1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material...
-
date post
22-Dec-2015 -
Category
Documents
-
view
220 -
download
2
Transcript of 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material...
![Page 1: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/1.jpg)
1539pkCOMP - 1
COMPREHENSIVE APPROACH TO COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITYPOWER SYSTEM SECURITY
Copyright © P. KundurThis material should not be used without the author's consent
![Page 2: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/2.jpg)
1539pkCOMP - 2
Power System SecurityPower System Security
The Physical System
the integrated generation, transmission and distribution system, and loads
protection and controls
The Business Structures
owning and operating entities
performance and service contracts
The Regulatory Framework
roles and responsibilities of individual entities
well chosen, clearly defined and properly enforced
Security of power systems depends on three factors:
![Page 3: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/3.jpg)
1539pkCOMP - 3
Challenges to Secure Operation of Challenges to Secure Operation of Today's Power SystemsToday's Power Systems
Large complex power systems
thousands of devices requiring harmonious interplay
Complex modes instability
global problems
different forms of instability: rotor angle, voltage, frequency
"Deregulated" market environment
many independent entities with diverse business interests
lack of integrated and inter-regional planning
power systems can no longer be operated conservatively within pre-established limits
A comprehensive approach to system security is required
![Page 4: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/4.jpg)
1539pkCOMP - 4
Comprehensive Approach to System Comprehensive Approach to System SecuritySecurity
1. Proper selection, design and application of power system controls and protective relaying
2. Development and deployment of a good “defense plan” against extreme contingencies
3. Development of a well documented and organized plan for rapid and safe restoration of the power system
4. Use of state-of-the-art techniques for on-line dynamic security assessment to determine stability margins and identify any corrective actions
5. Implementation of a Reliability Management System (RMS) for setting, monitoring and enforcing security related standards
6. Development and application of real-time wide area Monitoring and Control
an emerging technology
7. Widespread use of distributed generation
![Page 5: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/5.jpg)
1539pkCOMP - 5
Power System Controls and Power System Controls and Protective RelayingProtective Relaying
![Page 6: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/6.jpg)
1539pkCOMP - 6
Normal State ControlsNormal State Controls
Generator controls:
excitation controls: AVR, PSS
prime-mover, energy supply system controls
Transmission controls:
voltage regulators
switched reactors/capacitors, SVCs
HVDC and FACTS controls
Secondary/tertiary voltage control:
used by EDF, ENEL
![Page 7: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/7.jpg)
1539pkCOMP - 7
Preventive and Emergency ControlsPreventive and Emergency Controls
Preventive Controls
Generation shifting
Increase in VAR reserve
Emergency Controls
Generator tripping
Generation runback/fast valving
Load shedding
Dynamic braking
Transient excitation boosting
HVDC link rapid power ramping
Controlled system separation
Transformer tap-changer blocking
![Page 8: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/8.jpg)
1539pkCOMP - 8
Power System Controls in the New Power System Controls in the New EnvironmentEnvironment
Efficient utilization of facilities while ensuring security:
greater dependence on controls
Successful energy trading (buying, wheeling and selling of power):
can overwhelm existing controls
need for more sophisticated controls using advanced technologies
New business structure of owning and operating entities impacts:
what controls are used
how they are designed and deployed
![Page 9: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/9.jpg)
1539pkCOMP - 9
Implications of OwnershipImplications of Ownership
Industry will comprise corporate entities having diverse roles and business interests
Physical functioning of the integrated power system will remain the same
Control of individual equipment should
not to be left to owner’s discretion
be vested with the independent system operator
Specification and design of controls:
part of overall system planning/design
carried out by an independent entity
Otherwise security and overall economy will be sacrificed:
defeats the very purpose of restructuring
![Page 10: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/10.jpg)
1539pkCOMP - 10
Generator ControlsGenerator Controls
Essential to recognize the critical role of generator controls
Use of fast exciters, AVR, PSS and speed governor should be mandatory
No difficulty in motivating power plant owners to install controls:
needed to meet local plant needs
enhance plant operability and stability
Financial incentives for controls needed to:
meet global system needs
enhance overall system performance
Many of the existing equipment are old and outdated
need for upgrading on a prioritized basis
![Page 11: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/11.jpg)
1539pkCOMP - 11
Coordinated Design of Robust Coordinated Design of Robust ControlsControls
Increasing use of:
multi-purpose controllers
multiple controllers to solve a common problem
Satisfactory and harmonious performance of different controllers with overlapping spheres of influence requires:
coordination and integration
Controller design must consider performance under all probable conditions:
wide range of conditions encountered during normal operation
severe system upsets: coordination with protective systems
Addressed in a recent report by CIGRE TF38.02.16: “Impact of Interactions among Power System Controls”
![Page 12: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/12.jpg)
1539pkCOMP - 12
Analytical Techniques for Design of Analytical Techniques for Design of Normal ControlsNormal Controls
Proper design techniques and procedures to ensure:
utilization of full potential of the controller
no adverse interaction with other controls or with protective systems
Key design issues:
selection of devices and input signals
robustness
coordination
impact on overall system performance
Complementary use of small-signal analysis and nonlinear time-domain simulation
cont’d
![Page 13: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/13.jpg)
1539pkCOMP - 13
Analytical Techniques Analytical Techniques (cont’d)(cont’d)
Small-signal analysis using eigenvalue techniques provides valuable information useful in control design:
transfer function residues, participation factors, frequency response, controllability and observability
examination of interaction with other controls
Nonlinear time-domain (short- and long-term) simulations assist in:
establishing signal limits
assessment of performance during large disturbances
checking adverse interaction with protective systems
designing emergency controls
cont’d
![Page 14: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/14.jpg)
1539pkCOMP - 14
Analytical TechniquesAnalytical Techniques (cont'd) (cont'd)
Design one controller at a time with all other relevant devices/controls modelled
Robustness to changing system conditions achieved by:
considering different operating conditions
using engineering judgement
Robustness to parameter uncertainty achieved by:
carrying out sensitivity analysis
Alternatively, robust controller design technique may be used:
for example, H-infinity approach
![Page 15: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/15.jpg)
1539pkCOMP - 15
Improved Protective RelayingImproved Protective Relaying
State-of-the-Art protective relaying for generating units and transmission lines
Adaptive relaying with settings that adapt to the real-time system states
Replacement of zone 3 and other backup relaying on important lines with improved relaying
Improved protection and control at power plants to minimize unit tripping for voltage and frequency excursions
Protective relay improvements to prevent tripping of critical elements on overload
control actions to relieve overload
![Page 16: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/16.jpg)
1539pkCOMP - 16
Defense Plans Against Extreme Defense Plans Against Extreme ContingenciesContingencies
![Page 17: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/17.jpg)
1539pkCOMP - 17
Extreme Contingencies (ECs)Extreme Contingencies (ECs)
Major system disturbances: result of contingencies more severe than
normal design contingencies occurrence rare, but impact very high likely to be experienced more often in the
new environment Brought about by a combination of events:
multiple outages caused by severe weather conditions
inadequate design of system and equipment; equipment malfunction
human error Examples of major system upsets:
French system, 1978 and 1987 WSCC system, July and August 1996 Brazilian system, March 1999 NE U.S.A. and Ontario, August 2003 Italian System, September 2003 Sweden and Denmark, September 2003
![Page 18: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/18.jpg)
1539pkCOMP - 18
Defense Plans to Minimize Impact of Defense Plans to Minimize Impact of Extreme ContingenciesExtreme Contingencies
Judicious choice of several forms of emergency controls will provide protection against different forms of possible disturbances
Key design and implementation issues:
detection
control action
timing
automation and Adaptiveness
side effects on equipment and system
coordination
CIGRE TF 38.02.19 report on "System Protection Schemes in Power Networks" published in 2001 provides a good summary of emergency controls used by utilities worldwide, future trends and suggested design procedures
![Page 19: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/19.jpg)
1539pkCOMP - 19
Steps in the Development of a Steps in the Development of a Defense PlanDefense Plan
Detailed modeling of power system, including fast and slow processes triggered by EC’s:
includes wide range of protection and controls
Identification of scenarios of ECs:
based on past experience, knowledge of unique characteristics of system
probabilistic approach
Simulation and analysis of contingencies:
extended time-domain simulation
Identification of measures to minimize the causes of ECs:
improved protection/controls; better coordination
Development of a comprehensive set of emergency controls to mitigate consequences of ECs
![Page 20: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/20.jpg)
1539pkCOMP - 20
Guidelines for Design and Guidelines for Design and Deployment of a Good Defense PlanDeployment of a Good Defense Plan
Should, as far as possible, provide coverage against all possible ECs
Simplicity, reliability,and low cost should be prime considerations
Inadvertent operation of emergency controls must not severely affect system security
Response-based emergency controls should generally be preferred:
as opposed to those based on direct detection of outages
Various emergency controls should be coordinated:
complement each other
act properly in a complex situation triggering several controls
Ensure compatibility of defense plans developed by neighboring utilities
![Page 21: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/21.jpg)
1539pkCOMP - 21
Power System RestorationPower System Restoration
![Page 22: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/22.jpg)
1539pkCOMP - 22
Power System RestorationPower System Restoration
Even if power systems are designed and operated in the best possible manner: impossible to prevent all contingencies which could cause widespread blackouts
While the physical extent of the blackout is a concern, the duration is equally important:
detailed restoration plans required
The new competitive environment requires a well documented and organized plan: to ensure that the system, with its numerous independent entities, can be
re-energized safely and quickly
Successful system restoration has been a challenge for traditional monopolistic environment:
will be a greater challenge in the new competitive structure with many owners
![Page 23: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/23.jpg)
1539pkCOMP - 23
Power System Restoration ProcessPower System Restoration Process
Assessment of the system status and initial cranking sources
Identification and preparation of restoration paths to build subsystems
Resynchronization of subsystems and restoration of loads
![Page 24: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/24.jpg)
1539pkCOMP - 24
Key Issues for System RestorationKey Issues for System Restoration
Ensuring sufficient black start capability with due regard to: generator startup times and loading rates; governor droop characteristics,
and VAr capability
Maintaining voltages and other key parameters within acceptable bounds avoid tripping of critical elements or equipment damage
Developing a consistent switching strategy throughout the procedure
Coordinating system protection schemes
Organizing the restoration plan with well defined roles for each participant
Training all participants in the restoration procedure
![Page 25: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/25.jpg)
1539pkCOMP - 25
Analytical Tools for Developing Analytical Tools for Developing Restoration PlansRestoration Plans
Steady-state analysis:
power flow analysis, including examination of sustained overvoltages; fault level calculation; harmonic analysis
Quasi steady-state analysis:
operator training simulator, long-term dynamic simulation
Dynamic analysis:
transient stability (TS) programs for verifying subsystem resynchronization
extended TS programs for verifying startup of auxiliaries of power plants, i.e., large induction motors
ElectroMagnetic Transients Program (EMTP) for analysis of switching transients
![Page 26: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/26.jpg)
1539pkCOMP - 26
Reliability Management SystemReliability Management System
![Page 27: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/27.jpg)
1539pkCOMP - 27
Reliability Management System Reliability Management System (RMS)(RMS)
In the monopolistic structure, power systems were owned and operated by a few vertically integrated entities:
planning and operating standards were developed cooperatively and implemented voluntarily
In the competitive environment, with many new players, global management of power system reliability requires a process that is legislated
Roles and responsibilities of individual entities should be well chosen, clearly defined and properly coordinated and enforced
For proper functioning of the overall system
a “shared vision” is necessary among all the entities involved
a good monitoring system for ”standards” violations
The RMS approach provides a contractual method of dealing with the many entities of a single interconnected system:
ensures overall system security through a well defined and enforceable criteria
![Page 28: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/28.jpg)
1539pkCOMP - 28
Components of Reliability Components of Reliability Management SystemManagement System
A typical Reliability Management System has four components:
1. Reliability criteria applicable to Control Area operators
operating reserves, disturbance control, control performance standards, operating transfer capability
2. Reliability criteria applicable to generators
requirements for AVR and PSS
“grid codes” for new sources of generation
3. Reliability criteria applicable to transmission system users
4. Excuse of performance
excused non-compliance, specific excuses
For each component, the reliability system specifies: participants, criteria, data reporting, compliance standard, non-compliance standard, sanctions
![Page 29: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/29.jpg)
1539pkCOMP - 29
On-Line Dynamic Security On-Line Dynamic Security AssessmentAssessment
![Page 30: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/30.jpg)
1539pkCOMP - 30
Dynamic Security Assessment Dynamic Security Assessment (DSA)(DSA)
A challenging task
changing system conditions; complexity and size of power systems
Historically based on off-line studies
system operated conservatively withinpre-established limits
On-line DSA essential in the new competitive environment
evaluation of available transfer capability (ATC)
![Page 31: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/31.jpg)
1539pkCOMP - 31
Components of DSAComponents of DSA
All forms of system instability must be addressed
Two categories important for on-line assessment
Transient (angle) stability
Voltage stability
Small-signal (angle) stability
control problem addressed in system design
on-line assessment important for some systems
Here we provide a description On-line Voltage Stability and Transient Stability Tools developed at Powertech Labs Inc.
![Page 32: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/32.jpg)
1539pkCOMP - 32
On-Line Voltage Stability On-Line Voltage Stability Assessment PackageAssessment Package
![Page 33: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/33.jpg)
1539pkCOMP - 33
Key Elements of VSAKey Elements of VSA
Interface with EMS; Model Initialization
Contingency screening and selection
Determination of secure operating region
using static analysis
Determination of remedial actions
Fast time-domain simulation
validation and checking
![Page 34: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/34.jpg)
1539pkCOMP - 34
Contingency Selection ModuleContingency Selection Module
Impractical to consider every conceivable contingency
A limited number (typically 20) critical contingencies determined for detailed studies
Performance Indices based on a few power flow solutions and reactive reserve not reliable
A fast screening method used:
based on exact margin to voltage collapse and full power flow solutions
number of power flow solutions 1.2 to 2.0 times number of contingencies
Supplemented with user-specified contingencies
![Page 35: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/35.jpg)
1539pkCOMP - 35
Fig. 4 Automatic Critical Contingency Selection
![Page 36: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/36.jpg)
1539pkCOMP - 36
Security Computation ModuleSecurity Computation Module
Engine for voltage stability analysis
static analysis with detailed models
Secure region is defined by a number of Coordinates (SRCs)
key system parameters: MW generation, area load, interface transfers, etc.
Voltage stability determined by
existence of powerflow solution
MVAr reserves of key reactive sources
post-contingency voltage decline
Specialized powerflow dispatcher and solver to quickly search for stability limit
![Page 37: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/37.jpg)
1539pkCOMP - 37
Modelling: generator capability curves
governor response, economic dispatch, AGC
nonlinear loads
control of ULTCs, switched shunts, etc.
Inputs and Outputs:
Inputs
list of contingencies produced by screening and ranking (+user defined)
base case powerflow from state estimator
definition of SCRs
voltage security criteria and definition of parameter of stress
Output
secure region in secure region space
![Page 38: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/38.jpg)
1539pkCOMP - 38
Secure Operating RegionSecure Operating Region
![Page 39: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/39.jpg)
1539pkCOMP - 39
Secure Operating RegionSecure Operating Region
![Page 40: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/40.jpg)
1539pkCOMP - 40
Remedial Measures ModuleRemedial Measures Module
Determines necessary remedial measures to
ensure sufficient stability margins
expand the secure region
Preventative control actions:
taken prior to a contingency
caps/reactor switching, generation redispatch, voltage rescheduling
Corrective (emergency) control actions:
applied following a contingency
load shedding, generator runback, transformer tap changer blocking
Ranking of each remedial measure using sensitivity analysis
![Page 41: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/41.jpg)
1539pkCOMP - 41
Ranking and Applying Remedial Ranking and Applying Remedial MeasuresMeasures
Objective is to identify the most effective remedial measures to give the desired stability margin
Obtain solved power flow case for the most severe contingency
gradually introduce the effect of the contingency
bus injection compensation technique
Compute the sensitivities of reactive power (or bus voltage) to different control measures
rank the remedial measures
Apply controls one at a time in order of ranking until power flow solves for the most severe contingency
![Page 42: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/42.jpg)
1539pkCOMP - 42
Expanding the Secure Region: Expanding the Secure Region: Remedial MeasuresRemedial Measures
![Page 43: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/43.jpg)
1539pkCOMP - 43
Fast Time-Domain Simulation Fast Time-Domain Simulation ModuleModule
Determines the essential dynamic phenomena without step-by-step numerical integration
when chronology of events significant
for validating the effect of remedial measures
Focuses on the evolution of system dynamic response driven by slow dynamics
transformer tap changers, field current limiters, switched caps
Captures the effects of fast dynamics by solving associated steady state equations
![Page 44: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/44.jpg)
1539pkCOMP - 44
Fig. 3 VSAT Structure
![Page 45: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/45.jpg)
1539pkCOMP - 45
Transient Stability Assessment Transient Stability Assessment PackagePackage
![Page 46: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/46.jpg)
1539pkCOMP - 46
Transient Stability Assessment Transient Stability Assessment (TSA)(TSA)
Time-domain simulations essential
modeling detail and accuracy
Sole dependence on time-domain simulations has severe limitations
high computational burden
no stability margin/sensitivity information
requires considerable human interaction
Supplementary techniques for speeding up and automating overall process
Methods available for deriving useful indices
Transient Energy Function (TEF)
Signal Energy Analysis
Extended Equal Area Criterion (EEAC)
![Page 47: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/47.jpg)
1539pkCOMP - 47
Key Elements of TSAKey Elements of TSA
Interface with EMS; Model Initialization
Contingency screening and selection
Simulation engine
detailed modeling
time-domain simulation
speed enhancement
Post-processing of detailed simulation
stability margin index using EEAC
power transfer limit search
remedial measures
damping calculation using PRONY
![Page 48: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/48.jpg)
1539pkCOMP - 48
A Practical Tool for TSAA Practical Tool for TSA
Overall architecture similar to that of VSA
Time-domain program, with detailed models and efficient solution techniques, forms simulation engine
EEAC used for screening contingencies, computing stability margin, stability limit search, and early termination of simulation
“Prony analysis” for calculation of damping of critical modes of oscillation
A powerflow dispatcher and solver for finding the stability limit
a fully automated process
No modeling compromises; can handle multi-swing instability
![Page 49: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/49.jpg)
1539pkCOMP - 49
EEACEEAC
Integrates the dynamic response in the multimachine space, and maps the resultant trajectory into a set of one-machine-infinite-bus planes
by applying complementary cluster center of inertia (CCCI) transformations
keeps all dynamic information in the multimachine space
stability analysis can be quantitatively performed for the image OMIB systems
has the same accuracy and modeling flexibility
fast, quantitative
![Page 50: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/50.jpg)
1539pkCOMP - 50
EEACEEAC
Loss of transient stability in a power system always starts in a binary splitting of generators:
critical cluster of generators
rest of the system
At any given point in the time-domain trajectory of the system, the system can be visualized as a one-machine-infinite-bus (OMIB) system
![Page 51: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/51.jpg)
1539pkCOMP - 51
EEACEEAC
The classical equal area criterion can be extended to the visual OMIB system
Stability margin of the system is defined as
da
a
ad
add
ad
AAunstable is system the ifA
AAx100
AAstable is system the ifA
AAx100
Thus, -100 , and
if the system is stable if the system is unstable
can be used as a stability index
![Page 52: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/52.jpg)
1539pkCOMP - 52
Use of EEAC TheoryUse of EEAC Theory
Contingency screening
stability margin gives an indication of the relative severity
Corrective measures for maintaining secure system operation
critical cluster of generators (CCG) provides valuable information
Power transfer limit search
stability limit can be determined in four iterations using stability margin
each iteration involves a detailed simulation and computation of stability index
![Page 53: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/53.jpg)
1539pkCOMP - 53
Results - Test SystemResults - Test System
System description
BC Hydro system 1430 buses 186 generators 4 HVDC links
Interface
GMS and PCN output Base case transfer = 3158
MW
Contingency
Three phase fault at GMS 500 kV bus
Tripping of one of two 500 kV lines from GMS to WSN
![Page 54: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/54.jpg)
1539pkCOMP - 54
Limit Search ResultsLimit Search Results
![Page 55: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/55.jpg)
1539pkCOMP - 55
Speed Enhancement: Parallel Speed Enhancement: Parallel ProcessingProcessing
Code parallelization differential equations easily parallelized, but not network equations
speed-ups limited by serial slowdown effect
up to 7 times speed-up can be achieved with 20-30 processors
not an effective way
Conventional serial computers offer much faster computational per-CPU
Best approach is to use multiple processors
Perform TS analysis and VS analysis in parallel
For multiple contingencies
perform initialization only once
run contingencies on multiple processors
![Page 56: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/56.jpg)
1539pkCOMP - 56
TSAT StructureTSAT Structure
PowerflowDispatcher
Time-DomainSimulation
StabilityIndices
IncreaseTransfer
RemedialMeasures
Must RunContingencies
TransactionDefinitions
Security Limit?
SufficientMargin?
STOP
Yes
Yes
No
FullContingency List
Solved Powerflow+
Dynamic Data
Contingency Screening & Ranking
(EEAC)
No
Fig. 8 TSAT Structure
![Page 57: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/57.jpg)
1539pkCOMP - 57
Computational Performance of DSAComputational Performance of DSA
Target cycle time from capture of state estimation to completion of security assessment for all specified transactions:
20 minutes
TSA and VSA functions performed in parallel
distributed processing on separate CPUs
This can be readily achieved with low cost PCs
![Page 58: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/58.jpg)
1539pkCOMP - 58
Example of Computational Example of Computational Performance of VSATPerformance of VSAT
Screening 300 contingencies to select 20 critical contingencies: 20 secs
Detailed security analysis of base case with 20 critical contingencies: 1.2 secs
One transaction limit search with 20 critical contingencies: 12 secs
Computation times for a 4655 bus, 156 generator system on a 1.7 GHz Pentium 4 PC with 256 MB memory:
![Page 59: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/59.jpg)
1539pkCOMP - 59
Example of Computational Example of Computational Performance of TSATPerformance of TSAT
Screening 100 contingencies for ranking 10 critical contingencies: 75 secs
Detailed security analysis of 10 contingencies including 3 second time domain simulations and stability index calculation: 75 secs
A four-iteration power transfer limit search for one contingency: 120 secs
Total time for complete power transfer limit calculation, including screening of 100 contingencies, stability limit search with an optimal order of 10 contingencies: 5 mins
NOTE: Both TSAT and VSAT have distributed processing capability, allowing each contingency or each transfer limit search to be processed in parallel on separate CPUs
Computation times for a 4655 bus, 156 generator system on a 1.7 GHz Pentium 4 PC:
![Page 60: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/60.jpg)
1539pkCOMP - 60
SummarySummary
On-line DSA is a complex problem
It is a challenge to provide comprehensive analysis with the required
accuracy, speed, and robustness
A practical tool for use with large complex systems has been built by
drawing on techniques developed over many years;
enhancement and integration of these techniques;
use of specialized software designs and distributed hardware architectures
May be used for real time application, or previous day to post ATC
![Page 61: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/61.jpg)
1539pkCOMP - 61
New and Emerging TechnologiesNew and Emerging Technologies
Real-Time Monitoring and Control
Risk-Based Security Assessment
Intelligent Control
![Page 62: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/62.jpg)
1539pkCOMP - 62
Real-Time Monitoring and Real-Time Monitoring and ControlControl
![Page 63: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/63.jpg)
1539pkCOMP - 63
Real-Time Wide Area Monitoring Real-Time Wide Area Monitoring
Advances in communications technology have made it possible to: monitor power system over a wide area
remotely control many functions
Wide Area Monitoring: phasor measurement units (PMUs) provide time synchronized measurements with an accuracy of 1
microsecond, utilizing Global Position System (GPS)
PMUs send measured voltage and current phasors to a Centralized Monitoring System, typically at 100 millisecond intervals
Data stored and processed for various applications
Results displayed on a Graphical User Interface
Examples of Wide Area Monitoring Systems: North American Western Interconnected System's Wide Area Measurement System (WAMS) project;
BPA, EPRI, DOE as participants
ETRANS Wide Area Monitoring (WAM) project for the Swiss Power Grid; developed by ABB
![Page 64: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/64.jpg)
1539pkCOMP - 64
Wide Area Monitoring Current Wide Area Monitoring Current ApplicationsApplications
On-line monitoring of transmission corridors for loading
Fast detection on critical situations
voltage stability
power system oscillations
transmission overloading
Additional input values of system variables for state estimator
Disturbance recording
for calibration of power system model
validation of stability analysis software
![Page 65: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/65.jpg)
1539pkCOMP - 65
WAM Potential Future Applications: WAM Potential Future Applications: Wide Area Emergency ControlWide Area Emergency Control
Prevention of partial or total blackout of power systems
trigger emergency controls based on system response and measurements
Research into the application of "Multisensor Data Fusion" technology
process data from different monitors and integrate information
determine nature of impending emergency
make intelligent control decisions in real time
A fast and effective way to predict onset of emergency conditions and take remedial control actions
![Page 66: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/66.jpg)
1539pkCOMP - 66
Risk-BasedRisk-BasedDynamic System AssessmentDynamic System Assessment
![Page 67: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/67.jpg)
1539pkCOMP - 67
Dynamic Security AssessmentDynamic Security AssessmentCurrent PracticeCurrent Practice
The utility practice has been to use deterministic approach
build strong systems and operate with large security margins
overly conservative, but cost could be passed on to captive customers
The deterministic approach has served the industry well
high security levels
study effort minimized
In the new environment, with a diversity of new participants, the deterministic approach not readily acceptable
need to account for the probabilistic nature of conditions and events
need to quantify and manage risk
![Page 68: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/68.jpg)
1539pkCOMP - 68
Risk-Based Dynamic Security Risk-Based Dynamic Security AssessmentAssessment
Examines the probability of power system becoming unstable and its consequence
Computes indices that measure security level or degree of exposure to failure
capture all cost consequences
Notion of security posed in a language and form understood by marketers and financial analysts
Possible with today’s computing and analysis tools
![Page 69: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/69.jpg)
1539pkCOMP - 69
Intelligent ControlIntelligent Control
![Page 70: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/70.jpg)
1539pkCOMP - 70
Power System ControlPower System Control
Overall control functions highly distributed
several levels of control
involve complex array of devices
Human operators provide important links at various levels
acquire and organize information
make decisions requiring a combination of deductive, inductive, and intuitive reasoning
“Intuitive reasoning” allows quick analysis of unforeseen and difficult situations and make corrective decisions
most important skill of an operator
![Page 71: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/71.jpg)
1539pkCOMP - 71
Off-Line
Security Limits
System ModelsLoad Forecast
Contingency ListsSecurity Criteria
State Estimator
Build Model for Current System State
Look-up tables ofSecurity Limits
Generation
Transmission and Distribution
Customers
OPERATIONSPLANNING
Transaction Requests
CONTROL
DECISIONS
SYSTEMCONTROL CENTER
MONITOREDQUANTITIES
CONTROLACTIONS
Utilities
Energy Providers
Power Marketers
Human Controls
Human Controls
Human
Controls
AutomaticLocal
Controls
AutomaticLocal
Controls
AutomaticLocal
Controls
Human Controls
Other ControlCenters
Interconnected
Power Systems
![Page 72: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/72.jpg)
1539pkCOMP - 72
Intelligent Control of Power Intelligent Control of Power SystemsSystems
Future power systems more complex to operate
less structured environment
Current controls do not have
“human-like” intelligence
Add intelligent components to conventional controls
learn to make decisions quickly
process imprecise information
provide high level of adaptation
Overall control of power systems
utilize both conventional methods and decision making symbolic methods
intelligent components form higher level of control
![Page 73: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/73.jpg)
1539pkCOMP - 73
Distributed GenerationDistributed Generation
![Page 74: 1539pk COMP - 0 COMPREHENSIVE APPROACH TO POWER SYSTEM SECURITY Copyright © P. Kundur This material should not be used without the author's consent.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d7e5503460f94a60825/html5/thumbnails/74.jpg)
1539pkCOMP - 74
Distributed Generation (DG)Distributed Generation (DG)
Offer significant economic, environmental and security benefits
Microturbines
small, high speed power plants
operation on natural gas or gas from landfills
Fuel Cells
combines hydrogen with oxygen from air to generate electricity with water
hydrogen may be supplied from an external source or generated inside fuel cell by reforming a hydrocarbon fuel
Not vulnerable to power grid failure due to system instability or natural calamities !
Protection and controls for DG should be designed so that units continue to operate when isolated from the power grid