Professional Documents
Culture Documents
RECENT BLACKOUTS
2003 East Coast
Blackout
2003 Italian Blackout
2002 Swedish Blackout
1997- PJM Disturbance
1995- West Coast
Blackout
1995-PECO Disturbance
1987- City of Memphis
Level 1
(secure)
Level 2
(Correctively Secure)
Level 3
(Alert)
Level 4
(Correctable Emergency)
Level 5
(Non-correctable emergency)
Level 6
(Restorative)_
Security Environment
Security involves three major operations at
Energy Management Centre
System Monitoring
Contingency Analysis
Security constrained optimal power flow
System Monitoring
It provides system operator with up-to-date
information on the state of the system
Critical quantities are measured across the
network (voltages, currents, power flow, states of
CB and switches etc) and telemetered to energy
centre
State estimator is used to combine telemetered
data with system to produce best estimate of
power system state
Such systems are equipped with SCADA to allow
operator to control CB, switches and Xer taps
remotely
Contingency Analysis
Contingency analysis program is run on
EMC m/cs to simulate system troubles
before they arise
Outcomes of outage events alarm
operators against overloads or out of limit
violations
Contd.
Optimal Dispatch: It is the state of the system prior to
contingency optimal w.r.t economic operation but it
may not be secure
Post-contingency: It is the state of the system after
contingency has occurred. Let this state has security
violations in terms of line or Xer overload or bus voltage
outside limits
Secure Dispatch: It is the state of the system with no
contingency outages but with corrections to operating
parameters to account for security violations
Secure post- contingency: It is the state of the system
when contingency is applied to the base operating
condition with corrections
SCOPF
Programs which can make Control
adjustments to the pre-contingency state
to prevent violations in the post
contingency condition are called SCOPF
These programs take account of many
contingencies and calculate adjustments
to generator MW, generator voltages,
transformer taps etc.
START
SIMULATE AN OUTAGE OF A
GENERATOR OR A BRANCH
SELECT A
NEW OUTAGE
LIMIT VIOLATION
Y
ALARM MESSAGE
N
LAST OUTAGE
Y
END
Real-time Framework
Security analysis program to be run at
EMC must be executed very quickly in
order to be of any use to operators
study power system with approximate but very
fast algorithm
Select only critical contingencies for detailed
analysis
Computing system made of multiple
processors or vector processor to gain speed
AC Power flow
It is simply impossible, even on the fastest
processors to execute thousands of complete
AC power flows quickly enough
Fortunately, for most of the cases power flow
results do not have flow or voltage limit violation.
This elimination of non-critical cases come under
contingency selection or contingency screening
There are ways of running thousands of
contingency power flows through parallel
processing or through vector processor
li
f l f l li Pi
ji
Pjmax
n
P
k 1
k i
max
k
f l f l li Pi lj ji Pli
j i
d lk
f l
fk
0
f l f l d lk f k
Dilemma
Can we go with fast and inaccurate
method (distribution factor) not providing
information about MVAR flows and
voltages ?
OR
Accurate AC power flow method taking too
much time
Screening Issues
No exact procedure to select only bad or
likely trouble cases from the full outage
case list
- Placing too many cases on the short list
- conservative approach
-Skipping cases trouble without operator
being warned
Contingency Selection
Degree of impact of a contingency on a power system
can be measured in terms of performance index PI
Pflowl
max
P
l
2n
2n
PI
l
Pl
max
Ei
2m
Ei
max
Concentric Relaxation
Method is based on the fact that an outage has
limited geographical effect
Power system is divided into two parts: the
affected part and the part that is unaffected
Arbitrary no. of layers is chosen for power flow
with the outage in place. The buses in high
numbered layers are kept at const. voltage and
phase angle
Solution of layers included is considered as final
and can be used for calculation of PI
Bounding Method
It uses adjustable region around the
voltage to solve for outage case overloads
All circuits in N2 are safe from overload if
the value of Ii jI is less than the
smallest value of fpq(max). Xpq
N3
i
N j
N1
k
m
N2