Professional Documents
Culture Documents
Viren B. Pandya
OUTLINE
System security and reliability
Illustrative example
Classification of power system states and actions to be taken
In
In
security
power
applications,
system
we
refer
to
the
disturbances of interest as contingencies operations, security assessment analyzes the vulnerability of the system to a set of postulated contingencies on a
Transformer Overload
Line Overload
Low Voltage
Unstable Voltage
Frequency instability
Static security
Dynamic security
Contingency analysis
Security constrained optimal power flow System monitoring is done by SCADA and state estimator at central computer Contingency analysis gives results for different
Example
Line max loadability is 400 MW 250 MW
250 MW 500 MW Unit 1 1200 MW Optimal Dispatch 700 MW Unit 2
Example
Post contingency
Example
200 MW
200 MW 400 MW Unit 1 1200 MW 800 MW Unit 2
Secure dispatch
Example
Example
Thus by adjusting generation on unit 1 and 2 we have prevented post contingency operating
Example
These programs can take account of many contingencies and calculate adjustments to
generator
MW,
generator
voltages,
Security-related decisions
Time-frame On-line assessment Decision maker Operator Decision How to constrain the economic operation to Basis for decision Operating rules, on-line assessment,
(min-hours)
Operational planning (hrs-months) Analyst
and Rs
Minimum operating criteria, reliability, and Rs
Planning
Analyst
How to reinforce/maintain
Reliability criteria
(months-years)
17