ahmad also helped, to gain
insight into this topic. Specially, Mr. Shehriar Khan helped in the completion of this project.
Tours have also been made in order to collect relevant technical material.
The book provides complete basic information of power system but according to requirement
of the project power plant portion is concerned mainly along with other helping material.
As security of SCADA systems is not prime focus of project, so only brief overview
of security risks for SCADA systems is studied from the book.
8
2.1.4 SCADA: Supervisory Control and Data Acquisition by Stuart A. Boyer
The book provides basics of SCADA and gives an overview of related topics to
project. The book focuses on technologies that make SCADA easily understandable. The also
identifies basic differences between SCADA Systems of different industries. But again,
according to the project requirement only basics of SCADA is studied from the book.
2.1.5 Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial
Control Systems Security by Keith Stouffer, Joe Falco, Karen Kent
The book provides basic difference between SCADA, DCS and ICS. But basically the
book is referred to study SCADA systems and the difference between SCADA and DCS and
SCADA system implementation and applications. In the book basic to deep concept of
SCADA is given but only relevant information about SCADA is taken from the book.
2.1.7 Intrusion Detection and Cyber Security Monitoring of SCADA by Dale Peterson
The research paper describes how to protect SCADA from attacks of hackers, cyber
terrorists, and others who want to disrupt the critical infrastructure of SCADA System. The
paper also provides means for early detection of attacks from the most common threat agents.
The deficiencies and future specific solutions of SCADA system are also discussed. Only
brief overview of the paper is taken.
9
Figure 2.1 Sensors to panel using 4–20 mA or voltage
The sensor to panel type of SCADA system has the following advantages:
10
2.2.2 Architecture for Secure SCADA and Distributed Control System Networks
To address the security needs of control networks, it is essential to begin with a
layered defense-in-depth approach that enables administrators to monitor the network at
every level. Primary concerns for a control system network manager include:
A systematic approach to security begins with reducing the vulnerable surface of the
industrial control system network. The first step is the creation of control system-specific
policies that detail; which devices, what protocols and which applications may run on the
network, who has access to these devices and from where, and what are the types of
operations a user (or a role) is allowed to perform. The next step is to identify the appropriate
locations to implement the policy. This could be through the appropriate configuration of
controls on devices already present on the network, and by adding various network elements.
Such network elements are required to create a security perimeter, provide additional
enforcement points and segment the network for fault containment. The third step is to
monitor the implementation of the policy to ensure these controls are effective, locate any
violations and then feedback into the policy any corrections based on observed network
behavior. Security is a continuous process and requires diligent monitoring, reviewing and
adjusting to be effective. Figure below shows one of the existing technologies that can be
used for securing typical control networks.
11
Figure 2.2 Typical electric SCADA network diagram
12
Figure 2.3 Adding remote accesses to SCADA
Water companies are able to provide estimates of their production, imports, exports
and consumption, but are less able to point on reasons for unaccounted-for water. Water
losses can be determined by conducting periodic water balance in defined sections of a water
network. This calculation is based on the measurement of water flow, produced and imported
quantities compared to exported and consumed quantities. This can be done automatically by
the SCADA system and with RTUs, and the outcome provides a guide to how much water is
lost as a result of leakage from the network and how much of the water loss can be attributed
to other undetectable reasons.
13
Figure 2.4 SCADA systems for water distribution
Water utilities are now seeking new ways to introduce improvements in their
maintenance processes, which may also reduce operating and maintenance costs. Introduction
of electronic microprocessor based pump efficiency monitoring, combined with water
SCADA systems will result in faster return on the investment in a SCADA system.
Implementation of this process involves:
¾ Calculating the volume of pumped water as measured and logged by the RTU
¾ Monitoring of the "peak power" drawn by the pump during its activation.
¾ Monitoring the average energy supplied to that pump during the same period
14
¾ Risk Management - everything working right first time.
¾ Schedule Improvement - engineering, commissioning and start-up time
reduced.
¾ Cost Reduction - lower engineering, start-up and maintenance costs.
¾ Operational Efficiency - a reality that the total plant availability and
throughput will maximize the plant’s profit margin.
¾ Best Use of Technology - truly integrated solution.
¾ Designing It Right - providing best in class and fit for purpose solutions that
“build-in” long term benefits.
SCADA offers total solutions for transportation and distribution to manage the
movement of hydrocarbons through pipelines, tankers and terminals; eliminate losses; and
meet strict government regulations. From the stations to the control room, and on to the
boardroom. Pipeline data and pipeline components are presented as configurable software
objects. Each object carries a range of related information, such as electrical and mechanical
capabilities, intellectual properties and identity information that makes the object instantly
recognizable to enterprise-wide information networks. With Aspect Objects, pipeline
information is deployed rapidly and uniformly. Hence Supervisory Control And Data
Acquisition (SCADA) systems improve the use of pipeline facilities. The result is faster
turnaround with increased functionality.
15
Figure 2.5 SCADA in oil and gas pipeline
16
2.7 Application of SCADA in Hydro Power Plant
Hydro automation improves efficiency and reduces operating expense. A number of
hydro plants are operated by remote control utilizing standard SCADA concepts. The rest of
the plants are manually controlled locally at the plant site. Intelligent control systems placed
at most of protecting and loading the generating units. The corporate WAN is used to transmit
schedules to the plants from the Hydro Dispatch Control Cell (HDCC) located in the Power
Business Center. If the WAN is unavailable for some reason, the local control system simply
continues to operate the plant according to the last schedule it received. SCADA
communication channels allow for manual control of the plants if the WAN is unavailable.
The basic control components and design concept for the HDCC are shown in Figure below.
17
(MCM) LAN are configured such that access to and from internet is not possible. The MCM
LAN, which also utilizes Ethernet connections, is used to allow the transfer of data between
third party machine condition monitoring systems and the automation system. The third LAN
in the automation system is the Profibus LAN that allows communication between the
various PLCs and their remote I/O. This LAN is entirely internal to the plant.
18
The SCADA system is conceptually separate to the machines and their controllers.
Unless there is a regulatory requirement that requires the machines to stop if there was a loss
of communications, the machines should be allowed to run independently of the SCADA
system status. Although the SCADA system needs to be reliable, there is no obvious benefit
in making it any more reliable than the power distribution network, if it utilizes
communications cables within the power cables.
19
technology is used to collect data, which mode of communication is used to transfer data
from plant to RTU, which sensors are used, which protocols are used, whether the technology
implemented is based on relay logic, PLC or IED. Also mode of communication between
power plant and National Power Control Center (NPCC) is taken under consideration.
20
CHAPTER 3
Data Collection
Data from different components of the power plant or substation is collected with the
help of intelligent electronic devices (IEDs) and terminal units. Different IEDs are used to
collect data from different components of plant. This collected data is then used for
protection, monitoring and control of these components and hence control of power plant or
substation.
In this chapter features of different IEDs and terminal units from ABB are
overviewed. It is also discussed that, what are the requirements of these IEDs and terminal
units, what kind of protection is offered by these IEDs and terminal units and how data is
collected by these IEDs and terminal units.
21
Examples are:
¾ Line distance protection where the bus bar is provided with three phase
voltage transformers and the lines with only single-phase sets for Synchronism
check reference. The Synchronism check function in IED 670 has a built-in
voltage selection.
¾ Bus voltage protection e.g. Over- and under voltage, Over- and under
frequency protection functions in the bay.
¾ Voltage reference for metering functions - where three phase voltage
transformers do not exist on the object.
¾ A voltage selection can be created in IED 670 with user defined logic where
positions of disconnectors (and breakers) are used to create the required
voltage selection.
¾ The voltage transformers for a double bus system are connected to the line
protection function, which may be line distance relays or voltage or frequency
relays.
¾ Supervision of the fuse/MCB failures can be fed through the same logic and
connected to e.g. block operation of under voltage functions.
3.1.3 Automatic Opening of Transformer Disconnector and Closing the Ring Breakers
The available function blocks to create user defined logic can be utilized for many
functions. One example is to open the transformer High voltage disconnector at internal
transformer faults in multi-breaker arrangements and then close the ring or one- and a half
breaker diameter.
The logic can include status supervision before the fault was tripped to ensure that the
sequence is only closing apparatuses already closed before the fault, information about the
fault to ensure it was a transformer fault, check that the disconnector is open before the
breaker/s is/are closed and verification that the new status has been reached before next
sequence is started.
22
3.1.4 Automatic Load Transfer from bus A to bus B
With transformer applications it is sometimes required to automatically transfer the
load from one transformer to the other. It includes closing bus tie and closing transformer
breakers. It mostly also involves switching back after the normal supply has been restored to
the original transformer. The load transfer scheme includes a combination of advance logic
checking apparatus positions and the measurement of bus and transformer voltage and the use
of Synchronism check device to control the closing.
An advanced alternative exists for generating stations where the unit transformer
supplies will need to synchronize at switching and this synchronizing is done on a decaying
bus voltage on voltage level as well as frequency level depending on the available
synchronous and asynchronous machines maintaining the bus voltage.
23
3.3.1 Measurements
Measurement functions are used for power system measurement, supervision and
reporting to the local HMI. The possibility to continuously monitor measured values of active
power, reactive power, currents, voltages, frequency, power factor etc. is vital for efficient
production, transmission and distribution of electrical energy. It provides to the system
operator fast and easy overview of the present status of the power system.
Dead-band supervision can be used to report measured signal value to station level
when change in measured value is above set threshold limit or time integral of all changes
since the last time value updating exceeds the threshold limit. Measure value can also be
based on periodic reporting.
24
primary and secondary equipment during and after a disturbance. An analysis of the recorded
data provides valuable information that can be used to explain a disturbance, basis for change
of relay setting plan, improve existing equipment etc. This information can also be used in a
longer perspective when planning for and designing new installations, i.e. a disturbance
recording could be a part of Functional Analysis (FA).
Every disturbance report recording is saved in the IED. The same applies to all events,
which are continuously saved in a ring-buffer. The Local Human Machine Interface (LHMI)
is used to get information about the recordings, and the disturbance report files may be
uploaded to the PCM 600 (Protection and Control IED Manager) and further analysis using
the Disturbance Handling tool. If the IED is connected to a station bus (IEC 61850-8-1),
according to IEC 61850, disturbance recorder and fault location information will be available
on the bus. The same information will be obtainable if IEC 60870-5-103 is used.
The difference between the event list (EL) and the event recorder (ER) function is that
the list function continuously updates the log with time tagged events while the recorder
function is an extract of events during the disturbance report time window. The event list
information is available in the IED and the user can use the Local Human Machine Interface
(LHMI) to get the information. The list can also be uploaded from the PCM 600 tool.
3.3.6 Indications
Fast, condensed and reliable information about disturbances in the primary and/or in
the secondary system is important. Binary signals that have changed status during a
disturbance are an example of this. This information is used primarily in the short term (e.g.
immediate disturbance analysis, corrective actions) to get information via the LHMI in a
straightforward way without any knowledge of how to handle the IED. There are three LED’s
on the LHMI (green, yellow and red) which will display status information about the IED (in
service, internal failure etc.) and the Disturbance Report function (trigged).
25
The Indication function (IND), always included in the IED, shows all selected binary
input signals connected to the Disturbance Report function that have been activated during a
disturbance. The status changes are logged during the entire recording time, which depends
on the set of recording times (pre-, post-fault and limit time) and the actual fault time. The
indications are not time-tagged. The indication information is available for each of the
recorded disturbances in the IED and the user may use the Local Human Machine Interface
(LHMI) to view the information.
The event recorder (ER), always included in the IED, logs all selected binary input
signals connected to the Disturbance Report function. Each recording can contain up to 150
time-tagged events. The events are logged during the total recording time, which depends on
the set of recording times (pre-, post-fault and limit time) and the actual fault time. During
this time, the first 150 events for all 96 binary signals are logged and time-tagged.
The event recorder information is available for each of the recorded disturbances in
the IED and the user may use the Local Human Machine Interface (LHMI) to get the
information. The information is included in the disturbance recorder file, which may be
uploaded to the PCM 600 (Protection and Control IED Manager) and further analyzed using
the Disturbance Handling tool. The event recording information is an integrated part of the
disturbance record (Comtrade file).
The trip value recorder (TVR), always included in the IED, calculates the values of all
selected external analog input signals (channel 1-30) connected to the Disturbance Report
26
function. The estimation is performed immediately after finalizing each recording and
available in the Disturbance Report. The result is magnitude and phase angle before and
during the fault for each analog input signal. The information is used as input to the fault
location function (FL), if included in the IED and in operation.
The trip value recorder information is available for each of the recorded disturbances
in the IED and the user may use the Local Human Machine Interface (LHMI) to get the
information. The information is included in the disturbance recorder file, which can be
uploaded to the PCM 600 (Protection and Control IED Manager) and further analyzed using
the Disturbance Handling tool.
The Disturbance Recorder (DR), always included in the IED, acquires sampled data
from all selected analog input and binary signals connected to the function blocks i.e.
maximum 30 external analog, 10 internal (derived) analog and 96 binary signals. The
function is characterized by great flexibility as far as configuration, starting conditions,
recording times, and large storage capacity are concerned. Thus, the disturbance recorder is
not dependent on the operation of protective functions, and it can record disturbances that
were not discovered by protective functions.
27
3.4.1 Configurable Logic Blocks
A high number of logic blocks and timers are available for user to adapt the
configuration to the specific application needs. There are no settings for AND gates, OR
gates, inverters or XOR gates. For normal On/Off delay and pulse timers the time delays and
pulse lengths are set from the CAP configuration tool. Both timers in the same logic block
(the one delayed on pick-up and the one delayed on drop-out) always have a common setting
value. Pulse length settings are independent of one another for all pulse circuits. For
controllable gates, settable timers and SR flip-flops with memory, the setting parameters are
accessible via the local HMI or Protection and Control IED Manager (PCM 600).
28
3.4.6 Integer to Boolean 16 Conversion with Logic Node Representation
This function block (or the integer to Boolean 16 conversion with logic node
representation block) is used to transform an integer into a set of 16 binary (logical) signals.
This function block can receive an integer from a station computer – for example, over
IEC61850. These functions are very useful when you want to generate logical commands (for
selector switches or voltage controllers) by inputting an integer number.
The local human machine interface is equipped with an LCD that is used among other
things to locally display the following crucial information:
¾ Connection of each bay with respect to the two differential protection zones
and the check zone. The user can freely set in PST the individual bay names in
order to make easy identification of each primary bay for station personnel
¾ Status of each individual primary switchgear device (i.e. open, closed, 00 as
intermediate and 11 as bad state). The user can freely set in PCM 600 the
individual primary switchgear object names in order to make easy
identification of each switchgear device for station personnel
The local human machine interface is equipped with an LCD that can display the
single line diagram with up to 15 objects.
29
3.7 REB670
REB670 is a product of ABB. It is designed for the selective, reliable and fast
differential protection of bus bars, T-connections and meshed corners. REB 670 can be used
for protection of single and double bus bar with or without transfer bus, double circuit
breaker or one and- half circuit breaker stations. The IED is applicable for the protection of
medium voltage (MV), high voltage (HV) and extra high voltage (EHV) installations at a
power system frequency of 50Hz or 60Hz. The IED can detect all types of internal phase-to-
phase and phase-to-earth faults in solidly earthed or low impedance earthed power systems,
as well as all internal multi-phase faults in isolated or high impedance earthed power systems.
Differential protection zones in REB 670 include a sensitive operational level. This
sensitive operational level is designed to be able to detect internal bus bar earth-ground faults
30
in low impedance earthed power systems (i.e. power systems where the earth-fault current is
limited to a certain level, typically between 300A and 2000A primary by a neutral point
reactor or resistor). Alternatively this sensitive level can be used when high sensitivity is
required from bus bar differential protection (i.e. energizing of the bus via long line).
The important factor for the numerical differential relay is the time available to the
relay to make the measurements before the CT saturation, which will enable the relay to take
the necessary corrective actions. This practically means that the relay has to be able to make
the measurement and the decision during the short period of time, within each power system
cycle, when the CTs are not saturated. From the practical experience, obtained from heavy
current testing, this time, even under extremely heavy CT saturation, is for practical CTs
around two milliseconds. Because of this, it was decided to take this time as the design
criterion in REB 670 IED, for the minimum acceptable time before saturation of a practical
31
magnetic core CT. Thus, the CT requirements for REB 670 IED are kept to an absolute
minimum.
Only three values are needed to REB670 for the differential protection.
i. incoming current (i.e. sum of all currents which are entering the protection
zone)
ii. outgoing current (i.e. sum of all currents which are leaving the protection
zone)
iii. differential current (i.e. sum of all currents connected to the protection zone)
i. FIXEDtoZA
ii. FIXEDtoZB
iii. FIXEDtoZA&-ZB
iv. CtrlIncludes
v. CtrlExcludes
If for a particular CT input setting parameter ZoneSel is set to FIXEDtoZA, then this
CT input will be only included to the differential zone A. This setting is typically used for
simple single zone application such as: single bus bar stations, one-and-a-half breaker
stations or double breaker stations.
If for a particular CT input setting parameter ZoneSel is set to FIXEDtoZB, then this
CT input will be only included to the differential zone B. This setting is typically used for
applications such as: one-and-a-half breaker stations or double breaker stations.
32
will be as well included to the differential zone B. This setting is typically used for bus
coupler or bus section bays when only one current transformer is available.
However, it can be stated that the circuit from a bus bar protection trip relay located in
the bus bar protection panel is not so essential to supervise as bus bar faults are very rare
compared to faults in bays, especially on overhead power lines. Also it is normally a small
risk for faults in the tripping circuit and if there is a fault it affects only one bay and all other
bays are thus correctly tripped meaning that the fault current disappears or is limited to a low
value.
33
zone to be protected and high stability at external faults are achieved. Increased sensitivity
can be obtained by automatic adaptation to the position changes of the on load tap changer.
In addition to the differential protection, the Basic version terminals incorporate the
following protections:
With the optional automatic voltage regulation function, RET 54_ transformer
terminal can be applied as a comprehensive integrated transformer management terminal. The
voltage regulator can be applied for a single transformer or for parallel transformers with
Master Follower, Negative Reactance or Minimizing Circulating Current principles.
RET 541/543/545 terminals can measure two sets of three phase currents, phase-to-
phase or phase-to-earth voltages, neutral current, residual voltage, frequency and power
factor. Active and reactive power is calculated from the measured currents and voltages.
Energy can be calculated on the basis of the measured power. The measured values can be
indicated locally and remotely as scaled primary values. With the condition monitoring
functions, RET 54_ transformer terminal monitors e.g. trip circuits, gas pressure of the
breaker and breaker wear, and provides scheduled time intervals for maintenance.
By means of the graphic HMI display, the control functions in the transformer
terminal indicate the position of disconnectors, circuit breakers and tap changer locally. Local
control of these objects is possible via the push buttons on the front panel of the transformer
terminal. Furthermore, the transformer terminal allows position information of the objects to
be transmitted to the remote control system. Controllable objects, such as CBs, can also be
opened and closed over the remote control system.
¾ Protection functions
¾ measurement functions
¾ control functions
34
¾ condition monitoring functions
¾ communication functions
¾ general functions
¾ standard functions
35
Figure 3.3 Example of a LON-based substation automation system
The functionality available for REF 54_ depends on the selected functionality level
and is also tied to the hardware configuration. The desired functions can be activated from a
wide range of protection, control, measurement, power quality, condition monitoring, general
and communication functions within the scope of I/O connections, considering the total CPU
load. Compared to the traditional use of separate products, the combination of desired
functions provides cost-effective solutions and, together with the relay configuration (IEC
61131-3 standard), allows the REF 54_ feeder terminals to be easily adapted to different
kinds of applications.
By means of the graphic HMI display, the control functions in the feeder terminal
indicate the position of disconnectors or circuit breakers locally. Further, the feeder terminal
36
allows position information from the circuit breakers and the disconnectors to be transmitted
to the remote control system. Controllable objects, such as CBs, can be opened and closed
over the remote control system. Position information and control signals are transmitted over
the serial bus. Local control is also possible via the push-buttons on the front panel of the
feeder terminal.
The feeder terminal is designed to be used for the selective short-circuit and earth
fault protection. The feeder protection type REF 54_ includes over current and earth fault
functions and is used for feeder short-circuit, time over current and earth-fault protection in
solidly, resistant or resonant-earthed networks and in isolated neutral networks. When
desired, auto-reclosing is achieved by using the auto-reclose function. Up to five successive
auto-reclose cycles can be carried out.
With the condition monitoring functions the REF 54_ feeder terminal monitors for
example gas pressure and breaker wear, registers the operate time and provides scheduled
time intervals for maintenance. In addition to protection, measurement, control and condition
monitoring functions, the feeder terminals are provided with a large amount of PLC functions
allowing several automation and sequence logic functions needed for substation automation
to be integrated into one unit. The data communication properties include SPA bus
communication, LON bus communication, IEC 60870-5-1031 communication, DNP 3.0
communication or Modbus communication with higher-level equipment. Further, LON
communication, together with PLC functions, minimizes the need for hardwiring between the
units.
37
Figure 3.4 A distributed protection and control system based on REF 54_ feeder and RET
54_ transformer terminals
¾ Protection functions
¾ Measurement functions
¾ Power quality functions
¾ Control functions
¾ Condition monitoring functions
¾ Communication functions
¾ General functions
¾ Standard functions
38
3.9.2 Protection Functions
Protection is one of the most important functions of the REF 54_ feeder terminal. The
protection function blocks (for example NOC3Low) are independent of each other and have
their own setting groups and data recording. Conventional current transformers can be used
for protection functions based on current measurement. Correspondingly, voltage dividers or
voltage transformers are used for protection functions based on voltage measurement.
39
Figure 3.5 Example of a LON-based substation automation system
40
CHAPTER 4
All the components in a power plant are connected to a remote terminal unit (RTU).
So, all the data from different components is integrated at RTU. Then, from RTU the data is
send to local control unit and also to remote control unit (MTU).
ABB uses RTU560 as its remote terminal unit. Its basic features and its configuration
to integrate data are discussed in this chapter.
4.1 Introduction
The RTU560 is required to be configurable to nearly all demands made on remote
stations in networks for electricity, gas, oil, water or district heating.
41
Figure 4.1 Typical configuration of a telecontrol system
Beside the acquisition and processing of the directly parallel wired process signals to
the RTU560 IO-process interface, the RTU560 is designed for the link of serial
communication routes within the station as well to the higher control level. This can be
another RTU560 router station or a network control center. Within the station it is the
connection of other existing additional control, protection or monitoring devices (Intelligent
Electronic Devices = IED) via serial interfaces.
Functional system features of the RTU560 to fulfill the requirements for remote
control stations:
42
¾ PLC capabilities to execute control and closed loop control applications for
pump stations, hydro power plants, station interlocking for electrical
substations, etc..
¾ Archiving of process and station events in a sequence of events list in the
Flash memory. Accessible via Intranet or equivalent independent network.
¾ Archiving of Integrated Totals (ITI) and Analog Measured Values (AMI) in
the Flash memory. Accessible via Intranet or equivalent independent network.
¾ Reading and archiving of disturbance files from protection relays on request of
the protection relay. Reading of the disturbance files by file transfer over a
separate communication network (e.g. Intranet) on user's demand. Independent
and direct information of available new disturbance files in the disturbance file
archive to the NCC.
¾ Possibility to build (engineer) group alarms for the typical alarm messages,
beside a PLC program.
¾ Interfacing nearly all types and big numbers of IEDs in a station via serial
telecontrol protocols, like IEC 60870-5-103, MODBUS, SPA-Bus, DNP 3.0,
or via Ethernet like IEC 60870-5-104 or IEC 61850.
¾ Marshalling and filtering process events to the connected NCCs. Decoupling
transaction sequences and delay times to the different NCCs by using a
separate process data base per NCC link.
¾ Remote access for diagnostic purposes via Web-Browser and Internet or
Intranet. With detailed information down to each process signal.
¾ Integrated HMI (Human Machine Interface) for process supervision and
control. Via Web-Browser and Internet or Intranet.
The RTU560 is based on a communication node which is highly flexible. The number
of CMU boards depends on the demands in a station or router RTU. The figure blow shows
the basic concept for the RTU560 family.
43
Figure 4.2 RTU560 System concepts
Each CMU type has a number of serial interfaces to connect serial communication
links. Each CMU can run up to two different communication protocols either as Host
Communication Interface (HCI=Slave protocol) or as Sub-device Communication Interface
(SCI = master protocol).
This concept allows cascading the number of CMUs to the demands on different
protocols and interfaces.
The second main point is the internal communication concept. To avoid several
special conversions etc. all process informations, regardless from which interface received,
are converted into an internal presentation and distributed to all CMUs via the RTU560
System bus. Therefore each protocol module needs always only the conversion into / from
the internal presentation. This requests also that each protocol module has its own process
data base for signal processing etc.
44
controllers on the I/O boards. The software concept is designed to communication and
application modules which have clear interfaces between each other. This allows configuring
and arranging the modules in a good flexibility to the project demands.
Already the RTU232 has the basis of this concept by splitting the work between the
CPU board (23ZG21) and the IO boards. Each IO board has its own micro-controller and
does the basic tasks for the connected process signals, like time stamping, threshold
monitoring for analog input signals or command output supervision for switching commands.
The above picture about the RTU560 organization shows the modularity by
connecting the IEDs, IO modules and the NCCs to different CMU. The below picture shows
a configuration in modules which are needed for a typical medium RTU560 with one CMU.
45
i. HCI Host Communication Interface
ii. SCI Sub-device Communication Interface
iii. PDP Process Data Processing (includes communication via
the
Figure 4.4 Example of communication and application modules within one CMU
46
4.5.1 Telecontrol Functions
The main task of an RTU is the telecontrol task. Telecontrol means "remote control".
This involves the use of radio waves for radio control of devices or machinery at a remote
location. This is used principally for remote control of machinery and the industrial
equipment used for engineering work, construction, forestry and the like.
Binary Signals
Analog Signals
47
4.5.3 Programmable Logic Control (PLC)
The PLC module has access to the controlling process via its process interface imaged
in the RTU560 process DB actualized by the internal communication. That allows to use
nearly all process information from direct connected process signals as well as from process
data points received via serial communication line. Control information for actuators to the
process will be handled in the same way from the PLC to the physical output signals etc. The
overall transaction time for a PLC task is therefore given by the PLC cycle time plus the
update time between the process actuators and sensors and the PLC's RTU560 process DB.
The RTU560 supports this function with a local archive which is organized in the
Flash memory. For special purposes it is also possible to print these events on a local printer,
connected to the RTU560.
The RTU560 supports the user with an automatic reading of the disturbance files out
of the relays, when the relay indicates a new disturbance file. The file is stored in the
RTU560 disturbance file archive. The reserved Flash memory can be configured and may be
in the range of up to 128 MB. The RTU560 handles a disturbance file directory to store the
files per protection relay. The total number of files per relay is fixed (typ. 8 files) and is given
48
by the total number of relays in the station. A new file overwrites the oldest, when the
number of files exceeds the configured maximum number.
i. Monitoring direction
¾ Indication processing
¾ Analog measured value processing
¾ Digital measured value processing
¾ Integrated total processing
ii. Command direction
¾ Object command output
49
¾ Regulation command output
¾ Setpoint message output
Monitoring Direction
4.6.1 Indication Processing
There are two types of indications:
Figure 4.5 shows the signal definition for SPI and DPI. Double indications are
represented by two sequential bits. The normal state of a DPI is an antivalent bit combination
(10 or 01). The two intermediate positions 11 or 00 are handled different within the RTU560.
An intermediate state is given during the runtime of a unit from one position to the other (e.g.
an isolator switching from OFF to ON).
50
i. Digital measured value (DMI)
ii. Step position value (STI)
The RTU560 can handle different bit patterns to read them and convert them into a
digital measured value:
There are two types of integrated total values (ITI) defined in the RTU560:
Command Processing
The communication unit accepts and checks the received command telegrams from
the central system and releases them for execution if the check has been positive. Depending
on the command type the central control unit processes the commands like data base update
or checks and if the tests are positive, it prepares the command-specific output procedures.
Then the command is transmitted to the output board via the I/O bus.
51
4.6.6 Object Commands
This command type is used for the switching commands, e.g. for circuit breakers or
isolators. Object commands are always configured as impulse double commands with two
independent output relays (ON / OFF).
4.7 Communication
The communication of the RTU560 may be divided into two parts
Information form external connected communication lines with their protocols will be
converted into an internal presentation by the HCI and SCI modules. The internal protocol is
based on the IEC60870-5-101 data presentation.
Once a process data point information from external protocol as well from the
RTU560 IO-boards coming via the RTU560 Peripheral bus is converted into the internal data
presentation, it is used by all other modules. Each HCI or SCI module converts only from
internal presentation to external presentation and vice versa.
52
CHAPTER 5
53
5.1 IED Station Communication
Each IED is provided with a communication interface, enabling it to connect to one or
many substation level systems or equipment, either on the Substation Automation (SA) bus or
Substation Monitoring (SM) bus.
GOOSE (Generic Object Oriented Substation Event), which is a part of IEC 61850–
8–1 standard, allows the IEDs to communicate state and control information amongst
themselves, using a publish-subscribe mechanism. That is, upon detecting an event, the
IED(s) use a multi-cast transmission to notify those devices that have registered to receive the
data. An IED can, by publishing a GOOSE message, report its status. It can also request a
control action to be directed at any device in the network.
The hardware needed for applying LON communication depends on the application,
but one very central unit needed is the LON Star Coupler and optical fibers connecting the
star coupler to the IEDs.
54
Figure 5.2 Example of LON communication structure
A remote monitoring system for communication over the public telephone network
also requires telephone modems and a remote PC. The software required for a local
monitoring system is PCM 600, and for a remote monitoring system it is PCM 600 in the
remote PC only.
55
Figure 5.3 SPA communication structure for a monitoring system
56
trips. In addition to this, there are application possibilities like e.g. blocking/enabling
functionality in the remote substation, changing setting group in the remote IED depending
on the switching situation in the local substation etc.
The Protocols between a Network Control Center (NCC), Substation Control System
(SCS) (e.g. MicroSCADA Pro of ABB) and the RTU. In this case the NCC is master and the
RTU560 is Slave.
The Protocols between the RTU560 and a subordinated unit, like an IED in the
stations itself or another subordinated RTU unit (e.g. a station with an RTU560E). In this
case the RTU560 is master and the sub-device is slave.
i. Command Direction
NCCs or SCS as host can send commands to the RTU560. The HCI checks the
command as much as possible and distributes it via the internal communication to all other
modules. The responsible module (e.g. the PDP) checks the command for formal correctness
and can acknowledge the command for the host. The acknowledgement is send to the host by
the HCI module.
57
DB. All SCI and PDP modules are responsible to force a complete process signal image after
start up or when a sub-device fails becomes online again. The HCI are informed about any
changes by internal communication. This method secures, that the process data bases in all
modules is kept actual.
i. Command Direction
The SCI handles commands distributed via internal communication which are
addressed to a sub-device, connected to one of the communication lines managed by the SCI.
These commands can come from a host or from a PLC module.
58
Chapter 6
Protection and Control IED Manager PCM 600 is an easy-to-handle tool for con
figuration and communication engineering, parameter setting, and monitoring. It provides
versatile functionalities required throughout the life cycle of protection and control IEDs in
transmission and distribution applications. It features functionality for creating and editing
single line diagram for the IED HMI, and supports the efficient configuration of I/O signals.
6.1 Features
¾ Flexible tool architecture
¾ Easy to adapt IEDs to power system requirements
¾ Support of ANSI units and symbols
¾ Scheduled polling of disturbance files
¾ Automatic disturbance reporting
¾ Graphical on-line monitoring of internal binary signals
¾ Forcing of input and output signals
¾ On-line monitoring of LED indications
¾ Full control of all parameter setting updates
6.2 Engineering
PCM 600 is compliant with IEC 61850, which simplifies IED engineering and
enables information exchange with other IEC 61850 compliant tools. PCM 600 enables us to
modify the attached template based on a default plant structure including all IEDs in a power
plant or substation. This structure reflects the substation topology.
PCM 600 can graphically adapt the configuration or create new configurations to
meet the specific needs. Furthermore, this tool secures the downloading of formally correct
59
configuration through extended syntax checking and guided error tracking. Signal status can
also be monitored online, which is extremely useful for troubleshooting.
The graphical signal matrix tool (SMT) of PCM 600 can efficiently connect CTs, VTs
and binary input and output signals without changing the configuration. This is especially
helpful during commissioning in case the connection from the process termination to the IED
terminal blocks needs to be changed. The SMT is also used for connecting the LEDs on the
IED as well as for connection of the GOOSE signals between the IEDs.
This tool provides full control over the updated parameters. Upload the current
settings from the IED to PCM 600 while the IED is in service. After changing the desired
parameters the Filtering functionality of PCM 600 compare them easily with the uploaded
settings. This way it can be ensured that the intended settings have been modified and that the
60
values are correct before the new IED settings are downloaded. This also reduces the time
needed for commissioning and maintenance. PCM 600 permits the restoring of verified
default settings to the IED anytime after the IED has been taken into operation.
The disturbance files are stored in IEDs in COMTRADE, the de-facto standard
format. Disturbances stored in the IED can be uploaded using a scheduler. After the upload,
PCM 600 automatically creates a disturbance report, which will be immediately sent to
subscribers by e-mail. Such a notification shortens the time from disturbance detection to
corrective actions.
6.7 How to Use the IED in Conjunction with PCM 600 Toolbox
Procedure
¾ Select the IED configuration. The IED is available with four alternative
configurations as described above.
61
¾ Select and order the IED which best suits the application. There are a number of
templates including options for use. Check which one is the most suitable for required
application.
¾ Adjust the configuration if required by adjusting the input and outputs with the Signal
Matrix Tool (SMT) in PCM 600.
¾ Select the number of setting groups on the Activate setting group function block.
¾ Save the IED, compile and download to the relay.
¾ Set the IED with use of the PCM 600 Parameter Setting Tool PST.
¾ Adjust the setting to the values suitable for application. General setting values have
only one set and are the basic parameters such as CT and VT ratios etc.
¾ Download to the IED.
62
Conclusion and Suggestions
In the present project, various aspects of power system protection are considered for
the implementation of SCADA. Main purpose of SCADA is monitoring and control and it is
possible with the help of understanding of power system protection because in modern
SCADA, implemented in power system, data is collected with the help of protective relays.
In the present project, numerical relays called IEDs are used for protection and collection of
data. This collected data from IEDs and the previous data or history becomes the basis for
decision of control and decides weather the specific station would remain in system or not.
Due to vastness of SCADA, only the implementation in power plant is taken into account,
however the communication of power plant with network control center, for example NPCC
in Pakistan, should also be considered and the control and monitoring from the remote
control center (NPCC) should also be taken into account. Due to lack of facilities and security
reasons, limited number of visits are made for the study of SCADA in power plants. Yet, the
project can be a very good starting point for understanding of SCADA and further
consideration of SCADA in power plants.
63
References
• UCI’s specification of the SCADA and its Communication System, Utility Consulting
International, Cupertino, California, USA
• http://www.efarabi.com
• http://www.tech-faq.com/SCADA.html
• http://en.wikipedia.org/wiki/SCADA
• http://www.ABB.com
64