Abstract:
The present disclosure provides a method and system for operation of substations in which protection, control and measurement devices (e.g., Intelligent Electronic Devices (IEDs)) exchange operational data over a data network, for example, according to IEC standard 61850. During maintenance, commissioning and fault situations, when one or several IEDs are inoperable, the data that these IEDs would have produced is substituted to ensure availability of the substation. To this effect, a dedicated substitute device is permanently installed that can take the role of any IED, and that is automatically configured out of a standard configuration description (SCD) file that describes the SA system.
Abstract:
A communication device is provided with a power-limiting module connected to the power supply and configured to limit energy supplied to the transmitter portion such that a defined maximum data transmission rate is not exceeded. The power-limiting module comprises an energy storage device, supplying energy to the transmitter portion, and a limiter limiting recharging of the energy storage device by the power supply. The energy storage device and the limiter are selected such that a defined maximum energy is suppliable to the transmitter portion, limiting the transmitter portion to transmit data at the maximum data transmission rate. Limiting the energy supplied to the transmitter portion ensures that the communication device does not transmit over the network more than a given, limited amount of information per time unit, thus, the quantity of data transmitted by the communication device is limited.
Abstract:
The present disclosure provides a secure one-step IEEE 1588 clock using either a symmetric or asymmetric protection scheme. Clocks of mission-critical or highly-available devices in industrial automation systems connected to a communication network are synchronized by sending, by a master clock, a synchronization message, e.g., a single message of the one-step-clock type according to IEEE 1588, including a time stamp, and by receiving and evaluating, by a slave clock, the synchronization message. A synchronization component or module of the master clock prepares, or composes, prior to a projected send time, a synchronization message including a time stamp of the projected send time, and secures the synchronization message in advance of the projected send time. Securing the synchronization message occurs by suitable cryptographic means allowing for authentication of the time stamp at a receiving slave clock. At the projected send time, the secured synchronization message is transmitted.
Abstract:
The present disclosure relates to highly available communication networks, e.g., for industrial or utility applications such as substation automation. The devices are connected to two redundant lines through two independent transceivers and bus controllers, i.e. the physical layer and the link layer of the corresponding protocol stack is duplicated. For seamless operation, a sender sends frames simultaneously over both lines and a receiver accepts whichever frame of a pair comes first and ignores the late frame. An exemplary method is disclosed for discarding duplicate frames at the link layer without considering the higher protocol layers, based on a counter inserted in the frame and an algorithm for rejection, with a corresponding means to detect which frames operate according to the redundancy protocol.
Abstract:
Exemplary embodiments are directed to a network coupling device connected over a respective first and second port in a communication network with a ring topology operating with full duplex links. When sending information, the coupling device inserts two duplicate frames in the ring, one over each of its ports. The frames containing information that identifies these two frames as a pair of duplicates of the same frame. Each similar device in the ring includes a Switching Element that receives a frame from one port and forwards the frame to the other port without modification. The Switching Element discards a frame that was originally sent by that same node, discards a frame that it already forwarded in that direction, and/or discards a frame that it cannot recognize as being a member of a pair. A further similar device on the ring is able to receive the two duplicate frames and pass the earlier received frames of a pair to the application, while discarding the later, received frames based on the identification within the frames.
Abstract:
A method and system are provided for operation of substations in which protection, control and measurement devices (e.g., Intelligent Electronic Devices (IEDs)) exchange operational data over a data network, for example, according to IEC standard 61850. During maintenance, commissioning and fault situations, when one or several IEDs are inoperable, the data that these IEDs would have produced is substituted to ensure availability of the substation. To this effect, a dedicated substitute device is permanently installed that can take the role of any IED, and that is automatically configured out of a standard configuration description (SCD) file that describes the SA system.
Abstract:
Exemplary embodiments are directed to deterministic data transmission of real-time operational data in Highly available, Seamlessly Redundant (HSR) ring-type communication networks with at least a master node, a source node, and a destination node. Each node can include first and second communication ports connected to a respective first and second neighbouring node of the communication network, to receive a frame via the first communication port, and to forward the received frame via the second communication port. The master node sends a first and a second redundant frame or empty data packet to its first and second neighbouring node, respectively. Upon reception of the two redundant frames, the source node inserts process data into a predetermined and dedicated field of each frame. Each one of the two loaded redundant frames is instantaneously and individually forwarded to the first and the second neighbouring node of the source node, respectively. The destination node extracts the process data from the first arriving loaded redundant frame of the pair.
Abstract:
Specimen programs (S1) of a specimen object (1) can be tested by means of an observation tool (2), and the duration of program routines registered and evaluated. In order to achieve a better testing depth, the observation tool (2) is additionally supplied with at least one measurement and/or process signal from at least one simulated process (P′) from a real time simulator (4) or from a process (P) of a plant (3). At least one signal is transmitted from the simulated process (P′) to the observation tool (2), it being possible for this signal to be generated by the process (P) or (P′), and said signal triggering a test by the observation tool (2).
Abstract:
In such a multiprocessor, in which the common memory (M) or one of the cache memories (C1, C2) can be owner of a variable determined by its address and in which it is always only the owner of a variable which delivers it to the bus (1) following a read request, the concept of ownership is further developed by the present invention with respect to implementing it with standard buses which, per se, are not intended for this purpose, and with respect to the greatest possible efficiency.
Abstract:
Exemplary embodiments increase reliability of communication over a non-deterministic communication channel, in electric power systems. A communication channel is monitored based on regular network traffic, by evaluating messages or data packets carrying real-time operational data as a payload. A permanent determination of a channel quality, including appropriate alarming in case the channel quality is found insufficient, is based on an evaluation, at a receiving node, of data packets continually transmitted by a sending node. These continually or repeatedly transmitted data packets can include identical payloads reflecting current states rather than state changes as operational data.