Unit V
COMPUTER CONTROL OF
POWER SYSTEMS
Things to be covered
Need of computer control of power systems
Concept of energy control centre (or) load dispatch
centre and its functions
System monitoring & data acquisition and control
System hardware configuration
SCADA and EMS functions
Network topology & state estimation
Security analysis and control
Various operating states & State transition diagram
Power System Security -
Introduction
Up until now we have been mainly
concerned with minimizing the cost of
operating a power system.
An overriding factor in the operation of a
power system is the desire to maintain
system security.
System security involves practices
designed to keep the system operating
when components fail.
Examples
A generating unit may have to be taken off-line due to
auxiliary equipment failure.
By maintaining proper spinning reserve, the remaining
units on the system can make up the deficit without too
low a frequency drop or need to shed any load.
A transmission line may be damaged by a storm and
taken out by automatic relaying.
If, in committing and dispatching generation, proper
regard for transmission flows is maintained, the
remaining transmission lines can take the increased
loading and still remain within limit.
Events that cause components to fail are
unpredictable, the system must be
operated at all times in such a way that the
system will not be left in a dangerous
condition
Since power system equipment is
designed to be operated within certain
limits, most pieces of equipment are
protected by automatic devices that can
cause equipment to be switched out of the
system if these limits are violated.
If any event occurs on a system that
leaves it operating with limits violated, the
event may be followed by a series of
further actions that switch other equipment
out of service.
If this process of cascading failures
continues, the entire system or large parts
of it may completely collapse. This is
usually referred to as a system blackout.
System Security
The techniques and equipments that deals
to keep the power system in secured
state.
3 Major functions
1. System monitoring.
2. Contingency analysis.
3. Security-constrained optimal power flow.
System monitoring
Provides the operators of the power system with pertinent up-to-date
information on the conditions on the power system.
Most important function of the three
From the time that utilities went beyond systems of one unit
supplying a group of loads, effective operation of the system
requires critical quantities to be measured and be transmitted to a
central location. Such systems of measurement and data
transmission, called telemetry systems,
These monitor voltages, currents, power flows, and the status of
circuit breakers, and switches in every substation in a power system
transmission network.
In addition, other critical information such as frequency, generator
unit outputs and transformer tap positions can also be telemetered.
With so much information telemetered simultaneously, we need
Computers.
Such systems are usually combined with
supervisory control systems that allow
operators to control circuit breakers and
disconnect switches and transformer taps
remotely. Together, these systems are
often referred to as SCADA systems,
standing for supervisory control and data
acquisition system.
Contingency analysis
The results of this type of analysis allow
systems to be operated defensively.
Programs are based on a model of the
power system and are used to study
outage events and alarm the operators to
any potential overlords or out-of-limit
voltages.
Security-constrained optimal power
flow
In this function, a contingency analysis is combined with
an optimal power flow which seeks to make changes to
the optimal dispatch of generation, as well as other
adjustments, so that when a security analysis is run, no
contingencies result in violations.
To show how this can be done, we shall divide the power
system into four operating states.
Optimal dispatch
Post contingency
Secure dispatch
Secure post-contingenc
Optimal dispatch this is the state that the
power system is in prior to any
contingency. It is optimal with respect to
economic operation, but it may not be
secure.
Post contingency: is the state of the
power system after a contingency has
occurred. We shall assume here that this
condition has a security violation (line or
transformer beyond its flow limit, or a bus
voltage outside the limit).
Secure dispatch: is the state of the
system with no contingency outages, but
with corrections to the operating
parameters to account for security
violations.
Secure post-contingency: is the state of
the system when the contingency is
applied to the base-operating condition-
with corrections.
ILLUSTRATION
Assume that the system as is in economic dispatch, that is the
500 MW from unit 1 and the 700 MW from unit 2 is the optimum dispatch.
We assert that each circuit of the double circuit line can carry a maximum of
400 MW, so that there is no loading problem in the base-operating condition.
Now, we shall postulate that one of the two circuits making up the
transmission line has been opened because of a failure.
Now there is an overload on the remaining circuit. We shall assume for this
example that we do not want this condition to arise and that we will correct
the condition by lowering the generation on unit 1 to 400 MW. The secure
dispatch is
By adjusting the generation on unit 1 and unit 2, we have prevented the
post-contingency operating state from having an overload. This is the essence
of what is called security corrections.