260 likes | 600 Views
Supervisory Systems. Supervisory Systems: Introduction. Purpose: To provide the user with the capability to exercise control over a specific device. To confirm its performance in accordance with the directed action. The commonly used name is SCADA. Supervisory Systems in Power Systems.
E N D
Supervisory Systems: Introduction Purpose: • To provide the user with the capability to exercise control over a specific device. • To confirm its performance in accordance with the directed action. • The commonly used name is SCADA.
Supervisory Systems in Power Systems Objective: • To provide system operators with efficient information and control capabilities. • To operate the power system in a safe, secure and economic manner.
Typical Supervisory System Fig.1 Typical Supervisory System
Types of Supervisory Systems • SCADA (Supervisor Control and Data Acquisition) • SCADA/AGC • EMS (Energy Management System) • DMS (Distribution Management System) • Load Management System (LMS)
1. SCADA • A SCADA system, strictly speaking, is limited to performance of traditional function such as the gathering of data and performance of control functions. • A small amount of record keeping and other data reporting functions are usually included.
2. SCADA / AGC • A SCADA and automatic generation control (AGC) system is similar to a simple a SCADA system except some limited generation control capabilities are included. • These capabilities include the ability to calculate area control error, monitor frequency and tie lines and perform a limited economic dispatch of a few generating units.
3. EMS (Energy Management System) • The energy management system (EMS) incorporates all the features of SCADA systems in terms of gathering data and performing control. • It typically will include a fair amount of computing power and probably extensive online data storage. • The user interface (UI) may be very complex, including the use of full graphic CRT’s, dynamic map boards and many recording charts. • Software frequently includes compute-intensive programs for contingency analysis, security functions, scheduling, load flows and optimal power flows. • Because the EMS is often considered the heart of the utility’s main control center, it probably includes extensive capabilities for record keeping and data exchange.
4. DMS (Distribution Management System) The distribution management system (DMS) is the next logical step after a utility has implemented an EMS. Initially it was viewed as a means to monitor distribution feeder loads and to control the distribution portion of the substation. Technology has lowered the cost of control and supervision of devices located throughout the feeder lines to the point where it is now becoming routine. The DMS frequently includes topology analysis and load flow programs that allow rapid identification of problems and restoration of service.
5. Load Management System (LMS) • The intent of a load management (LM) system is to control peak demand and provide other economic benefits without major inconvenience to the customer. • An LM system can be stand-alone or it can be integrated into an EMS or DMS.
Network Application in EMS Typical Applications [1] State Estimation [2] Security Analysis [3] Power/Load Flow [4] Optimal Power Flow Unlike other EMS applications, they depend on power system network models. They may execute in EMS real-time and study environments
Real Time and Study Environment In the real time environment network applications execute periodically with virtually no operator interaction. They draw attention to actual or potential problems and provide operating data enabling a corresponding course of action. In the study environment they execute on demand to facilitate operator analysis of different operating scenarios associated with past, present or future power system conditions.
A. Real Time Environment Fig. 2 Real Time Environment
Real Time Environment (Contd.) State Estimation, Security Analysis and Optimal Power Flow applications provide the real time means of developing controls for operating power systems securely. To achieve this objective, they execute sequentially, validating the condition of the power system. Fig.2 illustrates the real time environment.
Real Time Environment (Contd.) • Execution of the network applications may be initiated several ways. • Commonly they execute continually at periodic rates that range from 5 to 20 minutes. • Operators can set the optimum rates within limits governed by EMS computing power. • State estimation is the first application to execute. State Estimation uses telemetered, scheduled and manually entered data to determine the network topology and state of the power system. • Network topology refers to the connectivity of the power system components and is determined from status information collected by SCADA. • Once the state of the power system is calculated security analysis may be execute, followed by optimal power flow.
Real Time Environment (Contd.) • Security Analysis determines the potential impact of contingencies. • OPF recommends the control that may be used to correct actual violations and/or prevent or correct contingency violations. • In Fig.2 it is assumed that the controls recommended by OPF are implemented automatically in closed loop fashion via active control, reactive control and SCADA. • SCADA sends EMS commands controlling circuit breakers, transformers, phase shifters and generators via remote terminal units.
Real Time Environment (Contd.) • Typically active control includes automatic generation control and economic dispatch. • Acting through SCADA, AGC/ED performs generation control for very few seconds to meet load and interchange schedules economically. • OPF, however, passes generating unit limits at the slower periodicity of the network applications. • Reactive control provides an OPF interface that serves the potential need for coordinating reactive power controls such as generator voltage schedules; transformer taps and shunts capacitor/reactor banks. • Though the controls may pass from OPF to SCADA directly reactive control also allows for more frequent power system feedback to be taken into account.
B. Study Environment Fig.3 Study Environment
Study Environment • The network applications commonly used for studies are Power flow, OPF and security analysis. • Fig.3 illustrates the study environment where OPF includes the Power flow applications. • Execution of each study application is controlled by the operator in an environment that is separate from the real time environment. • Typically, the study environment allows several operators to make concurrent studies on a noninterference basis and is supported by the ability to store and retrieve input/output results through a library of save cases.
Study Environment (Contd.) • Once satisfied that the study case is correct the operator normally execute power flow or OPF and reviews the results. • The operator can save the results and execute Security Analysis to determine the potential impact of contingencies. • After reviewing the output from security analysis, the operator may choose to apply a particular contingency such as the one that has the severest impact to the study case.
Network Topology Processing Topological Classification
Computer Control of Power Systems Experimental automatic area control