Smart Grid Standardization Analysis, Version 2
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Page 1 of 37 Current Standards Activities 5/4/2014 Http
Current Standards Activities Page 1 of 37 Browse By Group: View All New Publications | Supplements | Amendments | Errata | Endorsements | Reaffirmations | Withdrawals | Formal Interpretations | Informs & Certification Notices | Previous Reports Last updated: May 2, 2014 New Publications This section lists new standards, new editions (including adoptions), and special publications that have been recently published. Clicking on "View Detail" will display the scope of the document and other details available on CSA’s Online store. Program Standard Title Date Posted Scope Electrical / CAN/CSA-C22.2 NO. Household and similar electrical appliances - Safety - Part 2-45: 4/17/2014 View Detail Electronics 60335-2-45:14 Particular requirements for portable heating tools and similar appliances (Adopted IEC 60335-2-45:2002, edition 3:2002, consolidated with amendment 1:2008 and amendment 2:2011, with Canadian deviations) Appareils électrodomestiques et analogues - Sécurité - Partie 2-45 : Règles particulières pour les outils chauffants mobiles et appareils analogues (norme CEI 60335-2-45:2002 adoptée, edition 3:2002, consolidée par l'amendement 1:2008 et l'amendement 2:2011, avec exigences propres au Canada) http://standardsactivities.csa.ca/standardsactivities/recent_infoupdate.asp 5/4/2014 Current Standards Activities Page 2 of 37 Gas Equipment ANSI Z21.41-2014/CSA Quick disconnect devices for use with gas fuel appliances 4/10/2014 View Detail 6.9-2014 Gas Equipment ANSI Z21.74-2014 Portable refrigerators for use with HD-5 propane gas 4/10/2014 View Detail Electrical / CAN/CSA-C22.2 NO. Low-voltage switchgear and controlgear - Part 4-1: Contactors and 4/10/2014 View Detail Electronics 60947-4-1-14 motor-starters - Electromechanical contactors and motor-starters (Bi-national standard, with UL 60947-1) Electrical / CAN/CSA-C22.2 NO. -
State of the Art Related to M2mgrids Scope
Public A state of the art related to scope of M2MGrids project M2MGrids ITEA 2 13011 •••••••••••••••••••••••••••••••••••••••••••••••••••••• Edited by Juhani Latvakoski Including contributions from: all M2MGrids project partners This document will be treated as strictly confidential. It will not be disclosed to anybody not having signed the ITEA / ITEA 2 Declaration of Non-Disclosure. CONFIDENTIAL TABLE OF CONTENTS Abstract .................................................................................................................................. 6 List of Abbreviations .............................................................................................................. 7 1 Introduction .................................................................................................................. 10 2 Review of the Internet of Things architectures ............................................................. 10 References..................................................................................................................... 14 3 State of the Art Analysis on M2M Information systems ................................................ 15 3.1 Technologies ......................................................................................................... 15 3.1.1 Knowledge Representation........................................................................... 15 3.1.2 Multi-agent Systems .................................................................................... 16 3.1.3 Optimization techniques .............................................................................. -
Efficient Probabilistic Analysis of Offshore Wind Turbines Based On
Efficient probabilistic analysis of offshore wind turbines based on time-domain simulations Von der Fakultät für Bauingenieurwesen und Geodäsie der Gottfried Wilhelm Leibniz Universität Hannover zur Erlangung des Grades Doktor-Ingenieur - Dr.-Ing. - genehmigte Dissertation von Clemens Janek Hübler M. Sc. 2019 Hauptreferent: Prof. Dr.-Ing. habil. Raimund Rolfes, Leibniz Universität Hannover Korreferent: Prof. John Dalsgaard Sørensen, M.Sc., Lic.techn., B.Com. Aalborg University Tag der mündlichen Prüfung: 11. Januar 2019 Abstract Offshore wind energy plays an important role in the successful implementation of the energy transition. However, without subsidies, it is not yet sufficiently competitive compared to other renewables or conventional fossil fuels. This is why offshore wind turbines have to be structurally optimised with regard to economic efficiency. One possibility to significantly increase economic efficiency is to improve the reliability or at least to assess present reliability levels precisely. For an accurate reliability assessment during the design phase, probabilistic analyses based on time-domain simulations have to be conducted. In this thesis, a methodol- ogy for a comprehensive probabilistic design of offshore wind turbines with special focus on their substructures is developed and applied. All investigations are based on time-domain simulations. This leads to more accurate results compared to semi-analytical approaches that are commonly used for probabilistic modelling at the expense of higher computing times. In contrast to previous probabilistic analyses, considering only particular aspects of the probabilistic design, this work defines a comprehensive analysis that can be split up into the following seven aspects: deterministic load model, resistance model (failure modes), uncer- tainty of inputs, design of experiments, sensitivity analysis, long-term extrapolation/lifetime distribution, and economic effects. -
Integration Ecosystems Panel (Howard Self)
Howard Self, ABB , Program Manager Smart Grid, May 10, 2017 GMLC Interoperability Technical Meeting © ABB June 6, 2017 | Slide 1 Utility Network Control Overview Transmission – 1970 - 1995 SCADA Control Center Proprietary Protocols Harris 5000 CDC I & II Conitel 2020/3000 Telegyr 6500/8979 Valmet III & V PG&E 2179 SES 92 © ABB June 6, 2017 | Slide 2 Microprocessor Evolution(Integration Nightmare) 1988-1996, RS232,RS485 – 9600 Baud Relay/IEDs Regulator Controller RTU/Data Concentrator GETAC 2179 Incom /Modbus ASCII Incom Meter IED PLC/Data Concentrator SEL ASCII Modbus/DNP © ABB June 6, 2017 | Slide 3 The Birth of DNP3 1992-1994 through today o Open, non-proprietary o SBO (Select Before Operate) o Accurate Time Sync and Time Stamped Data o Quality flags, Internal Indications o Multiple Data Formats o Layer Separation (Link, transport, application) o Quiescent, Report-by-exception, polling o File transfer o UDP/TCP o Secure Authentication V2/V5 © ABB June 6, 2017 | Slide 4 The Need for Speed Inside the substation o Modbus Plus – 1 mb/s (Serial Taken ring) o Modbus TCP/IP – 10/100 mb/s o Profibus – 12mbs o DNP/IP – 10/100mbs o LON o UCA – 10/100 mb/s (Client/Server, Peer-to-peer) o IEC 61850 – 10/100 mb/s (Client/Server, Peer-to- peer, Sample measured Values) © ABB June 6, 2017 | Slide 5 Introduction UCA 2.0/IEC 61850 start-up UCA Project Origin: . Utility Communications Architecture (UCA) - enterprise-wide unified scheme to share all operating and management information . 1994 - EPRI member utilities called for common standard for IEDs in substations . -
Assessment of Offshore Wind System Design, Safety, and Operation
Assessment of Offshore Wind System Design, Safety, and Operation Standards Senu Sirnivas and Walt Musial National Renewable Energy Laboratory Bruce Bailey and Matthew Filippelli AWS Truepower LLC NREL is a national laboratory of the U.S. Department of Energy Office of Energy Efficiency & Renewable Energy Operated by the Alliance for Sustainable Energy, LLC. This report is available at no cost from the National Renewable Energy Laboratory (NREL) at www.nrel.gov/publications. Technical Report NREL/TP-5000-60573 January 2014 Contract No. DE-AC36-08GO28308 Assessment of Offshore Wind System Design, Safety, and Operation Standards Senu Sirnivas and Walt Musial National Renewable Energy Laboratory Bruce Bailey and Matthew Filippelli AWS Truepower LLC Prepared under Task No. WE11.5057 NREL is a national laboratory of the U.S. Department of Energy Office of Energy Efficiency & Renewable Energy Operated by the Alliance for Sustainable Energy, LLC. This report is available at no cost from the National Renewable Energy Laboratory (NREL) at www.nrel.gov/publications. National Renewable Energy Laboratory Technical Report 15013 Denver West Parkway NREL/TP-5000-60573 Golden, CO 80401 January 2014 303-275-3000 • www.nrel.gov Contract No. DE-AC36-08GO28308 NOTICE This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. -
Adobe Reader
Turinys AKTUALIJOS .................................................................................................... 5 SEMINARAS MAÞOMS IR VIDUTINËMS ÁMONËMS „DALYVAVIMAS STANDARTIZACIJOJE IR STANDARTØ TAIKYMAS – MVÁ PRIVALUMAI“ ........... 5 RENGIAMAS LST EN ISO 5667-3 VANDENS KOKYBË. MËGINIØ ËMIMAS. 3 DALIS. VANDENS MËGINIØ KONSERVAVIMAS IR APDOROJIMAS (ISO 5667-3:2012) LIETUVIØ KALBA .................................................................. 5 SUKURTA PAGRINDINIØ MAÐINØ SRITIES TERMINØ DUOMENØ BAZË, PALENGVINANTI STANDARTØ RENGIMÀ NACIONALINËMIS KALBOMIS ......... 6 ISO SEMINARAS APIE ENERGIJOS VADYBOS STANDARTÀ ISO 50001, JO TAIKYMO GALIMYBES IR NAUDÀ VYKO VILNIUJE ...................................... 6 STANDARTIZACIJA .......................................................................................... 9 INFORMACIJA APIE VIEÐAJAI APKLAUSAI TEIKIAMUS EUROPOS IR LIETUVOS STANDARTØ BEI KITØ LEIDINIØ PROJEKTUS ................................ 9 IÐLEISTI LIETUVOS STANDARTAI IR KITI LEIDINIAI ........................................... 9 NETEKÆ GALIOS LIETUVOS STANDARTAI IR KITI LEIDINIAI .............................. 16 NETEKSIANTIS GALIOS LIETUVOS STANDARTAS ............................................. 21 SIÛLOMAS SKELBTI NETEKSIANÈIU GALIOS ORIGINALUSIS LIETUVOS STANDARTAS ................................................................................... 21 TARPTAUTINIØ IR EUROPOS ÁSTAIGØ BEI ORGANIZACIJØ STANDARTAI IR KITI LEIDINIAI, KURIUOS DEPARTAMENTAS GAVO KOVO MËNESÁ .................. 22 TARPTAUTINËS STANDARTIZACIJOS -
Author Information Only
Cyber Security Practical considerations for implementing IEC 62351 Frank Hohlbaum, Markus Braendle, Fernando Alvarez ABB [email protected] Switzerland 1. Introduction Two trends are currently changing substation automation systems: IEC 61850 and the need for increased cyber security. IEC 61850 has gained global acceptance by both vendors as well as customers. Cyber security on the other hand has quickly become one of the most dominant topics for control systems in general and electrical utilities in particular. The combination of the two, securing IEC 61850 based communications, has been one of the goals of the recently published technical specification IEC 62351. In the authors‟ view IEC 62351 is overall a good starting point and will be the future standard to help secure IEC 61850 communication. However, there are some shortcomings of the current standard and some challenges that need to be addressed before IEC 62351 can be implemented and gain wide acceptance. This paper will highlight the challenge of addressing secure communication in the substation real-time environment, complying with the IEC 61850 real-time specifications. The major difficulties are to reach the performance defined in IEC 61850 for GOOSE and SV data with today‟s proposed technical specification defined for IEC 62351 part 6. In chapter 2, we will give a short overview about the structure of IEC 61850 as well as the detailed performance requirements for the various data types. Chapter 3 will present an introduction of the IEC 62351 standard including the used methods to secure the IEC 61850 communication. Chapter 4 will then show the major implementation issues of IEC 62351 part 6. -
Preview - Click Here to Buy the Full Publication
This is a preview - click here to buy the full publication IEC/TR 62351-10 ® Edition 1.0 2012-10 TECHNICAL REPORT colour inside Power systems management and associated information exchange – Data and communications security – Part 10: Security architecture guidelines INTERNATIONAL ELECTROTECHNICAL COMMISSION PRICE CODE X ICS 33.200 ISBN 978-2-83220-419-1 Warning! Make sure that you obtained this publication from an authorized distributor. ® Registered trademark of the International Electrotechnical Commission This is a preview - click here to buy the full publication – 2 – TR 62351-10 © IEC:2012(E) CONTENTS FOREWORD ........................................................................................................................... 4 INTRODUCTION ..................................................................................................................... 6 1 Scope ............................................................................................................................... 7 2 Normative references ....................................................................................................... 7 3 Terms, definitions and abbreviations ................................................................................ 7 3.1 Terms and definitions .............................................................................................. 7 3.2 Abbreviations .......................................................................................................... 7 4 Power systems – specifics and related -
The Smart Grid
Privacy in the Smart Grid ISED 2018 Alfredo Rial [email protected] Table of Contents • Challenges of the Current Grid • The Smart Grid • Privacy Problems • Possible Privacy-Friendly Solutions Current Challenges in the Grid Integration of renewable sources of energy Integration of renewable sources of energy: • Solar panels • Wind mills From centralized to distributed power generation: • Transmission and distribution borders blur • Requires bidirectional energy flows • More resilience to attacks against plants • Help meeting demand grow Improving the load factor • Short peaks caused, e.g., by heating and air conditioning • Costly gas turbines employed to match peak loads • They can be started and shut down fast • Peak power plants only on several hours a day • Electricity prices are incremented Incorporation of Demand Response To reduce the load, customers are requested to reduce their load. Currently, this is mainly done with large industrial customers. Load Control Switch Integration of Advance Electricity Storage • Renewable sources are variable, so electricity generation can be higher than demand. • Electricity is stored to be used during peak demand periods • Different methods (not cheap): • Batteries. • Pumped water • Electric vehicles • Hydrogen • Compressed air Obsolescence • Aging Equipment • Obsolete layout – insufficient facilities • Outdated Engineering Deregulation of the Electricity Market Operating a system using concepts and procedures that worked in vertically integrated industry exacerbate the problem under a deregulated -
I.ICT-2011-285135 FINSENY D1.11 Version 1.0 Security Elements for the FINSENY Functional Architecture
Ref. Ares(2014)490312 - 25/02/2014 FINSENY D1.11 , Version 1.0 I.ICT-2011-285135 FINSENY D1.11 version 1.0 Security Elements for the FINSENY Functional Architecture Contractual Date of Delivery to the CEC: March 30 th , 2013 Actual Date of Delivery to the CEC: March 30 th , 2013 Author(s): Lionel Besson, Steffen Fries, Andreas Furch, Henryka Jormakka, Fabienne Waidelich, Maria M artin-De-Vidales-Ramirez Participant(s): Siemens AG, Thales, VTT, Atos Research & Innovation Workpackage: WP1, Task 1.6 Security Estimated person months: (resources spent on the deliverable) Security: PU Nature: R Version: 1.0 Total number of pages: 134 Abstract: Deliverable D1.11 presents all FINSENY security elements, especially including the energy domain specific security elements needed for the FINSENY scenarios. These are described as enablers, constraints, general elements countermeasures, or controls. Scenario specific security elements needed for FINSENY are also analyzed. It represents a direct continuation of deliverable D1.10 [181] and therefore fully includes its structure and content. Keyword list: Threat and risk analysis, security, risk assessment, interfaces, security requirements, scenario, use case, system analysis, authentication, authorization, privacy, confidentiality, trust domain, availability, reliability, functional architecture, security enablers, security standards, security elements, FINSENY, FI- WARE Disclaimer: Page 1 (134) FINSENY D1.11 , Version 1.0 Not applicable. Page 2 (134) FINSENY D1.11 , Version 1.0 Executive Summary D1.11, titled “Security Elements for the FINSENY Functional Architecture” is a direct continuation of deliverable D1.10 [181] and therefore fully includes the structure and contents of it. D1.11 is thus as well based upon a threat and risk analysis which led to the definition of a set of security requirements that can be applied to all scenario work packages and a scenario specific security requirement. -
IEC 62351 Security Standards for the Power System Information Infrastructure
IEC TC57 WG15: IEC 62351 Security Standards for the Power System Information Infrastructure Frances Cleveland, WG15 Convenor Xanthus Consulting International Contents 1. OVERVIEW: IEC TC57 WG15 SECURITY FOR POWER SYSTEM COMMUNICATIONS ................... 1 2. DUAL INFRASTRUCTURES: THE POWER SYSTEM AND THE INFORMATION SYSTEM .................. 2 3. WHY CYBERSECURITY? ............................................................................................................ 3 3.1 Legacy Approach: Security by Obscurity .......................................................................... 3 3.2 Smart Grid as Cyber-Physical Systems .............................................................................. 4 4. SECURITY CONCEPTS ............................................................................................................... 5 4.1 Security Threats ............................................................................................................... 5 4.2 Security Purposes ............................................................................................................ 5 4.3 Security Processes ........................................................................................................... 6 4.4 Security Planning ............................................................................................................. 7 4.5 Security Requirements .................................................................................................... 8 4.6 Security Attacks .............................................................................................................. -
Twincat 3 Wind Framework for Wind Turbine Automation 1 Framework and 10 Years of Expertise Through 40,000 Installations
cover PC Control | Wind Special 2015 PC Control | Wind Special 2015 cover TwinCAT 3 Wind Framework for wind turbine automation 1 Framework and 10 years of expertise through 40,000 installations The new TwinCAT 3 Wind Framework will enable manufacturers of wind turbines to program their systems quickly and easily on their own. All functions are integrated into one universal software package: from event management to database connectivity, and even basic func- ttitionsonns susuchch aass sststateate macmachinehine anandd hyhydraulics.draulics. A preprefabricatedf application template considerably sisimplifiesmmplifies tthehhe pprogrammingrogramming pprocess,rocess, enablienablingng ddevelopers to concentrate on the essential sysystemstem ffunctions.unctions. The resuresult:lt: efefficientficient enengineering,gineering shorter time-to-market, and the benefits oof IndIndustryusttry 4.4.00 foforr ththee wind indindustry.ustry. © AREVA Wind/Jan Oelker cover PC Control | Wind Special 2015 Cloud Database TwinCAT Transport Layer – ADS Proxy Database TcCOM TcCOM Status Parameter Command TcCOM TcCOM TcCOM Statistics Capture User Framework (Generic) Framework TcCOM TcCOM TcCOM TwinCAT 3 Wind Library PLC Supervisory Operational Simulation TcCOM Control Control Pitch Rotor Generator Converter Yaw Template (Specifi c) Fieldbus Application templates and encapsulated Comprehensive functionalities are implemented in encapsulated TwinCAT mod- ules, which are then integrated into the TwinCAT 3 architecture. Efficient soft- modules enable modular software ware development is ensured through a modular architecture in the application architecture with high functionality template, as well as through proven and directly applicable TwinCAT modules and functions. The flexible configuration makes adaptation to user-specific application requirements very straightforward. System diagnostic functionality Beckhoff has offered advanced wind industry solutions for over 16 years.