448 Refurbushment Strategise Fo LCC Based Techniques For
448 Refurbushment Strategise Fo LCC Based Techniques For
448 Refurbushment Strategise Fo LCC Based Techniques For
Working Group
B5.08
February 2011
Refurbishment Strategies based on
Life Cycle Cost and Technical Constraints
Working Group
B5.08
Members
Peter Leushuis, Convener (NL), Jokin Galletero Lopez (ES), Daniel Garcia Garcia (ES)
Jean-Michel Grellier (FR), Frank Koers (NL), Thomas Küng (CH), Mika Loukkalahti (FI)
Jerzy Pillar (PO), Didier Wiot (BE), John Wright (GB)
Copyright © 2011
“Ownership of a CIGRE publication, whether in paper form or on electronic support only infers right
of use for personal purposes. Are prohibited, except if explicitly agreed by CIGRE, total or partial
reproduction of the publication for use other than personal and transfer to a third party; hence circu-
lation on any intranet or other company network is forbidden”.
Disclaimer notice
“CIGRE gives no warranty or assurance about the contents of this publication, nor does it accept
any responsibility, as to the accuracy or exhaustiveness of the information. All implied warranties
and conditions are excluded to the maximum extent permitted by law”.
ISBN: 978-2-85873-137-4
Table of Content
Introduction ....................................................................................................................... 4
1 Definitions ........................................................................................................ 5
1/80
4.1.5 Analysis of risks assessment and objectives of stakeholders ......................... 24
4.2 Financial models ............................................................................................ 24
4.2.1 TCO ............................................................................................................... 25
4.2.2 Net Present Value .......................................................................................... 26
4.2.3 Internal Rate of Return ................................................................................... 27
4.2.4 Return on Investment ..................................................................................... 28
4.2.5 Payback Period .............................................................................................. 29
4.2.6 Life cycle cost ................................................................................................ 29
4.3 Summary ....................................................................................................... 31
4.4 Examples ....................................................................................................... 32
4.4.1 Introduction .................................................................................................... 32
4.4.2 Example 1: high risk of existing system ......................................................... 33
4.4.3 Example 2: high benefits new system ............................................................ 34
4.4.4 Overall methodology ...................................................................................... 35
7 Trends ........................................................................................................... 61
7.1 System trends ................................................................................................ 61
7.1.1 Increasing network load ................................................................................. 61
7.1.2 Unpredicted, changing load flows in the network............................................ 62
7.1.3 Reducing investment and operational cost (total cost of ownership) .............. 62
7.1.4 Improving reliability ........................................................................................ 63
7.1.5 Reducing technical skills within the company (outsourcing of non core activity)
...................................................................................................................... 63
7.1.6 More information from the status of the network to management, load forecast,
systems, etc. .................................................................................................. 63
7.1.7 Scale and amount of blackouts is increasing. ................................................. 63
7.1.8 Flexible networks ........................................................................................... 63
7.2 Self check contribution to reduced maintenance ............................................ 64
2/80
7.2.1 Self supervision definition .............................................................................. 64
7.2.2 Scope of Self supervision ............................................................................... 64
7.2.3 Coverage ....................................................................................................... 65
7.2.4 False alarms .................................................................................................. 66
7.2.5 Self action (response from the device) ........................................................... 66
7.2.6 Prevent malfunction ....................................................................................... 67
7.2.7 Analyse signalling what information do we need (for efficient maintenance
policy) ............................................................................................................ 68
7.3 Remote maintenance ..................................................................................... 69
7.3.1 Remote setting ............................................................................................... 69
7.3.2 Measures for security ..................................................................................... 71
8 Conclusions ................................................................................................... 72
9 References .................................................................................................... 74
10 Appendix ........................................................................................................ 75
10.1 Maintenance strategy. Example 1. ................................................................. 75
10.2 Maintenance strategy. Example 2. ................................................................. 75
10.2.1 Example of maintenance measures ............................................................... 76
10.2.2 Functional requirements and added value...................................................... 77
10.3 Examples of self-check functions ................................................................... 78
10.3.1 Hardware ....................................................................................................... 78
10.3.2 Software......................................................................................................... 79
10.3.3 IEDs response and recommended actions ..................................................... 80
3/80
INTRODUCTION
Many utilities around the world are confronted with the fact that a number of their
secondary systems are approaching the end of their technical life. Such systems include
a mix of technology from “old” electromechanical and analogue systems to first generation
digital systems. Utilities are faced with the decision to either extend the working life of the
existing systems, by say upgrading, refurbishment etc or totally replacing them. Drivers for
the refurbishment of secondary system(s) include no spare parts, lack of knowledge,
missing documentation and the introduction of new functionalities, such as self-check.
The goal of this report is to propose a practical guideline to assist asset managers when
making decisions related to refurbishment strategies. The triggers for such decisions are
often operational risk or technical constraints and will be typically followed by a Life Cycle
Cost (LCC) calculation to determine the financial impact.
4/80
1 DEFINITIONS
Due to the varying interpretations of the terminology used in this field of Engineering, the
working group deemed it necessary to define the following terms for the purpose of the
report.
Replacement: is the process of replacing the majority of the existing infrastructure with
the intention of improving the remaining lifetime and the functionality.
Example: replacement of a complete protection cubicle retaining the
interfaces to the primary system, i.e. CT’s, VT’s.
Device Level
The following table shows the approximate / anticipative effects of each type of change
that is described in this report.
5/80
Table 1: Change options classified by level
X = driving force
6/80
2 SECONDARY SYSTEM EVOLUTION, LEVELS AND POSITION
This chapter describes briefly the technical evolution of secondary systems, the different
levels in a substations and the position of the secondary systems in the network. In order
to assess a chosen strategy, decision makers need to understand these items.
7/80
It is important that the skills of the engineers are in line with the technology. Engineers
have to be trained to program and maintain such devices. They can be complicated, and
the management of software files and schemes can be time consuming and difficult.
Some of the most important features of a protection device are reliability, ease of setting
and testing. Numerical systems offer a large amount of protection functions in the same
box, such as; self supervision, fault recording and programmability Drawbacks of this new
technology are; complexity and version handling of software. Hardware depends on the
newest PC technology and software bugs (which fortunately are minor).
Issues related to the first generations systems are;
− Possibility and cost of upgrading or renewal of first generation systems (not at the
end of their lifetime),
− Ageing of digital systems (especially PC-based ones),
− Update policy for digital systems (step-by-step or only when needed - if this is
possible), version handling requirements for tools, PC's, operating systems and
vendor software. In early digital products, the upgrade ability was limited.
Compatibility between some relay setting tools and early digital products have
been problematic. This requires a lot of attention from the user.
In many substations around the world protection systems are hybrid, i.e. a mixture of
different technologies. This mixture of technologies results in the following:
− Engineers require training in different relays and different technologies
− Mixtures of auxiliary voltage levels
− Different environmental operating withstands
− Different ratings
− Different CT / VT requirements
− Mixture of traditional scheme drawings and internal software scheme logic.
Due to the mix in systems; some points need to be addressed, such as;
− Trip relays required or trip breaker direct?
− External or internal trip circuit supervision?
− Can the numerical relay exactly simulate the old scheme?
− Is the old scheme still valid or can it be rationalized?
8/80
2.2 Secondary system as a part of the overall system
The secondary system is the heart of overall power system. Auxiliary power, protection,
measuring, control and monitoring systems are key elements to the successful operation
of the total system. The protection and control system is maybe the most demanding and
difficult part of it, as it includes the user / operator interface to the whole installed system
for control and support of operation philosophy.
The overall system covers all equipment to generate, transmit, distribute, control and
ensure electrical power. This is divided into primary and secondary system.
Separation of primary and secondary system:
The primary system covers the high voltage part of the system on which the electrical
power of the network is flowing. It covers overhead lines, transformers, circuit breakers,
disconnectors, instrument transformers (CT’s and VT’s), surge arrestors, reactors, etc.
The electrical part for some of the primary devices, like the drives of circuit breakers,
transformer / tap changer control boards and disconnectors are considered part of the
secondary system
The secondary system covers all electrical parts, which support a utility / grid operator to
control and ensure the flow of electrical power. To understand and validate its value the
9/80
secondary system itself is subdivided in 4 hierarchical levels:
− Process level
− Bay level
− Station level
− Network / grid level
Depending on the technology used, functionality from more than one level can be
allocated in the IED (Integrated Electronic Device) e.g. Station controller controls host of
several bay control functions.
All secondary equipment to control, monitor and protect single primary devices , such as;
motors, contactors relays, energy limiting switches of circuit breakers and disconnectors,
transformer / tap changer control box directly mounted at the transformer and secondary
wiring between primary equipment and bay cabinets
All secondary equipment to control, monitor and protect one bay / feeder / unit.
Bay controller including interlocking and synchronization equipment respective
synchrocheck equipment
− Bay protection
− Revenue meters
− Monitoring (online: display of actual operation value, e.g. volt, amp, freq. and
power meters)
− Disturbance recording per bay
10/80
− SOE (sequence of event list)
− Disturbance evaluation
The secondary system can be seen as an interface between the primary system and the
network management system. Acquisition cost of the protection and control assets is
generally less than the price of the primary assets. Still secondary systems need more
engineering work than primary system: parameterization, setting and commissioning is
time consuming work. On the other hand the failures especially in protection systems
(false trips or unselective trips) are very significant and unwanted. Also every primary fault
has to be detected by the protection and control systems. With a good secondary system
you can detect and isolate the primary faults fast and selectively and obtain the right
information about them. However, you cannot prevent primary faults with protection and
control systems.
In principle, the secondary system could not totally prevent the risk of damages in the
primary system. But it helps to minimize the direct damages of primary equipment failures
by interrupting power as well as reducing the consequential damages out of a grid failure
e.g. in case of a busbar fault.
11/80
Therefore, the need to automate the existing substations shall be evaluated by the utilities
in order to meet the expected challenges of the future market and the reliability of the
existing equipment.
Each utility shall first of all, prepare itself and its network for the challenges ahead. In
order to do this, the utility must acquire full knowledge of its automation needs and
benefits. The utilities in their effort to automate the existing substation shall focus on two
aspects that shall influence the optimum control of its power system management
business. These two aspects are economical and technical.
The economical reason plays a major part in justifying existing substation automation
(SA). The information about the power system gives the utility the strength to be more
successful and competitive in a free market where competition between utilities and the
deregulation of the power system industry is being introduced. In this type of environment
the information becomes a very strategic requirement in the power system industry market
where a fast decision is required. This cannot be obtained from an existing conventional
type substation. The changes, which are occurring presently and expected in near future
in the power systems industry can be listed as follows.
Major changes have taken place in the power system market and more are expected in
the future. The traditional market where Nation/Area-wide power control centres play the
role of control and marketing the energy, since there were no other suppliers of electricity
to the customer, is disappearing gradually and this trend will continue at a faster rate.
Energy service Companies are replacing power system companies and new retailers of
energy are being introduced in the market. Also, the privatization/deregulation of the
nations electrical networks find interest for even non-national Companies in the market.
This gives the chance to have a new power producer and retailers. Such type of market
shall be an open type where the consumer is becoming a customer and he can choose
his supply contractor, increase the competition in power system efficiency while
maintaining system security and reliability. A market having a variable electricity price at
present and in the future depending on the market competitions as what can be said
Electricity at the Market price.
Activities of transmission and distribution utilities have to separate on open market
business (energy market) and regulated business (transmission and distribution). On the
energy business there are new functions required for running energy market, while on the
regulated field, there are no major changes regarding required functions. There is only the
need to provide all necessary data for supporting energy market activities. It is not clear,
12/80
who should cover the costs, if this functionality would exceed equipment installed for utility
use.
This type of environment requires that the existing substation shall be upgraded to provide
the necessary urgent information. This is also in addition that the market must meet the
loads needs.
Other additional functions in SA have to be economically proved by other factors, than
new energy market situation.
As mentioned previously, the Electricity Consumers in the new market become the
customers. These customers will have the choice to get power supply from different
suppliers that are geographically spread.
Therefore, new types of power supply agreements shall be introduced in the market.
These power agreements shall handle the power supply at different interval of different
prices and different suppliers. This is what is called a free market price and place.
Suppliers provide daily information of the power transfer capabilities and retailers receive
consumption information. This requires huge, accurate, fast information of data for billing
the Customers instantaneously. Moreover, the customers also know their daily operational
cost in order to properly plan their production to minimize cost and increase their profit. In
this case, information is becoming a must and existing substations should look to
automation if they are going to a play part in such a market.
13/80
3 DRIVING FORCES (TRIGGERS) FOR CHANGE
Reasons for refurbishment, retrofit, replacement and/or upgrade can be various. Driving
forces can be extension of the primary configuration, equipment obsolescence, failure
risks level, lack of knowledge or maintenance cost. In the next chapters those driving
forces are explained.
During its lifetime the system is also likely to change, for example, increased fault levels,
change in load or system expansion. These will all impact on the protection system
design and settings. This action is commonly ignored and has lead to many unnecessary
protection scheme operations and under protected primary plant.
Also, an extension in a substation may be a sufficient driver for replacement of existing
protection relays, even though they would have some remaining calculated life. If the
extension is of significant measure, such a total protection system replacement becomes
even more obvious. This gives a benefit on spares handling, ease of use, documentation
and periodical testing, as all relays at one substation are of same types and versions.
Extension of a substation can also bring along a need to reduce size of new equipment
due to space constraints and may give a final push to replace also the old devices. In
some cases there is a need to reduce energy consumption with modern IED’s due to
batteries dimension requirements.
14/80
The below table illustrates the key milestones of a products life.
It is clear that over time the reliability of the protection system goes down bit by bit. At the
final stages of their expected lifetime the reliability of protection devices can reduce
significantly. Modern relays have better availability and reliability due to self-checking
function and this reliability improvement need can be impact for changes in the secondary
side of the substation.
The consequences of protection relay failure have the potential to be catastrophic. The
following list details a few:
− Disruption in supplies due to incorrect design and settings or due to relay
malfunction
− Damage to equipment due to excessive fault current resulting from long operating
times.
− Incorrect operation of plant i.e. motors stalling due to low voltages.
− Fire and explosion due to excessive fault current resulting from long operating
times.
− Loss of life or serious injury.
15/80
A system fault may be a rare occurrence, but unless the protection is maintained and
properly serviced then it may not operate correctly. With correct maintenance and
application, should a fault occur, the damage and disruption will be minimised. Therefore
to maintain optimal performance of the protection equipment, it is very important to
manage the life cycle of the protection scheme.
Cost reduction through improved efficiency is the main factor for renovation /
refurbishment of an electrical substation. This is achieved through better network
operation and reduction in the cost of substation maintenance. In general, for a given
technology the cost of spare parts maintenance generally increases with time, the reason
is that new technologies with a better cost/functionality ratio progressively replace the old
ones.
Another important point to comment on are self-checking capabilities; these can
significantly reduce the necessity of periodic maintenance, if such information can be
retrieved remotely. Although self-checking cannot prevent or detect all kind of miss-
operations, self-checking reduces the complexity of some maintenance because some
points are continuously checked by this capability.
The settings in electronic relays may start to change slowly (zone reach in distance relays,
current settings, time settings). This increases the risk of having a slow operation of a
main protection, or no operation at all, leading to non-selective trips in the HV networks.
Thus, this may give a reason to replace such relays.
Due to fast diagnostic of the problems in the system and more information about the
power system the modernization of the secondary devices increases the reliability of the
substations and shortens the period of diagnosis. This resulted in faster restoration of the
substations.
For electromechanical relays one driver for replacement is that the utility may have lack of
documentation, lack of competent and skilled relay engineers and technicians as well as
lack of suitable tools for testing and repairing.
One problem with digital relays is the version handling with quite limited functionalities in
their first versions they are not easy to upgrade into newer versions, at least not without
sending the relay back to the factory to do it. However, this is seldom a driver for
replacement.
Utilities at present are facing difficulties in documenting all changes and upgrades which
are done to the network. In other words, there is no “as built” which reflects the actual site
conditions specifically the secondary equipment. There is a considerable amount of time
wasted in verifying the existing installation before starting any implementation upgrade or
modification to existing installations.
The new IED’s (compatible with IEC 61850) provide self-describing capabilities which can
16/80
be used to create system documentation as a part of the current system implementation.
However in certain cases utilities decide to specify / approve one firmware version for the
product which they purchase. With this approach they reduce problems that could be
derived from having different versions installed. This approach may be recommended for
fixed application without need for extra functionalities.
Early protection schemes may not be considered sufficient anymore and thus the
increased performance and functionality capabilities can be a driver for change.
Functional integration capabilities make it possible to group all the feeder functions into a
single device thus replacing a collection of elementary elements. This reduces the cost of
the spare parts and copes with the new functional needs. Other drivers for change may be
equipment standardisation
The new business needs, which require more information, will direct the utilities to
upgrade the existing substations. Therefore information is needed about the industrial as
well as other types of customers, i.e. computerized load forecast, complicated metering
system bulk trading and energy management. The accuracy and the reliability of the data
depend on the utilities/traders. Therefore the data availability gives the utility the chance to
17/80
be strong in a very competitive field. In the next subchapters the major technical issues
that require the upgrading of the existing conventional substation are described.
In Helsinki Energy (FIN) three most wanted new functions of modern IED’s are: self
checking function, disturbance and event recording and free programmable integrated
functionality. These functions are often also triggers for secondary changes. Self-
checking and disturbance recording functions give the possibility to improve reliability and
availability of protection system. The possibility to integrate many functions into the same
IED gives financial savings, especially at MV level, where separate over-current relay,
directional earth fault relay and auto-re-close relay were used before. At HV level modern
relays provide options to combine synchro-check and backup over-current relay into
differential and distance IED’s.
Information (or data) plays a very essential part in optimal management of the power
system. Therefore, more and more data is needed continuously to the master control
stations. Data, such as alarms, breaker status, state monitoring, real time acquisition of
measurements (voltage, current, active and reactive power, etc.), energy management
programs availability and energy metering. This huge data requirement, it’s availability
and accuracy is a must in the modern power system industry. Therefore, the power
control centres in the near future will become Information Technology centres. This
requires the existing substation to be upgraded to automated substation to be able to
cope with required information.
Not only the network control centre but other parties are interested in more data.
Protection engineers need to know if their protection has worked as planned, primary
maintenance engineers need preventive monitoring information from the process and
network planning need information about the load. There is a need for information to
coordinate between engineering, planning, maintenance and operation. Separate
maintenance channels connected to the communication bus of the substation automation
system or connected straight to the IED’s could be a solution for separate needs for data.
18/80
3.7.1 Functional demands and performance enhancement
The new modern system offers the addition of new functions to the existing modern
equipment, unlike the conventional existing system which might require considerable
changes in the secondary equipment to add additional functions. The modern control
system provides the chance to obtain a function from different hardware units into the
master station software.
Next the new functionality and performance of modern IED’s are listed, they are divided
into 5 subgroups: Protection functions, Control and automation functions, Fault
information, Communication and Monitoring & supervision.
Protection functions
Sensitivity: Better sensitivity and wider range of settings are possible. Choice of
characteristics is possible for better protection performance.
Ease of operation: Multiple groups of settings are possible which could be remotely
selected or automatically selected. This feature could lead to ease of operations since
manual relay setting changes are avoided for transfer bus operation etc.
Accuracy: Almost no drift in pick up values due to digital techniques. Analogue
measurements (currents, voltages, PF, etc.) with good accuracy can be measured.
Multiple functionalities (integration): Many functions are built into the relay: auto
reclosing, synchrocheck, trip circuit supervision, external trip signals and option to have
multiple protection functions in the same box will help to reduce the number of devices
and simplify panel wiring leading to higher reliability.
19/80
Fault information
Configurable alarms and trip: Alarm and trip/re-close information are programmable and
can be assigned to particular outputs like contacts or LED’s. Group alarms can be
customized as per utility practice/ standards.
Fault targets/ indications: Extensive fault data is available on local display
Fault disturbance record: Built in DFR function eliminating separate fault recorders.
Separate disturbance recorders are not necessary for recording of current and voltage
waveforms. The disturbance data files can be used in simulation of the power system
incidence for detailed analysis by using relay test kits.
Power system fault location: Distance to fault location is built in, helps in faster
restoration of power supply.
Communication
Supervision: Modern supervision functions provide better availability like IED internal
supervision, trip circuit supervision, measuring circuit supervision, auxiliary voltage
supervision, etc.
Counters and statistics: Modern IED’s can make statistics concerning primary devices
like counting number of primary switching device operations, I2t counters, interruption
statistics, etc.
Trends: Measuring capabilities of new IED’s could give more information of power quality
(e.g. voltage levels, harmonics, sags and swells, flicker), measured temperature trends,
measured gas pressure trends, etc.
20/80
4 REFURBISHMENT STRATEGY
As mentioned in the previous chapters there are a number of different reasons for
replacing an existing secondary protection and control system, namely;
− the risk associated with the existing system is so high that additional steps are
required to improve it.
− the additional benefits of a new system are so high that the overall performance of
the system improves.
− the costs associated with a new system are lower than the system that is in
operation.
In the next chapter some of the basics related to risk management and financial models
are explained.
Risk management is a methodology whereby in a systematic approach all risk aspects are
analysed. With the results of the risk study a strategy can be developed. This strategy can
be accepting the risk or reducing / controlling the effect of the risk. Risk management is
not only traditional focussed on physical or legal items e.g. disasters, accidents, and
environmental aspects such as fire, earthquake etc. but also on network risk, such as
blackouts. There is also financial risk management that focuses on the financial risk of a
project.
The objective of risk management is to reduce different risks related to a pre-selected
domain to the level accepted by the company or society.
21/80
4.1.1 Identifying all possible risk
This first step is to identify all possible risk. A complete risk assessment and identification
of all possible risks can be very time consuming. It is advisable to start identifying only
those items whereby the risk is very high or the probability of the occurrence of this risk is
very high. If the result of the risk analysis is unsatisfied, then a deeper analysis of all
possible risks might be needed.
The second step of a risk study is to catalogue the risk in different domains. The domains
are not fixed. For example the domains for a protection and control system can be
SAFETY, ENVIRONMENTAL, IMAGE, REGULATOR and POWER QUALITY. The reason
to catalogue the risk is that in different domains the risk level can be different. It is
necessary to calculate the risk in each domain since the risk level within the various
domains can vary.
Power Quality
Regulator
Safety
Image
22/80
4.1.3 Assessment of the identified risk
Once the risks have been identified, the next step is to assess the probability of
occurrence and the potential impact.
Equation 1: risk
Ri = Li p (Li ) )
Rtotal = ∑ Li p (Li ) )
i
Where:
Li potential lost
p probability that the loss will occur
The assessment of the risk is an important step in any risk management study. This step
might start a lot of discussions. The figures needed to assess the probability and impact in
most cases are not based on large databases. In most cases the figures should be more
pragmatically defined. The standard equation of risk is change multiplied by the effect.
This means in theory change and effect have the same priority. Sometimes this method of
calculations does not give the right feeling of calculating a risk. This might be the case at
quantifying risk related to safety. For these items it might be wise to use only the
probability in the assessment.
In many cases it is very difficult to find hard figures. In order to establish a common
understanding of the risk without detailed investigation it might be helpful to reduce the
amount of values that can put in the table. For example:
− Potential lost
o Very low: less than 10 k€
o Low: between 10 k€ and 50 k€
o Moderate: between 50 k€ and 250 k€
o High: between 250 k€ and 1000 k€
o Very high: more than 1000 k€
o
− Risk
o Very low: less than once every 100 year
o Low: between once every 100 year and 25 year
o Moderate: between once every 25 year and 5 year
o High: between once every 5 year and year
o Very high more than once every year
23/80
4.1.4 Identify the objectives of the stakeholder
The next step in a risk management study is to identify the objectives of the different
stakeholders. The stakeholders can be; regulator, the company board, shareholders,
society.
The objectives of the stakeholders shall be combined to one overall objective. The
objectives can be different in the different domains.
The last step in the risk study is to compare the results of the risk assessment with the
identified risk objectives. After the risk is compared, the system that is studied should be
classified in one of the three categories, namely:
The risk level is lower than accepted risk, no further measures are needed.
The risk level is higher than accepted, but with some additional measures the risk can be
controlled (lower than maximal accepted by the stakeholders).
The risk level is too high and the system should be replaced.
To compare different technical systems with each other it is not longer enough to focus on
technical aspects only. The economical aspects related to a project are increasingly
important.
Financial experts have developed different financial models. Some of these financial
models are better in helping the technicians and/or financial experts in the decision
making process. By applying one of the financial models it is possible to compare different
projects or technical solutions with each other. The intention of this report is not to give
detailed descriptions of the financial models, but to support the engineer. Which model is
the most suitable depends highly upon the company policy. This report describes at a high
level different financial models. If the reader would like to investigate the models more
deeply, background information can be easily founded.
24/80
In the next chapters different financial models are explained. As mentioned before this
explanation is just a brief introduction of the model.
4.2.1 TCO
Total Cost of Ownership is a methodology whereby different projects with the same
benefits can be compared with each other. This methodology can be defined as a
systematic quantification of all cost related to a project during the lifetime. For an accurate
comparison of different projects it is important that the calculation period is long enough.
At least one replacement of a system shall be within the calculation period. It is Important
to know that the benefits are not taken into account in the equation.
Equation 2: TCO
t =n
∑C 0 + Ct
TCO = t =1
n
Where:
t the time of the cash flow
n the total time of the project
Ct the net cash flow (the amount of cash) at time t
C0 : the capital investment ( t = 0 ))
The table below illustrates a fictitious project utilizing TCO. In this example, the project
investment is 100 k€, and maintenance is expected in years 5, 10 and 15. The technical
lifetime of the system is 20 years.
A major disadvantage of the TCO calculations is that the value of money over time is not
taken into account. In this example, it is supposed that the value of money in year 15 is
the same as today’s money. In other words, inflation and interest rate are not taken into
account. Another drawback of TCO calculation is that the benefits are ignored.
25/80
4.2.2 Net Present Value
Net Present Value (NPV) is a financial tool whereby it is possible to compare different
projects with each other. The basis of NPV is that value of future cost/benefits is
calculated back in today’s money. For calculating back a defined interest rate percentage
is used. This high value of the interest rate is in most cases defined by the regulator or at
the corporate level. An often-used interest rate percentage in a NPC calculation is the
Weighted Average Cost of Capital (WACC).
With the same formula also benefits can be calculated. The NPV methodology can be
combined with other financial models.
Equation 3: NPV
n
Ct
NPV = ∑ (1 + r ) t
− C0
t =1
Where:
t: the time of the cash flow
n: the total time of the project
r: the discount rate
Ct : the net cash flow (the amount of cash) at time t (positive benefits, negative cost)
C0 : the capital investment ( t = 0 )
Remark: in this equation the cost is calculated as a negative value and benefits as a
positive value.
Table 5 is for the same fiction project using the NPV calculated.
26/80
Table 5: Fiction project, NPV calculation
NPV € 12.081
Only those projects that have a positive NPV are worth investing in. Those projects that
have a negative NPC should be in principle rejected.
For secondary systems is it very hard to calculate the real benefits. Sometimes utilities
choose to calculate only the NPV cost. They assume that the benefits for the secondary
systems are the same.
Internal Rate of Return (TRR) is a methodology to calculate the interest rate for a project
whereby the NPV is zero. It is important is that the cost and benefits are known. The same
NPV equations are used to calculate the IRR. The difference with the NPV is that the
interest rate is a given figure and in an IRR calculation the interest rate is calculated. The
advantage of this method is that it is not necessary to know the interest rate.
Equation 3: IRR
n
Ct
Initial Investment = ∑ (1 +
t =1 IRR )t
27/80
Where:
t : the time of the cash flow
n : the total time of the project
IRR: internal rate of return
Ct : the net cash flow (the amount of cash) at time t (positive benefits, negative cost)
C0 : the capital investment ( t = 0 )
Figure 3 is an example of IRR calculation. In this example the NPV is calculated with
different interest rates. The IRR is the interest percentage whereby the NPV is zero. In
this example the IRR is 17.5%.
€ 60,00
€ 50,00
€ 40,00
€ 30,00
NPV *1000
IRR
€ 20,00
€ 10,00
€ 0,00
0,00% 4,00% 8,00% 12,00% 16,00% 20,00% 24,00%
€ 10,00-
€ 20,00-
Interest rate %
Financial experts are mainly using this tool. The IRR tool is basically not intended to
compare different projects with each other. The idea behind this tool is that financial
expects can decide if a single project is valuable to invest in (only project with a IRR value
lower than the interest rate are worth to invest in). A drawback of this tool is that also the
benefits should be known.
The Return on Investment (ROI) or Ratio of Return (RR) is the ratio between investments
and the direct accountable benefits. In a ROI calculation the interest ratio is ignored. It is
also possible to combine a ROI calculation with net present values. Besides the ROI
calculations with NPV there are other way’s to calculate the ROI. In principle the ROI
28/80
equation is very simple. The drawback of a ROI calculation is that for protection and
control systems it is very difficult to calculate benefits. Normally the period for ROI
calculation is over a specific period of time, usually a year. In most cases is the ROI
calculation not suitable to compare different projects with each other.
Equation 4: ROI
Vb − Vc
ROI = (%)
Vc
Where:
Vb: Benefits accountable to the investment
Vc: Cost
Other tools such as TCO or NPV give better results. In the standard equation inflation and
interest rate are ignored. Normally the ROI is a figure that can be found in annual reports.
Payback Period is a methodology to calculate the period of time that is needed to earn the
investment back. In a standard Payback calculation inflation and interest rate are ignored.
A Payback calculation can be combined with net present values.
V investment
Payback =
V cashflow ( year )
Where:
Vinvestment: Investment cost
Vcashflow: Cost minus benefits
For example with an investment of 100 k€ and a yearly benefit of 25 k€ it will take 4 years
to have hit the a break even point. In this example the payback period is 4 years.
A Payback calculation gives insight into the time frame that is necessary to earn the
investment back. Other calculations models gives in many cases a more balanced result.
Figures in TCO calculations are usually based on the real expected cash flow. In a NPV
calculation expected cash flow is calculated back into today money. See chapters 5.2.1
and 5.2.2. Life cycle cost calculation is a combination of TCO and NPV calculation. Cash
29/80
flow in a LCC calculation is not presented in real expected money but based on a NPV
calculation. The time frame for a LCC calculation should be long enough that at least all
systems involved in the calculation are replaced. Typical timeframe for a LCC calculation
is between 20 and 40 years.
In a LCC calculation it is possible to add risk and benefits as cost in the LCC calculation.
Risk and cost shall be calculated in Euro/year. The risk and benefits can be put in the
calculations as yearly cost or benefit.
30/80
4.3 Summary
TCO t =n
− All costs are calculated − Benefits are not taken into
∑C 0 + Ct
TCO = t =1 − Calculation period can be account
n long − Interest rate and inflation
− Similar projects can be are ignored
compared
NPV n
Ct − Interest rate and inflation is − To determine the interest
NPV = ∑ (1 + r ) t
− C0
t =1 part of the calculation rate is not always simple
− NPV calculation can be used − Not the real cash flow is
with other tools not calculated
− For a protection and
control system it is difficult
to calculate the benefits
IRR n
Ct − The value of the interest rate − This tool is not intend to
IRR = ∑ (1 +
t =1 IRR )t is not needed compare different projects
− Interest rate and inflation is with each other
part of the calculation − Not the real cash flow is
not calculated
− For a protection and
control system it is difficult
to calculate the benefits
ROI Vb − Vc − Equation is very simple − Interest rate and inflation
ROI =
Vc − ROI is calculated over a are ignored
specific period of time, usually − Other tools such as TCO
a year and NPV gives a better
result
− For a protection and
control system it is difficult
to calculate the benefits
Payback V investment − Equation is very simple − Interest rate and inflation
Payback =
V cashflow ( year ) are ignored
− Other tools such as TCO
and NPV gives a better
result
− Difficult to calculate the
cash flow
LCC Combination of TOC and − Gives best and most −
NPV objectives results
− The risks and benefits
can be taken into
account
31/80
4.4 Examples
4.4.1 Introduction
In this example, operation risk and financial considerations are analysed in an objective
way.
In this example two systems are compared with each other, namely:
system A: that is an existing system in operation for many years. There are technical
constrains in this system. For example, the knowledge of how to maintain
this system is not in the company and the support of the supplier is below
an accepted level.
system B: a new system with new functionalities. The new functionality has many
benefits, for example remote diagnosis, extensive self-supervision
functionality.
The driving force to start a study might be that risk of system a is too high or that it seems
that system B has so many benefits that it is recommended to replace system A. Both
trigger items points are described in to different examples.
Example 1: system A is in operation and there are problems with this system.
Question, is it from a risk and cost point of view justified to replace this
system with a new one with the same functionality?
Example 2: is a new system available in the market, this system has many benefits.
Question, is it from cost and benefit point of view justified to replace the
existing system before the end of its technical life?
32/80
4.4.2 Example 1: high risk of existing system
In example 1 is an existing system that gives a lot of problems. Advisee is to follow the
following flowchart, see Figure 5.
LCC calculation
Compare OPEX No replacement
and CAPEX LCC calculation continue with system a
between Year cost system with modification if
Risk assessment system A and new A > system B
Identification system B applicable
Assessment
Environmental
Safety
Regulator
Stakeholders
Potential risk treatments LCC calculation
Accepting the risk Compare OPEX
Migration and CAPEX the
Elimination cost of the
modification
between system A
and new B
33/80
Starting point is an existing system A.
The first recommended step is to make a risk assessment. In this risk assessment all risk
are identified and compared with the company values. Output of this risk assessment is:
− risk is acceptable, no additional steps are needed
− risk is higher than accepted, but with some additional actions the risk can be
controlled (lower than maximal accepted by the stakeholders)
− the risk level is too high and the system should be replaced.
The next step in the study is a LCC calculation. If the outcome of the risk assessment is
that the system should be replaced (c) it is in principle not necessary to make a LCC
calculation. If the outcome of the risk assessment is that no additional steps are needed
(a) or with some modification in the system (b) the risk is decreased and lower than
maximal accepted a LLC calculation shall be performed.
If the outcome is that no additional steps are needed is it justified to make a LCC
calculation with only the yearly operational cost (OPerational EXpenditures OPEX) and
the yearly investment cost (CAPital EXpenditures CAPEX) In this calculation risk and
benefits are not taken into account. Based on the outcome of the calculations it might be
still possible that from cost point of view advisable to replace system A for system B
If the outcome is that with additional steps the risk is controlled a same LCC calculation
shall be made. In this LCC calculation also the cost for the modification shall be included.
Example 2 is a new system with many benefits. It is advisable to assess the benefits of
the new system and analyse those benefits from a cost point of view. The best approach
in this example is to make a complete LCC calculation. The benefits can be part of the
LCC calculations. For example due to improved self supervision the chance of an
unwanted outage is reduced. The yearly benefits can be calculated by the value of the
benefit divided by amount of years this new system is in operation in the network.
In the table below an LCC calculation made for system A and the new system B. In this
example it is supposed that system A is replaced in Year 2 and that benefits of this new
system also start at Year 2. Further it is supposed that the economical debit of system A
stops in Year 3. See Table 6.
34/80
Table 6: example LCC calculation with benefits
Year Scenario A Scenario B
Without replacing system A Replacing system A in year 2 for a new
system
0 Opex cost /year Opex cost system A /year
Capex cost /year Capex cost system A /year
1 Opex cost /year Opex cost system A /year
Capex cost /year Capex cost system A /year
2 Opex cost /year Switching cost
Capex cost /year Opex cost system B /year
Capex cost system B /year
1
3 Opex cost /year Opex cost system B /year
Capex cost system B /year
Benefits system B /year
.. Opex cost /year Opex cost system B /year
Capex cost system B /year
Benefits system B /year
20 Opex cost /year Opex cost system B /year
Capex cost system B /year
Benefits system B /year
∑ NPV ∑ NPV
If the LCC shows that the overall net present cost of system B is lower than system A than
it is from cost point of view is it justified to replace system A before the end of the
technical life time. In the LCC is most difficult point is that the expected benefits are in
most cases not easy quantifiable.
Both scenarios can be combined. Also the risk can be translated to cost since risk is
change multiplied by effect (the effect can be translated into EURO’s). For a LCC
calculation the risk and benefits are treated in the same way as OPEX, CAPEX. The
difference between risk and benefits is that benefits can be abstracted off the year cost
and risk is added cost.
1
Remark: in this example the CAPEX of system A stops due to end economical investment debit
system A
35/80
Table 7: overall LCC calculation
System Risk Cost Benefits Total
A: Existing High Investment cost (CAPEX) ↓ Low
system Operational cost (OPEX) ↑
36/80
5 OPTIONS AND STRATEGIES FOR CHANGE
This chapter is dealing with migration possibilities, general methods and challenges in this
process. It is ending with actual experiences from United Kingdom, Finland, Poland,
France and Belgium.
5.1 General
It is widely accepted within the industry that most of the installed protection relays are
rapidly approaching or have passed their operating lifetime. According to Newton-Evans’
‘Worldwide Study of Protective Relay Marketplace in Electric Utilities’ approximately 60%
of the relays currently being in operation are electromechanical ones with age of 30-40
years. This number varies significantly from country to country. It is recognised that there
is a need for management of the obsolescence of components of such aging devices.
Several methodologies are currently employed to achieve this goal, such as: relay
replacement, refurbishment and hardware life cycle management.
A number of possibilities and techniques to improve the transition from aging protection
systems to up-to-date modern technology with minimal disruption to the power system are
available, namely: maintenance contracts, protection upgrades, spares holdings,
refurbishment of existing infrastructure and life cycle monitoring.
As with all Engineering solutions, it is important to consider the difficulty of the task and
the resulting technical / economical advantages. If possible it is better to keep it simple to
reduce the design and testing time. However, once it is determined that the current
installed equipment is in need of replacement, and then various options are available.
These range from `plug and play` refurbishment kits to complete scheme upgrade and
replacement. These options will require, to some extent, a combination of additional
competences, including full short circuit analysis, protection setting studies/examination,
programmable scheme logic design, drawing layouts including AC/DC schematics,
understanding of current technologies and protection scheme, commissioning, training
and comprehensive project management.
This approach provides the opportunity to modify, improve and update the protection
system through the use of modern technology. The following available options depend
wholly on utility requirements; primarily, capital expenditure, utility history and legacy
practices, system down time availability, complexity or simplicity of the scheme as well as
personnel skills and human assets.
37/80
‘Plug and play’ Kits
This involves retrofitting modern protection equipment in existing housing. This has the
advantage of no panel rework with minimal scheme wiring changes, resulting in
economical capital cost expenditure and minimal system down time. Associated additional
costs, such as design work, Computer Aided Design (CAD) and project management are
minimised. However, this is applicable only for very small changes, i.e. replacement of a
single relay or similar. Otherwise, the work will become more costly than expected.
38/80
Protection Relay Component Replacement
Provided that aging components are identified, available on the market and easy to
replace this method is an economic solution.
When migrating from legacy to new systems following issues need to be addressed:
Compatibility of new generation relays to old type panel layouts and operability with old
generation trip coils/ lock out relays etc.
Review of electromagnetic environment and ambient condition (high level of dust and
humidity)
DC power supply system, level of DC transients due to switchgear operation, etc. and
grounding arrangements.
Extensive familiarization/ training required to protection and setting engineers for relay
configuration, understanding of features etc.
Breaking and closing capacity of solid state relays (SSR) – dI/dt, dV/dt
39/80
6 UTILITY FEEDBACK – APPROACH & PRACTICES
Due to the variety of practices employed worldwide, the working group deemed it
necessary to consult a wider population. Hence, a questionnaire was prepared and
distributed to a number of utilities: Its goal was to capture their experiences in the area of
secondary system refurbishment. The main areas under consideration were as follows:
In all 12 utilities responded. The results have been consolidated and detailed below:
The utilities were provided with a list of criteria and asked to name the ones that
influenced the decision process. They were then further asked to rate them in order of
importance. Table 8 details the results: a score of 10 indicating the highest influence.
10
9
8
7
6
5
4
3
2
1
0
Extensibility
Investment
Improv protect
Service support
Manuf suppo
Quality
Manuf chang
Remo main
Reliability
Maintenance
Dependability
Reduce maint cost
Outage cost
Inform & int
Lack educat
Communicat
Fault locat
Oper risk
lack doc
Add functions
Spares
Person risk
Prog tools
Licenses
Warranty
40/80
From the results detailed in the table it can be seen that the following issues play an
important role in the decision process.
Operational Risk
Continuity of supply is an important consideration for all utilities. Ageing protection
systems may present a number of operation risk issues, such as; maloperation or even no
operation. It is very important to access the level of risk associated with the current
installed base. When investigating operational risk you need to consider reliability, security
and dependability.
Manufacturers Support
As protection relays become more technologically advanced, with increasing features,
settings and functionality; utilities are becoming increasingly reliant upon the support of
the manufactures. This can take the form of after sales service or training.
Quality
The quality of the protection system scores highly on the list. It is important to understand
that this extends beyond the physical system itself, it is necessary to have a good quality
management system, i.e. document, setting and drawing control along with a robust audit
system
Lack of Documentation
Lack of documentation is a major issue for aging systems. Documents are often
misplaced, damaged or not kept up to date. Without such documentation it is very difficult
to maintain a system and prolong its life.
41/80
Service Support
It is important to ensure that if a system fails service support is available. This becomes
more difficult as the system ages, since experience in such systems may deplete over the
years.
6.1.2 Strategies
Refurbishment Strategy
All utilities that responded agreed that the number one driver behind refurbishment
strategy is the condition of the currently installed equipment; based on a condition
assessment. However, there was considerable variation amongst the Utilities polled as to
what level they plan to refurbish at. The following areas were mentioned: network level
(many substation), substation level (limited number of substations), bay level, circuit level,
relay level (individual relays within a bay).
Migration Strategy
In general the migration strategy can occur at all levels, namely, Sub, Bay, Circuit. It tends
to be progressive in nature and driven by the age and condition of the installed base.
Costing Strategy
When polled on costing strategy, all except 2 utilities consider only the life cycle costs, not
the initial costs. The two exceptions take into account NPV. When asked “Do you consider
savings on account of combining various functionalities in a single numerical device,
reducing space/wiring etc to justify higher costs”, the overall response was yes, however,
it is voltage dependent.
42/80
were on hinged doors. To reduce the amount of time on site, a complete new pre-wired
door, with flying leads for external connections was built in the factory and tested before
delivery to site. It was then possible to simply remove the existing door and wiring to the
terminal blocks in the back of the panel and replace with the new panel and test within
one day. To speed up any interpanel wiring, cabling between panels was run in but not
landed while the system was live, awaiting connection during the outage. This pre
enabling works dramatically reduces the system down time.
It seems that some electronic (static) relays and first generation microprocessor relays will
need extra maintenance or maintenance in advance. The ageing of some electronic
components of these relays is faster than expected. For example, some capacitors,
potentiometers and trip relays are not so old. Our company has had 5-6 false trips during
the last two years (in medium voltage level) from electronic and first generation numerical
relays. It seems that the coverage of the self detection is not very good in these (late
1980's early 1990's) first numerical relays. We have also considered that in the case of an
internal error, false trip of the relay is the last possible action. This seems not to be true
necessarily. Hopefully, the internal fault detection function of the latest generation
numerical relays is as good as manufacturers advertise [claim].
Solution: The manufacturer of the relays has proposed that our company (and the others
also in Finland) should start to do preventive maintenance actions: Risky parts of the
relays should be changed with the help of repair kits provided by manufacturer (risky
43/80
electronic card types, bad capacitors, set potentiometers, trip relays, etc.). It is more
economical to do this at the same time of periodical relay testing in the substation. The
cost of this job should be about 10 % of the cost of changing the relay to new one. With
this they promise 10 years "good" lifetime after the event. This action is reasonable to do
for relays which are about 10 to 20+ years old. This preventive maintenance seems to be
a reasonable solution at least in Finland, because we have a large amount of electronic
and first digital relays assembled in 1970’s and 1980's and these devices are made by the
same manufacturer. The total change to new relays is impossible in these scales. Other
manufacturers and countries also have met this problem.
44/80
method and form, e.g. CPM and Gantt chart, which has to be agreed on by Asset
Management Department and Grid Operation Department, especially regarding shut
downs of HV lines and power transformers.
As an example, modernization of Mory 220/110 kV substation located in Warsaw suburb
area, which is the essential supply node for Warsaw agglomeration. The substation was
first energized in the mid 1950’s. The primary as well as secondary equipment and
substation infrastructure have reached the end of their lifetime and therefore the
substation needed a deep refurbishment. One could say that the old substation has been
completely destroyed and at the same place a new substation has been built.
The task the contractor was faced with was a real challenge – to perform a substation
replacement with minimal shutdowns. To fulfil the above requirements the whole project
has been divided into six phases. It started in August 1999 and finished in September
2004.
Modernization has been carried out by keeping the substation’s scheme with slight
changes to its default operating schedule and there was no need to introduce changes in
grid topology, especially highly inconvenient T-connections in the front of the substation.
The substation now consists of two switchyards – 220 kV with 15 bays and 110 kV with 25
bays, each switchyard equipped with triple busbar system, three power transformers
220/110 kV, 160 MVA each, auxiliary supply switchgears AC and DC (see Fig.6).
45/80
The upgrade process has resulted in installation of new primary and secondary
equipment, like:
220 kV and 110 kV circuit breakers,
− Instrument transformers (voltage, current and combined transformers),
− disconnectors,
− digital protection terminals supporting IEC 60870-5-103 protocol (see Fig.7),
− substation control system supporting all nowadays required functions, including
bidirectional communication with control centres, protection terminals and other
IED’s in the substation (see Fig.7),
− SDH communication transmission equipment supporting voice and data channels,
and transmission of teleprotection commands
46/80
−
47/80
bays are owned by PPGC, while the rest of the substation including 110 kV switchyard,
auxiliary supply switchgears (0.4 kV AC and 220 V DC) and substation buildings are
owned by distribution company.
On the distribution side there are still static protection relays, there have been done some
refurbishment of marshalling panels and control panels (providing local control and
measurements). A new digital control system in a centralized architecture supporting DNP
3.0 transmission protocol for external communication has been installed
On the transmission side, electromechanical distance protection relays (used as main
protection) have not been touched. The replacement covered electromechanical earth
fault relays (used as backup protection) and old TTL-technology based RTU. Digital earth
fault relays supporting IEC 60870-5-103 communication protocol and digital substation
control and supervision (SCS) system in distributed architecture supporting DNP 3.0
protocol, used for communication with SCADA systems in control centres and IEC 60870-
5-103 protocol for communication with protection IED’s have been installed. The
communication features of the SCS included also implementation of TCP/IP stack,
IEC 60870-5-104 protocol and Web Server application to allow communication via
enterprise WAN.
On figures 8 – 10 are presented some typical screens of new SCS and current SAS
communication scheme. This retrofit process allowed for improved substation
observability, quality of measurements and topology information transmitted to SCADA
systems. Thanks to the implementation of remote control it was possible to resign from
the local manned operation of the substation – service provided by a distribution
company.
48/80
Figure 8: Substation layout on the local HMI
Figure 9: Detailed layout of the feeder incl. protection status, bay measurements, etc.
49/80
Figure 10: Supervision on data transmission in the Substation Automation System
Certain projects differ depending on the approach to bidding and ordering process. From
the view of „openness” there can be public bids – open to all vendors, and limited bids –
directed to pre-selected vendors. From the view of completion of projects there are
contracts which scope covers certain part or parts of the substation and turn-key contracts
covering all works in the substation.
50/80
remain in operation for 10 to 20 years plus, on the condition of carrying out some
maintenance actions at regular intervals.
To achieve this goal, a protection of each
type was taken out of the network for
thorough analysis.
We started by measuring directly on the
charts the characteristics of the
components for which ageing phenomena
are known.
The aluminium electrolytic capacitors are
easily measured without disassembling
the chart (measurement at 1 kHz, with a
bias voltage of 2V), because their
Figure 11: Capacity variation capacities are high and they have a low
impedance versus the other components
of the chart (of course it must be checked on the chart scheme that there is no other
capacitor in parallel). Thus we confirmed the ageing of these components (the smaller
they are, the more they age quickly): this led to the recommendation of replacement every
12 years for the values lower or equal to 100µF and every 18 years for the others. We
also observed that some capacitor manufacturers had products ageing much more quickly
than the average: we recommended their replacement as soon as possible by products of
reliable manufacturers.
The photo couplers may age by reduction
of the light efficiency of the emitting diode.
Measurement on chart of the CTR
(Current Transfer Ratio) is possible by
making some corrections to the currents
of measured input and output: the output
is polarized under a constant voltage of
5V and the current is measured under a
null input current: this current is the
consumption of the other components of
the chart which is constant under a
constant voltage: it is subtracted from the
other measurements. The correction of
the input current is done by analyzing the
Figure 12: CTR% correction
diagram in order to calculate the current
leaking in the other components under the input voltage (the photo couplers being used to
isolate the inputs, the studied diagram is finally very restricted). No sign of ageing was
found, even for those permanently active. The photo coupler manufacturers seem to have
controlled this problem. Recommendation: a new sampling will be carried out in 10 years.
51/80
The coding wheels present a risk of opening of
their internal contacts: this defect is difficult to
Co Re
characterize because it is often fugitive (it is
sufficient to move the wheel so that it
Ca disappears and then reappears later). Using
the schemes we analysed the effect of such
0 1 2 3 4 5 6 7 8 9
openings on the behaviour of the protection:
measure distorted of x%, spurious trip order on
Figure 13: Coding wheels external fault, pickup thresholds modified. We
recommended the replacement of the coding
wheels when spurious tripping was proved (note: as protections are doubled, the failure is
definitely less critical). It was then necessary to propose a replacement system which
really eliminates this risk: we replaced the fixed part by a connector base plate and the
moving part by a connector block in which a welded wiring reproduce the code (thus there
is as many blocks as figures).
The dip-switches, which usually do not cause big
problems, revealed a series badly manufactured: the
plastic block opens and the contacts also: A
recommendation of immediate replacement was made,
with this difficulty that these components are not dated and
not marked; the help of the equipment manufacturer is
necessary to know the charts manufactured at the same
time as those where we found the problem.
52/80
support striped. The diodes were also measured with the same process. We highlighted
that certain batches were residues of sorted batches: characteristics beyond 3 standard
deviations. A study of the schemes and a simulation showed that the correct operation of
the chart remained largely assured in spite of these defects.
Id pour Vdd = 1V
Then we tested the logical
0,1
components, which present
0,08 the characteristic to have a
0,06
I d (A )
0,04
measurable junction (without
0,02
protective series resistance)
0
between the outputs and the
power supply pins: Gaussian
dispersion, except for a batch,
Figure 16: measure
probably also a residue of
sorted batch: then it was checked using the chart scheme that the reduced fan-out
remained compatible with the load. Finally we tested the operational amplifiers, which
present the characteristic to have between the 2 inputs or an input and the GND a
measurable junction (without protective series resistance). Substantial but non Gaussian
dispersion, due to the fact that several inputs in parallel are often measured: by dividing
the current by the number of inputs in parallel, dispersion is then very weak and Gaussian.
The recommendation of
maintenance was to do nothing.
For the repair of broken down
charts, an LM308H operational
amplifier of the Eighties had a
particular characteristic: its
output could be clamped by
Figure 17: scheme
referring the compensating
network by a diode to the wished
limit voltage: certain diagrams use this property which is not available any more on the
recent components: we recommended to make a stock of these components.
In conclusion, with respect to the periodic replacement of the aluminium electrolytic
capacitors and a levelling of certain equipment (coding wheels, dip-switches), it is sure
that our equipment will last still a long time.
53/80
Life Time
Without
maintenance
With maintenance
0 10 20 30 40
An economic survey which develops the fact of delaying of 10 to 15 years the renewal
reveals a very important profitability of this type of maintenance.
The above described approach shows great benefits for the company, although not all
companies can follow it. It requires a lot of expertise, appropriately equipped laboratories,
etc.
Elia network includes voltage levels in the range 400kV to 30kV (400kV, 220kV, 150kV,
70kV, 36kV and 30kV). All together, the network is composed of 5000 bays all of which
are equipped with Protection and Control systems (cubicle or rack).
Taking into account a life expectancy of 25 years on newly installed protection system,
one can roughly estimate that 200 protection systems (cubicles) have to be replaced on a
year basis in order to maintain the protection and control systems at a good quality level.
This corresponds to a replacement pace of 4 systems per week.
This is a challenging task which has to be tackled with an efficient refurbishment strategy.
Elia protection and control systems are composed of Electromechanical, Static and
numerical equipments that have been installed through the years. The next picture gives
an idea on the technology repartition per voltage level.
54/80
Figure 19: technology
Protection and control devices have been classified in 8 categories, based on their
technology and on their Service Level Index (see hereunder).
− Electromechanical : EM1, EM2, EM3
− Electronic(static) : ELO1,ELO2,ELO3
− Numerical : DIG1, DIG2
A more detailed repartition based on the 8 categories is given in the next picture:
55/80
Figure 20: Service level index
EM2 & 3 equipments are expected to have a lifetime of 30-45 years. Those equipments
have been mainly installed in the years 1966-75 and are now reaching the end of their
lifetime.
In the same way, ELO equipments are expected to have a lifetime of 20-35 years. Those
equipments have known their peak of placement in the years 1975-86 and are also
reaching the end of their lifetime.
This situation combined with the fact that life expectancy of digital equipment is not known
but is expected to be in the range of 20-25 years, has led to a double refurbishment
strategy:
1)Investment projects
56/80
Practically, this refurbishment strategy makes use of Highly Standardized and modular
Protection & Control cubicles at bay level.
For efficiency reasons, the engineering of each new cubicle is based on a library of +- 50
pre-engineered and standardized cubicles covering 400kV to 30 kV applications and
requiring a minimum of customization.
2) One-to-One replacements
In the long term, the replacement peak caused by EM and ELO equipments combined
with the reduction of the lifetime of P&C equipments and the pressure on investment
budgets could be so binding that this strategy alone could prove to be insufficient.
The one-to-one replacement strategy is based on a so-called “risk model”. This models
makes use of different information (such as equipment age, substation importance, …)
and provides the maintenance engineer with a list a equipment which have to be replaced
with a priority ranking.
The following picture shows the impact of different one-to-one replacement strategies on
the global quality index of the network.
57/80
Without One-to-One replacements:
58/80
With one-to-one replacements
TCO shows that we don’t need to buy the cheapest solution, because initial cost is smaller
comparing to total cost. It is worth of using more expensive components in order to reduce
operational and maintenance costs.
6.3 Conclusions
It is clear to see from the questionnaire that the main driver for change is continuity of
supply. This is becoming increasingly important as the supply for electricity increases,
since loss of parts of the network may have disastrous consequences. This condition is
often exacerbated by ageing equipment on the system. It is also clear that even though
new technology and additional functionality in the equipment is not a main driver for
change; utilities consider manufacturers support, quality, reliability and advances in
technology as being important aspects in providing a secure and reliable electrical power
system. However, it is important to understand that such advances in technology may
allow the realisation of secondary system designs that were not possible before, hence
improving the network reliability and security.
59/80
An interesting observation is that it is not possible to clearly define the best strategy for
refurbishment, this if often based on a number of factors such as: voltage level,
geography, customer preference etc. However, it is clear that some form of refurbishment
strategy as oppose to complete replacement has an important role to play when balancing
outage times / operational risks against cost.
60/80
7 TRENDS
This chapter describes new functions or changes in existing functions that can help end-
users in the targets which users are confronted with as a result of system and market
trends. This can be input for protection developers to implement this function in the near
future as well as for end users to help in the specification process.
This chapter is divided into the following three items
− System trends.
− Self-check contribution to reduce maintenance.
− Remote maintenance.
One of the driving forces for replacement of new protection systems can be the
introduction of new technology and/or functionality. This paragraph describes future trends
in protection systems. This paragraph can be helpful for end–users and R&D departments
to focus their development policy. It is our intention to describe trends, and not be
complete.
Technical developments should be mainly driven on changing needs of end users.
The trend is that electrical infrastructure is operating closer to the technical limits.
Worldwide there are two trends. There are networks where the load increases in such a
way that it is almost impossible to follow the increasing energy consumption, and there
are networks where the growth is not so high but where due to the liberalization
investments in the network are postponed.
A second trend is that due to the increasing load end-users decided to up-rate their
61/80
installed primary components (power transformers, cables, overhead lines). In an up-
rating process not the maximum technical value on the rating plate is used. The
construction of a component is analyzed in detail. It has been found out that in many
cases the maximum technical value of a component is much higher than the maximum
value on the rating plate (although this could have an impact in equipment life).
Higher loads in the network and up rating component have an impact on the protection
system / settings. In networks that are operating much closer to the technical limits the
performance of reliable protection system is essential.
The users of protection systems are confronted with a pressure to reduce investment and
operational cost. Trend is that manufacturers of protection devices develop one uniform
hardware platform, which is suitable for all protection relays. The next step in this
development is that protection functions are delivered as a software module. This
“protection software module” can be installed in any equipment. The relation between
physical hardware and protection functions as a software module will become more
vague. This product standardization allows reducing investment in spare equipments
and/or modules. Modular designs allow reduction in operation costs as in many cases end
users may perform simple repairs at module level replacement on site minimizing
downtime.
Another trend in reducing maintenance cost is the enhanced self-check functionality. The
trend is that self-check functions are also monitoring major parts of the secondary
equipment. Trip-coils supervision and voltage supervision are typical examples. With new
functionality the complete primary equipment can be monitored. When these functions are
available inspection can be reduced to an absolute minimum.
62/80
7.1.4 Improving reliability
There is an increasing focus on power quality. For a modern society the reliability of the
electrical infrastructure is an essential part of economical growth. Regulators are
introducing quality indexes in their financial structure. The reliability of protection systems
is an essential part of the overall network performance.
7.1.5 Reducing technical skills within the company (outsourcing of non core activity)
From published papers it is known that almost 50% of the unwanted protection operations
are related to human errors. With adaptive protection settings (fuzzy and neural network
technology) using the information from network calculations programs and SCADA
systems settings can be automatically calculated. The human expertise of calculating
protection settings can be translated into setting algorithms
7.1.6 More information from the status of the network to management, load forecast,
systems, etc.
Due to the information society the need for additional network information is increasing.
Due to this additional information needs, detailed information regarding the behaviour of
the network is increasing. Typical examples of addition information are for example the
trend recorders which are incorporated in all of digital protection relays. Due to this
additional information it is easier for a protection engineer to explain the cause of a failure.
The next step is that additional information from protection and substation systems is also
used for management of information, maintenance purposes, load forecasting, etc.
Networks are enlarged due to globalization. The coherency between power producing and
power consuming are becoming weaker. Interconnecting connections are more than in the
past needed for the network flows and stability. The recent major blackouts in Canada and
Italy show that tripping off a single transmission line can result finally in a blackout of a
complete region. Fact is that the scale, size and frequency of blackouts is increasing.
The last example of trend is flexible networks. The situation today is that almost every
network is designed and operated in one way. With more flexible networks it is possible to
63/80
configure a network in such a way that in every situation the most economical
configuration is selected. In theory with flexible networks the most cost benefit solution is
selected. Smart grids using modern technologies may contribute to security in a cost
effective way.
Modern protections include modular design approach, to minimize down time and
increase availability (through quick problem detection and fast module replacement). This
leads to the need of special tests to warranty the right modules were installed in the right
slot when repairs are done in the field. This is why diagnostics are more oriented to these
modules.
64/80
On the other hand, modern digital protections implement most of the functions based on
software, so more attention is paid to software elements check, both software and
hardware. In the next chart it is shown the percentage failures occurred by hardware and
software components, being the 90s figure relatively constant and yet valid for present
days.
Software should then be considered as another module. In fact module that contributes to
higher probability of failure. Therefore, some way of software self-supervision should be
also considered. For this purpose, watchdog hardware built in mechanisms in modern
processors may help. Other high level “watchdog” or “token passing” mechanisms may be
used to complement the latest.
Obviously, the scope of self supervision should include the components with the biggest
failure probability for whichever reason.
Software failure modes include not only manufacturer’s bugs but also user programming
bugs (i.e. when programming flexible logic schemes).
Hardware failure modes include output relays and circuit supervision even though
sometimes failures are due to unavoidable wear out, lighting, overloads, etc. more related
to overall application than to the pure IED design or manufacturing quality.
In the appendix 11.3 we describe some hardware and software components that may be
monitored based in existing products. [Ref. 5]
7.2.3 Coverage
It is important for the user to know how much coverage the self supervision provides. In
many cases it is not practical providing a percentage quantitative number due to lack of
data. In other cases manufacturers may give ratios difficult to show against any known
standard. Therefore, qualitative coverage information should be given with a clear
differentiation of two different states:
Start-up
Typically during start-up tests are done that should be disruptive during runtime.
Modern protection equipments with many built-in functions may require significant start-up
time until protection functions are ready to work. In case of electromechanical and static
relays start-up time is negligible (it is in the range of less than 1 second for many
analogue products), whereas it may become important for digital protections. If functions
are enabled in a stepped approach, manufacturer should declare a table of functions
availability and time. For example, protection is ready after 30 seconds of start up,
communication is ready after 1 minute, etc.
Runtime
These tests are intended to diagnose possible real-time failures due to component aging,
65/80
drift, premature failure, verify memory circuit’s integrity, internal buses connections, etc.
Self supervision is done typically during background time of circuits; therefore they do not
affect relay response. Any effect on product unavailability should be declared. If, for
instance, a complete test of a circuit that takes 1 second is done every day, this should be
declared, even though the effect in availability is quite low (12 parts per million).
False alarms
This is probably the worst effect for two reasons. Cost, due to attending something that
was not a real problem and loss of detection system credibility that may lead to disabling
the function, tampering or worse: reaction time in future opportunities. Probability of a
false alarm should be reduced, in the order of 1% false alarms
Disruptive test
Supervision should be done in a way that does not interfere with normal protection
functions. Any effect in delaying or even disabling a trip should be considered.
It should be checked supervision sanity.
For instance, circuits with limited number of operations (i.e. an EEPROM memory with,
say, 10^5 operations) should not be operated beyond its limits (i.e. continuous read and
write test during idle or background time at a rate of 1 per second). Some of these effects
are not visible during static, dynamic or endurance tests, therefore they require a deep
product review.
Prevention principle should reign as in other critical areas (medicine, law, etc.).
The simplicity principle should also be used to improve overall reliability.
When either type of self-test error occurs, the IED will react automatically in some way.
For instance, it may signal the error via local HMI (LED indicators, display). It may also
indicate such error in an internal variable that may be read via communications.
66/80
Depending on error criticality the protection status may change from regular to a
predefined “fail safe” status.
A minor error should not disable protection. For example, in case a measurement
monitoring device detects measurements out of tolerances, the equipment could use
some default calibration parameters that would reduce accuracy to a level still acceptable
in a protection scheme. This behaviour provides higher availability than other that would
disable completely the protection.
In certain cases, user may bias relay towards security or dependability manually or he
may decide to set the relay to react automatically in one way or another. Due to the
possibility of human error and the slow human response time, automatic mechanisms are
preferred. Leaving decision to an additional setting in a complex IED may increase
unnecessary complexity that drives lower usage reliability, therefore settings are not
recommended for these kind of automatic responses.
In cases where a critical major error is found, it is recommended disabling all responses,
including output contacts, to a secure state, i.e. keep output trip contacts open. When this
occurs, user should be able to detect both locally and remotely, this new “protection
disabled” status. Modern IEDs include a “ready” normally closed contact that will open in
such cases. Normally open contacts are preferred because in case of an auxiliary power
outage, it will also go to that “disabled” status signalling something is wrong in the system.
The manufacturer should clearly assess which is the IED response in case of an error and
recommended user reaction in such cases.
67/80
In certain digital IED’s there is a digital trend by which the relay works perfectly or disables
all functions. This digital behaviour (either works or not) may not be optimum in complex
products that include many protection functions. For instance, if a distance protection
provides overcurrent backup and a voltage input fails (due an internal product error), it
could be considered the possibility of disabling only voltage related functions, while
preserving the simpler overcurrent backup ones. This “analogue” or continuous behaviour
may combine both security and dependability in a better way, providing maximum
availability.
Too little data on a failure event may be a bad situation to react. Too much data may be
even worse, provided that some situations are critical and need immediate user response.
It is said that “you can't see the wood for the trees”. A sound self supervision scheme
should provide enough and relevant data. It should also provide a way to obtain useful
information on failure detected, so that the user quickly identifies what failed and knows
what to do in such case.
Present policy of many users is carrying a complete IED to an installation once a failure is
detected. Unfortunately the many models, many manufacturers and different applications,
may make keeping spare IED’s or even spare parts to fix quickly one failure in the field
impractical.
Self supervision should lead to easy failure detection. This should provide enough
information on module failure (either hardware or software), for a quick replacement that
will lead to fix field repair. If the product should be taken to user laboratories or
manufacturer facilities, it should be preferred “draw out” types that leave case and wiring
in place.
68/80
remote locations in harsh environments. This nice concept should be complemented with
enough access security to prevent product tampering by hackers or inadvertent
manipulation by authorized users.
Taking into account overall costs, each user should find his own optimum point for
periodic intervals.
For meshed distribution lines with frequent faults occurrence, a reactive approach where
user will service an equipment that failed when detected a wrong behaviour, could be
followed without major problems.
For high responsibility high voltage critical short transmission lines with low frequency of
faults occurrence, that reactive approach would be unacceptable. In many cases,
redundant schemes with different manufacturers, models or protection principles, may
help. Nevertheless, the common mode failures make it still important the periodic testing.
In case a common battery with a single fuse may be a weak point even when complex
hardware or software IEDs protection schemes are used.
Period testing should preferably be done with modern automatic test sets that cover a
significant part of the IED functionality. The trend is to carry out complex and
comprehensive testing during SAT (Site Acceptance Tests), while periodic tests are
limited to simpler tests. This was a good approach in the past when simple, reduced
number of functions equipments was used and testing tools were quite simple. Nowadays,
computer programmable test sets may allow quick and productive comprehensive testing
during both FAT and periodic testing.
When protection relays work normally during normal system faults, it is enough to check
relay operation with the fault information and relay recorded data.
However, in case of the complicated system faults where it is suspected a relay mal-
69/80
operation, we need additional information like SOE (Sequence of events) records,
disturbance records, fault reports, relay settings, etc.
In the case of some relays, the data can only be retrieved at the substation. In case of
remote operation system, we can get the recorded data from a maintenance centre. So
we can do the relay operation analysis faster.
The settings change of protection relay occurs as a result of the change of a system
constant and the reconsideration of the system operation. At some utilities, setting values
are changed on the system change by using a remote operation function from a
dispatching centre. For utilities that have frequent system changes, it is very effective that
engineers don’t have to go to the substations.
When implementing settings changes via the remote operation, the security must be paid
attention not to have unjust access from outside. Special setting change that
accompanies facility fault occurs suddenly regardless of the time, most of them caused by
the natural phenomena such as the earthquake, the heavy rain, the windstorm, the snow
damage. Engineers have to go to the substation through dreadful weather. Therefore, if
the setting change by remote operation can be applied, it is possible to secure the safety
of engineers in addition to fast system restoration.
The technique to judge the degradation tendency of the relays is introduced by comparing
a relative error of measuring current/voltage data. Concretely, in case of dual protection
relaying, the sampled current/voltage data are compared with each other at the same time
and we can manage the degradation tendency of the analogue input part.
In cases when flash memories are used for relay, utility is able to rewrite a sequence. For
example, if utility wanted to change a policy of reclosing for line protection, utility can be
able to rewrite a reclosing logic by using remote personal computer. The maintenance
engineer of utility and the technical engineer of manufacturer go to a substation and repair
software now. However, the engineer of utility could repair software by using remote
operation from a maintenance centre.
The labour will be saved by the decrease of the opportunity to go to a substation both of
the utility and manufacturer. The major challenges are:
70/80
7.3.2 Measures for security
71/80
8 CONCLUSIONS
In this report we have dealt with the various forms of secondary system change. Several
driving factors for change have been described as well as practical refurbishment
strategies in several countries. Cost constraints and technical factors have a major
influence in these business decisions. The authors have sent a survey that has been
answered by different actors (utilities, consultants, etc.) of several countries. Several
conclusions might be extracted from the experience shared between the authors of this
paper:
Definitions
In certain cases, one could wonder whether there is or not an urgent need for change.
This report describes ways to quantify such need.
The need to minimize down time makes it interesting sometimes replacing both secondary
and primary systems in the same field service.
Main drivers for change have been identified as quality of service, cost of implementation
and risk associated with change or with no change.
New functionality is rarely identified as one of the major drivers for change by users.
Cost is the driving factor for change as many factors may be eventually translated into
cost. Some clues of how to calculate the overall costs are given in this paper.
Refurbishment strategies
Refurbishment strategies are many times conditioned by the need to continue supplying
electricity to certain users.
There are several methods to calculate total life cycle costs. All of them have a common
ground and take into account the initial acquisition costs as only one component of the
many ones that one has to take into account in electrical projects.
There are numerous strategies for change. They depend of factors such as geography,
voltage level, technology, customer know-how and mix of products installed.
Several countries have described their experiences facing product aging, failures, etc
All migration and general change strategies may represent some risks. New digital
equipments may need to take into account EMC (electromagnetic compatibility) and
environmental conditions that were not an issue in electromechanical technologies.
72/80
Practical experiences
From each experience we may learn best practices, taking into account that not all
practices may be applicable sometimes in all situations due to different contexts.
Manufacturers may play a key part in contributing to a seamless and successful
refurbishment, replacement strategy.
Trends
Self checking modern IED’s capabilities may help to reduce the need of commissioning
and reduce overall maintenance time and cost.
Self check may help to improve installation reliability by detecting early failures that could
derive, if not properly addressed, into major system unavailability.
73/80
9 REFERENCES
1. Distance Protections: What Limits of Use for Heavy Loaded Very High Voltage
Lines? J.M. Grellier, J.L. Chaneliere, FR 306, Madrid Colloquium 2007
2. Protection Relay Life Cycle Management, Christopher Smith, John Wright, Steve
Pickering, March 2008
3. Guidelines for Specification and Evaluation of Substation Automation Systems,
CIGRE WG B5.18, August 2007
4. “Digital relay software quality”, Elaine Y. Wintraub GE Protection and control –
Charles R. Heisking , Associated Power Analyst, Philadelphia, 1993
5. “G60 Generator Management Relay UR series instruction manual”, GEK-106411A
version 3.3X, GE Multilin, March 2003. Latest manual version available on the link:
http://www.gedigitalenergy.com/app/ViewFiles.aspx?prod=g60&type=3
74/80
10 APPENDIX
From manufactory point of view six years test interval is quite long for the new digital
relays. The end-user cannot rely that the internal self-supervision is able to detect all
major internal faults. With the first and the second generation of the numerical relays the
self-supervision could detect not more than 80 % of internal faults. The self-supervision of
modern generation numerical devices is proved; statistics of the self-supervision is not
available. However experiences with internal self-supervision of the latest generation are
encouraging.
As a general comment, one of the domination parts of the operating costs is the
maintenance and all relating costs. In order to optimize the service strategy, all relevant
cost portions have to be considered. Different maintenance strategies such as time
based, corrective, condition based or reliability centred maintenance have different impact
on life cycle cost. The decisive parameters have to identify and their influence on the
overall cost has to determine, so individual calculations are necessary for the practical
application of these principles. The duly investigation on the life cycle cost and a tight
asset management reduces the overall cost and contributes to the economical benefit of
the operating utility.
75/80
Basic Organization Chart
MONITORING
INFORMATION
MAINTENANCE ON-CALL
MANAGEMENT TEAMS
76/80
Control of operating logics
Interaction with operating components
Interaction with other equipment
Records control
Oscillographs collected and checking of recorded signals
Control of the analogue-digital converter response
Measurement of in-service values
Measurement under controlled injections (inputs)
Control of established settings
Checking based on theoretical setting list
Earlier protection schemes may not be considered sufficient anymore and thus also the
increased performance and functionality capabilities can be a driver for change.
Functional integration capabilities make it possible to group all the feeder functions into a
single device thus replacing a collection of elementary elements. This reduces the cost of
the spare parts and copes with the new functional needs. Other drivers for change may be
equipment standardisation
77/80
The new business needs, which require more information, will direct the utilities to
upgrade the existing substations. Therefore information is needed about the industrial as
well as other types of customers, i.e. computerized load forecast, complicated metering
system bulk trading and energy management. The accuracy and the reliability of the data
depend on the utilities/traders. Therefore the data availability gives the utility the chance to
be strong in very competitive field. In next subchapters the major technical issues that
require the upgrading of the existing conventional substation are described.
10.3.1 Hardware
Output relays
The main processor does not have any way of checking if an output relay operated unless
there is a feedback. This feedback may come from voltage and/or current supervision
schemes.
The tripping (or closing) circuits work like a series connection in a reliability block diagram
approach. It includes several components that may fail, like battery, wires, relay output
contact, breaker trip (or close) coil, breaker auxiliary contacts (52a and/or 52b), possibly
burden resistors. Some equipment has the capability to monitor the integrity of the
COMPLETE circuit. Therefore this should be called, trip circuit supervision, avoiding the
term self supervision.
78/80
AC circuit
Protections typically have 1 to 12 ac inputs, including current or voltage type inputs. Most
times they come from conventional VTs and CTs. Other times they come from more
modern sensors that provide low level signals (i.e. Low power transformers, Rogowski
coils). In these circumstances they provide analogue low level signals that must be
converted to digital for signal processing. Some protections used spare analogue
multiplexed channels in their internal analogue to digital conversion circuit, to double
check signals sanity by comparing the main voltage reference with another secondary
reference.
Power supply
Power supply is a critical component of an equipment and it suffers more electrical stress
than other low voltage internal circuits. Therefore some ways of voltage monitoring could
be used to detect consumption, voltage, temperature or other parameters that may help to
predict or detect a failure. Obviously it is better prevention than detection.
Batteries
Some equipments use batteries to store information when main auxiliary voltage is not
present. Due to limited battery life, it should be monitored to detect a low voltage before it
actually losses its complete function to store this information.
Communications
10.3.2 Software
79/80
− Hardware Watchdog.
− Software Watchdog.
− CRC (cyclic redundant check) checking in non volatile memory circuits logs.
− CRC main program checking
− Virtual logic token checking
− Memory utilization
The manufacturer should clearly describe:
− Which component is being tested.
− When and how often is it tested.
− Which message is provided.
− Description of the problem
− Effect and criticality
− What should the user do
− What does the relay do automatically
− Supervision effect on product availability
Recommended action:
Contact factory for service.
Minor self-test errors result in:
− Faceplate “minor error” LED indicator turned on.
− Internal “minor error” flag set to logic level 1.
Recommended action:
Keep reset key pressed for 5 seconds. Switch auxiliary power off and on. If not cleared,
please contact factory for service.
80/80