IEC 61850: sections and benefits of the standard

With the development of digital technology, manufacturers of electrical equipment did not stand aside. Despite the existence of an international ISO classification, the European standard IEC 61850, which is responsible for substation systems and networks, was used in Russia.

A bit of history

The development of computer technology has not spared the network management system. The generally accepted IEC 61850 standard was originally introduced in 2003, although attempts to introduce systems on this basis were made back in the 60s of the last century.

Its essence boils down to the use of special protocols for managing electrical networks. Based on them, the functioning of all networks of this type is now monitored.

If earlier the main attention was paid exclusively to the modernization of computer systems that control the electric power industry, then with the introduction of rules, standards, protocols in the form of IEC 61850, the situation has changed. The main objective of this GOST was to ensure monitoring in order to timely identify malfunctions in the operation of the corresponding equipment.

Protocol IEC 61850 and its analogues

The protocol itself began to be most actively applied in the mid-80s. Then, modifications of IEC 61850-1, IEC 60870-5 versions 101, 103 and 104, DNP3 and Modbus, which turned out to be completely untenable, were used as the first tested versions.

And it was the initial development that formed the basis of the modern UCA2 protocol, which in the mid-90s was successfully applied in Western Europe.

How it works

Dwelling on the issue of functioning, it is worth explaining what the IEC 61850 protocol is for dummies (people who only comprehend the basics of working and understanding the principles of communicating with computer technology).

The bottom line is that a microprocessor chip is installed at the substation or power station, which allows transmitting data on the state of the entire system directly to the central terminal that performs the main control.

Data transmission, which provides for GOST R IEC 61850, is carried out through a high-speed connection. Roughly speaking, the chip is bound to the nearest LAN.

DAS (Data Acquisition System) uses at least 64-bit transmission in conjunction with the corresponding data encryption algorithms .

But, as practice shows, these systems are also quite vulnerable. Have you watched American films when in one of the episodes the power supply of an entire block is turned off? Here it is! Management of electrical networks based on the IEC 61850 protocol can be coordinated from any external source (it will be further understood why). In the meantime, consider the basic system requirements.

IEC 61850 Standard R: Communication Systems Requirements

If previously it was implied that the signal should be transmitted using a telephone line, today communications have stepped far forward. Built-in chips are capable of providing transmission at the level of 64 Mbps, being completely independent from providers that provide standard connection services.

If we consider the IEC 61850 standard for "dummies", the explanation looks quite simple: the power unit chip uses its own data transfer protocol, and not the generally accepted TCP / IP standard. But that is not all.

The standard itself is the IEC 61850 data transfer protocol with a secure connection. In other words, connecting to the same Internet, wireless network, etc., is carried out in a very specific way. In the settings, as a rule, the parameters of proxy servers are used, since those (even virtual ones) are the most secure.

General scope

It is clear that according to the requirements set by GOST IEC 61850, installing this type of equipment in a conventional transformer box will not work (there is simply no place for a computer chip).

Such a device with all the desire, too, will not work. He needs at least an initial input / output system akin to the BIOS, as well as an appropriate communicative data transfer model (wireless network, wired secure connection, etc.).

But in the control center of a common or local energy network, you can access almost all the functions of power plants. An example, though not the best, is the film “The Core” (The Core), when a hacker prevents the death of our planet by destabilizing the energy source that feeds the “backup” version of the Earth’s core.

But this is pure fantasy, rather, even a virtual confirmation of the requirements of IEC 61850 (although this is not explicitly stated). Nevertheless, even the most primitive emulation of IEC 61850 looks exactly like that. But how many disasters could have been avoided?

The same 4th unit of the Chernobyl nuclear power plant, if diagnostics were installed on it that would meet at least IEC 61850-1 standard, would probably not have exploded. And since 1986, it remains only to reap the fruits of what happened.

Radiation - it is such that it acts covertly. In the early days, months, or years, the symptoms of radiation sickness may not appear, not to mention the half-lives of uranium and plutonium, which few people today pay attention to. But the integration of the same Geiger counters in the power station could significantly reduce the risk of staying in this zone. By the way, the protocol itself allows you to transfer such data at the software and hardware level of the involved complex.

Modeling technique and conversion to real protocols

For the simplest understanding of how, for example, the IEC 61850-9-2 standard works, it is worth saying that not a single iron wire can determine the direction of the transmitted data. That is, we need an appropriate repeater capable of transmitting data about the state of the system, and in encrypted form.

To receive a signal, as it turns out, is quite simple. But in order for it to be read and decrypted by the receiving device, you have to sweat. In fact, in order to decrypt the incoming signal, for example, based on IEC 61850-2 at the initial level, you need to use visualization systems like SCADA and P3A.

But based on the fact that this system uses wired communications, the main protocols are GOOSE and MMS (not to be confused with mobile messages). The IEC 61850-8 standard performs such a conversion by sequentially using first MMS and then GOOSE, which ultimately allows the display of information on P3A technologies.

Basic types of substation configuration

Any substation using this protocol must have at least a minimum set of means for transmitting data. Firstly, this applies to the physical device connected to the network. Secondly, each such unit must have one or more logical modules.

In this case, the device itself is capable of performing the function of a hub, gateway, or even a kind of intermediary for transmitting information. The logical nodes themselves have a narrow focus and are divided into the following classes:

  • “A” - automated control systems;
  • "M" - measurement systems;
  • “C” - telemetry control;
  • “G” - modules of common functions and settings;
  • “I” - communication setup tools and applied methods of data archiving;
  • “L” - logical modules and system nodes;
  • "P" - protection;
  • "R" - related protective components;
  • "S" - sensors;
  • "T" - measuring transformers;
  • “X” - block contact switching equipment;
  • "Y" - power type transformers;
  • "Z" - everything else that is not included in the above categories.

It is believed that the IEC 61850-8-1 protocol, for example, is able to provide less use of wires or cables, which, of course, only positively affects the simplicity of the equipment configuration. But the main problem, as it turns out, is that not all administrators are able to process the received data even with the appropriate software packages. Hopefully this is a temporary problem.

Application software

Nevertheless, even in a situation of incomprehension of the physical principles of the operation of programs of this type, IEC 61850 emulation can be performed in any operating system (even in a mobile one).

It is believed that management personnel or integrators spend much less time processing data coming from substations. The architecture of such applications is intuitive, the interface is simple, and all processing consists only in the introduction of localized data with the subsequent automatic output of the result.

The disadvantages of such systems include the exaggerated cost of P3A equipment (microprocessor systems). Hence the impossibility of its mass application.

Practical use

Prior to this, everything stated in relation to the IEC 61850 protocol concerned only theoretical information. How does it work in practice?

Suppose we have a power plant (substation) with three-phase power and two measurement inputs. When defining a standard logical node, the name MMXU is used. There can be two of them for the IEC 61850 standard: MMXU1 and MMXU2. Each such node may also contain an additional prefix to facilitate identification.

An example is the simulated XCBR-based node. It is identified using some basic operators:

  • Loc - local or remote location;
  • OpCnt - a technique for counting completed (performed) operations;
  • Pos - an operator responsible for location and similar to Loc parameters;
  • BlkOpn - command to disable the switch lock;
  • BlkCls - enable blocking;
  • CBOpCap - selection of the operation mode of the switch.

Such a classification for describing CDC data classes is mainly used in 7-3 modification systems. However, even in this case, the configuration is based on the use of several features (FC - functional limitations, SPS - state of a single control point, SV and ST - properties of the substitution systems, DC and EX - description and advanced definition of parameters).

Regarding the definition and description of the SPS class, the logical chain includes the stVal properties, the quality is q, and the current time parameters are t.

In this way, data is converted by Ethernet connection technologies and TCP / IP protocols directly into the MMS object variable, which is then identified with the assigned name, which leads to the true value of any indicator currently used.

In addition, the IEC 61850 protocol itself is just a generalized and even abstract model. But on its basis, a description is made of the structure of any element of the power system, which allows microprocessor chips to accurately identify each device involved in this area, including those that use energy-saving technologies.

Theoretically, the protocol format can be converted to any data type, based on the MMS and ISO 9506 standards. But why, then, was the IEC 61850 control standard chosen?

It is associated exclusively with the reliability of the obtained parameters and the easy process of working with the assignment of complex names or models of the service itself.

Such a process without involving the MMS protocol is very time-consuming even when generating queries like “read-write-report”. No, of course, this type of conversion can be performed even for the UCA architecture. But, as practice shows, it is the application of the IEC 61850 standard that allows you to do this without much effort and time.

Data Verification Issues

However, this system is not limited to reception and transmission. In fact, embedded microprocessor systems allow data exchange not only at the level of substations and central control systems. They can, with the appropriate equipment, process data between themselves.

An example is simple: an electronic chip transmits data on current strength or voltage in a critical section. Accordingly, any other subsystem based on the voltage drop can enable or disable the additional power system. All this is based on the standard laws of physics and electrical engineering, however, it depends on the current. For example, our standard is 220 V. The voltage in Europe is 230 V.

If you look at the criteria for deviations, in the former USSR it is +/- 15%, while in developed European countries it is no more than 5%. It is not surprising that branded Western equipment simply fails only because of power surges.

And probably, it’s not necessary to say that many of us are observing in the courtyard a structure in the form of a transformer box, built back in the days of the Soviet Union. Do you think you can install a computer chip there or connect special cables to get information about the status of the transformer? That’s it, that it’s not!

New systems based on the IEC 61850 standard allow full control of all parameters, but the apparent impossibility of its widespread implementation repels the corresponding services like Energosbyt in terms of enabling protocols of this level.

There is nothing surprising in this. Companies that distribute electricity between consumers may simply lose profits or even privileges in the market.

Instead of a total

In general, the protocol, on the one hand, is simple, and on the other, very complex. The problem is not even that today there is no corresponding software, but that the entire system of control over the electric power industry, which we inherited from the USSR, is simply not prepared for this. And if we take into account the low qualification of the service personnel, there can be no question that someone is able to control or fix problems in a timely manner. After all, is it customary for us? Problem? We deenergize the microdistrict. That's all.

But the use of this standard avoids this kind of situation, not to mention all sorts of blackouts.

Thus, it remains only to take stock. What does the end user use the IEC 61850 protocol? In the simplest sense, it is uninterrupted power supply with no voltage drops in the network. Note that if the computer terminal or laptop does not provide for the use of an uninterruptible power supply unit or voltage stabilizer, a drop or a surge can cause an instant shutdown of the system. Well, if you need to restore at the software level. And if the RAM slots burn down or the hard drive fails, then what should I do?

This, of course, is a separate subject for research, but the standards themselves, now used in power plants with the appropriate hardware and diagnostic software, are able to control absolutely all network parameters, preventing situations with the emergence of critical failures that can lead not only to breakdown of household appliances , but also to the failure of all home wiring (it is known that it is designed for no more than 2 kW with a standard voltage of 220 V). Therefore, including at the same time a refrigerator, a washing machine or a boiler for heating water, think a hundred times how justified it is.

If these protocol versions are involved, the subsystem settings will be applied automatically. And to the greatest extent this relates to the operation of the same 16-amp fuses that residents of 9-story buildings sometimes install themselves, bypassing the services they are responsible for. But the price of the issue, as it turns out, is much higher, because it allows you to circumvent some of the restrictions associated with the above mentioned standard and its related rules.

Source: https://habr.com/ru/post/K4316/


All Articles