Centralized Protection IED Management, Remote Accessibility, and Substation Fault File Collection solution provide vendor and protocol agnostic remote access to IEDs for settings and automated disturbance records collection.
Overview
Centralized Protection IED Management, Remote Accessibility and Fault file collection solution provides remote access to IEDs, downloads disturbance records and IED settings. The system is vendor agnostic and with the rich protocol support in SYNC 3000 and SYNC 2000, the solution enables data collection from IEDs communicating on standard and proprietary protocols and their transmission to the control center.
Transforming the existing electric power infrastructure through an asset management and monitoring solution is a critical aspect of the Smart Grid and is the way forward to increase efficiency and reliability. With two-way digital communication, Centralized IED Management system together with Automatic Fault Analysis Systems can collect disturbance data remotely, analyse disturbances and initiate corrective action. Utilities can therefore take proactive action to manage grid disturbances and prevent blackouts.
Power grids are monitored and controlled by advanced substation automation systems, which consist of different types of intelligent electronic devices (IEDs), installed in substations. These devices perform various functions including primary and secondary protection, monitoring, control and maintain system stability. A disturbance in the system hampers the smooth functioning of the power grid. To analyse these disturbances, utilities need to put in place Remote Access Systems to remotely collect data from substation IEDs, and Automatic Fault Analysis System (AFAS) to understand the captured disturbance records. An AFA system would enable IED operation analysis which enable the user to take necessary steps to prevent outages thereby increasing efficiency and reliability. This is one critical requirement for utilities that plan to move towards unmanned remotely managed substations in the future.
Power System Enterprise Suite (PSES) is an application that helps set up a central monitoring system to effectively monitor, maintain and manage IEDs at multiple locations in a Power System. Utilities face challenges in maintaining and managing multiple makes IEDs installed in substations/power plants across multiple locations. PSES provides a solution to this problem by enabling the utility to set up a central monitoring system and offers powerful redundancy support to establish geographically separated mirrored control centres.
Architecture
PSES Software
SYNC 3000Substation Data Concentrator
SYNC 2000Substation Terminal Server and Protocol Converter
Hierarchical modelling of substations and IEDs
Enables configuration of IEDs from a control center or any other location
Backup and version management of setting and configuration files of IEDs
Retrieval of disturbance records from
IEDs
Storage of disturbance data for immediate and future analysis
Enable analysis of disturbance data
Online health monitoring of devices
Authentication and access control of assets based on roles
Communication alarms and events list
Robust redundancy support
Hierarchical Modelling :PSES offers an intuitive, easy to understand model, displaying all substation devices in a hierarchical tree of substation assets. All IEDs, protection equipment, recorders, event loggers and gateways can be represented in this hierarchical model. The model is organized into network, substation, bay and device levels which can be grouped for operational convenience.
Disturbance Data Handling:
Comparative analysis of disturbance data generated by devices at various locations across the network has been a challenge for protection engineers and system operators. Along with the Kalkitech substation data concentrator, PSES collects disturbance data from various sources including event loggers and protection equipment. This data is made available in a common format for further analysis. PSES also provides a visualization interface for viewing and analyzing disturbance records. Protection operation/substation events from event recorders are also displayed to aid effective analysis of disturbance events. The disturbance data is tagged and archived in a central database and users can initiate analysis of any past fault
User Authentication: PSES includes a mechanism for remote configuration of substation equipment. The system should be configured to ensure access to authorized users only. PSES provides configurable
user roles that can be assigned to individual users. Activities performed by each user is logged by the system, creating an audit trail
Remote Configuration: PSES enables configuration/programming of remote IED from a central location using the vendor-supplied tools. The system automatically archives the configuration into backup files after modification. PSES allows easy retrieval of archived configurations along with an audit trail. These backups are mirrored into redundant storage locations.
Disturbance Viewing: PSES is equipped with an optional module to view waveforms and phasors to analyze the disturbance data retrieved from various devices.
Online Device Monitoring: The runtime view of PSES provides details about the status of each of the configured assets. This includes NMS Information mapped through SNMP, Alarms, and events filtered for a particular device or group of devices and a summary in a web-based dashboard.
Redundancy Support: PSES supports hosting of the control center in multiple locations with redundant servers at each location. The redundancy Manager of PSES synchronizes user files and the database between redundant servers. Failure are automatically detected and the switch over to the redundant system occurs automatically.
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Cookie
Duration
Description
cookielawinfo-checkbox-analytics
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional
11 months
The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy
11 months
The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.