This disclosure relates to communications from faulted circuit indicators. More particularly, this disclosure relates to filtering the communications from faulted circuit indicators and sending only selected communications to a central monitoring system.
Non-limiting and non-exhaustive embodiments of the disclosure are described, including various embodiments of the disclosure with reference to the figures, in which:
Processes and distributed systems are often monitored, automated, controlled or protected by a central monitoring system. Some examples of central monitoring systems include supervisory control and data acquisition (SCADA) systems, outage management systems, automatic meter reading (AMR) systems, advanced metering infrastructure (AMI) systems, other communications systems, and the like. One such process or distributed system that is typically monitored and controlled by a monitoring system is electric power transmission and distribution. The monitoring system may be configured to receive data, events, and actions taken on the power system from various devices on the electric power transmission and distribution system. Accordingly, the supervisory control operations made at the monitoring system level are only as appropriate as the data received from the power system devices is timely and accurate. Thus, monitoring systems require that the data received from the various power system devices be timely and accurate.
As mentioned above, electric power protection, automation, control, and monitoring may involve the use of various devices intended to gather and/or process power system information from the electrical power system equipment. Faulted circuit indicators (FCIs) are one type of such device, and may be used to indicate the presence of a fault and/or other events on a conductor. Various types and functions of FCIs are described in U.S. Pat. Nos. 3,676,740, 3,906,477, 4,063,171, 4,234,847, 4,375,617, 4,438,403, 4,456,873, 4,458,198, 4,495,489, 4,974,329, 5,677,678, 5,990,674, 6,014,301, 6,016,105, 6,133,723, 6,133,724, 6,429,661, 6,433,698, 6,479,981, 6,734,662, 6,822,576, 6,894,478, 6,949,921, 6,963,197, 7,023,691, 7,053,601, 7,106,048, 7,271,580, and 7,315,169, each of which is herein incorporated by reference in its entirety.
FCIs often include means of detecting and processing various power system conditions. Among those are the current, voltage, and temperature. Temperature is typically measured using a diode that is part of a processor on the FCI. With these measured conditions, the FCI can perform various calculations to determine whether an event has occurred on the power system such as a permanent fault, a temporary fault, an overcurrent condition, an undervoltage condition, a high temperature condition, an inrush condition, a backfeed condition, direction of current flow, loss of potential, a switching transient, a system overload, an exceeded load profile, and the like.
FCIs may further include a means of communication to a monitoring system such as via radio frequency, fiber optics, copper wire, and the like. Typically, FCIs with the ability to communicate to the monitoring system are configured to communicate every event and/or at predetermined time intervals. This results in communication of vast amounts of data back to the monitoring system, leading to an overload of information for the system.
Further, though FCIs have been used for many years to assist electric utility personnel to locate faulted sections of power line more efficiently, FCIs may tend to false trip and/or false reset. These false tripping and false resetting events provide misleading information to linemen and reduce the perceived reliability of FCIs. Most of the sources of undesirable operation can be attributed to misapplication or human error. However, because most FCI events are a result of a detection of a peak current and FCIs have no inherent means of discriminating fault current from other overcurrent event, they may misoperate by indicating a fault when the line is not faulted. Further, FCIs typically have no inherent means of discriminating between load current and backfeed current, leading to similar misoperations. Consequently, due to the various possible misoperations, utility personnel may loose trust in the devices. Further, because misoperations may lead to communications of events back to the monitoring system (in schemes where the FCIs are capable of communicating events back to the monitoring system), misinformation concerning those events may cause improper reaction. Because of the many communications due to misoperations, the monitoring system may become overwhelmed with data provided by the FCIs.
The embodiments of the disclosure will be best understood by reference to the drawings, wherein like parts are designated by like numerals throughout. It will be readily understood that the components of the disclosed embodiments, as generally described and illustrated in the figures herein, could be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the systems and methods of the disclosure is not intended to limit the scope of the disclosure, as claimed, but is merely representative of possible embodiments of the disclosure. In addition, the steps of a method do not necessarily need to be executed in any specific order, or even sequentially, nor need the steps be executed only once, unless otherwise specified.
In some cases, well-known features, structures or operations are not shown or described in detail. Furthermore, the described features, structures, or operations may be combined in any suitable manner in one or more embodiments. It will also be readily understood that the components of the embodiments as generally described and illustrated in the figures herein could be arranged and designed in a wide variety of different configurations.
Several aspects of the embodiments described will be illustrated as software modules or components. As used herein, a software module or component may include any type of computer instruction or computer executable code located within a memory device and/or transmitted as electronic signals over a system bus or wired or wireless network. A software module or component may, for instance, comprise one or more physical or logical blocks of computer instructions, which may be organized as a routine, program, object, component, data structure, etc., that performs one or more tasks or implements particular abstract data types.
In certain embodiments, a particular software module or component may comprise disparate instructions stored in different locations of a memory device, which together implement the described functionality of the module. Indeed, a module or component may comprise a single instruction or many instructions, and may be distributed over several different code segments, among different programs, and across several memory devices. Some embodiments may be practiced in a distributed computing environment where tasks are performed by a remote processing device linked through a communications network. In a distributed computing environment, software modules or components may be located in local and/or remote memory storage devices. In addition, data being tied or rendered together in a database record may be resident in the same memory device, or across several memory devices, and may be linked together in fields of a record in a database across a network.
Embodiments may be provided as a computer program product including a machine-readable medium having stored thereon instructions that may be used to program a computer (or other electronic device) to perform processes described herein. The machine-readable medium may include, but is not limited to, hard drives, floppy diskettes, optical disks, CD-ROMs, DVD-ROMs, ROMs, RAMs, EPROMs, EEPROMs, magnetic or optical cards, solid-state memory devices, or other types of media/machine-readable medium suitable for storing electronic instructions.
The interrupting devices and/or the phases may further be monitored, protected, controlled, and/or automated by various intelligent electronic devices (IEDs). IEDs are typically computer-based relays such as those sold by Schweitzer Engineering Laboratories, Inc. of Pullman Wash. Further, the IEDs may consist of remote terminal units (RTUs) configured to monitor the power system and communicate power system information back to a central computer, monitoring system, or the like. IEDs 122, 120 may further be configured to communicate power system information including, but not limited to, currents, voltages, resistances, reactances, distance to fault, phasors, synchrophasors, impedances, contact outputs, statuses (such as a circuit breaker status, for example), and the like.
As can be seen, FCIs 102, 104, and 106 are installed on the overhead conductors of the electric power distribution system 180. Each of the three FCIs 102, 104, and 106 are of the type that includes a means for radio communication and an antenna. The FCIs 102, 104, 106 may be configured to broadcast a status message upon detection of an event and/or following the passage of a predetermined amount of time (scheduled reporting).
As can be seen, the FCIs 102, 104, and 106 are configured to broadcast the status messages and the Transceiver interface (TI) 150 is configured to receive the status messages. TI 150 includes a means for receiving radio frequency messages such as an antenna and a transceiver. TI 150 may further be configured to receive power system information either directly from the power system or from IEDs connected to the power system.
It is contemplated that any such scheme for communicating power system information from the power system to TI may be used. As many interrupting devices and conductors are monitored by IEDs, it may be easiest for utilities to simply configure those IEDs to send power system information to the TI 150. Even so, it is contemplated that TI may employ known techniques for acquiring power system information directly from power system equipment and sensors as IEDs typically do.
Further illustrated is that IEDs 120 and 122 have a communications link to the monitoring system 160. Thus, the monitoring system is capable of receiving data directly from the IEDs. Though IEDs provide a great deal of information to the monitoring system 160, fault location on a distribution system is difficult to derive solely from such information. For example, though an IED may be capable of detecting a fault and calculating a distance to the fault, the distribution system may have several branches, resulting in several possible locations of a fault. Further, because there are typically several pieces of distribution equipment such as transformers, capacitor banks, voltage regulators, and the like on the distribution system, distance calculations may be flawed. Accordingly, power system information from FCIs installed on conductors throughout the electric power system may be of much value to the monitoring system 160 to better determine location of a fault.
According to the present disclosure, therefore, the monitoring system is also capable of receiving power system information from TI 150. TI 150 is configured, as described in more detail herein, to receive radio frequency communications from the FCIs 102, 104, and 106, and compare it against other power system information either received from the IEDs 120, and 122 or from the power system itself before communicating the power system information gathered from the FCIs 102, 103, and 106 to the monitoring system 160. The result is that the monitoring system 160 receives power system information from FCIs that has been verified with power system information from other sources, thus decreasing the degree to which power system information from the FCIs communicated to the monitoring system includes misinformation due to misoperation by the FCIs. A further result is a decrease in the overall communication of power system information from FCIs to the monitoring system. That is, the present disclosure describes a system of only transmitting filtered or validated data to the monitoring system instead of a system where all status messages from all FCIs are communicated to the monitoring system.
The monitoring system of the present disclosure may be any system configured to receive information from the IEDs, FCIs, and/or TIs. The monitoring system may be a stand-alone monitoring system, or part of a larger monitoring scheme. For example, the monitoring system may be or may be part of a larger outage management system configured to monitor and/or locate faults or outages on an electric power system. The monitoring system may include an existing communications infrastructure. The monitoring system may be a SCADA system or pass data along to a SCADA system. The monitoring system may be or pass data along to an AMR or AMI system. Other monitoring systems are also within the scope of this disclosure.
a. Faulted Circuit Indicator with RF Communications
As described in
The output from amplifier 206 is tied to the positive input terminal of comparator 210. The negative input terminal of comparator 210 is sourced by DAC 218, which is programmed by processor 216. In this way, processor 216 can control the threshold level of comparator 210. Adjusting the threshold of comparator 210 directly controls the fault current threshold (i.e.; the level of current in the monitored conductor that is considered a fault) and provides the means for auto-ranging.
The output of amplifier 208 is shown being passed through a second ADC 220. Note that a single ADC and a multi-position analog switch could be used as well. Processor 216 uses the input from this second ADC 220 to monitor the peak current detected by the current acquisition circuit approximately once every half-cycle period. If the monitored peak current is not sufficiently large, processor 216 will record the time. If the monitored peak current is of sufficiently small magnitude for a predetermined time period the processor 216 will place the fault indicator into system detect state, which is the method in which inrush lockout is accomplished. System detect state is discussed later in the application. The particular magnitude below which the current must fall before system detect state is triggered is determined by the value of the monitored average current. Additionally, the fault threshold that is determined from the monitored average current is saved in the processor non-volatile memory such that the re-energization level will be configured in the event that the processor loses power during an outage.
In addition to the above, the FCI may be configured to detect other power system events using the available information and algorithms in the microprocessor. For example, the microprocessor may be programmed to detect for loss of voltage, compare a load against a load profile, count the number of events by event type (permanent faults, temporary faults, and the like), record the amount of time between events, record the amount of time between an event and sending a message, record the amount of time between detecting an event and being interrogated, and the like.
As for the exceeded load profile, the FCI may include a load profile defining acceptable load conditions over time and be configured to indicate that an event has occurred if the load exceeds the load profile. For example, the load profile may indicate acceptable conditions unless the total time in an overcurrent condition is over 10 hours. Thus, once the FCI detects that the total time spent in an overcurrent condition is greater than 10 hours, it indicates an event. Another possible load profile may be that an overcurrent condition must persist for a predetermined amount of time. As long as the overcurrent condition does not exceed the predetermined amount of time, no event is issued for that profile. If, however, an overcurrent condition exists for the predetermined amount of time, the FCI does issue an event for that load profile.
As described above, the FCI may be configured to only communicate to the TI under certain circumstances. For example the FCI may be configured to initiate a message to TI after the passage of a predetermined amount of time (scheduled reporting). In such a configuration, the FCI would also include a clock module configured to track the passage of time. The FCI may include a predetermined message configuration and simply populate the message with data and transmit the populated message upon a lapse of the predetermined amount of time or on a report schedule. For example, the FCI may be configured to populate and transmit a report every eight hours. The predetermined message configuration may include areas for populating the detected current, detected voltage, whether a permanent fault is detected, whether a temporary fault has been detected, detected temperature, the fault detection level, whether an inrush condition was detected, the number of previous faults detected, an expected remaining lifetime, identification information, and the like.
The FCI may be configured to send a message to TI upon receiving an interrogation from TI. In such a configuration, the FCI would be capable of receiving an instruction from TI to configure and send a status message containing either a preconfigured set of data, or a set of data required by TI. The existing RF link may be used to receive the message from TI, communicate it to the micro-controller 216, and communicate the resulting message from the micro-controller 216 to TI. The micro-controller 216 may be configured to populate data in a pre-configured message. For example, the pre-configured message may be the status message that the FCI transmits upon the passage of time or the occurrence of an event. As above, the pre-configured message may include data such as the detected current, detected voltage, whether a permanent fault is detected, whether a temporary fault has been detected, ambient temperature, the fault detection level, whether an inrush condition was detected, the number of previous faults detected, an expected remaining lifetime, identification information, and the like.
Further, the TI may interrogate for specific power system information, in which case the micro-controller 216 would populate a message with only the information required by the TI, and cause the message to be transmitted to the TI. In this configuration, the message may be preconfigured, and the FCI would only populate the fields corresponding with the information required by TI. Further, the message may be preconfigured with certain data that is required to be in each message such as FCI identification information. The message may be configured based on what was requested by the TI. After the message is populated, the FCI would cause the message to be communicated to TI using, for example, the RF link 280 used to receive the interrogation from the TI.
In an embodiment, the FCI may configure and transmit a status message upon the occurrence of an event. The event may be any event condition detectable by the FCI. For example, the event may be any of: detection of a permanent fault, detection of a temporary fault, detection of load current above a certain threshold and/or for a predetermined amount of time, an overcurrent condition, an undervoltage condition, a loss-of-voltage condition, a high-temperature alarm, a change in fault detection levels, lapse of a predetermined amount of time, expected FCI lifetime falling below a predetermined threshold, an exceeded load profile, and the like.
If an event is detected by the FCI, the micro-controller 216 is configured to either create or populate a status message and cause the RF link 280 to transmit the message to the TI. In the embodiment where the message configuration is predetermined, the microcontroller populates the fields of the message with the required information. In the configuration where the message configuration is not predetermined, the FCI may form a message with the event type, and may include FCI identification information as well. The FCI causes the message to be transmitted once the message is formed.
The FCI may further be configured to transmit a status message to TI upon occurrence of any of the message triggers described above.
The FCI may include a clock or other timing device and start a timer when an event is detected. The microcontroller may stop the timer upon receiving an interrogation and include the lapsed time in the status message.
In one embodiment, the FCI may be configured to transmit a status message only after a predetermined amount of time after the detection of an event if the FCI has not yet been interrogated by the TI. In this embodiment, the FCI would initiate a timer upon occurrence of an event (if the event is a fault and no current is flowing through the conductor, the battery may be necessary to run the timer). If the FCI were not interrogated by the TI for a status message before the timer runs out, then the FCI would initiate a status message to the TI. In one embodiment, once the FCI has been interrogated, it cancels the timer, and does not send a status message solely based on the lapse of the timer.
In one embodiment, the FCI is configured such that it does not send a status message to the TI unless it is interrogated thereby. This saves battery life of the FCI in that status messages are not sent unless they are needed by the TI.
In one embodiment, the TI may be capable of signaling the FCIs not to send a status report. Upon receipt of such a message, FCIs would not send a status message until the next time that the FCI is configured to send a status report (upon further interrogation, event occurrence, passage of time, or the like).
One field of information in the status message that the FCI may send to the TI that may help with fault location is FCI identification information. This identification information may include, for example, an FCI serial number, GPS coordinates of the FCI, or other FCI identification information. Another possible identification information may be a pole number of a power pole near where the FCI is installed. Several electric power utilities maintain maps of power distribution systems using power pole numbers. In this case, the pole number may give the best information as to the location of the FCI that detected the event. This identification information may be stored either in the micro-controller 216 or within a memory storage (not separately pictured). The FCI identification information may be preprogrammed into the FCI by the manufacturer (e.g. a serial number programmed into the FCI by the manufacturer) or writeable to the FCI by either the manufacturer or the end user. The RF link, or optical communication via the external LED 230 may be used to program the FCI identification information into the FCI.
One helpful type of FCI identification information that may be programmed into the FCI is GPS coordinates of the installed FCI. In this embodiment, when the FCI is installed, the GPS coordinates of the FCI may be calculated (using a GPS device), and programmed into the FCI using, for example, the RF link or the optical communication via the External LED 230.
Alternatively, the GPS coordinates may be calculated when the FCI is installed and associated with other FCI identification information in a database. For example, when the FCI is installed, the GPS coordinates may be calculated and recorded along with the installed FCI serial number. Thus, using the FCI serial number, the exact location of the FCI may be determined using the GPS coordinates and the database correlating the two types of information.
FCI location information may be useable by the SCADA scheme and/or the TI to determine the location of the FCI and for correlating status messages from the FCI with other power system information. The location of the FCI is helpful in determining the location of an event on the electric power system. For example, where two FCIs are adjacent on the same conductor, and one reports a fault and the other does not, then the fault is likely somewhere on the conductor between those two FCIs.
b. Transceiver Interface
Turning now to
Illustrated in
TI 150 further includes a communications port 362 for communication with the monitoring system 160 for transmitting data to the monitoring system 160 and if needed for receiving data from the monitoring system 160. For example, when the TI is within an IED, it may receive commands from the monitoring system to open a line such as by opening the interrupting device 114.
TI also includes a RF communications port 360. The RF communications port 360 may be connected directly to the TI 150, or may be simply in communication with the TI 150. For example, the RF communications port 360 may be a cable leading to an RF antenna. Further, the RF communications port 360 may include an intermediate device such as a modem or external radio. One such intermediate device may be the SEL-3021-1 or SEL-3021-2 serial encrypting transceiver (available from Schweitzer Engineering Laboratories, Inc.) used to encrypt and/or decrypt data communicated with the FCIs. If the SEL 3021-1 or SEL 3021-2 is used, a separate RF transceiver is needed to transmit the communications over RF.
Another such intermediate device may be the SEL 3022 Wireless Encrypting Transceiver (available from Schweitzer Engineering Laboratories, Inc.) used to encrypt and/or decrypt data communicated with the FCIs and for wireless communication of such data.
The RF communications port 360 is configured to receive RF communications from the FCIs 102, 104, and 106 and communicate such to the transceiver module 356. In an embodiment, the RF communications port 360 is also configured to transmit communication from the TI 150 to the FCIs 102, 104, and 106 such as interrogation of the FCIs.
The TI further includes a processor 352 (which may be a device such as an application specific integrated circuit (ASIC), field programmable gate array (FPGA), microprocessor, or the like) in communication with the transceiver. The processor 352 includes a logic module 354 operating thereon. The logic module 354 is configured to receive power system information from various sources and verify such information through comparison. In an embodiment, the logic module 354 is configured to receive and parse status messages from FCIs 102, 104, and 106, and power system information from other sources (such as the power system itself or IEDs connected thereto, as described herein) and compare the power system information from status messages from the FCIs 102, 104, and 106 against the power system information from other sources. If the power system information from other sources agrees with the power system information from the FCIs, then the logic module 354 is further configured to have the power system information from the FCIs formatted into a format expected by the monitoring system 160 and transmitted to the monitoring system 160 using the transceiver module 356 and the communications port 362.
For example, if FCI 102 determines that there is a fault on the monitored conductor, it may be configured to send a status message containing such information and identification information to the TI via the RF communications port 360. The status message is then communicated to the logic module. Similarly, IED 122 is monitoring the same phase as FCI 102, and may be configured to constantly send status messages to TI 150 via the communications port 364. The logic module 354 is configured, in this example, to parse the message from FCI 102 to determine the identification information (including the monitored phase), and that the FCI 102 has determined that there is a fault on that phase. The logic module 354 is further configured to parse the status message from IED 122 to determine whether IED 122 has also detected a fault on the monitored phase. If the status message from the IED 122 also indicates the presence of a fault on the phase monitored by FCI 102, then the logic module is configured to have the processor transmit the status message from the FCI to the monitoring system 160.
As mentioned above, the monitoring system 160 may expect the message to be communicated according to a particular protocol (e.g. DNP, MODBUS, IEC-61850, and the like). The processor may be configured to format the status message according to the expected protocol before sending the status message to the monitoring system 160 via the transceiver module 356 and the communications port 362.
The logic module 354 is further configured to interrogate the IEDs 120 and 122 for status information in an effort to verify a status message received from an FCI 102, 104, and 106.
The transceiver module 356 may be in communication with the power system via a communications port 364. In this embodiment, the TI 150 may be capable of making calculations on the received power system data as an IED would do to derive power system information that may be used to verify status messages from FCIs. For example, if the received information is a current and breaker status (from interrupting device 114 and current transformer 124), the processor 352 may be configured to filter and process the current information as is known in the art to determine whether there is a fault on the conductor.
The logic module 354 may be configured to have an FCI interrogated so that the FCI sends, and the TI receives a status message from the FCI in an effort to verify power system information received from either the power system or an IED. The logic module 354 may be configured to have an FCI interrogated to receive a status message so that a location of an event may be determined when an event is either derived from the received power system information or received from an IED. The logic module 354 may trigger the processor 352 to configure and send an interrogation message to the FCIs requesting a status message from each FCI.
The logic module 354 may be configured to trigger the processor 352 to configure and send an interrogation message to a particular one of the FCIs requesting a status message from that particular FCI. In this case, the interrogation message may include the FCI identification information, and each FCI receiving the interrogation message would be configured to compare the received FCI identification information against its own FCI identification information and respond to the request only if the two match.
The processor 352 may be configured to request specific information in the interrogation message. Alternatively, the processor 352 may be configured to simply request a status message. In either case, the FCIs may be configured to respond to the particular request presented in the interrogation message as described above.
The logic module 354 may further be configured to use the received response to the interrogation message as is described above to either verify the power system information received from the power system and/or IEDs, and have the status message from the FCI communicated to the monitoring system 160.
As described above, the FCIs may be configured to record a time between detecting an event and receiving an interrogation from the TI. The time elapsed is written into the status message and sent to the TI. The TI may then use the elapsed time with the event detected to time align this event with events detected by other FCIs and reported to the TI. In an alternative embodiment, each FCI may include a clock and include the time of the event in the status message. However, as the time kept by the individual clocks may drift, these time stamps may not be as accurate. In one embodiment, each FCI also includes a clock with access to a common time source such as described below. Such FCIs could include a time stamp from the common time source for proper time alignment of status messages and/or events by the TI and or the monitoring system.
As is illustrated, the TI 150 may further be in communication with a local human-machine interface (HMI) 366. The local HMI 366 may be useful in operating the TI 150. The local HMI 366 may be in communication with the TI 150 to change and/or apply settings, set message configurations, set the monitoring system communications protocols, upload a database of FCI identification and location information, and the like.
TI 150 further includes a data storage module 358 that may be any medium capable of data storage known in the art. The processor 352 may be configured such that certain information may be written to and/or received from the data storage module 358. For example, a database of FCI identification and location information may be written to the data storage module 358. Further, certain events reports, FCI status messages, power system information, and the like may be written to the data storage module 358.
TI 150 may further be in communication with a common time source 368. The common time source 368 may be provided by various time sources including, but not limited to: a Global Positioning System (GPS); a radio time source, such as the short-wave WWV transmitter operated by the National Institute of Standards and Technology (NIST) at 2.5 MHz, 5 MHz, 10 MHz, 15 MHz, and 20 MHz, or a low frequency transmitter, such as WWVB operated by NIST at 60 Hz; a cesium clock; an atomic clock; and the like. TI 150 may use time information from the common time source 368 to apply time stamps to certain data, and/or for comparing data from FCI status messages with other power system data. IEDs also often receive common time information, and are often capable of applying time stamps to the data.
Turning now to
The TI 426 (acting as a protective relay) may also attempt to calculate the distance to the fault 406 using conventional fault distance algorithms. However, because the line 416 may include branches, capacitor banks, voltage regulators, transformers or other equipment, the location of the fault may not be known or calculable by a distance-to-fault calculation. Further, certain conditions of the fault and the line make the calculation of the distance to the fault less accurate. For example, the duration of the fault affects the accuracy of the fault distance calculation.
The TI 426 could also use its communication capabilities with the FCIs on the line to narrow down the location of the fault occurred on the line. In one scenario, the FCIs would be programmed such that they would indicate a fault, but would not communicate to an TI that they sensed a fault until either a predetermined amount of time had passed or the TI interrogated the FCI about whether it detected a fault. For example, TI 426 in detected the fault 406. In order to determine where the fault 406 is (or verify the location of the fault with its calculation of the distance to the fault), the TI 426 would interrogate one of the FCIs to determine if the FCI also indicated the presence of the fault. The TI could interrogate the FCIs one at a time so that not all FCIs are interrogated, and not all FCIs would use up battery life on communication with the TI, thus saving battery life of the FCIs.
The TI 426 may start with interrogating the first FCI 430. When the first FCI 430 reports the fault, then the TI 426 will interrogate the next FCI 432, and so forth, until it gets to the first FCI that does not report the fault 434. The TI would then conclude that the fault is between the last FCI that reported a fault 432 and the first FCI that did not report the fault 434. If the FCIs are programmed to report a fault after a predetermined amount of time, then interrogation by the TI may set the FCIs to not report the presence of that fault.
The TI 426 may use its calculated distance to the fault 406 to intelligently interrogate the FCIs. Here, it may be helpful for the TI to have knowledge of the “line distance” (distance on the power line instead of a straight-line or “as the crow flies” distance) to each of the FCIs, and coordinate this information with the particular identification information of each FCI. This information can be calculated and stored in, for example, a lookup table within the TI 426. Other methods for calculating and/or coordinating FCI location with its line-distance from the TI 426 may be used. If the TI 426 calculates that the fault 30 is a certain distance down a particular line, and looks up the adjacent FCIs using the lookup table. Thus, the TI 426 may calculate that the fault would lie between FCIs 432 and 434, then the TI 426 may begin its interrogation with the FCI 432 it calculates as adjacent and previous to the fault 406. When that FCI 432 reports the fault, the TI 426 could then interrogate the FCI 434 that it calculates as immediately after the fault 406. When the FCI 432 immediately before the fault reports the presence of the fault, and the FCI 434 immediately after the fault reports no fault, then the TI 426 can confirm that the fault is on a portion of the line between the FCIs 432 and 434. The TI 426 may then signal the remaining FCIs on the line 418 to not report the presence or absence of a fault or loss of potential. The TI 426 may further communicate to the substation IED 404 that the fault 406 is on the feeder 418 associated with that TI 426, and may also communicate the location of and/or distance to the fault 406. The TI 426 may also communicate to the substation IED 404 that the location of and/or distance to the fault 406 have been checked by interrogating the FCIs. The substation TI 426 can use this information to communicate to a technician the presence of, distance to, and/or location of the fault 406. The substation IED 404 can further use this information to verify that it calculated the correct phase with the fault 406.
Illustrated in
The FCIs 30 of the embodiments described herein may be programmed to signal the presence of a fault back to their respective TIs 424, 426, or 428 after a predetermined time period in a case that the TI 424, 426, or 428 fails to signal the FCIs 30 not to report the event. For example, in
The FCIs 30 of the present disclosure may be capable of storing event data. They may further be capable of time-stamping the event data as described above with a “time since event” or a common time. In this way the TI can better use the event data.
The FCIs may further be capable of storing and time stamping multiple events. For example, if the line experienced a fault and a recloser on the line attempted to reclose the line several times, the FCI would experience several loss-of-potential, overcurrent, inrush, and/or fault events. When later interrogated, the FCI can report each event with a time stamp, and the TI can use or transmit the event information.
As mentioned herein, the present disclosure may be used on electric power systems that include branches off of a feeder. One such embodiment is illustrated in
As with other embodiments described herein, the IED can interrogate FCIs it suspects to be the FCI immediately before the fault. Accordingly, IED will interrogate FCIs 706, 708, and 711. When FCIs 706 and 708 report no fault detection, and FCI 711 does report the fault 720, then the IED can determine that the fault 706 is on the second branch 704. To confirm the distance to the fault, the TI 424 may interrogate FCI 718 as described above. To facilitate the IED in determining which FCIs 30 are on which branch or feeder, each FCI may include its FCI identification information as described above in its status message back to the TI 424. With this information, the TI, substation IED, and/or the monitoring system can determine which feeder or branch is associated with the FCI, and its location on the feeder or branch. Accordingly, in the embodiment described above, after interrogation of the FCIs 706, 708, and 711, the TI can report the distance to the fault, and the branch (or feeder) on which the fault occurred.
Alternatively, the IED may be configured to interrogate the first FCI on each branch to determine which is the faulted branch when its distance calculation algorithms indicate that the fault is present on one of several branches. Here, the FCI would interrogate FCIs 706, 708, and 710, with only 710 reporting a fault. The IED could then conclude that the fault is located on branch 704, and either continue to interrogate FCIs on that branch to determine fault location, and/or use its distance calculation algorithms to determine the location of the fault on branch 704.
While specific embodiments and applications of the disclosure have been illustrated and described, it is to be understood that the disclosure is not limited to the precise configuration and components disclosed herein. Various modifications, changes, and variations apparent to those of skill in the art may be made in the arrangement, operation, and details of the methods and systems of the disclosure without departing from the spirit and scope of the disclosure.
Number | Name | Date | Kind |
---|---|---|---|
2379664 | Stanko | Jul 1945 | A |
2928048 | Postal | Mar 1960 | A |
2967267 | Steinman | Jan 1961 | A |
3292579 | Buchanan | Dec 1966 | A |
3296493 | Whittaker | Jan 1967 | A |
3476997 | Otzipka | Nov 1969 | A |
3525903 | Morris | Aug 1970 | A |
3621334 | Burns | Nov 1971 | A |
3676740 | Schweitzer | Jul 1972 | A |
3702966 | Schweitzer | Nov 1972 | A |
3706930 | Harner | Dec 1972 | A |
3708724 | Schweitzer | Jan 1973 | A |
3715742 | Schweitzer | Feb 1973 | A |
3781682 | Schweitzer | Dec 1973 | A |
3816816 | Schweitzer | Jun 1974 | A |
3866197 | Schweitzer | Feb 1975 | A |
3876911 | Schweitzer | Apr 1975 | A |
3906477 | Schweitzer | Sep 1975 | A |
3972581 | Oldham | Aug 1976 | A |
3974446 | Schweitzer | Aug 1976 | A |
4029951 | Berry | Jun 1977 | A |
4034360 | Schweitzer | Jul 1977 | A |
4038625 | Tompkins | Jul 1977 | A |
4045726 | Schweitzer | Aug 1977 | A |
4063171 | Schweitzer | Dec 1977 | A |
4086529 | Schweitzer | Apr 1978 | A |
4112292 | Varvel | Sep 1978 | A |
4144485 | Akita | Mar 1979 | A |
4165528 | Schweitzer | Aug 1979 | A |
4186986 | Shoemaker | Feb 1980 | A |
4199741 | Serrus Paulet | Apr 1980 | A |
4234847 | Schweitzer | Nov 1980 | A |
4251770 | Schweitzer | Feb 1981 | A |
4288743 | Schweitzer | Sep 1981 | A |
4375617 | Schweitzer | Mar 1983 | A |
4414543 | Schweitzer | Nov 1983 | A |
4424512 | Schweitzer | Jan 1984 | A |
4438403 | Schweitzer | Mar 1984 | A |
4456873 | Schweitzer | Jun 1984 | A |
4458198 | Schweitzer | Jul 1984 | A |
4495489 | Schweitzer | Jan 1985 | A |
4536758 | Schweitzer | Aug 1985 | A |
4599487 | Blank | Jul 1986 | A |
4686518 | Schweitzer | Aug 1987 | A |
4689752 | Fernandes et al. | Aug 1987 | A |
4709339 | Fernandes | Nov 1987 | A |
4794328 | Fernandes et al. | Dec 1988 | A |
4794329 | Schweitzer | Dec 1988 | A |
4794332 | Schweitzer | Dec 1988 | A |
4795982 | Schweitzer | Jan 1989 | A |
4829298 | Fernandes | May 1989 | A |
4940976 | Gastouniotis | Jul 1990 | A |
4996624 | Schweitzer | Feb 1991 | A |
5008651 | Schweitzer | Apr 1991 | A |
5038246 | Durivage | Aug 1991 | A |
5070301 | Schweitzer | Dec 1991 | A |
5089928 | Durivage | Feb 1992 | A |
5136457 | Durivage | Aug 1992 | A |
5136458 | Durivage | Aug 1992 | A |
5140257 | Davis | Aug 1992 | A |
5150361 | Wieczorek | Sep 1992 | A |
5153565 | Schweitzer | Oct 1992 | A |
5168414 | Horstmann | Dec 1992 | A |
5196682 | Englehardt | Mar 1993 | A |
5220311 | Schweitzer | Jun 1993 | A |
5298894 | Cerny | Mar 1994 | A |
5343155 | Kejariwal et al. | Aug 1994 | A |
5420502 | Schweitzer | May 1995 | A |
5438329 | Gastouniotis | Aug 1995 | A |
5495239 | Ouellette | Feb 1996 | A |
5519527 | Panton | May 1996 | A |
5542856 | Wood | Aug 1996 | A |
5550476 | Lau | Aug 1996 | A |
5565783 | Lau | Oct 1996 | A |
5648726 | Le | Jul 1997 | A |
5656931 | Lau et al. | Aug 1997 | A |
5659300 | Dresselhuys | Aug 1997 | A |
5677623 | Schweitzer | Oct 1997 | A |
5677678 | Schweitzer | Oct 1997 | A |
5701121 | Murdoch | Dec 1997 | A |
5793214 | Wakamatsu | Aug 1998 | A |
5808902 | Levert et al. | Sep 1998 | A |
5821869 | Schweitzer | Oct 1998 | A |
5825303 | Bloss | Oct 1998 | A |
5862391 | Salas | Jan 1999 | A |
5877703 | Bloss, Jr. et al. | Mar 1999 | A |
5889399 | Schweitzer | Mar 1999 | A |
5892430 | Wiesman et al. | Apr 1999 | A |
5990674 | Schweitzer | Nov 1999 | A |
6002260 | Lau | Dec 1999 | A |
6014301 | Schweitzer | Jan 2000 | A |
6016105 | Schweitzer | Jan 2000 | A |
6029061 | Kohlschmidt | Feb 2000 | A |
6072405 | Sears | Jun 2000 | A |
6078785 | Bush | Jun 2000 | A |
6133723 | Feight | Oct 2000 | A |
6133724 | Schweitzer | Oct 2000 | A |
6177883 | Jennetti | Jan 2001 | B1 |
6188216 | Fromer | Feb 2001 | B1 |
6239722 | Colton | May 2001 | B1 |
6326905 | Walters | Dec 2001 | B1 |
6349248 | Dean | Feb 2002 | B1 |
6366217 | Cunningham | Apr 2002 | B1 |
6380733 | Apel | Apr 2002 | B1 |
6414605 | Walden | Jul 2002 | B1 |
6429661 | Schweitzer | Aug 2002 | B1 |
6433698 | Schweitzer | Aug 2002 | B1 |
6479981 | Schweitzer | Nov 2002 | B2 |
6522247 | Maruyama et al. | Feb 2003 | B2 |
6525504 | Nygren | Feb 2003 | B1 |
6535797 | Bowles et al. | Mar 2003 | B1 |
6573707 | Kiriyama | Jun 2003 | B2 |
6577608 | Moon | Jun 2003 | B1 |
6617976 | Walden | Sep 2003 | B2 |
6662124 | Salas | Dec 2003 | B2 |
6671824 | Hyland | Dec 2003 | B1 |
6687574 | Pietrowicz et al. | Feb 2004 | B2 |
6734662 | Fenske | May 2004 | B1 |
6736646 | Takahashi | May 2004 | B2 |
6751562 | Blackett et al. | Jun 2004 | B1 |
6753792 | Beckwith | Jun 2004 | B2 |
6759933 | Fallak | Jul 2004 | B2 |
6792337 | Blackett et al. | Sep 2004 | B2 |
6796821 | Cairns | Sep 2004 | B2 |
6798211 | Rockwell et al. | Sep 2004 | B1 |
6822576 | Feight | Nov 2004 | B1 |
6828906 | Malcolm | Dec 2004 | B2 |
6892115 | Berkcan et al. | May 2005 | B2 |
6892145 | Topka et al. | May 2005 | B2 |
6894478 | Fenske | May 2005 | B1 |
6917888 | Logvinov et al. | Jul 2005 | B2 |
6944555 | Blackett | Sep 2005 | B2 |
6949921 | Feight | Sep 2005 | B1 |
6963197 | Feight | Nov 2005 | B1 |
7023691 | Feight | Apr 2006 | B1 |
7053601 | Fenske | May 2006 | B1 |
7106048 | Feight | Sep 2006 | B1 |
7109699 | Bierer | Sep 2006 | B1 |
7132950 | Stewart | Nov 2006 | B2 |
7254001 | Papallo | Aug 2007 | B2 |
7271580 | Fenske | Sep 2007 | B1 |
7315169 | Fenske | Jan 2008 | B1 |
7336202 | Kawai et al. | Feb 2008 | B2 |
7382272 | Feight | Jun 2008 | B2 |
7406536 | Efrati et al. | Jul 2008 | B2 |
7430932 | Mekhanoshin et al. | Oct 2008 | B2 |
7646308 | Paoletti et al. | Jan 2010 | B2 |
7714735 | Rockwell | May 2010 | B2 |
7725295 | Stoupis et al. | May 2010 | B2 |
8018337 | Jones et al. | Sep 2011 | B2 |
8059006 | Schweitzer et al. | Nov 2011 | B2 |
8065099 | Gibala et al. | Nov 2011 | B2 |
8067946 | Muench et al. | Nov 2011 | B2 |
20020089802 | Beckwith | Jul 2002 | A1 |
20030020765 | Kussmaul | Jan 2003 | A1 |
20030119568 | Menard | Jun 2003 | A1 |
20030153368 | Bussan | Aug 2003 | A1 |
20030174067 | Soliman | Sep 2003 | A1 |
20030178290 | Schilling | Sep 2003 | A1 |
20030179149 | Savage | Sep 2003 | A1 |
20040005809 | Suzuki | Jan 2004 | A1 |
20040032340 | Lingafeldt | Feb 2004 | A1 |
20040036478 | Logvinov | Feb 2004 | A1 |
20040067366 | Gorczyca | Apr 2004 | A1 |
20040113810 | Mason | Jun 2004 | A1 |
20040214616 | Malcolm | Oct 2004 | A1 |
20040233159 | Badarneh | Nov 2004 | A1 |
20050040809 | Uber | Feb 2005 | A1 |
20050068193 | Osterloh | Mar 2005 | A1 |
20050068194 | Schleich | Mar 2005 | A1 |
20050079818 | Atwater | Apr 2005 | A1 |
20050087599 | Ward | Apr 2005 | A1 |
20050110656 | Patterson | May 2005 | A1 |
20050132115 | Leach | Jun 2005 | A1 |
20050151659 | Donovon | Jul 2005 | A1 |
20050163432 | Montena | Jul 2005 | A1 |
20050205395 | Dietrich | Sep 2005 | A1 |
20050215280 | Twitchell, Jr. | Sep 2005 | A1 |
20060084419 | Rocamora | Apr 2006 | A1 |
20080077336 | Fernandes | Mar 2008 | A1 |
20090115426 | Muench et al. | May 2009 | A1 |
20090119068 | Banting | May 2009 | A1 |
20100013632 | Salewske et al. | Jan 2010 | A1 |
Entry |
---|
Cooper Industries, Ltd., GridAdvisor, OutageAdvisor Fault Detection and Location Solution, Cellular Communications, Cooper Power Systems, 2008. |
Cooper Industries, Ltd., GridAdvisor, OutageAdvisor Fault Detection and Location Solution, Sensus FlexNet Communications, Cooper Power Systems, 2008. |
Cooper Industries, Ltd., GridAdvisor Exchange, Cooper Power Systems, 2008. |
Cooper Industries, Ltd., GridAdvisor WebExchange, Cooper Power Systems, 2008. |
Tollgrade Communications, Inc., LightHouse Continuous Grid Intelligence, Tollgrade Communications, Inc., 2008. |
Wayne Honath, Sensors for Real-Time Distribution System Information: Key Elements of a 21st Century Grid, Tollgrade Communications, Inc., Jan. 2008. |
S&C Electric Company, S&C IntelliRupter PulseCloser Specifications, Jul. 21, 2006. |
Tollgrade Communications, Inc., Tollgrade Launches Distribution Grid Monitoring Product Line At Power Industry Event in Tampa Jan. 22-24, News Release, Tollgrade Communications, Inc., Jan. 15, 2008. |
Atmel Corporation, Power Management Using the Embedded Stand-alone Wake-up Mode Protocol. Rev. 2, Aug. 2002. |
Fisher Pierce Division of Pacific Scientific-Faulted Circuit Indicators—Technical Applications Data, Anh Le, Dave Donovan, Bill Doherty; 1995. |
Fisher Pierce—Radio Faulted Circuit Indicator System—(1999)—Joslyn Hi-Voltage http://www.joslynhivoltage.com/PDFFiles/rfci.pdf. |
S & C Electric Company—766-31 Specification Bulletin—(Dec. 18, 2006)—S & C IntelliRupter Pulse Closer Outdoor Distribution (15.5kV and 27 kV). |
Patent Cooperation Treaty, PCT/US2009/051019, International Preliminary Report on Patentability and Written Opinion of the International Searching Authority, Jan. 18, 2011. |
Patent Cooperation Treaty, PCT/US2009/051019, International Search Report, Sep. 15, 2009. |
Radio Receivers Series 1560 Handheld or RTU/SCADA, Joclyn Hi Voltage http://www.joclynhivoltage.com/spec1560.htm, Jul. 21, 2008. |
Bulgin 400 Series Buccaneer, www.bulgin.com.uk, Dec. 9, 2003. |
Number | Date | Country | |
---|---|---|---|
20100013632 A1 | Jan 2010 | US |