System security can be broken down into three major functions that are carried out in an operations
control center:
Slide 6,7,8 (System Monitoring):
System monitoring supplies the power system operators or power dispatchers with pertinent up to date
information on the conditions of the power system on real time basis as load and generation change.
In every substation, telemetry systems measure, monitor and transmit the data like, voltages, currents,
frequency, current flows, generator outputs, transformer tap positions, the status of circuit breakers &
switches
in
a
transmission
network.
Digital computers then process the telemetered data and place them in a data base form and inform the
operators in case of an overload or out of limit voltage. Important data are also displayed on large size
monitors. Alarms or warnings are also given if required.
State estimation techniques are normally used to combine telemetered data to give the best estimate (in
statistical sense) of the current system condition or state .
Such systems often work with supervisory control systems to help operators to control, circuit breakers,
operate switches and taps remotely. These systems together are called SCADA (supervisory control and
data acquisition) systems.
Slide 9 (contingency analysis):
Many of the problems that occur on a power system can cause serious trouble within such a quick time
period that the operator could not take action fast enough. This is often the case with cascading failures.
Because of this aspect of systems operation, modern operations computers are equipped with
contingency analysis programs that model possible system troubles before they arise. These programs
are based on a model of the power system and are used to study outage events and alarm the operators
to any potential overloads or out of limit voltages.
Slide 10,11,12 (SCOPF):
The third major security function is security-constrained optimal power flow. In this function, a contingency
analysis is combined with an optimal power flow that seeks to make changes to the optimal dispatch of
generation, as well as other adjustments, so that when a security analysis is run, no contingencies result
in violations. This enables the operator to change the operation of the power system if a contingency
analysis program predicts a serious problem in the event of the occurrence of a certain outage. Thus it
provides preventive and post-contingency control. A simple example of corrective action is the shifting of
generation from one station to another. This may result in change in power flows and causes a change in
loading on overloaded lines.
To show how this can be done, we shall divide the power system into four operating objectives.
Normal state dispatch: This is the state that the power system is in prior to any contingency. It is optimal
with respect to economic operation, but it may not be secure.
Post contingency: This is the objective after a contingency has occurred. We shall assume here that this
condition has a security violation (line or transformer beyond its flow limit or a bus voltage outside the
limit).
Secure dispatch: This is the objective with no contingency outages is to correct the operating
parameters to account for security violations.
Secure post contingency: The objective is to re-mediate the contingency as applied to the baseoperating condition with corrections.
By adjusting the generation on unit 1 and unit 2, we have prevented the post contingency operating state
from having an overload. This is the essence of what is called security corrections. Programs that can
make control adjustments to the base or pre contingency operation to prevent violations in the post
contingency conditions are called security-constrained optimal power flows or SCOPF. These programs
can take account of many contingencies and calculate adjustments to generator MW, generator voltages,
transformer taps, interchange, etc.
Slide 14,15 (States of P.S):
Normal usually means that there are no alarms being presented and contingency analysis is not reporting
any contingencies that would cause overloads or voltage violations.
Alert state: If a system suffers from any event like, sudden increase of load, its security level reduces.
Then the system would switch to Alert state. The E and I would still be satisfied. However, with
preventive control strategy, the operator takes control actions to return the system to its normal state.
Emergency State: In the Alert state, if some additional disturbance occurs or in normal state a major
disturbance is encountered (e.g., tripping of tie line or loss of an additional generator), then the system
will enter to emergency state. In this state the system remains intact, i.e., E is still satisfied i.e, the
demand is still met by the generation, one or more component or state violate the prescribed operation
limits. but I change to _ (e.g., overloads of system components) refers to the constraint violation. By
means of emergency control (like generator rescheduling) the operator would try to relieve the transition
due to normal state overload situations.
Cascade State: If the emergency control fails, then a series of cascading events may lead to the cascade
(extreme) state. Typically, the system would breakup into islands , each of which would be operating at
their own frequencies. Both E and I would not satisfied and the system will result in a blackout. The
control actions needed in this state must be really powerful. Usually load shedding of the most
unimportant loads and separation of the system into small independent parts are required.
Restorative State: A series of resynchronization controls are required to restart generators and gradually
generators pickup the loads. This is a long process and the state of the system is called restorative
state. Restoration can take many hours especially if large generators are involved.
Slide 16 (Factors Affecting P.S):
o
o
o
o
o
o
o
o
o
o
Generation failures can also cause flows and voltages to change in the transmission system, with the
addition of dynamic problems involving system frequency and generator output.
Slide 23,24,25,26 (T/X Error):
Consider the five bus system with its load flow results. A power flow of 24.7 MW and 3.6 MVAR on the
line from bus 2 to bus 3 can be seen. At present, only the MW loading of the line is considered.
Simulation of line outage is more complex than a generator outage since line outage results in a change
in system configurations.
Examine what will happen if the line from bus 2 to bus 4 were to open. The resulting line flows and
voltages are shown in line diagram below. It may be noted that the flow on the line 2 to 3 has increased
to 37.5 MW and that most of the other line flows are also changed. It may also be noted that bus voltage
magnitudes also get affected, particularly at bus 4, the change is almost 2% less from 1.0236 to 1.0068
pu.
Suppose the line from bus 2 to bus 5 were to open. Now the maximum change (almost 10%) in voltage is
seen at bus 5.
Slide 27 (Contingency Analysis Summary):
It is important to know which line or unit outages will render line flows or voltages to cross the limits.
o
o
o
To find the effects of outages, contingency analysis techniques are employed. Contingency analysis
models, single failure events i.e., one line outages or one unit outages) or multiple equipment failure
events (failure of multiple unit or lines or their combination) one after another until all credible outages
are considered. For each outage, all lines and voltages in the network are checked against their
respective limits.
Difficulties are:
Speed of Solution
Selection of All Credible outages
Changed system conditions over time