Download as pdf or txt
Download as pdf or txt
You are on page 1of 37

ELK455E

Computer Networks for Power Systems


Application
ÖMER USTA,
ITU
ENTES ELEKTRONİK

Copyright: This document may not be reproduced without the permision of above names.

ITU, ELECTRICAL ENGINEERING


1
Smart Grid Technologies

Liberalization FACTs

WA-MP&C
Interface Unit
Present
Computer Power Microgrid
IED
network

Energy Storage
Communications EVs
& Security
Embedded
Renewable Generation
Energy Sources

IEEE PES TR Chapter, Ö Usta, ITU


Application: Power System Monitoring.
Suppose that TEIAS has a Remote Monitoring
System composed of three different Layers.

Upper Layer has a Control Center and 70 sub-


stations (400/154 kV to 33kV). Every sub-station has
its own host computer.

MODBUS TCP/IP Protocol is used to provide


communications between Control Center Computer
and Host computers located in 70 different sub-
stations throughout Turkey. This is considered as a
WAN.

Host computer in each sub-station has connected to N


IEDs/RTUs (10 to 20 IEDs/RTUs) located in the Middle
Layer.
ITU, ELECTRICAL ENGINEERING 3
MOTBUS RTU Series Protocol is used to provide data
communications between the sub-station host computer
and IED/RTUs located in a substation. This is
considerred as a LAN.

Every IEDs is directly connected to power system


enviroment over an interface unit (VT and CTs) located
in the Lower layer to get information from power
network.

This application only considers the information


Exchange (data flolw) between IEDs and the sub-
station host.

ITU, ELECTRICAL ENGINEERING 4


HMI

Upper Layer
Modbus TCP/IP
Sub-station Operation Center
Host N

MODBUS RTU/IEC61850

Middle Layer
IED1 IED2 IED 3 …… IED

CT/VT CT/VT CT/VT CT/VT

Lower
Layer
Switch Switch Switch Switch
Power System Environment
IEEE PES TR Chapter, Ö Usta, ITU Copyright 2015 Usta
TCP/IP

Application

Application FTP, Telnet, SMTP, HTTP..


Presentation

Session

Transport Host-to-Host TCP, UDP

Network Internet IP, ICMP, IGMP

Data Link Network


Ethernet, Token-Ring ...
Access
Physical

ITU, ELECTRICAL ENGINEERING 6


MODBUS Protocol

MODBUS Protocol is a messaging structure created by


MODICON company.

MODBUS is now widely used to establish master-slave


communications between Intelligent Electronic Devices-IEDs.

MODBUS protocol is independent of the physical layer.

MODBUS can be implemented using RS232, RS422, or RS485


or over a variety of media (e.g. fiber, radio, cellular, etc...).

ITU, ELECTRICAL ENGINEERING 7


MODBUS PLUS is a higher speed network 1 Mbit/s token
passing derivative that uses the MODBUS messaging structure.

7 Application Modbus

6 Presentation
5 Session

4 Transport

3 Network

2 Data Link 802.4 Token passing/ hub polling

1 Physical RS485

ITU, ELECTRICAL ENGINEERING 8


Remember:

Synchronous Data Link Control (SDLC) is a bit-oriented protocol


developed by IBM in 1972 that is still in use today. It uses a controlled-
access media access protocol.
Beginning Ending
(01111110) (01111110)

data CRC-32

Destination Identifies frame type;


Address (8 • Information (for transferring of user data)
or 16 bits) • Supervisory (for error and flow control)

9
The Modbus RTU frame structure

The Modbus RTU frame structure is the same for requests


(master to slave messages) and responses (slave to master
messages).

REQUEST

silence Address Function Data Checksum silence

RESPONSE

silence Address Function Data Checksum silence

ITU, ELECTRICAL ENGINEERING 10


With hub polling (often called token passing), one device starts
the poll and passes it to the next computer on the multipoint
circuit, which sends its message and passes the poll to the next.
That computer then passes the poll to the next, and so on, until
it reaches the first computer, which restarts the process again.

What is an RS-485 network? RS-485 allows multiple devices (up


to 32) to communicate at half-duplex on a single pair of wires,
plus a ground wire (more on that later), at distances up to 1200
meters (4000 feet). Both the length of the network and the
number of nodes can easily be extended using a variety of
repeater products on the market.

ITU, ELECTRICAL ENGINEERING 11


Address Function Data Checksum

Valid slave device addresses are in the range of 0 ... 247


decimal.
The individual slave devices are assigned addresses in the
range of 1 ... 247. Value 0 is reserved for broadcast messages
(no response).
Request: A master addresses a slave by placing the slave
address in the address field of the message.
Response: When the slave sends its response, it places its own
address in this address field of the response to let the master
know which slave is responding.

ITU, ELECTRICAL ENGINEERING 12


Address Function Data Checksum

Valid codes are in the range of 1 ... 255 decimal.

Request :The function code field tells the slave what kind of
action to perform.
Response :For a normal response, the slave simply echoes the
original function code.
For an exception response, the slave returns a code that is
equivalent to the original function code with its most
significant bit set to a logic 1.

ITU, ELECTRICAL ENGINEERING 13


FUNCTION CODES
Code Type

01 Read n consecutive output bits


02 Read n consecutive input bits
03 Read n consecutive output words
04 Read n consecutive input words
05 Write 1 output bit
06 Write 1 output word
07 Read exception status
08 Access diagnostic counters
11 Read event counter
12 Read connection events
15 Write n output bits
16 Write n output words
17 Read identification

ITU, ELECTRICAL ENGINEERING 14


Address Function Data Checksum

Valid codes are in the range of 0 ... 255 decimal.


Request :The data field contains additional information
which the slave must use to take the action defined by the
function code. This can include items like register
addresses, quantity of items to be handled, etc...

Response :If no error occurs, the data field contains the data
requested.
If an error occurs, the field contains an exception code that
the master application can use to determine the next action
to be taken.

ITU, ELECTRICAL ENGINEERING 15


Address Function Data Checksum

Valid codes are in the range of 0 ... 255 decimal.


Modbus RTU uses CRC : Cyclycal Reduncy Check (16-bit)
Request : The checksum is calculated by the master and sends
to the slave.
Response: The checksum is re-calculated by the slave and
compared to the value sent by the master.

If a difference is detected, the slave will not construct a


response to the master.

ITU, ELECTRICAL ENGINEERING 16


 Function code = 3 : Read n words

1 byte 1 byte 2 bytes 2 bytes 2 bytes

Request: Slave Function First word Number of


CRC16
Address code = 3 address words to read

Response:
1 byte 1 byte 2 bytes 2 bytes 2 bytes 2 bytes
Slave Function Number of Value of the Value of the
CRC16
Address code = 3 bytes read first word last word

ITU, ELECTRICAL ENGINEERING 17


 Continuous stream
The entire message frame must be transmitted as a
continuous stream.
If a silent interval (more than 1.5 character times RTU mode)
occurs before completion of the frame, the receiving computer
flushes the incomplete message and assumes that the next
byte will be the address field of a new message.

ITU, ELECTRICAL ENGINEERING 18


• The master/server computer is configured by the user
to wait for a predetermined timeout interval before
aborting the transaction.
• This interval is set to be long enough for any
slave/terminal computer/IED to respond normally.
• If the slave/terminal computer/IED detects a
transmission error, the message will not be acted
upon.
• The slave/IED will not construct a response to the
master.
• Thus, the timeout will expire and allow the master's
program to handle the error

ITU, ELECTRICAL ENGINEERING 19


RS485 is the most physical layer used on Modbus.
32 devices included the master can be connected on the bus .
This is a bus topology with line terminations.

Topology: Bus with line terminations


Maximum distance: With RS485 : 1300 m without repeater
Data rate: 19200 bits/s maximum

Max. no. of devices: With RS485: 32 master included


Method of accessing the medium: Master slave
Transmission method: Messaging

Max. useful data size: 120 words

Transmission security: CRC

ITU, ELECTRICAL ENGINEERING 20


Intelligent Electronic Devices
An intelligent electronic device(IED):
• Gather information (voltages, currents, states of components vs)
from electrical power networks over an interface unit,
• Exchange information with the host and other IEDs,
• Displays these information,
• Process these information according to its application
program and produce protection trips, control
commands signals for the related power system
components,
• Conveys these signals to other locally and remotely
located IEDs.

IEEE PES TR Chapter, Ö Usta, ITU


Intelligent Electronic Devices

•The functions of a certain IEDs can be classified as


metering, monitoring, recording, protection, control,
managing and communications.
•Some IEDs could be more advanced than the other,
some of them may emphasize certain functional
aspects over others.
•They could be protective relays, bay controllors,
network analysers, RTUs or terminals of an RTU,
PMUs etc.

IEEE PES TR Chapter, Ö Usta, ITU


The layout of Intelligent Electronic Devices

Digital Digital
Inputs outputs
HMI
ADC LCD
Analog Analog
Inputs LEDs O KEY Outputs

USB Jacks
RS485 MODBUS RTU/60870-103
Time
Communications
Synch
IEC 61850
Ethernet Communications
Local Communications

Power
Supply

IEEE PES TR Chapter, Ö Usta, ITU Copyright 2015 ENTES


Software Components of IEDs

• HMI Software (for USB, LCD, Operation Keys,


LEDs)
• Data Acquisition and Collection Software,
• Application (functional) Software,
• Remote Communications Software (using one or
more of following protocols MODBUS RTU,
MODBUS TCP/IP, DNP3, IEC60870-103, IEC61850)
• Others

IEEE PES TR Chapter, Ö Usta, ITU


RTU/IED N Sub-stations
70 MODBUS RTU RTU/IED
0
PC
Host

RTU/IED 1
RS485 Port RTU/IED 2

Pulses Analog Inputs


Digital
Inputs Digital Outputs

Interface
3i, 4v
LAN

ITU, ELECTRICAL ENGINEERING 25


IED/MPR63

ITU, ELECTRICAL ENGINEERING 26


RTU/MPR63

ITU, ELECTRICAL ENGINEERING 27


IED/MPR63

ITU, ELECTRICAL ENGINEERING 28


IED/MPR63

ITU, ELECTRICAL ENGINEERING 29


ITU, ELECTRICAL ENGINEERING 30
ITU, ELECTRICAL ENGINEERING 31
ITU, ELECTRICAL ENGINEERING 32
1 byte 1 byte 2 bytes 2 bytes 2 bytes
Slave Function First word Number of
Request: Address code = 3H address words to read
CRC16

8-bit adressing, Address Contents


2n=256 memory place 0000H 1 0 1 …0 1 0 1 0
addressing 0001H 1 1 1 0 …1 1 1 0
0002H 1 0 1… 1 1 0 0 1
0003H 1 0 1… 1 1 1 0 1
1 1 1 1… 1 0 0 1
0000H Master, 1 0 1 1… 1 0 0 1
1 0 1 1 …1 1 1 1
0001H IED
16-bit
0002H IED
0003H IED 0EA1H 0 0 0 ….1 1 1 1 1
0EA2H 1 1 1 1 ….1 0 0 1
………… 0EA3H 0 0 0 1 ..1 1 1 1
.....…… 0EA4H
0EA5H
1 1 1 1 …1 0 0 1
0 0 0 1… 1 1 1 1
FFFEH 0EA6H
0 1 1 1 …1 1 0 1
FFFFH 1 1 1 1.. 1 0. 0 1
FFFFH
247 IED can be addressed, others are reserved
IED/RTU/MPR63 Memory

ITU, ELECTRICAL ENGINEERING 33


Response :
1 byte 1 byte 2 bytes 2 bytes 2 bytes 2 bytes
Slave Function Number of Value of the Value of the CRC
Address code = 3H bytes read first word last word 16-bits

120 Words=240 bytes


IED address

2 Bytes =a word

Transmission efficiency =[240/248]x100

ITU, ELECTRICAL ENGINEERING 34


Polling (Summary)

Process of transmitting to a client only if asked


and/or permitted
◦ Client stores the info to be transmitted
◦ Server (periodically) polls the client if it has data to send
◦ Client, if it has any, sends the data
◦ If no data to send, client responds negatively, and server asks the
next client

Types of polling
◦ Roll call polling
◦ Hub polling (also called token passing)

ITU, ELECTRICAL ENGINEERING 35


Hub Polling (Token Passing)

E
One computer starts the D
poll:
A
•sends message (if any) token C
then
B
•passes the token on to the
next computer

Continues in sequence until the token reaches the


first computer, which starts the polling cycle all over
again

ITU, ELECTRICAL ENGINEERING 36


Roll Call Polling

Check each client


(consecutively and Clients
periodically) to see if it D
wants to transmit : A, B, C,
D, E, A, B, … C
E
B

Server A
Clients can also be
prioritized so that they are Involves waiting: Poll and wait for a
response
polled more frequently:
A, B, A, C, A, D, A, E, A, B, Needs a timer to prevent lock-up
(by client not answering)
..

ITU, ELECTRICAL ENGINEERING 37

You might also like