Embodiments presented herein relate to a method, an intelligent electronic device (IED), a computer program, and a computer program product for handling time shifted data streams caused by lost time synchronization in a substation network.
In general terms, substations are part of an electrical generation, transmission, and distribution system. Substations act as connection points between different transmission lines of the electrical system and might additionally transform voltage from high to low, or the reverse, or perform any of several other functions. Between the generating station and consumer, electric power may flow through several substations at different voltage levels. A substation may include transformers to change voltage levels between high transmission voltages and lower distribution voltages, or at the interconnection of two different transmission voltages.
In general terms, substations are often unattended, relying on remote supervision and control. In this respect, data streams from different data sources within a substation may be fed to a protection function configured to, based on the data streams, make a trip decision and thus to determine whether or not to trip a circuit breaker.
In general terms, for protections functions whose trip decision depends on data streams from several data sources, the data streams need to be time correlated. A precise and unified time synchronization of the data sources is thus required for the protection function to work properly. In systems where the time synchronization is propagated in a hierarchical manner (e.g. a system with multiple subnetworks interconnected with boundary clocks and using the precision time protocol, PTP, or its profile subset International Electrotechnical Commission, IEC, 61850-9-3) a time shift in the time source (or a switch of time source) may imply a substantial propagation delay of the time shift throughout the system within the substation. In turn, this might lead to transient time differences between the data sources that can lead to miss-operations of the protection function. If the data streams received by the protection function cannot be guaranteed to be time correlated the protection function should therefore be blocked such that false trips are avoided.
However, there is still a need for an improving the performance of the protection function in substation networks.
An object of embodiments herein is to provide efficient mechanisms for handling time shifted data streams in a substation network that can be used to improve the performance of the protection function.
According to a first aspect there is presented a method for handling time shifted data streams in a substation network. The method is performed by an IED. The method comprises receiving a respective data stream from at least two time synchronized data sources in the substation network. The method comprises blocking, upon detecting a time shift between the data streams resulting from one of the data sources losing its time synchronization and until a configured time amount has expired, a protection function in the substation network from acting based on the data streams.
According to a second aspect there is presented an IED for handling time shifted data streams in a substation network. The IED comprises processing circuitry. The processing circuitry is configured to cause the IED to receive a respective data stream from at least two time synchronized data sources in the substation network. The processing circuitry is configured to cause the IED to block, upon detecting a time shift between the data streams resulting from one of the data sources losing its time synchronization and until a configured time amount has expired, a protection function in the substation network from acting based on the data streams.
According to a third aspect there is presented a computer program for handling time shifted data streams in a substation network, the computer program comprising computer program code which, when run on an IED, causes the IED to perform a method according to the first aspect.
According to a fourth aspect there is presented a computer program product comprising a computer program according to the third aspect and a computer readable storage medium on which the computer program is stored. The computer readable storage medium could be a non-transitory computer readable storage medium.
Advantageously this provides efficient blocking of the protection function when the data sources are without time synchronization.
Advantageously this provides efficient blocking of the protection function as long as necessary.
Advantageously this enables better utilization of the protection function, but still avoids any false trips.
Other objectives, features and advantages of the enclosed embodiments will be apparent from the following detailed disclosure, from the attached dependent claims as well as from the drawings.
Generally, all terms used in the claims are to be interpreted according to their ordinary meaning in the technical field, unless explicitly defined otherwise herein. All references to “a/an/the element, apparatus, component, means, module, action, etc.” are to be interpreted openly as referring to at least one instance of the element, apparatus, component, means, module, action, etc., unless explicitly stated otherwise. The actions of any method disclosed herein do not have to be performed in the exact order disclosed, unless explicitly stated.
The inventive concept is now described, by way of example, with reference to the accompanying drawings, in which:
The inventive concept will now be described more fully hereinafter with reference to the accompanying drawings, in which certain embodiments of the inventive concept are shown. This inventive concept may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided by way of example so that this disclosure will be thorough and complete, and will fully convey the scope of the inventive concept to those skilled in the art. Like numbers refer to like elements throughout the description. Any action or feature illustrated by dashed lines should be regarded as optional.
The protection function 130 is part of, integrated with, or collocated with, an IED 200. There could be different examples of protection functions. In some examples the protection function 130 is a relay protection function or a control function, such as a synchronization check function. The data sources 120a, 120b, 120c belong to the MUs 140a, 140b, 140c that provide data streams in the form of analog samples to the protection function 130 via a process bus 150. Each data stream might thus comprise analog samples, for example representing voltage or current measurements of MUs 140a, 140b, 140c in the substation network 100a, 100b.
The data sources 120a, 120b, 120c are time synchronized by means of a time source 110a, which might act as a grand master clock for the substation network 100a.
As disclosed above, data streams from data sources 120a, 120b, 120c of the MUs 140a, 140b, 140c may be fed to the protection function 130 for making a trip decision. As further disclosed above, there is a need for improving the performance of the protection function 130.
In more detail, when there is a time shift (such as a change of reference time) in the substation network 100a, 100b, all data sources 120a, 120b, 120c might not change time at the same time. This can e.g. be the case when a new time source 110a, 110b is connected to a substation network 100a, 100b that was previously without time synchronization or when different substation networks, each having its own time source, are connected together.
When the data sources of the substation is time synchronized via PTP (or IEC 61850-9-3), the new time will ripple from the clock through the substation network 100a, 100b to each data source 120a, 120b, 120c. This means that during a transition, e.g. when a clock regains time synchronization after freely drifting for some time, there will be different times in different parts of the substation network 100a, 100b.
As a non-limiting illustrative example, assume with reference to
As this illustrative example shows, when the time shift occurs the data streams from the different data sources 120a, 120b, 120c might thus be out of time synchronization with respect to each other, which in turn might lead to that e.g. a differential current is registered at the protection function 130 which causes a trip to be triggered, even if there is no fault in any of the MUs 140a, 140b, 140c, or parts thereof. As noted above, this issue can be mitigated by blocking the protection function 130 during these situations. However, it might be cumbersome to determine when to start blocking of the protection function 130 and for how long the duration of the blocking should last. Otherwise there is a potential risk that the time duration for which the protection function 130 is blocked is either too short (leading to potential false trips), or too long (leading to potentially missing registering a true differential current at the protection function 130, which causes a true trip to be missed).
One way is to block the protection function 130 when the protection function 130 itself detects a time shift in the data streams. However, this does not help if one or more of the data sources 120a, 120b, 120c shifts time before this time shift in the data streams is detected by the protection function 130.
Another way is to include information to what master time source each data source 120a, 120b, 120c is connected. However, this only works if all data sources 120a, 120b, 120c (and the protection function 130) support such functionality. This will also block the protections function 130 even if not necessary when the time is the same for all data sources 120a, 120b, 120c but where the data sources 120a, 120b, 120c are using different time sources, e.g. when a main time source is lost for some of the and other time sources take over.
Further, if a system loses the clock and another time source in the system takes the roles as grand master clock, the changeover will not take place at the same time for all data sources 120a, 120b, 120c. This will lead to block of the protections function 130 even without a time shift.
According to the herein disclosed embodiments there is provided mechanisms that prevent the miss operations (e.g. by blocking the protection function 130) during the propagation of the time shift. Also, mechanisms are provided to limit the blocking of the protection function 130 as much as possible, but still prevent false trips (i.e., trips without any reason in the substation network 100a, 100b).
This is achieved by blocking the protection function 130 when needed but limit the time as much as possible as well as avoid blocking the protection function 130 when not needed.
The embodiments disclosed herein in particular relate to mechanisms for handling time shifted data streams in a substation network 100a, 100b. In order to obtain such mechanisms there is provided an IED 200, a method performed by the IED 200, a computer program product comprising code, for example in the form of a computer program, that when run on an IED 200, causes the IED 200 to perform the method.
S102: The IED 200 receives a respective data stream from at least two time synchronized data sources 120a, 120b, 120c in the substation network 100a, 100b.
The blocking of the protection function 130 starts when the IED 200 detects that at least one data stream contains time shifted data. The protection function 130 is directly blocked when such a time shift is detected
S104: The IED 200 blocks, upon detecting a time shift between the data streams resulting from one of the data sources 120a, 120b, 120c losing its time synchronization and until a configured time amount has expired, the protection function 130 in the substation network 100a, 100b from acting based on the data streams.
Embodiments relating to further details of handling time shifted data streams in a substation network 100a, 100b as performed by the IED 200 will now be disclosed.
The configured time amount is dependent on a clock domain hierarchy of the data sources 120a, 120b, 120c in the substation network 100a, 100b. The configured time amount can have a static value. Alternately, the configured time amount can be set dependent on a clock domain hierarchy of the data sources in the substation network. Here, according to the clock domain hierarchy, the configured time period may be a static or dynamic value. Further examples of this will be disclosed below.
By detecting when any data source 120a, 120b, 120c shifts time, the blocking can cover lost data from any data source 120a, 120b, 120c. In addition, the blocking is set to last so long after the time shift has been detected such that that all other data sources has at least started their time shift and therefore their time shift can be detected by the protection function 130. To optimize the duration of the blocking, the blocking can be removed when all data sources 120a, 120b, 120c are time synchronized from the same time source 110a, 110b.
In general terms, when a data source 120a, 120b, 120c shifts time there is either a jump in time of the samples or the data stream comprises an indication that it is without time synchronization. The time shift might thus be detected either by that the data streams become unsynchronized or there is a jump in sample count in the data streams. That is, in some aspects the time shift is detected by that the data streams become timewise mutually unsynchronized or there is a jump in sample count in the data stream from at least one, but not all, of the data sources 120a, 120b, 120c. With this information the IED 200 is enabled detect that there is a time shift between the data streams.
In some aspects the clock domain hierarchy defines an order according to which the data sources 120a, 120b, 120c are time synchronized by at least one time source 110a, 110b in the substation network 100a, 100b. Further aspects of this will be disclosed next.
In some aspects, according to the clock domain hierarchy, at least two of the data sources 120a, 120b, 120c are time synchronized from respective different time sources 110a, 110b.
Since the time adjustment of all time sources 120a, 120b, 120c might be in sequence, one data source might achieve time synchronization before another time source has started its time resynchronization. Therefore, in some aspects the protection function 130 is blocked as long as it might take to start the time resynchronization of all other data sources.
Reference is now made to
That is, when the data stream starts to deliver time synchronized data again, the protection function 130 is blocked an extra time 420a, 420b. This extra time 420a, 420b is long enough so that the time synchronization has time to propagate from one data source to another. The extra blocking time 420a, 420b might be the same for all data streams and depend on the propagation time for the time synchronization in the substation network 100a, 100b. By means of the extra time, if any other of the data streams starts to shift time during the blocking time, the blocking of the protection function 130 will continue.
In some aspects, according to the clock domain hierarchy, it takes at most ×3 amounts of time units for each data source 120a, 120b, 120c to regain time synchronization, it takes ×2 amounts of time units for the time synchronization to propagate to all data sources 120a, 120b, 120c, and the configured time amount expires ×2 amounts of time units after time synchronization is regained for the data sources 120a, 120b, 120c. This is illustrated in
In other aspects, according to the clock domain hierarchy, all data sources 120a, 120b, 120c are, from one and the same global time source 110a, time synchronized within ×3 amounts of time units. This is illustrated in
Reference is now made to
Here it is assumed that MU1, MU2, and MU3 are time synchronized in parallel. The extra blocking time 420a, 420b, 420c might therefore be removed. It is further assumed that the time it takes to time synchronize MU1 corresponds to 410a, the time it takes to time synchronize MU2 corresponds to 410b, and the time it takes to time synchronize MU3 corresponds to 410c, being equivalent to ×3 amounts of time units.
In some aspects, according to the clock domain hierarchy, all data sources 120a, 120b, 120c are locally time synchronized within the ×3 amounts of time units and have the same global time source 110a, the time synchronization of all data source 120a, 120b, 120c starts simultaneously, and the configured time amount expires when ×3 amounts of time units have elapsed. This is illustrated in
The extra blocking time 420a, 420b can thus be shortened, or even removed (as in the example of
If each data stream comprises information about the time source used by the data source 120a, 120b, 120c from which the data stream originates, the blocking of the protection function 130 might be removed as soon as all data sources 120a, 120b, 120c have the same time source. That is, in some aspects, according to the clock domain hierarchy, when each data stream comprises information identifying the time source 110a, 110b of its data source 120a, 120b, 120c, the configured time amount expires when the information of all data streams identifies one and the same time source 110a, 110b. The time source can be either a common time source or that all time sources 110a, 110b are time synchronized to a global time.
One particular embodiment for handling time shifted data streams in a substation network 100a, 100b based on the above embodiments, examples, and aspects will now be disclosed, using either of the substation networks 100a, 100b as an example implementation.
It is assumed that under normal operation, the time source 110a is used to provide time synchronization of all the data sources 120a, 120b, 120c to global time. It is then assumed that the time source 110a experiences a failure, potentially causing one or more of the data sources 120a, 120b, 120c to lose its time synchronization to the global time.
The IED 200, by means of its time source 110b, then performs time synchronization of all the data sources 120a, 120b, 120c to local time. However, after some time, the time source 110b might drift away from the global time.
The time source 110a is then repaired and starts to send time synchronization messages to the data sources 120a, 120b, 120c (as well as to the IED 200). First, data source 120a (as representing MU1) and the IED 200 (including the protection function 130) start to time synchronize to the new global time. However, data sources 120a, 120b (representing MU2 and MU3) are still on the local time. Thus, while MU1 shifts time and starts to send a data stream towards the protection function 130 with the new time, MU2 and MU3 still send data streams towards the protection function 130 with the old time. Without any blocking of the protection function 130, this situation is likely to cause the protection function 130 to trigger the circuit breaker to trip.
To avoid this erroneous trip to occur, the protection function 130 is blocked an extra time after the IED 200 has detected a time shift in one of the data streams. During this time the new time can propagate to MU2 and MU3, so they can report to the IED 200 that they are out of time synchronization and start to be time synchronized again. The protection function 130 is by the IED 200 blocked during the time shift for MU2 and MU3 (and, optionally, for an extra blocking time). The extra blocking time might be reduced when all MUs report global synchronized data or if all MUs are locally synchronized and identifies one the same time source.
Particularly, the processing circuitry 210 is configured to cause the IED 200 to perform a set of operations, or actions, as disclosed above. For example, the storage medium 230 may store the set of operations, and the processing circuitry 210 may be configured to retrieve the set of operations from the storage medium 230 to cause the IED 200 to perform the set of operations. The set of operations may be provided as a set of executable instructions.
Thus the processing circuitry 210 is thereby arranged to execute methods as herein disclosed. The storage medium 230 may also comprise persistent storage, which, for example, can be any single one or combination of magnetic memory, optical memory, solid state memory or even remotely mounted memory. The IED 200 may further comprise a communications interface 220 at least configured for communications with other entities, functions, nodes, and devices of the substation network 100a, 100b. As such the communications interface 220 may comprise one or more transmitters and receivers, comprising analogue and digital components. The processing circuitry 210 controls the general operation of the IED 200 e.g. by sending data and control signals to the communications interface 220 and the storage medium 230, by receiving data and reports from the communications interface 220, and by retrieving data and instructions from the storage medium 230.
As disclosed above, a protection function 130 is part of, integrated with, or collocated with, the IED 200. Hence, in some aspects the IED further comprises the protection function 130.
Other components, as well as the related functionality, of the IED 200 are omitted in order not to obscure the concepts presented herein.
In the example of
The inventive concept has mainly been described above with reference to a few embodiments. However, as is readily appreciated by a person skilled in the art, other embodiments than the ones disclosed above are equally possible within the scope of the inventive concept, as defined by the appended patent claims.
Number | Date | Country | Kind |
---|---|---|---|
19169478.5 | Apr 2019 | EP | regional |
The present application is a national stage entry of International Patent App. No. PCT/EP2020/060373, filed on Apr. 14, 2020, which claims priority to European Patent App. No. 19169478.5, filed on Apr. 16, 2019, which are both hereby incorporated herein by reference as if set forth in full.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2020/060373 | 4/14/2020 | WO | 00 |