IntelliGrid Architecture

 

 

Home

Parent Menu

IntelliGrid Project
Power Functions
IntelliGrid Environments
IntelliGrid Vision
Security Overview
Technical Analysis
Technology List
Additional Information
Printable Deliverables

Same Level Menu

Env1 High Speed Intra-Subst
Env2 High Speed Inter-Subst
Env3 High Secure Intra-Subst
Env4 Inter Field Equipment
Env5 Critical DAC
Env6 Non-Critical DAC
Env7 Intra-Control Center
Env8 Inter-Control Center
Env9 Control Centers to ESPs
Env10 RTOs to Market
Env11 Cntrl Ctr to Customers
Env12 Cntrl Ctr to Corp
Env13 Intra-Corporation
Env14 Inter-Corporation
Env15 DER Monitor & Cntrl
Env16 Intra-Customer Site
Env17 Inter-Customer Sites
Env18 Customer to ESP
Env19 HV Generation Plant
Env20 Maintenance

Child Menu

 

Search IntelliGrid Site

Questions/Comments

Questions

 

Responses

 

 

Inter-Control Center Environment - #8

This environment represents the requirements for exchanging data among control centers.  Until recently, such links were the only formal links between power system businesses.  For this reason, considerable effort has already been made in standardizing protocols for this environment

Typical Applications: Exchanging fault information for contingency analysis and emergency operations.  Exchanging metering information from territorial boundaries to initialize state estimation or load distribution applications. Sometimes includes text messaging between operators, or tariff information.  May take place between levels of control centers within a utility, or between RTOs.

Characteristics:  Often, but not always, business-to-business.  Usually based on wide-area networks.  Extremely high security requirements because exchanges usually cross organizational boundaries, the data may be critical to network stability, and the security environment at the other end cannot be guaranteed.  Networks are usually private so denial-of-service is not a primary concern; however non-repudiation is vital because mistakes may cause inter-organizational conflict. Control centers exchange relatively small amounts of data, mostly already in standard format, in time periods measured in seconds.

Similar Environments:  Technologically very similar to other business-to-business environments, and with similar security requirements.  However, the data carried tends to be critical for operational rather than economic reasons.  Carries only a subset of the Intra-Control Center information.

Definition:  This environment is defined by the following requirements:

 


Communication and Information Requirements that Define this Environment

Configuration Requirements

  • Support peer to peer interactions
  • Support interactions across widely distributed sites

Quality of Service Requirements

  • Provide medium speed messaging on the order of 10 seconds
  • Support high availability of information flows of 99.9+ (~9 hours)

Security Requirements

  • Provide Identity Establishment Service (you are who you say you are)
  • Provide Authorization Service for Access Control (resolving a policy-based access control decision to ensure authorized entities have appropriate access rights and authorized access is not denied)
  • Provide Information Integrity Service (data has not been subject to unauthorized changes or these unauthorized changes are detected)
  • Provide Confidentiality Service (only authorized access to information, protection against eavesdropping)
  • Provide Inter-Domain Security Service (support security requirements across organizational boundaries)
  • Provide Non-repudiation Service (cannot deny that interaction took place)
  • Provide Security Assurance Service  (determine the level of security provided by another environment)
  • Provide Audit Service (responsible for producing records, which track security relevant events)
  • Provide Security Policy Service (concerned with the management of security policies)
  • Provide Path and Routing Quality of Security (being able to determine a secure communication path)
  • Provide Firewall Transversal
  • Provide User Profile and User Management (combination of several other security services)
  • Provide Security Protocol mapping (the ability to convert from one protocol to another)
  • Provide Security Discovery (the ability to determine what security services are available for use)

Network and System Management Requirements

  • Provide Network Management (management of media, transport, and communication nodes)
  • Provide System Management (management of end devices and applications)

Data Management Requirements

  • Support keeping the data up-to-date
  • Support extensive data validation procedures
  • Support keeping data consistent and synchronized across systems and/or databases
  • Support management of data whose types can vary significantly in different implementations
  • Support specific standardized or de facto object models of data
  • Provide discovery service (discovering available services and their characteristics)
  • Provide conversion and protocol mapping
  • Support the management of data across organizational boundaries

 


Recommended Technologies

Energy Industry-Specific Technologies

    Utility Field Device Related Data Exchange Technologies

    Utility Control Center Related Data Management Technologies

Communications Industry Technologies

    Access Technologies

    Networking Technologies

    IP-based Transport Protocols

    Application Layer Protocols

    Link Layer and Physical Technologies

    Wireless Technologies

    Computer Systems Related Technologies

    General Internet and De Facto Data Management Technologies

    eCommerce Related Data Management Technologies

Security Technologies

    Policy and Framework Related Technologies

    General Security Technologies

    Media and Network Layer Technologies

    Application Layer Security Technologies

    XML Related Technologies

Network and Enterprise Management Technologies

    Network Management Technologies

    Web-based Network Management

Security Services

    Common Security Services

Network and System Management Services

    Enterprise Management Services

Data Management Common Services

    Data Management Common Services

Common Platform Services

    Common Platform Services

Data Management Best Practices

    Data Management

Security Best Practices

    Security Frameworks and Policy Documents

Security Technology Documents

 


Alternative Technologies

    Utility Control Center Related Data Management Technologies

    Access Technologies

    Networking Technologies

    Application Layer Protocols

    Link Layer and Physical Technologies

    Wireless Technologies

    Virtual Private Networking Technologies

    General Internet and De Facto Data Management Technologies

    Network Management Technologies

    Web-based Network Management

 


Alternative Best Practices

    Data Management

    Security Frameworks and Policy Documents

    ISO/IEC Documents on Security Technologies

    Federal Documents on Security Technologies

    IETF Internet Requests for Comments (RFCs) on Security Technologies

    Other Security Technolog

 


Possible Technologies

    Networking Technologies

 

 

IntelliGrid Architecture
Copyright EPRI 2004