Understanding and Simulating The IEC 61850 Standard: Article

You might also like

You are on page 1of 13

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/32964907

Understanding and Simulating the IEC 61850 Standard

Article · May 2008


Source: OAI

CITATIONS READS
38 13,252

2 authors, including:

Roy Campbell
University of Illinois, Urbana-Champaign
616 PUBLICATIONS   15,954 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

SIFT PROJECT View project

Trustworthy Infrastructure for the Power Grid (TCIP) Information Trust Institute Illinois View project

All content following this page was uploaded by Roy Campbell on 11 November 2015.

The user has requested enhancement of the downloaded file.


Understanding and Simulating the IEC 61850 Standard ∗

Yingyi Liang Roy H. Campbell


Department of Computer Science
University of Illinois at Urbana-Champaign
Urbana, IL 61801
{yliang6, rhc}@uiuc.edu

Abstract to work together in a single substation. Today most util-


ities and device manufacturers have recognized the need
The recent international standard IEC 61850 proposes a
for a unified international standard to support seamless
unified solution of the communication aspect of substa-
cooperation among products from different vendors.
tion automation. However, the standard itself is not eas-
The IEC 61850 international standard, drafted by sub-
ily understood by users other than domain experts. We
station automation domain experts from 22 countries,
present our understanding of the IEC 61850 standard as
seeks to tackle the aforementioned situation. This stan-
well as the design and implementation of our simulation
dard takes advantage of a comprehensive object-oriented
tool in this report. Also, we give suggestions on the im-
data model and the Ethernet technology, bringing in great
plementation of this standard based on our experience
reduction of the configuration and maintenance cost. Un-
and lessons in the development of our simulation.
like its predecessor, the Utility Communication Architec-
ture protocol 2.0 (UCA 2.0) [12], the IEC 61850 standard
1 Introduction is designed to be capable for domains besides substation
automation. To make the new protocol less domain de-
Today, power substations are mostly managed by substa- pendent, the standard committee endeavored to empha-
tion automation systems. These systems employ com- size on the data semantics, carving out most of the com-
puters and domain specific applications to optimize the munication details. This effort, however, could result in
management of substation equipment and to enhance op- difficulties in understanding the standard.
eration and maintenance efficiencies with minimal hu- In this research project, we aim to get a clear under-
man intervention [8]. standing of the IEC 61850 standard and simulate the pro-
Once upon a time, substation automation systems tocol based on J-Sim [11]. Our ultimate goal is to inves-
utilized simple, straightforward and highly specialized tigate the security aspect about the IEC 61850 standard.
communication protocols [7]. These protocols con-
cerned less about the semantics of the exchanged data,
data types of which were relatively primitive. Equipment
2 The IEC 61850 standard
was dumb and systems were simple. However, today’s
The first release of the IEC 61850 consists of a set of
substation automation systems can no longer enjoy such
documents of over 1,400 pages. These documents are di-
simplicity because of their growing complexity — equip-
vided into 10 parts, as listed in Table 1. Part 1 to Part
ment becomes more intelligent and most of those simple
3 give some general ideas about the standard. Part 4 de-
old systems have been gradually replaced by open sys-
fines the project and management requirements in an IEC
tems, which embrace the advantage of emerging tech-
61850 enabled substation. Part 5 specifies the required
nology like relational database systems, multi-task oper-
parameters for physical implementation. Part 6 defines
ating systems and support for state-of-the-art graphical
an XML based language for IED configuration, present-
display technology.
ing a formal view of the concepts in the standard. Part
Besides, devices from different manufacturers used
7 elaborates on the logical concepts, which is further di-
different substation automation protocols [9, 3, 12], dis-
vided into four subparts (listed in Table 2). Part 8 talks
abling them to talk to each other. Utilities have been pay-
about how to map the internal objects to the presenta-
ing enormous money and time to configure these devices
tion layer and to the Ethernet link layer. Part 9 defines
∗ This work was funded by NSF CNS 03-05537. the mapping from sampled measurement value (SMV)
to point-to-point Ethernet. The last part gives instruc- groups, each responsible to one part of the stan-
tions on conformance testing. Since Part 7 defines the dard. Due to the different backgrounds and the in-
core concepts of the IEC 61850 standard, we will focus formal presentation style of the standard, the stan-
on this part in this report. dard contains a considerable number of inconsis-
tencies. Such inconsistencies are more obvious for
Subpart Title different parts of the standard, e.g. the data model
7-1 Principles and Models described in Part 6 is clearly different from that de-
7-2 Abstract Communication Service Interface scribed in Part 7.
7-3 Common Data Classes
7-4 Compatible Logical Node Classes and Data 4. The standard committee made a great effort to de-
scribe the protocol in an object-oriented manner but
Classes
the result is not so object-oriented. For example,
Table 2: Subparts of IEC 61850-7 the ACSI services are grouped by different classes,
but reference to the callee object is not defined as a
The IEC 61850 standard is not easy to understand for mandatory argument of the service function.
people other than experts in the substation automation 5. The standard is designed to be implementation in-
domain due to the complexity of the documents and the dependent but this is not always true. For exam-
assumed domain-specific knowledge. Introductory doc- ple, the data attribute TimeAccuracy in Part 7-2
uments on the standard abound [13, 4, 7, 5, 8, 2], but Table 8 is defined as CODED ENUM, while what it
most of them are in the view of substation automation do- virtually represents is a 5-bit unsigned integer; the
main experts. Kostic et al. explained the difficulties they frequent use of PACKED LIST (i.e. “bit fields” in
had in understanding the IEC 61850 standard [7]. In this the C language) also brings implementation details
section, we provide another experience of understanding to interface design.
this standard, trying to explain the major concepts of the
IEC 61850 standard. 6. Things are mixed up in the documents. Mandatory
components and optional components are mixed in
the standard, and domain independent concepts are
2.1 Challenges mixed up with domain specific concepts. Even
Understanding the IEC 61850 standard proposes the fol- though the optional components and mandatory
lowing challenges for a outsider of the substation au- ones are marked with “O” and “M” alternatively, it
tomation domain: would be a tough task to refine a model consisting
only the mandatory components due to the implicit
1. As a substation automation standard proposed by a dependences between attributes in different tables
group of domain experts, the IEC 61850 protocol and the conditional inclusion of some attributes. In
assumes quite an amount of domain-specific knowl- fact, there are 29 common data classes and 89 com-
edge, which is hardly accessible by engineers and patible logical nodes defined in the standard, the re-
researchers out of the substation automation do- lationship among which is unclear.
main. To make things worse, the terms used in
the standard is to some extent different from those 2.2 Intelligent electronic device
commonly used in software engineering, bringing
some difficulties for software engineers in reading In the past, utility communication standards usually as-
the standard. sumed some domain-specific background of the readers.
Consequently, they contained a lot of implicit domain
2. The entire standard, except Part 6, is described in knowledge, which is hardly accessible to outsiders (e.g.
natural language with tables and pictures, which is software engineers) [7]. The IEC 61850 standard does
known to be ambiguous and lack of preciseness. not escape from this category. To help understanding the
This situation is problematic because the IEC 61850 logical concepts of IEC 61850, we would like to lay a
concepts are defined by more than 150 mutually rel- basic idea of intelligent electronic devices (IED), the es-
evant tables distributed over more than 1,000 pages. sential physical object hosting all the logical objects.
A formal presentation of all these concepts would Basically, the term intelligent electronic device refers
be appreciated. to microprocessor-based controllers of power system
equipment, which is capable to receive or send data/con-
3. The experts proposing this protocol come from 22 trol from or to an external source [8]. An IED is usu-
different countries and are divided into 10 working ally equipped with one or more microprocessors, mem-

2
Part Title
1 Introduction and Overview
2 Glossary
3 General Requirements
4 System and Project Management
5 Communication Requirements for Functions and Device Models
6 Configuration Description Language for Communication in Electronic Substations Related to IEDs
7 Basic Communication Structure for Substation and Feeder Equipment
8 Specific Communication Service Mapping (to MMS and to Ethernet)
9 Specific Communication Service Mapping (from Sampled Values)
10 Conformance Testing

Table 1: Parts of the IEC 61850 standard documents

ory, possibly a hard disk and a collection of communi-


cation interfaces (e.g. USB ports, serial ports, Ethernet
interfaces), which implies that it is essentially a computer
as those for everyday use. However, IEDs may contain
some specific digital logics for domain-specific process-
ing.
IEDs can be classified by their functions. Common
types of IEDs include relay devices, circuit breaker con-
trollers, recloser controllers, voltage regulators etc.. It
should be noted that one IED can perform more than one
functions, taking advantage of its general-purpose micro- Figure 1: Substation architecture
processors. An IED may have an operating system like
Linux running in it.
Interactions inside a substation automation system
2.3 Substation architecture mainly fall into three categories: data gathering/setting,
A typical substation architecture is shown in Figure 1. data monitoring/reporting and event logging. The former
The substation network is connected to the outside wide two kinds of interactions are the most important — in the
area network via a secure gateway. Outside remote op- IEC 61850 standard all inquiries and control activities to-
erators and control centers can use the abstract commu- wards physical devices are modeled as getting or setting
nication service interface (ACSI) defined in Part 7-2 to the values of the corresponding data attributes, while data
query and control devices in the substation. There is one monitoring/reporting provides an efficient way to track
or more substation buses connecting all the IEDs inside the system status, so that control commands can be is-
a substation. A substation bus is realized as a medium sued in a timely manner.
bandwidth Ethernet network, which carries all ACSI re- To realize the above kinds of interaction, the IEC
quests/responses and generic substation events messages 61850 standard defines a relatively complicated com-
(GSE, including GOOSE and GSSE). There is another munication structure, as is shown in Figure 2. Five
kind of bus called process bus for communication inside kinds of communication profiles are defined in the stan-
each bay. A process bus connects the IEDs to the tradi- dard: the abstract communication service interface pro-
tional dumb devices (merge units, etc.) and is realized as file (ACSI), the generic object oriented substation event
a high bandwidth Ethernet network. A substation usually profile (GOOSE), the generic substation status event pro-
has only one global substation bus but multiple process file (GSSE), the sampled measured value multicast pro-
buses, one for each bay. file (SMV), and the time synchronization profile. ACSI
ACSI requests/responses, GSE messges and sampled services enable client-server style interaction between
analog values are the three major kinds of data active in applications and servers. GOOSE provides a fast way
the substation network. Since we are less interested in of data exchange on the substation bus and GSSE pro-
communication on the process buses (like sampled value vides an express way of substation level status exchange.
multicasting), we focus on the activities on the substation Sample measured value multicast provides an effective
bus in this report, especially the ACSI activities. way to exchange data on a process bus.

3
ing with other servers like FTP server etc.. Each server
has one or more access points, which are the logical rep-
resentation of a NIC. When a client is to access data or
SMV GOOSE GSSE TimeSync ACSI service of the server, it should connect to an access point
Application
Domain

of this server and establish a valid association.


Specific Communication Service Mapping (SCSM)
Each server hosts several files or logical devices.
Clients can manipulate files in the server like talking to
a FTP server, which is usually used as a means to up-
Communication

MMS load/update the configuration file of an IED. A logical


Stack

device is the logical correspondence of a physical device.


UDP TCP
GSSE It is basically a group of logical nodes performing similar
T-Profile
IP functions.
Ethernet Link Layer Functions supported by an IED are conceptually rep-
resented by a collection of primitive, atomic functional
Figure 2: The communication profiles building blocks called logical nodes. The IEC 61850
standard predefines a collection of template logical nodes
(i.e. compatible logical nodes) in Part 7-4. Besides
2.4 Abstract communication service inter- the regular logical nodes for functions, the standard also
face requires every logical device have two specific logical
nodes: Logical Node Zero (LN0) and LPHD, which cor-
ACSI is the primary interface in the IEC 61850 standard respond to the logical device and the physical device,
not only because it is the interface via which applications alternatively. Besides holding status information of the
talk with servers, but also in the sense that the ACSI com- logical device, LN0 also provides additional functions
munication channel is an important part of a logical con- like setting-group control, GSE control, sampled value
nection between two logical nodes. ACSI defines the se- control etc.. In the IEC 61850 standard, the entire sub-
mantics of the data exchanged between applications and station system is modeled as a distributed system con-
servers, thus it becomes the major part of the IEC 61850 sisting of a collection of interacting logical nodes, which
standard. are logically connected by logical connections. It should
The standard committee adopt an object-oriented ap- be noted that the term logical connection refers to the
proach in the design of ACSI, which includes a hierar- logical concept of the connections between two logical
chical and comprehensive data model and a set of avail- nodes, which can be direct or indirect or even a combina-
able services for each class in this data model. Al- tion of many different kinds of communication channels.
though the data model is usually described outside the In fact, the connection of two logical nodes is usually
scope of the ACSI, it is actually part of it. The ben- both indirect and a combination of TCP, UDP and direct
efits of using an object-oriented utility communication Ethernet connections. We will explain logical connec-
interface are two fold. On the one hand, objects (e.g. tions in Section 2.9.
registers) can be referenced in an intuitive way (e.g. Data exchanged between logical nodes are modeled
“Relay0/MMXU0.voltage”) instead of by the tradi- as data objects. A logical node usually contains sev-
tional physical address (like Reg#02432). On the other eral data objects. Each data object is an instance of the
hand, software engineers can build more reliable appli- DATA class and has a common data class type. Similar to
cations using such service interface. the concept of objects in most object-oriented program-
In the following two sections, we present a brief de- ming languages, a data object consists of many data at-
scription on these two ACSI components. tributes, which are instances of data attributes of the cor-
responding common data class. Data attributes are typed
2.5 Data model and restricted by some functional constraints. Instead of
grouping data attributes by data objects, functional con-
The hierarchical data model defined in the IEC 61850 is straints provide a way to organize all the data attributes in
depicted in Figure 3 and Figure 4. a logical node by functions. Types of data attributes can
Server is the topmost component in this hierarchy. It be either basic or composite. Basic types are primitive
serves as the joint point of physical devices and logical types in many programming languages, whereas com-
objects. Theoretically one IED may host one or more posite types are composition of a collection of primitive
server instances, but in practice usually only one server types or composite types.
instance runs in an IED. A server instance is basically a In the IEC 61850 standard, data attributes are at least
program running in an IED, which shares the same mean- as important as, if not more than, data objects for two

4
SERVER LOGICAL-DEVICE LOGICAL-NODE DATA OBJECT
LOGICAL-DEVICE LOGICAL-NODE DATA OBJECT DATA ATTRIBUTE

LOGICAL-DEVICE LOGICAL-NODE DATA OBJECT DATA ATTRIBUTE

... ... ... ...

Figure 3: Hierarchy of the IEC 61850 data model

reasons. Firstly, data objects are just logical collections


of the contained data attributes while (primitive) data at-
tributes are the de facto logical correspondence to the SERVER

physical entities (memory units, registers, communica- 1


tion ports, etc.); secondly, the purpose of data objects is 1..n
for the convenience of managing and exchanging values
of a group of data attributes sharing the same function. LOGICAL DEVICE

Despite data objects, the IEC 61850 standard provides 1


the concept of data set as another ways to manage and 1..n
exchange a group of data attributes. Members of a data
set can be data objects or data attributes. The concept of Compatible Logical Node LOGICAL NODE
data set is somewhat similar to the concept of view in the
1
area of database management systems. In the IEC 61850
1..n
standard, most services involve data sets. Members in a 0..
n
data set unnecessarily come from the same logical node Common Data Class DATA
or the same data object, thus providing high flexibility 1
of data management. Data sets are categorized into per- 0..2 1
TrgOp
manent ones and temporary ones. Permanent data sets 1 1..n
1 1
are hosted by logical nodes and will not be automatically 1
Functional Constraint FCDA
deleted unless on the owners’ explicit requests; tempo-
1
rary data sets are exclusively hosted by the association
having created them and will be automatically deleted DAType
1..n
when the association ends. 1 1*

BasicType
2.6 Service model
Services provided by ACSI include querying object set, Figure 4: The data model of the IEC 61850
getting/setting data values, controlling system objects,
report manipulation, log manipulation, and other ser-
vices like file upload/download. Table 3 gives a list of 3. S validates the information provided by A and cre-
ACSI services defined in the IEC 61850 standard. ates a TPAA object, which provides a virtual view
All ACSI services are requested by applications and of S to A;
responded by servers. In order to request a service in 4. A requests subsequent services while S processes
a server, an application must first establish a valid two- the requests and responses with appropriate re-
party application association (TPAA) with the server. sponses defined in the IEC 61850 standard;
The TPAA maintains the session states and provides a
virtual view of the server to the application. A typical 5. A issues a Release request to S;
interaction procedure between an application A and a
6. S reclaims the TPAA of A and ends the session.
server S goes as follows:
The virtual view of server provided by a TPAA en-
1. A establishes a TCP connection with S; forces the access control policies set forth by the server.
This virtual view defines which objects in the server are
2. A “logs in” to S by requesting the Associate ser- visible and accessible to the application and what kinds
vice from S, providing authentication related infor- of service of those objects are accessible from the appli-
mation as parameters; cation. The concept of virtual view is very flexible and

5
SERVER: LOG-CONTROL-BLOCK:
GetServerDirectory GetLCBValues
ASSOCIATION: SetLCBValues
Associate QueryLogByTime
Abort QueryLogAfter
Release GetLogStatusValues
LOGICAL-DEVICE: GOOSE:
GetLogicalDeviceDirectory SendGOOSEMessage
LOGICAL-NODE: GetGoReference
GetLogicalNodeDirectory GetGOOSEElementNumber
GetAllDataValues GetGoCBValues
DATA: SetGoCBValues
GetDataValues GSSE:
SetDataValues SendGSSEMessage
GetDataDirectory GetGsReference
GetDataDefinition GetGSSEDataOffset
DATA-SET: GetGsCBValues
GetDataSetValues SetGsCBValues
SetDataSetValues MULTICAST-SAMPLE-VALUE-CONTROL-BLOCK:
CreateDataSet SendMSVMessage
DeleteDataSet GetMSVCBValues
GetDataSetDirectory SetMSVCBValues
Substitution: UNICAST-SAMPLE-VALUE-CONTROL-BLOCK:
SetDataValues SendUSVMessage
GetDataValues GetUSVCBValues
SETTING-GROUP-CONTROL-BLOCK: SetUSVCBValues
SelectActiveSG Control:
SelectEditSG Select
SetSGValues SelectWithValue
ConfirmEditSGValues Cancel
GetSGValues Operate
GetSGCBValues CommandTermination
BUFFERED-REPORT-CONTROL-BLOCK: TimeActivatedOperate
Report Time synchronization:
GetBRCBValues TimeSynchronization
SetBRCBValues FILE transfer:
UNBUFFERED-REPORT-CONTROL-BLOCK: GetFile
Report SetFile
GetURCBValues DeleteFile
SetURCBValues GetFileAttributeValues

Table 3: ACSI services

the IEC 61850 standard does not place any restriction on choice for the internal implementation.
the access control policies of the server. One possible
and relatively simple access control is the world-group-
owner access control for files used in many UNIX sys- 2.7 Reporting and logging
tems. The IEC 61850 standard provides an efficient mechanism
The ACSI interface defines an object-oriented inter- called reporting for applications to track changes to the
face for the applications but it does not require the inter- subscribed system objects. Instead of polling the data
nal implementation to be object-oriented. In actual fact, attribute values periodically, applications can group the
according to our experience on simulating the IEC 61850 interesting data attributes into a data set, and require the
protocol, object-oriented approach might not be a wise logical node hosting this data set report any changes to

6
the members of this data set. Theoretically a data set can plications to monitor changes to the data objects/data at-
contain data objects/data attributes from different logical tributes. GSE is designed for fast delivering notification
nodes, but data sets for reporting usually contain only of system object changes. There are two kinds of GSE,
the data objects/data attributes in the same logical node. generic object-oriented substation events (GOOSE) and
The procedure of report generation and transmission is generic substation state event (GSSE). GOOSE is used
under the control of an information block called report to exchange a wide range of common data while GSSE
control block (RCB). A RCB maintains the necessary in- is used to convey state change information. The GSE
formation to generate a report like which fields should mechanism shares a lot of similarities with reporting,
be included in the report, on what events a report should with the major difference that GSE is designed for fast
be generated, the sequence number of the current report, information exchange inside a substation while reporting
whether this RCB is enabled, etc.. is mainly used for sending notification from the server
A typical report generation and transmission proce- side to remote control centers or browsers.
dure is described as follows: Since real-time performance is critical for GSE mes-
sages, the message format and communication stack for
1. client application creates a data set containing all GSE transmission is very different from those for report-
the data objects and data attributes it concerns; ing. GSE messages are transmitted in binary format,
which provides shorter message body and higher mes-
2. client sets the parameters in a RCB, specifies the
sage encoding/decoding speed. In stead of using TCP
aforementioned data set as the source of the reports
or UDP as the underlying transport layer, GSSE uses its
(this step is called to “subscribe to a data set”) and
specific transport layer while GOOSE messages are sent
enables this RCB;
to the Ethernet link layer directly without going through
3. on any change to any member of the data set, the any transport layer or network layer.
logical node tests this change against the event list GSE also utilizes a publisher/subscriber mechanism to
of the RCB, and issues an internal event if any event transmit the messages. This mechanism is implemented
in the list gets matched; by the Ethernet multicast feature: the publisher sends the
GSE message to a specific multi-cast MAC address and
4. on receiving the internal event, the RCB stores this the subscribers pick up messages sent to this address, put
event for later sending; them into their local buffer for the local applications to
consume.
5. if the condition of sending the report is satisfied, the
logical node collects necessary data, generates the
report and sends it out to the client via the associ- 2.9 Communication network
ation under the direction of the parameters in the
RCB. The IEC 61850 standard defines a distributed system
consisting of interacting logical nodes, which are con-
Reports can be sent by either two-party application as- nected by logical connections. However, in order for this
sociation (TPAA) or multi-party application association distributed system to work correctly and intelligently,
(MPAA). TPAA is the association that can serve only one there must be some intelligent components inside this
client while MPAA can serve more than one client si- network. It is not hard to see that applications play this
multaneously. Reports generated on the request of the role. An interesting question is how to integrate appli-
Report service is sent by TPAA, whereas other reports cations into the interacting logical node network. We try
are sent by MPAA. Reporting uses a publisher/subscriber to answer this question by starting from the simple ACSI
mechanism: for every client, the server must assign an server-application network.
individual RCB to handle the report generation and trans- Figure 5 shows such a server-application network.
mission. Clearly, each server may serve several applications and
Logging is a mechanism to record the device events. vice versa. The dotted lines in Figure 5 refer to the com-
Logs are stored in the server and hosted by the corre- munication channels for reports and GSE messages. Al-
sponding logical device. Unlike reporting, every time a though there are no restrictions about the relationship be-
device event is triggered, the logical device merely saves tween report subscribers and report publishers, it is not
a log entry into the log database for later inquiries. true for GSE messages. The design of GSE has physical
concerns. GSE messages are sent from one IED to an-
other, thus the subscribers and the publishers should not
2.8 Generic substation event
reside in the same IED.
Besides reporting, the IEC 61850 standard defines To make things more clear, let us transform Figure 5
generic substation event (GSE) as another means for ap- into Figure 6, which shows the communication between

7
applications and logical nodes (we hid the communica-
App1 tion to server and logical devices). At this point, we
can clearly see that logical connections between logical
nodes are actually a mixture of several kinds of connec-
tions: when a logical node sends a message to another
Server1
App2 logical node, it is virtually sending reports/GSE mes-
sages to the relevant applications; after necessary pro-
cessing of the reports/GSE messages, the applications is-
sue relevant requests to the other logical node, and vice
App3 versa. Thus we can deploy the application logic to the
relevant logical nodes and get Figure 7 by abstracting
away the applications. Being aware of this abstraction is
Server2 important for both implementation and simulation of the
App4 IEC 61850 protocol.

3 Simulating the IEC 61850


App5

Server3 In this section, we talk about the design and implemen-


tation of a simulator of the IEC 61850 standard. Due to
Figure 5: Server-Application network the challenges listed in Section 2.1, simulating the entire
protocol is very difficult. Since the goal of our simula-
Server1

LN11
tion is to inspect possible security vulnerabilities in the
App1
protocol, we refined the protocol to a version contain-
LN12 ing only data gathering/setting related ACSI services and
reporting services. Furthermore we simplified the data
App2
model by abstracting various data attribute types to string
Server2
and discarding the concept of functional constraint. Cur-
LN21
App3
rently, features of the IEC 61850 protocol supported by
LN22 our simulation model include two-party application asso-
ciation, data attribute, data object, data set, logical node,
App4
logical device, server, ACSI services, reporting and un-
Server3
buffered report control block.
LN31

LN32 App5

3.1 Design and implementation of the sim-


Figure 6: Logical node-application network
ulator
Server1 In order to inspect the IEC 61850 standard, we need a
LN11 tool to simulate the protocol. Demo software of the pro-
tocol exists [10]. However, they are mostly provided by
LN12
the IED manufacturer and are not freely available for re-
Server2 search purposes. Kostic et al. proposed an implementa-
tion of ACSI [6]. The work of Kostic et al. focuses on
LN21
implementing a set of application programming interface
LN22
for device and application development, while we would
Server3
like to build our own simulation tool for further study on
LN31
the IEC 61850, especially on network security issues.
Our simulator consists of about 3,500 lines of Java
LN32
code. Its components are divided into three major cat-
egories: the data model, internal message representation
and the service model. Figure 8 shows the architecture
Figure 7: Logical node network of the simulator.

8
Server Application

Association Service API

Reporting Remote Service API


Object Association Internal
Management Management Messaging

Figure 8: The IEC 61850 simulator architecture

Server to the same object simultaneously. One would resolve


this problem by sequentializing all the received requests,
but since reports could be generated at the time when
... the related data objects are being updated, synchroniza-
LD LD LD
tion mechanism is still needed. One could implement
lock as locking the whole object tree, but this would
lead to severe performance problems, even dead locks.
LN ... LN Our solution is to lock the whole subtree dominated by
the locked object and mark all the ancestor nodes of that
object as partly locked so that these ancestor nodes can-
not be locked by other Associations.
Data Data DataSet URCB ... Each kind of the IEC 61850 objects are implemented
as a subclass of I6Object. These subclasses pro-
vide templates to define the desired specialized classes.
For example, in order to create a specialized logical de-
...
DA DA DA vice class, one just need to derive a subclass from the
LDevice class and use the declareLN method to de-
Figure 9: The IEC 61850 simulator data model clare the member logical nodes in the configure func-
tion.
Using the IEC 61850 data model as the internal data
3.1.1 Data model model has two advantages: on the one hand, there is
The internal data model in the simulator is the same as no need to map the internal data representation to the
the one defined in the IEC 61850 standard. All the IEC IEC 61850 data model in such an approach; on the other
61850 objects are instances of the I6Object class and hand, we can deploy the implementation of the ACSI ser-
are organized as a tree as shown in Figure 9. I6Object vices to the relevant object classes thus achieve a simple
class provides a collection of services to manage the ob- object-oriented approach. However, our simulation ex-
jects. Table 4 lists some frequently used services. perience shows such a simple internal data representation
might not be a good choice because of the following two
Name Description reasons:
addChild adds a child node
1. The data model defined by the IEC 61850 is unnec-
removeChild removes a child node
essarily structured as a tree. Functional constraints
getName gets the node name
present another view of data attributes in a logical
getRef gets the object reference
node, breaking the tree structure maintained by data
create creates a node in the tree
objects.
remove removes a node from the tree
lookup looks up a node in the tree 2. Some ACSI services are not easy to deploy to
list lists the specific child nodes the specific object classes. One example is the
lock locks a specific node CreateDataSet service, which should be im-
unlock unlocks a specific node plemented by the LogicalNode class or the
Association class instead of the DataSet
Table 4: Major services of I6Object class.

The lock and unlock services are necessary be- To maintain the tree structure, one can implement
cause the IEC 61850 standard allows multiple accesses functional constraints as implicit data sets, and redirect

9
SimpleMsg Association Service API
+getValue()
+setValue()
J-Sim Communication
Msg Kernel Service API
Interface
+createSimple()
ComplexMsg
+createComplex()
+createList() +getAttribute()
+getType() +setAttribute()
+toXML() Figure 11: Implementation of the ACSI service
+parseXML()
ListMsg
+appendItem() ListMsg node is a node that represents a list, with each
+listItems()
member also a node. Our message tree is virtually a sim-
plified version of a XML DOM tree. Using such kind of
Figure 10: Internal message of the simulator message representation, we can easily pass the internal
events and service parameters/responses among different
internal objects.
the service requests to the appropriate object class us-
ing a dispatcher in the Association class. Instead of
maintaining an internal representation, we recommend 3.1.3 Service model
an other approach: using a lightweight database system
Figure 11 shows the internal architecture of the im-
as the backend storage support. This approach provides
plementation of the ACSI services on the server side.
several benefits:
Each active association is equipped with an instance of
1. A database system provides the most flexible and AssocAPI. AssocAPI provides the basic ACSI inter-
easiest way to maintain the appropriate tables and face for an association instance. On receiving the appli-
views. A database system incorporates all the nec- cation requests, the association instance invokes relevant
essary services to operate on the object tables, re- services provided by AssocAPI to complete the tasks.
ducing the complexity of maintaining an internal AssocAPI is supported both by the underlying kernel
data representation. services which provides the basic functions to complete
the ACSI service requests, and by the communication
2. A database system supports exclusive object ac- utilities, which talks to J-Sim [11], a network simulator.
cesses, so the engineer does not need to explicitly Instead of delivering the reports using multi-party ap-
perform lock and unlock operations. plication associations, we deliver them to the applica-
tions using the corresponding two-party application as-
3. Database systems are usually optimized for data sociations. The reporting procedure is rather straight-
storage and access, thus the database system ap- forward: when the value of a data attribute is changed
proach can give comparable real-time performance or updated, we check whether this operation satisfies the
against the internal data representation approach. trigger condition. If the trigger condition is met, the data
attribute issues an internal event to all the data sets mark-
3.1.2 Message representation ing it as a member and those data sets will forward the
internal event to the active report control blocks, which
Messages are used in two cases: as internal events and as
generate the reports and send them to the subscribing ap-
requests/responses of ACSI services. Although the IEC
plications. For the sake of simplification, we assume the
61850 standard defines manufacturing message specifi-
members of a data set are all data attributes in our simu-
cation (MMS) as its representation format for informa-
lation.
tion exchange, we would like to use another information
representation format because on the one hand, MMS is
relatively complicated and on the other hand, the details 3.2 Running the simulator
about the MMS standard is not freely available.
One can follow the following steps to create a simulation
Messages in our simulator are represented as at-
scenario and run a simulation:
tributed trees. There are three kinds of tree nodes (Fig-
ure 10): SimpleMsg, ComplexMsg and ListMsg. Step 1 create specialized classes based on the tem-
A SimpleMsg node is a leaf node containing a plate classes.
string value, which is used to represent a value. A The simulation package provides the necessary
ComplexMsg node is a node containing a collection of template classes from Server to DataAttr.
named attributes, the values of which are also nodes. A Users just need to derive a specialized class from

10
the appropriate template class and configure this -and h1/tpaa1/down@
class in the configure method as follows:
cp [$server createTPAA] h2/tpaa2
class DemoRelay connect -c h2/tcp/up@
extends LDevice { -and h2/tpaa2/down@
...
protected void configure() { Step 6 start J-Sim simulation.
declareLN(new DemoXCBR(‘‘XCBR0’’)); Finally, we can start the simulation of the IEC
declareLN(new DemoMMXU(‘‘MMXU0’’)); 61850 standard:
}
} set sim [attach_simulator .]
# start the association instances
Step 2 create applications based on the run h1-2
Application class. # then the application instances
Similar to the previous step, one needs to define run h3-4
his own specialized Application class:

public class DemoApp1 4 Conclusions


extends Application {
protected void _start() { Due to its complexity and the assumed domain-specific
... knowledge, the IEC 61850 standard is difficult for people
} other than domain experts to understand and implement.
} We presented our understanding of the standard as well
as the design and implementation of our simulation of the
Currently, our simulation package only supports IEC 61850 protocol based on J-Sim. Our experience and
talking to one server for each application in- lessons of simulating the protocol show that although the
stance. Enabling an application instance to talk IEC 61850 adopts an object-oriented approach, imple-
to multiple servers remains our future work. menters still need their own internal data representation
or take the advantage of a database system.
Step 3 create the network topology in J-Sim.
We shall build a network scenario to simu-
late. One could easily create the require network 5 Acknowledgments
topology in J-Sim by following the INET Tuto-
rial [1]. It should be noted that only TCP based We would like to thank Zahid Anwar and Jianqing Zhang
communication is supported in current version of for their keen discussions on the IEC 61850 standard.
our simulator.
Step 4 bind Application instances to the J-Sim nodes. References
After the above steps are done, we should bind [1] J-sim inet tutorial, December 2003. http://www.j-sim.
the specialized Application instances to the J-Sim org/drcl.inet/inet_tutorial.html.
network nodes:
[2] B RAND , K.-P. The standard iec 61850 as prerequisite for in-
telligent applications in substations. Power Engineering Society
set server [java::new demo.DemoServer] General Meeting, 2004. IEEE (June 2004), 714–718 Vol.1.
mkdir demo.DemoApp1 h3/app1
[3] DNP U SERS G ROUP . The distributed network protocol. Website.
connect -c h3/tcp/up@ http://www.dnp.org/.
-and h3/app1/down@
[4] D OLEZILEK , D. Iec 61850: what you need to know about func-
tionality and practical implementation. Power Systems Confer-
mkdir demo.DemoApp2 h4/app2 ence: Advanced Metering, Protection, Control, Communication,
connect -c h4/tcp/up@ and Distributed Resources, 2006. PS ’06 (March 2006), 1–17.
-and h4/app2/down@
[5] K IM , G.-S., AND L EE , H.-H. A study on iec 61850 based
communication for intelligent electronic devices. Science and
Step 5 call createTPAA to create TPAAs and bind Technology, 2005. KORUS 2005. Proceedings. The 9th Russian-
them to the J-Sim nodes. Korean International Symposium on (2005), 765–770.
Then bind the TPAA instances to the J-Sim net- [6] K OSTIC , T., AND F REI , C. Modelling and using IEC 61850-7-2
work nodes: (ACSI) as an API. In Power Tech 2007 Proceedings (July 2007).
[7] K OSTIC , T., P REISS , O., AND F REI , C. Understanding and us-
cp [$server createTPAA] h1/tpaa1 ing the iec 61850: a case for meta-modelling. Computer Stan-
connect -c h1/tcp/up@ dards & Interfaces 27, 6 (June 2005), 679–695.

11
[8] M C D ONALD , J. Substation automation. ied integration and avail-
ability of information. Power and Energy Magazine, IEEE 1, 2
(March and April 2003), 22–31.
[9] M ODBUS -IDA. Modbus application protocol specification
v1.1b, December 2006. http://www.modbus-ida.org/.
[10] S YSTEMS I NTEGRATION S PECIALISTS C OMPANY,
I. IEC 61850 evaluation kit CD-ROM. Software.
http://www.nettedautomation.com/solutions/
uca/evalkit/index.html.
[11] T YAN , H. Y., AND H OU , C. J. Javasim: A component-based
compositional network simulation environment. In Proceed-
ings of the Western Simulation Multiconference – Communica-
tion Networks And Distributed Systems Modeling And Simulation
(January 2001).
[12] UCA I NTERNATIONAL U SERS G ROUP, I. Introduction to
UCAversion
R 2.0. Tech. rep., Institute of Electrical and Elec-
tronics Engineerings, Inc., November 1999.
[13] U DREN , E., K UNSMAN , S., AND D OLEZILEK , D. Significant
substation communication standardization developments. In 2nd
Annual Western Power Delivery Automation Conference (WP-
DAC) Proceedings (April 2000).

12

View publication stats

You might also like