Professional Documents
Culture Documents
Working Group
B5.07
June 2011
Modern Techniques for Protecting and
Monitoring of Transmission Lines
Working Group
B5.07
Members
Copyright © 2011
“Ownership of a CIGRE publication, whether in paper form or on electronic support only infers right of use for
personal purposes. Are prohibited, except if explicitly agreed by CIGRE, total or partial reproduction of the
publication for use other than personal and transfer to a third party; hence circulation on any intranet or other
company network is forbidden”.
Disclaimer notice
“CIGRE gives no warranty or assurance about the contents of this publication, nor does it accept any
responsibility, as to the accuracy or exhaustiveness of the information. All implied warranties and conditions are
excluded to the maximum extent permitted by law”.
ii
5.2.5 Sensitive Residual Overcurrent Protection ................................................................................... 38
5.3 DISTANCE PROTECTION ...................................................................................................................... 38
5.3.1 Polarizing Methods ....................................................................................................................... 38
5.3.2 Phase Selectors ............................................................................................................................. 43
5.3.3 Increased Number of Distance Zones ........................................................................................... 44
5.3.4 High-Speed Distance Zone ............................................................................................................ 44
5.3.5 More Flexible Characteristic ........................................................................................................ 45
5.3.6 Load Compensation Factor ........................................................................................................... 45
5.3.7 Load Characteristic ...................................................................................................................... 45
5.3.8 Different Parameter Groups ......................................................................................................... 46
5.3.9 Integrated Distance to Fault Location .......................................................................................... 46
5.3.10 Ground Return Compensation Factor ...................................................................................... 46
5.3.11 Mutual Impedance .................................................................................................................... 46
5.3.12 Drifting of Parameters ............................................................................................................. 48
5.3.13 Zone Extension ......................................................................................................................... 48
5.4 LINE DIFFERENTIAL PROTECTION FUNCTION...................................................................................... 49
5.4.1 Current Differential Protection ..................................................................................................... 49
5.4.2 Digital Current Differential Protection......................................................................................... 50
5.4.3 Advantages of Line Differential Protection Systems ..................................................................... 50
5.4.4 Current Differential Operating Characteristics ............................................................................ 50
5.4.5 Percentage Bias Current Differential Characteristic ................................................................... 51
5.4.6 Alpha-Plane Differential Characteristic ....................................................................................... 52
5.4.7 Charge Comparison ...................................................................................................................... 53
5.4.8 Differential Protection using Zero or Negative-Sequence Current ............................................... 53
5.4.9 Time Synchronization .................................................................................................................... 54
5.4.10 Accommodation of Channel Delay Asymmetry Using GPS...................................................... 56
5.4.11 Redundant Communication Channels ...................................................................................... 57
5.4.12 Improvements in Line Differential Operating Characteristics ................................................. 57
5.5 SWITCH ONTO FAULT PROTECTION .................................................................................................... 59
5.6 TELEPROTECTION FUNCTIONS ............................................................................................................ 61
5.6.1 General.......................................................................................................................................... 61
5.6.2 Permissive Teleprotection ............................................................................................................. 62
5.6.3 Blocking Teleprotection ................................................................................................................ 67
5.7 NON-COMMUNICATIONS BASED PROTECTION SCHEMES FOR PARALLEL LINES ................................. 67
5.8 EFFECT OF INSTRUMENT TRANSFORMER TRANSIENTS ON PROTECTION FUNCTIONS ......................... 69
5.8.1 Current Transformer (CT) Transients ........................................................................................... 69
5.8.2 Effect of CT Saturation on Distance Protection Elements ............................................................ 70
5.8.3 Effect Of CT Saturation On Line Differential Elements ................................................................ 71
5.8.4 Effect of CT Subsidence Current on CB Failure Protection Elements .......................................... 72
5.8.5 Capacitor Voltage Transformer Transients .................................................................................. 73
5.8.6 Effect Of CVT Transients On Distance Protection Elements ........................................................ 74
5.8.7 Bushing Potential Device Transients ............................................................................................ 75
5.8.8 Mitigation Of CVT And BPD Subsidence Transient ..................................................................... 77
5.8.9 CVT Transient Detection Methods ................................................................................................ 77
5.8.10 Conclusion ................................................................................................................................ 78
5.9 REFERENCES ....................................................................................................................................... 78
6 CONTROL FUNCTIONS ........................................................................................................................ 80
6.1 AUTOMATIC RECLOSING..................................................................................................................... 80
6.1.1 Introduction ................................................................................................................................... 80
6.1.2 Basic Parameters Of An Auto-Reclosing Scheme ......................................................................... 81
6.1.3 AR Operating Mode ...................................................................................................................... 83
6.1.4 Control Of The AR Function ......................................................................................................... 85
6.1.5 Protection Schemes And Auto-Reclosing ...................................................................................... 87
6.1.6 Sequential Auto-Reclosing Features ............................................................................................. 87
6.1.7 Adaptive Auto-Reclosing ............................................................................................................... 87
6.1.8 Synchronism Check ....................................................................................................................... 88
6.2 POWER SWING BLOCKING AND OUT-OF-STEP FUNCTIONS ................................................................. 91
6.2.1 Introduction ................................................................................................................................... 91
6.2.2 Power Swing Detection ................................................................................................................. 92
iii
6.2.3 Power Swing Blocking .................................................................................................................. 94
6.2.4 Protection dependability during power swings ............................................................................. 95
6.2.5 Out-Of-Step Tripping .................................................................................................................... 96
6.2.6 Application Of PSB And OST Functions ....................................................................................... 97
6.3 ZERO VOLTAGE TRIPPING ................................................................................................................... 98
6.4 REFERENCES ....................................................................................................................................... 99
7 TRANSMISSION LINE AND PROTECTION SYSTEM MONITORING FUNCTIONS .............. 101
7.1 TRANSMISSION LINE MONITORING ................................................................................................... 101
7.1.1 Fault Recorder ............................................................................................................................ 101
7.1.2 Disturbance Recorder ................................................................................................................. 104
7.1.3 Fault Location ............................................................................................................................. 104
7.1.4 Broken Conductor ....................................................................................................................... 106
7.2 PROTECTION SYSTEM MONITORING ................................................................................................. 109
7.2.1 Internal Self Supervision ............................................................................................................. 109
7.2.2 Measurement Supervision ........................................................................................................... 111
7.2.3 Trip Circuit Supervision .............................................................................................................. 113
7.3 REFERENCES ..................................................................................................................................... 114
8 AUXILIARY FUNCTIONS.................................................................................................................... 115
8.1 EVENT RECORDER ............................................................................................................................ 115
8.2 REMOTE ACCESS .............................................................................................................................. 116
8.3 TIME SYNCHRONIZATION.................................................................................................................. 118
8.4 CIRCUIT BREAKER CONDITION MONITORING ................................................................................... 120
8.5 POLE DISCREPANCY.......................................................................................................................... 121
8.5.1 Contact Discrepancy Between Poles ........................................................................................... 122
8.5.2 Discrepancy Between Contacts of the Same Pole ....................................................................... 122
8.6 MEASUREMENT ................................................................................................................................ 123
8.7 CONCLUSIONS................................................................................................................................... 123
8.8 REFERENCES ..................................................................................................................................... 124
9 INTEGRATION AND DATA MANAGEMENT ................................................................................. 125
9.1 PROTECTION FEATURES .................................................................................................................... 125
9.2 NON-PROTECTION FEATURES ........................................................................................................... 126
9.3 PROTECTION APPLICATIONS ............................................................................................................. 127
9.4 CONTROL APPLICATIONS .................................................................................................................. 130
10 IEC 61850 IMPACT ON TRANSMISSION LINE PROTECTION ................................................... 133
10.1 IEC 61850 BASED SUBSTATION ARCHITECTURE .............................................................................. 133
10.2 PROCESS-BUS BASED SOLUTIONS..................................................................................................... 135
10.3 ADVANTAGES OF PROCESS-BUS BASED SOLUTIONS ........................................................................ 137
10.4 PROTECTION PERFORMANCE REQUIREMENTS................................................................................... 138
10.5 ADVANTAGES OF GOOSE BASED SOLUTIONS ................................................................................. 140
10.6 REFERENCES ..................................................................................................................................... 142
11 APPLICATION EXAMPLES ................................................................................................................ 143
11.1 BENEFITS OF INCREASED NUMBERS OF DISTANCE PROTECTION ZONES .......................................... 143
11.2 FAULT LOCATION IN TRANSMISSION LINE IEDS .............................................................................. 144
11.3 SYNCHROPHASOR-BASED TRANSMISSION LINE BACKUP PROTECTION ............................................ 145
11.3.1 Faulted Phase Identification .................................................................................................. 146
11.3.2 Negative-Sequence Current Differential ................................................................................ 147
11.3.3 Negative-Sequence Current Directional Element................................................................... 147
11.3.4 Protection Element Performance ........................................................................................... 148
11.4 PARALLEL LINES .............................................................................................................................. 150
11.4.1 Communications-Aided Phase Selection in Distance Protection Schemes............................. 150
11.4.2 Blocking Of High-Speed AR For CB Failure Or Out-Of-Synch Conditions .......................... 151
11.5 THREE-TERMINAL LINES .................................................................................................................. 152
11.5.1 Maintaining High-speed Tripping In The Event Of One-Channel Loss ................................. 152
11.5.2 Loss-Of-Communication Channel In Three-Terminal Line Differential Applications ........... 153
11.6 BREAKER-AND-A-HALF BUSBAR ARRANGEMENT ........................................................................... 153
iv
11.6.1 Current Differential Protection with Independent Current Inputs for Through-Fault Stability
154
11.6.2 Stub Fault Condition .............................................................................................................. 154
11.7 CB AND STATION BYPASS ................................................................................................................ 155
11.7.1 CB Bypassing (Substitution) ................................................................................................... 155
11.7.2 Station Bypass ........................................................................................................................ 157
11.8 AUTO-RECLOSING WITH SECONDARY ARC EXTINCTION RECOGNITION .......................................... 159
11.9 MULTI-PHASE AUTO-RECLOSING ..................................................................................................... 160
11.10 SUBSTATION TOPOLOGY AND AUTO-RECLOSING ............................................................................. 161
11.10.1 Double Busbar arrangement .................................................................................................. 161
11.10.2 Breaker-And-A-Half Arrangement ......................................................................................... 164
11.11 REFERENCES ..................................................................................................................................... 168
12 TRANSMISSION LINE PROTECTION TESTING ........................................................................... 169
12.1 TESTING OF DISTANCE PROTECTION IEDS ....................................................................................... 169
12.2 IED TESTING .................................................................................................................................... 170
12.2.1 Testing Of The Analog Signal Processing .............................................................................. 171
12.2.2 Testing Of The Measurement Functions ................................................................................. 172
12.2.3 Testing Of The Main Protection Functions ............................................................................ 172
12.3 TESTING OF TRANSMISSION LINE PROTECTION SCHEMES ................................................................ 174
12.3.1 What Should Be Tested ........................................................................................................... 174
12.3.2 How is the Test Performed? ................................................................................................... 174
12.3.3 Test Results Analysis .............................................................................................................. 175
12.4 CONVENTIONAL TESTING ................................................................................................................. 176
12.5 VIRTUAL RELAY TESTING ................................................................................................................ 176
12.5.1 Front End ............................................................................................................................... 177
12.5.2 Virtual Relay........................................................................................................................... 177
12.5.3 Analysis And Visualization Tools ........................................................................................... 179
12.5.4 Virtual Testing Applications ................................................................................................... 180
13 FUTURE TRENDS ................................................................................................................................. 182
13.1 INTRODUCTION ................................................................................................................................. 182
13.2 GENERAL TRENDS ............................................................................................................................ 182
13.2.1 Engineering ............................................................................................................................ 182
13.2.2 Protection Principles .............................................................................................................. 182
13.2.3 Software .................................................................................................................................. 182
13.2.4 Hardware ............................................................................................................................... 183
13.2.5 Man Machine Interface .......................................................................................................... 183
13.2.6 Setting Procedures.................................................................................................................. 184
13.2.7 Commissioning ....................................................................................................................... 184
13.2.8 Lifecycle ................................................................................................................................. 184
13.3 COMMUNICATIONS ........................................................................................................................... 184
13.3.1 Station to Station .................................................................................................................... 184
13.3.2 Station Level ........................................................................................................................... 184
13.4 SPARE PARTS .................................................................................................................................... 185
13.5 TRAINING.......................................................................................................................................... 185
13.6 DEVICE CONFIGURATION .................................................................................................................. 185
14 CONCLUSION ........................................................................................................................................ 186
15 BIBLIOGRAPHY.................................................................................................................................... 187
v
LIST OF FIGURES
Figure 2.1 - System conditions Vs Tendency to Operate......................................................................................... 2
Figure 3.1 - Operating time versus sampling rate .................................................................................................. 7
Figure 3.2 - Impedance plot of half-cycle cosine filter ........................................................................................... 7
Figure 3.3 - Evaluation of analog and digital filters .............................................................................................. 8
Figure 3.4 - Cosine and sine filters ......................................................................................................................... 9
Figure 3.5 - Impedance plot of cosine filter ............................................................................................................ 9
Figure 3.6 - Impedance plot of Fourier filter ........................................................................................................ 10
Figure 3.7 - Comparison of cosine and Fourier filters ......................................................................................... 10
Figure 3.8 - Effect of mimic filter followed by a full cycle Fourier filter .............................................................. 11
Figure 3.9 - Response of a mimic filter followed by a half cycle Fourier filter .................................................... 11
Figure 3.10 - Magnitude response of the Least Error Squares technique ............................................................ 12
Figure 3.11 - Software implementation of the zero-crossing detection................................................................. 14
Figure 3.12 - Phasor rotation for measuring frequency ....................................................................................... 15
Figure 3.13 - Effect of off-nominal frequency on phasor estimation .................................................................... 16
Figure 3.14 - Two voltage phasors computed by two different devices ................................................................ 17
Figure 4.1 – Light propagation in single and multi-mode fibre ............................................................................ 24
Figure 5.1 – User-defined curve ........................................................................................................................... 35
Figure 5.2 – Directional Ground Fault Protection Scheme Logic........................................................................ 36
Figure 5.3 – Directional characteristic of a distance relay .................................................................................. 40
Figure 5.4 – Offset and rotation of the directional element for a forward fault due to load angle and source
impedance ............................................................................................................................................................. 41
Figure 5.5 - Polarising quantity (phase-ground fault).......................................................................................... 41
Figure 5.6 - Voltage inversion at bus S on a series-compensated line.................................................................. 42
Figure 5.7 - Distance zones .................................................................................................................................. 44
Figure 5.8 - Basic non-biased current differential protection .............................................................................. 49
Figure 5.9 - Pilot wire differential protection....................................................................................................... 49
Figure 5.10 - Traditional percentage bias current differential characteristics .................................................... 51
Figure 5.11 - Alpha-plane line current differential characteristic ....................................................................... 53
Figure 5.12 – Fault current and load current ....................................................................................................... 54
Figure 5.13 – Id and Ir for a high resistance fault ................................................................................................. 54
Figure 5.14 - Channel time delay measurement using the ping-pong method ...................................................... 56
Figure 5.15 - SOTF Protection ............................................................................................................................. 59
Figure 5.16 – AR (in synchro and voltage check modes) activation of SOTF ...................................................... 60
Figure 5.17 – AR (with zone extension) activation of SOTF ................................................................................. 60
Figure 5.18 –SOTF and faults on adjacent lines .................................................................................................. 61
Figure 5.19 – Permissive Underreach Transfer Tripping..................................................................................... 63
Figure 5.20 – Directional Comparison ................................................................................................................. 63
Figure 5.21 – Permissive Overreach Transfer Tripping ....................................................................................... 64
Figure 5.22 – Directional Comparison Unblocking ............................................................................................. 65
Figure 5.23 – POTT with “echo” and “weak-end infeed” logic .......................................................................... 66
Figure 5.24 – Directional Blocking ...................................................................................................................... 67
Figure 5.25 – Cross-differential protection on double circuit line ....................................................................... 67
Figure 5.26 - Operation of cross-differential protection for a fault in the middle of the line ............................... 68
Figure 5.27 - Operation of superimposed cross-differential protection for a mid-line fault ................................ 69
Figure 5.28 - Simplified CT-equivalent circuit ..................................................................................................... 69
Figure 5.29 - Saturated and normal currents ....................................................................................................... 70
Figure 5.30 - Calculated distance m values with normal and saturated currents ................................................ 71
Figure 5.31 - Mho element phasor diagram showing how CT saturation causes underreach ............................. 71
Figure 5.32 - Alpha Plane (IR/IL) plots of Alpha Plane and conventional differential characteristics ................. 72
Figure 5.33 - Subsidence current from a CT output after the CB poles open ....................................................... 73
Figure 5.34 - Half-cycle cosine filter (50BF) dropout and subsidence detection CBF element (OPHA) ............. 73
Figure 5.35 - CVT circuit ...................................................................................................................................... 74
Figure 5.36 - CVT transients reduce the fundamental voltage magnitude ........................................................... 75
Figure 5.37 - Overreach due to CVT transients .................................................................................................... 75
Figure 5.38 - Voltage and current for a C-phase fault at 64% of line length ....................................................... 76
Figure 5.39 - Apparent impedance seen by the distance protection for the fault at 64% along the line .............. 76
Figure 5.40 - Distance protection performance as a function of SIR ................................................................... 77
Figure 5.41 - CVT transient detection logic prevents distance protection Zone 1 from overreaching ................. 78
Figure 6.1 – AR single shot cycle for a transient fault.......................................................................................... 80
vi
Figure 6.2 - AR single shot cycle for a permanent fault ....................................................................................... 81
Figure 6.3 - Example of a single-pole AR ............................................................................................................. 84
Figure 6.4 - Example of a three-pole AR .............................................................................................................. 84
Figure 6.5 – Synchronism check with alternative voltage sources ....................................................................... 89
Figure 6.6 – Synchronism check operation ........................................................................................................... 90
Figure 6.7 – Impedance trajectories during an unstable power swing ................................................................. 91
Figure 6.8 - Superimposed component element assertion during a power swing ................................................. 92
Figure 6.9 – Power swing detection with continuous impedance calculation ...................................................... 93
Figure 6.10 – Phasor diagram of a two source inductive system ......................................................................... 94
Figure 6.11 – Positive sequence impedance trajectory during a pole slip ........................................................... 96
Figure 6.12 - Pole slip trip disturbance record .................................................................................................... 97
Figure 6.13 - Zero Voltage Tripping Main Function Block Diagram................................................................... 99
Figure 7.1 – Ground fault (phase B) on a 145 km 400 kV line (instantaneous time signals) ............................. 102
Figure 7.2 - Ground fault (phase B) on a 145 km 400 kV line (RMS computed values) ..................................... 102
Figure 7.3 - Ground fault (phase B) on a 145 km 400 kV line (pre-fault and fault phasors).............................. 103
Figure 7.4 - Ground fault (phase B) on a 145 km 400 kV line (apparent impedances locus) ............................. 103
Figure 7.5 - Ground fault (phase B) on a 145 km 400 kV line (fault location estimation, single-ended) ........... 105
Figure 7.6 - Earth fault (phase B) on a 145 km 400 kV line (fault location estimated by the IED) .................... 106
Figure 7.7 - Configuration of a line in a substation ........................................................................................... 107
Figure 7.8 - DLO algorithm functional block ..................................................................................................... 107
Figure 7.9 - Kalman filter elements .................................................................................................................... 108
Figure 7.10 – Fuzzyfication of Active Power and DeltaP ................................................................................... 109
Figure 7.12 – VT MCB Contact utilisation ......................................................................................................... 113
Figure 8.1 – Protection data collection and evaluation system .......................................................................... 117
Figure 8.2 – Remote access media options ......................................................................................................... 117
Figure 8.3 – Direct synchronization ................................................................................................................... 119
Figure 9.1 – Zone 1 Distance Element Using a Dual-Filter Scheme .................................................................. 127
Figure 9.2 – A-Phase Impedance Loop Half- and One-Cycle Combination Logic............................................. 128
Figure 9.3 – m Calculations for a Zone 2 A-Phase-to-Ground Fault ................................................................. 128
Figure 9.4 – Cross-Country Fault ...................................................................................................................... 129
Figure 10.1 – Simplified communications architecture ...................................................................................... 134
Figure 10.2 – Conventional IED analog interface.............................................................................................. 135
Figure 10.3 – Distributed application interface (partial implementation) ......................................................... 136
Figure 10.4 – Distributed application interface (complete implementation) ...................................................... 137
Figure 10.5 – Transfer time definition ................................................................................................................ 138
Figure 10.6 – IEC 61850 GSE based CB failure protection scheme .................................................................. 140
Figure 10.7 – Comparison test setup .................................................................................................................. 141
Figure 10.8 – Results from comparison test........................................................................................................ 142
Figure 11.1 – Fault Location from Device 1 (Ideal=25) .................................................................................... 145
Figure 11.2 – Fault Location from Device 2 (Ideal=75) .................................................................................... 145
Figure 11.3 - Relays exchange synchrophasors for backup line protection in a two-terminal line application . 146
Figure 11.4 - Faulted phase identification logic uses total negative-sequence and zero-sequence fault current147
Figure 11.5 - Negative-sequence current directional element, 32IQ, with current magnitude, channel health,
data integrity, and time synchronization supervision. ........................................................................................ 148
Figure 11.6 - Power system parameters and operating conditions to analyze RF coverage capabilities of the
87LQ, and 67Q elements ..................................................................................................................................... 148
Figure 11.7 - 32IQ, 87LQ, and 67Q element RF coverage for phase-to-ground faults at different line locations
............................................................................................................................................................................ 149
Figure 11.8 - 32IQ and 87LQ RF coverage with 0.05•INOM and 0.1•INOM sensitivity .......................................... 149
Figure 11.9 - FPI, 32IQ, and 67Q operating times for an A-phase-to-ground fault located 30% from the local
end ....................................................................................................................................................................... 150
Figure 11.10 – Cross-country fault ..................................................................................................................... 150
Figure 11.11 – Applications of Device-to-Device Communications ................................................................... 151
Figure 11.12 – Three-Terminal System with Independent Communications Paths ............................................ 152
Figure 11.13 – Breaker and a half substation..................................................................................................... 153
Figure 11.14 – Close-up external fault for breaker-and-a-half busbar configuration ....................................... 154
Figure 11.15 – Double-bus single-CB configuration .......................................................................................... 155
Figure 11.16 – Feeder communications channels routed via a fiber-optic switch ............................................. 156
Figure 11.17 – CB3 bypassed while Feeder 3 is protected by the bus coupler CB (CB1) .................................. 157
Figure 11.18 – Looped station configuration with isolators to facilitate line CB maintenance ......................... 157
vii
Figure 11.19 – Looped station configuration with IEDs and a fiber-optic transfer switch and station bypass
switch open (CB1 and CB2 normal) ................................................................................................................... 158
Figure 11.20 – Looped station configuration with IEDs and a fiber-optic transfer switch and station bypass
switch closed (CB2 out of service) ...................................................................................................................... 158
Figure 11.21 – Vγ is inside the SAED region after the arc extinguishes ............................................................ 159
Figure 11.22 – A-phase voltage phasor enters the SAED region after the secondary arc extinguishes ............. 160
Figure 11.23 – Reclosing relay close supervision using secondary arc extinction detection ............................. 160
Figure 11.24 – Multi-phase auto-reclosing ........................................................................................................ 161
Figure 11.25 – Double busbar arrangement – Common external AR ................................................................ 162
Figure 11.26 – Double busbar arrangement - Main AR with hot standby .......................................................... 163
Figure 11.27 – Double busbar arrangement - Redundant AR, Master/Follower ............................................... 163
Figure 11.28 – Breaker and a half arrangement – Line-line diameter – External AR ....................................... 165
Figure 11.29 – Breaker and a half arrangement. Line-Line diameter. AR/SYN within Main 1 and Main 2 ...... 167
Figure 12.1 – Test system block diagram ........................................................................................................... 170
Figure 12.2 – Testing of transmission line protection IED ................................................................................. 171
Figure 12.3 – Test configuration for analog signal processing and measurement functions tests ..................... 172
Figure 12.4 – Distance characteristic test configuration ................................................................................... 173
Figure 12.5 – Unsuccessful reclosing simulation ............................................................................................... 175
Figure 12.6 – Virtual Testing Tool simplified block diagram ............................................................................. 176
Figure 12.7 – Example settings dialog box ......................................................................................................... 178
Figure 12.8 – Virtual Testing results .................................................................................................................. 179
Figure 12.9 – Locus of Power swing .................................................................................................................. 180
Figure 12.10 – Harmonic filter ........................................................................................................................... 180
viii
LIST OF TABLES
Table 4.1 - Application of Telecommunications Channels to Protection of Transmission Lines .......................... 20
Table 4.2 - Comparison of Telecommunications Channels as Applied to Line Protection ................................... 21
Table 5.1 - Measured values for distance calculation and directional determination. ......................................... 42
Table 7.1 – Hardware self-tests typically performed by protection IEDs ........................................................... 110
Table 7.2 – Software self-tests typically performed by protection IEDs ............................................................. 111
Table 11.1 - Vγ and VΣ Voltages for A, B, and C-Phase SAEDS ......................................................................... 159
ix
ABBREVIATIONS
ADC Analog to Digital Converter
ANSI American National Standards Institute
AR Automatic Reclosing
BBP Busbar Protection
BCU Bay Control Unit
BER Bit Error Rate
BPD Bushing Potential Device
CB Circuit Breaker
CBF Circuit Breaker Failure (protection)
CCITT International Telegraph and Telephone Consultative Committee (English-French
compromise acronym)
CDMA Code Division Multiple Access
CIGRÉ Conseil International des Grands Réseaux Électriques (International Council on
Large Electric Systems)
COMTRADE Common format for Transient Data Exchange
CT Current Transformer
CVT Capacitor Voltage Transformer
DAR Delayed Automatic Reclosing
DC Direct Current
DCUB Direction Comparison Unblocking (teleprotection)
DFT Discrete Fourier Transform
DLD Dead Line Detection
DLL Dynamic Link Library (software file)
DLO Open Line Detector
DR Disturbance Recorder
DSP Digital Signal Processor
DT Definite Time (overcurrent)
DTE Data Terminal Equipment
DTT Direct Transfer Trip
DWDM Dense Wavelength Division Multiplexing
ECO Electrical Centre of Oscillation (power swing)
EHV Extra High Voltage
EIA Electronic Industries Alliance
EMTP Electro-Magnetic Transients Program
FACTS Flexible Alternating Current Transmission System
FDM Frequency Division Multiplexing
FIR Finite Impulse Response (filtering)
FPI Faulted Phase Identification
FREC Fault Recorder
FSC Ferroresonance Suppression Circuit
GOOSE Generic Object Oriented Substation Event
GPS Global Positioning System
HMI Human Machine Interface
x
HV High Voltage
IDMT Inverse Definite Minimum Time (overcurrent)
IEC International Electrotechnical Commission
IED Intelligent Electronic Device – refers to modern numerical multifunction
protection, control and monitoring device
IEEE Institute of Electrical and Electronics Engineers
IIR Infinite Impulse Response (filtering)
IOU Input/Output Unit
IP Internet Protocol
ITU International Telecommunications Union
LAN Local Area Network
LCD Liquid Crystal Display
LD Laser Diode
LED Light Emitting Diode
LES Least Error Squares (filtering)
MCB Miniature Circuit Breaker
MOV Metal Oxide Varistor
MPLS Multi-Protocol Label Switching
MU Merging Unit
NGN Next Generation Networks
N/C Normally closed
N/O Normally open
OOS Out-Of-Step (unstable power swing)
OPGW Optical Ground Wire
PCM Pulse Code Modulation
PDCS Power quality Data Collection and evaluation System
PDH Plesiochronous Digital Hierarchy
PDL Pole Discrepancy Logic
PDN Public Data Networks
PLC Power Line Carrier
POTT Permissive Overreaching Transfer Tripping (teleprotection)
PSB Power Swing Blocking
PSD Power Swing Detection
PSRC Power System Relaying Committee, of the Power Engineering Society of the
IEEE
PSTN Public Subscriber Telephone Network
PT Potential Transformer (see also VT)
PUTT Permissive Underreaching Transfer Tripping (teleprotection)
RAR Rapid Automatic Reclosing
RTU Remote Terminal Unit
Rx Receive
SAED Secondary Arc Extinction Detector
SAS Substation Automation System
SCADA Supervisory Control And Data Acquisition
SCL Substation Configuration Language (IEC 61850)
xi
SCV Swing Centre Voltage
SDT Step Down Transformer
SDH Synchronous Digital Hierarchy
SIR Source Impedance Ratio
SMS Substation Monitoring System
SONET Synchronous Optical Network
SOTF Switch-Onto-Fault
SCV Static VAr Compensator
TIA Telecommunications Industries Association
TDM Time Division Multiplexing
TSO Transmission System Operator
Tx Transmit
VF Voice frequency
VT Voltage Transformer (see also PT)
WAN Wide Area Network
WDM Wavelength Division Multiplexing
ZVT Zero Voltage Tripping
xii
EXECUTIVE SUMMARY
CIGRÉ WG B5-07 was formed to produce a technical brochure on "Modern Techniques for
Protecting and Monitoring Transmission Lines". The scope of B5-07 is to review, describe
and discuss the techniques presently used for protecting and monitoring transmission lines
and discuss advanced technologies for the protection, monitoring and control of transmission
lines. This technical brochure identifies and describes modern techniques including those
that have been developed in modern numerical devices, so called “intelligent electronic
devices” (IEDs) presently used for the protection, control and monitoring of transmission
lines. Modern transmission line protection IEDs include a large number of additional
protection elements, control and monitoring functions, which provide the user with almost
unlimited flexibility to design secure and dependable protection and control schemes.
This freedom of implementation can be an exhilarating challenge to the engineer’s
imagination. This technical brochure addresses subjects related to the reliability of protection
systems; digital relay filtering; applied telecommunication technologies; transmission line
protection; control and monitoring functions; auxiliary functions; integration and data
management; IEC 61850 impact on transmission line functions; application examples;
transmission line protection testing and future trends.
Modern applications for the protection of transmission lines is of big interest to users as
almost all numerical protective relays now give the user the ability to either modify the
existing protection and control logic inside the relay or add specific logic tailored to the user’s
requirements. This advancement in the state of the art has enabled the user to implement a
whole host of tripping, transfer, monitoring and control schemes as part of a custom made
logic inside the main protective relay thus allowing the elimination of external relays, auxiliary
relays, timers, and wiring. Whether they are installed in new substations or as retrofits in old
substations, transmission line multifunctional relays can be successfully applied to satisfy the
protection, control and monitoring requirements and the choice of implementing those
modern features depends largely on the power system operating requirements, and the user
comfort level with modern transmission relays.
There are virtually no limits on the variety of new protection schemes that can be designed
to satisfy specific application requirements. A major challenge for the protection engineer is
to balance the ability to provide adequate redundancy of functions against the requirement
to “keep the system simple”.
Issues and examples impacting dependability is discussed in section 2 of the brochure.
Section 3 reports on digital relay filtering design characteristics where the requirements
depend on the protection principles and applications. Frequency measurement and tracking
methods are also discussed. Section 4 discusses the application of telecommunications for
transmission line protection and compares in a tabulated form advantages and
disadvantages of various telecommunication channels, as applied in transmission line
protection schemes. Section 5 is a detailed topic discussing all the benefits arising from the
implementation of protection functions in modern IEDs. Improvements, as compared to older
versions of transmission line protections, are covered together with other additional functions
used in one modern protection device. Section 6 covers the various aspects of control
functions applied in transmission lines whereas section 7 of the technical brochure
completes the monitoring and supervision functions that are associated with the scope of the
brochure. Auxiliary functions, such as equipments for local and remote access of IEDs, are
provided as a topic in section 8, which elaborates on tools for executing power system
appraisal and system operation benchmarking. Section 9 deals mainly with integration and
data management in protection and control applications. Section 10 of the brochure is
related to the impact of IEC 61850 on transmission line protection and gives the basic
substation and communication architecture in a process bus based environment. Application
examples of improved protection and control schemes have been documented in this
xiii
brochure in section 11 and covers topics in the areas of increased numbers of protection
zones; fault location in transmission line IEDs; synchrophasor-based transmission line
backup protection; communication-aided phase selection and blocking of high-speed auto-
reclosing for circuit breaker failure or out-of-synchronism conditions in parallel lines;
maintaining high-speed tripping in the event of one-channel loss and loss-of-communication
channel for line differential application in three terminal lines; breaker-and-a-half and double
bus arrangement for auto-reclosing. Another application example in monitoring the status of
terminal components for the purpose of modifying protection schemes, such as for circuit
breaker bypassing conditions is also given in this brochure.
In the area of transmission line protection testing, section 12 covers many testing issues in
conventional and virtual testing applications with examples. Finally section 13 is specifically
designated to future trends and gives the opinion of working group members in all areas of
protection, control and monitoring issues that were covered in the report.
To summarize, multifunction digital relays that perform protective, control and monitoring
functions offer unique challenges to the user. Multifunction relays have protective functions
that interact with each other, making testing more complicated. They can also be
programmed to do control logic, which is usually verified along with the protection logic
during commissioning. In addition, digital relays can have multiple setting groups that may
be switched to address varying system conditions. This flexibility increases the
commissioning complexity. Due to the additional complexity it is important for the user to
fully understand the schemes and how they interact. The simple testing of one integrated
protection element in an IED could trigger an undesirable operation of a breaker failure
scheme. The documentation of the schemes is very important and those who test the relays
have to completely understand the behaviour of a system.
Different technologies have been successfully used for decades but modern numerical
relays perform many functions other than protection. An attempt has been made by WG B5-
07 members to provide a detailed coverage of protection, monitoring and control of
transmission lines. This technical brochure of more than 200 pages offers unprecedented
valuable information for engineers and technologists at all levels of experience which can
benefit both the industry and utilities.
xiv
1 SCOPE AND INTRODUCTION
1.1 SCOPE
The scope of B5-07 is to review, describe and discuss the techniques presently used for
protecting and monitoring transmission lines. The scope extends to review the techniques
used for protecting transmission lines including those that have been developed in modern
numerical devices, so called “intelligent electronic devices” (IEDs), and discuss advanced
technologies for the protection, monitoring and control of transmission lines. This report
identifies and describes modern techniques presently used for the protection, control and
monitoring of transmission lines
Modern transmission line protection IEDs include a large number of additional protection
elements and control functions, which provide the user with almost unlimited flexibility to
design secure and dependable protection and control schemes. Traditional pilot relaying
schemes require separate protection and monitoring devices with costly external
communication equipments. Transmission line IEDs integrate many flexible protection,
control and monitoring features including communications functionality within the same
hardware and provide device-to-device digital communications for high-speed line protection,
monitoring, and control. Novel, more secure and dependable protection, control and
monitoring applications are now possible with transmission line IEDs including the relay-to-
relay communications capability. In this technical document, modern transmission line
protection, control and monitoring applications of this technology are reported in protection
design.
1.2 INTRODUCTION
Whereas transmission line IEDs offer a significant number of functional improvements over
previous generations and technologies, the state of the art of transmission line protection,
with its multifunctional integrated capability, provides an unprecedented flexibility in line
protection principles, control and monitoring schemes including fault location techniques. The
improvements in line protection performance are viewed in terms of fault discrimination
techniques and fast fault elimination time, protection selectivity, increased backup principles,
improved measuring algorithms, improved directional discrimination techniques, etc. These
enhancements are considered from a technical perspective but other benefits are directly
related to cost due to substantial reduction of equipment assemblies, wiring and
maintenance.
Control, metering, fault location, disturbance and event recording, maintenance and
monitoring are some of the many additional functions that are also provided in the same
numerical distance device. This technical brochure discusses protection, control and
monitoring features in transmission line IEDs.
1
2 RELIABILITY, SENSITIVITY & SPEED
A protection function will characterize faults so that it may distinguish between conditions
which it defines as internal faults, for which it should operate; and conditions which it defines
as external faults, or indeed healthy operation, for which it should not operate.
The security of a protection system is its tendency not to operate for non-fault or out-of-zone
fault conditions beyond the limit of the particular protection function’s strictly internal fault
definition.
The dependability of a protection system is its tendency to operate correctly for internal faults
from its most sensitive operating levels up to the strictly external fault definition limit of the
particular protection function. Furthermore, failure to rapidly clear internal faults impacts on
localized power quality and may result in loss of system stability.
The particular method of fault characterisation will invariably give rise to a set of operating
characteristics which lie between the strict internal and external fault/healthy operation
definitions, and which are therefore ambiguous. It is desirable that a protection function
should have both secure and dependable aspects; however, it is the function’s behaviour
when presented with ambiguous conditions that will categorise it overall as either secure or
dependable.
Limit of External Fault
Limit of Internal Or Healthy Condition
Fault Def inition Definition
0%
Maloperation
Secure Operation
100 %
System Conditions
Whereas many protection devices will offer an extensive suite of protection functions from
which to select; this is primarily driven by the need to minimise the number of device variants
whilst maximising the number of applications for which the device is acceptable. There is a
risk with “à la carte” function selection that the choice of functions may tend towards the
arbitrary, rather than following critical assessment of the relative dependability and security of
the various protection functions in the context of the hardware with which they are intended
to interact (e.g. Instrument transformers, circuit breakers (CB), power supply segregation,
communications media interfaces, etc.). In most cases, the dependability, security, sensitivity
and speed characteristics of a device’s “featured” functionality can be either enhanced or
completely undermined by the physical implementation.
Thus, the overall reliability of a protection scheme is determined not only by the inherent
dependability and security characteristics of the protection functions applied; but also by the
2
quality and physical aspects of the scheme; the variety and choice of functions applied and
the degree of physical and functional redundancy.
2.1 DEPENDABILITY
Failure of a protection system to clear a fault within its primary protection limits has the effect
of exposing the system to longer fault durations than are necessary, and more extensive
tripping of plant due to the operation of remote backup protection. This has a direct impact on
localized power quality and potentially on the stability of the power system. Therefore the
application engineering of the protection system should attempt to maximize its
dependability.
In addition to the fundamental dependability of the protection function, the dependability of
the overall protection system can be increased by maximizing system availability through the
elimination or mitigation of single points of failure. This may be achieved through the use of
device self-monitoring; circuit and measurement supervision; through the use of device,
circuit and functional redundancy; and power supply segregation between the device
auxiliary power and the various command applications.
When using integrated backup functions such as CB Failure protection, consideration should
be given to functional segregation by the use of dedicated contacts and command path for
the re-tripping of the failed CB, which are separate to the normal trip command contacts and
trip command path.
2.1.1 AVAILABILITY
Whereas one of the most significant benefits of modern numerical protection is the device’s
ability to self-monitor and to diagnose internal failures or discrepancies. Any associated
improvement in device availability is contingent upon its ability to annunciate any such
signals, so that they may be acted upon. As a minimum, a device summary “healthy status”
signal should be continuously monitored.
Supervision of the device analog measurements may increase the system’s security due to
the blocking of protection functions for loss of, or discrepancies in, certain measurements;
however, the annunciation of any measurement supervision alarms permits resolution of the
cause of the problem increasing availability.
2.1.2 REDUNDANCY
Two separate protection devices may be applied locally, each as “duplicate main protection”,
which are intended to operate independently of each other providing primary and, as
appropriate, remote backup protection. This achieves physical redundancy, which can be
further improved if both devices are powered from at least segregated power supplies of the
same substation battery, but preferably from separate batteries.
Backup protection is intended to operate only when the primary protection fails, and may
consist of an integrated function in the same device which is either time delayed with respect
to the main protection or conditionally released upon the blocking of the main protection (e.g.
overcurrent released for voltage supervision blocking of distance protection).
Trip circuit supervision identifies open circuits or loss of supply on the trip command circuit
(i.e. due to a short circuit, etc.) However, monitoring of a failure is not as beneficial as
offering a physical alternative. Therefore, operation by the same device of 2 separate trip
coils of the CB using separate contacts and field supplies increases the general availability of
the protection in spite of loss of a field supply (but not where the loss of the field supply
would otherwise block the protection, e.g. when it is used by distance protection to monitor
the voltage transformer (VT) miniature CB (MCB) status). This methodology may also be
applied without loss of security to duplicate protection schemes.
3
2.1.3 ISSUES IMPACTING ON DEPENDABILITY
The use of intermediate devices for communications or between the device and its monitored
or controlled process introduces additional failure modes and time delays which may reduce
dependability (e.g. use of auxiliary relays, external teleprotection interface devices, etc.).
Example 1
When using a separate electrically actuated teleprotection interface device, rather than an
integrated interface on the device, the intermediate electrical stage between the protection
and communication devices introduces the possibility of spurious binary transmit or receive
commands. This should be considered when applying the “echo only” or “echo with trip”
features of directional comparison or permissive overreaching teleprotection schemes, even
where the latter option is voltage supervised.
Example 2
Current transformers (CT) which are not suitably rated in terms of the DC offset, short circuit
current, DC offset and associated X/R ratio, the protection decision time, and functional CB
duty (i.e. trip only or trip-close-trip); may saturate resulting in non-operation of the protection.
2.2 SECURITY
The motivation for security is the requirement to minimise the number of incorrect protection
operations and their impact on power quality, supply continuity and system stability.
Functional security can be improved by the use of multiple operating or supervisory criteria,
such than more than one condition must be fulfilled before a trip command is released;
however, this will also reduce the dependability of the supervised function.
2.3 SENSITIVITY
Sensitivity is the measure of the ability of the protection function to detect faults, either with
low primary quantities, or with small deviations from the healthy state.
The sensitivity is determined, not only by the minimum setting and resolution of the
protection function, but also by the resolution and operational measuring range of the device
analog to digital converters (ADC); and by the accuracy class and ratings of the instrument
transformers.
Manufacturers are increasingly removing restrictions on settings which would previously
have been limited to “reasonable” or plausible values. This places a greater onus on relay
setting engineers to ensure sensitivity consistency between the protection function, any
supervisory element, and with analog measuring system.
2.4 SPEED
Prolonged exposure to system voltage dips arising from slow fault clearance is a significant
power quality issue. Furthermore, on critical feeders, such slow clearance may impact on
power system stability. Therefore in general, protection functions and application designs
which offer improved time performance are to be preferred.
In addition to the speed performance of the protection function, there may also be options on
the device to use binary outputs with different operating times. However, the making duty (at
least) should also be considered when selecting contacts. The highest speeds are available
on reed-relay contacts, with negligible making duty, and which therefore should not be used
for tripping; and solid state (e.g. FET) output contacts with moderate making duty. It may be
4
necessary with this latter output type that the contact may have to be connected in parallel
with a slower “general purpose” binary output to achieve the required making duty.
In general, the declared fastest device operating times will be for optimal conditions; for
significant current magnitudes and for the fastest available output contact. Distance
protection zone 1 non-delayed operation will tend to slow up approaching the zone reach
limits; similarly for differential protection at the boundary of its operating characteristic.
Care should be taken not to undermine the application of high speed protection functions
through the application of time delaying components in the overall trip command path.
Security may be compromised by increased speed of operation. E.g. voltage supervision or
the operation of VT MCBs may not be sufficiently fast to block high speed distance protection
from tripping in the event of loss of voltage measurements.
5
3 DIGITAL RELAY FILTERING
Protective IEDs must filter their inputs to reject unwanted quantities and retain signal
quantities of interest. Distance protection IEDs, for example, have critical filtering
requirements because they must make precise measurements quickly, even with corruption
from DC offsets, CVT transients, travelling wave reflections, and other interference.
Filtering requirements depend on the protection principle and application. In almost all
protective IEDs, the system frequency components are the information, and everything else
represents interfering signals. Among the exceptions are transformer differential IEDs, using
harmonic restraint; and peak-sensitive voltage IEDs, which may need to detect off-frequency
signals.
6
The shorter the impulse response of a filter, the faster the device becomes. Longer impulse
responses have narrower frequency responses. The one-cycle cosine filter has zeros at DC
and at the harmonics of the system frequency. Rejection of the even harmonics is lost with a
half-cycle filter. The time-response graph for impedance protection using the half-cycle
cosine filter in Figure 3.2 shows the penalty for increasing speed, which is poor transient
response. The half-cycle filter does not have the double-differentiator property and, therefore,
has a poor ability to reject exponentials. The impedance-plane trajectory spirals, indicating
severe overreaching.
0.8
Zone One Element Operating Time (Cycle)
0.7
0.6
0.5
Analog Low-Pass Filter Cutoff = 22 • (Sample/Cycle) Hz
0.4
One-Cycle Fourier Digital Filter
0.3
Fault Location m = 0.0
0.2
.01
0
0 5 10 15 20 25 30 35
Sampling Rate (Sample/Cycle)
5
IMAG Impedance X, (Ohms)
Prefault
o o
Postfault
0
0 2 4 6 8 10
Real Impedance R (Ohms)
R (Ohms)
7
Time domain simulations are used to investigate filter transient performance, such as
overreaching and settling time, and to study time-variant filters. Filter simulations also
confirm the filter steady-state properties. The filter simulations must be as simple and basic
as possible, in order to get useful and clear results efficiently. The simulation environment
must be controllable so that different desired filter properties can be unveiled clearly and
separated. Simple power system simulations using MATLAB® and EMTP, for example, can
provide fault voltages and currents to help probe the filter’s ability to reject exponentially
decaying DC offsets, high-frequency transients, and harmonics.
A typical system model used to evaluate digital filters is shown in Figure 3.3. The model
includes analog low-pass filters, an analog-to-digital conversion stage, digital filters, and
impedance calculation.
Vreal
Voltage Analog
Digital
Low-Pass
Filter
Filter
Vimag
Analog-to-
Impedance
Digital
Calculation
Conversion
Ireal
Current Analog
Digital
Low-Pass
Filter
Filter
Iimag
The impedance is a complex value and its calculation requires the voltage and current
phasors or their real and imaginary parts. Phasors can be obtained by two different methods.
One is through an orthogonal filter pair, such as the sine and cosine Fourier filter. When
filtering a signal, the filter pair simultaneously gives two filtered outputs with a 90º phase shift,
which constitutes the real and imaginary parts of a phasor. Alternatively, the present and the
quarter-cycle earlier outputs of one filter are 90º apart. One filter plus a quarter-cycle delay is,
thus, another way to get the voltage and current phasors.
The orthogonal filter pair method might be expected to be a quarter-cycle faster than the filter
plus delay method. However, this is not necessarily true because the orthogonal filter pair
method filters a quantity twice to get a phasor and requires twice as many calculations.
FIR filters with less than a one-cycle window cannot reject all harmonics. In fact, it is usually
the lower harmonics (second and third) which are lost first when shortening the window. For
this reason, the discussion shall be limited only to one-cycle-window FIR filters. The analog
low-pass filter used in the evaluation is a second order Butterworth with a cutoff frequency of
360 Hz. A sampling rate of 16 samples per cycle was used to evaluate and compare two
digital filters, namely cosine and Fourier filters.
The cosine filter has its coefficients evenly sampled from a cycle of a cosine waveform. The
cosine filter is a differentiator, a property that is essential to effectively reject exponentially
decaying DC offsets. The cosine filter’s frequency response, shown in Figure 3.4, shows that
the filter rejects exactly all harmonics and has a band-pass filtering property.
The imaginary part of voltage and current phasors comes from a quarter-cycle delayed filter
output. From the start of a fault, it will take one cycle for the fault to fill the filter and a further
quarter-cycle delay to complete the quadrature component. The worst-case filter speed is,
therefore, one and a quarter cycles.
8
Filter Coefficients (Impulse Response)
+ o o +
+
+ o o +
+
o + o +
+
o + o +
+
+
0
+ o + o
+
o : Sine Filter + o + o
+
+ : Cosine Filter + + o o
+
+
+ + o o
+
+
2 4 6 8 10 12 14 16
Samples
Frequency Response
1
Cosine Filter
0.5
Sine Filter
0
0 1 2 3 4 5 6 7 8
Frequency (Harmonics)
Figure 3.5 shows an impedance plot calculated with the cosine filter.
3
o : Integer Cycle Points
2
o Prefault
1 o o
Zoom Area
0
0 2 4 6 8 10
Real Impedance R (Ohms)
R (Ohms)
9
takes a long time to settle. After one and three-quarters cycles, the Fourier filter still has 10%
overreaching and underreaching. In contrast, the cosine filter has less than 2% impedance
variation after one and a quarter cycles. Therefore, the cosine filter is faster and more
accurate than the Fourier filter whenever DC offsets accompany fault currents.
Prefault
oo
o o : Integer Cycle Points o
Zoom Area
0 2 4 6 8 10
Real Impedance R (Ohms)
R (Ohms)
1.15
Fourier
1.1
Cosine
IMAG Impedance X, (Ohms)
1.05
oo +
+
1 o o
o
.95
.9
+
+
.85
–0.1 –0.05 0 0.05 0.1 0.15 0.2
Real Impedance R (Ohms)
Across the range of fault incident angles, there are precisely two points where a fault does
not cause any DC offset. A fault incident angle greater than 10º from these two points will
cause transient overreaching and underreaching of the Fourier filter. In order to remedy this
effect, devices using a Fourier filter may also include a digital mimic filter to remove the DC
component from the current signals.
10
the frequency characteristic of the resulting phasor estimator may be worsened. The key
feature of a digital mimic filter is its significant robustness to the actual value of the time
constant. The coefficients of the filter can be optimized taking into account the time constant
of the protected line.
Figure 3.8 - Effect of mimic filter followed by a full cycle Fourier filter
It can be seen in Figure 3.8 that the result of a Discrete Fourier Transform (DFT), without the
digital mimic filter, is oscillatory during the first few cycles, due to the exponential DC
component of the current. The use of the digital mimic filter removes this oscillation,
improving the obtained measurement.
The result of a half-cycle DFT after a mimic filter is shown in Figure 3.9. The result of the
DFT, without the mimic filter, is worse than that in Figure 3.8. An improvement in the speed
of the phasor estimation can be obtained using a digital mimic filter.
Figure 3.9 - Response of a mimic filter followed by a half cycle Fourier filter
11
3.5 LEAST SQUARES FILTERING
Least Error Squares (LES) technique [2] may also be used for estimating the phasors of the
fundamental and harmonic frequency components of voltages and currents. It is based on
minimizing the sum of the squares of the errors between the actual and assumed waveforms.
The voltage and/or current waveform can be modelled as a combination of the fundamental
frequency component, an exponentially decaying DC component, and harmonics of specified
orders (this assumption ignores the presence of higher frequencies that are, in most
applications, are eliminated by the anti-aliasing filters).
The magnitude responses of the LES technique that uses 13 samples taken at intervals of
30o electrical are as shown in Figure 3.10.
1.4
Cosine filter
1.2
Sine filter
1
Magnitude
0.8
0.6
0.4
0.2
0
0 60 120 180 240 300 360
Frequency ( Hz )
The leakage at off-harmonic frequencies is more in this case than for the DFT. However, the
overall frequency response is not much worse because anti-aliasing filters are also used in
the devices.
12
frequency tracking limits and tracking speed (time constant); and the type of polarizing
memory that, for example, the impedance element uses.
Distance protection IEDs may use sophisticated frequency tracking algorithms. This is
particularly true for single-pole tripping relays where no single voltage is a good choice for a
frequency-tracking signal. During single-pole tripping, particular phases may be de-energized
and their voltages may be severely distorted by transients related to shunt reactors. Under
pure zero-sequence injection, the frequency signal can “zero out”, thereby preventing the
IED from measuring and tracking the frequency.
The first step of frequency tracking is to measure power system frequency. Different
frequency measurement algorithms exist [3]. Several methods can be used for tracking
frequency. The object is to estimate the frequency and use it in making accurate decisions
for protecting lines and other equipment. Out of the many techniques that are available for
measuring frequency, zero crossing and phasor tracking techniques are described in this
section. The issue of frequency tracking is then discussed.
This method is susceptible to spurious zero crossings, therefore it is necessary that the input
waveform be pre-filtered using either a low-pass or a band-pass filter. If implemented in
software, the method requires that the time of a zero crossing be estimated from the
timestamps of the samples in its vicinity as shown in Figure 3.11, except when the samples
are taken at the rate of tens of thousands per second.
This method usually requires additional post filtering, such as averaging several consecutive
measurements; or applying a nonlinear filter, such as the median filter, to cope with the
13
spurious zero crossings. Another solution is to apply validation equations that would reject a
measurement if its value differs dramatically from the previous valid frequency estimate.
Another issue that concerns this approach is the interaction between the frequency estimates
and frequency tracking mechanisms. If the frequency-tracking mechanism adjusts the
sampling frequency, an error may be introduced in a subsequent frequency estimate. The
safest solution for the zero-crossing detection algorithm is to use timestamps of the samples
instead of the sampling frequency, because it may change between the two zero crossings.
Signal
t1 t2
Time
Voltages are a good choice for zero-crossing measurements because they have healthy
magnitudes and minimum harmonic contents. For current only IEDs, proper filtering and
smoothing for zero-crossing measurement of the currents must be used. The advantage of
using a combination of all three phase quantities is that the measurement during loss of one
or two phases, such as in a single-pole open condition, can still be obtained. Whereas a zero
crossing is only available every half cycle; frequency measurement using a single-phase
input cannot be faster than half a cycle. Measuring simultaneously on all three phases
accelerates the frequency measurement to as fast as one zero-crossing every 1/6 of a cycle
[4].
As per the phasor calculation, components of voltages and currents other than the sinusoidal
quantity degrade the accuracy of the zero-crossing measurement. These components
include harmonics, white noise, and exponentially decaying DC; of which the DC component
has the greatest impact on the zero-crossing measurement. Prior to the zero-crossing
measurement, proper pre-filtering such as low-pass and cosine filters can attenuate these
components. In this situation, the cosine filter reduces harmonics rather than rejecting them
completely, because the cosine filter coefficients are not synchronized at the input frequency.
Post filtering also improves frequency measurement. The most common type of this filtering
is a simple low-pass averaging filter which measures several zero-crossings and averages
them before calculating the frequency. One ingenious “averager” is the so-called Olympic
filter. With several measurements, the Olympic filter rejects the largest and the smallest
samples before averaging the remaining samples.
While improving frequency measurement accuracy, the pre- and post-filtering processes
delay the measurement. Too much delay can open a window within which the phasor
calculation can be sufficiently inaccurate to impact on the performance of the protection
elements. As with designing protective element filtering, a balance must be struck between
frequency measurement accuracy and speed.
14
3.6.2 PHASOR-BASED METHODS
The voltage and current phasors, estimated from quantized samples by using the protection
algorithms, rotate at their radian frequency as shown in Figure 3.12. This feature allows for
the measurement of frequency from consecutive estimates of the phase angles. The generic
equation for this method is as follows:
1 dϕ
ƒ (t ) = (3.2)
2π dt
Im
t2
Phasor
Rotation
ϕ2
t1
ϕ1 Re
This method is applied in different forms. The variations include the use of differences in
phase angle over different time spans; use of different phasor estimation techniques; use of
different signals such as phase voltage or positive-sequence voltage; and use of different
techniques for filtering the calculated estimates.
This method can update the frequency estimate with each new calculation of the phasor of a
voltage or current. Theoretically, this can be done several times per cycle by using the
voltages and currents and their combinations. The faster the method of estimation, the higher
the susceptibility to estimation errors.
The interaction between the changes in sampling frequency and the frequency estimates
may create some problems. The Fourier transform and several other techniques assume a
constant sampling rate. Should the sampling frequency change from its nominal value, the
number of samples in the data window would not span an integer number of periods of the
signal. This would cause errors in the phasor estimates that would result in errors in the
frequency estimates. Strategies to deal with this problem include a method that adjusts the
length of the data window according to the actual frequency so that the window always
covers exactly one period. This approach keeps the length of the data window fixed but
dynamically adjusts the digital filters to follow the actual frequency; changes the sampling
rate so that the data-window is always integer number of periods; and uses a software re-
sampling approach that recalculates the values of the samples before estimating the
phasors.
Other algorithms for estimating power system frequency include linear regression with
adaptive online readjustment of the input filter; least error squares technique; a Newton-type
algorithm; and a Kalman filter-based approach.
15
The goal of frequency tracking is to modify the phasor estimation process in such a manner
that the phasor estimates remain correct even if the system frequency deviates from its
nominal value. A simple correction for the frequency error is not possible because the error
changes with time. Conditions that usually affect the frequency tracking are noise, spurious
zero-crossings, fast frequency changes, sub-synchronous oscillations, and power swings.
1.2
Off-Nominal Frequency
Momentary Overestimation
1 Estimated Magnitude Oscillates Between
the Upper and Lower Envelopes
Momentary Underestimation
0.8
Gain
0.6
0.4
0.2
0
50 100 150 200 250 300 350
Frequency (Hz)
Two methods are described in this section. The first method calculates the phase difference
from the instantaneous values of the signals, and the second method calculates the phase
difference from the calculated phasors.
16
Time Tag = 345 (µs)
V2
ϕ1 ϕ2
17
3.8 REFERENCES
[1] E. O. Schweitzer, III and D. Hou, “Filtering for Protective Relays,” in 1992 19th Annual
Western Protective Relay Conference Proceedings.
[2] M. S. Sachdev and M. A. Baribeau, “A New Algorithm for Digital Impedance Relays,”
IEEE Transactions on Power Apparatus and Systems, Vol. 98, No. 6, 1979, pp. 2232–
2240.
[3] Advancements in Microprocessor Based Protection and Communication, IEEE Tutorial
Course. Piscataway, NJ: The Institute of Electrical and Electronics Engineers, 1997.
[4] D. Hou, “Relay Element Performance During Power System Frequency Excursions,” in
2007 34th Annual Western Protective Relay Conference Proceedings.
18
4 APPLIED TELECOMMUNICATION TECHNOLOGIES
The provision of telecommunications facilities is indispensable for realising the full
performance and functional capabilities of modern systems for the protection and monitoring
of transmission lines. The application of telecommunication technologies to this field can be
divided into two main categories as follows:
• To provide the data link between transmission line protection terminals operating in
communication-aided protection schemes, i.e. teleprotection.
• To facilitate remote access to data which has been measured or stored by
transmission line protection and monitoring equipment.
These two differing requirements have generally been met by separate communication
systems and will be described separately in this chapter.
19
Application Pilot wires Voice Power line Optical Microwave Spread PDH SDH/SONET
frequency carrier fibre radio spectrum Networks Networks
channel radio
Analog Current
comparison differential (Analog (Analog (if latency and
No
protection devices. devices. Not (if latency delay
experience
schemes Digital types Digital types recommended requirements asymmetry
reported
need special need special are met) requirements
interface) interface) are met)
Phase No
comparison (Analog (Analog (Analog devices experience (as current
(as current diff)
devices only) devices only) only) reported diff)
Charge No
comparison experience (as current
(as current diff)
reported diff)
Distance Permissive Need to signal
protection underreach (using audio through fault
state (PUTT) tone point may reduce
comparison equipment) dependability
schemes Accelerated
underreach As PUTT
(As PUTT)
(AUTT)
Permissive
overreach As PUTT
(As PUTT)
(POTT)
Blocking
overreach (BOP) (As PUTT)
Unblocking
overreach
(As PUTT)
(DCUB)
Direct intertripping
As PUTT
(As PUTT)
20
Channel Advantages Disadvantages
Metallic pilot - Ease of application - Low bandwidth
wires - Limited line length
- Highly susceptible to induced voltages
and earth shift voltage during power
system faults
- Susceptible to induced noise from
other channels
VF circuits - Well suited to analog-type - Not suited to digital protection
relays - Susceptible to induced noise from
other channels
Power line - Long distances achievable - Low bandwidth
carrier (100’s of km) - Not suitable for current differential
- Complete link controlled by protection
power company, little danger of - Susceptible to disturbance during
re-routing or switching power system faults
- Complexity of coupling equipment
Optical fibre - Very high data rate - Relatively difficult to handle
- Relatively long distance (up to - Dedicated link often not justifiable for
100km) protection purposes due to cost.
- Immune to interference - Very long lines need repeaters.
- Inherent isolation
- Low bit error rate
Microwave - Very high data rate - Susceptible to signal degradation
radio - Largely free from disturbance during poor weather conditions
during power system faults - Adversely affected by line-of-sight
obstacles and signal reflections
- Relatively high cost
- Restricted availability of licensed
frequency bands
- Towers susceptible to lightning strikes
Spread - No licensing requirements - Relatively unproven technology as
spectrum radio - Moderate cost applied to protection systems
- Shared nature of the medium may
have unacceptable implications for
reliability.
- Affected by obstacles, reflections and
weather conditions similarly to
licensed microwave links
Tele - - Widespread availability of - Rented channels may be subject to
communication public networks switching, re-routing and other
networks - Suitable for very long undesirable interference without the
transmission lines utility’s knowledge.
- Low bit error rate - Channel latency may change
- Recovery from route failures is unexpectedly and asymmetrical
rapid and often automatic delays in SDH / SONET networks
- Largely free from disturbance may cause incorrect protection
during power system faults operation
- Introduction of new technologies by
the service provider may result in
undesirable changes in channel
performance
- Utility-owned networks are expensive
to establish and maintain.
21
A related application of telecommunications is in the field of fault location. Fault location
systems, including protective IEDs with integral fault location functions, which utilise data
sampled at all terminals of a transmission line are able to achieve a greater degree of
accuracy than single terminal methods. This is because multiple-terminal methods are able
to minimise the effects of factors such as fault resistance and line loading which adversely
effect single-terminal methods. In order to achieve multiple-terminal fault location, a
telecommunications link is required to transfer sampled current and voltage data between the
terminals. A detailed analysis of fault location for transmission lines, including multiple-
terminal techniques, can be found in [4].
22
Each type of telecommunication link has its own characteristics in terms of its suitability for a
given application; and those which typically need to be considered are as follows:
• Maximum length
• Propagation delay, and related issues of delay symmetry and variation
• Data rate / bandwidth
• Susceptibility to electromagnetic noise
• Susceptibility to interference during power system fault conditions
• Typical Bit Error Rates (BER)
• Network related issues (re-routing, addressing, security, quality of service)
The main types of communication media, as applied to transmission line protection, are
discussed in the following paragraphs.
23
considered for use over PLC. However, caution must be exercised when applying PLC
teleprotection systems, since signal quality tends to be adversely affected by the high noise
levels experienced when a line fault occurs, and also during operation of CBs and line
isolators.
Another issue to be considered when applying PLC systems is the additional signal
attenuation that occurs during a power system fault. Permissive inter-trip schemes and
analog comparison protection systems are required to signal through the fault point and
therefore tend to be adversely affected by this phenomenon.
TX RX
Core
Cladding Typically 1mm plastic
Multimode graded index
TX RX
50 or 62.5µm glass
Single mode
TX RX
8-10µm glass
In multimode stepped index fibre, light is guided along the core by multiple reflections at the
core boundary. The reflections cause pronounced dispersion of the transmitted signal and
stepped index fibre is consequently very limited in terms of the bit rate and transmission
24
distance that can be achieved. Multimode graded index fibre achieves lower dispersion by
using a core material with a variable refractive index. Light is refracted by an increasing
amount as it approaches the core boundary, causing it to bend smoothly rather than
reflecting abruptly off the cladding. These fibres also have limited usefulness in direct end-to-
end teleprotection applications because of their limited range of typically 1 or 2 km. However,
they are commonly applied in line protection applications for short runs across the substation
to connect the protection device to a telecommunications network multiplexer (see 4.1.2.2).
Core diameters of 50 µm and 62.5 µm are common for multimode graded index fibre, with
125 µm cladding, the fibres then being classed 50/125 µm and 62.5/125 µm types.
In single mode or mono mode fibre, the core diameter is approximately equivalent to one
wavelength (typically 8-10 µm) and light propagates along a single, dispersionless path,
enabling data rates of some gigabits per second to be achieved. Single mode fibre is
commonly applied, using more expensive LD transmitters, for direct end-to-end line
protection applications, supporting transmission distances of tens of km over 9/125 µm or
10/125 µm fibre. Optical repeaters or amplifiers are required for very long transmission lines
of hundreds of km.
Infrared light, at certain optimal wavelengths, is generally used. Fibre absorption is minimal
for 1550 nm light and dispersion is minimal around 1310 nm. These are consequently the
wavelengths used for longer distance applications, often with LD transmitters. A local
absorption minimum occurs at around 850 nm, a wavelength for which low cost transmitters
and receivers can be designed, and this wavelength is often used for short distance
applications with multimode fibre. The speed of light in fibre is around 200000 km/s, or 70%
of that in air, giving a propagation time of approximately 50 µs for a 10 km run of fibre.
The actual distance that can be covered by a particular fibre optic link depends on the types
of transmitter and receiver module provided at either end and on the type of link used. It can
be determined by carrying out an optical budget calculation, which takes into account the
optical transmitter power, the receiver sensitivity, the losses per km of fibre, and any other
losses caused by connectors and fibre splices.
There are various types of connectors used to terminate optical fibres which differ in their
dimensions and method of mechanical grip. The most common types are denoted LC, FC,
ST and SC. Fibres can be connected together either by the use of connectors or by splicing
their ends together.
The provision of dedicated fibre optic links is very attractive for line protection applications
because of the advantages mentioned previously. Furthermore, they provide low and
consistent propagation delays. However, the cost of dedicated links often cannot be justified
due to the apparently inefficient use of bandwidth by the relatively low data rates required by
protection equipment.
The cost of multiplexed links, where the fibre connections are shared by a number of
applications may be easier to justify. Time Division Multiplexing (TDM), whereby signal
channels from different applications are interleaved in time slots, has been most commonly
applied in the field of line protection communication. The available bandwidth is divided into
64 kbit/s channels, each of which typically use an 8-bit A/D conversion at a sampling rate of
8 kHz; the digital equivalent of a traditional voice channel. The transmitted signal is known as
a Pulse Code Modulated (PCM) signal, and hence the current differential IEDs designed to
operate over this type of link are often referred to as PCM relays.
Wavelength Division Multiplexing (WDM) is an increasingly widely used technique in fibre
optic systems, in which channels are stacked at different wavelengths within a single fibre.
The most advanced systems apply Dense Wavelength Division Multiplexing (DWDM) to
enable a very large number of channels (typically 40 or 80) to be carried by a single link,
enabling data rates in the Tbit/s range to be realised.
A more detailed description of multiplexing techniques can be found in [1].
25
4.1.1.4 MICROWAVE RADIO
Microwave radio channels have been established by various utilities for a number of different
purposes, including protection signalling, and they have the significant advantage of being
relatively immune to interference generated by the power network. They operate in the
frequency range between 400 MHz and 40 GHz and can achieve transmission distances up
to 100 km without the need for repeaters. Modern systems are generally digital and highly
bandwidth-efficient. Time Division Multiplexing (TDM) is routinely applied to combine a
number of digital channels onto an aggregate data stream.
Microwave radio systems are susceptible to signal degradation due to adverse weather
conditions or the presence of obstacles, and suffer multi-path fading as a result of reflections.
Microwaves travel at the speed of light in air, resulting in faster propagation times than those
achieved with optical fibre, typically 33 µs for a 10 km link.
26
differences between clock signals have to be accommodated by “bit-stuffing”, a process
known as plesiochronous, or sometimes asynchronous, multiplexing. The higher-order rates
are called the plesiochronous digital hierarchy (PDH).
PDH networks have proven to be well suited to the requirements of line protection. Whereas
PDH networks are circuit switched (i.e. with a fixed path through the network assigned for
each connection); and are based on time division multiplexing (see 4.1.1.3), they achieve a
constant bit rate and low jitter. The end-to-end propagation delay is relatively low (typically a
few ms) and, crucially for differential protection, is “deterministic” (i.e. predictable and
consistent). The BER of PDH networks tends to be low enough not to affect protection
scheme security or dependability.
27
4.1.2 TELEPROTECTION INTERFACES
In addition to selecting the type of channel to be used for conveying protection signals, it is
also necessary to define the interface between the protection equipment and the
communication link. Historically, the interface has been provided as specially designed
teleprotection equipment which converted the output from the protection device into a form
which could be transmitted over the communication channel, be it a VF circuit or PLC link.
More modern teleprotection equipment is designed to interface to digital communication links
but increasingly the teleprotection functionality and interfaces are being integrated within the
protective IEDs themselves, giving the benefits of reduced cost and complexity.
ITU-T G.703
Series G of the ITU-T Recommendations are entitled “Transmission Systems and Media,
Digital Systems and Networks” and define the transmission of voice and data over digital
transmission systems. G.703 defines the physical and electrical characteristics of the
hierarchical digital interface and also provides the specification for pulse code modulation.
G.703 has the advantage that it specifies an electrically isolated interface which can be
applied in the substation environment as standard. Most other electrical interface standards
do not call for electrical isolation and, therefore, need to be modified to cope with the harsh
environment likely to be experienced in teleprotection applications.
28
ITU-T X.21
Series X deals with “Data Networks and Open System Communication” and X.21 defines the
interface to a public data network. It has become the preferred interface of many public data
network operators. For its electrical signal definition, X.21 uses the V.11 specification.
29
EIA/TIA-485
Commonly referred to by its original designation RS-485, this is the most commonly applied
electrical interface standard for communication with line protection devices. It defines a two-
wire, half-duplex, multipoint serial connection, allowing a number of communicating devices
to be connected together in an inexpensive local network in the substation.
RS-485 uses differential signalling and is connected by screened, twisted-pair wires, allowing
higher transmission rates and longer distances than can be achieved with RS-232. Typically,
protection devices operate RS-485 ports at 64 kbit/s over links of up to 1200 m in length.
Networks are connected as a series of point-to-point nodes in a bus arrangement (not star or
ring), with terminating resistors fitted at the ends to prevent signal reflections.
It should be noted that RS-485 specifies only the electrical characteristics of the link and
does not specify any data protocol. In fact, it can be applied as the physical layer
specification used to support a variety of higher-level protocols.
Optical fibre
Fibre optic technology provides significant advantages in the substation environment, and for
the same reasons as described in section 4.1.1.3 above, is commonly applied for data
communications. Multi-mode, graded-index fibre provides sufficient range within the confines
of the substation, and local networks can be connected in star or ring configuration.
30
4.2.3 REMOTE ACCESS
Remote access to line protection IEDs, either for retrieval of stored data or for remote
settings change or control operations is achieved by one of a number of means.
31
quantity of other traffic carried by the network. Measures can be taken to ensure a certain
Quality of Service (QoS) by guaranteeing a minimum bandwidth or a fixed path through the
network to a particular service, but the costs associated with such measures are unclear at
present. In any case, it is certain that the implementation of NGN by telecommunications
providers over the next 5 to 10 years will have a significant impact on any power utilities
which use their services for protection signalling.
4.4 REFERENCES
[1] CIGRÉ JWG 34/35.11, “Protection Using Telecommunications”, 2001
[2] IEEE PSRC WGH9, “Digital Communications for Relay Protection”
[3] CIGRÉ SC34 WG01, “Reliable Fault Clearance and Back-up Protection”, 1997
[4] IEEE C37.114, “Guide for Determining Fault Location on AC Transmission and
Distribution Lines”
[5] H. Y. Li and P. A. Crossley, “Optimum Message Transfer Rate for Distribution Feeder
Protection Operating over Switched Telephone Networks”, IEEE Transactions on Power
Delivery, Vol.17, No. 2, April 2002
[6] G. P. Baber, et al, “Numerical Line Differential Protection over Metallic Pilot Circuits”,
15th International Conference on Power System Protection, Bled, Slovenia, 2006.
32
[7] IEEE PSRC WGH2, “Using Spread Spectrum Radio Communications for Power System
Protection Relaying Applications”, 2005
[8] I. Hall, et al, “New Line Current Differential Relays using GPS Synchronisation”, IEEE
PES Bologna Power Tech, 2003
[9] IEEE Std C37.94, “IEEE Standard for N Times 64 Kilobit Per Second Optical Fiber
Interfaces Between Teleprotection and Muliplexer Equipment”, 2002
[10] CIGRÉ SCB5 WG07, “The Automation of New and Existing Substations: Why and How”,
2004
[11] K. Hamamatsu, et al, “A New Approach to the Implementation of Intranet-Based
Measurement and Monitoring”, IEE DPSP, Amsterdam, The Netherlands, 2001.
[12] IEC TC 57, 57/759/NP “Use of IEC 61850 for the communication between substations”,
2005
[13] IEC TC 57, 57/760/NP “Use of IEC 61850 for the communication between substations
and control centres”, 2005
33
5 PROTECTION FUNCTIONS
5.1 INTRODUCTION
This chapter describes the benefits arising from the implementation of protection functions in
modern IEDs. The protection functions themselves have developed from discrete
electromechanical relays, through static electronic relays to early micro-processor based
numerical devices, and ultimately to the latest generation of numerical (and typically
multifunction) IEDs. The fundamental behaviour of functions such as overcurrent, under-
voltage, impedance and differential has not changed significantly since their initial
development more than 50 years ago. However, protection functions are now implemented
using computer techniques to solve physical formulae to distinguish between normal and
faulted system operation; rather than using discrete components.
Numerical techniques make possible the integration of many protection functions into the
same IED. This does not necessarily simplify the protection engineer’s job, because such
integration invariably leads to an increase in the number of device parameter settings,
increasing both the engineer’s workload and the likelihood of setting mistakes.
IEDs should not be considered as the direct “box-for-box” equivalent of older discrete
protection relays, but rather as a single platform for all of the various protection functions in a
cubicle which were previously implemented with a number of protection and/or control relays.
Another significant difference compared with older technologies is the use of faster and more
reliable communications to share data (e.g. possibly synchronised by GPS and time tagged)
between IEDs within the same substation, or between IEDs in different substations, to
implement certain protection functions.
34
The phase overcurrent function may be enabled or disabled in software, and may be applied
with various user selected IEC and ANSI time-overcurrent characteristic, in addition to
special user-defined characteristics (e.g. Figure 5.1). The time-current curve of user-defined
characteristics may be defined point by point, with up to, for example, 20 current and time
coordinate pairs. The overcurrent element then approximates the curve using an appropriate
interpolation technique. When utilizing user specified time-current curves, the reset curve
similarly may be user specified. This may offer an advantage where the inverse-time,
directional overcurrent protection must be coordinated with conventional electromechanical
overcurrent relays located toward the source.
35
The basic operation principle of directional ground fault protection is shown in Figure 5.2,
where 3I0 is the residual current (i.e. three times the zero sequence current), 3I0-set is the
setting, InstTrip is the non-delayed output of the function, DelayedTrip is the (typically
definite) time delayed output of the function and DirCntr represents the directional control.
Common types of directional control are based on the relative angle of the zero sequence
voltage and current (V0 and I0); the negative sequence voltage and current (V2 and I2); a
cross-polarizing phase voltage signal and the zero sequence current; and the system neutral
current and the zero sequence line current. The most commonly used type is the relative
angle of zero sequence voltage and current.
3I0
+
3I0-set _ InstTrip
&
DirCntr t DelayedTrip
0
36
5.2.4.2 ZERO SEQUENCE CURRENT POLARIZATION
Zero-sequence current polarization may be used if there is a ground current source at the
bus, such as the current measured in a transformer neutral-to-ground connection. However,
the polarizing zero sequence current must flow in the same direction relative to the fault
current in the protected line for all line faults for this method to be accurate. Polarization is
achieved by comparing the angle between the residual current flowing in the line (3I0) with
the transformer neutral current. The transformer neutral current will flow in the same direction
as the line residual current for a forward fault, and in the opposite direction for a reverse fault.
The suitability of the transformer neutral current as a polarizing source will also depend on
the transformer primary-secondary winding connections. When the transformer neutral
current is temporarily unavailable, e.g. due to maintenance etc., dual polarization with both
the zero sequence voltage and transformer neutral current may be effective.
37
the ratio of V2 to I2, rather than the previously used product of these quantities. Whereas a
ratio of voltage to current is used, faults with very little V2 can be detected.
38
• Self polarization.
• Zero sequence voltage polarization.
• Zero sequence current polarization.
• Negative sequence voltage polarization.
• Memory voltage polarization.
When a fault occurs the polarizing quantity should be stable and last long enough to
guarantee that the protection element remains picked up until the fault is cleared. The
following are basic requirements for the polarizing quantity:
• Reliable operation for all in-zone faults.
• Security against operation for all external faults.
• Stable operation during single-pole open conditions.
• Fault resistance tolerance.
39
5.3.1.2 DIRECTIONALITY
In the case of distance protection with a quadrilateral characteristic, the function consolidates
several directional elements into one in order to determine the direction of all fault types. This
consolidation permits the function to evaluate the results and to make the best directional
decision. The directional elements serve to determine the fault direction; supervise distance
elements and form polygonal distance characteristics. These properties offer added security
with respect to the distance elements especially for:
• Close-in forward faults with small voltages.
• Reverse faults.
Directional determination is a prerequisite for correct operation of the distance protection
function, and is similar to the impedance calculation. The principle is to obtain a reliable and
secure directional determination that is not affected by sensitivity limitations, load conditions,
source impedances or fault location. For a polygonal distance element a combination of at
least five elements is used to shape a directional (e.g. forward) zone characteristic:
• Directional element.
• Forward reactance reach element (top).
• Forward resistance reach element (right).
• Reverse reactance reach element (bottom)
• Reverse resistance reach element (left).
The quadrilateral distance zone is non-directional and requires a separate directional
element to make a directional distance characteristic. A typical theoretical directional
extension is shown in Figure 5.3.
X
X+ ZLine
Forward
(Operate)
R- R
R+
Reverse
(Restrain)
X-
40
X
ZLine
δ
Fo rward
Fault R
ZSource
δ
Sound phase and stored memory voltages are typically used as references for directional
determination. A common approach in IEDs is to use the 90° relationship between the
operating and polarizing quantity. The reference voltages for both phase-ground and phase-
phase loops are always at right angles to the short circuit voltages. By comparing the phase
angle between the operating and polarizing quantity the function is able to determine the fault
direction. This is shown in Figure 5.5 for a phase-ground fault.
VL1
If L1
VL3 VL2
V L2-L3
This phase angle difference will produce a torque like motion such that the comparator will
produce a positive torque if the fault is in the forward direction, and a negative torque if the
fault is in the reverse direction. The comparator is shown below for a phase L1 fault.
|TL1| = |VL2-L3|*|IL1| * Cos(∠VL2-L3 - ∠IL1) (5.1)
That is, if
270º < (VL2-L3 - ∠IL1 ) < 90º a positive torque and thus a forward fault
90º < (VL2-L3 - ∠IL1 ) < 270º a negative torque and thus a reverse fault.
Typical fault loops and operating and polarizing quantities are shown in Table 5.1.
41
Faulted Faulted Loop Current Faulted Loop Voltage Polarizing Voltage
Loop (Distance/Direction) (Distance) (Direction)
L1-E IL1 - kE·IE VL1-E VL2-L3
L2-E IL2 - kE·IE VL2-E VL3-L1
L3-E IL3 - kE·IE VL3-E VL1-L2
L1-L2 IL1-IL2 VL1-L2 VL2-L3 - VL3-L1
L2-L3 IL2-IL3 VL2-L3 VL3-L1 - VL1-L2
L3-L1 IL3-IL1 VL3-L1 VL1-L2 - VL2-L3
Where: kE = ZE/ZL
Table 5.1 - Measured values for distance calculation and directional determination.
42
remote transformer. Maloperation of the distance elements may be prevented by supervising
the distance element by an independent directional element, so that tripping for forward
faults only can take place.
43
5.3.3 INCREASED NUMBER OF DISTANCE ZONES
The distance function is often used as the primary protection for transmission lines. The
choice of using distance protection is getting more attractive as numerical technology further
improves the performance of this function. The increased number of zones available to the
user means that the distance function can serve as a better main protection, because speed
and selectivity does not have to be compromised. An example of this is shown in Figure 5.7.
With fewer zones available, a compromise between speed and selectivity may be required.
Selectivity might be compromised, for example, due to overestimation of the level of infeed;
and speed compromised due to the probability of getting a certain fault at a certain location.
With more zones available the fault clearing time for certain faults can be decreased by
adding a faster zone 2 than would have been possible with fewer zones. Some utilities would
have decreased the speed of the indicated zone 3 despite the inselectivity towards the zones
of downstream protection, or reduced the selectivity margin risking more contingencies.
These zones might easily be switched on/off in the software. In some cases it might be
useful to set a reverse zone covering the busbar if infeed was causing problems for the
remote protection. It is also possible to distinguish the forward backup protection zones. For
instance by having a faster backup zone set selectively over the line distance protection, with
a margin against low voltage transformer faults, and a slower forward backup zone set
selectively over the transformer protection and starting criteria.
It is quite common to offer 5 different zones in an IED, in addition to a starting criterion.
Previously, 2 to 3 zones were offered with the static and electromechanical relays. In many
cases this increased number of zones offers a cost effective solution as it could replace the
need for additional devices, as well as an improved technical solution.
44
5.3.5 MORE FLEXIBLE CHARACTERISTIC
With legacy electromechanical and static relay technologies, the shape of the distance
characteristic was fixed (e.g. ice cream, circle, etc.). In IEDs, the shape is adjustable, to a
certain degree (e.g. adjustable polygonal). This implies a better fault coverage and
selectivity.
45
5.3.8 DIFFERENT PARAMETER GROUPS
It is possible to have several parameter groups within the same IED, where the user may
select which group to activate by actuating a binary input or via a communications interface
from a substation automation system.
This feature is useful when maintenance on the network results in reduced or different short
circuit capacity for an extended period, and especially when the substations are inaccessible.
Different short circuit capacity may result in stronger infeed from the remote end due to a
higher source impedance behind the protection location. Switching to a different parameter
set could take account of the network change, however, failure to changing the parameters
could, for example, result in slower tripping (back up zones) with severe cascading effects
and blackouts.
46
location and load transfer, so that the distance protection would otherwise overreach and trip
inselectively with a non-adjusted setting. In IEDs the earth current of the adjacent line may
be fed into the device so that the impact of the mutual coupling can be accounted for. The
mutual impedance is then set according to the geometry of the parallel circuits and its
impedance, and offers more secure and selective protection.
Most cases, in practice, pertain to Class 1 networks [2] where the positive and zero
sequence sources are common. The impedance based distance measurement without
mutual compensation is distorted and must allow for correct measurement with the parallel
line either in or out of service.
Whereas mutual compensation is of advantage for faults on the protected line, it introduces
disadvantages for faults on the parallel line. Hence, the following are observed:
a) In distance to fault measurement functions, mutual compensation improves accuracy
and is recommended because only faults on the protected line are displayed and
recorded.
b) In distance protection functions with mutual compensation, a close-in fault on the
parallel line might affect the directional element. Therefore, the directional element
may not be compensated. Mutual compensation is omitted or is used only for faults
near or beyond the remote end substation. This can be automatically done by
allowing compensation only if the zero sequence currents in both lines are of same
sign and similar in magnitude.
Distance protection using mho characteristics which combine both measurement and
directionality should not be compensated.
Distance protection often may not be compensated in the following circumstances:
• In case of communication assisted schemes like PUTT, POTT or Blocking, the zero
sequence current compensation does not noticeably improve the overall distance
protection performance provided suitable settings are used.
• In PUTT schemes, the overlapping of the underreaching zone 1 measurements from
both sides is ensured even without compensation. If one end has reduced reach,
other has extended reach.
• In overreaching schemes like POTT or Blocking, the communications dependent
overreaching zone can be set sufficiently long to overreach the opposite bus under all
conditions. In order to allow settings for long overreach, the protection should have an
independent overreaching distance zone used exclusively for communication
schemes. If Zones 2 and 3 are used as back-up protection zones and in the non-
delayed mode also as communication dependent zones, severe limitations in
distance zone impedance grading must be accepted. In principle, the current reversal
logic is applicable to permissive or blocking overreaching schemes. The scheme is
explained in section 5.6.2.6. With permissive schemes, it is necessary to activate the
logic for an overreaching zone set greater than 150% of the line length. However, to
cover all contingencies which may arise due to different settings adopted at either
end, unexpected fault current distributions due to unequal sources, line impedances,
etc.; the logic is, by default, always activated since it is not detrimental in any case.
The ease with which such features can be activated/de-activated is one of the main
advantages in utilisation of IEDs.
The use in IEDs of separate zero sequence compensation factors (k0) in each zone
improves the grading of the back-up distance zones even without mutual compensation. One
commonly used philosophy is as follows:
• Underreaching zone 1 set with normal k0.
• Communication dependent zone (i.e. used for PUTT, POTT or Blocking) set with k0II .
47
• Distance zones 2 and 3 with k0 or k0II , depending on network configuration, i.e. short
or long adjacent lines
• Higher zones with k0.
Mutual zero sequence compensation helps to improve the grading of the overreaching back-
up zones, which shall operate for faults beyond opposite line end. This is a typical sub-
transmission requirement since such systems have no redundancy. Redundancy is provided
by the back-up zones of remote up-stream protection devices and hence selective time-
graded impedance back-up zones become more important.
In networks where parallel lines on common towers have isolated positive, as well as zero
sequence, sources (Class 2 networks, [2]), or where the positive sequence source is
common but the zero sequence is isolated (Class 3 networks, [2]), there is a remote danger
of unwanted trips of the DEF protection function and special solution is necessary.
48
5.4 LINE DIFFERENTIAL PROTECTION FUNCTION
Protected Element
I1 I1
Differential ID=0
Relay
The current transformers for line protection are located far apart. Traditionally, line current
differential protection was provided by schemes requiring continuous metallic circuits, called
pilot wire, between line ends for the exchange of a power frequency replica of the primary
current. Traditional schemes utilized current transformers at each line-end to derive a single-
phase quantity that is a function of the three phase currents. The operating quantity of the
differential relay is the vector addition of the single-phase replica currents fed from each end,
while the bias quantity is the arithmetic sum of the currents. Pilot wire current differential
relay schemes are limited to primary circuit length of about 30 km because of the impedance
of the pilot wire. Pilot wire current differential protection is susceptible to electrical
interference due to coupling with power lines running in parallel with the pilot wire circuit and
to ground potential rise caused by local power system faults flowing through the ground.
Adequate isolation, separation, electrical screening, and grounding measures were adapted
to provide adequate line protection. Figure 5.9 shows a transmission line protected with pilot
wire current differential protection.
IL IL
Transmission Line
I1 I1
50/60 Hz
Relaying Quantity
49
Frequency modulation techniques were later introduced to enable conventional pilot wire
relays to operate over dedicated fibre optic links to avoid the susceptibility of pilot wire
current differential protection systems to electrical interference. These systems were a step
forward in the field of current differential protection for transmission lines. However, a fully
digital approach exploits more fully the benefits of modern digital communication systems
and is discussed in more detail in this section.
50
• Line-charging current.
• Tapped load.
• Channel time-delay compensation errors.
• Current transformer saturation.
Line-charging current may be significant in cables or long overhead lines. The false
differential current created by tapped loads may be the result of load current, tapped
transformer low-side faults or inrush current in the tapped transformer. Channel time-delay
compensation errors and CT saturation contribute to false differential current in all types of
differential elements. All of these factors serve to reduce the sensitivity of the line current
differential scheme if the scheme is optimized for security.
The most common line current differential operating principles, the percentage bias, the α-
plane (alpha-plane), and the charge comparison characteristics are presented in the
following three sections.
IOP IOP
IOP=|IL+IR| IOP=|IL+IR|
K2 K2
Operate Operate
K1 Restrain K1 Restrain
ITH ITH
IOP=K1•IRT IOP=K1•IRT+ITH
IRT IRT
(a) IRT=|IL|+|IR| (b) IRT=|IL|+|IR|
The operating current, IOP, is the magnitude of the vector sum of the currents. IOP is
proportional to the fault current for internal faults and ideally approaches zero for any other
operating conditions.
51
r r
I OP = I L + I R (5.2)
The most common alternatives for obtaining the restraint current, IRT, are given below:
r r
I RT = k I L − I R (5.3)
(r r
I RT = k I L + I R ) (5.4)
r
( r
I RT = Max I L , I R ) (5.5)
The coefficient k is a constant that usually takes a value of 1 or 0.5. The operating condition
of the biased differential characteristic shown in Figure 5.10a is given by (5.6). K1 in (5.6) is
the percentage bias representing the slope of the characteristic.
I OP ≥ K 1 I RT (5.6)
A minimum pick-up current, ITH, is added as a condition:
I OP ≥ I TH (5.7)
Another possible definition of the operating condition of a biased differential characteristic
shown in Figure 5.10b is given by (5.8).
I OP ≥ K 1 I RT + I TH (5.8)
Errors relating to differential protection performance can be classified as fixed and
proportional component errors. Whereas fixed component errors occur regardless of the
magnitude of the system’s primary current; proportional component errors are in proportion
to the magnitude of the system’s primary current.
In general, the minimum sensitivity of the function, ITH, is determined taking into account
fixed component errors, such as offset and quantisation errors within the protection device.
ITH is also applied to accommodate external factors such as line charging current, although
this requirement can largely be eliminated by the implementation of a dedicated charging
current compensation function within the IED [5]. Differential protection IEDs can achieve
sensitivity in the range of 10% - 20% of rated current.
Proportional component errors, such as CT measuring errors and errors related to channel
delay asymmetry, are accommodated by the slope, K1, of the percentage bias characteristic.
Often, a dual bias slope characteristic is adopted, with a second slope introduced in the high-
current region, the gradient of which, K2, is determined so as to accommodate false
differential current caused by CT saturation under heavy through-fault conditions.
52
I
a = Re R (5.9)
IL
I
b = Im R (5.10)
IL
Note that the characteristic is designed to match the different fault and load regions depicted
in Figure 5.10 and yet accommodate CT saturation, channel delay errors and current out-
feed; in addition to low-frequency oscillations present in series-compensated lines. The
characteristic is symmetrical with respect to the a-axis, and the radii of both circle arcs are
reciprocal.
jb
R Operating
region
a
-1
1/R
Restraining
region
53
Terminal A I’L+IfA -I’L+IfB Terminal B
IfA+IfB=IF
Relay A Rf Relay B
If it is assumed that load and fault currents are at almost the same angle, the differential
current (Id) and restraining current (Ir) are typically calculated as follows:
I d = I ' L + I fA − I ' L + I fB = I fA + I fB = I F (5.11)
This condition is shown on a biased differential characteristic in Figure 5.13. As the load
current increases, so too does the restraining current, with the result that it becomes
increasingly difficult to achieve the required fault sensitivity. In some applications it may not
be possible to select a pick-up setting which can accommodate the worst case conditions of
maximum load resistance and maximum fault current.
Id
Operating
Zone
IF Restraining
characteristic
Pick up
0 IF+2I’L Ir
I r 0 = I A0 + I B 0 (5.14)
Whereas load current is balanced, it does not appear in either Id0 or Ir0. Therefore, both Id0
and Ir0 are almost equivalent to the fault current for an internal single-phase-to-ground fault.
A pick-up setting just below the minimum fault current will be sufficient to operate for the
maximum fault resistance, regardless of the magnitude of the load current. When particularly
high accuracy and sensitivity is required, a dedicated core balanced CT should be used.
54
aligned to evaluate the differential function. This requires knowledge of the transmission
delay between the devices, for which four techniques are possible:
a) Assume a value.
b) Measure during commissioning only.
c) Continuous online measurement.
d) Global Positioning System (GPS) time tagging.
Method (a) is not used, as the error between the assumed and actual values could be too
high.
Method (b) provides reliable data if direct communication between relays is used. Whereas
signal propagation delays may change over time, repeat measurements may be required at
intervals and devices re-programmed accordingly. There is some risk of maloperation due to
changes in signal propagation time causing incorrect time synchronization between
measurement intervals. Therefore, this technique is less suitable if rented fibre optic
channels are used, since the owner may perform circuit re-routing for operational reasons
without warning, resulting in the propagation delay being outside of limits and leading to
scheme maloperation. Where re-routing is limited to a few routes, it may be possible to
measure the delay on all routes and pre-program the devices accordingly, with the device
binary inputs and ladder logic being used to detect changes in route and to select the
appropriate delay accordingly.
Method (c) which continuously senses the signal propagation delay is a robust technique. A
key building block for achieving clock synchronization is a “ping-pong” method for
determining clock offsets between clocks at different locations, which uses four time stamps
gathered in a round trip communications exchange, described by Mills [8] in a paper on
Internet time synchronization.
The "ping-pong" algorithm computes the clock offset from four time measurements collected
during a round-trip pair of messages. Once the nodes are synchronized, the "ping-pong"
mechanism continues to exchange round-trip messages between nodes on the network to
maintain clock synchronism. The algorithm assumes that the communications channel delay
is the same in each direction. If it is not, the timing error is equal to one half of the difference
between the delays in each direction.
The transmitting device effectively realigns the data to the instant of transmission, so that the
receiving device need only account for the transmission delay. The one-way transmission
delay is estimated as half of the round-trip delay. To measure the round trip delay, a device
tags each message as it goes out with a counter value, and times how long it takes to
receive a response to that message. The response contains a field which represents the
amount of time elapsed at the remote device between reception and transmission. The local
device estimates the one-way transmission delay by:
Td = (Tr − Th ) 2 (5.15)
Where:
Td is the one-way transmission delay.
Tr is measured round-trip delay.
Th is the time the remote device held the message before responding.
55
Td = (Tr-Th)/2
Tr Th
Td
Time at Time at
Local Relay Remote Relay
Method (d) is also a robust technique, which requires that both devices are capable of
receiving a time signal from a GPS satellite. Knowledge of the propagation delay on each
communication channel is no longer required because both devices are synchronized to a
common time reference. In order to meet the required performance of the protection scheme
in respect of availability and maloperation, the GPS signal must be capable of reliable receipt
under all atmospheric conditions. Satellite signal receiving equipment is required at both
ends of the line, which implies extra cost.
Communications channel asymmetry between the transmit (TX) and receive (RX) paths
presents a more difficult challenge to line differential IEDs. This can occur in self-healing ring
topologies of modern SONET / SDH digital communications systems. After self-healing the
new configuration will most likely have asymmetrical communication channel delays,
because the time delay for the TX signal is different to that of the RX signal. The result is a
differential current whish is proportional to the value of the channel asymmetry. If the channel
asymmetry is sufficiently high, the line differential protection may maloperate, even for steady
state conditions. However, this depends on the line differential operating characteristic, and
on the required minimum sensitivity of the scheme. Some line differential algorithms can
accommodate higher levels of channel asymmetry without the need for GPS synchronization
[6]. Other line differential IEDs have a special mechanism built into the line differential
algorithm to cope with the differences between the transmit and receive paths.
56
compensates for channel asymmetry. When channel asymmetry changes, there is no
change to the inputs to the loop filters, so the sampling clocks maintain synchronism, with no
transient disturbance.
In the second method, each device physically synchronises its sampling clock relative to the
GPS signal, so that samples at each terminal are taken at practically the same instant in
time. Each sample is tagged with a reference before transmission to the remote terminal(s)
and the differential protection calculation can then be made using matching pairs of
synchronised samples, regardless of the propagation delays of the send or receive
communication routes. Changes in the communication path propagation delay time have no
effect on the sampling timing or on the differential protection calculation.
The addition of an algorithm that relies on an external GPS source to handle the asymmetry
in communication channels incorporates a new potential point of failure that has to be
addressed. There are two main points of failure in the GPS system: loss of the GPS signal
and failure of the GPS receiver. For these reasons, GPS based current differential protection
IEDs have been fitted with suitable back-up functions which allow the protection to continue
operating following loss of the GPS signal. Back-up systems have been developed which
allow for long-term continued differential protection operation following loss of the GPS signal
combined with multiple changes in the communication path propagation delay caused by
channel switching [5].
If the GPS signal is lost or if GPS is not used, and the communication channel is interrupted
for a long period of time, then the clocks at the various terminals will continue to run on their
own (i.e. free-wheeling). Due to inaccuracies in the device reference (crystal) there will be a
drift between the clocks and therefore the current comparisons will cease to be reliable after
a certain time. The differential protection is then blocked under this condition.
“In-Circuit” Transformers
Some IEDs can support the introduction of one or more transformers with two or three
windings into the line differential zone of protection, with facilities for vector group and
magnitude compensation, zero sequence suppression and harmonic restraint (typically 2nd
and 5th harmonic for inrush and overexcitation respectively). The harmonic restraint may
incorporate cross-blocking between phases, whereby a high harmonic content in the
differential current of any one phase, blocks operation of the other two phases.
The need to cover a transformer by the line differential protection may be due to the non-
availability of a CB or CT core for zone separation at the interface between the line and the
transformer (e.g. tapped or “tail-fed” transformer), or purely for function integration reasons.
Depending on the size of a tapped transformer, it may be included in the line differential
protection or excluded. However, if excluded, care must be taken to ensure security during
transformer energizing, etc. When small tapped transformers (i.e. rated current < 50%
differential current minimum pickup setting) are excluded, trips for low differential currents
may be time delayed to co-ordinate with downstream overcurrent devices.
57
The analysis associated with the harmonic restraint for “in-zone” transformers is likely to slow
the trip decision, unless overcome by complementary features. One such feature is negative
sequence (current) directional comparison which discriminates between internal and external
faults in the order of 8 – 10 ms. If the negative sequence currents at each line end are in
phase, the fault is internal. If they are 180º out of phase, the fault is external. In practice, a
realistic setting angle of +/- 60º is applied for the operate region. If there is more than one CT
at either end, the directional comparison is applied between that particular CT and the sum of
the remaining currents, including the second local CT. The fault is declared as “internal” if
detected as such by any one comparison.
The speed of operation may be improved by bypassing the harmonic analysis if the fault is
declared as “internal” in the presence a minimum differential current. The minimum pick-up
current level Ith (Figure 5.10) is automatically raised to a higher value for certain conditions to
improve security:
• Energization of the line.
• Fault is classified as “External”.
• Switching in of Tap transformer.
58
more than one Master and Follower IEDs. It should be noted that failure of any particular
communication link automatically places the two IEDs concerned as Followers. Using this
approach, operation at the Follower ends is guaranteed, although with the signal propagation
delay because it is unlikely that all available Masters will be put out of operation by
communication link failures on different routes.
DeadLineCntr
>1 0
CBCloseCd t InstTrip
&
DeadLineCntr
The distance protection zone used with the SOTF function should extend to cover (i.e.
overreach) the entire line. If an overcurrent element is used, then the setting should be
sufficiently sensitive to overcome weak infeed from behind the protection location or high
resistance faults on the line. Typically, remote end CB closing should be blocked, via a
communications channel, for a SOTF detection at the end being initially closed.
When using quadrilateral (polygonal) distance protection characteristics, non-directional
zones are always available for use with the SOTF function. However, when using inherently
directional Mho distance characteristics, a non-directional offset Mho zone would be
required. In such a case, IEDs may use a UI level detector to initiate tripping in place of the
non-directional zone. The UI level detector works in such a way that if the current reaches a
set level and the voltage does not reach its set level within a certain settable duration after
closing the CB, the detector output is active to permit instantaneous tripping.
The SOTF can be activated by the following external and/or internal means:
• Manual close command to the CB.
• CB N/C contacts.
• Internal dead line detection (DLD).
• Autoreclose command.
For single breaker installations like Single or Double Busbar substations, the manual close
command is a recommended external activation. The use of CB N/C contacts is only
recommended as a supervisory condition for the manual close command in control schemes
where the close command is given through auxiliary relays which may remain picked up and
therefore would not accurately simulate a close command from timing perspectives. The
59
internal dead line detection is always a recommended choice irrespective of external
activation provided that the VT is on the line side of the CB.
Activation of SOTF by an AR close command, where three-phase DLD is not available (e.g.
at a line-end where the AR operates in synchrocheck (SC) mode), permits rapid tripping for
permanent faults near that end of a line, as per Figure 5.16. In such cases, AR at the other
line-end would operate in a voltage check (VC) mode.
SC VC
Ph-Ph
If SOTF activation by internal single-phase DLD is not available, and where AR with zone
extension is used, then activation by the AR close command permits rapid tripping for
permanent ground faults near one end of the line, as per Figure 5.17.
Zone Ext. On
Ph-E
AR close command activation of SOTF may also reduce the CT sizing requirements by
accelerating tripping for a reclose onto a permanent fault that had caused CT saturation due
to DC offset and remanence at the first fault occurrence. The reduced current due to
saturation would cause the distance protection function to underreach for fault on the line,
but an overreaching non-directional zone would likely trip. A zone with longer reach would
certainly be more useful but it would also increase SOTF coverage into adjacent lines.
Alternatively, a slightly overreaching zone (e.g. zone 2) would still trip but perhaps somewhat
delayed until the CT could produce the necessary current.
In two-breaker installations such as breaker-and-a-half or ring-busbars, external activation is
not recommended because intricate logics and extensive wiring is necessary to have a fool-
proof scheme. The problem can be visualised by assuming a line already in service in a
breaker-and-a-half diameter. If the second line of the diameter is to be energized with the
common CB; switching onto a fault would also trip the healthy line due to the non-directional
zone. Hence, manual close commands and CB contacts must be carefully configured to
prevent maloperation. Internal DLD activation is the recommended choice and it works
correctly irrespective of whether the VT is on the Line or Stub side. This is because the CBs
for a line must be opened before the line isolator is closed thereby rendering the line dead
and activating the SOTF feature. AR close command activation is always recommended
provided that three-phase and single-phase DLD are not available for internal activation. In
such installations, the distance protection should be blocked by the line isolator open status
indication because the distance protection would be prone to maloperate for SOTF for an
external fault when the VT is on the line side.
When SOTF is active in AR schemes with Zone Extension, care should be taken to ensure
that the SOTF trip does not issue upon reclosing onto a permanent fault on the adjacent line
within the coverage of the overreaching zone.
In Figure 5.18, both CBs C and A would trip for a phase fault on an adjacent line. At end A,
the SOTF sees a three-phase DLD. Upon reclosing onto permanent fault, CB A trips again.
This may also arise in radial feeder installations. Therefore, the reach of the SOTF must be
60
reduced upon reclosing. Special logics may be applied to release tripping by Zone 1 non-
directional rather than the usual Zone 2. However, if Zone 2 non-directional persists after a
settable time, then it should trip as backup protection for faults on the adjacent line.
VC SC
A B C
Ph-Ph
Open
5.6.1 GENERAL
Distance or overcurrent protection elements must be time-graded with other downstream
protection in order to achieve selective clearance of faults. Where stand-alone protection is
applied; the contribution to a line-end fault will tend to be cleared without delay by the
protection at the faulted end, however, the protection at the opposite end will clear the
contribution from that end, necessarily, with a coordinating time delay. Where a fault can be
unambiguously classified by the protection as internal to the line; non-delayed tripping by the
protection may take place for faults throughout the line. Furthermore, on interconnected
transmission networks, it is preferable that such non-delayed tripping should take place
simultaneously at both ends of the faulted line.
A variety of telecommunication assisted protection schemes have been developed which, in
their simplest forms, are invariably based on the exchange of a single bit of logical data
between the ends of a transmission line. This supplements the locally available data,
confirming that a fault detected by at least one end, is in fact internal to the line, such that
otherwise time-delayed operation may be accelerated.
Traditional teleprotection schemes were developed for use with, what may now be
considered ‘legacy’, power line carrier (PLC) equipment. This technology, which uses the
50/60 Hz voltage on the primary phase conductor as a signal carrier, has very limited
bandwidth and can be prone to low reliability due to interference and the necessity to ‘punch
through’ a fault on the carrier phase; a problem which is somewhat mitigated by the use of a
redundant path on a second phase conductor or via an independent feeder. The two main
categories of teleprotection scheme are “Blocking” and “Permissive” each of which is linked
with particular PLC technologies; namely direct-keyed (On/Off) amplitude modulated
channels or frequency-shift keyed audio tone frequency channels respectively (the latter with
a normally transmitted guard signal). “Unblocking” schemes are fundamentally “Permissive”
in nature, but include supplementary aspects of “Blocking” schemes. The chief consideration
when deciding which category of teleprotection to use is normally the preference or need of
the particular utility for either secure or dependable operation.
Where networks are robust with surplus interconnectivity, dependable “Blocking” schemes
will tend to dominate.
On networks with limited capacity, and where security against over-operation by the
protection is preferred; “Permissive” schemes will tend to be used. The general trend
worldwide towards maximised usage of network capacity is resulting in a general migration
towards permissive schemes.
61
The increasing availability of high speed, high security and high bandwidth media (e.g. direct
end-to-end fibre optic links or multiplexed SDH networks) offering the possibility of exchange
of comprehensive real-time measurement and status information between line ends, whilst
increasing the general use of transmission line differential protection, is also resulting in more
elaborate telecommunications assisted (rather than dependent) schemes. In the context of
modern digital communications, PLC technology related issues are no longer critical to the
decision as to which type of scheme to apply.
The teleprotection schemes applied to transmission lines typically supplement time graded
distance and ground fault overcurrent protection. Whereas the schemes described in the
following sections may also be applied more generally to phase overcurrent applications,
only their application to distance and ground fault overcurrent shall be presented.
62
ZOR
t OR
pu T 0
ZOR ├──┤
≥1
ZUR &
Rx
t UR
pu T 0
ZUR ├──┤
Tx
t UR
Tx
pu T 0
ZUR ├──┤
ZUR Rx &
t OR
pu T 0 ≥1
ZOR ├──┤
ZOR
fwd
Dir
&
Rx
t P r ol
0 T &
├──┤
≥1 Tx
t P r ol ≥1 Tx
0 T
├──┤ &
Rx
&
Dir fwd
Dir
63
There is a general preference, in distance protection IEDs, for applying this scheme using
directional overreaching zones, as per POTT and DCUB, rather than using a basic
directional fault detection element. This is chiefly because, in the case of communications
failure, the distance protection zones will default to operation after a suitable time delay,
whereas a basic directional element will not.
A typical application of basic directional comparison to transmission lines, is for protection
against high impedance ground faults which may arise on unshielded lines or where
particularly high tower footing resistances may be experienced. In such cases, distance
protection may not be sufficiently sensitive, and low-set directional ground fault overcurrent
protection is used.
It is presumed that the minimum operating quantities of the directional element, whether fixed
in the device or parameterised, will be sufficiently sensitive to permit fault detection along the
full length of the line.
Fault detection by the directional element is transmitted to each end. When all ends confirm
that the fault has been seen in the direction of the line, non-delayed tripping can take place.
Where only one end detects the fault, accelerated tripping will not take place unless
supplementary “echo” or “weak-end infeed” logic are applied, which may eliminate external
faults.
Non-delayed tripping at the sending-end by other protection functions may prematurely
terminate the directional command transmitted to the remote end prior to that end detecting
the fault, either due to slower or delayed pickup of the function at that end. Therefore, in the
event of a trip, the command may be prolonged by a set delay.
Phase selective tripping may be achieved by supplementing the function with faulted phase
selection logic which may be dedicated to the function or shared with other functions in the
device.
t OR
pu T 0
ZOR ├──┤
≥1
&
Rx
Tx
Tx
Rx
&
t OR
T 0 ≥1
ZOR pu ├──┤
ZOR
64
Thus, when not otherwise supplemented by “echo” or “weak-end infeed” logic, accelerated
tripping requires that the forward overreaching elements at each end of the line must have
detected the fault.
IEDs can provide phase-segregated POTT schemes, for additional security where single-
pole tripping is required. Furthermore, supplementary logic, to account for conditions where
the overreaching elements at the receiving-ends may not have detected the fault but which
can otherwise confirm that the fault is internal by effectively eliminating external faults. This
logic is described below under “echo and weak-end infeed”.
t OR
pu T 0
ZOR ├──┤
≥1
Rx &
≥1
Comm s
Fa il Tx
Comm s
Fa il Tx
≥1
Rx &
t OR
T 0 ≥1
ZOR pu ├──┤
ZOR
65
overreaching protection function at the opposite end of the protected line. Thus, the received
permissive command from the strong infeeding end can be “echoed” back if there is no fault
detection by the reverse stage, or indeed by the forward overreaching stage, at the weak
end. The weak end would then otherwise have to wait until the strong end had tripped before
fault detection; however, an option of “echo and trip” at the weak end may be employed.
There is a risk with “echo and trip”, in particular with traditionally electrically wired
teleprotection schemes, that a spurious permissive receive command at one end would
cause it to echo and trip because of the lack of a fault detection in the reverse direction. The
“echoed” command would then result in an “echo and trip” at the other end. Therefore, the
“echo and trip” will normally be secured by an undervoltage supervision stage.
ZRev
ZOR
t OR
pu T 0
ZOR ├──┤
≥1
&
C B Ope n e c ho
& ≥1 Tx
pu
ZRev T 0 e c ho
"e c ho & trip"
& ├──┤
Rx
Rx T 0 e c ho
"e c ho & trip"
pu & ├──┤
ZRev
e c ho
& ≥1 Tx
C B Ope n
&
pu T 0 ≥1
ZOR ├──┤
ZOR
ZRev
66
5.6.3 BLOCKING TELEPROTECTION
Blocking schemes operate on the basis that a fault detected by a time-delayed, but not time-
graded, overreaching zone set directional into the line; is assumed to be internal to the line
unless otherwise blocked by the device at the opposite end. The transmitted blocking
condition is that a fault external to the fault has been detected (i.e. by a reverse directional
stage extending further into the adjacent line than the forward overreaching zone from the
opposite end). The overreaching zone time delay is set only long enough to permit a blocking
signal to be generated at the remote end and transmitted. Whereas the blocking command is
used to prevent tripping, it is critical that the communications channel should be fast and
dependable.
ZRev
ZOR
t OR
T 0
ZOR ├──┤ &
Rx
ZRev Tx
ZRev Tx
Rx
t OR
T 0 &
ZOR ├──┤
ZOR
ZRev
67
The basic principle of the cross differential directional element is based on the calculation of
the amplitude of the differential current between the two lines to determine whether a fault is
internal or external and to select the faulted line.
As can be seen from Figure 5.26 under load conditions (and similarly for external fault
conditions) the difference between the currents in both circuits will be minimal; however, after
a fault occurs on one of the lines there will be a difference between the currents in the faulted
and the healthy circuit.
This technique offers a considerable benefit because, in most cases, it allows fast clearance
for faults on either of the lines. The instantaneous tripping zone covers a large section of
protected line with the remainder of the line covered by sequential tripping which is faster
than the Zone 2 distance operation.
When the difference between the sources at the two ends of the lines is very large, the
current amplitudes of both lines on the weak source end are similar, and cross differential
protection can not operate to clear the fault. In order to solve this problem, a method based
on superimposed currents is used.
When a fault occurs, a superimposed current will be produced, which can be defined as the
difference between the short circuit current and the pre-fault load current.
The top diagram in Figure 5.26 shows the currents of the two lines. The solid curve is the
phase current of the faulted line and the dashed curve is the phase current of the healthy
line. The middle and bottom diagrams in Figure 5.26 show the differential currents of the
double lines.
The middle and bottom traces in Figure 5.27 show the superimposed differential currents of
the two lines. The solid curve is the differential current and the dashed curve is the bias
current. The device will operate when the amplitude of the differential current is higher than
that of the bias current.
68
Figure 5.27 - Operation of superimposed cross-
cross-differential protection for a mid-
mid-line fault
69
Equation 5.16 gives the instantaneous CT secondary current, is(t), as the sum of the
instantaneous burden, ib(t), and the magnetizing currents, im(t).
i s (t ) = i m (t ) + i b (t ) (5.16)
The CT steady-state magnetizing current is very small while the CT operates in its linear
region. If the exciting current is assumed to be negligible, then the burden current, ib(t), is a
replica of the primary current adjusted by the CT ratio. When the CT is forced to operate in
its nonlinear region, the magnetizing current can be very large due to a significant reduction
of the value of the saturable magnetizing inductance. The magnetizing current, which can be
considered as an error current, subtracts from is(t) and drastically affects the current seen by
the connected burden on the CT secondary winding.
S POL = VPOL
VR and IR are the voltage and current corresponding to a particular impedance loop, Z1 is
the positive sequence line impedance, r is the per-unit mho element reach (e.g. 0.8 or 80%
of the line), and VPOL is the polarizing voltage, consisting of the memorized positive
sequence phasor [10]. A fault is detected inside the mho element with reach r when the
scalar product between the two vectors is positive (i.e. the angle difference between SOP and
SPOL is less than 90°), as in (5.18):
(
real (r • Z1 • I R − VR ) • VPOL ∗ ≥ 0 ) (5.18)
For a forward fault, this is equivalent to the reach r being greater than a distance m, as in
(5.19):
(
real VR • VPOL
∗
)
r≥m=
(
real Z1 • I R • VPOL
∗
) (5.19)
If CT saturation occurs in one of the currents involved in the impedance loop, the magnitude
of IR reduces, and m has a higher value than ideal. From this, it can be inferred that a mho
element will underreach during CT saturation.
Consider an A-phase fault on a 500 kV line (Z1 = 75 ∠ 86° and Z0 = 300 ∠ 75° Ω). The fault
occurs at 0.1 s at a distance 33% along the line from the protection. As shown in Figure 5.30,
m corresponding to a normal fault current settles to 0.33, as expected. For a saturated A-
phase current (solid line in Figure 5.29), the calculated distance m value crosses the unity
line with a half-cycle delay and settles around 0.45 because the current remains in a
saturated state.
5
Saturated
Calculated m
2.5
0
Nonsaturated
–2.5
–5
0 0.05 0.1 0.15 0.2 0.25 0.3
Time (s)
70
1
0.75
Saturated
Calculated m
0.5
0.25
Nonsaturated
0
0 0.05 0.1 0.15 0.2 0.25 0.3
Time (s)
Figure 5.30 - Calculated distance m values with normal and saturated currents
Figure 5.31 shows another method of visualizing distance protection underreach due to CT
saturation. Figure 5.31 shows the phasor diagram of the operating and polarizing vector
quantities for a fault on the boundary of a self-polarizing mho distance element with reach r.
As the CT saturates, the magnitude of IR decreases and its angle advances (this effect is
shown as dashed lines in Figure 5.31). This causes the dV phasor to rotate
counterclockwise, resulting in underreach.
r • Z1 • IR dV = r • Z1 • IR – VR
Theta
VR = VPOL
IR = Relay Current
Z1 = Replica Line Impedance
VR = Relay Voltage
VPOL = Polarizing Voltage
IR Theta = Angle Between VPOL and dV
Figure 5.31 - Mho element phasor diagram showing how CT saturation causes underreach
71
Figure 5.32 - Alpha Plane (IR/IL) plots of Alpha Plane and conventional differential characteristics
Both of the currents used are from 16 samples-per-cycle cosine filters. Without CT saturation
the locus of the calculated ratio of IR/IL would be at the –1 point on the Alpha Plane,
assuming negligible line-charging current. The circular characteristic shown is the
representation of a slope characteristic on the Alpha Plane, corresponding to the
conventional biased differential criterion (5.20).(Figure 5.10)
IL + IR > K • ( IL + IR ) (5.20)
The slope value in the conventional differential protection is selected such that the operating
characteristic encloses all of the cluster of points where the difference current is above the
minimum value. It should be noted that the Alpha Plane Differential element restraint region
covers less area along the negative real axis than the conventional slope methodology, yet
both methods achieve the same security for CT saturation. The Alpha Plane Differential can
sustain a very high level of external CT saturation by increasing both the radius, R, value and
the angle, a, (up to 180º) [11].
72
100
80
ratio current
ratio current
60
40
Current
CT
CT secondary
secondary current
current
20
breaker
breakerpole
poleopens
opens
0
subsidence
-20
-40
0 1 2 3 4 5
Time
Figure 5.33 - Subsidence current from a CT output after the CB poles open
Figure 5.34 compares the dropout time of a half-cycle cosine filter CBF overcurrent element
(50FT) with that of an enhanced subsidence detection CBF protection element (OPHA). The
OPHA element asserts approximately 7 ms before the already rapid dropout 50FT element.
CBF overcurrent elements must cope with CT subsidence current. IEDs employ logic to
detect the CT subsidence current, thereby speeding up the detection of overcurrent element
dropout as shown by logic point OPHA in Figure 5.34.
OPHA
TIME
50FT
TIME
73
Line Voltage
C1 Gap RR
LTR
CF LF B
Gap Step-Down u
C2 Voltage r
d
Transformer e
CA RA RF n
n:1
74
60
CVT Transient
40
20
Wave
0
–20
Ratio Voltage
–40
–60
10
Ratio Voltage
8
Magnitude
2
CVT Output
0
–1 –0.5 0 0.5 1 1.5 2 2.5 3
Time (cycle)
2.5
2
Apparent Impedance From
Ratio Voltage
1.5
X-Ohm
Apparent Impedance
From CVT Output
0.5
75
The parameters that affect the BPD transient response are:
• Burden – inductive burdens result in worst transient performance.
• Transformer ratio – a low step-down transformer ratio results in a larger burden effect
and produces greater transient error.
• Power factor adjustment – compensating for any lagging power factor burden
improves the transient performance.
• Busbar voltage dip – the transient error is proportional to the change in busbar
voltage caused by a fault. Therefore, high SIRs result in large voltage changes and
transient error at distance Zone 1 boundary faults.
BPD transient response may cause distance protection underreaching or overreaching
depending on the connected burden. Figure 5.38 and Figure 5.39 illustrate an underreaching
effect when the connected BPD burden consists of both electromechanical and numerical
devices (10 Ω at 65% power factor). The protected line is 65km long with an SIR ratio of 5.8
with a ground fault 64% along the line from the protection location. The large and slow
decaying transient causes distance protection to underreach as shown in Figure 5.39 [12].
C-Phase Voltage and Current
100
50
Voltage
–50
–100
0 2 4 6 8 10 12
10
5
Current
–5
–10
0 2 4 6 8 10 12
Cycle
16
14
12
10
Im-Ohm
–4 –3 –2 –1 0 1 2 3 4 5 6
Re-Ohm
Figure 5.39 - Apparent impedance seen by the distance protection for the fault at 64%
64% along the
the line
76
5.8.8 MITIGATION OF CVT AND BPD SUBSIDENCE TRANSIENT
CVT and BPD subsidence transients result in a reduction of the fundamental voltage for a
few cycles. This reduction will result in a distance protection Zone 1 overreach for remote
terminal faults. The preferred mitigation depends on the fault clearing requirements of the
transmission system. If the system can tolerate a few cycles for fault detection, then the Zone
1 output should be time-delayed by up to two cycles. However, for systems with stringent
fault clearing times, the Zone 1 relay reach should be reduced based on the chart shown in
Figure 5.40, which is obtained using typical passive and active CVTs with a resistive burden,
representative of the load of modern IEDs and meters.
1
0.9
Passive
CCVT
0.8
Max. Zone 1 Reach Setting (pu)
0.7
0.6
0.5
0.4
0.3
Active
CCVT
0.2
0.1
0
0 5 10 15 20 25 30
SIR
77
100
50
Voltage
0
–50
–100
4 6 8 10 12 14 16
10
5
Current
0
–5
–10
4 6 8 10 12 14 16
6
Digital Element
Zone 2 Pickup
4
Zone 1 Pickup
2
CVT Transient
0
4 6 8 10 12 14 16
Time (Cycle)
5.8.10 CONCLUSION
In conclusion, distance protection Zone 1 elements exhibit a minor tripping delay and a
potential underreach for faults near the zone reach point due to CT saturation. In general,
faults near the reach point display a reduced current magnitude if the CT saturates.
However, the likelihood of CT saturation near the reach point is much smaller than for faults
occurring near the protection location. CT saturation has a limited impact, aside from a slight
tripping delay, on longer set Zone 2 and Zone 3 distance elements. However, Zone 2
distance protection settings may have to be adjusted for this potential underreach.
CVT and BPD transients reduce the fundamental component of fault voltage and can cause
overreach of Zone 1 distance protection elements. High BPD electromechanical relay
burdens can cause large magnitude and slow decaying BPD transients that result in distance
zone underreaching. Elements fitted with CVT transient detection logic may introduce a slight
(but necessary) tripping delay; however, they exhibit greater security for faults near the
protection reach point.
5.9 REFERENCES
[1] D. Hou, A. Guzmán, and J. B. Roberts, “Innovative Solutions Improve Transmission
Line Protection,” in 1997 24th Western Protective Relay Conference Proceedings.
[2] CIGRÉ SC 34 WG-04 “Application guide on protection of complex network
configurations”, 1992.
[3] K. Faye-Hansen and G. Harlow, Merz-Price Protective Gear, IEE Proceedings, 1911.
[4] J. Roberts, D. A. Tziouvaras, G. Benmouyal, and H. Altuve, “The Effect of
Multiprinciple Line Protection on Dependability and Security,” 54th Annual
Conference for Protective Relay Engineers, Texas A&M University, College Station,
Texas, USA, April 2001.
[5] T. Kase and G. Baber, “Advanced Techniques for Current Differential Feeder
Protection”, CIGRÉ SC B5 Colloquium, Madrid, Spain, October 2007.
[6] H. Altuve, G. Benmouyal, J. Roberts, and D. A. Tziouvaras, “Transmission Line
Differential Protection with an Enhanced Characteristic,” 8th International Conference
78
on Developments in Power System Protection, IEE Conference Publication 500, Vol.
2, April 2004, pp 414 – 419.
[7] Ernst, L. J., Hinman, W. L., Quam, D. H., and Thorp, J. S., “Charge Comparison
Protection of Transmission Lines – Relaying Concepts,” IEEE Transactions on Power
Delivery, Vol. 7, No 4, October 1992, pp. 1834-1852.
[8] D. L. Mills, “Internet Time Synchronization: The Network Time Protocol,” IEEE
Transactions on Communications, vol. 39, no. 10, pp.1482-1492, Oct. 1991.
[9] IEEE PSRC Report, “Transient Response of Current Transformers,” IEEE
Transactions on Power Apparatus and Systems, Vol. 96, No. 6, 1977, pp. 1809–
1814.
[10] E. O. Schweitzer III and J. Roberts, “Distance Relay Element Design,” Paper
presented at 19th Annual Western Protective Relay Conference, Spokane, WA, 1992.
[11] D. Tziouvaras et al., “The Effect of Conventional Instrument Transformer Transients
on Numerical Relay Elements,” Paper presented at 28th Annual Western Protective
Relay Conference, Spokane, WA, 2001.
[12] D. Angell and D. Hou, “Input Source Error Concerns for Protective Relays,” Paper
presented at 33rd Annual Western Protective Relay Conference, Spokane, WA,
2006.
79
6 CONTROL FUNCTIONS
6.1.1 INTRODUCTION
Automatic reclosing (AR) systems are intended to re-energize and restore the faulted section
of the transmission system once the fault is extinguished (providing it is a transient fault). For
certain transmission systems, reclosing is used to improve system stability by restoring
critical transmission paths as soon as possible [1].Fault statistics indicate about 4-10 faults
per 100 km per year for EHV (220-400 kV) overhead lines, of which 85-95% of them are
transient and the line can be re-energized.Tripping for transient faults on transmission lines,
caused by lightning or temporary contact with foreign objects, may be followed by re-
energization of the line after a short interruption period, known as the dead time. The dead
time should be long enough to allow the arc to fully extinguish, in order to prevent re-striking
on re-energization; but not so long that system stability or synchronism would be
jeopardized.
A typical example of an AR cycle for a transient fault is given in Figure 6.1.
Successful re-close
Protection reset
Protection trip
Fault instant
Closed
CB
Open
AR close command
Arc extinguished
CB closed
AR ready
CB open
Start AR
t0 t1 t2 t3 t4 t5 t6 t10 t
AR function AR dead time setting Reclaim time
Permanent faults must be located and repaired before the line can be returned to service.
Common permanent faults include broken conductors contacting the ground; foreign objects
accidentally placed between the live phases; and faults on underground cable sections of the
transmission line.
80
A typical example of an AR cycle for a permanent fault is given in Figure 6.2.
Protection reset
Protection trip
Protection trip
Fault instant
Closed
CB
Open
CB closed
AR ready
CB open
Start AR
t0 t1 t2 t3 t4 t5 t6 t7 t8 t9 t10 t
AR function AR dead time setting Reclaim time
From the above figures some important auto-reclosing scheme parameters can be identified,
namely the fault duration, the dead time for the system or for the AR function, the de-
ionisation time, the arcing time, the opening time and the reclaim time and number of shots.
Dead Times
The system dead time is the time delay between the moment when the arc is extinguished
and the moment when the CB contacts are again closed (t6-t3).
The AR dead time is the time delay between the moment when the AR function is started
and the moment when the IED closes its output contacts and energises the closing coil of the
CB (t5-t1). The point at which the AR is considered to start will vary between manufacturers,
and may start at the instant the original trip command is issued or when the CB auxiliary
contacts provide an open status indication. However, for modern CBs and high-speed AR
81
(i.e. dead times within one second); the AR dead time is approximately the same as the
system dead time.
The dead time setting depends on the voltage level and should allow for complete de-
ionisation of the arc to prevent re-striking of the arc on closing. Furthermore, the tripping
mode, whether single-pole or three-pole will also influence the dead time. Usually the dead
time for single-pole tripping is greater than that for three-pole tripping to cope with the mutual
coupling with the remaining energised phases and also because loss of synchronism is less
likely during single-pole tripping.
In the case of three-pole AR, there are separate requirements for high-speed AR and slow or
delayed AR. Whereas high-speed AR is often applied without synchrocheck; slow AR is only
permitted if synchrocheck conditions are fulfilled. Accordingly, IEDs have different dead time
settings for these two applications. Furthermore, a separate start input may be used to permit
three-pole high speed AR without applying synchrocheck conditions.
During an additional timer after the dead time, the synchronism conditions, as appropriate,
are checked. Failure to meet the conditions results in blocking of the AR cycle. This timer
helps to maintain uniform dead time settings at either end of a line, irrespective of the end
being subject to dead-line or synchrocheck conditions. The timer setting must be long
enough to overcome a possible power swing on reclosing at one end after a line fault.
82
6.1.3 AR OPERATING MODE
It is a common requirement that the AR function shall provide single-pole and three-pole AR
and a mode selector. In systems where two pole tripping is permitted, two-pole AR is also
required.
When the single-pole (only) mode is selected, single-phase-to-ground faults result in tripping
of only the faulted phase, followed by AR. Multi-phase faults result in final three-pole trips
without AR.
Selecting the three-pole (only) mode results in a three-pole trip for any fault type and a three-
pole AR which may, as appropriate, be subject to synchrocheck conditions.
In the combined single and three-pole mode, a single-phase-to-ground fault results a single-
pole trip and AR without any control condition; and a multi-phase fault results a three-pole
trip and three-pole AR which may, as appropriate, be subject to synchrocheck conditions.
Operating requirements may limit the number of shots for certain types of faults to one, while
allowing multiple shots for other types of faults. An example is the combined single and
three-pole mode where multiple single-pole shots may be allowed, but with only one shot
allowed for a three-phase fault.
83
AR dead time
AR dead time
84
6.1.3.3 PREPARE THREE POLE TRIP
In single or two-pole tripping applications, it may be necessary, in certain circumstances, to
trip three-pole. Some examples include when the AR function is disabled or blocked, or if a
new trip issues after the last programmed shot. The “prepare three pole trip” condition forces
all trips to issue as three-pole trips. For permanent faults, the time of release of the condition
is, in some AR functions, simultaneous with the close command of the last programmed shot.
If the device tripping function does not have a facility to trip three-pole for evolving faults,
then the AR function can help by releasing the condition for a short while after the protection
trip gets reset.
6.1.4.1 AR START
AR is intended for the local line where a fault can be identified and tripped almost
simultaneously at the both line-ends. The types of protection functions that normally start AR
are Zone 1 and Carrier aided distance protection trips; weak-end infeed with echo logic trips;
and differential protection trips. Sometimes, directional ground fault and instantaneous phase
overcurrent protection are also required to activate AR. Proper phase selection is necessary
for single-pole reclosing.
When using instantaneous phase overcurrent protection to start AR, care should be taken to
ensure that the settings result in selective tripping. Upon loss of communications, it is
possible to automatically increase the dead time. This becomes necessary to allow the arc to
extinguish for a fault beyond Zone 1 from either end.
There are two basic methods to start AR. One is to start only for the protection functions
indicated above; the other is to start with a general fault detection and at the same time
ensure that only the intended type of trip actually starts the AR cycle. In the first case, AR is
started by the trip commands from the specific functions and the dead time starts
immediately. In the second case, if during a set time after the general start, no trip command
is registered, then the AR cycle is discontinued. This ensures that delayed trips do not start
AR. In either case, separate start commands are necessary to discriminate between using
single, two or three-pole dead times.
It should be noted that, whereas SOTF for a manual close should not start the AR cycle; a
SOTF trip upon a reclosing attempt should continue the AR cycle in multi-shot applications.
Hence in the first method, AR functions are provided with an input to start AR for a SOTF trip
but the input is only valid from the second AR shot and upwards. In the second method, an
additional input for SOTF trip is provided which conditionally blocks the cycle if the cycle has
not yet started. Upon manual close, a SOTF trip, being fast, will appear before the timer
elapses and blocks AR cycle which would have otherwise have appeared at the trip input.
Similarly for multi-shot AR, there is no problem since the cycle had already started.
As a precaution, all trips which should not be followed by AR should “inhibit” the function.
85
6.1.4.2 AR BLOCKING
It may be necessary to block the AR cycle for internal or external conditions. Common
external conditions include blocking AR for a manual close command, or for trips from the
Busbar Protection or CB Failure Protection functions.
Internal AR blocking conditions include trips from time-delayed protection functions, SOTF
trips, and evolving faults following a single-pole trip.
86
It is also possible to monitor an unsuccessful reclose attempt by checking the CB contacts
within a certain time after reclosing command is issued.
87
some of these internal inputs may block the AR when active; block the reclaim timer when
active; enable three-pole or single-pole AR when active, etc.
The use of user-defined logics or other similar approaches permits the implementation of a
significant amount of adaptive schemes, some of which are described below:
• Block AR when a CB failure or trip circuit monitor alarm occurs.
• Block AR for multi-phase faults (IEDs typically include this feature).
• Change of setting group depending on the service history of the CB (e.g. inhibiting
AR if the CB has been used over an extended period of time.
• Change of setting group depending on the substation or network configuration (e.g.
automatic changeover of the AR “leader-follower” logic).
• General blocking of AR by any external condition.
More complicated algorithms have been proposed to improve the performance of AR as
follows:
88
IEDs support algorithms which monitor the voltage and frequency conditions pertinent to safe
synchronization. The most important of these is the direct slip calculation. The following are
synchrocheck features offered by various IED manufacturers:
• Phase angle supervision.
• Slip frequency limitation (angle-time limit, minimum/maximum slip frequency limits,
i.e. direct slip measurement).
• Anticipatory close initiation.
• Minimum and maximum voltage limits.
• Maximum difference between voltages.
• Voltage (generator) priority check.
• VT phase angle compensation, voltage magnitude compensation and built-in dead
bus logic.
The synchrocheck function should be set within the limits recommended by the turbine-
generator manufacturer, by the relevant grid-code or in accordance with control centre
instructions. A typical recommendation might be for a maximum closing angle of ±10-30o, a
maximum voltage difference of 0 to +5% and a maximum slip of 0.067 Hz. In order to
optimize settings, minimum settings should be applied. Setting a 1.0º closure angle with a
max slip of 0.001 Hz would guarantee a failed synchronizing. The synchronizing conditions
are subject of a stability study. In order to facilitate closing at locations which are distant from
generation, many TSOs permit angle differences up to 60º.
The synchronism and voltage check function uses the feeder voltage (Uline) and the busbar
voltage (Ubus) for comparison purposes. The latter may be any convenient phase-to-earth or
phase-to-phase voltage derived from busbar VTs (Figure 6.5). If a power transformer is
located between the feeder VTs and the busbar VTs, its vector group can be compensated
for by the IED, so that no external matching transformers are necessary.
Voltages sup.
Bus Voltages sup.
Position, O-C-O
Bus Isolator status
B2, U nm
B1, U nm
Bkr. status
Close
Trip
89
The closing check procedure can be selected from the following operating modes:
• Release at synchronism, i.e. when the critical values of voltage, voltage difference,
frequency different and phase angle difference lie within the set points.
• Release for energized busbar and de-energized line.
• Release for de-energized busbar and energized line.
• Release for de-energized busbar and de-energized line.
• Release without any check.
There are two techniques to verify that a static or rotating phase angle is within a specified
limit. The phase angle/time comparison technique introduces an additional time delay but the
phase angle/slip technique does not. This latter technique takes into account the slip
frequency across the CB in order to optimise the timing of the close command (i.e. 0º). The
function continuously estimates the angle difference some ms later (i.e. to account for the CB
closing time) and tries to give the close permission when the estimation is near 0º (Figure
6.6).
U ma
x
U min
The release conditions can be configured separately for AR, manual closing, and closing via
control commands. E.g. manual and control closing can be allowed in cases of synchronism
or dead line, while, the AR can be subject to dead-line checking at one end before the AR
attempt and following a successful reclose at that end, synchrocheck at the other end.
IEDs incorporate synchronism units aimed at supervising the closing of the CBs in the
protected area. The integration of synchrocheck in the IED avoids the use of external wiring,
including digital inputs and outputs and analog signals from VTs.
IEDs can manage simultaneous synchronism between several voltage sources and the line
voltage, cooperating with complex AR schemes. When several CBs are operated by the AR
function (e.g. breaker-and-a-half or ring arrangements), it is necessary to have one
synchronism unit per CB, which may be integrated into a common IED.
Where alternative synchronising voltage sources are available, the IED may be programmed
to select the most convenient voltage source. Both the primary and alternative voltage
sources are necessarily wired to the device and, depending on an internal logic, the device
uses one of them to decide the close permission.
It is possible to use line and busbar voltages from different phases, compensating the
angular difference by means of device settings. Different VT ratios can similarly be
compensated for.
90
6.2 POWER SWING BLOCKING AND OUT-OF-STEP FUNCTIONS
6.2.1 INTRODUCTION
Power swing is a variation in three phase power flow which occurs when the generator rotor
angles are advancing or retarding relative to each other in response to changes in load
magnitude and direction, line switching, loss of generation, faults, and other system
disturbances [7]. A power swing is considered stable if the generators, during a system
disturbance, do not slip poles and the system reaches a new state of equilibrium, i.e. an
acceptable operating condition. A power swing is considered unstable if a generator or a
group of generators slip poles for which some corrective action is necessary. Power swings
can considerably reduce the voltage at the line terminals, considerably increase line currents,
and slightly change frequency as measured. As a result power swings can pose both security
and dependability problems for many of the line protection functions.
During power swings, elevated currents and depressed voltages can resemble fault
conditions and therefore can jeopardize security of distance, undervoltage, and overcurrent
functions. Changes in frequency can reduce accuracy of polarization and directional methods
that rely on memorized values of the polarizing quantities. The performance of protective
relays that monitor power flows, voltages, and currents may respond to variations in system
voltages and currents and cause tripping of additional equipment, thereby weakening the
system and possibly leading to cascading outages and the shutdown of major portions of the
power system [8]. Protective relays prone to respond to power swings and may cause
undesired tripping of lines or other power system elements include overcurrent, directional
overcurrent, undervoltage, distance, and directional comparison systems. During power
swings many line protection functions could also experience decrease in their dependability
as compared with no-swing conditions. Security of some of the protection methods, such as
line current differential, is not affected by power swings.
Figure 6.7 illustrates the impedance trajectory during an unstable power swing. When the
impedance locus intersects the total system impedance line (in the R-X plane) the equivalent
source system voltages are 180º apart. This point in the network is called the electrical
centre of oscillation (ECO) of the system.
The philosophy of out-of-step (OOS) relaying is simple and straightforward: avoid tripping of
any power system element during stable swings and protect the power system during
unstable swings or OOS conditions. When two areas of a power system, or two
interconnected systems, lose synchronism, the areas must be separated from each other
quickly and automatically in order to avoid equipment damage and shutdown of major
91
portions of the power system [9]. Uncontrolled tripping of circuit breakers during an OOS
condition could cause equipment damage and pose a safety concern for utility personnel.
Therefore, a controlled tripping of certain power system elements is necessary in order to
prevent equipment damage, and widespread power outages, and minimize the effects of the
disturbance [8][9].
92
A newer method uses a continually updated dZ/dt measurement of the rate of change of
impedance [10]. This replaces the simplistic monitoring of the rate of change via timing in the
pre-defined areas of the impedance plane. The dZ/dt values between the minimum and
maximum thresholds indicate a swing. High values of dZ/dt point to switching events such as
faults, and low values of dZ/dt point to existing yet not cleared faults. Figure 6.9 illustrates the
power-swing detection using a continuous impedance calculation.
X
Stable power swing
impedance trajectory
Load
DZ3 DZ2 DZ1
A delta impedance setting is not required anymore, because the algorithm automatically
considers any delta impedance that is measured between two consecutive calculations and
sets the delta impedance for the next calculation automatically in relation to the previous
calculation. This leads to a dynamic calculation of the delta impedance and an automatic
adaptation to the change of the power swing impedance. Also the delta time setting is not
required anymore because it is determined by the calculation cycles of the algorithm. This
method is less dependent on the location of the impedance trajectory during swings and less
prone to false operation during system faults.
Another new method uses a swing centre voltage (SCV) to detect power swings [11]. SCV is
defined as the voltage at the location of a two-source equivalent system where the voltage
magnitude is zero when the angles between the two equivalent system sources are 180
degrees apart. Voltages and currents at a line terminal allow a relatively precise estimation of
a quantity proportional to the voltage at the swing centre. The rate of change of the SCV
magnitude is a good approximation of the rate of change of the relative angle between the
systems. The method responds to a continually updated dSCV/dt measurement. Figure 6.10
illustrates the phasor diagram of an inductive two-source system, with the SCV shown as the
phasor from origin o to the point o'. An approximation of the SCV is obtained through the use
of locally available quantities where Vcosφ is a projection of local voltage VS onto local
current I.
93
Figure 6.10 – Phasor diagram of a two source inductive system
A simplified relation between the SCV and the phase-angle difference δ of two-source
voltage phasors is given by (6.1).
δ
SCV1 = E1 ⋅ cos (6.1)
2
In (6.1) SCV1 represents the positive-sequence swing-centre voltage. The absolute value of
the SCV is at its maximum when the angle between the two sources is zero, and this value is
at its minimum (or zero) when the angle is 180°. This property has been exploited so one can
detect a power swing by looking at the rate of change of the swing-centre voltage. The time
derivative of SCV1 is given by (6.2) and provides the relation between the rate of change of
the SCV1 and the two-machine system slip frequency, dδ/dt. Note that the derivative of
SCV1 is independent from the network impedances and that it reaches its maximum when
the angle between the two machines is 180°.
d (SCV1) E1 δ dδ
= – sin (6.2)
dt 2 2 dt
The SCV is independent of the system source and line impedances [7][11][12]. On the
contrary, other quantities, such as the resistance and its rate of change, the real power and
its rate of change depend on the line and system-source impedances and other system
parameters. The SCV is bounded with a lower limit of zero and an upper limit of one per unit,
regardless of system impedance parameters. This is in contrast to other electrical quantities,
such as impedance, currents, and active or reactive powers, whose limits depend on a
variety of system parameters.
The superimposed component, the dZ/dt, and dSCV/dt methods allow relatively reliable
detection of faults occurring during power swing conditions (power swing unblocking).
94
Directional comparison schemes are typically jeopardized unless they use current only
elements (current polarized ground directional overcurrent, for example) or elements less
immune to swings (negative-sequence directional overcurrent, for example).
Overcurrent and voltage functions may be jeopardized depending on their pickup and time
delay settings. Generally, more margins in the pickup thresholds compared with load and
longer time delays make these functions less prone to misoperation during power swings.
Negative-sequence and zero-sequence overcurrent protection functions are secure during
power swings, unless an open pole condition in the protected line or in the vicinity, or an
external fault, cause considerable current unbalance. This unbalanced current is subjected to
a power swing the same way a positive-sequence current is, and therefore may result in
misoperation of the negative-sequence or zero-sequence based functions.
Distance functions are affected through a combination of lower apparent impedance and
memory polarization, if applied. Instantaneous underreaching directly tripping zones may be
affected. Instantaneous overreaching zones and reverse looking blocking zones working in
directional comparison schemes may be affected as well. Time delayed distance functions
may be immune to swings if their time delay is long enough to ride through the period of time
when the apparent impedance stays inside their operating characteristics.
Application of PSB increases the integrity of the power system. In order to avoid disrupting
such large integral systems under major power system disturbances beyond their design
limits, it is beneficial to apply proper system protection including controlled separation via the
out-of-step tripping (OST).
95
• Relying on non-directional distance elements with time delay to ensure detection of
close-in faults, particularly three-phase faults during unstable swings.
Application of the above measures to re-gain dependability during power swings may result
in decreased security and unintended operation for external faults.
In many instances the decrease in dependability is temporary. When the stable swing
subsides, or when the unstable swing reaches a point of the sources being in phase many
protection functions will operate within their specifications.
27 29 31 33 35
4 37 39
41
Im(Z1) ohm
2 43
0 45
25
-2
-4
23
-6 21
19
-8
-10 -8 -6 -4 -2 0 2 4 6 8
Re(Z1) ohm
96
An example of pole slip protection tripping is shown in Figure 6.12.
Opening a breaker when the two systems are out of phase exposes the breaker to up to
twice the system voltage, and therefore may cause transient recovery voltage (TRV) issues
for the breaker. Tripping during this condition imposes high stresses on the breaker and can
cause re-strikes and breaker damage. In some applications, the trip command is issued past
the pole slip (on the way out) when the two systems are almost in phase to minimize the TRV
effects. Another important aspect is to block line reclosing after OST initiation.
97
load/generation balance, and the ability to establish stable operating areas after
separation. In some systems, it may be necessary to separate the network at a
location other than the one where the OST function is installed. This is accomplished
with the application of a transfer tripping type of scheme and tripping must be
supervised to avoid breaker opening when the angle between systems is near 180°.
To limit the amount of generation and load shed in a particular island, it is essential
that each island have reasonable generation capacity to balance the load demand.
High impedance paths between system areas typically represent appropriate
locations for network separation.
• Establish the maximum rate of slip between systems for OOS timer setting
requirements as well as the minimum forward and reverse reach settings required for
successful detection of OOS conditions. The swing frequency of a particular power
system area or group of generators relative to another power system area or group of
generators does not remain constant. The dynamic response of generator control
systems, such as automatic voltage regulators, and the dynamic behaviour of loads
or other power system devices, such as SVCs and FACTS, can influence the rate of
change of the impedance measured by OOS protection devices.
The relay settings of conventional PSB and OST functions are difficult to calculate and
require extensive stability studies in most applications. One of the reasons for extensive
stability studies stems from the fact that the quantities used in many PS and OOS detection
methods depend on system source and line impedances. Modern power-swing functions with
a few or no-setting requirements utilize quantities that are less dependent or independent
from system source and line impedances, take advantage of well-regulated power system
quantities, and do not require any stability studies for setting the PSD function and the OST
function if one chooses to trip on the way out [11].
98
Whereas the ZVT function is intended to operate for loss of voltage or voltage collapse,
rather than temporary voltage dips, the undervoltage threshold will typically be set very low
and the time delay set longer than the maximum fault clearance time or any other temporary
undervoltage condition duration (e.g. AR dead time). This will ensure tripping only for
significant and sustained undervoltage conditions.
The inputs and outputs of the simplified ZVT function block are presented in Figure 6.13.
Enable
ZVT Trip
Block
Isolators
CB
U and/or I
A possible implementation of the zero voltage tripping function would include the monitoring
of the corresponding phase-to-phase voltages on either side of the CB, such that a sustained
undervoltage below the setting threshold of both voltages (“zero voltage”) would result in a
trip command to the CB. The function should be blocked in the case of secondary voltage
failure of either voltage, therefore voltage measurement supervision, such as fuse-failure, VT
MCB status monitoring, dV/dI monitoring, etc. for both voltages is critical. Furthermore, the
function may be supervised using topological information such as CB or isolator position,
depending on the degree of functional security required.
More complex algorithms may be applied using the three-phase-to-ground voltages and
three phase currents of one side only of the CB. It should be noted that the use of measured
signals from one side only, while avoiding extra reference voltage wiring (for traditional
SASs), will demand extra security measures and may not facilitate the opening of all of the
necessary CBs, especially on breaker-and-a-half arrangements. The trend to minimize
hardwiring and at the same time maintain the levels of security and performance of this
function may be achieved with an SAS based on IEC61850.
There is no special trend regarding the use or the architecture for this technique. Whilst the
simplest approach of comparing between the voltages on both sides of a certain CB
demands careful hardwiring and some complexity to feed the IED in which the algorithm is
preformed, it is to be expected that, with the IEC61850 based capability of transmitting
sampled values, the easiest way to implement the ZVT will be using the above mentioned
algorithm with same security conditions and to treat the function as a user defined logical
node, subscribing status information and sampled values.
6.4 REFERENCES
[1] IEEE Std C37.113-1999 “IEEE Guide for Protective Relay Applications to
Transmission Lines”.
[2] CIGRÉ SC 34 WG-01 “Reliable fault clearance and back-up protection”, 1998.
[3] W.J. Laycock, “Adapting reclosure of HV circuits to system conditions”, South African
Power System Protection Conference, 8-9 November 1994.
99
[4] A. Guzman, J. Mooney, G. Benmouyal and N. Fischer, “Transmission Line Protection
System for Increasing Power System Requirements”, Schweitzer Engineering
Laboratories, Inc. TP 6122, 2002.
[5] Xiangning Lin and Pei Liu, “Method of distinguishing between instant and Permanent
Faults of Transmission Lines based on Fuzzy Decision”, Proceedings of the
International Conference on EMPD '98, 1998.
[6] M. I. Khoroshev and V. Faybisovich, “Analysis of Adaptive Single Phase
Autoreclosing for High Voltage Transmission Lines with Various Compensation
Levels”, Power Systems Conference and Exposition 2004, IEEE PES 10-13 Oct.
2004.
[7] “Power Swing and Out-of-Step Considerations on Transmission Lines”, Report to the
Power System Relaying Committee of the IEEE Power Engineering Society, WG D6,
2005.
[8] D. A. Tziouvaras and D. Hou, “Out-of-Step Protection Fundamentals and
Advancements,” in 2003 30th Annual Western Protective Relay Conference
Proceedings.
[9] Elmore, W. A., “The Fundamentals of Out-of-Step Relaying,” in 1981 34th Annual
Conference for Protective Relay Engineers Proceedings.
[10] J. Holbach, “New Out-of-Step Blocking Algorithm for Detecting Fast Power Swing
Frequencies,” in 2003 30th Annual Western Protective Relay Conference
Proceedings.
[11] G. Benmouyal, D. Hou, and D. Tziouvaras, "Zero-setting Power-Swing Blocking
Protection ", in 2004 31st Annual Western Protective Relay Conference Proceedings.
[12] F. Ilar, “Innovations in the Detection of Power Swings in Electrical Networks,” Brown
Boveri Publication CH-ES 35-30.10E, 1997.
[13] “Performance of Relaying during Wide-Area Stressed Conditions”, Report to the
Power System Relaying Committee of the IEEE Power Engineering Society, WG
C12, 2008.
[14] D. Tziouvaras, “Relay Performance During Major System Disturbances,” in 2006 33rd
Annual Western Protective Relay Conference Proceedings.
100
7 TRANSMISSION LINE AND PROTECTION SYSTEM
MONITORING FUNCTIONS
Storage capacity
Although not the main purpose of the protection system, FREC features are available within
any new IED for post disturbance analysis. The memory available to store relevant data is
still limited even for many newer IEDs. This “limitation” may be mitigated if the IED is connect
to a Central Unit, with higher storage capacity, via a LAN (or even WAN) in which an
application, event driven or pre-defined scheduler, will extract the data of every new record.
Sampling frequency
For Power Quality purposes, a high sampling frequency may be required; however, for
protection system behaviour analysis and most fault events, the 1 – 2 kHz sampling
frequency available within most IEDs is generally sufficient. Some IEDs provide higher
sampling frequencies for stored analog data (e.g. 8 kHz). It should be noted that the analog
data stored within IEDs for use by protection functions are of no use for the analysis of higher
frequency phenomena above half of the sampling frequency, as would occur for any given
IED that converts analog quantities to digital sampled data.
Output examples
The sampled data stored within any IED may be manually or automatically uploaded to a
Central Unit (normally an industrial PC with or without high storage capacity), either remotely
(via a telephone link or ethernet access) or locally to any PC for post fault analysis. Whilst
the internally stored format and manufacturer application are proprietary, usually a
101
COMTRADE format is available and delivered by any vendor application for further fault
analysis and/or protection system behaviour monitoring.
Figure 7.1, Figure 7.2 and Figure 7.3 present output examples (instantaneous, RMS and
phasors, respectively) retrieved by a vendor application which could be easily re-played by
any other application capable of handling COMTRADE files.
Figure 7.1 – Ground fault (phase B) on a 145 km 400 kV line (instantaneous time signals)
Figure 7.2 - Ground fault (phase B) on a 145 km 400 kV line (RMS computed values)
102
Figure 7.3 - Ground fault (phase B) on a 145 km 400 kV line (pre-
(pre-fault and fault phasors)
A further insight and more protection behaviour oriented analysis could be performed (e.g.
for distance protection) if the power system current and voltage values could be correlated
with the zone reach settings stored in the IED at the time of the fault. As an example (Figure
7.4), an estimated locus presentation could be viewed in order to have an immediate view of
which zones (if any) the static apparent impedance, as “seen” by the protection, had entered.
Figure 7.4 - Ground fault (phase B) on a 145 km 400 kV line (apparent impedances locus)
103
7.1.2 DISTURBANCE RECORDER
The disturbance recorder (DR) function is mainly used to analyse the quality of the system
protection operation.
The DR function continuously collects protection system data such as analog signals and the
input and output states of the various functions. Once triggered by a fault, the DR stores the
data records for the fault duration, including settable periods of pre- and post-fault data.
Difference levels of DR report are available:
• General disturbance information (date, time, fault type, etc.).
• Indications (fault type, protection function operation, fault location, etc.).
• Event recording (time stamped events).
• Complete disturbance recording (instantaneous values for each analog input signal,
at each sampling moment and the status of the binary inputs and binary outputs).
The DR function is usually combined with an appropriate software tool. The main facilities of
the software are the following:
• Graphical presentation of all analog inputs versus time and display of instantaneous
values.
• Graphical display of RMS values and phase angle of all analog inputs.
• Calculation and display of phase and ground impedances, based on line parameters.
• Calculation and display of voltage and current sequence values.
• Phasor (vector) diagrams for voltages and currents.
• Harmonics analysis for all analog inputs.
• Fault location.
• COMTRADE format export data capability.
104
• Series compensated lines.
• Mutual coupling effects.
• Underground cables.
• Sources of errors affecting fault location accuracy, depending on the method used
(line parameters, pre-fault load, fault resistance, etc.).
• Should the IED performing the protection function also be responsible for fault
location estimation? Or, a central system collect synchronized post-processed fault
records from the IEDs to perform fault location estimation? Or, both?
Figure 7.5 - Ground fault (phase B) on a 145 km 400 kV line (fault location estimation, single-
single-ended)
Figure 7.6 presents the event log, for the same fault, in which the distance to fault calculated
by the IED is displayed.
The difference between the two estimates of 16.1 km in Figure 7.5 and 15.8 km in Figure 7.6,
is of no significance for the 145 km line in question, and results mainly from the different
precision of values and the extra information that was introduced in the post analysis
application.
105
Figure 7.6 - Earth fault (phase B) on a 145 km 400 kV line (fault location estimated by the IED)
106
Figure 7.7 - Configuration of a line in a substation
Principle of Operation
The Open Line Detector algorithm is made up of five major building blocks as shown in
Figure 7.8.
• Acquisition unit, which incorporates an anti-alias filter with a 400 Hz cut-off frequency.
Its nominal sampling rate is 32 samples per cycle.
• Kalman-filter based phasor estimation unit.
• Pre-processor unit which computes and extracts the features to be used in the fuzzy-
logic decision.
• Fuzzy-logic algorithm.
• Logical unit which processes the output signal to lock the decision.
107
The vectors from the acquisition unit are fed into the Kalman filter which uses a state based
predictor corrector algorithm which filters the vectors to provide the required data for the
processing unit.
Whereas there is much to advocate the use of Kalman filtering in general, its superiority, in
this application, over the Discrete Fourier Transform (or similarly, any full-cycle phasor
measurement scheme) is its capability to provide signal components at spectral frequencies
other than the fundamental and its harmonics. The filter then becomes an effective built-in
self-diagnosis tool, taking advantage of both negative sequence components at fundamental
and at resonance that may transiently appear when a line is opened at both ends while its
shunt reactors are connected.
The Kalman filter has the following elements, whose interactions are shown in Figure 7.9:
• Start-up state.
• Predictor state.
• Corrector state.
The data captured has a resolution of 16 bits, four voltage input channels, six current input
channels and three channels used as voltage rail checks. Next, a Clarke Transform [1] is
performed on the three phasors to convert them into orthogonal vectors.
The Kalman filter matrices were evaluated using a Matlab model of the system, with a
constant sampling rate and are used for all system conditions. The filter generates a number
of phasors, such as the positive sequence voltage and currents, and from which the active
and reactive power is derived.
The pre-processor performs various FIR filtering, peak detection and averaging functions,
slope detection and delta detection algorithms to produce the inputs required by the fuzzy
logic algorithm.
A fuzzy logic approach was used in the design of the DLO because of its flexibility for solving
inherent conflicts found in the detection of a line status based on voltages and currents only.
For instance, during line energization at no-load, CVT induced electromagnetic transients
may suggest that the active power is not zero (line closed) when the line is actually open.
Experience has demonstrated that such conflicts can be more easily resolved using a multi-
criteria fuzzy logic based approach [2], which results in the following interesting properties:
• Tripping decision is based on several criteria with adaptable weighting factors.
• Uncertainty with respect to signals and settings is modelled quantitatively.
• Delay of tripping initiation depends on the amount or inflow of information related to
protection signals, and through them, to the disturbance analyzed by the device.
The general structure of the fuzzy decision system consists of three main steps:
• “Fuzzyfication” of 10 selected decisions features from the pre-processor.
• Fuzzy logic inference on these features, using twelve rules or criteria.
• Crisp decision sent to the output.
108
Fuzzyfication is a necessary step prior to a fuzzy-logic based reasoning system. It transforms
the crisp variables provided by the pre-processor in Figure 7.8 into categories easily
described by common language terms such as “Normal”, “Small”, “Large”, “Very Large”, etc.
Figure 7.10 illustrates this fuzzyfication process for two typical variables, the active Power
and its rate of change DeltaP. The first one is defined as "SMALL" when its crisp value is
below a given threshold (θL) while the DeltaP feature is defined as "BIG" for crisp values
higher that (θS). Examples of typical rule elements are:
• A security rule: if (ActivePower is not SMALL) LINE is CLOSED.
• A reliability rule: if (DeltaP is BIG) LINE is OPEN.
109
• Disable the protection elements and trip/close logic.
• De-energize all output contacts.
• Generate an automatic status report at the serial port for warnings and failures.
• Display failure messages on the device LCD.
• Generate an alarm signal from the N/C contact of the HEALTHY state output relay
(now de-energised).
Self-test effectiveness is defined by the proportion of all relay failures that can be detected by
the device self-test functions. Field data shows that a practical value of self-test effectiveness
is 90%. Whereas it may be possible to devise relay hardware and software that could be fully
supervised, it is likely that cost of such a device would be prohibitive. Therefore, it is
important that manufacturers devise reliable hardware, and incorporate simple tests that
detect as many failures as possible.
The goal of self-testing is to maximize the availability of the protection and minimize risk of
maloperation. In order to benefit from relay self-test operation, the utility should monitor the
self-test alarm contact outputs of all IEDs.
It is convenient to divide the IED into three sections for the purposes of self-testing:
• Analog inputs.
• Contact input/output circuitry.
• Processing.
Hardware Supervision
The analog input section consists of the analog signal connections, isolation transformers,
low-pass filters, one or more multiplexers, and an ADC. Automatic self-tests only partially
monitor the analog input section, therefore, maintenance practices should verify the analog
input components.
Condition ALARM
Protection
Warning (W) Output
Self-Test Disabled Description
or Pulsed* (P) or
(Y/N)
Failure (F) Latched (L)
Input W N P Measures the DC offset at each of the
Channels input channels
Input F Selectable L Measures imbalance between input
Channel channels by zero sequence and
Imbalance negative sequence monitoring
Master W N P Measures the DC offset at the A/D
Offset F Y L
A/D F Y L Applies a stable reference voltage to
Accuracy a prescribed A/D channel and
Check monitors the conversion result.
Power W N P Measures the power supply rail(s)
supply F Y L voltage
rails
TEMP W N P Measures the temperature at the A/D
F Y L voltage reference
A/D F Y L Validates proper number of
conversions per processing cycle
* “Pulsed” here indicates that the signal follows the alarm state
110
The contact input/output circuitry is also only partially covered by automatic testing. It is
possible to design output hardware that is fully redundant and verifiable through self-tests.
Whereas the existing hardware is reliable, the additional cost of more complex hardware is
not justified. However, alarms indicating the failure of each input/output board are available
to the extent they are supervised. Routine verification of the output contacts and binary
inputs is appropriate when the equipment does not operate regularly in response to faults.
In some instances, the analog signals to the ADCs is internally distributed to two different
converters, with different amplification factors thus making it possible to supervise the signals
which should be identical under normal conditions in addition to improving the dynamic
performance of the A/D conversion.
Software Supervision
The digital processing section, typically a microprocessor, is the interface between the
analog input section and the contact input/output section. Self-tests monitor the processor
and associated memory components. Since the analog and contact input/output sections
cannot function without the processing section, normal service also verifies the relay
processing section.
ALARM
Condition
Protection Output
Warning (W)
Self-Test Disabled Pulsed* (P) Description
or
(Y/N) or
Failure (F)
Latched (L)
RAM F Y L Performs a read/write test on system
RAM
ROM F Y L Performs a checksum test on the
relay program memory
CR_RAM F Y L Performs a checksum test on the
active copy of the device settings
EEPROM F Y L Performs a checksum test on the non-
volatile copy of the device settings
µP Crystal F Y L The device monitors continuously the
microprocessor crystal
µP F Y L The µP examines continuously each
program instruction, memory access,
and interrupt.
* “Pulsed” here indicates that the signal follows the alarm state
111
Also, the tripping of VT secondary circuit MCBs can be directly monitored as a voltage failure
condition and acted upon (e.g. blocking the distance protection function, activating an
emergency overcurrent function and issue a voltage failure alarm).
Some measurement supervision techniques may issue erroneous measurement failure
alarms during fault events and single pole tripping conditions. These functions may be used
to control (i.e. enable or block) protection functions or just to issue alarm signals.
112
VT MCB Monitoring
When all three phases are not available, the sequence comparisons cannot be used. Hence,
the line VT MCB “b” (N/C) contacts are used. The two conditions on the operation of the “b”
contact are as follows:
1. “Fast” operation to permit blocking of distance protection before operates.
2. “Late-break” contact, so that the contact shall remain closed, maintaining the block,
while the main MCB contacts are closing.
R R
Y Y
B B
+ + INV
There are two ways of achieving the binary input activation of the voltage measurement
supervision function, namely using one three-pole MCB, or three single-pole MCBs as below:
• Condition 2 is possible by a drop off timer inside the relay.
• Condition 1 can only be guaranteed by special three-pole MCB.
Hence, it is good practice to use the “b” contacts of three, single-pole MCBs, and invert the
sense of the signal at device binary input (i.e. active without voltage).
113
7.3 REFERENCES
[1] Edith Clarke, “Circuit analysis if AC power systems”, Vol 1&2, pub: John Wiley &
Sons, Inc., New York ,NY, 1950.
[2] B. Kirby et al., “Fast Topology Detection based on Open Line Detection – A Strategic
Function in Power System Protection”, in Western Protection Relay Conference
Proceedings 2005.
114
8 AUXILIARY FUNCTIONS
115
digital elements and displaying calculated phasor magnitudes, phase angles and
symmetrical components values. They may also permit manipulation of scales, the addition
of notes and labels, and export of data to other files.
IEDs can also generate a variety of abbreviated tailored reports; historical reports, automatic
summary messages and sequence-of-events reports.
Sequence-of events reports are also created by IEDs. The elements monitored usually can
be selectable by the user rather than pre-set. Flexibility is remarkable since, for some cases,
when any selected element changes state, the device time-tags the change and records the
change in the report. The sequence-of-events report allows the timing of sequence of
operations within the device to be viewed and analyzed which is highly valuable when
analysing power system disturbance.
Scanning a history report allows a brief summary of all the events that happened at that
location, and this information can be filtered for further review, due to a current need or
generally for assessing protection performance. For each event the history report will usually
display the date, time, phases involved and the distance to fault.
Automatic summary messages are sent to the communication ports of the IED whenever
they are generated. The messages can be sent to a master station as it is analyzed in the
following chapter. This removes the need to poll the individual devices to check for new
event data, since this can be performed centrally. It is also possible to extract pertinent
operational information such as fault location and the phase involved in the fault; and to send
them to operators over the SCADA or a Protection Data Retrieval system.
116
Appropriate PCs or gateways together with the necessary software for retrieving the data
from the substations are consequently installed. Power quality recorders may be provided
and installed at specific substations. The substation devices can communicate with the
master station via the utility’s corporate fiber optic network, where such a network is
available, while the rest will be accessed via public network in dial-up mode.
Some typical arrangements for the remote access of IEDs are presented in Figure 8.1 and
Figure 8.2.
117
Where a digital communications channel is available between the IEDs at each line-end
other data, in addition to the protection data, can be transmitted thus be made available at
the line-ends. This data includes synchronization and topology data, as well as remote trip
signals, remote annunciation of signals and measured values. The topology of the protection
communication system is constituted by the allocation of devices to the ends of the protected
line and by allocation of the communication paths to the protection data interfaces of the
devices.
IEDs allow the transmission of a sufficient number of binary information items (e.g. 28) of any
type from one device to the other via the communication links provided for protection tasks. A
specific number of them (e.g. 4) may be transmitted as protection signals with high priority
(i.e. very fast), and consequently are suitable for the transmission of protection and trip
signals which are generated outside of the IED. The other signals are transmitted in the
background and give information on the events taking place in one substation which may
also be useful in another substation, to the system master station, to local DSCS or SCADA
as well.
The information is injected into the device via binary inputs and can be output at the other
ends again via binary outputs. The integrated user-defined logic in most IEDs allows logical
operation to be performed on the signals and other information from the protection and
monitoring functions of the devices on both the transmitting and the receiving side. The
binary inputs and outputs must be allocated appropriately during the configuration of the
input and output functions. If the remote signals are to be used for direct remote tripping,
they must be allocated at the send side with the function that is to perform the transfer trip at
the opposite side.
For the transmission of binary information no settings are required. Each device sends the
injected information to all other device(s) at the ends of the protected object. Where
differentiation is necessary, it will have to be carried out by appropriate allocation and, if
necessary, by a link at the receiving side. Even devices that have logged out functionally can
send and receive remote signals and commands. Specific annunciations are issued if a
specific device is actively involved in the communication topology and this state is stable.
Once a fault has been detected in the communication of the protection data interface the
appropriate setting address is started for resetting the remote signals.
Any signal from an external protection or monitoring device can be coupled into the signal
processing of the device by means of a binary input. This signal can be delayed, alarmed, or
routed to one or several output relays for external direct and remote tripping purposes. Fibre
optic connections or voice frequency modulated high frequency channels via pilot cables,
PLC or microwave radio links can be used for remote tripping of the CB at the opposite line-
end. If the trip command is to be transmitted the best way is to use the integrated
teleprotection function. Any of the commands can of course be used to trigger the transmitter
to initiate the send signal.
118
a wide area was difficult. A timing synchronous signal (time signal) is usually supplied by an
external timing synchronous system (or IED), independent of the ordinary
telecommunications network. These systems can provide the µs-precise time signals
required for the protection system, and a time signal distribution system using a suitable
terrestrial (digital) network.
For the system’s telecommunication network, it may be used an asynchronous transfer Mode
transmission and switching, as this facilitates the unified handling of a diverse range of
information and the integration of telecommunication devices, as well as improving
telecommunication circuit operational reliability. This system also allows simple adjustment of
telecommunication circuit connections e.g. in the event that electrical power system is to be
restructured.
In a protection IED with a time synchronization function, the sampling timing which is
specified is based on reference timing transmitted from a time signal generator to a time
synchronization unit, with a determination value. The time synchronization unit includes a
reception circuit that receives a discrimination code and time data transmitted from the time
signal generator, a code discrimination circuit that discriminates the reference timing on
condition that the received discrimination code coincides with a desired code, a time
calculation circuit that calculates the sampling timing on the basis of the discriminated
reference timing and the time data, and a sampling synchronization circuit that specifies the
sampling timing of a digital quantity of electricity on the basis of the calculated sampling
timing.
Substation automation demands precise time synchronization for a variety of IEDs. There are
different possible approaches to achieve the required accuracy. Time synchronization for
transmission substation integrated protection, system control and data acquisition require a
target architecture that distributes the synchronized time in several ways. Different solutions
are possible and can be realized using timing equipment.
The application of time synchronization in electrical systems can also be applied in the
following cases: SCADA, for protocolization and registration; in communications equipment
for communication processors; protocol translators; in fault recorders for post fault analysis
responsibility, liability; in billing meters AMR for tariff-switching; load analysis; in IEDs; RTUs;
SOE; sensors for protocolization and registration; in Servers, Routers, Switches for IT
security, in frequency deviation for system stability; in security monitoring for physical
security and in digital voice and video recording for civil responsibility, Law, Insurance
companies.
Synchronization of Equipment
The direct synchronization is realized using a GPS Antenna and dedicated synchronization
clocks, as illustrated in Figure 8.3.
119
The resolution and precision achieved is: 1 ms for events and faults synchronized using PPS
(Pulse per second as a hardware Gong); kPPs with 250 ns precision for synchrophasor
devices (Resolution of ±5 µs). The interface may be electrical or optical, the connection of
such systems and the compatibility is with protection IEDs, protocols (e.g. IRIG AB, Afnor,
DCF) and pulses (PPS-PPM, 1 kPPs, PPH) and the applications besides protection are
control, billing, metering, SOE and fault recording, frequency deviation (∆f, ∆T).
120
The following options for control of a single CB for operational purposes are foreseen:
• Local tripping and closing, via the device HMI menu.
• Local tripping and closing via device binary inputs.
• A manual trip will be permitted provided that the CB is initially closed. Likewise a
close command can only be issued if the CB is initially open.
• Where the check synchronism function is set this can be enabled to supervise
manual CB close commands. A CB close output will only be issued if the
synchrocheck criteria are satisfied.
CB auxiliary contact monitoring, calculation and integration of the CB interrupted current to
the power of a settable parameter, as well as the use of fault and trip operation counters
allows the IEDs to accurately predict the need and type of required CB maintenance. Trip
circuit supervision based on single or two binary inputs is used to detect problems in the
breaker trip circuits.
All of the above shows that the availability of advanced real time monitoring functions gives
the user valuable tools for improving the efficiency and reducing the cost of maintenance in
the electric power system.
Where OHL are prone to frequent faults and are protected by oil CBs, oil changes account
for a large proportion of the life-cycle cost of the switchgear. Generally, oil changes are
performed at a fixed interval of CB fault operations. However, this may result in premature
maintenance where fault current tends to be low, and hence oil degradation is slower than
expected. The IEDs have available a Σ Ι^power counter that monitors the cumulative severity of
the duty placed on the interrupter allowing a more accurate assessment of the CB condition
to be made.
The dielectric withstand of oil generally decreases as a function of Σ I2t , where I is the
broken current and t is the arcing time within the interrupting tank. As the arcing time cannot
be monitored accurately, the sum of the broken I2 is supervised and recorded. For other CBs
an exponent of 2 is inappropriate and for others 1.4 or 1.5 is more suitable.
Slow CB operation is also a cause for CB maintenance. Therefore alarm and lockout
thresholds are provided.
A CB may be rated to break fault current a set number of times before maintenance.
However successive CB operations in a short period of time may result in increased
maintenance.
The IEDs record various statistics related to each CB trip operation, allowing a more
accurate assessment of the CB condition to be determined.
121
8.5.1 CONTACT DISCREPANCY BETWEEN POLES
On Trip:
According to IEC 56 (para 3.3.1), the phase is considered open when the first contact of the
pole is open. The biggest discrepancy measured should not exceed a maximum value set by
the designer, the user, or by an agreement between them.
If not conforming: a pole's contact separation has to be simultaneous to prevent HV
transients, otherwise it would attain double the rated value on the first parting pole. The
maximum discrepancy allowed is 1/6th of a cycle.
On Close:
According to IEC 56 (para 3.3.2), the phase is considered closed when the last contact of the
pole is closed. The biggest discrepancy measured should not exceed a maximum value set
by the designer, the user or by an agreement between them.
If not conforming: The sudden energizing of circuits is always followed by a moderate voltage
increase, with the exception of long, unloaded transmission lines, where the voltage rise can
be critically dangerous. When a line is connected to an energized network, a voltage wave is
forced on the line. This wave is reflected back at the end of an open line, and returns with
double the amplitude.
Even higher voltages may be encountered when the line has a load before being
reenergized, and if the CB closes at the moment that the polarity of the network is opposite
to that which was present on the line.
The voltage may then be three times the network voltage, after reflection of the wave. This
situation may be produced with a rapid reclosing of a line.
Still higher voltages may be encountered on three-phase lines, when the three poles of the
CB do not close simultaneously. A wave on one phase will produce induced waves in the
other phases and, under unfavourable conditions, will increase the voltage on another phase.
Higher transition voltage rises can be encountered if the discrepancy on closing is too high.
On networks, where the nominal voltage is 500 kV and higher, the isolation of the lines is
determined by the operation-voltage spikes.
122
8.6 MEASUREMENT
A series of measured and derived values is available from the IED for onsite retrieval or for
data transfer. It is a precondition for a correct display of primary and percentage values that
the nominal values of the instrument transformers and power system be complete and
correctly entered.
Depending on the specific device and the method of connection to the instrument
transformers, some or all of the listed operational measured values may be available: Phase
currents; sensitive ground current (e.g. core balance CT); measured ground current (e.g.
Holmgreen connected phase CTs); calculated positive, negative and zero sequence
currents; measured transformer neutral current; measured ground current of the parallel line;
phase-to-ground voltages; phase-tο-phase voltages; measured neutral voltage displacement
(e.g. neutral VT or open-delta connected phase VTs); calculated positive, negative and zero
sequence voltages; operational resistance and reactance of all impedance measuring loops;
apparent, active and reactive power; frequency; power factor; thermal value of each phase,
referred to the tripping value; thermal resultant value, referred to the tripping value; line
voltage; busbar voltage; and voltage difference between line and busbar voltage (e.g. for
synchrocheck); phase angle deference between line and busbar voltage; active and reactive
components of the ground current.
When the IED has a digital communications link, data from the other ends of the line may
also be available. The currents and voltages from each end and the phase shifts between the
local and transferred measured quantities can be displayed. This may be useful for checking
the correct and consistent phasing and polarity at all ends. Furthermore, the device
addresses of the other IEDs are transmitted. The following listed are some examples of
transferred values: Device address of the remote IED; remote end phase currents; angle
difference between the phase currents of the local and remote IEDs, remote end voltages;
angle difference between the phase voltages of the local and remote IEDs, etc.
Long-term average values of ILi, I1, P, Q, S are calculated over a set period, with Min/max
measurements set-up according to user’s practise. In order to recognize abnormal operating
(but not necessarily fault) conditions, warning level measurement thresholds can be
programmed. When a programmed limit value is exceeded, a message is generated that can
allocated to output signal relays or LEDS. In contrast to the actual protection functions the
measuring function operates in the background; therefore it may not operate if the measured
values change spontaneously as in the event of a fault, or if protection functions is pick up.
Also, the measuring function is not likely to respond to fault conditions because the alarm set
point must exceeded for a sustained period.
Set points can be set to monitor values exceeding preset maximum for average phase
currents; average positive sequence current; average active, reactive or apparent power.
Similarly for dropping below preset minima, such as power factor.
The accuracy of the measured value depends on the accuracy class of the CTs and VTs,
which are normally protection class, and the measuring tolerances of the device (e.g. 0.5%
for currents and voltages, 1% for power, 10 mHz or 0.2% for frequency, etc.). The measuring
function is, therefore, not suited for tariff purposes.
An important convenience during the device commissioning is the capability to compare
between the measured values and the injected values during the secondary injection of the
device.
8.7 CONCLUSIONS
As is the case for many other fields, so too for protection, a reorientation and re-engineering
must always be considered. Frontiers between studies and site, between protection and
control, protection and operation now do not exist. Engineers must collaborate, designing
123
intelligent systems and with synergy, achieving better results, saving money, time and
respecting the environment as well! They must consider integrated solutions, where
protection, SCADA, oscillograph or data logger, telecommunication, RTU, metering, control,
PLC and maintenance systems and algorithms are combined, and finally which can be
executed by common devices. In order to reduce the dependence on one device, two
systems, based in different algorithms and principles may be installed assuring redundancy,
flexibility, extensibility, security, high speed, fast reactions hence less possibilities for energy
shortages or black outs, stability, economy, optimization, friendship to environment, saving
room, capitals and manpower. Moreover, the analysed auxiliary functions of the IEDs offer
usually tools for executing power system appraisal and system operation benchmarking, in
the new de-or re-regulated competitive environment, approaching finally the system (total)
quality. Therefore the new term for the protection relays as IEDs or smart system units is
more successful, as has been realised from the preceded analysis that the so-called non-
protective or auxiliary functions of the IEDs are as much as the conventional ones and at
least of the same importance and usefulness.
8.8 REFERENCES
[1] A. Apostolov, “On-Line Equipment Monitoring Functions in Multifunctional IEDs”, 2005
Western Power Delivery Automation Conference, Spokane, WA, may 10-12,2005.
[2] “Remote On-line Management for protection and automation”, CIGRÉ WG B5-09
Technical Brochure, October 2006.
[3] M. Kezunovic, Eugene E. Webb (Professor, Texas A&M University), “The Smart Grid
Solution for Monitoring, Control and Protection in the Transmission Grid”, Lecture
presented in NTU Athens, 31 October, 2008.
[4] M. Kezunovic et al., “Atomated Monitoring of Substation Eqquipment Performance and
Maintenance Needs Using Synchronized Sampling”, EPRI, 2006.
124
9 INTEGRATION AND DATA MANAGEMENT
Transmission Line Protection Functions
A transmission line protection IED should provide a highly selective protection system that is
immune to changes in the surrounding power system. Applications to two and three terminal
lines, cables and transformer feeders should also be supported. The device must provide
adequate protection with or without a communications channel to the remote end of the
transmission line. The integration of many functions allows application to a wide range of
electrical power systems, providing both local and remote backup protection.
Protection IEDs often perform as universal metering, control and recording devices. They
provide multiple communications interfaces which allow them to become the servers in an
integrated substation automation system over a substation LAN.
One of the main goals in today's extremely competitive utility environment is to switch from
scheduled to event driven maintenance. A universal protection IED can significantly help in
achieving this goal, by providing tools which monitor the substation primary equipment and
indicate, as necessary, the requirement for specific maintenance actions.
All of the above listed requirements are taken into consideration in the concept of a Universal
Transmission Line Protection IED.
125
• Stub bus protection: Applied for breaker-and-a-half and ring busbar arrangements.
• CB failure protection – Two-stage CB fail protection.
• Direct/permissive inter-trip – Independent inter-tripping facility using the device’s
protection communications channels.
• Dual redundant communications – Option for dual communications channels to
provide a high degree of security.
• Protection communications supervision – To detect failure of protection
communications and enable remedial action to be taken, i.e. switch-in communication
independent back-up protections.
• Voltage transformer supervision – To prevent maloperation of voltage dependent
protection elements upon loss of a VT input signal.
• Current transformer supervision – To prevent maloperation of ground overcurrent or
other elements in case of failure of one or more phases of a CT.
• Programmable scheme logic – Allowing user-defined protection and control logic to
suit particular customer applications.
126
9.3 PROTECTION APPLICATIONS
Reduction in relay operating times is one trend in recently developed transmission line IEDs.
A number of new techniques allow for secure sub-cycle tripping. The concept of the dual-
filter scheme was developed, based on the principle of multiple data-window filters. This
scheme combines voltage and current data from half-cycle and one-cycle data windows to
obtain Zone 1 distance element detection and to achieve fast tripping times.
One-Cycle One-Cycle _
V, I
Filter Mho Calc.
Zone 1 +
Reach
Zone 1
Half-Cycle Half-Cycle _ Detection
Filter Mho Calc.
Reduced +
Zone 1
Reach
The mho distance element calculations in Figure 9.1 are discussed. Two sets of filtering
systems compute the line voltage and current phasors to achieve fast fault detection: one
fast filter using a half-cycle data window; and one conventional filter using a one-cycle data
window. This principle is applied for Zone 1 fault detection and for Zones 2 and 3 used in
communications-assisted schemes. In the case of Zone 1, the half-cycle detector has a
shorter reach than that of the one-cycle detector. For Zones 2 and 3, the reach remains the
same.
[
∆TAB = Re al ∆VAB ⋅ (1∠θ L1 ⋅ ∆I AB )
*
]
∆TBC = Re al [∆V ⋅ (1∠θ L1 ⋅ ∆I BC )]
*
BC (9.1)
∆TCA = Re al [∆V ⋅ (1∠θ L1 ⋅ ∆I CA )]
*
CA
Where
∆VAB = two-cycle window A-phase-to-B-phase incremental voltage
∆IAB = two-cycle window A-phase-to-B-phase incremental current
The high-speed directional element provides a combined directional and fault type selection
signal for a total of seven outputs in each direction. Figure 9.2 shows the logic for the A-
phase-to-ground impedance loop, using signals from the one-cycle and half-cycle data-
window fault detectors to get the final loop logic signal.
127
One-Cycle Directional Element
A-Phase One-Cycle
Fault Selection
A-Phase-to-Ground A-Phase-to-Ground
One-Cycle Mho Element
Fault Detector-MAG
High-Speed Directional
HSD-AGF
A-Phase-to-Ground
Half-Cycle Mho Element
2
m one-cycle
m half-cycle detection
detection
1.5
m calculation (pu)
1
Zone 2 reach = r
0.5
Fault
inception
0
0.05 0.1 0.15 0.2
Time (Seconds)
Device-to-Device Communications
Digital communications techniques and modern communications channels provide many
opportunities to advance the speed, security, dependability, and sensitivity of protection.
Direct digital communications integrated in distance protection or other IEDs provide multiple
bits in each direction that lead to simpler, more flexible, and economical protection design
schemes. Sharing digital information directly from one device to another adds new
possibilities for pilot protection, adaptive relaying, monitoring, and CB failure, among others.
Modern fibre optic networks or other types of communications links are excellent channels to
consider for direct device-to-device applications.
128
Relay Relay
L1 AG R1
Relay Relay
BG
L2 R2
L R
In a simple pilot scheme, the fault depicted in Figure 9.4 may result in correct single-phase
tripping by the relays at R1 and R2, but incorrect three-phase tripping by the relays at L1 and
L2. This is because the pilot channel information has only two states: either the relays see a
fault or they do not. The faulted phase selection is performed by the local relays. In this
example, the relays at L1 and L2 select an ABG fault resulting in a three-phase trip for a
single-line-to-ground fault. In distance protection IEDs, integrated digital device-to-device
communications channel can be used to transmit multiple bits of the actual faulted phase
selection, in addition to the permissive signal.
The device at the remote substation checks both the received phase selection information
and its own logic, and then trips the proper faulted phase. The inclusion of a DTT bit and a
reclose blocking bit in the same digital message improves the CB failure function and
prevents reclosing into a faulted CB. The pilot digital communications channel provides
superior performance when compared to traditional communications channels regarding
security, availability, and speed. Unavailability can be improved more than 20% by adding a
simple digital device-to-device communications channel in existing installations that use PLC
to key permissive trips.
129
synchronized phasor measurement capabilities will come functionally integrated, at no
additional cost, within the line protection IED.
The addition of synchrophasor measurement in line protection IEDs results in increased
power system reliability and provides easier disturbance analysis, protection, and control
capabilities compared with approaches using different information sources.
Synchronized phasor measurements can be used additionally for the following power system
applications:
• Transient and dynamic instability prediction.
• Special protection schemes.
• Disturbance analysis and power system monitoring.
• Adaptive direct and under-frequency load shedding.
• Wide area protection and control.
• Adaptive relaying.
The list of applications above is by no means complete. It is only included to generate
interest in the application of Synchrophasor measurements.
130
Blocking is required to be removed if a fault is subsequently detected. The occurrence of a
system fault will take priority over the power swing blocking. In this case, a three-pole trip
command (without AR) is preferred.
Out-of-Step Tripping
Sometimes, an out-of-step (OOS) tripping can be desirable on transmission lines to separate
the unstable grid into sub-grids with the aim of trying to reach stability in these sub-grids.
Ideally, the systems should be separated at such points so as to maintain a balance between
load and generation in each of the separated areas.
In these cases, upon detection of an out-of step condition, the out-of-step tripping system
issues trip command signals to pre-determined CBs to separate the system into two or
several islands.
Auto-Reclosing
Auto-reclosing (AR) is one of the functions integrated into line protection IEDs. AR manages
the automatic closing of the CB after the trip, once the dead time is expired. During this time,
the fault (providing it is a transient fault) is expected to be extinguished.
Whereas most faults on HV overhead lines are transient, the use of AR in order to improve
the system stability is justified.
Single-phase tripping (followed by AR) is often used due to its low impact on the stability.
One common practice is to give an initial single pole trip followed by a three pole trip if the
fault remains after the autoreclosing. Thus, according to the type of trip (1 pole or 3 pole), the
AR behaviour must be different (timers, blockings, etc), i.e. when a three pole tripping takes
place, it is common to use different dead time settings at the line ends in order to allow one
CB to close with the dead line condition, while the other CB is allowed to close with
synchrocheck.
In the case of protection and AR redundancy (i.e. 2x21+2x79), coordination between the two
devices requires an exchange of information signals (AR in progress, AR 1 Pole mode, AR 3
Pole forced, AR Close Command, etc). The use of communications channels to send this
information reduces and simplifies the physical wiring.
When the managing of 2 CBs is necessary (Breaker-and-a-half arrangement, ring-bus
arrangement, etc.) two IEDs with AR can be used working in “master-slave” mode, by means
of logic that uses the information received from the other device.
Some devices include the AR functionality for two CBs; thus, no additional devices are
necessary for this function, resulting in simplified wiring.
Synchrocheck Function
IEDs incorporate synchronism units to supervise the closing of the CBs in the protected area.
The integration of synchrocheck in the IED avoids the use of external wiring, including digital
inputs and outputs and analog signals from VTs.
IEDs can manage the synchronism between several voltage sources and the line voltage,
cooperating with complex autoreclosing schemes. When several CBs are going to be
automatically closed (i.e. breaker-and-a-half or ring-bus arrangements), it is necessary to
have one synchronism unit per CB.
As an alternative to using one device per CB, it is possible to use one dedicated IED,
allowing multiple synchronism voltage sources in order to sort out the full scheme.
Furthermore, if alternative voltage sources can be used in the absence of the original one,
these devices with multiple synchronism voltage inputs can be programmed to select the
most appropriate voltage source. Both the primary and the alternative voltage sources are
131
wired to the device and, depending on internal logic, the devices use one of them to decide
the close permission.
It is now possible to use line and busbar voltages from different phases, compensating the
angular difference by means of numerical settings. The same occurs with voltage inputs
coming from VTs with different ratios.
There are two techniques to verify that a static phase angle or a rotating phase angle is
within a specified limit. The phase angle/time comparison technique introduces a time delay
that can be important and the phase angle/slip technique that does not introduce extra time
into the decision. This technique takes into account the frequency slip across the CB in order
to give the close command at the best moment (0º). The device continuously estimates the
angular difference some ms after the current moment (the CB closing time) and tries to give
the close permission when the estimation is near 0º.
132
10 IEC 61850 IMPACT ON TRANSMISSION LINE PROTECTION
IEC 61850 is a new approved international standard for substation communications that has
already had a significant impact on the development of different devices and systems used in
the substation. All major substation protection and control equipment manufacturers have
products that implement different forms of IEC 61850 communications to simplify integration
into substation automation systems and improve the functionality of the system, while
reducing the overall system cost. New protection solutions are being developed in order to
take full advantage of the functionality supported in the standard.
Maturity of the standard has been proven through successful interoperability demonstrations
in events like IEEE Transmission & Distribution expositions and CIGRÉ meetings.
IEC 61850 supports the functional hierarchy of a substation protection and control system
based on the Substation and Process Bus definitions in the standard. Distributed function
definitions related to various protection functions and schemes affect the development and
implementation of transmission line protection systems.
Distributed protection applications are based on Station Bus high-speed peer-to-peer
communications using GOOSE (Generic Object Oriented Substation Event) or Process Bus
sampled analog values.
The object models of transmission line protection functions allow the standardization of the
configuration of protection IEDs and are another important element of IEC 61850 that
supports self-description.
The Substation Configuration Language (SCL) is another differentiating component of the
standard that allows the development of standard engineering tools which can be used for
transmission line protection applications.
Transmission line protection IEDs are integrated in substation protection and automation
systems that consist of many other IEDs. They exchange signals over the Process or Station
bus in high-speed peer-to-peer communications. Testing of such systems requires detailed
understanding of the modelling, communications architecture and functional specification of
the system. The different components of the system have to meet the interoperability and
performance requirements of the standard in order to execute the multiple distributed
applications they are designed for. Testing of these applications is needed to demonstrate
their advantages through comparison of the performance of legacy hardwired systems with
that of communications based schemes.
133
Redundancy of protection functions in conventional protection systems requires the
installation of numerous primary and backup protection devices which are wired to the
substation equipment that they interface with, and for these to be tested and maintained.
The interface requirements of the transmission line protection devices are quite different from
those of metering devices. As a result they need their own instrument transformers that allow
accurate metering of the energy or other system parameters.
A significant improvement in functionality and reduction of the cost of integrated transmission
line protection systems can be achieved based on the IEC 61850 based solutions as
described below.
Non-conventional instrument transformers with digital interfaces based on IEC 61850-9-2 [1]
(Process Bus) eliminate some of the issues related to the conflicting requirements of
protection and metering IEDs.
The interface of the instrument transformers (both conventional and non-conventional) with
different types of transmission line protection equipment is through a device called a Merging
Unit (MU). This is defined in IEC 61850-9-1 as:
“Merging unit: interface unit that accepts multiple analog CT/VT and binary inputs and
produces multiple time synchronized serial unidirectional multi-drop digital point to point
outputs to provide data communication via the logical interfaces 4 and 5”.
Existing MUs have the following functionality:
• Signal processing of all sensors – conventional or non-conventional.
• Synchronization of all measurements – 3 currents and 3 voltages.
• Analog interface – high and low level signals.
• Digital interface – IEC 60044-8 or IEC 61850-9-2.
It is important to be able to interface with both conventional and non-conventional sensors in
order to allow the implementation of the system in existing or new substations.
A simplified diagram of the communications architecture of an IEC 61850 based substation
protection system is shown in Figure 10.1.
Substation Substation
HMI Computer
Router WAN
MU IOU IOU MU
Figure 10.
10.1 – Simplified communications architecture
The MUs multicast sets of measured sampled values to multiple IEDs in the substation over
the substation local area network. In some cases this is called the “process bus”. Status
information for CBs and switches is available through an input/output unit (IOU). The MU and
the IOU can be combined in a single device.
The transmission line protection devices receiving the sampled analog values then process
the data, make decisions regarding fault detection, faulted phase selection and protection
134
operation and take action based on their functionality – typically to operate their relay outputs
or to send a high-speed peer-to-peer communication message to other IEDs in order to trip a
CB or initiate some other protection or control function – for example CB failure protection or
autoreclosing.
One of the main objectives in the development of any new technology is to improve the
overall performance of the system compared with existing technology.
Conventional protection IEDs (Figure 10.2) have an analog input module and a DSP that will
process the signal and provide the data to its various protection functions. It also has a
binary (opto) input module that provides status information to the applications. Once a
decision is reached by the protection and control module, the IED will operate its relay
outputs to trip a CB, or do whatever else it is programmed to do to control the process.
Figure 10.2 shows a very simplified block diagram of a conventional protection IED and a
time diagram of the overall duration of an event (e.g. for a short circuit fault) based on the
block diagram.
Process
Process
Status Input Multifunctional
Sensor Module IED
Process
tEVT
Figure 10.
10.2 – Conventional IED analog interface
The overall event time tEVT is a function of the time required by each of the modules in the
IED to process the signals, make and execute the decision, plus the time for the substation
device (process control), in this case a CB, to operate and clear the fault.
The individual times in the diagram are as follows:
tSM – sensor (analog or binary input) module time
tFM – protection module time
tOM – output (relay contacts) module time
tPC – process control (e.g. CB trip) time
The times shown in Figure 10.2 are not proportional to the actual or expected times of the
individual components and may vary from one device to another.
135
An IOU will process the status inputs, generate status data, format a communications
message and multicast it on the substation LAN.
Any IED may then receive sampled values messages and binary status messages, process
the data (including re-sampling in most of the cases), make a decision and operate its
outputs that interface with the process control.
The system in Figure 10.3 is a partial implementation of a communications based protection
system. It is partial, because only the input part is based on analog data and status data
messages. The process control, e.g. tripping of a CB, is directly executed through the contact
outputs of the protection IED.
Figure 10.
10.3 – Distributed application interface (partial implementation)
it can be seen from Figure 10.3 that there are a few more steps in the process that may
result in similar or possibly worse performance compared to the conventional protection IED
in Figure 10.2.
The individual times in the diagram are as follows:
tSM – sensor (analog or binary input) module time
tIM1 – MU interface module time
tLAN – LAN time
tIM2 –IED interface module time
tFM – function module time
tOM – output (relay contacts) module time
tPC – process control (e.g. CB trip) time
It is clear from the time diagrams in Figure 10.2 and Figure 10.3 that the sensor module,
function module and output module times have to be shorter than in the conventional IED in
order to compensate for the addition of the two interface module times and the transmission
time over the substation LAN (in order to achieve similar performance).
In the case of the complete implementation of a communications based transmission line
protection and control system (Figure 10.4), the process control commands (e.g. CB trip) are
executed by a device close to the substation process (in this example the CB). The IED must
send a message to the IOU that is processed and will result in the operation of output
contacts that will trip the CB.
The number of steps required for the detection of the fault condition and tripping of the CB
further increases as can be seen from the time diagram in Figure 10.4.
136
Figure 10.
10.4 – Distributed application interface (complete implementation)
137
Where:
VK = Required CT knee-point voltage (V)
RCT = Resistance of the CT secondary winding (Ω)
RL = Resistance of a single lead from the device to the CT (Ω)
RRP = Impedance of a device phase current input (Ω)
In some cases RL is multiplied by 2 and plays a key role in determining the CT requirements.
If the CT secondary is connected to the phase current input of the MU, RL is practically equal
to zero and will be only dependent on:
VK = f (RCT, RRP) (10.2)
In this case the impedance of the MU current inputs RRP is very small, effectively resulting in
the elimination of CT saturation and all protection issues associated with it.
This approach improves substation safety by eliminating the risk of an open current circuit
condition. If this occurs while the primary winding is energized, the induced secondary e.m.f.
under these circumstances can be high enough to present a hazard to human safety and
equipment insulation.
The process bus also improves the flexibility of the protection system. Whereas current
circuits cannot be switched easily due to open circuit concerns, the application of
conventional transmission line protection, as well as some backup protection schemes
becomes more complicated. This not an issue with process bus, because any changes will
only require modifications in the subscription of the protection IEDs receiving the sampled
analog values over IEC 61850-9-2.
Figure 10.
10.5 – Transfer time definition
IEC 61850 defines performance requirements for the more typical substation functions. The
transfer time definition [2] is based on Figure 10.5, where:
ta - time from the moment the sending IED (PD[n]) puts the data content on top of its
transmission stack until the message is sent on the network.
tb - the time over the network.
tc - the time from the moment the receiving IED (PD[m]) gets the message from the
network until the moment it extracts the data from its transmission stack.
138
There are two independent groups of performance classes:
• for control and protection
• for metering and power quality applications
Whereas the performance classes are defined according to the required functionality; they
are independent from the size of the substation.
The requirements for control and protection are higher, because of the effect of the fault
clearing time on the stability of the system or on sensitive loads. IEC 61850 defines three
Performance Classes for such applications:
• P1 - applies typically to the distribution level of the substation or in cases where lower
performance requirements can be accepted.
• P2 - applies typically to the transmission level; or when not otherwise specified by the
user.
• P3 - applies typically to transmission level applications with high requirements, such
as busbar protection.
The overall performance requirements also depend on the message type, of which seven are
defined in IEC 61850. Only those related to protection are discussed here.
Type 1 is defined in the standard as a “Fast Message”.
139
limited length, to allow for other communication network activities. Typically, the bit lengths of
the file type messages greater than or equal to 512 bits.
The transfer times for type 5 messages are not critical therefore there are no specific limits.
Typically, the time requirements are greater than or equal to 1 s.
Figure 10.
10.6 – IEC 61850 GSE based CB failure protection scheme
In case of a fault on a transmission line connected to a bus with multiple lines and
transformers, the relay protecting the faulted line will have to initiate the CB failure function in
all relays protecting equipment connected to that bus. The number of binary inputs, relay
140
outputs and interconnections, if for example there are 10 transmission lines connected to the
busbar, can only be imagined. In contrast, such a scheme is fairly straight forward to
implement in a substation using IEC 61850 communications.
The IED that detects the transmission line fault sends a GOOSE message to all other IEDs
connected to the transmission bus indicating that it has issued a Trip signal to clear the fault.
This can be considered as a CB failure initiate signal for all other IEDs on the bus. The only
requirement for the scheme implementation will be that all IEDs connected to equipment on
the same bus will have to subscribe to receive GOOSE messages from all other IEDs
connected to the same transmission bus.
The reliability of GOOSE based schemes is achieved through the repetition of the messages
with increased time intervals until a user defined time is reached. The latest state is then
repeated until a new change of state result in sending of a new GOOSE message.
The repetition mechanism not only ensures that the initial signal is not going to be missed by
a subscribing relay, but also provides a means for the continuous monitoring of the virtual
wiring between the different IEDs participating in a distributed protection application. Any
problems in an IED or in the communications will be immediately (within the limits of the
maximum repetition time interval) detected and alarm or other action will be taken to resolve
the problem. This is not possible in conventional hard wired schemes where problems in the
wiring or in device inputs and outputs can only be detected through scheduled maintenance.
One of the key requirements for the application of distributed protection functions using
GOOSE messages is that the total scheme operating time is similar to the time of a hard
wired conventional scheme. If the different factors which determine the operating time of a
critical protection scheme such as CB failure protection are analysed, it will be realised that it
requires a device to initiate the CB failure protection through a relay output wired into a
binary input on another device. The relay output typically has an operating time of 3-4 ms
and it is not unusual that the binary input may include some filtering in order to prevent an
undesired initiation of this critical function. As a result, if this simple hard wired interface is
considered to be the transmission time between the two functions in Figure 10.5; the time
between the two functions in the conventional scheme will be between 0.5 and 0.75 cycles –
longer than the required 0.25 cycles defined for critical protection applications in IEC 61850
based systems.
This is not just theoretical analysis, but has been proven in test directly comparing the
operation of hardwired versus communications based schemes as shown in Figure 10.7
below.
Figure 10.
10.7 – Comparison test setup
141
The test shows 2 IEDs with IEC 61850 communications that are programmed to loop-back a
hardwired or GOOSE signal. The first device is directly wired to a standard test set
programmed to operate a relay output that initiates the relays operating sequence.
On sensing the closing of the test device contact, the first IED operates a relay output and
sends a GOOSE message. The receiving IED immediately sends back a GOOSE message
and closes a relay output wired into an input of the first IED, which is configured to close one
contact for the hardwired and another for the GOOSE message.
Figure 10.8 shows the result from the test. The difference between the operation of the two
relay outputs that are being compared shows that the hardwired scheme is about 14 ms
slower (with binary input filtering enabled).
Figure 10.
10.8 – Results from comparison test
10.6 REFERENCES
[1] International Standard IEC 61850, Communication networks and systems in
substations – Part 9-2: Specific Communication System Mapping (SCSM) – Sampled
values over ISO/IEC 8802-3, First edition 2003-05.
[2] International Standard IEC 61850, Communication networks and systems in
Substations – Part 5: Communication requirements for functions and device models,
First edition 2003-07.
142
11 APPLICATION EXAMPLES
143
11.2 FAULT LOCATION IN TRANSMISSION LINE IEDS
Accurate fault location information helps operators and other utility personnel to expedite
service restoration and reduce outage time, operating costs, and customer complaints. Fault
location has been quite successful using phasor measurement data from one end of a
transmission line and is implemented in most transmission line IEDs. However, this method
has some accuracy limitations due to load flow, mutual coupling, fault resistance, and system
non-homogeneity. Multi-ended methods have been developed to improve the fault location
estimate [1]-[5]. A number of these methods typically require processing of the fault data off
line using multi-ended fault location algorithms.
Two-ended impedance-based fault locating methods can improve upon the accuracy of
single-ended methods. Schweitzer [1] introduced a two-ended method, which did not require
or assume external system parameter values. The method in [1] did not require time
synchronization of the data; however, it required knowledge of pre-fault load flow information
for phase alignment. Most of the two-ended methods require the phase alignment of data
sets captured at both ends of a monitored line using pre-fault load flow information, iterative
methods, and communication of a significant amount of data between protection terminals
[2]-[4]. Some of the two-ended methods have one or more limitations, such as a requirement
for data alignment, knowledge of pre-fault load flow information, the need to perform
iterations, and communication of large amounts of data between terminals. Furthermore, a
number of multi-terminal methods may not be applicable to overhead lines with zero-
sequence mutual coupling.
Distance protection IEDs have integrated digital communications channels with the ability to
exchange analog data information between devices as well as logic-based status
information. Furthermore, distance protection IEDs include expanded logic control equation
programming with math and comparison functions. The functional integration of digital
communications with analog data transmission and math functionality can provide more
accurate fault location to operators in almost real time.
Reference [5] describes a two-ended fault location algorithm that is suitable for inclusion in a
line protection IED, where remote transmission line IEDs communicate over a digital
communications channel. Advances of this algorithm include the following: the data required
for fault location estimation do not rely on pre-fault load flow information, do not need to be
synchronized, and the volume of data communicated between devices is sufficiently small to
be easily transmitted using a digital protection channel. In addition, the multi-ended fault
location algorithm is not iterative, does not require phase selection information for
unbalanced faults, and is very accurate. Finally, the algorithm described in [5] is not affected
by pre-fault load flow and its direction, zero-sequence mutual coupling, fault resistance,
power system non-homogeneity, or current infeed from other line terminals or tapped loads.
Figure 11.1 and Figure 11.2 show the results of single-ended and a two-ended fault location
algorithm for a line-to-ground fault located 25% from one line-end in a parallel two-circuit
500 kV line configuration. In addition, the fault location algorithm can calculate the fault
resistance in secondary Ohms.
144
(DASHED:SINGLE-ENDED, SOLID:DOUBLE-ENDED)
34
32
DISTANCE TO FAULT IN %
30
28
26
24
22
20
18
16
0.12 0.13 0.14 0.15 0.16 0.17 0.18
Time (S)
Figure 11.
11.1 – Fault Location from Device 1 (Ideal=25)
(DASHED:SINGLE-ENDED, SOLID:DOUBLE-ENDED)
100
95
DISTANCE TO FAULT IN %
90
85
80
75
70
65
60
0.12 0.13 0.14 0.15 0.16 0.17 0.18
Time (S)
Figure 11.
11.2 – Fault Location from Device 2 (Ideal=75)
(Ideal=75)
145
This section describes two applications that use synchrophasors for ground fault backup
transmission line protection.
Synchrophasors
Relay 1 Relay 2
A B
Local
Line
Synchrophasors
Protection Trip
Time
Alignment Power Swing Alarm
Remote Detection
Synchrophasors
(Relay 1 Partial)
Figure 11.
11.3 - Relays exchange synchrophasors for backup line protection in a two
two--terminal line
application
T
I2 is the total negative-sequence current phasor
T
IAB is the total A-phase minus B-phase current phasor
T
IBC is the total B-phase minus C-phase current phasor
T
ICA is the total C-phase minus A-phase current phasor
The IED uses the output of the FPI logic for tripping the faulted phase in single pole tripping
applications.
146
Figure 11.
11.4 - Faulted phase identification logic uses total negative
negative--sequence and zero-
zero-sequence fault
current
= I2 + I2
OP L R
I2 (11.1)
=
RT L R
I2 I2 – I2 (11.2)
> 87 _ Slope • I2
OP RT
I2 (11.3)
Re [I • (I ) ]> 0
L
2
R ∗
2
(11.5)
147
Where
L
I2 is the local negative-sequence current phasor
R
I2 is the remote negative-sequence current phasor
Figure 11.5 shows the basic logic for 32IQ. The Protection Enable bit, PREN, asserts when
L R L
I2 and I2 exceed the element sensitivity threshold, e.g., 0.1• INOM, and when I2 is
L L
greater than I1 , where I1 is the local positive-sequence current phasor. Communications
channel health, data integrity, and time synchronization also supervise this logic. The 32IQ
output asserts when all the previous conditions are valid.
IL2
IR2
[ ( ) ]> 0
Re IL2 • IR2
∗
Figure 11.
11.5 - Negative-
Negative-sequence current directional element, 32IQ, with current magnitude, channel
channel
health, data integrity, and time synchronization supervision.
Figure 11.
11.6 - Power system parameters and
and operating conditions to analyze RF coverage capabilities
of the 87LQ, and 67Q elements
148
Figure 11.
11.7 - 32IQ, 87LQ, and 67Q element RF coverage for phase-
phase-to-
to-ground faults at different line
locations
locations
Figure 11.
11.8 - 32IQ and
and 87LQ RF coverage with 0.05•INOM and 0.1•INOM sensitivity
The operating time of the directional elements depends on the synchrophasor message rate,
the synchrophasor filtering process, and element sensitivity. Figure 11.9 shows 32IQ element
operating time for an A-phase-to-ground-fault with RF = 450 Ω located 30% from the local
end (left) for the system in Figure 11.6. The local and remote relays are set with a sensitivity
of 0.1•INOM and they operate in 165 ms and 158 ms, respectively. In this application, the
relays exchange synchrophasors at 20 messages per second, and the filtering system
attenuates harmonics according to C37.118 [9]. The relays exchange IA, IB, and IC
synchronized phasors along with their corresponding synchronized time stamps through the
use of peer-to-peer relay communications at 38.4 kbit/s. A faster message rate and faster
filtering process can reduce element operating time.
149
Figure 11.
11.9 - FPI, 32IQ, and 67Q operating times for an A-
A-phase-
phase-to-
to-ground fault located 30%
30% from the
local end
Relay Relay
L1 AG R1
Relay Relay
L2 BG R2
L R
Figure 11.
11.10 – Cross-
Cross-country fault
fault
Consider the system in Figure 11.10 with line-to-ground faults as shown near Bus R. The
relay at R1 correctly identifies the fault as an A-phase-to-ground fault, and the relay at R2
150
correctly identifies the fault as a B-phase-to-ground fault. Relays L1 and L2 sense the fault
as a double line-to-ground fault because the two single-phase-to-ground faults are at
essentially the same electrical point on the system. In a simple teleprotection scheme, the
fault depicted in Figure 11.10 may result in correct single-phase tripping by the relays at R1
and R2, but incorrect three-phase tripping by the relays at L1 and L2. This is because the
information exchanged over the communications channel is two-state only: either the relays
see a fault or they do not see a fault. The faulted phase selection is performed by the local
relays. In this example, the relays at L1 and L2 select an ABG fault type resulting in a three-
phase trip for a single-line-to-ground fault. Several approaches may be employed to avoid
this maloperation:
• The teleprotection tripping can be delayed sufficiently long to allow the Zone 1
elements at Bus R to initiate single-phase tripping. After the CBs at Bus R open the
proper faulted phases, the relays at L1 and L2 also select the correct phases to trip.
• Multiple two-state communications channels can be used to transmit phase
identification in addition to trip permission.
• A digital device-to-device communications channel can be used to transmit multiple
bits of the actual faulted phase selection, in addition to the permissive signal.
The first solution introduces a time delay and requires that the protection on the parallel line
operates to clear the fault on that line. The second solution improves upon the first; however,
the scheme requires multiple communications equipment and additional channel bandwidth,
which makes it very expensive and less reliable. The third solution requires the transmission
of faulted phase selection information and the permissive trip signal. The relay at the remote
station checks the received phase selection information against its own logic, and trips the
proper faulted phase. The inclusion of a DTT bit and a reclose blocking bit in the same digital
message improves the CB failure function and prevents reclosing into a faulted CB. The
digital communications channel provides superior performance when compared to traditional
communications channels regarding security, availability, and speed [10][11]. Unavailability
can be improved more than 20% by adding a simple digital device-to-device communications
channel in existing installations that use PLC equipment to key permissive trips [11].
S 1 L1 L2 6 S
Relay 1 Relay 6
2 5
Relay 2 Relay 5
T
3
Relay-to-Relay
T1 T2 Communications
G1
Figure 11.
11.11 – Applications
Applications of Device-
Device-to-
to-Device Communications
Consider Figure 11.11 in which a fault occurs inside Transformer T1, and CB2 fails to trip at
Station T. For this fault, CB1 at Station R must open due to the CB failure condition of CB2 at
Station T and not be allowed to reclose. In a traditional protection scheme, a separate direct
transfer trip is applied between Stations R and T to perform the above function. Device-to-
device communications capability between relays of L1 and L2 in conjunction with
151
programmable logic can be used to send a DTT from Station T to Stations R and S during
CB failure conditions at Station T and block reclosing at the remote stations [12].
Using the same network, consider a fault on L1 for which CB1 at Station R and CB2 at
Station T open to clear the line fault, and at the same time a maloperation occurs at Station
S, which opens CB6. If high-speed reclosing is applied on both CBs of L1 without any other
considerations, there is a possibility of reclosing out of synchronism with generator G1,
causing considerable damage to the generator. For this scenario, using device-to-device
communications and programmable logic, a protection scheme at Station T can be designed
to detect L2 tripping at the remote Terminal S; block high-speed AR of CB2 at Station T; and
transmit an AR blocking bit to block high-speed reclosing of CB1 at Station R in order to
prevent possible damage to Generator G1. Slow-speed reclosing from Station R, followed by
CB2 closing at Station T with synch-check and slip frequency supervision allows the two
systems to parallel and improves system reliability.
G G
G
Figure 11.
11.12 – Three-
Three-Terminal System with Independent Communications Paths
152
function as desired. However, if there are two weak terminals, then the Echo logic will not
function if the overreaching permissive trip elements operate only at the strong terminal.
When there are two weak terminals on the line, programmable logic can be used to
implement Echo logic that also functions when only one permissive signal is received [13].
Relay A Relay B
Line A Line B
Figure 11.
11.13 – Breaker and a half substation
153
Breaker-and-a-half does, however, present a number of challenges for the line protection,
some of which can be addressed through the application of modern techniques.
Relay A Relay B
CT2 CT1
IFA
IFA+IFB
Terminal A IFB Terminal B
Fault
Figure 11.
11.14 – Close-
Close-up external fault for breaker-
breaker-and-
and-a-half busbar configuration
In order to resolve this problem, Relay A can alternatively be fitted with separate current
measuring inputs for CT1 and CT2, so that both sets of currents can be used by the
protection algorithm and the appropriate amount of restraining current calculated.
In general, due to the limited capacity of the data transmission channel, Relay A is only able
to transmit current data equal to the summation of CT1 and CT2 to Relay B at the remote
end, and so Relay B still cannot calculate sufficient restraining current. Therefore, logic is
employed that allows the IEDs to trip only when both the local and remote functions operate.
In order to achieve this, it is necessary to transmit the status of the differential protection
elements of the local device to the remote end to allow the correct tripping decision to be
made. This is easily achievable through the use of IEDs.
154
11.7 CB AND STATION BYPASS
Figure 11.
11.15 – Double-
Double-bus single-
single-CB configuration
In a double-bus single-CB or a main and transfer bus arrangements, the protection systems
installed on the bus-tie CB are used to protect a transmission line when the line CB is out-of-
service for maintenance. In such an arrangement, the performance of the protection is
degraded unless the communications channel used for high-speed line protection is rerouted
to the bus-tie CB protection system. This was almost impossible with earlier
electromechanical and static relay systems. IEDs with multiple settings and intelligent
communications channel fibre-optic transfer switches can be used to maintain high-speed
teleprotection and system stability and integrity during CB maintenance [16].
155
If CB3 is to be maintained while Feeder 3 is connected to Bus 1; the system operator will
switch all feeders to Bus 2 except Feeder 3 which will be connected to Bus 1. The bus-tie CB
and its isolators are closed connecting the two buses together. Just before the bypass switch
of CB3 is closed, the operator enables the distance and directional ground overcurrent
protections on the bus-tie CB, and takes the distance protection (21), line differential
protection (87L), and the protection communications channels of Feeder 3 out-of-service.
The distance (21) and directional ground overcurrent (67N) protection on the bus-tie CB are
now protecting Feeder 3 and Bus 1 which is now part of Feeder 3. The protection of Feeder
3 has now been compromised because high-speed communication-based protection is out-
of-service on Feeder 3 during the duration of CB3 maintenance that could last several days.
IEDs together with intelligent fibre-optic transfer switches can be applied to prevent the
above mentioned protection compromise while maintaining high-speed protection of Feeder
3 when CB CB3 is maintained. This is illustrated with Figure 11.16 and Figure 11.17 where a
normal system is shown with the communications channels of Feeder 2 and Feeder 3 routed
to the multiplexer via a fibre-optic transfer switch.
Figure 11.
11.16 – Feeder communications channels routed via a fiber-
fiber-optic switch
156
BUS 1
CB1 – Coupler Breaker
CB2 and CB3 – Feeder Breakers
21 – Distance Relay
87L – Line Differential Relay 21
87L CB1
Fiber-Optic Transfer
Switch
BUS 2
Bypass Bypass
87L 21 CB2
21 87L CB3
Switch
Switch
Multiplexer
To Remote Feeder 3
Feeder 2
Terminals
Figure 11.
11.17 – CB3 bypassed while Feeder 3 is protected by the bus coupler CB (CB1)
Figure 11.
11.18 – Looped station configuration with isolators to facilitate line CB maintenance
157
Figure 11.
11.19 – Looped station configuration with IEDs and a fiber-
fiber-optic transfer switch and station
bypass switch open (CB1 and CB2 normal)
Figure 11.20 illustrates the station configuration of Figure 11.19 with CB2 taken out of
service for maintenance with all isolator switches shown in their proper position. The
configuration in Figure 11.20 is now a tree-terminal line configuration. The intelligent fiber-
optic transfer switch transfers the line 2 differential protection communications channel (87L)
to Port 2 of Line 1 differential device and automatically initiates group settings to convert the
line differential protection to a three-terminal line differential system thus maintaining high-
speed protection for Line 1 and Line 2 in their new configuration.
Figure 11.
11.20 – Looped station configuration with IEDs and a fiber-
fiber-optic transfer switch and station
bypass switch closed (CB2 out of service)
158
11.8 AUTO-RECLOSING WITH SECONDARY ARC EXTINCTION RECOGNITION
A secondary arc extinction detector (SAED), in single-pole tripping applications, could
supervise the closing signal to the CB to prevent AR when the secondary arc is still present
and minimize the possibility of unsuccessful reclosing [14]. Complete reclosing supervision
requires three secondary arc extinction detectors, one per phase. These detectors measure
the angle, φ, between the phase-to-ground voltage of the faulted phase (Vγ) and the sum of
the phase-to-ground voltages of the sound phases (VΣ). For -β ≤ φ ≤ β, and |Vγ| > Vthre, the
detector determines the secondary arc extinction and asserts the SAED bit. Vthre and β
determine the region that detects the secondary arc extinction. Table 11.1 shows the Vγ and
VΣ voltages for A, B, and C-phase SAEDs.
Detector Vγ VΣ
A-phase VA VB + VC
B-phase VB VC + VA
C-phase VC VA + VB
Table 11.
11.1 - Vγ and VΣ Voltages for A, B, and C-
C-Phase SAEDS
Figure 11.21 and Figure 11.22 show that Vγ is inside the SAED region and the angle φ = 0°
during an A-phase single-pole open condition, after the secondary arc extinguishes. The A-
phase detector asserts the SAED bit for this condition, allowing the reclosing sequence to
continue.
Figure 11.23 shows the close supervision logic using secondary arc extinction detection
(SAED) for close supervision. The SAED can minimize the dead time by initiating the reclose
after the secondary arc extinguishes. The SAEDD time delay provides time for the air
formerly occupied by the arc to regain dielectric capabilities.
VC
Vγ = VA
VΣ = VB + VC
VB
Figure 11.
11.21 – Vγ is inside the SAED region after the arc extinguishes
159
90
1.5
120 60
150 30
0.5
Secondary Arc
Extinguishes Secondary Arc
Present Prefault
180 0
Fault
210 330
240 300
270
Figure 11.
11.22 – A-phase voltage phasor enters the SAED region after the secondary arc extinguishes
SAEDD
Secondary Arc Reclosing
Extinction Detection Relay
(SAED) DO Supervision
SAED
Close
Enable
Figure 11.
11.23 – Reclosing relay close supervision using secondary arc extinction detection
160
Multi-phase AR combined with current differential protection is a modern technique by which
power supply can be maintained in the healthy phases even in the case of a multi-phase fault
on a double-circuit transmission line.
Multi-phase AR attempts to keep as many phases as possible connected in order to
maximise stability of power transmission, executing high-speed re-closing for multi-phase
faults without the need for synchronism or voltage check. Providing that the terminals of the
double-circuit line remain interconnected through at least two or three different healthy
phases, only the faulted phases are tripped and re-closed. If it is not possible to maintain the
interconnection condition, all phases are tripped and not re-closed. Current differential
protection is best suited for use in conjunction with multi-phase AR [15] because of its ability
to reliably identify the faulted phase, and also because its telecommunication channel can be
used to transfer CB contact status data between terminals in order to determine the
interconnection condition. Figure 11.24 illustrates the principle of multi-phase AR and
summarises the outcomes for the various combinations of faulted phases.
Figure 11.
11.24 – Multi-
Multi-phase auto-
auto-reclosing
161
11.10.1.1 COMMON EXTERNAL AR
Common external AR is a standard arrangement where the AR function could be located in a
Bay Controller. Figure 11.25 illustrates the various functions starting AR. Both the Main 1 and
Main 2 devices work with the AR function. The Synchrocheck function is also implemented in
the same IED as the AR function. This arrangement results in optimum CB related signal
requirements besides the choice of Main 1 and Main 2 from different manufacturers.
B2,U nm
B1,Unm
Position, O-C-O
Trip 2-Lx
Trip 1-Lx
Close
Figure 11.
11.25 – Double busbar arrangement – Common external AR
162
B2,Unm
B1,Unm
B2,Unm
B1,Unm
Position, O-C-O
Trip 2-Lx
Trip 1-Lx
Close
Figure 11.
11.26 – Double busbar arrangement - Main AR with hot standby
Redundant, Master-Follower
Both Main 1 and Main 2 protection IEDs work with their respective AR functions. In order to
ensure that both AR functions choose the same type of dead time even upon contradictory
protection operation, the Main 2 signal “Trip three pole” is also connected to Main 1 AR
function. One AR is termed “Master” and the other “Follower”. If the Main 1 AR is Master,
upon occurrence of a fault, even if Main 2 operates faster, its AR function is on hold by the
Master AR. However, there has to be a co-ordination of reclose commands and only one AR
function shall issue the close command to CB.
The Follower AR is released only after a fixed time after Master AR issues a reclose
command. If the fault persists, the Master AR issues an “AR Unsuccessful” signal. If the fault
is transient, the Follower AR is released but then shall not issue any reclose signal. Hence
an additional signal comprising of the above two conditions, called “Inhibit Close” command,
is sent from the Master to the Follower AR and vice versa.
This approach is more suited for protection IEDs from the same manufacturer because of the
proprietary signals above.
Figure 11.
11.27 – Double busbar arrangement - Redundant AR, Master/Follower
163
Redundant Time Based Discrimination
This logic applies when both AR functions are started by their own permitted protection
functions and the first reclosing command blocks the other AR function, the discrimination
being time based. Thus one AR dead time is longer and is usually assigned to the Main-2
device. If the first AR function fails to operate, the second one from Main-2 may still operate
and reclose the CB. The first AR function to issue a close command to the CB will also issue
the “Inhibit Close” command to block the other AR function.
Each IED must be able to single-pole trip the CB and to reclose it. For multi-pole faults the
tripping should be three-pole.
Regardless of the method selected (master-follower, time based…), the two AR functions
included in each IED must exchange signals either using the communication features of the
devices or based on wired logic. These signals could carry the below mention meanings:
AR 3Pole Forced: The AR-1 function (inside Main 1) is not prepared for single-pole tripping
thus any trip will result in a final three-pole trip. The AR-2 function (inside Main 2) receives
this signal and will similarly force any trip to issue as a final three-pole trip, so that a single-
pole trip from Main-2 and unwanted reclosing is avoided. A similar signal must connect Main-
2 to Main-1. If both these signals are low a single-pole trip and as a result a single-pole
reclosing is permitted.
AR In Progress: This signal is intended to notify Main-2 that AR-1 is within the single-pole
AR cycle and thus the sensitive ground fault overcurrent protection function, which may trip
three-pole, has to be blocked to avoid unwanted tripping during this period of time. One
reason could be that Main-2 did not trip and is not notified about this pole discrepancy
condition. Besides monitoring of the CB position on all three-poles this signal can be used by
both Main-1 and Main-2 for the same purposes. A similar signal has to connect Main-2 to
Main-1.
AR Z1 Extension: The signal is intended to notify the other protection relay that the
teleprotection devices are out-of-service and extension of distance zone 1 should be allowed.
There are various modes to use this feature, one is to allow zone 1 extension only for single-
pole faults and only before AR and only if both physical teleprotection devices are out-of-
service or faulty. Other conditions to be fulfilled are the CB Ready condition and the AR On
condition.
AR 1Pole Mode: This signal is intended to notify that the single-pole AR mode was selected.
This signal can be neglected if no other AR mode is possible.
AR Close Command: The signal is intended to notify the other AR function about sending of
the reclosing command to the CB and to block the second reclosing command.
In addition, the CB Closed position, the CB Ready for AR, the teleprotection channel status
and the position of the hardware switch meaning “AR On” are to be supplied to both IEDs for
proper operation.
164
Figure 11.
11.28 – Breaker and a half arrangement – Line-
Line-line diameter – External AR
The line protection system consists of two IEDs per line (Main 1 and Main 2). Both Main 1
and Main 2 are connected to the sum of the currents from the adjacent sides of the line. For
the AR function (on Q01 and Q03) and for the BFP, two CB Management IEDs (CBM-1 and
CBM-2) are used and connected as shown. Thus, the AR function included in CBM-1 is used
for the Q01 CB, while the AR function included in CBM-2 relay is used for the Q03 CB. The
AR function included in the Main protection IEDs is not used in this example.
In order to apply synchrochecking to the manual close command, either the function included
in the Bay Control Unit (BCU), or that included in the corresponding CBM IED can be
selected. The other control and protection scheme may use the AR function from the BCU in
a similar way.
One possible AR sequence could be based on the time delay discrimination, i.e. to first
reclose Q01 and if it is successful then to reclose Q03. If Q01 is reclosing onto a fault, the
second trip is a final three-pole trip and Q03 does not reclose at all. The dead time for Q03
is, in this case, slightly longer than the Q01 dead time. Again it was assumed that the single-
shot and the single-pole AR mode had been selected.
In the case of master-follower logic, Q01 shall reclose first and, if successful, then Q03 shall
reclose. During the Q01 dead time, Q03 is put into a wait status until after Q01 successfully
recloses and is then allowed to continue the AR cycle. This logic has to deal with the Pole
Discrepancy Logic (PDL) not to trip during the dead time and thus the PDL of the CB
themselves may not be used. It was also assumed that the single-shot and the single-pole
AR mode had been selected.
When the Master is not ready for an AR cycle the Follower acts as the Master.
In many substations with diameters with only one line, it may be selected which CB will be
the master and which one the follower.
In a line-transformer diameter, there could be a choice whether the Bus or Centre CB will
be the master.
Although it is not advised to keep the centre CB as Master, the fault current flowing through
the transformer upon reclose may be low depending on current distribution. The transformer
165
should be able to withstand such stresses which would have arisen anyway the first time the
fault occurred. It should be noted that the fault current is limited by the transformer
impedance and would not exceed 10 to 12 times rated current. However, the centre CB can
be the Master if the bus CB is closed, since the major portion of the fault current would
normally be from the busbar.
The transformer protection trips shall block AR of CB Q03 if the AR Close command is not
supervised by trip/latch relays.
In a line-line diameter, the bus CBs are Masters and the centre CB the common Follower. If
a bus CB is not ready for an AR cycle, the centre CB is automatically the Master for the
corresponding line. The center CB may be programmed not to re-close or can be the follower
for both lines. Its AR-function can be programmed to be blocked if the dead time for one line
is running and there is a fault on the other line. Alternately, it can trip 3-pole and switch dead
times from 1-pole to 3-pole and close after 3-pole dead time provided both faults are
transient.
The main protection IEDs and the AR function included in each CB management IEDs have
to exchange some signals either based on wired logic or using the communication features
of the relays. Some of these signals are:
Trip pole A, B or C – to notify CBM-1 and CBM-2 in case of pole A, B or C trip.
General Pick-up – to notify CBM-1 and CBM-2 about protection pick-ups on at least one
phase. This signal is requested by some AR functions to allow AR only for instantaneous
trips. If there is a delayed trip and the time delay between protection pick-up and protection
trip is greater than a set delay, then and a final three-pole trip results.
AR 3Pole Forced – the AR function (inside CBM-1) is not prepared for single-pole tripping
thus any trip will result in a final three-pole trip only for the Q01 CB. The AR function (inside
CBM-2) is also connected to the distance protection IED to notify that it is not prepared for
single-pole tripping and thus any trip will result in a final three-pole trip only for the Q03 CB.
To achieve this operation mode some internal logic inside the distance protection IED has to
be implemented. If both these signals are low a single-pole trip and as a result a single-pole
reclosing is permitted for both Q01 and Q03.
AR Z1 Extension – signal intended to notify the distance protection IED that the AR function
is ready for a new cycle. Together with the out-of-service teleprotection device signal
extension of distance zone 1 is allowed. In this case zone 1 extension is allowed but only for
single-pole faults and only before the AR cycle.
Other conditions to be fulfilled are the CB Ready condition, the AR On condition and the CB
Closed position related to the corresponding CB. If at least one CB is ready for the AR cycle,
then this CB is tripped and reclosed single-pole while the other one receives a final three-
pole trip. If one CB is out-of-service, i.e. it was open at the AR start instant then this CB is not
reclosed. If one of the AR hardware switches is Off (for Q01 or Q03) then the corresponding
CB is issued a final three-pole trip and no reclosing will take place on this CB. If one of the
transformer protections (in case of line-transformer diameter) or the BBP or the CB failure
protection trips Q03 then the AR function on Q03 is blocked (signal not shown in Figure
11.28).
Some applications require that both Q01 and Q03 are tripped single-pole for any phase-to-
ground fault and reclosed by the AR function. Some other applications require that Q01 is
tripped single-pole for any phase-to-ground fault and then it is reclosed by the AR function,
while Q03 is tripped three-pole. Automatic reclosing of Q03 is allowed only if the reclose of
Q01 was successful and if the synchrocheck close conditions for Q03 are fulfilled. Selection
of which CB operates in the single-pole and which operates in the three-pole AR mode is
done either manual or automatically. If automatic selection is provided then an Out-of-
Service condition for one CB automatically switches this AR logic over the second CB. The
166
same applies in case of CB Ready condition not fulfilled. Thus the line single-pole AR is
performed independent from one of the CB’s status.
It is possible to have one IED housing all three autoreclosing and synchrocheck functions of
a diameter. If necessary for redundancy, this IED could be duplicated and the whole setup
can be applied in a Main – Hot Standby mode.
Some IEDs include the AR function for two CBs, thus no additional devices are necessary, at
least for this function. Usually, the reclosing is done sequentially using a master-follower
logic. This logic permits the AR of the first CB and, if successful, then the second CB is
closed. It is common to select between single-pole tripping of both CBs followed by
sequential AR, or the leader trips single-pole and the follower trips three-pole followed by
sequential AR. However, it must be noted that the device has to be able to perform separate
tripping logic, i.e. single-pole logic for the first CB and three-pole logic for the second CB.
Adequate synchrocheck has to be available for AR in case of three-pole tripping.
The above mentioned arrangement (Figure 11.29), although not common for line-line
diameters in general, is adopted if a common dedicated IED for the CB is not available, and if
IEDs from the same platform are used as Main 1 and Main 2. It is possible, with additional
hardware and software logics, to configure AR and Synchrocheck for each of the three (3)
CBs in the Main 1 and Main 2 IEDs, in a line-line diameter. The functions of both relevant
CBs shall be placed in both Main 1 and Main 2. At any time, only one AR unit shall be in
service. Hence, the 'Relay Ready' or 'In Test' mode of Main 1 shall be wired to block the
functions in Main 2 for both the lines.
Figure 11.
11.29 – Breaker and a half arrangement. Line-
Line-Line diameter.
diameter. AR/SYN within Main 1 and Main 2
The AR functions in Main 1 and Main 2 would each work in conjunction with both Main 1 and
Main 2 protections. The AR function in Main 2 shall be released from its blocked state when
Main 1 has failed or is in the Test mode (fall back). Furthermore, co-ordination of the AR
function of the centre CB in two active IEDs shall be arranged for simultaneous faults. The
'Prepare 3-pole trip' signals of the ARs in Main 2 shall be supervised by the release signals
of Main 1 so as to prevent the CB from tripping three-pole for all faults. As additional security
against VT MCB failures, the VT MCB fail signal of the Main 1 synchrocheck shall also be
used to transfer the AR and Synchrocheck function from the Main 1 to Main 2 IED. Special
167
care must be taken to cater for the centre CB tripping 3-pole and remaining locked out for
simultaneous faults on both lines.
11.11 REFERENCES
[1] E.O. Schweitzer, III, “Evaluation and Development of Transmission Line Fault Locating
Techniques Which Use Sinusoidal Steady-State Information,” [9th Annual Western
Protective Relay Conference, Spokane, WA, October 1982].
[2] M.S. Sachdev and R. Agarwal, “A Technique for Estimating Transmission Line Fault
Locations from Digital Impedance Relay Measurements,” IEEE Transactions on Power
Delivery, Vol. 3, No. 1, January 1988, pp. 121-129.
[3] D. Novosel, D.G. Hart, E. Udren, J. Garity, “Unsychronized Two-Terminal Fault Location
Estimate,” IEEE Transactions on Power Delivery, Vol. 11, No. 1, January 1996, pp. 130-
138.
[4] A.A. Gigris, D.G. Hart, and W.L. Peterson, “A New Fault Location Technique for Two-
and Three-Terminal Lines,” IEEE Transactions on Power Delivery, Vol. 7, No. 1,
January 1992, pp. 98-107.
[5] D. Tziouvaras, J. Roberts, and G. Benmouyal, “New Multi-Ended Fault Location Design
for Two- or Three-Terminal Lines,” [Proceedings of the CIGRÉ SC34 Colloquium,
Florence, Italy, October 1999].
[6] E. O. Schweitzer, III and D. E. Whitehead, “Real Time Power System Control Using
Synchrophasors,” in 2007 34th Annual Western Protective Relay Conference
Proceedings.
[7] A. Guzmán, V. Mynam, G. Zweigle, “Backup Transmission Line Protection for Ground
Faults and Power Swing Detection Using Synchrophasors,” Proceedings of the 34th
Annual Western Protective Relay Conference, Spokane, WA, October 2007.
[8] J. B. Roberts and D. Tziouvaras, “Fault Type Selection System for Identifying Faults in
an Electric Power System,” U.S. Patent 6 525 543, Feb. 25, 2003.
[9] IEEE Synchrophasors for Power Systems, IEEE Standard C37.118 2005.
[10] E.O. Schweitzer III, T. Lee, K. Behrendt, “Digital Communications for Power System
Protection: Security, Availability, and Speed,” [25th Annual Western Protective Relay
Conference, Spokane, Washington, October 1998].
[11] K. Behrendt, “Relay-to-Relay Digital Logic Communication for Line Protection,
Monitoring, and Control,” [23rd Annual Western Protective Relay Conference, Spokane,
Washington, October 1996].
[12] D. Tziouvaras et al., “Functional Integration in Modern distance Relays Improves the
Reliability of Power Systems,” [Proceedings of the CIGRÉ SCB5 Colloquium, Sydney,
Australia, 2003].
[13] G. Alexander, “Applying the SEL-311C Relay on Three-Terminal Lines,” SEL Application
Guide AG2000-12 located at www.selinc.com.
[14] Armando Guzmán, et al “Transmission Line Protection System for Increasing Power
System Requirements,” [29th Annual Western Protective Relay Conference, Spokane,
Washington, October 2002].
[15] K. Kasuga, Y.Sonobe, “Multi-phase auto-reclose function installed in line differential
relay”, GeorgiaTech, 2007
[16] G. Ortega and E. Nelson, “Preserve High-Speed Protection during Bypass Operations,”
[33rd Annual Western Protective Relay Conference, Spokane, Washington, October
2006].
168
12 TRANSMISSION LINE PROTECTION TESTING
169
voltages that are applied to the IED are filtered and processed in the analog input module
and provide instantaneous sampled values to the internal digital data bus of the IED. These
sampled values can be logged when an abnormal system condition is detected or used to
calculate various measurements (e.g. current and voltage phasors) used by the different
protection functions.
The sampled values or the outputs of the measurement elements become inputs to
protection or other functional elements of the device. Each basic protection element operates
based on a specific measured value – phase or sequence current, voltage, impedance,
frequency, etc. Measurements of active, reactive and apparent power or power factor are
often available from the IEDs if required in by the SAS.
When a protection element detects an abnormal condition, it may operate and issue a trip
command to clear a fault. It may also interact with other protection elements in an advanced
transmission line protection scheme used for acceleration or adaptation of the relay to
changing configuration or system conditions. Some of the most common transmission line
protection logic schemes are:
• POTT.
• PUTT.
• Blocking.
• Directional comparison.
• CB failure protection.
Figure 12.
12.1 – Test system block diagram
170
The testing of the different IED elements should start from the bottom of the functional
hierarchy and end with the most complex logic schemes implemented in the device.
Protective IEDs with such schemes operate based on the state of multiple monitored signals
such as blocking signals, CB status signals, and device status signals. Time coordination of
these signals and synchronization with the pre-fault and fault analog signals is required in
order to perform adequate testing of these types of schemes.
Figure 12.
12.2 – Testing of transmission line protection IED
Figure 12.2 shows, in a simplified way, the need for the test device to be able to properly
simulate the transmission line protection environment, as well as to monitor the operation of
the device under the simulated conditions. As can be seen from Figure 12.2, the testing
should include any visible behaviour of the tested transmission line IED.
171
analog signals processing is the testing of the measurements as described in the next
section.
Figure 12.
12.3 – Test configuration for analog signal processing and measurement functions tests
172
The testing of the instantaneous and time delayed elements is different and also should
follow a specific order.
During the conventional testing of individual protection elements it is important that they are
the only enabled protection function (particularly if other protection elements share the same
relay output). If the IED has multiple relay outputs and different protection elements are
mapped to different outputs, care should be taken to ensure that the test device is monitoring
the correct relay output during the test.
For a modern test system, such mappings shouldn’t be necessary. A good fault model will
correctly generate a system condition that the device should correctly distinguish, indicate,
and trip based on the enabled protection element characteristic.
If it is assumed (based on the measurement functions tests) that the device accurately
measures the applied current signals, then the testing of the instantaneous distance
protection elements should not provide any surprises from the accuracy point of view, but will
give an indication of the expected device operating time when the applied currents and
voltages define a fault inside the protection operating characteristic.
The test system should be configured to apply current just at the accuracy range of the
protection setting and should measure the time from the start of the test to the sensing of the
operation of the relay output (connected to a binary input of the test system). This time
should be less than the maximum operating time in the technical specification of the device
under test.
The testing of distance protection elements requires the definition and evaluation of the
device operation for multiple points on the selected characteristic. Figure 12.4 shows the
configuration for the testing of a device with multiple distance zones with quadrilateral
characteristics.
Figure 12.
12.4 – Distance characteristic test configuration
Depending on the tested element the user should be able to configure the type of fault as
single-phase-to-ground, phase-to-phase or three-phase and also select a negative or zero
sequence fault option.
Several points on the selected tested characteristic should be defined as a function of the
test being performed. If this is benchmark, or initial evaluation testing, the multiple points
along the complete characteristic should be tested. If it is a basic application test for a
173
specific transmission line, only a limited number of tests need to be performed in the
expected area of operation of the characteristic.
The overall distance characteristic test is then executed as a sequence of individual point
tests and the device’s operation is based on the comparison of each output relay operating
time compared with the expected operating time and its tolerance for the specific point inside
or outside of the characteristic.
174
The testing of transmission line protection logic schemes should be performed in a way that
matches real life power system conditions as closely as possible. The sequence of steps in a
test differs as a function of the requirements for the specific scheme and system condition.
For example, if the test is for a Permissive Overreaching Transfer Trip protection scheme
and the test condition is a Zone 2 fault, the sequence will include only three steps:
• Pre-fault: CB closed with nominal voltage and normal load current conditions.
• Zone 2 fault condition.
• Receive Permissive Signal from the remote end device.
• Post-trip condition: CB opened and no current.
If a more complex scheme (E.g. Current Reversal Logic or Autoreclosing) is tested, the
number of steps will increase accordingly. Figure 12.5 shows a single-phase-to-ground fault
and an unsuccessful reclosing test simulation as recorded by the tested device.
Figure 12.
12.5 – Unsuccessful reclosing simulation
The test system is used to simulate both the analog and the digital control signals received
by the device in the field. At the same time its inputs are used to monitor the operation of
different protection elements as required by the scheme under test.
175
12.4 CONVENTIONAL TESTING
The previous sections described what can be defined as “Conventional Testing” of distance
protection devices, which is similar regardless of the technology of the device –
electromechanical, solid-state, hybrid or microprocessor based. This is due to the fact that
the protection device is considered as a “black box” with current and voltage inputs and relay
outputs.
In the case of conventional distance protection testing the test device must simulate the
substation process through hard-wired interface between the analog and binary outputs of
the test device and the analog and binary inputs of the test object (Figure 12.1).
The test device must monitor the closing of relay outputs of the device under test in order to
detect the operation of the distance element and to analyze it to determine which zone
operated and if the performance meets the specification and the characteristic settings.
The testing can be based on two main methods:
• Simulation of a sequence of pre-fault, fault and post-fault steps defined by current
and voltage phasor settings with transitions from one step to the next based on pre-
defined time or operation of protection elements.
• Replay of COMTRADE files recorded by protection or other devices, or files
generated from electromagnetic transient programs.
The testing of distance protection devices in all the necessary cases will require the
availability of both the protection devices and advanced protection test equipment that can
implement both test methods described above. The problem is that this requires significant
investment by utilities and is very difficult to implement.
Hence, for several years, utilities have been asking for different forms of tools that may help
them with the protection setting process or with the analysis of distance protection operation.
Figure 12.
12.6 – Virtual Testing Tool simplified block diagram
176
12.5.1 FRONT END
The front end takes a COMTRADE file selected by the user and converts it to a set of data
corresponding to the data passed by the ADC to the real device data bus to be processed by
the protection and control software.
The virtual relay is actually a DLL (Dynamic Link Library) file that emulates the functionality of
the protection IED and is generated from the same code that is used to generate the
software executed in the device itself. This ensures that the results from the virtual testing
will adequately represent the behavior of a real device under the conditions recorded in the
COMTRADE file.
Whereas the COMTRADE file is the input to the virtual testing system, it is important to
consider the different factors that may affect the performance of the virtual relay.
One of the first issues to analyze is the source of the COMTRADE file. In many cases the
user may want to test the behavior of a protection IED based on a waveform record from
another device that may have a different sampling rate and analog and digital filters
compared to the IED being tested. This may lead to operation that was not expected and has
to be taken into consideration in the analysis.
The primary system currents and voltages go through several transformations, including
analog and digital filtering, before they are processed by a protection algorithm. Therefore, it
is preferable to perform the virtual testing using COMTRADE files with disturbance records
from a similar device to the one being tested. This will ensure that the samples processed by
the virtual relay are similar to the image of the primary system event seen by the IED.
If the sampling rate of the record is different from the sampling rate used in the tested device,
this will require re-sampling. When the sampling rate of the record is lower than the sampling
rate of the tested device, it is possible to miss some details in the actual primary waveform
that may affect the protection operation.
Another factor to be considered is frequency tracking. The protection algorithms are typically
based on a fixed number of samples/cycle and some disturbance recording devices have a
fixed sampling rate. This may also require re-sampling in order to provide the virtual relay
with the expected fixed number of samples for each cycle.
If the COMTRADE file is generated from an electromagnetic transient program simulation,
the model used in the simulation needs to be fully understood. If the model includes only the
primary system, CTs and VTs; the samples provided to the virtual relay will not reflect the
effect of the analog filtering in the IED emulated in the virtual testing tool. This may also
affect the behaviour of the tested device.
177
• Directional ground fault.
• All distance zone phase and ground loops.
Settings Management
All the settings available in the device are available through dialog boxes. The settings
committed are used by the protection algorithms to act on the input data (e.g. COMTRADE).
Figure 12.
12.7 – Example settings dialog box
Work is underway to read the proprietary format settings file directly to avoid any mismatch.
Digital Filtering
A typical distance protection IED contains a myriad of filters for various protection functions.
The simulator can be used to produce individual filter outputs for diagnosis. This is
particularly useful for special applications; e.g. unusual amount of harmonics, switching noise
on long transmission lines, etc.
Protection Algorithms
The discussion of protection elements and in particular the distance elements is not in the
scope of this chapter but it is worth mentioning that the key to reproducing the behaviour of
the IED on a PC is that exactly the same software should be able to run in an embedded or
PC environment.
This involves some architectural decisions to be made at the time of device design that will
ensure that the real time behaviour of the virtual relay is not compromised in any way but at
the same time the software has cross-platform compatibility.
178
12.5.3 ANALYSIS AND VISUALIZATION TOOLS
The operation of the virtual relay under test needs to be analyzed and made visible to the
user through the visualization tools available as part of the virtual testing system.
The analysis module receives information from the tested virtual relay on the operation of
different functional elements of the device represented in the logic by Digital Data Bus
signals. This is done at each step of protection function execution and depends on the
specific task it is related to. Most of the functions are executed 48 times per cycle, but some
may also be event-driven.
The analysis module then aligns the change of state of the monitored signals with the current
and voltage samples from the input COMTRADE file and makes them available to the
visualization module for display. Figure 12.8 shows a display of a fault during a system
power swing condition and the operation of different protection elements. Showing the start
and/or operation of different internal signals during the testing of a virtual relay under
complex system conditions such as the one shown in Figure 12.8 can help the protection
engineer better understand the functionality of the transmission line protection device.
Figure 12.
12.8 – Virtual Testing results
It is one thing to look at system conditions through standard post disturbance analysis
software to evaluate relay behaviour. But seeing the measurements through the “eyes” of the
device can give a much better idea of the behaviour of the relay. Figure 12.9 shows the
impedance locus during a power swing as seen by the device after digital filtering. The top
side of the figure represents the apparent impedance seen by the three phase distance
elements. The bottom part gives the impedance seen by the ground distance elements.
179
Figure 12.
12.9 – Locus of Power swing
Figure 12.
12.10 – Harmonic filter
180
Analysis of Protection Operation
Short circuit faults and other abnormal system conditions may occur randomly. In order to put
a transmission line back into service to prevent weakening of the system or the development
of a wide area disturbance, a protection engineer may need to test a protection device to
determine the reason why it operated and if it was a correct operation or not. By downloading
the recorded waveform COMTRADE file from any remote location and replaying it on a local
computer, the user can enter the settings of the operated device that are stored in the
computer or also downloaded from the device itself and then test the virtual relay. This
results in significant savings in time and resources.
181
13 FUTURE TRENDS
13.1 INTRODUCTION
In this section about future trends, an attempt is made to cover the various aspects of
transmission line protection and monitoring IEDs.
The section is divided into two parts, the first looking at general aspects, and the second
focusing on the specific protection functions covered in the previous chapters.
The life of a protection device starts well before delivery, with the planning and engineering
work at the user’s side. Thereafter, the device must be installed and commissioned before
going into regular operation. During its service lifetime, failures and defects may occur and
appropriate action must be taken to minimise plant down-time. This means quick repair
and/or the availability of spare parts at the location where the device is installed. Finally, after
its useful life, the device should be disposed of in an environmentally friendly way.
13.2.1 ENGINEERING
Due to labour intensive work in this field, scheme design and engineering costs make up a
significant portion of the total project cost. In particular, during these phases, the integration
of functions can achieve significant savings. The concept of two or more protection functions
in a single device will contribute significantly towards the optimising and reduction of
commissioning time. Due to the cost pressure, this development is likely to continue into the
future. An example is the combination of differential and distance protection functions into a
single IED. Another example is the inclusion of object-oriented protection functions into the
bay units of a decentralized busbar protection system.
13.2.3 SOFTWARE
The complexity of future protection devices will continue to grow significantly. Whereas all
protection functions are based on software algorithms, it will become increasingly difficult to
exhaustively test all possible combinations.
Fault simulations in the laboratory environment will be highly important for critical protection
devices and functions. This will increase costs and have a negative impact on total project
cost and execution schedule.
182
13.2.4 HARDWARE
183
13.2.6 SETTING PROCEDURES
Due to the high level of functionality available in a single IED, many parameters need to be
set. The chance for errors is correspondingly high. It can be expected that more interactive
help functions will be integrated in the software used to load the parameter set files.
Adaptive measuring techniques will permit protection devices to dynamically adjust settings
for changing network conditions. E.g. automatic setting of a longitudinal line differential
protection characteristic by the IED itself.
Integrated commissioning aids, with graphical and browser-support on the PC, allow for fast
detection of setting and connection mistakes.
13.2.7 COMMISSIONING
Operating personnel need only be trained on one hardware platform and one operating
software. Furthermore the connection between test equipment and the device under test
need only be done once and the testing of the various protection functions then done with an
automatic test sequence. Modern test equipment can check the integrated protection
functions in a single device without additional effort or equipment. In general, a single
commissioning engineer is sufficient for completion of this task.
13.2.8 LIFECYCLE
The production cycle of today’s protection equipment is getting shorter. This is due to the use
of commercially available components and processing software. Such products only remain
in production while there is a reasonable demand on the market.
This means that protection device manufacturers must make careful planning and stocking
rules in order to guarantee the serviceability of the products for their expected operational
life-time of around 15-20 years.
13.3 COMMUNICATIONS
184
13.4 SPARE PARTS
Compared to conventional relays in which the individual protection functions are
implemented with separate devices or, as in analog electronic relays, with different modules,
the advantage of reduced spare parts is immediately evident. Even auxiliary relays can be
eliminated by means of software implementation using the integrated programmable logic.
Additional flexibility is given by the option to optimise the scope of protection functions using
the same hardware with different optional functions at different locations.
13.5 TRAINING
In the context of a general skills shortage, the use of multifunction IEDs for a variety of
applications reduces the number of hardware devices upon which staff must be trained.
185
14 CONCLUSION
Transmission line IEDs offer a significant number of functional improvements over previous
generations and technologies. The state of the art of multifunctional protection systems
provides several advantages. Some of these are as follows:-
• An unprecedented flexibility in transmission line protection, control and monitoring.
• Improvements in line protection performance in fault discrimination.
• Faster relay operating times and ultimately, fault clearing times.
• Enhanced dependability and security.
• Ability to provide backup protection in addition to primary protection.
• Improvements in measurements via advanced algorithms.
• Improvements in directional discrimination.
Some IEDs include built-in auxiliary functions, such as CB condition monitoring, pole
discrepancy supervision, fault and event recording, electrical quantities measuring, remote
access, time synchronization, etc. The availability of these functions offers a wide variety of
applications in which an IED can either undertake the role, or can assist in implementing
those functions. This assures accuracy and observability. While this reduces the overall cost,
it makes the protection engineering more demanding. Moreover, the auxiliary functions of the
IEDs usually offer tools for executing power system appraisal and system operation
benchmarking in a very competitive environment for achieving the overall desired
performance of the system.
IEDs provide opportunities for implementing integrated solutions, in which algorithms are
combined with many systems, such as SCADA systems, data recording or data logger
systems, telecommunication systems, RTU systems, metering systems, control systems,
PLC systems and maintenance systems. Two systems using different algorithms and
principles can be installed assuring redundancy, flexibility, extensibility, security, high speed
and stability. This reduces the possibilities for energy shortages or black outs, saving
operating costs capital, and manpower needs.
While these enhancements are technical, they substantially reduce the costs of providing
protection systems, wiring those systems and of maintaining the systems in proper working
order. For example, the availability of functions, such as autoreclosing and synchrocheck
simplifies the physical wiring and its installation, and therefore its cost.
186
15 BIBLIOGRAPHY
[1] CIGRÉ JWG 34/35.11, “Protection Using Telecommunications”, 2001
[2] IEEE PSRC WGH9, “Digital Communications for Relay Protection”
[3] CIGRÉ SC34 WG01, “Reliable Fault Clearance and Back-up Protection”, 1997
[4] IEEE C37.114, “Guide for Determining Fault Location on AC Transmission and
Distribution Lines”
[5] IEEE PC37.114/D9, “Draft Guide for Determining Fault Location on AC Transmission
and Distribution Lines”
[6] IEEE PSRC WGH2, “Using Spread Spectrum Radio Communications for Power System
Protection Relaying Applications”, 2005
[7] IEEE Std C37.94, “IEEE Standard for N Times 64 Kilobit Per Second Optical Fiber
Interfaces Between Teleprotection and Muliplexer Equipment”, 2002
[8] CIGRÉ SCB5 WG07, “The Automation of New and Existing Substations: Why and How”,
2004
[9] International Standard IEC 61850, Communication networks and systems in substations
– Part 9-2: Specific Communication System Mapping (SCSM) – Sampled values over
ISO/IEC 8802-3, First edition 2003-05.
[10] International Standard IEC 61850, Communication networks and systems in Substations
– Part 5: Communication requirements for functions and device models, First edition
2003-07.
[11] IEC TC 57, 57/759/NP “Use of IEC 61850 for the communication between substations”,
2005
[12] IEC TC 57, 57/760/NP “Use of IEC 61850 for the communication between substations
and control centres”, 2005
[13] CIGRÉ SC34 WG04, “Application guide on protection of complex network
configurations”, 1992.
[14] A.R. van C. Warrington, Protective Relays: Their Theory and Practice, Volume 1,
London, Chapman and Hall, 1962.
[15] Network Protection and Automation Guide, ALSTOM, France, 2002.
[16] IEEE PSRC WGC6 "Wide Area Protection and Emergency Control".
[17] IEEE Std C37.104 “IEEE guide for Automatic Reclosing of Line circuit Breakers for AC
Distribution and Transmission lines”.
[18] IEEE Std C37.113-1999 “IEEE Guide for Protective Relay Applications to Transmission
Lines”.
[19] IEEE Std. C37.118-2005, “Synchrophasors for Power Systems”
[20] “Protective Relaying: Principles and Applications” J. Lewis Blackburn, Thomas J. Domin,
CRC Press, 3rd Edition, 2007.
[21] “Protective Relaying for Power Generation Systems” Donald Reimert, CRC Taylor &
Francis, Ed. 2006.
[22] IEEE PSRC WGD6 “Power Swing and Out-of-Step Considerations on transmission
lines”.
[23] CIGRÉ SC34 WG10, “Analysis and Guidelines for Testing Numerical Protection
Schemes”, 2000.
187
[24] “Numerical Distance Protection”, Gerhard Ziegler, Siemens Edition 1999.
[25] “Protection Application Handbook”, ABB
[26] “The Art and Science of Protective Relaying”, C. Russel Mason
[27] ¨Power System Relaying¨ Stanley H. Horowitz, Arun G. Phadke, J. Wiley & Sons, 3rd
Edition , June 2008.
188