University
stringclasses 19
values | Text
stringlengths 458
20.7k
|
---|---|
Virginia Tech
|
The velocities for all the PVC pipe tests and concrete block tests were organized and
compared to identify if an overall consistent scratch velocity was maintained throughout the tests
that occurred with more than a foot in insertion. Most graphs seen in the experiments section that
did not suffer a massive dislodging of the scratch head, or a breakage of the tension wire will
show a region of constant velocity motion. The output of these velocities is available in Table 5-I
below:
Table 5-I: Average Velocity Values for PVC and Concrete Scratch Tests
Average
Concrete Average
Scratcher Block PVC Average
Test Diameter Velocity Velocity Velocity
Name (in.) (in./sec.) (in./sec.) (in./sec.)
1 Zone 1 0.045 0.54 0.54
1 Zone 2 0.045 0.49 0.49
2 Zone 1 0.045 0.43 0.43
2 Zone 2 0.045 0.6 0.6
3 Zone 1 0.045 1.36 1.36
3 Zone 2 0.045 0.66 0.66
1.1 0.045 0.5 0.5
1.2 0.045 0.6 0.6
2 0.045 0.768 0.768
3.1 0.051 0.44 0.44
3.2 0.051 0.52 0.52
Average 0.68 0.57 0.63
Standard
Deviation 0.31 0.11 0.25
The data indicate an average velocity of the movement of the scratcher head for the combined
PVC pipe and concrete block tests to be 0.63 in./sec. with a standard deviation for these values of
0.25 in./sec.. The movement in the concrete block had a higher average velocity (0.68 in./sec.)
than the average velocity in the PVC pipe (0.57 in./sec). Additionally the PVC pipe had a smaller
standard deviation of scratcher velocity, which means it had better velocity consistency than the
concrete block tests.
82
|
Virginia Tech
|
Force versus Displacement Analysis
Another useful type of plot can be developed for the collected information that portrays
how the force values change relative to the scratcher’s position in the hole. This makes the
buildup and release of stored energy from friction slippage on the rock become more evident.
This plot is generated in the “itchesplot” program and simply pairs the force and position values
for a given time value. A view of this plot for test two is seen in Figure 5.4 below, with a region
outlined in orange to be assessed further, the scratch direction, and a vertical red line denoting
the collar of the drilled hole:
Scratcher Head Movement Direction
Figure 5.4: Force vs. Displacement graph for Test One on Concrete Block with Orange Outline
of Study Area, Red Collar Line and Movement Direction Arrow
The outlined region corresponds to the constant velocity region from Figure 5.2. When
visualized up close, certain behaviors become evident. The highlighted region was selected for
an in-depth analysis because it is known that this area corresponds to constant velocity motion.
83
|
Virginia Tech
|
Sandstone Scratch Analysis
One final type of analysis was conducted on the data from the sandstone sample scratch
tests. Considering the only chosen change between the tests was the diameter of the scratchers, it
was deemed useful to consider the way that the forces may change between these tests. Some of
the original graphs for the sandstone tests can be seen in Figure 4.16, Figure 4.17, and Figure
4.18 where force and displacement are plotted against time, with the rest available in the
Appendix in Figures A.9 through A.20. An analysis of these images shows an increase in force
for the parts of the test where motion occurred followed by a flatline after the scratcher exited the
hole and hung until the test ceased. The mean force in the motion phase and was calculated and
organized in Table 5-1:
Table 5-II: Comparison of Force Averages for Different Scratch Diameters for Sandstone
Sample
Sandstone
Scratcher
Diameter Pull Force Averages (lbs) Overall Statistics
(Inches) Test 1 Test 2 Test 3 Test 4 Test 5 Test 6 Test 7 Average St. Dev.
0.045 8.28 6.19 5.34 4.48 n/a 6.59 6.55 6.24 1.29
0.051 12.75 7.76 10.39 4.509 5.44 11.63 4.87 8.65 3.49
0.055 6.49 15.19 12.22 9.17 6.71 n/a n/a 9.96 3.73
The magnitude of the force averages are visible in the blue column on the right. These results
indicate that increasing the scratch tip diameter will increase the force necessary to move it along
the rock surface. This is a result of the friction forces of the scratcher tips as they drag along the
rock surface and are subject to larger normal forces with increasing scratcher stiffness. As well
as the fact that if scratching occurred, the force would be applied over a wider area, which would
provide more resistance.
88
|
Virginia Tech
|
Conclusions
After conducting an analysis about the ability to quantify mine strata conditions, a
scratching device was developed to extract useful strength characteristics from legally mandated
one inch diameter test holes in mine roofs. The applied rock analysis technique is based off of
pre-existing methods of scratching core logs and determining their strength properties from
measured forces and cutting dimensions. A thorough review of mine strata conditions was
conducted in the literature review to identify what types of hazards exist in mine roofs as well as
how their geologic formation lead to some of the features that would be important for a strata
analysis device to target and identify.
Titled MRSAD, short for Mine Roof Strata Analysis Device, this rock analysis unit
consists of a mounting system and a series of instruments to gather properties from the rock. The
scratcher, pulled through the hole by a tension cable, has scratch tips contained within it that
interact with the rock to generate cutting forces. A winch attached to a stand winds this tension
cable and the generated forces are relayed by a custom-made tension transducer affixed in-line
with this cable. A position transducer, attached to the scratching head, travels the length of the
hole and relays position values to correspond to the force values. An installation protocol was
developed, as well as the modified pipe and special scratch tip retraction mechanism necessary
for installation.
The signal from the transducers connected into a data acquisition system that is paired
with a laptop computer. On the computer, a specially written LabVIEW program converts the
voltage signal into a spreadsheet. This spreadsheet can be imported into MATLAB where a
series of routines were written to aid in their processing. The results, when viewed as functions
of time and functions of position conveyed information about the motion of the scratch head in
89
|
Virginia Tech
|
the borehole. This device was first tested in a lab setting at a roof drill manufacturer facility
where a concrete block with various embedded strata was scratched to see if any changes in rock
could be observed. The data were too erratic to determine any changes in rock type along the
borehole. A second and third test were performed in a campus laboratory by conducting the same
scratch test in a PVC pipe and a sandstone block. This guaranteed proper anchorage and allowed
additional variables to be constrained such as scratcher diameter which were not controlled
during the tests at the roof drill facility.
Force measurements from the tension transducer relayed pulling forces in the sandstone
averaging 6.24 lbs, 8.65 lbs, and 9.96 lbs for the 0.045”, 0.051” and 0.055” diameter wire
scratchers, respectively. Additionally, tests performed on the PVC pipe show a similar increase
in applied force with increased scratcher diameter from 0.045” to 0.051” with a respective force
increase from 2.81 lbs. to 36.46 lbs. This indicates that increasing the scratcher wire diameter
increases the pull force and therefore, the force applied to the rock. Increasing the diameter of the
wire increases the stiffness of the scratcher and therefore increases the normal force exerted into
the surrounding media. Increasing wire diameter also reduced the deflection the scratchers may
undergo from scratch forces. The displacement transducer performed as expected and indicated
that the winch was able to control the velocity of the scratch head with an average of 0.63 in./sec.
velocity with a standard deviation of 0.25 in./sec.. The output from the graphs indicates a pattern
of sticking and slipping between the scratchers and the surrounding material as the head would
build up force and then travel a small amount. Although the numerical results didn’t provide an
ability to find rock strength values, it did indicate the promise of certain aspects of the device to
be used in later iterations of similar technology.
90
|
Virginia Tech
|
Future Work
In spite of the promise of several of the designed components, there were identified
aspects of this project where reevaluation could significantly simplify the system and increase
accuracy. The most glaring improvement would be to rework the force-sensing element to be
better suited for the forces that were encountered in this trial (many tests had valuable
information contained between 0-10 lbs but the load cell was designed for higher forces).
Additional efforts to improve filtering of the data as well as signal stability would also increase
precision and accuracy. A better configuration would be if the force sensor could be mounted to
the tension winch so that the forces would manifest themselves in the winch and the forces
applied could be derived from there and there bypass putting a force sensor in the hole.
Another improvement would be to integrate the position sensing properties of the
extensometer with the winch. Since the winch already has the cable in the hole, all the cable that
it pulls from the hole is moving at the same rate at the scratch head. With this knowledge, it
should be possible to configure a gear system to the pulley so that every N turns of the winch
will manifest themselves as a smaller number of turns on a potentiometer and therefore give a
position specific voltage output. This would bypass the expensive, delicate and cumbersome
extensometer with its accompanying cable and reduce the amount of things that need insertion
into, and could be damaged by, the borehole.
The scratch head also has areas of improvement. It is suggested here that the ideal means
of implementing the scratchers would be to have a head shaped much like the one from this
project, but have it sit within a sheath. This sheath would restrain the installed scratchers from
pushing into the rock mass and when placed in the correct position, the sheath could be slid off
the scratch head, with the scratcher arms springing into the surrounding strata. This would serve
91
|
Virginia Tech
|
several functions, as it would remove the amount of skill that the installer would have to have for
installing the device as well as increasing the stiffness of the scratchers that could be used. There
was no means for determining or controlling the contact force of the scratchers on the rock, a
method of doing that would provide other areas of improving scratcher design.
The use of thicker scratchers would increase the likelihood of gouging of the rock as the
PVC and sandstone experiment suggested that small changes in scratcher tip thickness can yield
higher pulling forces. A closer examination of the relationship between tolerance of the scratch
head and tolerance of the hole diameter would also likely provide more information about
circumstances that result in scratching versus simple friction sliding in the hole. Modifications to
the shapes of the scratching tips to better control their effect on the test should also be
considered. Lastly, a more portable (hopefully permissible), autonomous data acquisition system
that could bypass the cumbersome LabVIEW to Excel to MATLAB file transfer that had to
occur for this project would prove very convenient, especially if it could bypass a computer
altogether.
Several factors were identified that should be investigated further as sources of error in
the testing. The buildup of dust of certain amounts and compositions on the hole wall may
impact the effectiveness of the cutting system and its effect on this research is unknown. Also,
the presence of water in the rock may affect how the rock reacts to scratching. Controlled
dimensions of borehole diameter during scratching would be helpful for determining how out-of-
gauge hole profile affects scratcher behavior. Recommended safety practices include: keeping
only the most necessary people around the testing unit at any given time so that if an unlikely
failure occurs, there would be no risk to them, and only winding the spool from behind the
device so that nobody is in the way of the unit in the event of failure.
92
|
Virginia Tech
|
An Electrical Mine Monitoring System
Utilizing the IEC 61850 Standard
David Christopher Mazur
Abstract
Motor control assets are foundational elements in many industrial operations. In the
mining industry, these assets primarily consist of motor control centers and drives, which are
available with a comprehensive assortment of control and monitoring devices. Various
intelligent electronic devices (IEDs) are now used to prevent machine damage and downtime.
As motor control devices have advanced in technology, so too have the IEDs that protect them.
These advances have resulted in new standards, such as IEC 61850, that have embedded
intelligence and a standard set of communication schemes by which IEDs can share information
in a peer-to-peer or one-to-many fashion.
This dissertation investigated the steps involved in interfacing IEDs to a mining process
control network via the use of the IEC 61850 standard. As a result of this study, several key
technological advancements were made including the development of (i) vendor independent
system to communicate with IEDs in a mining environment over IEC 61850, (ii) command and
control methods for communication based assisted automation of IEDs for mining firms, (iii)
effective solutions to incorporate electrical distribution data in the process control system, (iv)
enhanced safety platforms through remote operation of IEDs, (v) standard visualization faceplate
graphics for HMI operators with enhanced security, and (vi) new methods for time stamped
dataflow to be correctly inserted into a process historian for “true” Sequence of Events Records.
|
Virginia Tech
|
Dedication
This work is dedicated to my family. Thank you for always being there and believing in
me. You have taught me over the years that I am capable of anything that I put my mind to.
This document is proof that anything is possible and that the North American engineering spirit
is truly alive and well. Thank you!
Ce travail est dédié à ma famille. Je vous remercie d'être toujours là et de croire en moi.
Vous m'avez appris au fil des ans que je suis capable de tout ce que je mets mon esprit à. Ce
document est la preuve que tout est possible et que l'Amérique du Nord d'ingénierie esprit est
bien vivant et bien. Je vous remercie!
Acknowledgements
I would like to take this moment in acknowledging those who have helped me along the
way in the development of this research. Special thanks to Mr. Erik Syme of ProSoft
Technologies for helping me along the way with the hardware and software development of the
gateway module. Thanks to Rob Entzminger of Rockwell Automation for helping me
understand the current problem with process historians and being there for guidance when
developing the historian event insertion tool. Thank you to Jim Elhert and Lee Ward of
Rockwell Automation for helping me obtain feedback from various mining and metals firms in
order to provide the community a meaningful and beneficial solution. Thanks to Blake Moret for
believing in this idea, by funding my research efforts.
Finally, special thanks to Joe Sottile and Tom Novak for agreeing to serve on my
committee and helping me develop this research into a beneficial result for the mining industry.
iii | P a ge
|
Virginia Tech
|
1. Chapter 1 - Introduction
Background
As new technology continues to drive innovative applications, the mining industry must
keep pace to remain competitive in an ever-changing marketplace. The trend requires replacing
outdated systems with high-performance, low-cost, option-rich devices that offer improved
flexibility while reducing operating costs. Many functions of new control systems are becoming
increasingly distributed to smart components capable of performing localized operations that
were once the responsibility of a central or master controller. The integration of intelligent
devices, device-level networks, and interrogation software into motor control centers
demonstrates improved diagnostics, permits early warnings for increased system reliability,
offers design flexibility, and provides for simplified wiring and an enhanced level of personnel
safety.
Energy consumption is an additional concern for mining operations. The ability to
integrate energy consumption and the electrical distribution network into the process control
system provides the mine process engineer many advantages. This dissertation focuses on
technology integration of intelligent devices via the IEC 61850 standard to traditional process
control networks utilizing programmable automation controllers (PACs) for both monitoring and
command and control of a mine electric distribution system.
Power system and industrial-based electrical protection devices have evolved over the
past three decades from electromechanical- to microprocessor-based relays. With the advent of
sophisticated microprocessor based relays, more advanced protection schemes that correctly
identify and clear faults in acceptable timeframes have been developed. As microprocessor-
based relay technology has evolved, so too have communication networks for electrical
protection. Electrical protection architectures have developed from hard-wired contacts to
communication networks using serial protocols such as Modbus. Serial communication has
evolved to communication protocols over the TCP/IP stack such as Modbus TCP and DNP3
LAN/WAN, which then allowed substation devices to communicate in a peer-to-peer manner to
share data.
The mining industry is the third largest North American vertical growth industry, behind
oil and gas, and power infrastructure. Multiple world market leaders are participating in the
1 | P a ge
|
Virginia Tech
|
power distribution system market place. Because of an increase in vendors, and the growing
complexity of interfaces for power system protection equipment, IEC 61850 was developed as a
global standard for substation communication. Now that technology in time synchronization,
protection, and fast-acting circuit breakers exists, a truly automated substation can now be
realized with the implementation of IEC 61850 across multiple equipment manufacturers.
The implementation of IEC 61850 also benefits automation and control companies as
they now can spend resources in developing SCADA systems. Additionally, other data
collection and historian systems that are inclusive of process and utility system can be controlled
by devices from multiple vendors. This will allow for better Human Machine Interfaces (HMIs)
as well as faceplates for operators to read and control relay operations in a substation
environment.
Problem Statement
The IEC 61850 standard provides a mechanism for interoperability, i.e., the ability for
information from Intelligent Electronic Devices (IEDs) from multiple manufacturers to be
exchanged with each other; however, the standard is limited to power system components, i.e.,
relays, meters, circuit breakers, etc. If this information could also be made available to the
control system, i.e., programmable logic controllers (PLCs) or programmable automation
controllers (PACs), the power system IEDs could be treated identically as control system
components, thus permitting a wide range of novel applications for these IEDs, e.g.,
optimization, demand-side load management, etc.
The electrical distribution and infrastructure systems of a mining operation are not very
well monitored. There needs to be an easier way to gather information to maximize process
yield and efficiency. Mining applications need to improve automation and control systems to
better understand the big picture of the overall operation. Current energy monitoring and
management systems are not vendor independent, thus making them difficult and expensive to
maintain. This dissertation solves all of these problems and presents a functional solution for
interfacing a mine distribution system to its process control system.
2 | P a ge
|
Virginia Tech
|
Scope of Work
Electrical SCADA (E-SCADA) platforms that interface with the process control system
of a mine were initially investigated. Research was conducted to evaluate the current E-SCADA
protocols and implementations to evaluate the pros and cons of traditional solutions. After the
evaluation of these traditional standards and protocols, the IEC 61850 standard and protocol suite
was evaluated for multi-vendor implementation of mining electric distribution systems.
After this initial research of current technologies, a novel solution was developed, tested,
and validated. The scope of this work was limited to the background research and construction
of a functional system to link a process control system to an electric distribution system.
This research produces a hardware and software solution that interfaces to the electrical
distribution system. A hardware gateway solution is defined and specified as well as software
developed to interface to this hardware solution. Visualization graphics are developed to allow
for an easy operator and engineer interface to various pieces of distribution equipment.
Additionally, a solution is specified and implemented to link traditional process historians with
E-SCADA systems for the benefit of long-term data storage and trending.
Thesis Format
This thesis is divided into nine chapters that describe the design and development of a
proposed interface to link an electric distribution system with a process control system via the
IEC 61850 standard. The following is an overview of the chapters follows.
Chapter 1 Introduction
This chapter defines the problem statement and provides an overview of the scope of
work that will be conducted and produced by the end of this document.
Chapter 2 Literature Review
Supervisory Control and Data Acquisition (SCADA) systems have been around since the
conception of automation and control systems. The first SCADA systems utilized data
acquisition by means of panels, meters, and lights. The operator manually exercised supervisory
control by adjusting control knobs. These devices still perform the supervisory control and data
acquisition of plants, factories, and power generating stations. As systems became more
3 | P a ge
|
Virginia Tech
|
distributed, SCADA systems played a larger role on process efficiency and yield. This chapter
discusses background information and evolution of traditional SCADA systems. Other topics
discussed include electrical distribution protocols and standards as well as time synchronization
standards.
Chapter 3 Conceptual Design
As previously described, the objective of this research is to design and develop a system
that links the protection and metering of the electrical distribution system at a mining operation
to a site-wide control system. The first steps in this process are to establish the system
capabilities, develop a preliminary conceptual design, and develop a working specification for
the system to achieve the research objective. This chapter discusses the development of the
conceptual design for the automation and control solution that was developed.
The design process of this solution begins with an initial conceptual design based upon
research, industry needs, and personal experience. In order to better fortify the design for an
industrial process network, the original conceptual design was presented to industry stakeholders
within the following disciplines: mining, metals, oil and gas, and engineering firms.
The original conceptual design was then compared against the engineering community
input in order to finalize the conceptual design presented at the end of the chapter. The chapter
begins with the original conceptual design followed by input provided by the engineering
community segments listed above. Subsequently, the final conceptual design is presented and
defined.
Chapter 4 Hardware Implementation
This chapter summarizes the hardware gateway module developed to implement the
conceptual design described in Chapter 3. A key component to this design is the multi-threaded
design to interface between the IED IEC 61850 network and the process EtherNet/IP network.
Each thread including the master control program is defined, and basic functionality is explained
in a functional block diagram. The various types of data that are used in this project are then
addressed followed by how data is packaged in packets to be sent to the process network via
EtherNet/IP.
4 | P a ge
|
Virginia Tech
|
The concept of the tag database is discussed, i.e., how it is utilized as a common space of
shared memory where both 61850 and EtherNet/IP drivers would read and write various tags.
The use of semaphore tags is also discussed in the database to avoid collisions in the tag
database. Finally, a practical example of this hardware module is used in a mine power system
application is provided.
Chapter 5 Software Implementation
In order for the hardware gateway to work properly with the process control system,
software needed to be developed that allowed for user interaction and configuration of the
gateway module. As described in Chapter 4, the configuration files are held by the Secure
Digital (SD) card. These files are downloaded to the SD card from the software tool that is
presented in this chapter. The procedure for how the hardware and software work together to
produce the final solution developed in this research is summarized in this chapter. A structured
example detailing the creation of a Configured IED Description, specifying the mapping of
information, and creating an Add-On instruction is explored in this chapter. Examples of
software are shown on the graphical user interface while additional XML code is provided to
show what files are created behind the scenes allowing the solution to function. Examples of
importing the Add-On instruction into code are shown as well as how the data are mapped as an
object into the controller data table.
In addition, a software tool was also developed to store information in the OSI PI
database on a precise timescale. The chapter discusses the traditional model of process
historians and how they do not adequately function for high speed SCADA and “smart” process
instrumentation. A new model is explored using off the shelf components to develop a bypass to
traditional historian data interface nodes. The tool creates a linkage between two databases, SQL
for alarms and events, and OSI PI via the OLE DB connector for historical data, thus allowing
for post processing of time critical data into the historian environment. The historian tool is also
discussed in this chapter.
Chapter 6 Visualization Benefits
This chapter defines the visualization developed for this research. Items discussed in this
chapter include: faceplate definition, human/machine interface discussion and definition, and
data management. The motivation for visualization is to represent an IED in logic and graphics
5 | P a ge
|
Virginia Tech
|
as close to the physical object itself. This provides the operator or engineer with the same look
and feel experience that they have with the physical device. At the same time, the graphics had
to be developed with various levels of security to allow only users with proper credentials access
to various command and control functions. Additionally, the research solution must adhere to
various graphics standards for both power and process control systems. This chapter discusses
the challenges in implementing a compliant visualization solution.
Chapter 7 Testing and Verification
This chapter discusses the testing and validation procedures conducted throughout this
research to validate and verify functionality of the proposed solution. As this research‟s goal
was to develop a mine monitoring solution utilizing the IEC 61850 standard to link the electrical
distribution system with process control system, it was determined that the best way to validate
the work and functionality of the proposed system would be to benchmark it against the
conceptual design. The chapter discusses each conceptual design milestone as well as the
procedure used to validate that this goal was met throughout the period of conducted research.
For milestones that required more than just visual inspection, the experimental setup is defined,
and testing procedure and experimental results are discussed.
Chapter 8 Practical Implementation
This chapter discusses the practical implementation of the mine monitoring system
presented in this dissertation.
Chapter 9 Conclusions and Future Work
This chapter summarizes the results of this research and discusses future work in this
area.
6 | P a ge
|
Virginia Tech
|
2. Chapter 2 - Literature Review
Introduction
Supervisory Control and Data Acquisition (SCADA) systems have been around since the
conception of automation and control systems. The first SCADA systems utilized data
acquisition by means of panels, meters, and lights. The operator manually exercised supervisory
control by adjusting control knobs. These devices still perform the supervisory control and data
acquisition of plants, factories, and power generating stations. As systems become more
distributed, the need and role of SCADA systems plays a larger role on process efficiency and
yield. The next few sections discuss the evolution of SCADA systems from simple sensor and
instrumentation panels to more complex systems and the justification for their use in mining
operations.
Mining Energy Usage
In June 2007, the U.S. Department of Energy (USDOE) conducted a study on energy
consumption in the mining industry. This study sampled 20 of the largest energy intensive
mineral extraction and processing facilities. The results of the study can be seen in Figures 2.1
and 2.2.
Figure 2.1 Mine Energy Usage
7 | P a ge
|
Virginia Tech
|
Figure 2.3 depicts energy usage by industry segment. It can be seen that mining, oil, and
gas extraction consume 32% of all industrial and commercial power usage in Canada [2]. Total
manufacturing, which consists of many subsectors as shown on the right of Figure 2.3, consumes
60% of all energy, but the largest individual energy consumer in the nation is the mining
industry. Figure 2.4 depicts the trend of energy usage. It can be seen that the mining industry
has shown continuous growth from 1990-2008, while other industries have declined. As
previously stated, much of this energy is consumed in crushing and grinding processes [2].
Figure 2.4 Energy Usage Per Segment
Taconite Mine Example
Taconite is an iron-bearing rock that is essential to the steel-making industry. Iron ore
mining and beneficiation are very energy intensive processes that require heavy crushing and
grinding procedures. To put this energy usage in perspective, in 2005 a Minnesota iron ore mine
used an average of 275 MW of power and is currently Minnesota‟s largest consumer of energy
[3]. The process begins with hauling taconite from an open pit mine to the central processing
facility. At the processing facility, raw taconite is delivered to the coarse ore crusher [4]. This
machine, which typically operates at 13.8 kV, reduces the mined rock into conveyor size
material. The coarse crusher is typically a 7850-horsepower synchronous machine with high-
torque, low-speed characteristics.
The output material of the coarse crusher is then conveyed to the fine ore crusher. The
belt conveyors are typically powered by dual 4160-V, 5000-hp induction motors, that continually
operate during production shifts [4]. These conveyors feed the fine crusher house, which
9 | P a ge
|
Virginia Tech
|
contains multiple mills that are also driven by 4.16-kV induction machines. The mills further
reduce the coarsely crushed material to 3 cm.
The fine material is then conveyed from the fine crusher house to the concentrator
building, which houses rod and ball mills for grinding. These mills are driven by 4.16-kV, 2600-
hp synchronous machines [4]. The output of these mills is a fine slurry mixture that is next sent
to magnetic separators.
The magnetic separators remove ferrous material from non-ferrous material. The non-
ferrous slurry material is pumped to the tailings pond, and the ferrous material is pumped in
slurry form to the agglomeration building [4]. This building contains vacuum discs and balling
drums to create taconite pellets. The pellets are then sent to a rotating kiln for drying and then to
storage for shipment. These processes are performed with low voltage equipment.
A typical one-line diagram of a processing facility is shown in Figure 2.5. These taconite
processing facilities are fed with 138 kV feeders from the utility.
From From
4.16KV BKR-A1 4.16KV BKR-A2
4 –3/C 500Kcmil 4 –3/C 500Kcmil
4160V MCC A1 4160V MCC A2
1200A
1200A
K N.C.
N.C.
MCC A1, 1200 AMP, 4.16 KV, 3 PHASE, 40 KA MCC A2, 1200 AMP, 4.16 KV, 3 PHASE, 40 KA
1200A 1200A
1200A 1200A 1200A 1200A N.O. N.O. 1200A 1200A 1200A 1200A
80E 80E 80E 24R 18R 18R 80E 80E
400A 400A 400A 400A 400A 400A 400A 400A
0 /2
#
C /3
0 /2
#
C /3
0 /1
#
C /3
0 /4
#
C /3
0 /1
#
C /3
0 /2
#
C /3
0 /2
#
C /3
0 /2
#
C /3
VFD VFD VFD VFD
0 /1
#
C
0 /4
#
C
0 /1
#
C
0 /2
#
C
To To /3 /3 /3 /3 To To
4160V-480V 4160V-480V 4160V-480V 4160V-480V
1000KVA 1000KVA 1250 2000 1500 1750 1000KVA 1000KVA
XFMR XFMR HP HP HP HP XFMR XFMR
Figure 2.5 Typical Taconite Mine Distribution One Line Diagram
10 | P a ge
|
Virginia Tech
|
From this point, every facility has two feeds of 13.8-kV in a main-tie-main configuration, each
with its own transformer. The 13.8-kV distribution voltage is then stepped down to 4.16-kV at
each building to feed individual loads. The 4.16-kV busses are also configurable in a secondary-
selective, main-tie-main scheme that can be implemented in case of bus failure. This
configuration is often preferred in large mining operations because it allows critical loads to be
transferred to healthy busses during times of an electrical system fault or insufficient spinning
reserve. Many relays are utilized for operating and protecting these facilities, including
instantaneous and time delay overcurrent (50/51 elements), differential (87 element), under-
voltage (27 element), and others.
Electrical protection has evolved over the past three decades from electromechanical to
microprocessor-based relays. Protection systems previously consisted of isolated, hard-wired
interlocked electro-mechanical and solid-state relays that had limited system visibility. These
devices only detected an electrical fault or overload and lacked a way to report additional
protection information. With the advent of microprocessor-based relays, more advanced
protection schemes, that correctly identify faults in acceptable timeframes, have been developed.
Communication schemes for providing electrical protection have also evolved with
microprocessor-based relays [5]. SCADA communications protocols and standards have been
developed for the purpose of collecting information from remote process locations for use in
central processing calculations. This dissertation proposes the use of the IEC 61850 standard to
serve as the backbone for communications for addressing the IED-interface issue. The IEC
61850 standard can also be used for controlling main-tie-main schemes through communications
rather than hardwire, in addition to its added SCADA benefits [6].
11 | P a ge
|
Virginia Tech
|
SCADA Evolution
Instrument Panels
Original SCADA systems consisted of sensor and instrumentation panels. These were
panels constructed of various discreet and analog I/O sensors that were hardwired back to a
reference point in a control panel [7]. A simple sensor panel can be seen in Figure 2.6.
Collection Point
Sensors
(Discreet or 4/20 mA)
Figure 2.6 Sensor Panel
Many process owners installed these sensor panels for the many advantages that they
offered, including simplicity with no CPU or programming software needed, sensors are directly
connected to meters, switches, and indicators, and the cost to construct these panels is cheap.
On the other hand, these panels had the following drawbacks:
The wire required to install a complex system could become unmanageable due to cable
quantity
The quantity and type of data received from the panel are rudimentary
Increasing capacity of the system becomes more difficult as the system expands
Reconfiguration becomes difficult as there is no way for data simulation using this
method
Data storage is minimal
12 | P a ge
|
Virginia Tech
|
There is not remote monitoring of data and alarms; thus requiring a person to be present
to monitor the system.
As a result of these drawbacks, the industry eventually progressed to the use of telemetry to
interconnect areas of a process network [8].
PLC / DCS Systems
Modern SCADA systems often utilize telemetry to move data across long distances and
connect remote nodes to their systems [7]. For example, in today‟s society, many heavy
manufacturing and industrial processes, such as metals, mining, utilities, and security, need to
connect equipment and systems often separated by large distances. These distances can range
from a few feet to hundreds of miles. Via the use of telemetry, process owners and control
engineers can send commands and programs and receive monitoring information over the
network from various locations [9].
A modern definition of SCADA is the combination of telemetry and data acquisition.
Furthermore, SCADA can be defined as the collecting of information, the process of transferring
this information to a central site, performing calculations to take corrective control action of a
process, and enabling actuators to take the corrective control action [7]. SCADA has also
evolved to displaying and trending data on operator and engineering workstations over the past
few decades.
At its conception, SCADA systems used relay logic to control production and plant
processes. With the evolution of CPUs and electronic devices, manufacturers, such as Modicon,
Allen-Bradley, and Siemens, began to implement this technology into relay logic equipment.
The result of this technology integration birthed/created the Programmable Logic Controller
(PLC). The PLC is still one of the most widely used control systems in industry today [10].
Instead of hardwiring a relay into a control panel, a sensor was simply wired back to an I/O
point. Computer logic, known as ladder logic due to its similar form of a relay ladder diagram,
was written to control the state of these devices [7]. As the need to monitor and control field
devices grew, PLCs were distributed, and control systems began to become more intelligent and
smaller in size. An example of a PLC or Distributed Control System (DCS) can be seen in
Figure 2.7.
13 | P a ge
|
Virginia Tech
|
Fieldbus
PLC
Sensors
(Discreet or 4/20 mA)
Figure 2.7 PLC System
This system had many advantages including the computer‟s ability to store and records a
large amount of data, the user‟s ability to customize data, connect sensors over a wide
geographic range, real time simulations for operators, and access to data from remote locations.
While DCS systems have many advantages, the system is much more complex than simple
panels; it requires programming knowledge to configure the system, there are wiring concerns
from the sensors to the PLCs, and the operator only has vision to as far as the PLC in the
network [7].
IED Systems over Fieldbus
As manufacturers and process owners began to push the envelope of SCADA and process
control systems, the need for smaller and smarter systems grew, and as a result, sensors were
designed with the intelligence of PLCs [7]. These new intelligent sensors became known as
Intelligent Electronic Devices (IEDs). As process engineers began to design systems from
process and instrumentation diagrams (P&IDs), a demand grew for these intelligent electronic
devices to perform both discreet and analog control, including analog output and PID control [8].
The IEDs were located on a fieldbus network, such as Profibus, DeviceNet, or Foundation
Fieldbus, where information could be exchanged from IEDs to PCs and other enterprise systems.
IEDs in and of themselves have enough intelligence to acquire data, communicate in a peer to
peer fashion, and contribute to the overall control system. These IEDs typically contained
14 | P a ge
|
Virginia Tech
|
multiple sensors for analogs and discreet inputs. An example of an IED system over a Fieldbus
network can be seen in Figure 2.8.
Fieldbus
IEDs
Figure 2.8 IED and Fieldbus SCADA System
Advantages of this system include the minimal need for wire, operator visibility to the sensor
level, the inclusion of sensor firmware information with received data , the plug and play ability
of devices for simple installation and replacement, and smaller physical footprint. The
disadvantages of this system include: the cost of training required for operators, higher sensor
prices, and IEDs that rely on a communication scheme for data transfer [7].
PLCs to PACs
Over the past 15 years PLCs have evolved to Programmable Automation Controllers.
These platforms are a rack based automation controller that accepts multiple modules for various
configurations. PACs were chosen because of its asynchronous capabilities. Most PLCs are
synchronous in nature in that they execute the following procedure: read inputs, execute a
program, and update output registers [11].
Asynchronous machines utilize two different sets of memory, program and I/O. These
two memory banks are in separate locations and can be written to independently. This means that
I/O information can get collected separately from the executing instructions in program memory.
I/O memory is populated via the use of a backplane circuit and a Requested Packet Interval
15 | P a ge
|
Virginia Tech
|
(RPI). Multiple data words can be simultaneously shared between modules connected to the
backplane as well as written to I/O mapped memory locations [10]. PAC processors are capable
of true multitasking, thus allowing the system to asynchronously gather information and provide
precise time tags while normally scheduled programs continue to operate. Many process owners
today are replacing PLC SCADA systems with PAC systems that work in conjunction with IEDs
on the same fieldbus for monitoring and process control.
SCADA Terminology
A SCADA system can be divided into two categories, hardware and software. It is
important that these two categories function equally in order for the SCADA system itself to be
self-sustaining and provide proper control for the process system.
SCADA Hardware
A traditional SCADA system consists of a number of remote terminal units (RTUs) that
collect field data and send it to a master station via a communication system. The master station
then displays the acquired data and allows the controls engineer to make process and control
decisions for control tasks. This acquisition of data in a timely fashion allows for process
optimization [7]. Other SCADA benefits include more efficient, reliable, and, most importantly,
safety operations. In all, this will result in lower cost of operation compared to non-automated
systems [8].
Complex SCADA systems consist of a five level hierarchy:
1. Field Level Instrumentation and Control Devices
2. Marshaling terminals and RTUs
3. Communication Systems
4. Master Station
5. Commercial data processing department computer system
The RTU provides the SCADA system interface to the field analog and digital sensors situated
on every remote node. The communications system provides the connection between master and
remote sites. This communication system can be defined by a number of media including: wire,
fiber optic, radio, telephone line, microwave, or even satellite. Specific SCADA protocols and
error detection philosophies are used for efficient and optimum data transfer between nodes [7].
16 | P a ge
|
Virginia Tech
|
Master Stations gather information from various RTUs and generally provide an operator
interface for information displays and control of remote nodes.
SCADA Software
There are two types of SCADA software: proprietary and open. Manufacturers engineer
proprietary software to communicate with their hardware. These are typically seen in “turnkey”
solutions where all engineering, integration, and startup are provided from a single vendor or
encompass group. There is one main failure with these SCADA systems: the process owner
heavily depends on the supplier of the system [7]. As a result, many process owners are
supporting open SCADA systems. Due to the interoperability these systems bring to the system,
multiple vendor manufacturer‟s equipment can be used in the same system.
Major vendors of SCADA system software include Citect and WonderWare, but there are
many manufacturers of SCADA software. Many packages today actually include asset
management in order to provide process owners more information about their systems. Key
software features for SCADA system software include user interfaces, graphical displays,
alarms, trends, RTU interface, scalability, access to data, database, networking, fault tolerance
and redundancy, and client/server distributed processing[8].
SCADA Protocols
This section discusses SCADA protocols. Since this dissertation addresses the electrical
distribution system in mines, this section focuses on the three main electrical SCADA protocols:
Modbus TCP, DNP3 LAN/WAN, IEC 60870-5-103, and IEC 61850. To be fair, there are many
electrical distribution protocols that can be implemented in any automation and control system.
Figure 2.9 depicts a listing of various electrical distribution SCADA protocols between the bay
and station level of a traditional electrical distribution substation.
In general, an electrical distribution substation can be broken into three levels of control:
station level, bay level, and process level. The process level of a substation houses the
instrumentation used to collect data, i.e. potential and current transformers. The bay level
consists of IEDs such as relays and meters that collect the process level data and make a
distributed control decision. In this case, control decisions may be network configuration,
energy usage, or load shedding, to name a few. Finally, the station level of a substation consists
17 | P a ge
|
Virginia Tech
|
of Human Machine Interfaces (HMIs), central supervisory control functions, and a station
gateway to send gathered status and data to further upstream substations or master controllers
[8]. Traditionally, this link is usually wireless or fiber optic.
Figure 2.9 Typical Electrical SCADA System
Modbus TCP
Modbus is a master-slave communication model that was developed by Modicon in 1979.
This communication protocol is well established with over seven million nodes in North
America and Europe alone. This protocol is very simple to implement and commission.
Although this protocol is very easy to implement, there are many drawbacks to this method.
Modbus TCP is very inefficient at managing data and network bandwidth. The protocol only
uses simple data types, such as integer and Boolean. Finally, it only can send static data.
Despite these drawbacks, Modbus is still the de facto standard in a multi-vendor integration [12].
Additional limitations to Modbus include no time stamp of data values for Sequence of Events
(SOE) Applications, no indication of a disturbance event, the need for the master to always ask
slave device for data, the inability of the slave to initiate communications to master, and the lack
of common data formats between devices. As a result, these limitations made it critical for the
power industry to find a communication protocol that provided data that more accurately
represented the events that occurred in a power application.
18 | P a ge
|
Virginia Tech
|
IEC 60870-5-101/103/104
As more services were being performed by IEDs in a substation, more intelligence was
required in the protocol that linked these devices. This need, combined with the limitations of
existing communication protocols, such as Modbus, led to the formation of new protocol
standards. In 1990, IEC created the IEC 870-5-1. This standard was then spun off into two
separate standards: IEC 60870-5-101 in 1995 and DNP 3.0 in 1993. This creation can be seen in
Figure 2.10.
Figure 2.10 Evolution of Electrical SCADA Protocols
Industrial communications protocols, such as IEC 60870-5 and DNP 3.0, provided unique
attributes that made data acquisition, data reporting, and overall communications much more
efficient and provided greater levels of detail to the devices in the network. DNP 3.0 is dominant
in North America, Latin America, South Africa, and Australia and is primarily used in the
water/wastewater, and oil and gas segments [13]. The IEC-60870-5 protocol suite is primarily
used in Europe, the Middle East, and Asia Pacific regions. Both protocols provide similar
application functionality and are popular in electrical SCADA applications for communication of
IEDs [14].
The IEC 60870-5-101/103/104 standards are used for power system monitoring and
control in the following: 101 defines serial communication, 103 defines protection relay data
formats, and 104 defines the Ethernet implementation of the protocol. IEC 60870-5-101 is the
first protocol to define a hierarchy of message structure. The protocol breaks data into two
formats, high priority messages (Class 1), and low priority messages (Class 2), and transfers data
19 | P a ge
|
Virginia Tech
|
using separate mechanisms. The 101 section of the standard also defines cyclic and spontaneous
updating schemes as well as the facility for time synchronization [15].
The 103 section of the standard defines power system control and associated
communications. It defines a mechanism that enables interoperability between protection
equipment and devices of a control system in a substation. The mechanism defines either two
methods of data transfer: the use of specified application service data units (ASDUs) or the use
of generic services for transmission of all possible information. This standard supports specific
protection functions and provides the vendor a facility to incorporate its own protective functions
on private data ranges [16].
The standard supports two modes of data transfer. The first mode of data transfer is
unbalanced which is defined by a master initiated message. The alternative to unbalanced
communication is balanced which is defined by a master/slave-initiated message. As previously
mentioned, data is classified into different information objects, each with its own specific
address. The process owner must then classify data into Class 1 and Class 2 data in order to
define transfer mechanisms [8].
The IEEE 802.3 Ethernet portion of the standard (104) classifies data into sixteen
separate data groups that can be individually interrogated. It allows for cyclic as well as
spontaneous data updating of data tags in addition to allowing for the benefit of time
synchronization [8]. These improvements from Modbus allowed for better data transfer with
more meaning to each data point. The ability to timestamp values, group non-similar data points
into custom groups, and interrogate data by two levels of priority provided large improvements
over traditional Modbus schemes [15]. The first implementations of DNP 3.0 developed from
the IEC 60870-5 specifications.
DNP3 LAN/WAN
DNP 3.0 was originally developed as a serial communications protocol for electrical
SCADA applications. This section will refer to the Ethernet based form of this protocol known
as DNP3 LAN/WAN. This protocol is primarily used for communications between a master
station and IEDs or RTUs [8]. This model can be seen in Figure 2.11.
20 | P a ge
|
Virginia Tech
|
Figure 2.13 Multi-Level DNP3.0 Network
In the multi-level drop configuration, there is one ultimate master within the system
(represented by black). All of the remaining nodes within the system are slaves to this master.
In addition, each level of the network designates a master to the lower levels of the network
(represented by gray). This device serves as a data concentrator to the devices below it to gather
data and push it to higher levels of the SCADA system [17].
DNP3 LAN/WAN builds upon IEC 60870-5 in that it supports complex data types,
including integers, double integers, reals, Booleans, dual point binaries, and counters with
quality flags. The protocol also allows for the time stamping of records based on event change
of state as well as analog deadband. The DNP3 LAN/WAN protocol also allows for unsolicited
reports by exception. Data is grouped into two types, dynamic and static. All dynamic data is
grouped into three levels of priority, Class 1, Class 2, and Class 3, while all static data is
referenced to Class 0 [8].
Process owners have adopted DNP3 LAN/WAN because it provides standardization and
interoperability. It is an open protocol and is optimized for SCADA communications. DNP3
provides interoperability between various vendors equipment and is supported by a substantial
number of SCADA equipment manufacturers [8]. The protocol is not static or unchanging; it
allows for extensions. Users can define complete data structures to pass industry specific
information in complete context [17].
22 | P a ge
|
Virginia Tech
|
Today industry is moving away from IEC 60870 and DNP 3.0 in the adoption of a new SCADA
protocol standard known as IEC 61850. This migration is occurring for a multitude of reasons
including: the advantages of high speed Ethernet, the high cost for data management, the loss of
information and functions during mapping of data, and the lack of consistency between vendor
implementations of similar devices [16].
IEC 61850
Introduction
Power system and industrial-based electrical protection has evolved over the past three
decades from electromechanical to microprocessor-based relays. With the advent of
microprocessor-based relays, more advanced protections schemes that correctly identify faults in
acceptable timeframes have been developed. As microprocessor-based relay technology has
evolved, so too have communication networks for electrical protection [5]. Electrical protection
architectures have developed from hard-wired contacts to communication networks over serial
communications such as Modbus. Serial communication has evolved to communication schemes
over the TCP/IP stack such as Modbus TCP and DNP3 LAN/WAN, which now allows
substations devices to communicate in a peer-to-peer fashion to share data.
With power systems being the second largest North American vertical growth industry
behind oil and gas, world market leaders are participating in the power system market place.
Furthermore, the mining industry is the largest consumer of electric power in the world [18].
Because of an increase in vendors and growing complexity of interfaces for power system
protection equipment, IEC 61850 was developed as a global standard for substation
communications. Now that technology in time synchronization, protection, and fast acting
circuit breakers currently exists, a truly automated substation can be realized with the
implementation of IEC 61850 across multiple equipment manufacturers [19].
The implementation of IEC 61850 also benefits automation and control companies as
they now can spend resources developing SCADA systems, as well as other data collection and
historian systems, that interface to multiple devices over one common protocol. This allows for
better Human Machine Interfaces (HMIs) as well as faceplates for operators to read and control
relay operations in a substation environment.
23 | P a ge
|
Virginia Tech
|
History
IEC 61850, “Communication Networks and Systems in Substations,” is an international
standard developed by Technical Committee 57 that focuses on substation automation [20]. This
standard was drafted and adopted in an effort to unify substation equipment and communications
on one common platform regardless of manufacturer. IEC 61850 is divided into ten sub-sections
ranging from 61850-1 to 61850-10 that define protocol terminology, communication
mechanisms, and conformance testing [20-35].
IEC 61850 was a combined international effort merging the Utility Communication
Architecture 2.0 (UCA), an EPRI project, with IEC standard 60870-5-101, -103, and -104 to
create one international standard for substation automation. UCA defined many of the protocols,
data models, and abstract service definitions, while IEC 60870-5 defined the basic
communication profile for sending control messages between two systems [36].
There are multiple benefits to the IEC 61850 standard. These benefits include the
support of comprehensive substation functions, ease of design, specification, setup, and
maintenance, strong functional support for substation communication, and its flexibility to
support system evolution [36]. Additionally, the standard was structured in such a way as to
accommodate current technology.
Protocol Definitions
IEC 61850 was designed as an object-oriented protocol in that data would be defined as
objects, and each object would have multiple attributes. This is very similar to protocols of high
level programming languages. Each physical Intelligent Electronic Device (IED) would be
accessed by a network address. The physical device would then be represented by a logical
device that contained all relevant, non-distributed, logical nodes (i.e. functions in the real
device). Each logical node would then contain data and data attributes which would describe
operations, positions, etc. of the IED. The data and data attributes are defined as dedicated data
values that are structured and well-defined. These values are exchanged according to defined
rules and communication mechanisms [24]. The way that this information is shared across the
network is defined by communications and mapping portions of the 61850 standard [24].
The traditional grid has evolved from analog electro-mechanical relays with one-way
communication that was human monitored to digital electronic relays with two-way
24 | P a ge
|
Virginia Tech
|
communication and managed by advanced control schemes. As previously described, with the
advent of digital IEDs, communication schemes became more advanced than the traditional
hardwired contact. Communication protocols such as Modbus TCP and DNP3 LAN/WAN were
developed by the power industry specifically for advanced control schemes. With the
development of the IEC 61850 standard, three main forms of communications are defined:
GOOSE, MMS, and SMV.
The IEC 61850 protocol is based on the Generic Substation Event Model (GSE). This
model is a fast and reliable system-wide distribution of input and output data values [36]. The
data transfer is based upon a publisher-subscriber mechanism. Additionally, simultaneous
delivery of the same generic substation event information to more than one IED can be achieved
via the use of multicast services. GSE describes the general structure for an event, and the
mechanism for transferring information between devices and locations are defined by GOOSE
and MMS.
The Generic Object-Oriented Substation Event (GOOSE) is one way to transmit
information under the IEC 61850 protocol. GOOSE is a single message sent by an IED, but it
can be received by multiple targets in a peer-to-peer fashion [32, 36]. It is used for fast, reliable
transmission of substation events such as alarms, commands, and indicators. In general GOOSE
is used for high speed, high priority applications such as protection interlocking and events when
event information needs to be delivered in a peer-to-peer fashion.
The Manufacturing Message Specification (MMS) is an alternative to transmitting
messages over GOOSE that is generally preferred for SCADA or non-time critical time data
acquisition. MMS is defined by ISO standard 9506 and is widely used in control networks. The
standard defines a reduced OSI stack with TCP/IP capability and Ethernet or RS232C as physical
media [37]. MMS defines communication messages transferred between controllers as well as
between engineering stations and controllers. Each IEC 61850 object is mapped to a
corresponding MMS object, and each IEC 61850 service is also mapped to a corresponding
MMS operation. All but GOOSE messages and the exchange of sampled values are mapped to
the MMS protocol stack, with the exceptions of time synchronization and file transfer. The
application described within this paper uses MMS to transmit report information from IED to an
automation controller.
25 | P a ge
|
Virginia Tech
|
The IEC 61850 object model is based on commonly used protection, control, and metering
functions in electrical substations. As shown in Figure 2.14, each physical IED can include one
or more IEC 61850 logical devices. Within each logical device, the manufacturer enables logical
nodes to represent the primary functions of the device. Each logical node encapsulates a
collection of data tags associated with the function in question. For example, in a feeder relay
commonly used for industrial power systems, the manufacturer defined logical devices for
protection, metering, control, and annunciation. Contained within the protection logical device,
are a number of logical nodes related to the operation of time overcurrent elements. Specifically,
in metering, the logical nodes are related to the variety of metering values in the relay [38].
Figure 2.14 Virtual IED
Most engineers are accustomed to SCADA protocols that reference tags by address or
index; one of the desirable attributes of IEC 61850 is that tags are referenced by a structured
name. As an example, A-phase electrical current is represented in a Polyphase Measurement
Unit (MMXU) logical node as MMXU$A$phsA$cVal. Table 2.1 describes the components of
this tag name. Additionally, each IEC 61850 enabled IED can self-describe all of the logical
devices and logical nodes it contains. A number of software manufacturers have IEC 61850
browsers that query devices on the network and display available data from each IED. Although
engineers commonly configure network communications using an offline Substation
Configuration Language (SCL) tool, which will be discussed later, self-description is a very
useful function for evaluating or verifying the configuration of a particular IED [39].
26 | P a ge
|
Virginia Tech
|
Table 2.1IEC 61850 Descriptor Example
Descriptor Component Type Description
MMXU Logical Node Polyphase measurement unit
A Data Object Phase-to-ground amperes
phsA Sub-Data Object Phase A
cVal Data Attribute Complex Value
The authors of the IEC 61850 standard defined many types of standard logical nodes that
are used by many manufacturers of protective relays. The common tag naming and structure of
the logical nodes help to simplify the integration of an HMI and other systems with power
system protection equipment. At the same time, it is important to understand limits to the
standard.
First, the standard does not dictate which logical nodes are implemented in a given relay.
Also, there is no way to define how the internal memory values of a given relay are mapped into
IEC 61850 tags. Each manufacturer chooses which logical nodes to implement and how
manufacturers or nodes associate their relay's functions to each logical node. Additionally, the
standard allows for custom logical nodes that can be created by any manufacturer. During system
design, the integration engineer needs to verify the existence and location of needed data from a
target relay.
Substation Configuration Language
In order to have a common method for describing and documenting the communications
network, IEC 61850-6-1 defines various SCL file types based on XML schemas. The specified
file types are System Specification Description (SSD), Substation Configuration Description
(SCD), IED Capability Description (ICD), and Configured IED Description (CID). This
dissertation only focuses on ICD and CID files. ICD files represent the default IEC 61850
configuration of an IED. CID files follow the same schema but represent the final configuration
of an IED in service.
27 | P a ge
|
Virginia Tech
|
If an ICD file were opened in a web browser or text editor, one would find the definition of all
logical devices and logical nodes for the IED. In addition, the ICD file can include definitions for
datasets, MMS reports, and GOOSE messages. Datasets are simply logical collections of tags
(not necessarily from the same logical node). Collecting the tags into datasets allows those tags
to be efficiently defined as part of a GOOSE message or MMS report.
Reports are unsolicited methods of sending datasets from an IED. The standard defines
two types, buffered and unbuffered. When using buffered reports, the IED keeps track of a client
message receipt so that any missed reports can be re-sent if there is a network problem.
Unbuffered reports do not fill in the gap if the link is lost. The MMS protocol can also provide
datasets via direct polling by the client. This method provides no buffering and eliminates
deadbands on analog datasets.
Automation Limitations
Even though SCL files define how an IED communicates on an IEC 61850 network,
many people do not realize that these files do not include configuration information for the
protection and control functions in a relay. Each manufacturer has software and proprietary
methods for enabling and configuring various protection elements and control strategies. The
IEC 61850 standard also provides no standard method for designing communication-assisted
automation [39].
Time Synchronization
Importance of Time in Applications
Everything in today‟s society is synchronized to some form of clock or source of time,
and it is important that in coordinated processes that these clocks be synchronized to provide the
most efficient process yield possible. Take the example of having a local controller with a
remote I/O device. Currently, measurements are typically taken by a controller-based I/O to
ensure that accurate timestamp information of events is recorded. Due to advancements in time
synchronization, this application can now be addressed by utilizing distributed I/O [40].
A sensor now can be connected to a remote I/O device. If each device contains a clock,
and they are time synchronized, discrete transitions from off-to-on and on-to-off can be captured
and timestamped as an input event. This timestamp now has meaning since both clocks are now
28 | P a ge
|
Virginia Tech
|
synchronized to each other, and this information can be sent across the network and used by the
controller or any other enterprise level process. Since the clocks are synchronized, the controller
can use the information to record sequences of events or timestamped data logs [41].
As a result, more than just traditional data can be sent across a time synchronized
network. In addition to timestamped inputs, scheduled outputs and synchronized actuation can
be achieved over time-synchronized networks. Four major areas of improvement can be realized
with the implementation of time-synchronized networks: sequence of events recording,
timestamped data logging, coordinated/synchronized operation, and motion control.
For power distribution applications, time synchronization plays a major role in everyday
process administration. Examples of time synchronization can be seen in Sequence of Events
recording (SER), protection schemes, power quality measurements, and data acquisition.
Microprocessor relays typically have the capability to synchronize to a common reference time
source such as GPS through IRIG-B [42]. Relatively newer technologies, including wide-area
measurement systems using synchronized phasor measurement units (PMUs), apply a GPS time
stamp to real-time data frames to capture a snapshot of the power system. More traditionally,
remote terminal units (RTUs) within a substation record events from devices throughout the
station and report statuses to a SCADA (Supervisory Control and Data Acquisition) Master,
commonly at a control center [9]. Although SCADA is not a real-time application due to its
synchronous design, a valid timestamp of events from substation equipment via either an RTU or
other intelligent electronic device is beneficial for both online and offline applications.
Mine applications are no exception to this need for time synchronization for both
electrical distribution systems and processes themselves. Most mines or processing facilities use
some form of backup or co-generation in order to power their processes. As a result, cascading
failures can occur that would cause massive system and process shutdowns, costing process
owners money for every moment they are not in production. Tracing the root failure of these
electromechanical systems can take a large amount of time and manpower. By having
synchronized SCADA systems, the downtime to locate the problem and take corrective action
becomes greatly shortened.
29 | P a ge
|
Virginia Tech
|
SCADA Timing Protocols
A point was made in each SCADA protocol definition to discuss the time
synchronization capabilities of each protocol. The timing protocols that will be discussed in this
section include GPS, IRIG, NTP, and PTP. Each protocol is compared to and contrasted with its
counterparts based on electrical SCADA conformance.
Global Positioning System
Global Positioning System (GPS) is not only a navigation system; it has evolved to
become the world‟s primary means of distributing precise time and frequency. GPS was
developed by the United States Department of Defense (DoD) in 1978 and is still maintained by
the organization today. Currently, 31 satellites orbit the earth and provide accurate time within
+/- 10 ns to GPS receivers [41]. The US DoD dictates the accuracy of the system and has the
right to limit this accuracy. Additionally, GPS systems can be costly to deploy over a distributed
I/O network since a GPS receiver is required at each node, and the antenna must have a clear
view of the sky to attain a locked signal.
Inter-Range Instrumentation Group Time Codes
In 1952, the commanders of the U.S. guided missile test ranges formed the Inter-Range
Instrumentation (IRIG) group as part of the Range Commanders Council (RCC) of the U.S.
Army in order to share information about range instrumentation [43]. Today, the steering
committee and ten technical working groups, including the Telecommunications and Timing
Group (TTG), control the IRIG time code standards. The IRIG standard was last updated in
September, 2004, and is titled IRIG Serial Time Code Formats [42]. The most well-known and
utilized code format is the IRIG-B time code from this standard. Despite multiple choices of
IRIG code formats, IRIG-B is the mostly widely used in the power industry. In fact, more than
ninety percent of substations use the IRIG-B format, which is typically better than +/- 1 ms [44].
There exist two different forms of the IRIG-B time code: modulated and un-modulated.
Modulated IRIG-B is transmitted on a carrier frequency sinusoid (similar to AM radio) and as a
result, must be demodulated at the receiving end in order to interpret the time data. With
advancements in phase locked loop (PLL) technology, modulated IRIG-B schemes can obtain
accuracies to within +/- 10 µs [45]. Installations with modulated IRIG-B must be isolated
30 | P a ge
|
Virginia Tech
|
through some form of transformer in order to prevent ground loops and signal degradation.
Unmodulated IRIG-B, or level shifted IRIG, is an alternative to the traditional modulated
approach. This form of time code transmission uses digital level shifting to achieve data
transfer. As no demodulation is necessary at the receiving end, time synchronization accuracy
improves to +/- 1µs [45].
Network Time Protocol
Network time protocol (NTP) is a protocol for synchronizing computer clocks using a
data network, such as the intranet or a wide area network (WAN). This protocol was developed
at the University of Delaware in 1980 and is the first protocol to address time synchronization
over variable latency packet switched networks [41]. This protocol provides accuracies that
depend on the setup of the network between each device and the performance of the computers‟
operating systems. Ideally, the connections in the network should be as short as possible, but
this protocol does include methods to estimate and account for round-trip path delay. Overall,
the accuracy of this protocol is in the low tens of milliseconds over wide area networks (WANs)
and better than a millisecond over local area networks (LANs) [46].
Precision Time Protocol
The formal title of IEEE 1588 is Precision Clock Synchronization for Networked
Measurement and Control Systems. This protocol is better known as Precision Time Protocol or
PTP. The standard specifies a protocol to synchronize independent clocks operating on separate
nodes of a distributed measurement and control network to a high degree of accuracy and
precision [47]. PTP is often used to synchronize distributed I/O devices over variable latency
packet switched networks such as Ethernet. This protocol was originally released in 2002
defining many of the regulations and specifications, and in 2008 it was revised to its current
version and released as IEEE 1588v2. The original version of this standard defined ordinary and
boundary clocks while version 2 defines transparent and hybrid clocks; all of these clock types
are addressed in this section [19].
In its simplest form, PTP was intended to be an administration-free protocol. The clocks
within a network communicate with each other across a network media and establish multiple
master-slave relationships. These master-slave relationships form what is known as a hierarchy
31 | P a ge
|
Virginia Tech
|
of clocks [47]. The overall intent of PTP is that distributed I/O devices manage the
synchronization of clocks automatically, thus requiring little if any network administrator input.
Not all devices within a network require the same level of time synchronization accuracy; as a
result, PTP allows for the support of a wide spectrum of clock accuracies to support the needs of
the end device or process [48]. For example, when dealing with protective relays, accuracy
within a millisecond is acceptable due to mechanical component tolerances. PTP can be
configured to meet the needs of both of these applications. Additionally, PTP can use multiple
sources of time as an ultimate time reference including, but not limited to, Global Positioning
System (GPS), IRIG, Network Time Protocol (NTP), or another PTP clock.
A system or network of clocks by definition consist of one or more devices capable of
becoming a master clock, while other devices within the network serve as slave clocks [47].
Normally one master clock is designated as the grandmaster clock. Figure 2.15 depicts the
combinations of clocks that PTP supports: ordinary, boundary, transparent, and hybrid.
Ordinary clocks consist of a single connection port, which industry commonly refers to as a PTP
port. This port can either be assigned as a master or a slave [41]. Examples of ordinary clocks
include GPS receivers and logic controllers and are typically located at the end nodes of a
network [49]. Boundary clocks contain multiple PTP ports that establish separate PTP domains
by segmenting the synchronization path between master and slave clocks. As their name
implies, boundary clocks form boundaries between PTP synchronization segments [47]. These
clocks are typically found in network switches. Transparent clocks are very different from
ordinary and boundary clocks in that they help compensate for the propagation delay through the
network rather than segment the network [41]. Finally, hybrid clocks are defined as a
combination of PTP type clocks in a device. The most common type of hybrid clock is a
transparent clock paired with an ordinary clock. Hybrid clocks are usually found within motion
devices and are used to perform synchronized actuation [41].
It was previously stated that PTP was designed to be an administration-free protocol in
that devices negotiate amongst themselves to determine a hierarchy of clocks. The algorithm
used to determine the hierarchy of these clocks is known as the Best Master Clock Algorithm
(BMCA). The BMCA, as defined by IEEE 1588, is the strict arbitration process employed to
determine the status of each network node, either master or slave [47]. As its name implies, the
32 | P a ge
|
Virginia Tech
|
BMCA determines the best master clock and names it the grandmaster of the PTP system. All
remaining clocks within the system are ultimately synchronized to the grandmaster.
Figure 2.15 System of Clocks
Announce messages are sent approximately every two seconds for any PTP device
claiming to be a master. These announce messages contain information about how well the clock
attributes compare to a scale [40]. When a node receives an announce message from another
device it compares the credentials that it receives to its own. The better of the two clocks the
serves as the master, while the lesser acts as the slave. This process continues until the status for
every clock within the network is determined.
The BMCA utilizes four criteria to determine the better of two clocks. These factors
include clock class, accuracy, variance, and priority. Clock class defines the relative measure of
clock quality. Accuracy defines how close the clock meters time to an absolute reference.
Variance is the measure of the clock‟s stability. Priority is a manual override that can be
established if a network administrator wants one clock to serve as grandmaster over another [47].
One main advantage to implementing PTP in a system is that it will dynamically update
to topology changes [41]. For example, if the current grandmaster is removed from the system,
the BMCA will attempt to designate a new grandmaster from the remaining clocks. On the other
hand, if a clock with better credentials is added to the system, the BMCA will designate this new
clock as grandmaster.
33 | P a ge
|
Virginia Tech
|
Figure 2.16 depicts the synchronization process for clocks utilizing the PTP protocol.
PTP utilizes four messages in order to synchronize two clocks: sync message, follow up
message, delay request message, and delay response message.
Figure 2.16 PTP Synchronization Messages
These messages are transmitted from master to slave and allow the clocks to make
frequency adjustments to change the rate at which the clocks meter time. Additionally, the
messages allow the clocks to measure the phase delay between master and slave and allow for a
value correction. The frequency adjustment is made by utilizing the sync and follow up
messages, while the phase adjustment is made by utilizing the delay request and delay response
messages [41]. Every time the synchronization process occurs, timestamps t1-t4 are collected to
determine the offset from master and frequency adjustments for the slave clocks. Clocks that are
PTP compliant that make both a frequency and value adjustment are known as tunable clocks
[41].
Tunable clocks are very important to use in any variable latency packet switched
network. Take the example with two clocks, one master and one slave, and start them at the
exact same time. No two clocks meter time at the exact same rate due to the natural frequencies
34 | P a ge
|
Virginia Tech
|
of individual clock crystals. Consequently, the clocks will begin to diverge from each other and
no longer remain synchronized.
One approach to correct this problem is to periodically reset the slave clock‟s value to
that of the master‟s. This solution does not address the issue of differing clock frequencies or the
rate at which the two clocks meter time. As a result, the clocks will only be brought into
alignment for a moment in time, then begin to diverge again. Tunable clocks, on the other hand,
allow for the proper synchronization of clocks. These clocks allow for the frequency of the slave
clock to be tuned to that of its master so they will meter time at the same rate [41]. In addition to
making a frequency adjustment, the tunable clock also applies a value or offset adjustment so
that master and slave clocks are truly synchronized. Both synchronization phenomena can be
seen in Figure 2.17.
Device
Time
Measurement
Master
Clock
Slave
Clock
Time
Slave Clock "Frequency
Disciplined" to Master Clock
Figure 2.17 Clock Synchronization Non-Tunable (Left) Tunable (Right)
It has been announced by the IEC that IEEE 1588 will be the protocol of choice to
synchronize clocks over the IEC 61850 protocol. PTP is only a time synchronization protocol
and must be implemented on a network that supports the protocol. IEEE 1588 was designed for
packet switched networks such as Ethernet. For experiments described later in this paper, the
EtherNet/IP (EtherNet/Industrial Protocol) was implemented across the network. EtherNet/IP is
a protocol that is part of the Common Industrial Protocol or CIP suite.
35 | P a ge
|
Virginia Tech
|
Common Industrial Protocol
The Common Industrial Protocol (CIP) is an industrial protocol suite that contains
message and service instructions for automation applications pertaining to control, safety,
synchronization, and motion [50]. This protocol is currently managed by the Open DeviceNet
Vendors Association (ODVA) and is an open development network supported by hundreds of
industrial vendors. CIP allows these applications to be implemented on enterprise-level Ethernet
networks. Benefits of implementing CIP networks include seamless integration of I/O control
and data collection, information flow across multiple networks, and implementable multilayer
networks without the need for the implementation of network bridges [51].
CIP can be defined as an object-oriented connection based protocol that supports both
explicit and implicit messaging. Explicit message connections provide generic, multipurpose
communications paths between devices. These messages provide typical request/response type
network communication [50]. Explicit messages are used by CIP for configurations, monitoring,
and troubleshooting. Implicit messages, also known as I/O connections, provide special purpose
communications paths between producing and consuming agents within a network. This I/O
data is often exchanged cyclically or at a requested packet interval (RPI) [50].
The principle behind how EtherNet/IP synchronizes time across a network of distributed
I/O can be attributed to the CIP Sync Object [40]. This object provides an interface to CIP Sync
that allows devices, such as logic controllers, to access the synchronization mechanism. CIP
Sync defines an offset clock model that addresses the requirements for various control
applications. This model is necessary since PTP defines a mechanism for distributing and
synchronizing time but fails to define a mechanism to compensate for step changes in time that
may occur at the grandmaster source [41].
Figure 2.18 defines the CIP Sync Object at a high level. This model shows a PTP master
represented by the circle and a PTP time slave represented by the top right side rectangle. In this
example PTP is used to discipline a local clock so that it ticks and meters time at the same rate of
the PTP master. The slave clock also maintains an offset between the local clock time and the
PTP system time. Any small delta, or step change in time, causes the slave device to make a
small adjustment to the “system to local clock offset” value [40]. In addition, the slave device
will continue to tune its clock. A large step change results in the device updating the offset
36 | P a ge
|
Virginia Tech
|
value, but not tune its clock. As a result, cyclic tasks such as SCADA reads, can be scheduled
based upon the local clock and are not affected by large step changes in time at the grandmaster
source.
Small
Time
PTP
Delta
Master
Local Clock Oscillator
Frequency Based
Any Time Delta
+
System To Local Clock Offset
-
Leap Seconds
=
Synchronized Time Between
Clocks
Figure 2.18 CIP Sync Object Diagram
CIP Sync represents time as a 64-bit long-integer (LINT) that can be expressed in either
nanoseconds or microseconds. The starting reference point in time for CIP Sync is January 1,
1970, starting at 12:00 AM. This time is represented in Universal Time Coordinated (UTC) and
adjusted to include leap seconds. In order to represent this 64-bit LINT in a readable format, an
algorithm must be developed to compute the current date and time in a readable, understandable
format for analysis. The algorithm consisted of several mathematical operations to convert the
LINT into two strings that are given in the following format: MM/DD/YYYY and
HH:MM:SS:µsµsµsµs.
Acceptance of Precision Time Protocol
Recent work has shown that PTP can be successfully used in various applications.
Precision time protocol was implemented successfully to measure the rotor angle of a
synchronous machine [52, 53]. Additionally, programmable automation controllers have been
used in conjunction with PTP and protective relays for a protection voting scheme [54]. PTP and
programmable automation controllers were also used together as Sequence of Events Recorders
37 | P a ge
|
Virginia Tech
|
3. Chapter 3 - Conceptual Design
Introduction
As previously described, the objective of this research is to specify and develop a system
that links the protection and metering of the electrical distribution system at a mining operation
to a site-wide control system. The first steps in this process are to establish the system
capabilities, develop a preliminary conceptual design, and develop a working specification for
the system to achieve the research objective. This chapter discusses the development of the
conceptual design for the automation and control solution that was developed.
The design process of this solution began with an initial conceptual design based upon
research, including industry needs and personal experience. In order to better fortify the design
for an industrial process network, the original conceptual design was presented to industry
stakeholders within the following disciplines:
1. Mining and Minerals
2. Metals
3. Oil and Gas
4. Engineering, Procurement, and Construction (EPC) Firms
The original conceptual design was then compared against engineering community input in
order to finalize the conceptual design presented at the end of this chapter. This chapter begins
with the original conceptual design followed by input provided by the engineering community
segments listed above. Subsequently, the final conceptual design is presented and defined.
Original Conceptual Design
After researching the various SCADA protocols that existed for electrical distribution
systems, as described in Chapter 2, it was determined that the IEC 61850 standard had a high
probability of being readily accepted into the industrial marketplace. The challenge now was not
to determine how to implement an IEC 61850 solution to control various intelligent electronic
devices, such as relays in a mine distribution setting, but how to interface it to a platform that
would be accepted by the engineering community.
39 | P a ge
|
Virginia Tech
|
Microprocessor Based or Automation Controller Based System
It was determined that developing a standalone microprocessor-based solution over PC
software would not be viable or serve the community‟s needs. This conclusion was based on the
fact that microprocessor-based solutions are difficult to maintain. Most microprocessor-based
solutions are written in some form of high level structured text language, e.g., C++, C#, and
Java. In addition, custom software for interfacing and database collecting would need to be
developed for interfacing and storing data. Consequently, specific message instructions over
TCP/IP would need to be developed in order to perform command and control of various
intelligent electronic devices.
Operations, maintenance, and engineering staff at mining and other industrial facilities
are not familiar with this type of system. Consequently, a microprocessor-based solution would
be very costly to maintain as well as make changes to. Operations personnel typically work with
ladder and function block programming in order to maintain, troubleshoot, and upgrade their
systems. As a result, it was determined that the automation and control solution should interface
directly with the facility‟s process control network. These networks are either controlled by a
DCS or PLC/PAC type of controller, which are widely used in the industry. By designing a
solution that interfaces to the electrical distribution system for these industrial facilities, the
following advantages can immediately be seen:
1. Power monitoring capabilities
2. Predictive maintenance capabilities
3. Auto Transfer Switch (ATS) load shedding capabilities
4. Command and control of rotating machinery
5. Command and control of breakers
6. Interfacing energy measurements into speed regulator process models
7. Ventilation On Demand (VOD)
8. Fast motor bus transfer
9. Main-Tie-Main Distribution Schemes
10. Data Historian Applications
11. On Demand Topology Transitions
40 | P a ge
|
Virginia Tech
|
In Chassis Solution or Standalone Gateway Model
The next issue that had to be addressed was determining the physical form of the
solution, in chassis or standalone solution. There are two practical approaches to address this
question:
1. To develop a module that resides in the PLC/PAC chassis, or
2. To develop a module that stands on its own and serves as a gateway or conversion box.
The first option has several advantages, including that the module would require no additional
network connections and would provide one less point of common coupling failure (PCCF). If
the module resides within the chassis itself, the throughput of the module to convert IEC 61850
to a usable industrial format, such as EtherNet/IP, is much greater than if the module sits external
to the local PAC rack. On the other hand, if the developed module is a standalone gateway
module, it would be much more flexible with the system acceptance. For example, not every
manufacturer creates the same rack-based PAC. Consequently, a module created for in-rack-only
would work for a specific model solution of controller. Meanwhile, if the solution is a
standalone module, multiple models of PAC and DCS systems can interface to the device. As a
result, the original design for the solution would be a standalone hardware gateway that would be
connected to an EtherNet/IP or equivalent industrial network. This solution provides more
flexibility and is much more likely to be accepted by industry compared with a module that
resides in the PLC/PAC chassis.
Quantity of Support
In order to have a solution that will be acceptable by the engineering community, it must
be able to handle an acceptable number of intelligent electronic devices, (IEDs) on the network.
After studying multiple drawings for both mining and metals applications, it was determined that
20 was an appropriate number of IEDs to support. Determining the maximum number of IED
support for each gateway module is necessary to permit multithreading on the hardware solution
side and to establish processor clock requirements. If the application required more than 20
IEDs, a second gateway module could be added to accommodate the additional devices. This
process could be completed until all devices could be accounted for within the distribution
system.
41 | P a ge
|
Virginia Tech
|
Communication Media
In order for the solution to be successful, a suitable communication media must be chosen
to move information from the gateway module to both the IED and process networks. The
following modes of communication were examined for this solution:
1. Copper 10/100/1000 Mbit/s communications
2. Fiber Single/Multimode
3. Wireless b/g/n communications
Copper media is the most common form of Ethernet based communication in North America.
Traditional 100 Mbit/s communications speed would be more than adequate to move measurands
and MMS messages throughout a large network of IEDs connected to the process network. The
disadvantage to this solution is that it is susceptible to electromagnetic interference (EMI). The
IEC 61850 standard defines various EMI specifications for devices on the network with
corresponding noise immunity requirements. According to the standard, copper communications
would not satisfy IEC 61850-10 for EMI if the module were within the substation environment.
As a result, if the solution were to include copper communications, the gateway would have to be
located in a control room in order to satisfy IEC 61850-10 for EMI.
Fiber communications would eliminate the EMI issue that a copper solution incurs, but
the disadvantage of this solution is the cost of fiber. Most automation and control networks are
traditionally copper, so adding a fiber interface may not be cost effective.
Wireless communications, while seemingly very attractive, would not be a viable choice
for the industry. With rising security issues and cyber-attacks at an all-time high, process
engineers are focused on maintaining network and system health. Wireless communications are
more vulnerable to attack than other solutions. In addition, wireless signals typically do not
travel well in most underground settings without the use of many repeaters and amplifiers.
Considering the advantages and disadvantages of copper, fiber, and wireless communications, it
was determined to select traditional copper, 10/100 Mbit/s communications for this application.
System Security
Security is a major consideration in the design and operation of industrial control
systems. Good security practices help reduce control product and system susceptibility to
accidental or unauthorized activities that affect safety, operational integrity, and data
42 | P a ge
|
Virginia Tech
|
confidentiality. Industrial control system security relies on layers of security using multiple
controls, methods and techniques that work together to protect a system‟s assets, operations, and
those who depend on its safe, reliable operation. Technical controls, including physical and
electronic mechanisms that compensate for risk, should be accompanied and balanced by non-
technical controls such as company policies, procedures and guidelines. To help protect key
assets, users should employ specific product-level security and protection features available
within a networked process system.
Cyber-attacks are at an all-time high [11]. With the use of intelligent devices, such as
managed switches, control engineers now have the ability to segment their network into zones,
thus mitigating cyber threats. Today, many Information Technology (IT) personnel advocate
constructing network infrastructures that are similar to the one shown in Figure 3.1. This model
is based upon ISA Standard 95 and the Purdue network model. The model defines levels down
the left-hand side of the figure and zones down the right. The model is separated into six
different levels and four zones. In order to keep a secure facility, managed switches and other
network equipment, such as firewalls, separate the plant network (levels 0-3) from the enterprise
network (levels 4-5). These two networks are isolated via a firewall which does not permit web
traffic, email, or process automation packets to pass directly through without passing through an
approved proxy. By segmenting these networks, the process owner can limit traffic and
authorized users who have virtual access to the plant floor production.
Figure 3.1 Network Security Model
43 | P a ge
|
Virginia Tech
|
The gateway module resides in Level 1, since it is part of the control solution for power
distribution systems. This solution would be accessed by Level 2 equipment, such as
engineering work stations (EWSs) and operator work stations (OWSs) for command and control
of various process components. System security would be maintained through best practices and
system architecture design by (1) keeping process control and instrumentation at the lower levels
of control, and (2) keeping enterprise control at the top of the network architecture.
Summary of Original Concept
Figure 3.2 depicts the original conceptual design for the solution to integrate the electrical
distribution network to the process control network of a mining and metals facility.
10/100 Mbit/s
Copper
Interface
Electrical Process
Power Enterprise
Distribution Gateway Control
Utility Network
Network SCADA Module Process Network
Comms. Network
Interface
Figure 3.2 Original Conceptual Design
As described, it was determined that the module should be integrated into the process control
system as a stand-alone, microprocessor-based solution that interfaces to a programmable
automation controller. This solution provides more flexibility with integration into more existing
process control systems compared with a module that resides in the PLC/PAC chassis. This
solution bridges the electrical distribution SCADA network with the process control network and
provides access from the enterprise network to the electrical distribution system as well as power
utility access, if granted, to the process control network. With the advent of smart grid
technology, this solution would provide bidirectional communications between a process owner
and the power utility, a major goal of smart grid technology.
44 | P a ge
|
Virginia Tech
|
The next step the engineering process was to take this conceptual design to various
personnel in the engineering community for additional input/feedback. The next portion of this
chapter discusses how this input was obtained as well as a summary of that input.
Engineering Community Input
After developing an original conceptual design for a SCADA interfacing solution to an
IED network, the concept was presented to the engineering community for input and feedback.
As mentioned, various industries, including mining, metals, oil and gas, and EPC firms were
surveyed for feedback. Firm names were removed to provide anonymous feedback Since this
.
solution bridges both the power and process control systems, survey questions were directed to
both power and instrumentation and control (I&C) engineers. When security concerns were
being addressed, these engineers were asked to consult with their IT Security office. As a result,
both I&C and power engineers needed to work together to provide a solution that would serve as
an acceptable compromise between them.
Each company was asked for their opinion and input on the following categories:
Packaging
Communications Media
Number of IEDs to Support
Safety Concerns
Security Concerns
User Interface Information
Any Additional Comments or Concerns
The results of the industry feedback are summarized in the following four tables.
45 | P a ge
|
Virginia Tech
|
Final Conceptual Design
After collecting industry input and comparing it to the original design, the final
conceptual design was specified and is presented in the table below. It can be seen than 17 of the
20 industry participants felt a stand-alone gateway would provide the best solution. As most
industries already had a copper Ethernet infrastructure installed, 70% of all companies surveyed
felt that developing an already existing copper infrastructure was more practical. Companies that
felt fiber communications were more beneficial cited EMI concerns for this opinion.
All of the industry segments surveyed felt that a minimum of 10 IEDs would need to be
supported by the solution. With regard to safety companies surveyed felt that the ability to
interlock between HMI screens and IED was needed to prevent unauthorized operation and mis-
operation of electrical devices in an industrial setting. Company feedback also stated that
security played a large role in process control. Feedback stated that HMI screens should have
different levels of operation and privileges based on role. They ultimately specified a minimum
of seven different levels of security settings.
Additionally, all industry segments surveyed agreed with the initial conceptual design
that alarms, targets, and measurands should be displayed. Also from the industry input, it was
determined that this solution should provide sequence of events reporting as well as a way to
interface to database software such as PI. Finally, it was determined from industry input that all
graphics must meet the current ISA standards for process control graphics. The final conceptual
design specifications can be seen in Table 3.5. Figure 3.3 depicts the final conceptual design for
this solution.
Table 3.5 Final Conceptual Design
Final Conceptual Design
Parameter Original Design Final Design
Packaging Stand-Alone Stand-Alone
Communications Media Copper Min. 100 Mbit/s Copper Min. 100 Mbit/s
Device Support Min. 20 device 20 devices
Interlocking, Select Before Operate,
Safety Interlocking
Classified Areas Considerations
Security Min. 5 levels Min. 7 levels
Alarms, Targets, Measurands, Timing /
Display Information Alarms, Targets, Measurands
SOE, Historian Interfacing Capability
ISA 5.5 Compliance, Provide
Visualization Information N/A Diagnostic Information, Command and
Control
50 | P a ge
|
Virginia Tech
|
4. Chapter 4 - Hardware Implementation
Introduction
As mentioned in Chapter 3, the hardware solution developed to link the electric
distribution and process control systems is a standalone hardware gateway. This chapter defines
the logic behind the gateway operation and how it bridges the IEC 61850 and process control
network. The gateway module consists of a main processor with various peripherals including a
network 10/100 Mbit/s copper interface and Secure Disk (SD) interface to store configurations
for the module as shown in Figure 4.1. It is noted here that there were several design iterations
before deciding on the components described in this chapter.
IEC 61850 Gateway
Network
Interface
Micrel Phy
Integrated MAC
KSZ8721BL
ARM Processor SD Card
10/100 Mbps Cirrus EP9302-CQZ 1 GB
Memory Block Flash Memory
256 MB SD RAM 4 GB
Figure 4.1 High Level Gateway Block Diagram
Figure 4.1 depicts a high-level functional block diagram defining the hardware
components. The most important component in this hardware configuration is the ARM
processor, shown by the largest block in the diagram. The processor, a single core 200 MHz,
ARM-9 processor, is responsible for all interfaces to memory (flash or SD RAM), as well as the
hardware level interface to the Micrel Phy for Ethernet based communications over a CAT-5
53 | P a ge
|
Virginia Tech
|
copper network. The processor additionally interfaces to the SD card, where configurations are
stored for various modes of operation. In addition, the processor provides a hardware level
interface to LEDs for both diagnostic and status indications during various modes of operation.
Three hardware blocks were considered for system communications: Network Interface,
Micrel Phy, and Integrated MAC, all depicted in the top left of the Figure 4.1. Figure 4.2
describes the data link path between physical media and the ARM-9 processor via the Phy. The
network interface consists of an RJ-45 receptacle to which a generic CAT-5 Ethernet cable can
be inserted to provide a link to the process control network switch, as seen on the right side of
Figure 4.2.
10/100 Mbps KSZ8721BL
MII MAC PHY
54 | P a ge
pihC-nO
srotsiseR
noitanimreT
MAC Comms.
RJ-45
Magnetics Connector
50 MHz Clock
Figure 4.2 High Level PHY Block Diagram
The magnetics block is a passive EMI filter which reduces electro-magnetic noise on the
wire. Additionally, an electro-static discharge (ESD) filter is built into the passive magnetic
circuit. The on-chip termination resistors were chosen to provide the highest level of signal
integrity, while further reducing EMI noise. The physical layer interface (PHY) is referenced by
the large block labeled KSZ8721BL. This transceiver provides the hardware level connections
between the processor MAC and physical media.
Figure 4.3 shows a high level block diagram of the physical layer interface chosen for
this solution. The benefit of this interface is that all low-level hardware drivers were already
implanted and functional. It can be seen from the block diagram level that the PHY has many
responsibilities and peripheral interfaces, including the auto-negotiation of network transfer
speed and the management of both a 10Mbit and 100Mbit connection. This choice of PHY
|
Virginia Tech
|
substantially reduced engineering time without having to code these low level communications
drivers.
4b/5B Encoder
NRZ
Scrambler
MLT3 Encoder
TX+ Parallel/Serial
Transmitter 10/100
TX- Pulse Shaper
Parallel/Serial
Manchester Encoder
MII/RMII
Registers
Adaptive EQ
RX+ And
Base Line
Controller
Wander Correction 4B/5B Decoder
Interface
RX- MLT3 Decoder Clock Recovery Descrambler
NRZI/NRZ Serial/Parallel
Auto
Negotiation
10BASE-T Manchester Decoder
Receiver Serial/Parallel
LED
Driver
Power Down
OR
PLL
Saving
Figure 4.3 PHY Block Diagram
In addition to holding the Linux operating system for this solution, the flash memory also
holds the firmware for the module as well as the web server for diagnostics and configuration.
The SD RAM is used to allocate and store memory for every client connection and IED, as well
as server socket connections and PAC. This memory is volatile, thus any data is lost on power
cycle. The SD card is responsible for storing the device configuration files. These files are
stored in XML format and read on startup, after which memory is then allocated within SD
RAM. Because Linux is chosen as the operating system, the SD Card peripheral is mounted as a
physical drive. Figure 4.4 depicts the startup sequence and memory allocation of the device
upon power-up.
55 | P a ge
|
Virginia Tech
|
BBoooott LLiinnuuxx 22..66 Spawn 61850
Mount SD Card Start Master Read
Power Cycle OOSS ffrroomm Client
as drive on Control Configuration
(+24 VDC) FFLLAASSHH Connections on
Linux OS Program on SD Card
MMeemmoorryy Configuration
Spawn Server
Allocate RAM Allocate RAM
Socket Initialize Tag Initialize Web
for each client for Server
Connection(s) Database Services
connection Connections
for EtherNet/IP
Figure 4.4 Power Cycle State Machine Sequence
The code for this solution was written in C++, in the windows environment. The code
was then compiled using the gcc tool to create a target file intended for the Linux 2.6
environment.
The remaining portion of this chapter focuses on the multi-threading of the processor and
interaction among IEDs, the gateway module, and the controller.
Solution Overview
The process of collecting data from various intelligent electronic devices (IEDs) and
converting it to an industry accepted process control protocol was performed through the concept
of multi-threading. Figure 4.5 depicts the various threads that are executing at any given time
during the operation of the hardware gateway.
Master Control Program (MCP)
Figure 4.5 shows six various types of threads that run parallel with communications to
the processor and each other. The processor contains the master control program (MCP). On
module startup, the MCP reads the configuration file from the SD card, as depicted in Figure 4.1.
Based on the configuration file, the MCP determines the number of individual threads needed to
be created for each driver and calls the corresponding tag database files to create and allocate
memory for moving parameters.
After startup, the MCP starts each driver individually. After each threaded drive has
returned a ready message to the MCP, the MCP changes the status of each individual (ready)
driver to run mode. The MCP also serves as a watchdog timer running on Linux that evaluates
56 | P a ge
|
Virginia Tech
|
Master
Control
Program
61850
EtherNet/IP
Driver
Ready
Ready
61850
EtherNet/IP
Driver
Running
Running
Figure 4.6 MCP Example
Should an error or fault occur during operation, the MCP will log this error in a log file
stored in the flash memory, as depicted in Figure 4.1. This file can then be retrieved for
debugging purposes by the configuration software that will be discussed in Chapter 5.
Hidden Threads
The telnet and ftp server threads are hidden from public use and are used exclusively for
debugging and pushing new system files to the processor. The web services thread hosts a
simple website whose web address is the IP address of the module. Information displayed on
this web page includes model and firmware revisions, as well as simple diagnostic information
about the module, such as error and fault status.
In order to enhance performance of the communication processes of the module, the web
services thread is tied to a jumper that can be removed to enable/disable this functionality. By
removing the web services jumper, the module, on power up, ignores the installation of the web
58 | P a ge
|
Virginia Tech
|
services thread, thus allowing more processing power to be dedicated to IEC 61850 and
EtherNet/IP communications. Additionally, module firmware is downloaded to the module via
the web services page.
Data Mapping
When the module is configured from the user interface software, report configurations
containing the parameters that are to be passed from the IED to the automation controller are
stored on the SD card. Additionally, when the user maps the IEC 61850 tags to EtherNet/IP tags,
each 61850 tag is allocated a certain number of bytes depending upon the data type, such as
boolean, real, double integer, etc. This configuration is also defined on the SD card.
Table 4.1 lists the data types that were supported for this research.
Table 4.1 Data Types
Data Type Definition Bits
BOOL Boolean 1
BYTE Byte 8
UBYTE Unsigned Byte 8
INT Integer 16
UINT Unsigned Integer 16
DINT Double Integer 32
UDINT Unsigned Double Integer 32
IEEE 754 Single Precision
REAL 32
Floating Point
IEEE 754 Double Precision
DREAL 64
Floating Point
STRING ASCII Character Array 32 + 8*length of text
UTC microsecond precision
DATETIME 64
date and time
SEMAPHORE Internal use semaphore 128
Table 4.2 gives a description of various data types supported by this research as well as their
corresponding range of values.
59 | P a ge
|
Virginia Tech
|
Table 4.2 Common Data Types Definitions
Type Description Range
BOOL Boolean data type 0 or 1
BYTE Signed 8 bit magnitude -128 to 127
UBYTE Unsigned 8 bit magnitude 0 to 255
INT Signed 16 bit magnitude -32768 to 32767
UINT Unsigned 16 bit magnitude 0 to 65535
DINT Signed 32 bit magnitude -2147483648 to 2147483647
UDINT Unsigned 32 bit magnitude 0 to 4294967295
Signed IEEE 754 32 bit
REAL ±10-44.85 to ±1038.53
floating point number
Signed IEEE 754 64 bit
DREAL ±10-323.3 to ±10308.3
floating point number
The STRING Data Type is the ASCII representation of a string of characters. The
STRING Data Type is composed of two fields shown in Table 4.3. The LENGTH field contains
the length of the string and DATA contains the ASCII characters. The size of the DATA array is
defined at run time by the configuration settings.
Table 4.3 Uncommon Data Types Definition
Field Data Type
Length UINT
Data UBYTE[]
A DATETIME data type represents a Coordinated Universal Time (UTC) date and time.
The time is expressed as seconds and microseconds since the Epoch and is stored as a 64-bit
structure. The epoch used is the standard UNIX epoch that corresponds to 00:00:00 UTC,
January 1 1970. The UTC time is stored with a one-microsecond resolution. A DATETIME data
type is composed by two fields, as shown in Table 4.4.
Table 4.4 Date/Time Definition
Field Data Type
Seconds UINT
Microseconds UINT
60 | P a ge
|
Virginia Tech
|
Mapping Example
The following example was created to illustrate how data, Alpha-Hotel, is packaged and
mapped in the gateway module. The data is shown in Table 4.5 and graphically mapped in Table
4.6.
Table 4.5 Data Mapping Example
Field Name Data Type Byte:Bit Size (Bits) Data Map
Color
Alpha (A) Bool 0:0 1
Bravo (B) Bool 0:1 1
Charlie (C) Byte 1:0 8
Delta (D) Dint 4:0 32
Echo (E) Byte 8:0 8
Foxtrot (F) Int 10:0 16
Gulf (G) Byte[3] 12:0 24
Hotel (H) Byte 15:0 8
Table 4.6 Data Mapping Example Graphical
Bit
3 3 2 2 2 2 2 2 2 2 2 2 1 1 1 1 1 1 1 1 1 1 9 8 7 6 5 4 3 2 1 0
1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0
Byte
3 2 1 0
C B A
D
F E
H G
SISCO Stack for IEC 61850 Driver
When the module is booted, the SD card information is loaded into the processor and SD
RAM for use. Every IED that is defined by the user in the reports has its own thread on the IEC
61850 client driver, which is based upon the SISCO stack. At any given time up to 20 threads or
physical devices can be interrogated by the gateway module. These threads read the
configuration of the report and request this information from the IEDs. After the information in
each report is populated, the information is transferred to the tag database where it is collected by
the EtherNet/IP driver.
61 | P a ge
|
Virginia Tech
|
EtherNet/IP Stack
As previously mentioned, when the user maps IEC 61850 tags to EtherNet/IP tags, a
certain number of bytes are allocated to each parameter or tag. The data is transferred from the
gateway to the automation controller via a Class 1 Common Industrial Protocol (CIP) message.
CIP messages are limited to 500 bytes of input data, 496 bytes of output data, and a
configuration header. The information in the tag database is grouped into chunks of 500-byte
packets or data table reads. A parallel thread is created for every group of 500 bytes that needs
to be sent to the controller. This thread is constructed using the Open Device Vendors
Association (ODVA) stack for EtherNet/IP. This organization manages the configuration for the
drivers for the CIP protocols.
Tag Database
The tag database is a shared piece of memory where data items can be located using a tag
name. The tag database is composed of two shared memory locations, as shown in Figure 4.7.
Symbols Shared Memory
Data Types Definition
Tag List Mapping
Data Shared
“INT” Data Address XYZ Memory
Figure 4.7 Generic Tag Database
62 | P a ge
|
Virginia Tech
|
The tag database is the central repository of process data and is the link between drivers.
The data is read by a driver and copied to the tag database where another driver can write it to a
device. This concept is shown in Figure 4.8.
IEC 61850 Tag EtherNet/IP
Driver Database
Tag Database
Read Command Write Command
Object
Tag Database
Write Command Read Command
Object
Figure 4.8 Interaction Between Drivers
The tag database thread can be thought of as a large array of data. The array begins at
index zero and ends with the index of the last byte of data that needs to be transferred. This
thread is the key to the operational success of the gateway module. The tag database is
populated by the IEC 61850 thread, and information is read from the tag database by the
EtherNet/IP thread to be sent to the process control system. Semaphore tags are used to signal
drivers that information has changed and a new, read/write cycle needs to be executed.
When the 61850 thread writes to the tag database, it writes to an index offset from the
base, i.e., the beginning location of where the parameter or electrical measurand lies within the
array of data to be captured. The same process is performed when the parameter is to be read by
EtherNet/IP driver. The process of writing to the tag database can be seen in Figures 4.9 and
4.10, respectively, for both the IEC 61850 and EtherNet/IP drivers. Figure 4.11 depicts the
interactions of the two drivers with the tag database. As described in this chapter, the IEC 61850
63 | P a ge
|
Virginia Tech
|
thread, shown in Figure 4.9, is instantiated upon power-up of the module. After the SD card
configuration is read by the module, the corresponding number of client connections (IED
threads/drivers) is instantiated. The IEC 61850 driver waits in an endless loop until the write
command is issued by the tag database for information to be passed from one driver to the next.
Also, on startup, the server-socket connection is created to transfer information from the tag
database to the controller via the EtherNet/IP driver. The EtherNet/IP driver, as shown in Figure
4.10, waits for a semaphore tag to update. This semaphore tag can be thought of as a collection
of boolean flags corresponding to various measurands and data that are designed to be passed
from the IED network to the process network. When the semaphore tag is updated, an interrupt
is triggered that allows the EtherNet/IP driver to read the tag database, construct data tables of
information to be sent to the controller, and issue a write command to the controller signaling
that it is ready to pass data from the gateway to the controller processor.
Write
Command
Scheduled?
Yes
Send Write Request
Lock Tag Database
Update Tags
Unlock Tag Database
Figure 4.9 IEC 61850 Driver Information Flow
64 | P a ge
|
Virginia Tech
|
reduce the distribution voltage to utilization levels, and trailing cables that connect the loads to
the power center.
Ordinarily, the switch house (as well as the substation and power centers) has devices
that protect each outgoing circuit. Current transformers (CTs) are typically used to measure
current while potential transformers (PTs) are used to measure voltage. A relay receives signals
from the PTs and CTs, processes the information, and the determines if there are any abnormal
conditions such as overloads, short circuits, ground faults, or under-voltage. If an abnormal
condition is detected by the relay, a trip signal is sent from the relay to the circuit breaker to de-
energize the offending circuit.
Mine Distribution
Trailing Cables
Cables
Load Loads
Utility Main Switchhouse Center
Substation
Load Loads
Center
Figure 4.12 Mine Power System Example
Figure 4.13 illustrates these protective devices in the switch house. Each power conductor
passes through a line current CT. In addition, all three power conductors pass through the zero-
sequence CT. The zero-sequence CT is used to detect ground faults through the application of
Kirchhoff‟s Current Law (and the theory of symmetrical components). In nearly all types of
normal and abnormal conditions, including line-to-line and three-phase faults, the sum of the
three line currents are zero, so there is no current induced in the zero-sequence CT. However,
during a ground fault, the sum of the three line currents is not zero, and the current measured by
the zero-sequence CT is equal to the ground fault current. Because many mining operations use
high resistance grounding to limit ground fault current to low levels to avoid arc and flash
hazards, zero sequence relaying can be used to detect low levels of ground current in a power
system having load currents many times higher than the ground fault current. For example, a
66 | P a ge
|
Virginia Tech
|
ground fault of 10 Amperes can easily be detected in the presence of load currents of several
hundred Amperes.
Relay elements shown in this diagram include 50-G and 50, and 51. Element 50 is an
instantaneous line overcurrent element typically used for detecting short circuits. Element 51 is
an inverse-time line overcurrent element typically used for detecting overloads. Element 50-G is
an instantaneous ground overcurrent element used to detect ground faults. It should/must be
noted that modern solid-state relays typically contain many additional elements, such as reverse
power flow, overvoltage, and under-voltage, that are not included in this example.
Vacuum
Circuit
Line Current
Disconnect Breaker Zero Sequence CT (1)
CTs (3)
Switch
50/51 50-G
Solid State Relay
Trip Signal
Vacuum
Disconnect Circuit Line Current
Switch Breaker CTs (3) Zero Sequence CT (1)
50/51 50-G
Solid State Relay
Trip Signal
Figure 4.13 Traditional Feeder Protection Scheme
Consider that a ground fault occurs on one of the branch circuits on the output of the
switchhouse, tripping the associated circuit breaker. All that would be known to downstream
personnel is that the power is off at their location, i.e., mine personnel would not know the extent
of, or reason for, the power outage. Consequently, they would begin calling other sections of the
mine, or outside, to inquire about the extent of the power outage. After many minutes, the
67 | P a ge
|
Virginia Tech
|
switch house eventually would be identified as the location where the circuit breaker tripped, and
an employee would be dispatched to determine the cause of the trip. Upon arrival at the
switchhouse, the individual would be able to determine from the relay panel that a ground fault
occurred and request that an electrician be sent to determine the cause of the ground fault and
initiate repairs.
Next, consider the situation depicted in Figure 4.14, in which the gateway module is
present. Immediately after a ground fault occurs, an individual at the monitoring-system
computer would know the location and reason for the power outage. As a result the correct
personnel could be dispatched immediately to conduct repairs, and while personnel in the
affected portions of the mine could be informed of the source and extent of the problem.
Although this is a relatively simple example of the application of the gateway module,
they show the potential behind the use of this module in other applications. Specifically, the
module provides the mine operator with the ability to not only monitor the status of the IED
(trip/not trip), but also to monitor the values or measurand of interest of the IED and make this
information available throughout the existing SCADA system. By having these electrical
parameters in addition to traditional process parameters, mines have the ability to expand the use
of these existing devices, such as implementing load shedding for energy management or
conducting root-cause analysis of failures through reconstructing sequence of events.
Vacuum
Dis Sc wo in tcn hect BC ri erc au keit r Lin Ce T C su (r 3r )ent Zero Sequence CT (1)
Process Process
Controller 1 Controller 2
Historian
50/51 50-G
Trip Signal Solid State Relay Gateway
Module
Vacuum
Dis Sc wo in tcn hect BC ri erc au keit r Lin Ce T C su (r 3r )ent Zero Sequence CT (1) Engineering
Work Station
Operator Client
Work Station
50/51 50-G
Trip Signal Solid State Relay
Figure 4.14 Gateway Module Implementation
68 | P a ge
|
Virginia Tech
|
Conclusions
This chapter has summarized the hardware gateway module which was developed to
implement the conceptual design described in Chapter 3. A key component to this concept is the
multi-threaded design to interface between the IED IEC 61850 network and the process
EtherNet/IP network. Each thread, including the master control program, was defined, and basic
functionality was explained in functional block diagram. The various types of data that were
used in this project were then addressed, followed by how data is packaged in packets to be sent
to the process network via EtherNet/IP.
The concept of the tag database was then discussed, i.e., how it is utilized as a common
space of shared memory where both 61850 and EtherNet/IP drivers read and write various tags.
Also discussed was the use of semaphore tags in the database to avoid collisions in the tag
database. Finally, a practical example of this hardware module could be used in a mine power
system application was provided. The next chapter focuses on how the user interacts with the
hardware via the use of a graphical user interface (GUI) software.
69 | P a ge
|
Virginia Tech
|
5. Chapter 5 - Software Implementation
Introduction
In order for the hardware gateway to work properly with the process control system,
software needed to be developed that allows the user to interact and configure the gateway
module. As described in Chapter 4, the configuration files are held by the Secure Digital (SD)
card. These files are downloaded to the SD card from the software tool that is presented in this
chapter. In addition, a software tool was developed to store information in the OSI PI database
on a precise timescale. This tool is also discussed in detail later in this chapter.
The procedure describing how the hardware and software work together to produce the
final solution developed in this research involves several steps. First, the user creates a
Configured IED Description (CID) file for each IED that is connected to the gateway module.
For example, if we consider a solid state relay, the user would typically configure it for various
parameters or measurands, such as active and reactive power, voltage magnitudes and angles,
current magnitudes and angles, and sequence components of current and voltage. This step is
conducted using the software provided by the IED vendor, following the vendor‟s instructions.
Next, the CID configuration is downloaded to the gateway module using the IEC 61850
standard. This step is accomplished by the software developed for the Gateway Module and is
described in this chapter. It is noted here that this software was developed to work with any IED
that follows the IEC 61850 standard; it is neither product nor device specific.
Next, the user selects specific information from the CID configuration that will be
transferred to the programmable automation controller (PAC). The software was developed to
allow the user to easily select any or all of the measurands or parameters included in the CID
configuration. With regard to the relay, for example, the user may be interested in sending the
voltage, current, and power quantities to the PAC, but not the sequence components of voltage
and current.
The software then maps these data to EtherNet/IP via the Open Device Vendor‟s
Association (ODVA) standard. The software also creates and exports an Add-On instruction
(AOI) for the PAC. Both of these steps are done automatically by the software developed for the
gateway module. For this information to be passed on to the PAC, the user only needs to add the
gateway module to the controller project and import the Add-On instruction into the controller
70 | P a ge
|
Virginia Tech
|
program. At this point, the IED appears as a device on a rung in the controller project and can be
used like any other automation and control device connected to the controller. (It is noted that
the software was developed specifically for Program Automation Controllers, manufactured by
Rockwell Automation.)
The remainder of this chapter describes how the software accomplishes these tasks and
also addresses process control historian issues.
Creating a Configured IED Description (CID) File
In order to have a common method for describing and documenting the communications
network, IEC 61850-6-1 defines various SCL file types based on XML schemas. The specified
file types are System Specification Description (SSD), Substation Configuration Description
(SCD), IED Capability Description (ICD), and Configured IED Description (CID). For the
purposes of this dissertation, only ICD and CID files will be considered. ICD files represent the
default IEC 61850 configuration of an IED. CID files follow the same schema but represent the
final configuration of an IED in service.
When opening an ICD file in a web browser or text editor, the definition of all logical
devices and logical nodes for the IED is listed. In addition, the ICD file can include definitions
for datasets, MMS reports, and GOOSE messages. Datasets are simply a logical collection of
tags (not necessarily from the same logical node). Collecting the parameters into datasets allows
the data to be efficiently used as part of a GOOSE message or MMS report.
Reports are unsolicited methods of sending datasets from an IED. The standard defines
two types: buffered and unbuffered. When using buffered reports, the IED keeps track of client
message receipts so that any missed reports can be re-sent if there is a network problem.
Unbuffered reports do not maintain the missing data if the link is lost. The MMS protocol can
also provide datasets via direct polling by the client. This method provides no buffering and
eliminates deadbands on analogs.
Figure 5.1 is a screenshot of an IEC 61850 configuration tool developed by a major IED
manufacturer. It can be seen from the figure that this project is configuring a 751, or feeder
protection relay. For the purposes of this research, the data sets and reports tab are of most
interest in this example. As previously defined, data sets are groups of measurands or variables
that are grouped together for reporting purposes via the 61850 standard. When designing
71 | P a ge
|
Virginia Tech
|
SCADA systems, as defined in Chapter 2, Manufacturing Message Specification (MMS) is the
mechanism for the transfer of information from server to client.
Figure 5.1 Manufacturer IEC 61850 Configuration Tool
Figure 5.2 shows how data sets are configured using the drag and drop feature of the
vendor software. As shown, all of the data is classified into various logical nodes as defined by
the standard. In this example, the data set contains fundamental measurands, since tags are being
chosen from the MX or Measurands Logical Node of the device. After the user is satisfied with
the information created in the data set, the data set is saved and assigned to a report.
After the data set is assigned to a corresponding report, the CID file is downloaded to the
IED via an FTP connection. In addition, the CID file is exported for use in this research. Figure
5.3 shows a CID file for the feeder relay configured in this example. The portion of the CID file
shown corresponds to the data set configured for the example with the name RA for Rockwell
72 | P a ge
|
Virginia Tech
|
Figure 5.3 CID File Example Feeder Relay
Importing the CID File into Software
As mentioned, the software tool was created to simplify the user‟s experience with the
gateway module and ease of implementation constructing complex SCADA systems. The
program was created in the Microsoft Visual Studio environment using Visual C++. The
software is responsible for reading the CID file from the relay, parsing the information, allowing
the user to configure final reports, mapping the data from IEC 61850 tags to EtherNet/IP tags,
writing a final configuration in XML for the gateway module, and downloading this
configuration to the SD card of the gateway.
Figure 5.4 depicts the workspace where the user interacts with the gateway module.
When the user opens a new project in the software, the gateway module is the only device that is
defined in the project by the gateway block. In this example the gateway is assigned an IP
address of 192.168.0.250. The left hand pane of the work space defines the devices that are
currently available to be configured; the project has the available EtherNet/IP connection for
communications to the controller. The bottom pane of the workspace defines a listing of all the
74 | P a ge
|
Virginia Tech
|
Figure 5.11 Non-Configured IEC 61850 Tags
After the configuration section is chosen for an individual IED, the user can browse
through the parsed CID file and has the freedom to browse through all configured logical nodes.
In this example the LLN0, or base logical node of the feeder relay, is selected. Furthermore, the
reports folder is chosen and buffered report one (BREP01) is selected to be mapped to the
controller. By dragging and dropping the desired information, i.e. the report folder, the
information is parsed from the report and displayed in the right workspace panel.
Once the information is mapped, the user sees a screen similar to that in Figure 5.12.
When the user wants to map remote bits for command and control, the user maps the control
value (ctval) of the remote bit (RBGGIO1) logical node. These bits are simple Boolean values
that can be mapped to actuate the IED, for instance with open/close or remote trip. The mapping
of these bits can be seen in Figure 5.13. The values mapped from reports are known as controller
inputs, while remote bits are known as controller outputs.
80 | P a ge
|
Virginia Tech
|
Figure 5.14 Adding EtherNet/IP Controller
Figures 5.15 and 5.16 show IEC 61850 tags are mapped to Class 1 CIP connections to
deliver them, via EtherNet/IP, to the automation controller. Prior to this screen being displayed,
the software reads the tag database, as defined by the IEC 61850 tag configurations. The tag
database is then parsed, and each tag is assigned a corresponding data type, each with the
corresponding number of bytes to be mapped to the controller. The user then has the option to
auto-assign all of the data to various CIP connections or assign each data tag point by point. For
purposes of this research and practical implementation, it is recommended that the auto-assign
feature be used to configure the system if no data priority is needed/required.
Once the data is mapped, as seen in Figure 5.16, various tabs in the right-hand workspace
window pane can be used to navigate between Class 1 inputs, Class 1 outputs, and Class 3
message instructions. It can be seen that the starting address of each data point is incremented by
the number of bytes that the data type corresponds. For example, the first item in Figure 5.16
defines the phase angle of the neutral current with a starting address at index zero of the first
connection with a length of four bytes. The second item in the list is the corresponding
magnitude to the neutral current, which in-turn starts at index four. The indicator down the right
side of the window in Figure 5.16 provides the user with a visual indication of the number of CIP
connections used, based on the data mapped from the gateway module to the control system.
82 | P a ge
|
Virginia Tech
|
After defining the mapping scheme from IEC 61850 to EtherNet/IP, the user can
download the project and configuration to the gateway as well as export Add-On Instructions
(AOIs) to the controller software so that the controller can correctly interpret and parse data
coming from the gateway module. This procedure is completed by right clicking the gateway
block in the workspace and selecting the export AOI option, as shown in Figure 5.17.
Figure 5.17 Exporting Add-On Instructions
Figure 5.18 shows the screens the user sees when he or she attempts to download the
project and configuration to the gateway module. When the user is ready to download the
configuration, the gateway block is selected, right clicked, and the download from PC to device
option is selected. The transfer file window appears and displays the IP address of the module.
The user should first select the test connection button to make sure that communication can be
established with the module. After successful communication is established, the download
button should be depressed. After the module downloads the configuration to the SD card,
“validate configuration” should be selected to ensure that the configuration was downloaded
successfully. At this point, the user has successfully configured both the IEDs and gateway
module to send and receive information over the IEC 61850 standard.
84 | P a ge
|
Virginia Tech
|
Figure 5.22, the object getting mapped to the automation controller is the 751A feeder relay,
defined in Line 3. The UDT name is defined as SEL_751A_1, as seen in Line 5. In Lines 7
through 35 (and beyond), the members of the object are defined. The UDT is an object with
multiple attributes, including members and modifying functions. Members are those attributes
associated with the 751A feeder relay. For this particular example, the UDT contains the same
mapped IEC 61850 information that have appeared in screens/or figures already presented in this
chapter.
Figure 5.22 User-Defined Data Type Definition
The later portion of the AOI file that is generated by the configuration software includes
a ladder routing that is imported into the automation controller code. The AOI defines how the
data is scanned by the controller and the data tables containing the information from the IEDs are
updated. The script can be seen in Figure 5.23. Lines 270-282 define the scope of the UDT and
what connections populate the data table. The <Routine> section of the code defines the ladder
logic which individually scans each object of the data stream, parse it, and copy its value to the
corresponding tag in the controller data table. The figure shows that each rung has its own rung
number, and the <text> field in each line defines the logic used to parse and copy the data.
89 | P a ge
|
Virginia Tech
|
Addressing Process Control Historian Issues
Traditional process historian consists of four major components: controller, data server,
interface node, and historian repository. Typically, the event timestamp is applied at the
interface node. Interface nodes collect, interrogate, and qualify information provided by the data
server. If the data values collected at the interface node exceed pre-defined dead band
thresholds, a timestamp is applied and the data is transferred to the historian repository. If the
data does not exceed the threshold, the data point is disregarded and not archived. This process
is better known as exception testing and can be seen in Figure 5.30.
Controller Data Server Interface Node Historian
1 2 3 4
Figure 5.30 Traditional Data Collection Scheme
This procedure for collecting and timestamping data does not work well for events that
are time stamped at the source device. In the above example, the event that is passed to the
interface node is value based, not time driven. After it has been determined that an exception has
occurred, a timestamp is generated and applied to the event. For example, if a process engineer
is trying to log and store events from IEDs, i.e., trips, alarms, etc., the timestamp of these events
is generated by the IED. Using value-based exception reporting will not suffice in transferring
meaningful timestamps from the IED to the historian repository. Referring back to Figure 5.30,
the controller does not provide a timestamp to the data server, but only a process value. For most
manufacturing environments, this schema is acceptable as time delay error is within the poll rate
of the data server.
In an IED system with IEC 61850 communications, the event drives both value and
timestamp changes in the data collection system. Both the event data and timestamp are created
at the IED and must travel together from the source of the event to the repository to be
94 | P a ge
|
Virginia Tech
|
meaningful. The previous two statements are the root cause of the problem in attempting to store
electrical distribution values in a process control data historian. The block diagram that
describes the solution to this problem can be seen in Figure 5.31.
Web Delivered
Trends / Reports
Relay Gateway Controller RSLinxEnterprise LiveDatF aT IH nterface FTH SE FTVantagePoint
1
2 3
RACE SOE -> FTH
4
Figure 5.31 Proposed Software Solution
Figure 5.31 shows the progression of data through the block diagram system. Block one
defines the physical IED. The IED(s) is (are) connected to the gateway module via an Ethernet
connection. Additionally, the gateway module is connected to the controller represented by the
Controller block. The timestamp that is generated on the event by the IED is passed through the
gateway to the controller, as shown by the progression from Boxes 1-3. Although the controller
data table contains both the event value and IED timestamp, it is not inherently passed to the
historian repository. In order to persist an event with an historian tag, the configuration of an
ALMD (Digital Alarm) instruction associates the event to the point ID of the historian tag. An
historian point ID is a unique identifier for a tag in the historian repository. When an alarm
occurs, the following parameters are known: timestamp of IED, unique point ID, timestamp of
entering alarm, value of alarm, and the Event Association ID. An example of this logic is shown
in Figure 5.32.
95 | P a ge
|
Virginia Tech
|
When the alarm is triggered, a message is sent to the Alarm and Events (A&E) data
server (RS Linx Enterprise) as depicted in 5.31. RS Linx Enterprise then populates the
ConditionEvent Table in the A&E database (red arrow). Figure 5.34 shows an example of this
table. The ConditionEvent Table shows the InputValue, EventAssociationID, Tag1Value (IED
timestamp), and Tag2Value (point ID). Figure 5.34 also shows the off/on and on/off transition
of an alarm event, represented by EventAssociationIDs being equal.
Figure 5.34 ConditionEvent Table (Partial)
In Figure 5.31, the top path in Block 4 represents the traditional data flow within the
process historian system. The solution developed for this research takes an alternative approach
to providing data to the historian repository, as represented by the lower path through the RACE
SOE / FTH tool. This GUI tool is shown in Figure 5.35. The GUI program was written using
the .NET framework. The Results workgroup represents the two collections: A&E records and
historian tags. Connections to both the A&E database, as well as the process historian, are
defined in OLEDB connection strings.
Figure 5.35 RACE GUI Tool
97 | P a ge
|
Virginia Tech
|
Now that an event with point ID 297 has been captured in the A&E database, the
information, including the associated IED timestamp, needs to be persisted to the historian tag.
This is accomplished by the user with an insert query to the process historian. After the insert is
successful, an artifact record is written to an additional table in the FT A&E database called
SOEtoFTH. Figure 5.36 defines the query to display information in the SOEtoFTH table. The
result of this query can be seen in Figure 5.37.
Figure 5.36 Query of SOEtoFTH
Figure 5.37 Query Results (Partial)
Note that Active is the input state of the alarm instruction (ALMD). Tag1Value is the
time stamp from the IED, Tag2Value is the point ID of the historian tag, and FTHTS is the
Factory Talk Historian Time Stamp. The FTHInsertTime is the time used in the insert to the
historian. The FTHTS and FTHInsertTime can be up to +/- 15 microseconds, as this is the
highest resolution that this timestamp object can represent.
98 | P a ge
|
Virginia Tech
|
Figure 5.40 shows the flow of information created by the development of the software discussed
in this chapter. As described, information moves from IEDs in the field through the gateway
module to the controller. From the controller, these values can then be inserted into historian and
trended in reports on view screens for visualization and reporting.
Figure 5.40 Practical Data Flow Diagram
Summary
In conclusion, this chapter has discussed software developments resulting from this
research that provide a functional, user-friendly solution to what program the gateway module to
convert IEC 61850 messages to EtherNet/IP messages. This chapter was broken down into two
sections: software created to interface with the gateway module, and software created to move
information to a process historian. Software developed to interface to the gateway module reads
CID files and allows the user to map information that is required by the automation controller.
After this information is defined as tags, these tags are mapped to corresponding EtherNet/IP
tags according to the ODVA standard. Once this mapping has occurred, the module
100 | P a ge
|
Virginia Tech
|
6. Chapter 6 - Visualization
Introduction
This chapter defines the visualization developed for this research. Items discussed in this
chapter include: faceplate definition, human machine interface discussion and definition, and
data management solution. The motivation for visualization is to represent an IED in logic and
graphics as close to the physical object itself. This provides the operator or engineer with the
same look and feel experience they would have if interacting with the physical device. At the
same time, the graphics were developed with various levels of security to allow only users with
proper credentials access to various command and control functions. Additionally, the research
solution must adhere to various graphics standards for both power and process control systems.
Faceplate Solution
Process control companies have developed solutions for process visualization. This
research takes process visualization one step further into the electrical distribution system. The
IEC 61850 standard allows for the visual representation of reports and alarms at the process
control level. With the development of more sophisticated Human Machine Interface (HMI)
screens, global objects have been introduced into the automation graphics. The use of these
global objects has allowed for the creation of faceplates.
A faceplate is defined as a reusable standard object. The advantage of the faceplate is
that it is a standard, prebuilt object that can be implemented repeatedly. Each faceplate has
security levels built into the objects themselves. These security features can be customized,
based upon user and application requirements. A prime example of the security benefit is the
command and control of IEDs.
The command and control portion of this research allows operators and engineers to
change settings and allow relay (or other IED) actuation from a remote site. Even though the
IEC 61850 standard defines how an IED communicates on an IEC 61850 network, many people
do not realize that these files do not include configuration information for the protection and
control functions in an IED. The IEC 61850 standard also does not provide any uniform method
for designing communication-assisted automation. Using faceplates as a solution addresses both
102 | P a ge
|
Virginia Tech
|
faceplates match National Electrical Manufactures Association (NEMA) standards. The color
schema adheres to that of the IEEE C37.1 definition of Supervisory Control and Data
Acquisition (SCADA) systems. The color schema differ from traditional process control
systems in that red usually references a stop or removal of power operation. However, in
distribution systems, red implies an application of power to terminals.
Figure 6.2 Relay Faceplate Global Objects
Additionally, to make the faceplates easily reusable, a standard base faceplate was
developed. Figure 6.3 shows the standard object and table formats used for the IED faceplates.
These objects are shown as visible when various tabs of the faceplate are displayed. Again, the
color scheme matches ISA 5.5 and complies with IEEE C37.1. Information tables, such as the
line to neutral voltages and currents table, are implemented in the engineering tab of each
faceplate. The “#” field indicates that the text field will be a numeric. The power conductors are
represented by red, the neutral conductor by white, and grounding conductor(s) by green. A logo
was also requested from various manufacturers for implementation in the faceplates. These
104 | P a ge
|
Virginia Tech
|
Figure 6.9 Physical and Graphical Comparison
Figure 6.9 shows a comparison of the physical IED to the virtualized representation of the
IED in the form of a faceplate. The graphic on the left is a photograph taken of an SEL 700G
generator protection relay. This IED is used to protect rotating synchronous generators that are
found in mining applications on sites that have their own co-generation. The graphic on the right
represents the IED in faceplate format. It can be seen that the faceplate is identified as a 700G,
or generator protection relay, from the title bar of the faceplate window as well as from the
manufacturer‟s image mark implemented as a global object. The target LED panels down the
left represent the same text that is represented on the physical IED, for example, Enabled, Trip,
Differential, etc. As all of these labels are configurable on the IED, the same text is also left up
to the user to define. For example, if the Differential LED was set to Reverse Power flow in the
IED, the faceplate could be altered to represent this change. The pushbutton LEDs, (right
column), are also graphically represented in the faceplate. Each button has a maximum of three
lines of text that could be assigned. The first and third lines of text refer to the operation of the
110 | P a ge
|
Virginia Tech
|
amber LEDs, while the second line of text references the operation of the push button.
Graphically this information is represented as follows:
1. The text on the second line with reference to the push buttons is graphically represented
as a faceplate pushbutton
2. The text on the first and third line reference the text with amber LEDs on the IEDs
themselves. These LEDs represent the internal state of the IED.
Additionally, each faceplate has an alarm and events banner built into the faceplate. This allows
the operator or engineer quick access on the home screen to determine any warning, diagnostics,
or trip information from the relay. This alarm banner is populated from logic written in the
controller.
The tabs across the top of the faceplate represent home, synchronization, engineering,
overall faults, X-side (Low Voltage) faults, and Y-side (High Voltage) faults. The next section
of this chapter presents the various screens for the IED faceplates developed in this research.
Faceplates were developed for four IEDs: generator, feeder, motor, and differential. These can
be seen in Figures 6.10-6.22.
111 | P a ge
|
Virginia Tech
|
Figure 6.24 shows a sample ladder program with two AOIs: one defining the UDT (rung
0) and the other defining the AOI for the faceplate (rung 1). The AOI in rung 1 defines 11
different input tags. The reference tags refer to the text of the target LEDs that the user wants to
show on the Faceplate when it is displayed. In this example, targets such as overvoltage, under
voltage, and overcurrent, can be specified depending upon system definition. The relay name
input parameter refers to the user-defined data type (UDT) as described in the software chapter.
In this example, the relay name is FeederRelayBusA. The alarm for this faceplate references
the name for the alarm that appears in the alarm and events database when this instruction is
executed.
Figure 6.24 Add-On Instruction Ladder
Figures 6.25 and 6.26 depict the steps to import the faceplate graphics into an existing
HMI project. From the file menu, the user selects the import wizard tool. When the wizard
loads, the user selects the import graphic displays into project option. After selecting this option
and backing up the project for revision control, the user then points to the faceplate(s) that are
intended to be imported into the project. These files are .gfx or graphics files that are designed
for FactoryTalk View Studio applications.
126 | P a ge
|
Virginia Tech
|
Conclusions
This chapter described the visualization developed for this research. Items discussed
included faceplate definition, human machine interface discussion and definition, and data
management solution. The goal of visualization in this research was to represent an IED in logic
and graphics which produced a virtual faceplate that would be familiar to users accustomed to a
particular IED. The virtual faceplate gives operators and engineers the same look and feel they
experience with the physical device. At the same time, the graphics were developed with various
levels of security to allow only users with proper credentials access to various command and
control functions.
Additionally, the research solution adhered to various graphics standards for both power
and process control systems. The visualization trending functionality of the solution was then
discussed by providing an example of a trend from a process historian repository. Finally, an
example of a secondary selective main-tie-main scheme was presented for a processing facility.
The one-line diagram was converted to an HMI screen, and multiple faceplates were tied to
various instrumentation blocks in the diagram to enable remote monitoring and control of the
system.
132 | P a ge
|
Virginia Tech
|
7. Chapter 7 - Verification and Acceptance Testing
Introduction
This chapter discusses the testing and verification procedures conducted to validate and
verify functionality of the proposed solution. Since a goal of this research is to develop a mine
monitoring solution utilizing the IEC 61850 standard to link the electrical distribution system
with the process control system, it was determined that the best way to validate the work and
functionality is to benchmark gateway performance tests against the conceptual design. The
chapter discusses each conceptual design milestone as well as the procedures used to validate
that this goal was met. For milestones requiring more than just visual inspection, the
experimental setup is defined, testing procedures are described, and the experimental results
discussed.
Conceptual Design Milestones
The original conceptual design of the solution proposed in this research was discussed in
Chapter 3. After surveying multiple industrial firms ranging from EPCs to heavy industry
segments, and comparing the feedback against information gathered in the literature review, this
research produced the results shown in Table 7.1. Table 7.1 shows seven major milestones
categories that were created for this research which include packaging, communications media,
device support, safety, security, display information, and visualization information.
Many of the physical milestones can be validated by simple inspection. For example,
packaging and media communications can be validated easily by examining a standalone
gateway module. In addition to inspection, further testing and validation needs to be performed
to benchmark the module‟s performance in various situations including being lightly loaded,
heavily loaded, and how it would react in dynamic situations.
The benchmarks tested in this chapter are the self-imposed “Final Design” specifications
shown in Table 7.1. Items that can be validated by inspection are qualified in paragraph form in
the next few sections, while testing procedures are thoroughly described throughout the
remainder of this chapter.
133 | P a ge
|
Virginia Tech
|
Table 7.1 Final Conceptual Design Milestones
Parameter Original Design Final Design
Packaging Stand-Alone Stand-Alone
Communications Media Copper Min. 100 Mbit/s Copper Min. 100 Mbit/s
Device Support Min. 20 device 20 devices
Interlocking, Select Before Operate,
Safety Interlocking
Classified Areas Considerations
Security Min. 5 levels Min. 7 levels
Alarms, Targets, Measurands, Timing /
Display Information Alarms, Targets, Measurands
SOE, Historian Interfacing Capability
ISA 5.5 Compliance, Provide
Visualization Information N/A Diagnostic Information, Command and
Control
Packaging & Communications Media
Once creating the final conceptual design specification, it was determined that a
standalone gateway module is the most versatile solution for linking the power distribution
system to the process control system. Additionally, in order to be functional with most of the
existing infrastructure, copper Ethernet media was determined to be the best form of data
transfer. Figure 7.1 shows a sample experimental system consisting of a controller, unmanaged
Ethernet switch, gateway module, 24 VDC power supply, and feeder protection relay. The
gateway module in Figure 7.1 is a standalone device (blue module) which is powered by the 24
VDC power supply.
Additionally, Figure 7.1 shows that the gateway module uses an RJ-45 copper media
Ethernet jack as the communications media. As defined in the hardware section, hardware for
the communications PHY was selected for 100 Mbit/s TCP/IP Ethernet communications, thus
satisfying the conception design milestone. As a result the packaging and media
communications milestones were successfully met.
134 | P a ge
|
Virginia Tech
|
Figure 7.1 Sample System Setup
Visualization Information
ISA 5.5 Compliance
After developing the final conceptual design specifications for visualization information,
it was important to ensure that any information displayed on process screens would be displayed
in a standard, acceptable fashion. The Instrumentation Society of America (ISA) defines proper
visualization in its 5.5 standard, entitled “Graphic Symbols for Process Displays.”
This standard was chosen since many mining facilities follow these guidelines as it is
similar to MSHA standards. One problem with some of the graphics developed for this research
is that power distribution and control often use color schemes opposite that of their process
counterparts. For example, the breaker closure is often represented as red, while the breaker
opening is often represented as green in power systems, whereas the breaker closure represents
the start of a process and breaker closure represents the stopping of a process. The IEEE
Industry Application Society Industrial and the Commercial Power Systems (IEEE IAS I&CPS)
color schemes were chosen for power since their safe, non-energized states are often referred to
with a green color, while their energized or possible danger states are symbolized by red.
All symbols used within the graphical faceplates for visualization follow ISA 5.5 guidelines,
with the following exceptions shown in Figure 7.2. The symbols shown in Figure 7.2 are not
135 | P a ge
|
Virginia Tech
|
defined in the ISA 5.5 symbols library and were added by exception to allow for full
functionality of the solution developed as part of this research. are all NEMA symbols that are
utilized in the power distribution realm and follow traditional power systems color schemes as
defined by the SCADA standard IEEE C37.1.
Figure 7.2 ISA Symbol Exceptions
Diagnostic Information
According to the IEC 61850 standard, diagnostic information is kept in the quality fields
of each relay. If the user decides to map the quality information from any parameters, these
values can be monitored for IED health. In addition, information about potential and current
transformers can also be brought back from the system. All of these quality flags from the IED
are transferred to the controller where they are constantly monitored for bad data. These quality
flags are then logically “ORed” together to determine if there was a diagnostic problem with the
relay. If there was a problem, an alarm was generated, and the corresponding faceplate was
136 | P a ge
|
Virginia Tech
|
Security
The original security specifications called for five distinct levels for the system, but after
industry consultation, the final conceptual design called for seven levels of security to be built
into the HMI graphics. The intent for levels of security is that those without proper credentials
cannot/are not able to perform command and control of the electric distribution system. The
solution developed in this research creates the possibility of safety risks if engineers or personnel
with improper credentials make unauthorized changes to the mine power system during
operation. As a result, seven levels of security were implemented to prevent unauthorized
actuation of power equipment. The seven levels of security implemented in the design solution
can be seen in Table 7.3. Tables 7.4-7.7 show the permissions for each security level.
Table 7.3 Security Levels
Security Level Description
1 Administrator
2 Engineer II
3 Engineer I
Senior
4 Operator
5 Operator
6 Maintenance
7 Remote Access
In order to test the integrity of the security built into the system, various trials were run
on each developed relay faceplate in order to ensure that no level could access data or command
and control actuation of a device for which it was not authorized. Tables 7.4-7.7 describe the
testing conducted on each relay faceplate with descriptions of each test case. A red „X‟ indicates
that access should not be and was not permitted, while a green check indicates that access was
granted for command and control or viewing of information. Each case was tested 50 times and
included closing the faceplate and opening it again for consistency. The results shown in Tables
7.4-7.7 represent a 100% successful testing of each test case.
139 | P a ge
|
Virginia Tech
|
Display
When reviewing the final conceptual design for the solution proposed in this research,
four distinct target milestones were established:
1. Display Alarms and Targets
2. Display Measurands
3. Display Sequence of Events Data
4. Provide Historian Interfacing Capability
Each of these milestones are discussed in this section as well as how the information is displayed
to the benefit of the operator or engineer.
Alarms and Targets
The first and most important functionality of IEDs is electrical protection of the devices
in the system. With this in mind, IEDs must be able to provide alarms and warnings to operators
and engineers to alert them that there is an electrical fault or other anomaly in their mining
system that could harm personnel or damage equipment. Prior to microprocessor-based relays,
SCADA systems were alerted by the closure of normally open and normally closed contacts on
the relays to make or break alarming circuits from the device.
Unfortunately, this method only provided information that the relay had picked up or
alarmed, but no diagnostic information as to why the relay had picked up or alarmed. As a
result, post mortem analysis of why faults occurred was time consuming, thus affecting process
yield due to downtime. With microprocessor based relays, more diagnostic information (such as
the reason for picking up) can be provided by the IED, but there is still no easy way in a
distributed system to retrieve this information without being directly plugged into the front port
of the relay. The solution provided in this research allows trips, alarms, and warnings to be
graphically displayed in a centralized location via the use of the graphical faceplates described in
Chapter 6.
The diagnostic tab in each relay faceplate provides all of the diagnostic information for
alarms or targets that may pick up during facility operation. This screen can be seen in Figure
7.4, while Figure 7.5 displays the generic targets on the home screen of the faceplate for easy
identification , in the event the relay picked up, and a summary view of why the relay picked up.
142 | P a ge
|
Virginia Tech
|
Each of the relay targets was tested via simulation software by forcing the target to
generate a trip signal based on computer forced command. Each target was tested five times in
conjunction with the relay faceplate and checked whether there was agreement between the
controller data table point and the faceplate graphic tag. The result of this testing indicates that
all relay pickup points were mapped correctly and operated correctly.
Measurands
With the advancement of microprocessor-based relays, individual measurands, such as
voltage and current, can now be gathered by the IED. Measurands for the solution proposed in
this research for mine monitoring and control play a major role in indicating the health of the
electric distribution system as well as the electromechanical equipment. These fundamental
measurands, both electrical and thermal, are important for establishing the long term health and
conducting the predictive maintenance of a system. As a result, these fundamental values are
included in the visualization portion of the relay faceplates, as this information, when provided at
a centralized facility from a distributed system, allows engineers to quickly asses the overall
performance of an operation. Figures 7.6 and 7.7 depict the measurands that are displayed
during the operation of the mine system.
In order to simulate values going to the relays, the IEDs generator, feeder, differential,
and motor were connected to a variable voltage source with a motor load. Voltages and loading
were then adjusted in order to provide for a range of electrical measurands, ensuring that the
relay updated these values accordingly. In addition, faceplate graphics were checked to ensure
they were mapped correctly to controller tags, thus appropriately updating from information in
the controller data table. It was determined after testing each relay and faceplate that the
information was correctly mapped and was being correctly transferred from IED to PAC.
144 | P a ge
|
Virginia Tech
|
Timing and Sequence of Events
With the advent of GPS timing, all IEDs from a distributed system can be referenced and
synchronized to the same time clock or reference to time. This allows for easier analysis of
cascading events in an electrical distribution system, and for reference to when events occurred
to an ultimate time source. Two places needed to be tested to ensure that timestamps were
properly passed throughout the system. The first place was between the IED and the automation
controller, and the second was between the automation controller and HMI software.
Timing between IED and PAC
The first step in validating proper time transfer was to establish a network of IEDs, a
gateway module, and controllers for receiving data from the IEDs. This setup is shown in Figure
7.8. The relays were configured to pick up every two seconds and reset automatically. When the
relays picked up, they were configured to send an IEC 61850 report, with corresponding
timestamp, to the gateway module, which in-turn published the information to the automation
controller.
First the timestamp between the IED sequence of events record (SER) and published IEC
61850 report was checked for having the same value. It was determined that timestamps from
trips were assigned in the same processing cycle, leaving a time difference of zero microseconds
between the actual protection element assertion time and the relay trip published time. This
point was later found as a part of the IEC 61850 annex defining that all IED manufactures should
follow this procedure to provide the most accurate information to SCADA systems.
The reported trip time was then compared against the data table LINT timestamp. It was
determined after 1000 tests of all four relays that the time difference between the IED timestamp
and controller data table timestamp was zero microseconds, thus meeting the milestone of
preserving the timestamp from the IEC 61850 network to the EtherNet/IP network.
146 | P a ge
|
Virginia Tech
|
Controller
Network
Managed Switch Gateway Module Managed Switch
Figure 7.8 Timing Test Setup
Timing between PAC and HMI
The intent of this solution is to provide a time scale that is as accurate as possible, given
current industry products and the capability of the system hardware. The ControlLogix controller
is capable of using a 64bit Integer (LINT) that represents the number of micro-seconds from Jan
1, 1970. This allows for a date timestamp to be held in either two registers (DINTS) or one
(LINT).
The FactoryTalk Alarms and Events server software is capable of storing, in a Microsoft
SQL Server Database, the event time at a resolution of one millisecond. This resolution is due to
the use of the DateTime data type. Unfortunately, at this time the DateTime field as specified by
Microsoft only accommodates a 32-bit timestamp, or one millisecond. This can be seen in
Figure 7.9. Microsoft is currently developing a DateTime2 field which represents the full 64-bit
range, or one microsecond, resolution.
Although there is no direct way to time a 64-bit timestamp to an alarm, it can still be
preserved within the alarm object. The object has four other tags storage locations with each
Alarm Event, stored in the FTAE database. As a result of this data object definition being able to
pass the LINT timestamp as an associated alarm tag, the timestamp can still be preserved in full
form and passed to a process historian for data vaulting. This feature can be seen in Figure 7.9.
147 | P a ge
|
Virginia Tech
|
The result of mapping the timestamp to Tag 1 also can be seen in the blue box in Figure
7.10, where the timestamp represents the same time microsecond format. It was determined after
1000 tests of each relay that the LINT timestamp, represented in the number of microseconds
located in Tag 1, matched exactly the timestamp in the data table of the PAC as well as the
timestamp transferred from the IED network. As a result, the preservation of the time milestone
was achieved for this solution.
Storing Values in Historian
As mentioned in Chapter 6, OSI PI historian does not accept foreign timestamps due to
the way traditional process historians function. Chapter 6 also discussed a solution for how to
address this issue with the creation of a software tool that bridges the Alarms and Events
database and OSI PI historian database. In order to test the functionality of this software tool,
2000 alarms were created and tested on IEDs in a system.
As long as a timestamp inserted into the historian was within 15 microseconds of the IED
published time, the tool was within tolerance and no further error propagated throughout the
system. The timestamps that were compared are shown in Figure 7.11. The red timestamp
corresponds to the timestamp published to the process historian, and the blue timestamp
corresponds timestamp published by the IED network. As long as the time difference between
the red and blue timestamps is less than or equal to 15 microseconds, the tool has no added delay
outside the tolerance of current process historian systems. The results of the testing can be seen
in Table 7.8 and Figure 7.12.
Figure 7.11 Time Comparisons
Table 7.8 Numerical Time Error Results
Total
Time Error [us] 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Number of results 172 176 137 116 97 164 170 152 151 161 115 112 92 85 63 37 2000
149 | P a ge
|
Virginia Tech
|
Time Error of Software Insert Tool
180
160
140
s
t 120
n
e
v
E 100
f
o
r e 80
b
m
u 60
N
40
20
0
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Time Difference [microseconds]
Figure 7.12 Graphical Time Error Results
Table 7.8 and Figure 7.12 show that, after 2000 test trials, all resulting data points are
within the error bars of 15 microseconds. The data suggests that 74.7% of the results are within
9 microseconds of each other, well within the 15 microsecond tolerance provided by OSI PI.
In addition to the testing of time discrepancy, this test also checked whether fundamental
parameters could be trended against electrical faults in the system. To check this, a second
vendor‟s IED was tested as it had a built in simulator to test relay functionality and trip settings.
This software can be seen in Figure 7.13. By adjusting the slider bars in the simulator, the
currents, voltages, and harmonics of the corresponding waveforms were adjusted. The relay
tripped when the set thresholds of these parameters were exceeded, thus triggering an alarm to be
logged by the controller and historian system.
150 | P a ge
|
Virginia Tech
|
Figure 7.13 Software Simulator
Information for analog parameters can also be logged and trended in historian as seen in
Figure 7.14. In this figure, the maroon lines represent the trip status of the relay, which, in this
example, was set to trip on a ground current greater than 60 A (green), regardless of the currents
on phases A and B (blue and red). As shown in the figure, the maroon line is asserted any time
the process parameter, i.e., ground current (green), exceeds 60 Amps and resets when the relay
resets. In this example this occurs when the ground current is less than 60 Amps.
Analog waveforms can be depicted if the IED manufacturer allows this information to be
sent over the IEC 61850 standard. These waveforms can be seen in Figures 7.15 and 7.16,
respectively. Figure 7.15 shows waveforms over a four-second time interval, while Figure 7.16
shows those same waveforms zoomed to approximately eight electrical cycles.
151 | P a ge
|
Virginia Tech
|
Figure 7.16 Zoomed In Analogue Waveforms
Throughout the testing process design milestones were validated by successfully
transferring information from the IED network to the PAC and from the controller to a process
historian for storage and trending.
Device Support
In order to test quantity and throughput for device support, IEDs were instrumented with
a packet analyzer known as “wire shark” which captures and transfers data. Wire Shark is a
software network analyzer, recognized globally as an industry standard for determining
connectivity, data rates, and network transfers. In order to obtain information about the network,
a managed Ethernet switch was utilized. Managed switches have the ability to map an addition
port as a span port. The span port mimics or becomes an exact copy of the port to which it is
assigned to mirror. In this case, the switch port to which the gateway module was inserted was
mirrored to another port. so that a computer running wire shark could capture the data. This
setup is shown in Figure 7.17.
153 | P a ge
|
Virginia Tech
|
The blue plot in the diagram represents the IEC 61850 MMS data being transferred from
the IED to the gateway module. There is a distinct pattern of the blue trace consisting of three
distinct peaks, each representing a report being sent from an IED to the gateway module. The x-
axis represents time in seconds of the data capture, and the y-axis represents the number of bits
transferred. At approximately every 5 seconds the same pattern of three reports is generated and
sent to the gateway module, with each report marked by a blue peak. As IEDs are designed first
for protection and second for SCADA transfer, the timeframe is not exactly five seconds;
however, the error is less than 300 milliseconds on data transfer rate. The data flow to the
gateway module also spikes at these moments, as the green line spikes at the time of data
transfer.
Figures 7.19-7.21 show wire shark screen captures that provide information on packet
transfer between devices. Figure 7.19 shows information from the various frames captured by
wire shark with the corresponding protocols of each message. Figure 7.20 shows specific
information about an EtherNet/IP message, in this case between the gateway and the controller.
Figure 7.21 shows IEC MMS communications between the IED and gateway module.
Figure 7.19 Frame Capture
155 | P a ge
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.