Professional Documents
Culture Documents
Communication Issues Using Line Protection Schemes
Communication Issues Using Line Protection Schemes
http : //www.cigre.org
C. SAMITIER
On Behalf of
CIGRE JWG B5/D2.30
SUMMARY
Modern digital data communication has increasingly become an essential part of different protection
schemes. The reliability and correct performance of the telecommunication infrastructure has become
of most vital importance for the protection security and dependability.
Communication links for teleprotection may share transmission resources with other users and the
physical route of teleprotection data is not necessarily known. Hence, the complexity has increased
and the performance of the telecommunication depends on an increasing number of systems.
Several utilities have faced severe problems with non-adequate functionality when installing modern
communication and teleprotection systems due to inadequate coordination between Protection and
communication equipment.
The paper identifies the most relevant issues that may impair or influence protection schemes
operation and performance with a specific focus on line differential protection scheme. Remedies and
alternative solutions to these performance mismatches are proposed.
This paper identifies different architectural approaches of the implementation of telecommunication
networks for protection applications, plus its advantages and limitations for some protection schemes.
The paper analyses the interactions between protection schemes using telecommunication and the
network implemented using SDH/SONET/PDH and WDM. The most relevant aspects to be developed
are reliability and synchronisation.
KEYWORDS
1 INTRODUCTION
Electrical power system protection is provided to detect unwanted conditions on the system and to
initiate actions to remove the unwanted condition. It is required to do this quickly and selectively, and
often this is achieved by having two or more protection devices communicating with each other.
At the highest voltage levels, detection of faults and initiation of circuit isolation is required in
typically less than one cycle of the power system cycle which means <20ms for a 50Hz system (e.g.
Europe) or <17ms for a 60Hz system (e.g. America). Achieving this is constrained by the delays
through the communications system. A knowledge of, or a prediction of, these communications
delays - within an accuracy figure of microseconds - can be critical for the safe, effective and efficient
operation of the power system.
csamitier@gne-eng.com
Further, the protection is required 24/7 and so the communications channel must be similarly available
(there is no time to make a ‘phone call to clear the fault!); continuously open, connected, and available
communications channels are required for electrical power system protection.
Today, the protection of national and international electricity transmission grids has a dependency
upon the characteristics of the communication networks. An unpredicted change in the
communications can cause false protection operation with unwanted isolation of parts of the electricity
network. In extreme cases this can lead to large scale blackouts, compromising safety and causing
huge financial losses.
Over time, different protection techniques have been developed to take advantage of evolving
communication technologies. Some techniques require the communication of “command”
information (i.e. ON/OFF signalling); others require the communication of “data” (the transportation
of power system signal values across the system), and the necessary characteristics of the
communications can differ between these “command” and “data” applications.
Communications channels may be realised in the form of dedicated communications channels (for
example, pilot wires, power line carrier, or dedicated fibre-optic links) or they may be leased from
telecommunication service providers. Dedicated channels are normally under the full control of the
electricity utility and are more likely to provide the predictable, deterministic operation required for
electrical power system protection.
Now as we move towards “next generation network” communications technologies, whilst the
interfaces presented to the electrical power system protection equipment remain the same, the
management of the communications traffic behind the network is dynamic and some of the underlying
characteristics reflected in the table that impact the correct operation of the protection, and hence of
the operation, of the electrical power system, can no longer be assumed.
An important consideration for each of the different categories of protection scheme is the effect of the
communication channel on overall operating times, parameters such as delay, delay variation, errors,
channel availability, etc., may increase the protection operation time or even disable it. Following
chapters analyse telecommunication performance, the key aspect that may influence protection
operation, plus the most common problems found and possible remedies.
2 TELECOMS PERFORMANCE
2.1 Performance Indicators
Telecommunication channels are not perfect. Physical limitations and impairments produce errors and
other defect that limit their performance.
The analysis of the parameters that characterize the performance of the communication service used
by a protection relay application and the relation between the protection relaying parameters on one
side, and those of the communication channel on the other side, leads to the definition of
Performance Objectives. The result of this analysis can be used by the Protection engineer to specify
his communication service requirements for the telecom service provider, and by the telecom
professional to design and implement communication network infrastructures.
The discussion is based on a general model presented in figure 1 and applied equally to command
schemes or to analogue comparison schemes.
Propagation
Parameters
Channel Adaptation
or Performance Mapping
2
Protection Performance Parameters
Performance of a protection system can be characterized by the parameters listed in the following
table:
Protection Objective Dimensioning
Parameter
Performance Parameters
Security Pr (Fault Detected / No Fault) Osec< 1 in S years
The time objective for the protection system is determined by the overall fault clearance time and the
portion of time that has to be allocated to the operation of the circuit breakers (and other processes
such as Breaker Failure detection that may be performed during the clearance time).
The maximum operation time of the Protection system may also be based upon the time limit beyond
which another concurrent mechanism (i.e. protection isolating a wider section of the network) shall
operate. In this case, operating too late can be assimilated to a lack of dependability (i.e. not
operating).
Protection Performance can be related to communication parameters using the State Space table
presented hereafter which classes different communication impairments in terms of resulting
protection system anomalies. The causes of system anomalies are listed below and discussed in the
following sections:
A1: Data Integrity – Protection receiving invalid data
A2 : Channel Availability – Communication service unavailable
A3 : Time limit exceeded – Maximum time to be specified using Fault Clearance Time and/or Timing
of Protection Zones
B1: Time Incoherence – Comparison of samples which are not captured at the same time, e.g. in
differential protection systems with no time-stamping of samples
B2: Residual Errors – Invalid data interpreted by the protection as a command or as a value e.g. long
period of false data without blocking the operation of the Protection
Other causes of protection system malfunctioning which are not related to communications are as
follows:
C1: Wrong setting, e.g. Protection setting too sensitive
C2: Wrong type of Protection, e.g. Short Lines, Parallel Lines, etc.
C3: Installation issues, e.g. interference from substation electromagnetic disturbances
3
2.2 Data Integrity, Bit Error Rate and Communication Availability
Data integrity is the capability of the communication network to deliver error-free frames (composed
of commands or sample values) to the protection system. It includes any error correcting mechanism
which is incorporated in the communication system (including the teleprotection signalling
equipment).
Sampled values and commands are transmitted continuously without any acknowledge and
retransmission request. When a valid sample or command does not reach its destination in the limit of
the time objective, then it can be considered as “lost”. If this happens during a time interval when an
operation is required then a “missed operation” can be experienced.
Data integrity depends upon the error generating behaviour of the communication channel which is
generally characterized by an average Bit Error Rate (BER). The BER is commonly used to
characterize the performance of digital communication channels and general data transmission circuits
in serial or TDM links. For packet switched circuits other parameters such as packet loss rate are
commonly used but the basic considerations given here similarly apply.
However, BER cannot be used for specifying the requirements for protection signal transmission.
Similarly, telecom standards definitions of availability/unavailability, which are based on the average
BER over a communication channel, are not meaningful for protection, as illustrated further.
BER is a statistical figure, obtained from error measurements spanning a sufficient measuring
interval which can be significantly longer than the time which is relevant for protection
operation
The principle of BER is based on the assumption that bit errors occur with random distribution
over time, i.e. every bit has the same probability of being received correctly or in error
respectively. In particular, the BER does not characterize errors which may occur in “bursts”
or errors which are introduced by some contingencies like dependence on a power system
fault.
Even a low BER does not help if the error(s) occurs just in that moment when protection
needs to act.
Bit errors generally do not hit communication frames randomly but in bursts of varying length
depending upon their origins. This can be modelled as the channel presenting a long term “steady
state” BER whose level is determined by the dimensioning of the system, and a short term BER whose
level can be very high (more than 1E-3) with a probability of occurrence and a distribution of
durations that must be characterized.
It should be noted that even for low error probabilities of 1E-6 or 1E-9, an error occurs on average
every 16 seconds or 4.3 hours respectively on a 64 kbps channel. Hence even for “healthy”
communication links, an error will occur “every now and when”. The protection relay needs to act on
such conditions in appropriate form and in a defined manner regarding stated loss of performance and
alarming.
For protection purposes it is relevant to know:
How does a bit error – if it happens – influence the operation of the protection relay like
o Producing unwanted operation (Security)
o Delaying wanted operation (Dependability)
How should the protection deal with errors
o Should the relay include error correction? If so, what is the impact on the overhead
(=increase of the gross transmission rate) in order to correct single or multiple bit
errors? Or should it just block its operation and “wait” until an error-free sequence is
received?
o When should the protection raise an alarm if it discovers error(s) in its “message” or
“frame”?
o Should the protection adapt its settings when it discovers erroneous messages (e.g. by
lowering the sensitivity) or should it block operation and wait for an error-free
transmission?
It may therefore be more relevant
o to characterize the communication by the probability that a sequence of bits is received error-
free, which would not jeopardize the protection performance at all
4
o to characterize the protection relay by how protection performance deteriorates in the presence
of error(s).
It has to be considered the following situations:
o An error probability of 0.5 may temporarily occur when a link fails until the failure is detected
and the link is blocked and/or an alarm is signalled
o Error rates up to 1E-3 are not uncommon for fading radio links and may even occur on optical
systems operating at the system limit due to increased fibre attenuation, dirty connectors,
transmitter degradation etc.
Communication Availability
Unavailability of the protection communication channel can be caused by
A service interruption due to a failure in the communication network
Network reconfiguration for service restoration
Synchronization loss in the network or at the communication service interface
Excessive communication errors
Considering the latter case, ITU-T G821 declares the channel unavailable due to excessive error, if 10
consecutive SES (Severely Errored Seconds) are detected, and available again when no SES is
detected for 10 consecutive seconds.
This means that the system may remain “available” during 10 seconds with a an error rate that exceeds
1E-3, and once declared unavailable, may remain blocked for 10 seconds even if the channel is error-
free. The consequences on Security (spurious operation due to non-detected errors) and Dependability
(channel being non-operating for 10 second intervals) can be enormous.
In order to avoid undetected invalid frames which may generate spurious operations, the
communication channel must be blocked after N consecutive invalid frames. Frames shall then be
examined for validity but not used for system operation, until M consecutive valid frames are detected.
The communication channel shall be considered as unavailable during this time interval.
5
repeated every approximately equal periods of time can reveal synchronization problems. Line Code
Errors reveal the presence of local wiring induced errors, while CRC and/or other upper layers errors
in absence of Line Code Errors reveal problems inside the network, on the trunk links or hardware, but
not in the local interconnection between the end TDM equipment and the end user equipment.
6
3.2.2 Addressing Capabilities
It is important that line differential relays include terminal addressing in order to check that the
received messages come from the corresponding device. Channel loop backs or errors in the routing
make messages reach wrong destinations resulting in false differential currents. False trips have
occurred from line differential relays, without addressing capabilities, due to unexpected channel loop
backs.
7
information from the Electro-Optical converter to the actual Protection, in order to be registered,
processed and used, is also not feasible because Line Current Differential Relays were originally
designed to work only directly connected to each other using dedicated fibre links, so any subtending
network should be transparent to them. As a result, the current solution using Electro-Optical
converters is a partial adaptation in which a lot of information and performance is lost.
Another possibility available today is to use the IEEE C37.94 standard for direct fibre interface
between the Protection and the TDM system. The IEEE C37.94 standard has been widely accepted,
and many TDM equipment vendors already provide IEEE C37.94 interface cards that allow the direct
connection of the Protections to the TDM systems without the need of converters. This solution is
particularly advantageous because it provides “fibre only” interconnection between the Protection and
the Telecom equipment, eliminating the copper wiring, with the consequent EMI Protection
improvement. But the installed base of Protections and TDM systems that do not support this standard
is so vast, that the Electro-Optical converters are expected to continue in use in the mid term, and all
the efforts that can be done to improve their operation will be valuable.
8
- Use fault detectors not based on differential current to avoid tripping during load
conditions.
Remove need for interface adaptors
It is advisable to use IEEE C37.94 standard interface or a direct fibre optical interface through
a WDM system.
Simplify the protection schemes
A typical application for network protection is the utilisation of a distance protection (with
teleprotection) together with a line differential protection.
Another possibility is the utilisation of two multifunction protections, both composed with a
line differential function (main) and a distantiometric function (back-up).
Since they are complementary, there is no need for telecom recovery mechanisms. If the
differential protection is disabled by any reason, the backup will act.
Observe proper installation instructions
5. BIBLIOGRAPHY
[1] Charge Comparison Protection of Transmission Lines – Relaying Concepts – L.J. Ernst, W. L.
Hinman, D. H. Quam, J. S. Thorp – IEEE Transactions on Power Delivery, Vol 7, No. 4, Oct 1992
[2] New Line Current Differential Relay using GPS Synchronization – I. Hall, P. G. Beaumont, G. P.
Baber, I. Shuto, M. Saga, K. Okuno, H. Ito - IEEE Bologna Power Tech Conference, Jun 2003
[3] US Patent 6,456,947 Sep 2002. Digital Current Differential Systems. M. Adamiak, et al.