Unit - 4
Monitoring & Control
Q1) What are the features of State Estimation?
A1) The important features of State Estimation are, as follows:
Q2) What is meant by Power System Security?
A2) The power system needs to be secured, we need to protect it from the black out or any internal or external damage. The operation of the power system is set to be normal only when the flow of power and the bus voltages are within the limits even though there is a profitable change in the load or at the generation side. From this we can say that the security of the power system is an important aspect with respect to the continuation of its operation.
Security functions are of two types, as follows:
Q3) Describe the two components of SCADA.
A3) SCADA (Supervisory Control and Data Acquisition) comprises of two parts namely:
Q4) Discuss the applications of SCADA in Power Generating Stations.
A4) As the power system deals with power generation, transmission and distribution sectors, monitoring is the main aspect in all these areas. Thus, the SCADA implementation of power system improves the overall efficiency of the system for optimizing, supervising and controlling the generation and transmission systems.
SCADA function in the power system network provides greater system reliability and stability for integrated grid operation.
With the use of Programmable Logic Controllers (PLC) hardware and powerful bus communication links along with SCADA software and hardware’s in power generating stations, delivering an optimal solution for each and every process operation is flexible with advanced control structures.
The functions of SCADA in power generation include:
Q5) Describe State Estimation.
A5)
Here, SE= State Estimator
LP=Limit Checking Program
ED=Economic Dispatch
MD=Mimic Display
CAP=Contingency Analysis Programs
Q6) Define Phasor Measurement Unit.
A6)
Q7) What is EMS in power systems?
A7)
Q8) Describe the evolution of EMS.
A8) The evolution of EMS has a long past. It has started with control centers in 1960s to fully developed energy management systems:
Q9) What are the functions of EMS?
A9) The important benefits of an EMS can be addresses as the following functions:
Control functions:
Operating functions:
Optimization functions:
Planning functions:
Q10) What is PLC?
A10)
Q11) What is the difference between PLC & SCADA?
A11)
Q12) How do PLC & SCADA work together?
A12)
Q13) Discuss the functions of ECC?
A13)
a) Independent System Operator (ISO) to perform higher-level decision making
b) Transmission Owner ECC to do lower-level decision making
a) Level 1: Local Control Center – Power stations and substations - monitor & control of load, Protect & break circuit, Regulate voltage, Synchronization of feeders, Load Shedding etc
b) Level 2: Area Load Dispatch Center – Transmission Network – receives and processes information for related control measures
c) Level 3: State Load Dispatch Center – Transmission System – system wide load monitoring & control followed by corrective actions
d) Level 4: Regional Control Center – Interconnected Power Systems – monitor & control inter-state & inter-regional power regulation
a) Energy Management System (EMS)
b) Supervisory Control and Data Acquisition (SCADA)
c) Communications that connect EMS & SCADA
Q14) Which disturbances are handled by Power System Control?
A14) The objective of power system control is to maintained continuous electric supply of acceptable quality by taking suitable measures against the various disturbances that occur in the system.
These disturbances can be classified into two major heads:
Q15) What do you understand by contingency analysis?
A15) Contingency analyses are important tasks for the safe operation of electrical energy network. Potential harmful disturbances that occur during the steady state operation of a power system are known as contingencies. Contingency analysis is carried out by using repeated load flow solutions for each of a list of potential component failures. This process has to be executed for all the possible contingencies, and repeated every time when the system load or structure changes significantly. Conventional methods are tedious and time-consuming process, which is not desirable for real time applications.
Power Systems are operated so that overload do not occur either in real-time or under any statistically likely contingency. This is often called maintaining security. Steady state power system insecurity such as transmission lines being overloaded causes transmission elements cascade outages which may lead to complete blackout. The power system operator must know the system state at any instant. The contingency analysis is used to predict which contingencies make system violations and rank the contingencies according to their relative severity. Contingency Analysis is useful both in the network design stages and for programmed maintenance or network expansion works to detect network weaknesses. The weaknesses can be strengthened by transmission capacity increase, transformers rating increase besides circuit breakers ratings increase.
Q16) Explain on-line security analysis?
A16) There are three basic elements of on-line security analysis and control, namely, monitoring, assessment and control. They are tied together in the following framework:
Q17) Write a short note on Wide Area Measurement Systems?
A17)
Q18) Discuss the importance of state estimation.
A18)
z = h(x) + e where,
z = Measurement vector formed by voltage magnitude, real and reactive power flows and power injections
h(x) = The non-linear function relating the error - free measurements to the system states.
x = State Vector
e = Noise in measurements
Q19) Differentiate between normal & alert state of a power system.
A19) A system is said to be in the normal state when both, load and operating constraints are taken care of. It can be assumed that in the normal state, the power system is in a quasi-steady state condition. At any given time, the intersection of load constraints and operating constraints defines the space of all feasible normal operating states, in which the power system may be operated.
A normal operating point can be termed as either secure or insecure with respect to an arbitrary set of disturbed data. A secure system can undergo any contingency in the next-contingency set without entering an emergency condition. On the other hand, if there is at least one contingency in the next-contingency set which can cause an emergency, the normal system is called insecure or in an alert state.
Q20) Write a short note on preventive & emergency control for a power system failure.
A20) Power system security is more and more in conflict with economic and environmental requirements. Security control aims at making decisions in different time horizons so as to prevent the system from undesired situations, and in particular to avoid large catastrophic outages. Traditionally, security control has been divided in two main categories: preventive and emergency control.
In preventive security control, the objective is to prepare the system when it is still in normal operation, so as to make it able to face future (uncertain) events in a satisfactory way. In emergency control, the disturbing events have already occurred, and thus the objective becomes to control the dynamics of the system in such a way that consequences are minimized.
Types of control actions: generation rescheduling, network switching reactive compensation, sometimes load curtailment for preventive control; direct or indirect load shedding, generation shedding, shunt capacitor or reactor switching, network splitting for emergency control.
Uncertainty: in preventive control, the state of the system is well known but disturbances are uncertain; in emergency control, the disturbance is certain, but the state of the system is often only partially known; in both cases, dynamic behavior is uncertain.
Open versus closed loop: preventive control is generally of the open loop feed-forward type; emergency control may be closed loop, and hence more robust with respect to uncertainties. In the past, many utilities have relied on preventive control in order to maintain system security at an acceptable level. In other words, while there are many emergency control schemes installed in reality, the objective has been to prevent these schemes as much as possible from operating, by imposing rather high objectives to preventive security control.