Professional Documents
Culture Documents
Iet-Gtd 2018 5481
Iet-Gtd 2018 5481
net/publication/326894721
CITATIONS READS
26 3,117
6 authors, including:
Some of the authors of this publication are also working on these related projects:
Call for papers - Cybersecurity in Smartgrids - Energies (IF 2.676) View project
Secure data transmission using Cryptography and Genetic algorithm based Clustering for Efficient Routing in Wireless Sensor Network View project
All content following this page was uploaded by Suhail Hussain on 05 June 2019.
Mohd Asim Aftab1, Saeed Roostaee1, S. M. Suhail Hussain1*, Ikbal Ali1, Mini S Thomas1,2 and
Shabana Mehfuz1
1
Department of Electrical Engineering, Jamia Millia Islamia (a Central University), Jamia Nagar, New Delhi -
110025, India.
2
National Institute of Technology Tiruchirappalli, Tiruchirappalli – 620015, Tamil Nadu, India.
*
Corresponding Author, Email: s.suhail.md@gmail.com, Phone: +91-9654746725.
Abstract: Distance protection is the most widely used protection technique for transmission line protection due to its
enhanced selectivity towards fault, fast response and availability of various relay programming algorithms. However, when
faults are detected in Zone 2 of a relay, instantaneous tripping is not possible and are cleared after an inherent time delay.
Sometimes this increased disturbance duration may lead to system instability, power quality problems or may result in
increased plant damage. To address this issue, communication assisted accelerated distance protection has been employed.
To have this communication for tele-protection through standardized and interoperable means an IEC 61850 GOOSE based
communication assisted distance protection scheme is employed. This IEC 61850 GOOSE based accelerated scheme must
meet the stringent performance requirements. Thus, this paper presents the experimental validation and performance
evaluation of IEC 61850 GOOSE based accelerated protection scheme by transporting GOOOSE messages through tunnelling
in inter substation for accelerated distance protection scheme. A system-in-the-loop platform has been developed to
analyse the End-to-End (ETE) delay performances of GOOSE messages under different WAN scenarios in this paper. It has
been found that for worst case scenario there is a significant operating time saving in the proposed scheme.
Keywords: Distance relaying, IEC 61850, GOOSE, Power system protection, System-in-the-loop.
accelerated protection by transportation of high speed comparators which compare the impedance with the zone
Generic Object Oriented Substation Event (GOOSE) reach impedance setting.
messages from the distant relay. The inherent Zone-2 delay (typically 0.25 to 0.4
To implement the distance protection between two seconds [27]) in relay operation is not tolerable in some
substations, the GOOSE messages have to be transported applications due to two main reasons, sustained faults in the
from one substation to another distantly located substation. feeder for Zone-2 delay may cause the system to become
But the GOOSE messages are typically mapped on to data unstable and in case of auto reclosing circuit non-
link layers, hence cannot be transported over a Wide Area simultaneous tripping of relay could result in maloperation
Network (WAN). IEC 61850-90-1 recommends tunnelling where a transient fault causes a permanent lock out of circuit
of GOOSE messages over a WAN for communication based breaker [27]. Thus, in order to clear the fault as early as
inter-substation protection schemes. In literature many possible, operating time of the relay can be reduced by
authors have explored inter-substation communication, but employing communication based accelerated protection
performance evaluation of tunnelled GOOSE messages over schemes. Communication based accelerated schemes allow
the WAN under different scenarios has not been reported. considerable improvement in the overall fault clearing time for
This paper explores these methods and presents an any fault within the zone of protection [8]. In case of distance
evaluation of different methods for different protocols using relaying this communication based accelerated protection
system in loop simulation results. Also, in order to tunnel schemes requires sending of only ON/OFF signals for fast fault
GOOSE messages for inter substation communication, there clearing for in zone faults. These signalling schemes is realized
is a challenge of configuring the different IEDs located in using the tele protection equipment and are broadly categorized
different substations. This paper presents the details on into three main types, intertripping, Permissive tripping and
process of exchange of SCL files for configuring IED in blocking scheme. In intertripping as a trip signal is received at
the receiving end relay it is directly transferred to the circuit
different substations.
breaker for operation. This signal is not verified/supervised
The major contribution of the paper are:
with the receiving end relay operation. In Permissive tripping
• IEC 61850 based accelerated distance protection scheme, tripping is only possible if the trip command received
scheme. through communication coincides with the detection of fault
• Evaluation of the performance of IEC 61850 GOOSE signal at the receiving end relay. In Blocking scheme, tripping
based inter-substation messages over different WAN is done when no signal is received from far end, but the relay
architecture. has detected the fault [12].
• The details on process of exchange of SCL files for In order to realize these accelerated protection schemes,
configuring IED in different substations. serial communication and PLC communication is employed [8].
• A platform for transition of conventional IEDs to IEC However, for achieving interoperability, consistency and
61850 enabled IEDs to be adopted in wide area adaptability to existing substation infrastructure this
protection schemes. communication assisted accelerated distance protection
The paper is organized as follows. A brief description scheme must be through standardized means. This can be
of various accelerated distance protection schemes is achieved by adopting IEC 61850 as the communication
explained in Section 2. Section 3 presents IEC 61850 based standard for accelerated distance protection scheme. IEC
accelerated distance protection scheme. The laboratory 61850-8-1 GOOSE has been employed for transferring the
validation of the problem of delayed tripping for Zone-2 trip signal to the distant relay. This requires a performance
faults is demonstrated in Section 4. The performance validation of the IEC 61850 GOOSE based tele-protection
evaluation of inter-substation communication architecture scheme to achieve distance relaying.
along with results and discussions is presented in Section 5.
Finally, Section 6 presents conclusion. 3. IEC 61850 based accelerated distance
protection relaying
2. Accelerated Distance Protection Scheme 3.1. IEC 61850: Overview
Distance protection scheme is one of the most sought
over technique by relay engineers for reliable protection of IEC 61850 is a communication standard series for
transmission line because of its widespread usage in power power substations developed by International
systems and availability of advanced distance protection Electrotechnical Commission in the year 2000. IEC 61850
computational algorithms. The distance protection relays models power system devices using object-oriented
measure the apparent impedance of the line based on the modeling approach in order to achieve data organization and
voltage and current magnitude obtained at the relaying point. objects configuration. This modeling is mapped onto
This value is compared with a reach point impedance and if specific protocols (such as Ethernet) which provides
it is found to be less, the fault is determined to occur in the consistency and interoperability. The communication
reach of the relay. Then, a trip command is issued to the architecture of an IEC 61850 based substation can be
local circuit breaker to clear the fault [25-26]. modelled by three generic types of IEDs, Merging Unit (MU)
However, in order to provide main and backup IED, Protection and Control (P&C) IED, Breaker IED based
protection, power system protection is divided into different on the functions performed by them. The substations are
zones, based upon the reach of the relay. A relay detects a considered to be IEC 61850 automated and has their
fault in Zone-1 and operates instantaneously, while it Substation Communication Networks (SCN). The SCN of
operates with a delay for faults in subsequent zones (i.e. substation with different bays and IEDs is shown in Fig. 1(a).
Zone-2 and so on). The trip command for a fault sensed by The IEC 61850 based SCN is divided into station, bay and
the distance relay in its Zone-1 is based on traditional process level as shown in Fig. 1(a). The station level
2
consists of operating station, engineering station and HMI which serve specific functions defined conceptually in IEC
which are used for monitoring and control of the substation. 61850. A group of logical nodes are combined together to
The information from the field is acquired in the form of form a logical device according to the set of rules defined by
voltage and current samples in the MU IED and the breaker the standard. The naming convention of logical nodes is
IED at the process level. The P&C IED issues signal to the based on the function carried out by them and is
breaker IED for any kind of faults arising in the substation. standardized. Such as logical node, PDIS is used for
The detailed description of SCN has been reported in distance protection, MMXU is used for metering and
literature in [18-19]. measurement purposes. Detailed description of logical nodes
The real time and mission critical messages in a used for distance protection has been given in subsequent
substation such as Sampled Value (SV) and GOOSE are section.
mapped onto the ethernet layer of the OSI model in the IEC
61850 standard. Fig. 1(b) presents mapping of various IEC 3.2. IEC 61850 GOOSE based accelerated
61850 services over OSI model. The Type 1 and Type 1A distance protection for inter-substation
are GOOSE messages which are time critical in nature such
as Trip, Close, Start, Stop etc. and are mapped directly onto In order to provide distance protection between two
Ethernet layer to reduce the stack. The transmission of raw substations, the detailed message exchanges between the
data or Type 4 messages (SVs), which are continuous IEC 61850 logical nodes has been detailed here. When a
streams of synchronized data from digital instrument Zone-1 fault occurs in substation 2, the distance relay senses
transformers, are also mapped on directly to Ethernet layer the current and voltage at the substation and issues a trip
with broadcast/multicast addressing. Type 2, 3, and 5 signal to the circuit breaker, which is modelled by XCBR
messages corresponds to ACSI applications such as normal logical node. The current and voltage samples are fetched by
‘state’ information messages, auto-control functions, the TCTR and TVTR logical nodes of IEC 61850. The
transmission of event records, general presentation of measurement and metering logical node, MMXU receives
system data which are time-tagged messages, file transfer the input from the TCTR and TVTR node and calculates the
messages etc, which require message-oriented services for three phase voltages and currents for the computing the
which MMS protocols with TCP/IP stack above Ethernet impedance value. The MMXU node also calculates other
layer are used. parameters such as active power, reactive power etc. which
may be used by other applications. The PDIS node is used
Human
Engineering
Station
Machine Operating for providing distance protection application. For respective
Interface Station
zones of protection, PDIS1, PDIS2, etc. logical nodes are
used for Zone-1, Zone-2 and so on respectively. The
Station Level
respective zones of protection for the relays is highlighted in
Fig. 2. The PTRC logical node provides the signal
conditioning for the trip command which is then issued to
the circuit breaker for isolating the fault and PSCH logical
node is used for transmitting the signal.
Bay Level The trip signal sensed by the Zone-1 relay is
transported to the far end i.e. Zone-2 relay for realizing the
communication based accelerated protection scheme. In
P&C IED MU IED Breaker
IED
P&C IED MU IED Breaker
IED permissive tripping scheme the far end relay senses the fault
after its processing delay. However, since the fault line
Process Level
beyond its Zone-1 distance setting, it does not trip
HV Switchgear LV Switchgear Electronic CT/PT and
devices devices transducer instantaneously. The inherent delay of Zone-2 is typically in
the range of 0.25 to 0.4 sec. The Zone-1 relay senses the
(a)
fault and sends a trip signal to its circuit breaker. Also, this
Sampled Values GOOSE TimeSync MMS Protocol Suite Application
(Type 4) (Type 1, 1-A) (Type 6) (Type 2,3,5) Presentation
signal is transported to the Zone-2 relay with the help of
Session communication. The logic for permissive tripping is realized
Transport through a dual input AND gate and a dual input OR gate.
UDP TCP The two inputs of the AND gate is the local relay sensing
Network
signal through PDIS logical node for its Zone-1 trip
IP command and the trip signal received through
Ethernet Data Link
communication by PSCH logical node. If both the signals
are high then a high signal is generated on output of AND
Physical Medium (Copper, Co-axial etc.) Physical
gate and is sent to one of the input of OR gate. The other
(b) input of OR gate is the local relay sensing signal for Zone-1
Fig. 1(a). A typical architecture of a SCN. faults. Thus, the final output is high whenever the fault is in
(b). IEC 61850 service mapping over ISO/OSI seven- Zone-1 of the local relay or for permissive tripping. Due to
layer model. the developed logic, if any of the inputs of OR gate is high
In order to provide communication mapping as per an output drives the circuit breaker for accelerated
IEC 61850 standard hierarchical data exchanges, protection scheme. The required links for depicting
standardized syntax and semantics, the concept of Logical accelerated distance protection for a fault near the substation
Nodes is used. Logical Nodes are group of data objects 1 is highlighted in red color for the sake of clarity. The
scheme of IEC GOOSE based accelerated distance
3
Substation 1 Substation 2
CT CT
WAN
PSCH PSCH
PTRC
PTRC CB Trip
CB Trip Signal
Signal
Fig. 2.IEC 61850 based accelerated distance protection scheme for Permissive tripping.
protection along with the required logical nodes is shown in a substation, they have a fast transfer characteristic. Also, at
Fig. 2. times of fault, a high amount of data flows in the
The IEC 61850 based standardized communication communication network. The high priority and time
assisted distance protection scheme has been implemented criticality of GOOSE messages allow overall performance
by utilizing the GOOSE messages transported between the improvement in the protection scheme in case of faults. The
distantly located substations. The GOOSE messages are transfer time of a trip and block GOOSE message must be
burst type non-periodic event driven messages. Whenever a well below 4ms and 20ms respectively [29].
fault occurs, protection devices respond to the fault by In order to provide IEC 61850 GOOSE based
generating burst of GOOSE messages. The occurrence of accelerated distance protection scheme, the GOOSE
fault changes the periodic heartbeat nature of GOOSE messages are required to be transported between distantly
message into burst mode. In burst mode, the transmission located substations, i.e. in a Wide Area Network (WAN).
interval of GOOSE increases sequentially such that after the However, the typical GOOSE message has only data link
certain time of trigger of the event, the retransmission time layer and does not possess an IP/network layer. Thus, in
changes back to normal periodic nature as shown in Fig.3. order to send inherent GOOSE message in a WAN, IEC
As an event occurs (such as a fault) the retransmission time 61850-9-1 recommends either the GOOSE messages must
of GOOSE message is changed from To to T1, T2, be made routable by adding network and transport layers or
T3, ……Tn such that T1<T2<T3<….<Tn. Each message in the GOOSE messages can be tunnelled through the WAN.
the retransmission sequence carries a retransmission timer In this paper, for transporting the GOOSE messages over
that informs the receiver of the maximum time to wait for WAN the concept of tunnelling is considered. Tunnelling
the next re-transmission. If a new message is not received employs encapsulation method to transport data packets
within that time interval, the receiver shall assume that the from a private network to another network over an IP
association is lost. The setting for retransmission timer network (i.e. public network such as Internet).
parameter differs from various GOOSE clients and is The router pairs at each end of WAN link forms a
usually of the order of 0.5 ms [28]. virtual tunnel through which the data packets are transported.
cyclic GOOSE burst cyclic GOOSE These routers wrap and unwrap the data packets (here
GOOSE packet) with TCP/IP protocols. Since the inherent
GOOSE messages does not possess an IP or network layer,
…… …… the WAN router subscribes to a particular GOOSE message
of interest from its LAN. This GOOSE packet is
To To T1 T1 T2 T3 To encapsulated with TCP/IP header and sent over WAN to the
time → receiving router which subscribes it and decapsulates and
event republishes the GOOSE message onto the receiving LAN.
The process of wrapping and unwrapping of the data packet
at each end of WAN, introduces an extra time delay but at
Fig. 3. GOOSE message retransmission in IEC
the same time there is a significant reduction in network
61850. routing delay since it establishes a virtual connection-
oriented service. Also, since tunnelling establishes a virtual
As an event occurs, the client issues a GOOSE request. A
link between the two substations in a WAN, the IEDs
retransmission timer is started. The retransmission
located in the two substations behaves as though they are
expiration timer indicates the sequence is to be retransmitted.
within the same LAN. This requires the configuration of
Upon retransmission, a GOOSE request is generated and
IEDs in two different substations by exchanging the SCL
next retransmission interval is used. The gradual increase in
files via the established tunnel. This has been explained in
retransmission time in bursts is adopted in order to increase
the subsequent subsection.
reliability of the network, since GOOSE message conveys
critical commands.
3.3. SCL file exchange in tunneling
Since, GOOSE messages are typically designed for
trip signals between Intelligent Electronic Devices (IEDs) in
(a)
Computer running
PSCAD
Omicron
CMC 256-6
(b)
Fig. 5(a). PSCAD Model of transmission line.
(b). Laboratory setup.
In order to provide interoperability and seamless must appear as a single SCL file. For a normal engineering
integration in an IEC 61850 process, Substation purpose, the concerned IED is required to know a part of
Configuration Language (SCL) files are required to be information of the other system and not the complete
exchanged among the IEDs in an IEC 61850 based network information. Thus, it is appropriate to define a
substation. Configuration of IEDs occurs within a substation ‘system interface exchange description’ or SED file. This
by sending the IED Capability Description (ICD) and SED file is exchanged from one substation to another and
System Specification Description (SSD) files to the system contains a part of overall information of the system required
configurator tool which contains the capability of an IED in for a certain purpose.
form of a blank template and the single line diagram of Since switch is not modelled in SCL, the nearest IED
substation with all the functional requirements respectively. to the switch for each substation is known as the boundary
The system configurator tool, generates Substation IED for another substation. Referring to Fig. 4, IED A3 in
Configuration Description (SCD) file which contains substation 1 is the boundary IED for substation 2. Similarly,
communication configuration of all IEDs in the form they IED B4 in substation 2 is the boundary IED for substation 1.
are configured to operate for protection and automation A group of IEDs engineered and configured by the system
functions in a substation. This SCD file is shared with all configuration tool for a specific purpose is known as a
substation devices and can be used for multiple applications. project. The engineering control right to configure the IED
The specific IED configuration is then generated from the i.e. to change the IED data model rests only with the IED
SCD file containing substation specific address of a tool. The types of IED engineering rights can be ‘fix’, for
particular IED in the form of IED Capability Description fixing the boundary IED, ‘dataflow’, for boundary IED data
(CID) file. Thus, after this process, the complete substation flow addition within the capability of the IED, and ‘full’,
is configured and each IED is aware of locations of all other which allows complete engineering of data flows. The SED
devices in the substation. file is transferred from one substation project to another
The tunneling process establishes a high bandwidth which augments the DATA into the data flow. The modified
wide area connection between two different LANs which SED file is returned to the originating substation which
are geographically distantly located. However, the sender helps to maintain the same consistent state among the
and receiver IED acts as if they are within the same local projects.
area network and exchanges the .icd files required for IED A case may arise when there are multiple SED files
configuration. This requires the data flow from one IEC are exported at different points of time. In order to remove
61850 IED in a substation to its appropriate IED in another this redundancy of multiple versions of SED files, each SED
substation. However, since the power network between the file has an identification and a revision index time of
two substations is meshed, this requires that the whole modification. This allows to identify the latest SED file
power network information with all substations and IEDs version in such cases.
5
SITL
Riverbed Modeler Simulation Environment
Component
N
I Tunelling GOOSE message
C through IP network
GOOSE Receiver
(Replicating Breaker IED of Substation 1)
N
I
C
SITL
Component
GOOSE Sender
(Replicating P&C IED of Substation 2)
Fig. 7(c). Experimental setup for validation of GOOSE assisted distance protection scheme.
Table 2 Communication traffic in substation along with comparison of average delay for various substation messages.
Application IEC 61850 Message Packet Delay in ms
type Size Without Priority With Priority
(Bytes) Tagging Tagging
Sampled Values Type 4 - Raw data 126 Avg. Max. Avg. Max.
message 0.242 0.296 0.210 0.266
GOOSE Intra Type 1, 1A - GOOSE 104 0.58 0.68 0.36 0.39
Substation Trip signal
Inter 4.35 4.92 4.12 4.62
Substation
Status Updates Type 3, Status updates 200 1.9 2.4 1.1 1.6
File Transfer FTP Type 5 - Background 256 1.5 1.8 1.3 1.7
traffic
rings to determine the performance for GOOSE message The resultant time saving in the proposed GOOSE
transmission. Also, the point to point protocol (PPP) is based accelerated distance protection scheme can be
widely used WAN technology and is evaluated over a computed as follows. It is found that a typical processing
SONET. The results provided a reduced ETE delay and is delay of the relay is around 15ms. From Table 3, for the
tabulated in Table 4. From the results, it can be inferred that worst-case scenario i.e. using DS0 link with 75% congestion
major portion of delay in transporting the GOOSE packet rate, maximum latency in GOOSE messages is found to be
over tunnel is contributed by encapsulation and 48.5ms. Thus, the overall delay would be the sum of
decapsulation delay at the end routers. The reduction in communication delay and the processing delay of the relay
delay is by 1ms on an average from the previous results and which is 63.5ms i.e. around 0.0635s. This value is found to
can be attributed to SONET high speed link technology. be far less than the operational delay of Zone-2 relay i.e.
0.440503s. An approximate time saved with respect to
conventional scheme is 0.377003s.
Table 3ETE GOOSE delay for different types of WAN links under different congestion levels.
GOOSE Delay (in ms)
Type of links/ DS0 (64 DS1 (1.544 DS3 (44.736 E1 E3 (34.368
Capacity→ kbps) Mbps) Mbps) (2.048 Mbps)
Congestion Mbps)
No Congestion 15.23 7.31 4.35 6.15 4.82
25 % congestion 18.25 8.2 4.35 6.10 4.82
50 % congestion 26.8 8.8 4.20 6.10 4.77
75 % congestion 48.5 8.8 4.13 6.10 4.72
10
tagging and priority tagging respectively. Internet of Things Journal, 4, (1), pp. 192-204, Feb.
II. GOOSE packet delayed in transmission. 2017.
In this scenario, an analysis has been done for a delayed [5] Z. Y. Xu et al., A Distance Protection Relay for a
GOOSE packet in transmission. As explained in previous 1000-kV UHV Transmission Line, IEEE Transactions
section, each burst of GOOSE message has its a on Power Delivery, 23, (4), pp. 1795-1804, Oct. 2008.
retransmission expiration timer. If the delayed packet is not [6] X. Jin; R. Gokaraju; R. Wierckx; O. Nayak, High
received within the retransmission expiration timer, a new Speed Digital Distance Relaying Scheme using FPGA
packet is retransmitted and the delayed packet is discarded. and IEC 61850, IEEE Transactions on Smart
Considering the same scenario as case I, if a packet is Grid (Early Access), 2017.
delayed by less than 0.5ms such as 0.22ms (for example), [7] Areva, T. D. Network protection & automation guide.
the net average delay accounted is 4.57ms for non-priority Flash Espace, Cayfosa (2002): 92-95.
tagging and 4.34ms for priority tagging GOOSE messages. [8] A. P. Apostolov, IEC 61850 communicationsbased
However, if the packet is delayed more than 0.5ms and the transmission line protection, 11th IET International
retransmitted packet reaches first, the delayed GOOSE Conference on Developments in Power Systems
packet would be discarded and the retransmitted packet Protection (DPSP 2012), Birmingham, UK, 2012, pp.
would do the job. 1-6.
[9] T. Arnold, A. C. Adewole and R. Tzoneva,
6. Conclusion Performance testing and assessment of multi-vendor
The performance evaluation for IEC 61850 GOOSE protection schemes using proprietary protocols and the
based inter-substation accelerated distance protection IEC 61850 standard, 2015 International Conference on
scheme is demonstrated in this paper. Employment of the the Industrial and Commercial Use of Energy (ICUE),
proposed scheme results in significant time saving in fault Cape Town, 2015, pp. 284-290.
clearance and thus helps to improve system stability, reduce [10] E. O. Schweitzer, B. Kasztenny, A. Guzm´an, V.
power quality issues and prevents plant damage. In order to Skendzic, and M. V. Mynam, Speed of line protection
transport inherent GOOSE messages, with no IP/network - Can we break free of phasor limitations?, 68th
layer, for inter-substation communication the concept of Annual Conference for Protective Relay Engineers,
tunnelling has been used in this paper. A system-in-the-loop 2015, pp. 448–461.
set up for analysing the ETE delay performances of GOOSE [11] B. Falahati, Z. Darabi and M. Vakilian, Implementing
messages for different scenarios has been reported. distance line protection schemes among IEC61850-
Performance evaluation in terms of end to end delay for enabled substations, 2014 IEEE PES T&D Conference
different types of WAN technologies has been reported and and Exposition, Chicago, IL, USA, 2014, pp. 1-5.
from obtained results it is concluded that links with lower [12] Communication networks and systems for power
bandwidths are not suitable for long distances as they may utility automation, IEC 61850 2nd Ed, 2013.
result in high end to end delay. [13] N. Das, Tin Tun Aung and S. Islam, Process-to-bay
This study validates the stringent performance level peer-to-peer network delay in IEC 61850
requirement of IEC 61850 GOOSE based scheme for substation communication systems, 2013 Australasian
achieving accelerated distance protection. The cyber Universities Power Engineering Conference.
security aspect of the communication network is left as a [14] X. Cheng, W. J. Lee and X. Pan, Modernizing
future scope of this work and it needs to be evaluated in Substation Automation Systems: Adopting IEC
order to prevent any kind of network intrusions which could Standard 61850 for Modeling and Communication,
lead to false relay operations. IEEE Industry Applications Magazine, 23, (1), pp. 42-
49, Jan.-Feb. 2017.
7. Acknowledgement [15] X. Cheng, W. J. Lee and X. Pan, Modernizing
Substation Automation Systems: Adopting IEC
This work has been supported in part by Council of Standard 61850 for Modeling and Communication,
Scientific and Industrial Research (CSIR), India. in IEEE Industry ApplicationsMagazine, vol. 23, no. 1,
pp. 42-49, Jan.-Feb. 2017.
[16] S. Kumar, N. Das and S. Islam, Performance evaluation
8. References of a process bus architecture in a zone substation based
[1] Paul M. Anderson, Protective Devices and on IEC 61850-9-2, 2015 APPEEC, Brisbane, pp. 1-5.
Controls, Power System Protection, 1, Wiley-IEEE [17] S. Kumar, N. Das and S. Islam, Performance analysis of
Press, 1999. substation automation systems architecture based on
[2] K. Jia, T. Bi, W. Li and Q. Yang, Ground Fault IEC 61850, 2014 AUPEC, Perth, WA, 2014, pp. 1-6.
Distance Protection for Paralleled Transmission Lines, [18] T. S. Sidhu and Y. Yin, Modelling and Simulation for
IEEE Transactions on Industry Applications, 51, (6), Performance Evaluation of IEC61850-Based
pp. 5228-5236, Nov.-Dec. 2015. Substation Communication Systems, IEEE
[3] F. Blaabjerg; Y. Yang; D. Yang; X. Wang, Distributed Transactions on Power Delivery, 22, (3), pp. 1482-
Power-Generation Systems and Protection, 1489, July 2007.
Proceedings of the IEEE, 105, (7), pp. 1311-1331, [19] M. S. Thomas and I. Ali, Reliable, Fast, and
2017. Deterministic Substation Communication Network
[4] G. Xu, W. Yu, D. Griffith, N. Golmie and P. Architecture and its Performance Simulation, IEEE
Moulema, Toward Integrating Distributed Energy Transactions on Power Delivery, 25, (4), pp. 2364-
Resources and Storage Devices in Smart Grid, IEEE 2370, Oct. 2010.
11
12