IntelliGrid Architecture

 

 

Home

Parent Menu

IntelliGrid Project
Power Functions
IntelliGrid Environments
IntelliGrid Vision
Security Overview
Technical Analysis
Technology List
Additional Information
Printable Deliverables

Same Level Menu

Env1 High Speed Intra-Subst
Env2 High Speed Inter-Subst
Env3 High Secure Intra-Subst
Env4 Inter Field Equipment
Env5 Critical DAC
Env6 Non-Critical DAC
Env7 Intra-Control Center
Env8 Inter-Control Center
Env9 Control Centers to ESPs
Env10 RTOs to Market
Env11 Cntrl Ctr to Customers
Env12 Cntrl Ctr to Corp
Env13 Intra-Corporation
Env14 Inter-Corporation
Env15 DER Monitor & Cntrl
Env16 Intra-Customer Site
Env17 Inter-Customer Sites
Env18 Customer to ESP
Env19 HV Generation Plant
Env20 Maintenance

Child Menu

 

Search IntelliGrid Site

Questions/Comments

Questions

 

Responses

 

 

Critical Operations Intra-Substation Environment - #3

This environment encompasses the set of requirements traditionally known as “substation automation” and involve information exchanges within a substation that are critical to legal, safe, and reliable power system operations. Devices within the substation coordinate with each other to ensure the safety of equipment and personnel while optimizing the operation of the network and permitting operators to respond to emergencies. 

Typical applications: Uses of this environment may include voltage/VAR control, interlocking, removing equipment for maintenance, updating configurations and settings, responding to faults, load shedding, and manually or automatically restoring service.  These tasks were traditionally performed by individual devices but are now are commonly distributed over local area networks.

Characteristics: This environment requires a high level of security because outages, equipment damage or safety concerns can result from misoperated controls, either manually or automatically generated.  Similarly, maintenance of equipment by unauthorized personnel could be disastrous.

Similar Environments: Quality of service requirements are not as strict as with the Rapid Deterministic environments, but response generally must be better than human reaction time. 

This environment differs from Critical Operations DAC because it is limited to the substation.  Some utilities may find physical security adequate within the substation, while electronic security is vital outside the substation.  Quality of service requirements may also be less vital between substation and control center than within the substation itself, since the substation automates many critical functions locally.

Definition:  This environment is defined by the following requirements:

 


Communication and Information Requirements that Define this Environment

Configuration Requirements

  • Provide point-to-point interactions between two entities
  • Support peer to peer interactions
  • Support interactions within a contained environment (e.g. substation or control center)

Quality of Service Requirements

  • Provide high speed messaging of less than 1 second
  • Support very high availability of information flows of 99.99+ (~1 hour)
  • Support time synchronization of data for age and time-skew information

Security Requirements

  • Provide Authorization Service for Access Control (resolving a policy-based access control decision to ensure authorized entities have appropriate access rights and authorized access is not denied)
  • Provide Information Integrity Service (data has not been subject to unauthorized changes or these unauthorized changes are detected)
  • Provide Audit Service (responsible for producing records, which track security relevant events)
  • Provide Credential Renewal Service (notify users prior to expiration of their credentials)
  • Provide Security Policy Service (concerned with the management of security policies)
  • Provide Single Sign-On Service (relieve an entity having successfully completed the act of authentication once from the need to participate in re-authentications upon subsequent accesses to managed resources for some reasonable period of time)
  • Provide Security Discovery (the ability to determine what security services are available for use)

Network and System Management Requirements

  • Provide Network Management (management of media, transport, and communication nodes)
  • Provide System Management (management of end devices and applications)

Data Management Requirements

  • Support the management of large volumes of data flows
  • Support keeping the data up-to-date
  • Support extensive data validation procedures
  • Support specific standardized or de facto object models of data
  • Provide discovery service (discovering available services and their characteristics)
  • Provide conversion and protocol mapping

 


Recommended Technologies

Energy Industry-Specific Technologies

    Utility Field Device Related Data Exchange Technologies

Communications Industry Technologies

    Networking Technologies

    IP-based Transport Protocols

    Application Layer Protocols

    Link Layer and Physical Technologies

    Wireless Technologies

    Computer Systems Related Technologies

Security Technologies

    Policy and Framework Related Technologies

    General Security Technologies

    Media and Network Layer Technologies

    Transport Layer Security Technologies

    Application Layer Security Technologies

    XML Related Technologies

Network and Enterprise Management Technologies

    Network Management Technologies

Security Services

    Common Security Services

Network and System Management Services

    Enterprise Management Services

Data Management Common Services

    Data Management Common Services

Common Platform Services

    Common Platform Services

Data Management Best Practices

    Data Management

Security Best Practices

    Security Frameworks and Policy Documents

Security Technology Documents

 


Alternative Technologies

    Utility Field Device Related Data Exchange Technologies

    Networking Technologies

    IP-based Transport Protocols

    Wireless Technologies

    Virtual Private Networking Technologies

    Computer Systems Related Technologies

  • GUID - Data Management

    Network Management Technologies

 


Alternative Best Practices

    Data Management

    ISO/IEC Documents on Security Technologies

    Federal Documents on Security Technologies

    IETF Internet Requests for Comments (RFCs) on Security Technologies

    Other Security Technolog

 


Possible Technologies

    Utility Field Device Related Data Exchange Technologies

  • Fieldbus - Configuration, Quality of Service,
  • PROFIBUS - Configuration, Quality of Service,
  • ModBus - Configuration, Quality of Service,
  • ModBus TCP/IP - Configuration, Quality of Service,
  • ModBus Plus - Configuration, Quality of Service,

    Link Layer and Physical Technologies

 

 

IntelliGrid Architecture
Copyright EPRI 2004