Professional Documents
Culture Documents
Overview
Agenda
Communication Protocol
Topology Design
Virtual LAN
Time Synchronization
Confidential
The reliable networking infrastructure plays a critical role
to enable an IEC 61850 substation
Confidential
The Concept of IEC 61850
4 Confidential
Why Spend Money on IEC 61850?
Conventional Substation
Confidential
Recap
GOOSE/
MMS
MMS
GOOSE/
SMV
Conventional IEC 61850 Station Bus IEC 61850 Station and Process Bus
Substation Automation Substation Automation Substation Automation
7 Confidential
IEC 61850 Station Architecture
- with 3 Levels & 2 Communication Bus
Station Level
Power SCADA
Station Level Equipment
Monitoring
Station Bus
Bay Level
Bay Control Bay Protection
Protection &
Control
Process Bus
Process Level
Current/ Voltage
Data Acquisition &
Transformer Circuit Breaker Circuit Breaking
Levels in Substation Automation Systems
Reference: IEC 61850-5
8 Confidential
IEC 61850 Station Architecture
- with 3 Levels & 2 Communication Bus
Station Level Computing Devices:
• Back-end Host
Station Level Equipment • Tele-control Computer
• Protocol Converter
• Protection Management Computer
Station Bus Communication Devices:
Bay Level • Secondary Device Networking
• IEEE 1588 Transparent Clock
Bay Control Bay Protection
• Protocol Converter
• Meter Networking
Process Bus
Process Level
Instrumental Transformer Switchgear
9 Confidential
IEC 61850 Communication
10 Confidential
IEC 61850 Communication
11 Confidential
IEC61850 Communication
Step5.
ALARM
ALARM
ALARM
Power SCADA Server
Step4.
MMS The power has
been cut!
Station Bus
↑ Step3.
Okay I cut the power!
Protect Relay ↓ Step2.
SMV GOOSE It’s over current, trip the
circuit breaker!
Process Bus Step1.
Current
Current POWER LINE
Current
Over Current!!
Merging Unit Intelligent Control Unit
12
MMS
IED IED
GOOSE Ethernet GOOSE
(Publisher) (Subscriber)
GOOSE IED
(Subscriber)
Confidential
GOOSE
GOOSE Communication
Switch
GOOSE.block
! Bay Level
Feeder Feeder Busbar Dist
Protection Protection Protection Protection
GOOSE.trip
SV SV SV SV
Confidential
Performance Enhancement for SAS
IEC 61850 QoS – GOOSE/SMV/PTP prioritization
Standard QoS
High Queue
GOOSE • Packet prioritization by port-
Medium Queue based configuration
• No packet type examination:
all packet in the high queue
Normal Queue
still FIFO
Low Queue
Confidential
Substation Communication Practice
17 Confidential
Logical Network Topology Design
in Communication Bus
18 Confidential
Logical Network Design in Communication Bus
- Design principle of network topologies
Hierarchy Modularity
-> Increase traffic performance -> Easy add a new bay or application
Station Bus
(Core Layer)
Topology
Station Bus Design
(Distribution Layer)
Redundancy Security
-> Increase availability -> Protect and defend against attacks
Firewall
Connect Redundancy Redundant Security Guide
Protocol
Planning for Physical Security
19 Confidential
Redundancy
Network Redundancy
Without Path Redundancy With Path Redundancy Ex: RSTP
switch
Confidential
Redundancy
Network Redundancy
Confidential
Redundancy Protocol
22 Confidential
Redundancy
LAN B LAN
PRP Operation
A
SAN switc
Inter Link h
To transmit or receive two independent active paths to/from Redundancy Single Attached General
Box Node (SAN) Ethernet Switch
different LANs simultaneously in a zero recovery time network
Source
SAN SAN PRP LAN A: Red Line
PRP LAN B: Green Line
SAN Inter Link: Blue
“C” frame Line
Inter Link Inter Link
LAN A Malfunction !!
switch switch
LAN A LAN B
switch switch switch switch
SAN SAN
Zero Recovery Time
Destination
23
Redundancy LAN B LAN A
Redundancy
SAN
“D” frame
Confidential
Moxa PRP/HSR Solutions
Embedded-level to Management-level for Higher Interoperability
PRP/HSR Computer PRP/HSR Embedded Module PRP/HSR RedBox PRP/HSR 19” Ethernet Switch
DA-820 EOM-G103-PHR-PTP PT-G503-PHR-PTP PT-7728-PTP
PM-7200-PHR-PTP*
Efficient and Visually Easy integration to single Quickly enable legacy Enable multiple single
Represented PRP/HSR attached node(SAN) system devices to PRP/HSR network attached nodes(SANs) to
Network Management and enable PRP/HSR network PRP/HSR network
Module built-in
Confidential
PT-G503 Highlight
3 ports, 10/100/1000Mbps connection
- 2 x 100/1000MBaseT(X) for PRP/HSR redundant
- 1 x 10/100/1000MBaseT(X) for end device
RSTP Transparent
Confidential
PRP/HSR Switch Highlight
Confidential
Topology
28
Logical Network Design in Communication Bus
- Design principle of network topologies
Hierarchy Modularity
-> Increase traffic performance -> Easy add a new bay or application
Station Bus
(Core Layer)
Topology
Station Bus Design
(Distribution Layer)
Redundancy Security
-> Increase availability -> Protect and defend against attacks
Firewall
Connect Redundancy Redundant Security Guide
Protocol
Planning for Physical Security
29 Confidential
Topology
30 Confidential
Topology
31 Confidential
Topology
32 Confidential
Topology
33 Confidential
Virtual LAN
34 Confidential
VLAN
35 Confidential
VLAN
• Traffic filtering
– To segregate traffic flow throughout the network
– The traffic can be filtered or restricted to specific
domains in the network by VLAN
• Trunk traffic reduction
– Removing bottlenecks on the trunk links
• Device performance improvement
– Reduce the amount of messages that the end devices
must process
36 Confidential
VLAN
Printer IP Phone
IED IED IED IED IED IED IED IED IED IED
IED IED IED IED IED IED IED IED IED IED
IED IED IED IED IED IED IED IED IED IED
VLAN 10 VLAN 20/50 VLAN 10/30 VLAN 40 VLAN 50
Bay Level
37 Confidential
Time Synchronization
38 Confidential
The Purpose of Using Time Synchronization within
Substation Automation (SA)
Confidential
IEEE 1588 V2 PTP
Fulfill Fulfill
NOT
Time Typical IEC 61850 IEC 61850 Scales well with
required
Synchronization Accuracy in Station bus Process bus large number of
Dedicated
Protocol substation requirement requirement device
cabling
(1ms) (1us)
IRIG-B 1ms/100us v
(AM/DC-shifted)
NTP/SNTP 1-10ms v v
* The most important feature in IEEE 1588 v2 is the peer-to-peer path delay measurement and Transparent clock
Confidential
Synchronization Process in IEEE 1588 v2 PTP
Confidential
Clock Modes
Clock Mode Description
• In Top-Level, located in a Time domain
Grand Master • Connects the Reference clock (GPS or atomic clock)
Clock
• Has a slave port to sync with Master clock and has multiple
Boundary Clock master port to control time in a sub-domain
(BC)
Confidential
IEEE 1588 V2 PTP
S Slave Port
M M M
* Nonlinear decreasing synchronization accuracy in highly
S cascaded networks
Confidential
IEEE 1588 V2 PTP
Slave MU MU MU
Slav Slav Slav
e e e
44 Confidential
Moxa PRP/HSR Solutions
Embedded-level to Management-level for Higher Interoperability
PRP/HSR Computer PRP/HSR Embedded Module PRP/HSR RedBox PRP/HSR 19” Ethernet Switch
DA-820 EOM-G103-PHR-PTP PT-G503-PHR-PTP PT-7728-PTP
PM-7200-PHR-PTP*
Efficient and Visually Easy integration to single Quickly enable legacy Enable multiple single
Represented PRP/HSR attached node(SAN) system devices to PRP/HSR network attached nodes(SANs) to
Network Management and enable PRP/HSR network PRP/HSR network
Module built-in
Confidential
Delay Measurement
Confidential
End-to-End TC and Peer-to-Peer TC mode
Confidential
The reason we prefer Peer-to-Peer TC
• End-to-End TC
– Path delay request messages must be answered by the
master clock that in a large network can cause a traffic and
processing bottleneck at the master
• Peer-to-Peer TC
– Path symmetry is guaranteed and there will never be
processing or traffic overloading due to the one to one
relationship
– Better time synchronization convergence than end-to-end
TC when the network recovery happens
Confidential
Confidential
Thank You
50
© 2014 Moxa Inc. All rights reserved.