You are on page 1of 5

The Distributed Monitor System for Security and Stability in the Complicated

Power Systems

Zhou Buxiang Teng Fusheng


Department of Electric Power Engineering
Sichuan Union University
Chengdu, China, 610065

Abstract: A distributed monitor system based on comput- In the modem complicated power systems, many large
ers, control and communication for the complicated power power plants and loads are distributed in the large scale
systems stability and security is presented. The matrix area. they are connected by the long distance high voltage
real-time communication network is used to exchange data transmission lines. It can not guarantee to satisfy the con-
between any two sub-systems in the distributed monitor ditions of the whole system's transient stability and
system. The implication tiers data organization mode is security to build the local monitor system for local power
applied to establish a real-time database management sys- plants and transmission lines [2]. Although some systems
tem. This kind of system can on-line monitor the secure based on oriented whole power systems have been
and stable states for complicated power systems. And the built[ 1,3], the precision and other performances have to be
precision is improved and computation is simplified by improved. The effective architecture have to be needed for
efficiently use the real-time information in this system. monitoring the whole system's stability and security.
Therefore, in order to solve the problems of stability and
Keywords: stability and security monitor, distributed sys- security monitoring of complicated power system, the new
tems, matrix communication network, implication tier theory and technology have to be used.
databases. In this paper, a architecture based on computer, com-
munication and control for monitoring stability and
I . Introduction security of complicated power system. And some key
techniques for this architecture have been presented, too.
It is important means for reliability of an operating
power system to monitor its transient stability and security. 11. Architecture
Although some local monitor and control systems have
been used and some benefits have been got for simple The distributed architecture for monitoring stability
power system, the monitor sensitivity and reliability could and security of complicated power system is shown in Fig.
not meet the reality application's demands for complicated 1. The monitor system is composed of three parts: inte-
electric network structure. It is urgent need for grated monitor center(IMC), monitor stations(MS), and
complicated system to build more effective monitor and communication network(CN).
control system. The integrated monitor center IMC have charge of co-
ordinating the working of the monitor station MS,. When
any disturbance has happened, the control strategy ori-
ented the whole system has to be made for the stability and
security to securely, stable and reliably run the power
system.

0-780347544/981$10.00 0 1998 IEEE -1364-

Authorized licensed use limited to: University of Manchester. Downloaded on October 19,2023 at 13:14:48 UTC from IEEE Xplore. Restrictions apply.
The functions of monitoring the stability and security of
power system can be divided some sub-functions. the
I functions set F can be described as,

nmunication L
network

where, F, is the sub-function (or sub-task) of monitor


system, t, is the number of the sub-functions. The distribu-
i- tion of functions set F at the monitor nodes (IMC, MS,)
I MSi, ......
must satisfy the objective function J,

Fig. 1 Th istributed Architecture


where, Com is the cost function of communication, D(F)
MS are installed at the important
is the distribution scheme of functions set F at the monitor
The monitor statio
nodes.
large power plants a substations. Each MS include the
Any sub-function F, is based on the certain data set. The
data acquisition systt M) and the control executing sys-
basic data set Z, to support the functions set F can be
tem(C) besides the 1( I computer system. They are used
obtained by analyzing the data content of monitor system.
for sending the syste lata, states collected by the M and
the local results judj by the local computer system to
the IMC, receiving nmand sent from the IMC, and
executing the contro -ategy made from the IMC by the
C. where, V(i) is the voltage of i bus; P(i) is the injection
The communicatio etwork (CN) is used for exchang- active power of i bus; Q(i) is the injection reactive power
ing the information ween any two nodes in the IMC of i bus; P(l) is the active power of 1 branch; Q(l) is the
and MS, (i=1,2 ,...,n). le CN has to securely and reliably reactive power of 1 branch; l(I) is the current of 1 branch.
exchange the inform: n in real-time. Because the functions set F has a unified data object Z,
In Fig. 1, IMC a MS, (i=l,2, ...,n)are the computer the data set in which the speed of renewal of data is slow
systems which have 2 le computation ability. The unified can be obtained from other data set in which the speed of
system constituted b) IC and MS, connected through the renewal of data is fast. Let the sub-functions of the same
communication netw has power communication ability. renewal data speed combine a new subset. And the order
:he functions of monitoring the of the new subset F,?F2,...,Fnare arranged according to the
It is used to realiz
stability and securit If power systems. The effective data renewal speed from fast to slow. The equ.(l) is re-
, distributed database lave to be built based on the written as,
reasonable distributi function, the reliable real-time
communication net\ k and quickly data acquisition (4)
system also have to b uilt.
Corresponding the data subset is,
111. The I lication Tier Databases
z = {Zi.ZI:..,L}

-1365-

Authorized licensed use limited to: University of Manchester. Downloaded on October 19,2023 at 13:14:48 UTC from IEEE Xplore. Restrictions apply.
area network (WAN) and point-to-point exchanging net-
where, Z is subset of power set of Z,. According to the work (EXN).The network structure is shown in Fig. 2.
features of power system, some relation equations can be
obtained from equ.(5).

(Jz, = zo (7)
1=I

The equ.(5) describes the implication relationship of the ... ...


data subsets. Therefore, I I
MSni, n '
t- -1
I

J f ' Fig. 2 Communication Network Structure


where, a ( . ) is computation process oriented the object
. in which the required data can be extracted from .
I' " It 'I,
Give numbers to IMC and MS, (i=1,2 ,...,n) 0, 1, 2, ..., n
Z, is implication compensation set, it provides the data in Fig. 2. The IMC and MS, (node 0 to n) is called monitor
which can not be extracted from other data subsets.
node. The cross points in Fig.2 are called communication
According to the equ.(4) and (5), the database system
nodes, represented as ij. Node ij means:
can be divided n tiers, each tier corresponding to one sub
function F, and one data subset Z,. The implication
. if i<j, WAN is used at ij node.
relationship among tiers can be obtained form equ.(6), (7) . if i>j, EXN is used at ij node.
and (8). A global type R is defined, and the implication . if i=j, the internal communication is used at i node.
tier databases model can be described as follow:
If the reality communication network configuring com-
(1) R can be obtained by integrating the n relative local
pletely depend on Fig. 2, the efficiency of equipment will
types R,, R,, ..., R,, its data set is distinguishably Z,,
be low, and some resource will be wasted. So, the network
Z,, ... , Zn in equ.(5).
structure must be optimized. Let the network configuration
( 2 ) R has m properties T,(R), T,(R), ..., T,(R), its type
matrix be,
and the number depends on the data in equ.(3).
(3) Any local type RI (1 < i < n) also include in proper-
ties T,(R,), T,(RI), ..., T,(R,), but some properties may be
empty depending on the elements in the 2,.
(4) TJ(R) (1 < j < m), any property of R, can be inte-
nlo rill ..-
NET = (9)
grated by the properties of R I , %, ..., R,, that is T,(R,),
T,(R,)t ...)TJ(R,).
where,
IV.The Matrix Communication Network
0 no communication means
no =
To reliably exchange the information between the IMC 1 have communication means
and MSlor MS, and MSJ(i, j=1,2, .., n), the communication
network is combine of two communication modes: width

-1366-

Authorized licensed use limited to: University of Manchester. Downloaded on October 19,2023 at 13:14:48 UTC from IEEE Xplore. Restrictions apply.
The optimization of the communication network struc- In Fig. 4, 1st bus is a large power plant, 2nd bus is a
ture (that is to optimi;:e the matrix NET) is by three steps switch substation. The different sub-system S,, S,, S, is
as follow: connected on bus 3, 5 , 4. According to the herein before
analysis, the monitor stations MS are set on bus 1, 2, 3, 4,
(1) To determine the communication nodes to be 5, the integrated monitor center IMC is set on bus 1, and
needed or not, througi the D(F) in the equ.(2). If no data IMC and MS, are merged. The ~ a ~ ~ ~ ~ ~ configura-
~ i c a t i o n
must be exchanged bietween i, j monitor nodes, the com- tion matrix is,
munication node ij is lot needed. That is, nlJ=n =O in ma-
J'
trix NET.
(2) Set the commiinication nodes by communication -
1 1 1 1 1 -
efficiency. If ik and kj have configured the communication
1 1 0 0 0
1 0 1 1 0
1 0 0 1 1
-1 0 0 0 1-
(3) Set the standby channel by reliability. If i, j monitor
node need not standby channel, n,,=l and nJI=0,or n,,=O
The system can meet the demands of monitoring stability
and ",,=I. Sometimes the standby channel can use the
and security of power system by the simulating computa-
transforming commun cation nodes. tion for the reality power system.

The optimal matrix communication network structure VI. Conclusions


can be obtained by thu optimal matrix NET. The data can
be efficiently and reliably exchanged by this network, The distributed architecture for monitoring stability and
because WAN and EXN have different technology security of power system is discussed in this paper.
features and some standby channels have been considered. Simultaneously some key techniques for realizing the
architecture are mentioned, such as the implication tier
databases, the matrix communication network. The system
'1.Application built by the distributed architecture can meet the demands
of monitoring stability and security of power system by the
A reality power systkm is shown in the Fig. 4. simulating computation for the reality power system.

VII. References

[ I ] H.Ota et al., "Development of Transient Stability


Control System (TSC System) Based on On-line
Stability Calculation ," IEEE Trans.on Power

200MWI y@ System,Vol.ll,No.3, August 1996,pp1463-1472.


[ 2 ] Chen Renquan, "Develoment and Implementation of
MAN-KUN Security and Stability Control System, "
G>
-J Power System Technology, Vo1.21, No.3,. 1997.3,
pp 18-2 1 .
Fig. 4 F.eality Power System [3] Zhang Qiping, et al, "Analysis of System Stability

I -1367-

Authorized licensed use limited to: University of Manchester. Downloaded on October 19,2023 at 13:14:48 UTC from IEEE Xplore. Restrictions apply.
Control Device Used in BEILUNGGANG-LANTING special fields of interest include the application of
500KV System in East China Grid," Power System computer, and the analysis and control of stability and
Technology, V01.21, No.1, 1997.1, pp9-11. security of power system. He is an assistant professor of
Sichuan Union University and a candidate doctor of
V111. Biographies Chongqing University.

Zhou Buxiang was born in Jiangsu,


China, on January 7, 1965. He re- Teng Fusheng is the professor in
ceived B.S. and M.S. in electrical the Chengdu University of Science
power engineering from Chengdu and Technology and Sichuan Union
University of Science and University from 1981 to now. His
Technology, Chengdu, China in 1986 main interests are power systems
and 1993. His employment operation and its automation as well
experience include Xinjiang as computer application in this filed.
Coinputer Center and Sichuan Union University. His

-1368-

Authorized licensed use limited to: University of Manchester. Downloaded on October 19,2023 at 13:14:48 UTC from IEEE Xplore. Restrictions apply.

You might also like