The Use of Ethernet Technology in the Power Utility Environment

The Use of Ethernet Technology in the Power Utility Environment

460 The use of Ethernet Technology in the Power Utility Environment Working Group D2.23 April 2011 The use of Ethernet Technology in the Power Utility Environment Members Carlos Samitier (Convenor) Spain, Mehrdad Mesbah (Secretary) France, Jorge Fonseca-Portugal,Pat Cooney-Ireland, Anders Runesson-Sweden, Andres Cadenas-Spain, Aitor Arzuaga-Spain, Emiliano Marquesini-UK, Paul Schwyter-Switzerland, Sampo Yliraasakka-Finland, Ray Elliott-South Africa, Oyvind Finnekaasa-Norway, Chris Huntley-Canada Corresponding Members Rodolfo Pellizzoni-Argentina,Dugald Bell-Australia, Jan Piotrowski-Poland, Claudio Trigo-Brazil,Masami Inoue-Japan, Mrs. Jovanka Gajica-Serbia, Wan Azlan-Malaysia Copyright © 2011 “Ownership of a CIGRE publication, whether in paper form or on electronic support only infers right of use for personal purposes. Are prohibited, except if explicitly agreed by CIGRE, total or partial reproduction of the publication for use other than personal and transfer to a third party; hence circulation on any intranet or other company network is forbidden”. Disclaimer notice “CIGRE gives no warranty or assurance about the contents of this publication, nor does it accept any responsibility, as to the accuracy or exhaustiveness of the information. All implied warranties and conditions are excluded to the maximum extent permitted by law”. ISBN: 978- 2- 85873- 149-7 1 1 INTRODUCTION ...................................................................................................... 6 1.1 Scope of Work .................................................................................................... 8 1.2 What is Ethernet? ................................................................................................ 8 1.3 Service Provision Model ................................................................................... 10 1.4 Benefits ............................................................................................................. 11 1.5 Business Implications ....................................................................................... 13 1.6 Cost Considerations .......................................................................................... 14 2 UTILITY INDUSTRY CONTEXT AND APPLICATIONS FOR ETHERNET .... 15 2.1 Introduction ....................................................................................................... 15 2.2 Utility Applications ........................................................................................... 15 2.2.1 Substation Control .................................................................................... 15 2.2.2 Substation Data Analysis .......................................................................... 15 2.2.3 Real Time Protection and Automation ..................................................... 16 2.2.4 Substation Automation Platform Management ......................................... 16 2.2.5 Commercial Applications ......................................................................... 16 2.2.6 Substation Management ............................................................................ 17 2.2.7 Site Working ............................................................................................. 17 2.2.8 Security Applications ................................................................................ 17 2.2.9 Substation Operational Voice System ...................................................... 18 2.2.10 Collaborative Multi-media Communications ........................................... 18 2.3 Substation Automation Process – IEC61850 .................................................... 19 2.3.1 Introduction to IEC61850 ......................................................................... 19 2.3.2 Model & Mechanisms of IEC61850 ......................................................... 19 2.3.3 Time synchronisation for substation automation ...................................... 22 2.3.4 Further Extensions .................................................................................... 22 2.4 SCADA and ICCP related Utility communication characteristics ................... 23 2.4.1 Overview of EMS/SCADA Communications .......................................... 23 2.4.2 SCADA RTU to Control Centre Communications ................................... 24 2.4.3 Inter-Control Centre Communications ..................................................... 26 2.4.4 SCADA System Security .......................................................................... 27 3 NETWORK TECHNOLOGY DESCRIPTION ....................................................... 29 3.1 Concepts and Definitions .................................................................................. 29 3.1.1 Topology: LAN, MAN and WAN ............................................................ 29 3.1.2 Layer 2 networking ................................................................................... 29 3.1.3 Differences with Layer 3 IP network ........................................................ 30 3.2 Networking architecture .................................................................................... 30 3.2.1 Bridging .................................................................................................... 30 3.2.2 Switching .................................................................................................. 30 3.2.3 Virtual Networking ................................................................................... 31 3.2.4 RPR – Resilient Packet Ring .................................................................... 33 3.2.5 Provider Backbone Bridging ..................................................................... 34 3.2.6 MPLS-TP .................................................................................................. 35 3.3 Protection Mechanisms ..................................................................................... 36 3.3.1 Spanning Tree ........................................................................................... 36 3.3.2 Ethernet Ring Protection ........................................................................... 37 3.3.3 IEC 62439 Parallel Redundancy Protocol (PRP) ...................................... 37 3.4 Existing relevant Ethernet standards ................................................................. 38 2 3.5 Authentication & Security services over Ethernet ............................................ 40 3.5.1 Physical port protection ............................................................................ 40 3.5.2 Authentication & Encryption (RADIUS) ................................................. 41 4 ETHERNET TRANSMISSION TECHNOLOGIES ................................................ 42 4.1 Introduction ....................................................................................................... 42 4.2 Copper interfaces .............................................................................................. 43 4.3 Fibre interfaces .................................................................................................. 43 4.3.1 Optical Gigabit Ethernet Interfaces .......................................................... 43 4.3.2 10 Gigabit Ethernet interfaces .................................................................. 44 4.4 Optical Networks - Wavelength division multiplexing .................................... 45 4.4.1 CWDM (Coarse Wavelength Division Multiplexing) .............................. 45 4.4.2 DWDM (Dense Wavelength Division Multiplexing) ............................... 46 5 TRANSPORT OF ETHERNET OVER SDH ........................................................... 47 5.1 Introduction ....................................................................................................... 47 5.2 Modern SDH Data Capabilities ........................................................................ 47 5.2.1 Virtual concatenation ................................................................................ 49 5.2.2 Dynamic Bandwidth Allocation ............................................................... 49 5.2.3 Generic Framing Procedure (GFP) ........................................................... 49 5.2.4 Combining TDM and LAN Services ........................................................ 52 6 ETHERNET ACCESS TECHNOLOGIES .............................................................. 54 6.1 Ethernet over xDSL .......................................................................................... 54 6.2 PDH sub-E1 mapping ....................................................................................... 55 6.3 Inverse Multiplexing ......................................................................................... 55 6.4 Microwave Radio .............................................................................................. 56 6.4.1 Microwave Backbone Ethernet ................................................................. 56 6.4.2 Microwave Access Systems ...................................................................... 56 6.5 DPLC Bridge .................................................................................................... 57 6.6 GPRS and UMTS .............................................................................................. 59 6.7 VSAT ................................................................................................................ 60 6.8 Broadband Power Line Communication ..........................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    136 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us