Power System Security_ppt

download Power System Security_ppt

of 55

Transcript of Power System Security_ppt

  • 8/10/2019 Power System Security_ppt

    1/55

    Power System Security

    Prepared by:

    Dhaval g.patel

    Assistant Professor

    CHARUSAT UNIVERSITY.

  • 8/10/2019 Power System Security_ppt

    2/55

    Minimization cost

    Maintain system Security

    1. Generating unit may have to taken off-line because of

    auxiliary equipment failure.

    2. By maintaining spinning reserve, remainning unit can make up

    Introduction

    Transmission line may be damaged and taken out by automatic

    relaying.

    The specific time at which initiating event causes componentfailure is unpredictable.

    Most equipment are protected by automatic devices ,so it may be

    switched out, if this limit is violated.

  • 8/10/2019 Power System Security_ppt

    3/55

    If any event occurs on system that leaves it operating with

    limits violated, the event may be followed by series of furtheractions that switched other equipment out of service.

    If the process of cascading failures continues, the system as a

    whole or its major parts may completely collapse. This is

    normally referred to as a System blackout.- .

    failure)

    System Security can be divided in three major functions that

    are carried out in operation control center.1.System monitoring

    2.Contingency analysis

    3.Security-constrained optimal power flow.

  • 8/10/2019 Power System Security_ppt

    4/55

    Most power systems are operated in such a way that any single

    contingency will not leave other components heavily

    overloaded, so that cascading failures are avoided.

    System security involves practices suitably designed to keep

    the system operating when components fail.

  • 8/10/2019 Power System Security_ppt

    5/55

    Major Functions of Power System

    Security

    I. System Monitoring

    II. Contingency Analysis

    III. Corrective Action Analysis

  • 8/10/2019 Power System Security_ppt

    6/55

    System Monitoring System monitoring supplies the power system operators or

    dispatchers with up to date information on the conditions ofthe power system on real time basis as load and generation

    change.

    Telemetry systems measure, monitor and transmit the data,

    voltages, currents, line flows, status of circuit breakers,

    ,

    every substation in a transmission network.

    Digital computers are installed in a control center, to gather the

    telemetered data then process and place them in a data base

    from which operators can display information on large display

    monitors.

    Computer check incoming against prestored limits and alarm

    the operators in case of an overload or out of limit voltage.

  • 8/10/2019 Power System Security_ppt

    7/55

    Contingency Analysis

    It allows the system to be operated defensively.

    Many of the problems that occur on a power system can cause

    serious trouble within such a quick time period that the

    operator could not take action fast enough. This is often the

    case with cascading failures.,

    operations computers are equipped with contingency analysis

    programs that model possible system troubles before they

    arise.

    These programs are based on a model of the power system and

    are used to study outage events and alarm the operators to any

    potential overloads or out of limit voltages.

  • 8/10/2019 Power System Security_ppt

    8/55

    Corrective action analysis

    Corrective action analysis permits the operator to change the

    operation of the power system if a contingency analysis

    program predicts a serious problem in the event of the

    occurrence of a certain outage.

    Contingency analysis is combined with optimal power flow

    generation, and also other adjustments so that when security

    analysis is run, no contingency result in violations.

    Thus this provides preventive and post contingency control.

    A simple example of corrective action is the shifting of

    generation from one station to another.

    This may result in change in power flows and causing a

    change in loading on overloaded lines.

  • 8/10/2019 Power System Security_ppt

    9/55

    Operating state of Power System

    Optimal dispatch:-The power system is in prior to any

    contingency. It is optimal with respect to economic operation,

    but it may not be secure.

    Post Contingency:-it is the state of power system after a

    contingency has occurred. This condition has a security

    violation.

    Secure dispatch:- it is the state of power system with no

    contingency outages. but with corrections to the operating

    parameters to account for security violations.

    Secure post contingency:-contingency:-It is the state of the

    power system when the contingency is applied to the base-

    operating condition-with corrections.

  • 8/10/2019 Power System Security_ppt

    10/55

    By adjusting the generation on unit 1 and 2 ,we have prevented

    the post-contingency operating state from an overload. This is

    the essence of security corrections.

    Programs which make control adjustment to the base operation

    to prevent violations in post-contingency conditions are called

    SCOPF.

  • 8/10/2019 Power System Security_ppt

    11/55

    Operating state of power system

    Equality constraints:-Real and Reactive power balance at each

    node.

    Inequality constraints:- Limitations of physical equipment

    such as currents and voltages must not exceed maximum

    limits.

    I. Normal state

    II. Alert state

    III. Emergency state

    IV. Extremis state

    V. Restorative state.

  • 8/10/2019 Power System Security_ppt

    12/55

    Continue Normal state:- All equality and inequality constraints are

    satisfied. Generation is adequate to supply the existing loaddemand and no equipment is overloaded.

    Alert state:- The security level is below some threshold of

    adequacy. This implies that there is a danger of violating some

    of theinequality constraintswhen subjected to disturbances.- ,

    enter emergency state. Hereinequality constraintsare violated.

    The system would still be intact, and emergency control action

    could be initiated to restore the system to an alert state.

    Extremis state:- Here, bothequality and inequality constraints

    are violated. The violation of equality constraints implies that

    parts of the system load are lost. Emergency control action

    should be directed at avoiding total collapse.

  • 8/10/2019 Power System Security_ppt

    13/55

    Continue

    Restorative state:- This is a transitional state in whichinequality constraintsare met from emergency control actions

    taken but theequality constraintsare yet to be satisfied.

    From this state the system can transmit to either the alert or the

    normal state depending on the circumstances.

  • 8/10/2019 Power System Security_ppt

    14/55

    FACTORS affecting on Power System

    Security

    As a consequence of many wide spread blackout ininterconnected power systems, the priorities for operation of

    modern power system have evolved to the following:

    I. Operate the system in such a way that power is delivered

    reliably..

    reliability considerations, the system will be operated most

    economically.

    Engineering groups who have designed the power systemstransmission and generation systems have done so with

    reliability in mind.

    This means thatadequate generation has been installed to

    meet the load and that adequate transmission has been

    installed to deliver the generated power to the load.

  • 8/10/2019 Power System Security_ppt

    15/55

    Continue If the operation of the system went on without sudden failures or

    without experiencing unanticipated operating states, we wouldprobably have no reliability problems.

    However, any piece of equipment in the system can fail, either

    due to internal causes or due to external causes such aslightning

    strikes, object hitting transmission towers, or human errors in

    It is highly uneconomical to build a power system with so much

    redundancy (extra transmission line, reserve generation, etc..) that

    failures never cause load to be dropped on a system.

    Rather, A system are designed so that the probability of dropping

    load is small.

    Thus, the power systems are designed to have sufficient

    redundancy to withstand all major failures events, but this does

    not guarantee that system will be 100 % reliable.

  • 8/10/2019 Power System Security_ppt

    16/55

    Continue There are two major types of failure events,

    1. Transmission line outages2. Generation unit failures

    Transmission line failures cause changes in theline flowsand

    voltageson the transmission equipment remaining connected

    to the system. Therefore, the analysis of transmission failures requires

    method to predict these flows and voltages so as to be sure

    they are within their respective limits.

    Generation failures can also causeline flowsandvoltagestochange in the transmission system, with the addition of

    dynamic problems involvingsystem frequencyandgenerator

    output.

  • 8/10/2019 Power System Security_ppt

    17/55

    Security analysis

    System security can be broken down into two major functions:1. Security assessment

    2. Security control

    The former gives the security level of the operating state.

    The later determines the appropriate security constrained

    scheduling required to optimally attain the target security level.

    System security assessment is the process by which any

    violations are detected.

    System assessment involves two functions:

    1. System monitoring

    2. Contingency analysis

  • 8/10/2019 Power System Security_ppt

    18/55

    Continue System monitoringprovides the operator of the power system

    with up to date information on the current conditions of the P.S. Contingency analysis is much more demanding and normally

    performed in three states, i.e.Contingency definition, selection

    and evaluation.

    Contingency definition gives the list of contingencies to be.

    terms of network changes, i.e. branch and/or injection outages.

    These contingencies are ranked in rough order of severity

    employingcontingency selectionalgorithm to shorten the list. Contingency evaluation is then performed (using AC power

    flow) on the successive individual cases in decreasing order of

    severity.

    The evaluation process is continue up to the point where no postcontingency violations are encountered.

  • 8/10/2019 Power System Security_ppt

    19/55

    Continue

    The second major function, security control, allows operating

    personnel to change the power system operation in the event

    that a contingency analysis program predicts a serious

    problem, should a certain outage occur.

    Normally it is achieved through Security Constrained

    Optimization(SCO) program.

  • 8/10/2019 Power System Security_ppt

    20/55

  • 8/10/2019 Power System Security_ppt

    21/55

    Contingency analysis

    Base case AC line flow

  • 8/10/2019 Power System Security_ppt

    22/55

    Continue

    Post Outage AC load flow

  • 8/10/2019 Power System Security_ppt

    23/55

    Continue

    Post outage AC load flow

  • 8/10/2019 Power System Security_ppt

    24/55

    Operators must know which line or generator outages will

    cause flow or voltage outside the limit..to predict the effect

    of outages, contingency analysis is used.

    The methodological problem to cope with in C.A. is the speed

    of solution of the model used.

    Problem of selection of credible outages.

    Use of DC load flow model to gain the speed of solution.

  • 8/10/2019 Power System Security_ppt

    25/55

    Contingency analysis

  • 8/10/2019 Power System Security_ppt

    26/55

    Sensitivity Factors

    The problem of studying thousands of possible outagesbecomes very difficult to solve if it is desired to present the

    results quickly.

    It is easy to solve it withLinear sensitivity factors.

    These factors show the approximate change in line flows for

    c anges n genera on on e ne wor con gura on.

    There are two types :-

    1. Generation Shift Factors

    2. Line Outage Distribution Factors.

  • 8/10/2019 Power System Security_ppt

    27/55

    Generation Shift Factors

    i =

    f/

    Pi

    Where ,= line index,

    i= bus index

    The i

    factors then represents the sensitivity of the flow on

    lineto a change in generation at bus i.

    f= change in MW power flow on line when a change in

    generation,Pioccurs at bus i.

    Pi= change in generation at bus i.

    It is assumed that the change in generation , Pi, is exactly

    compensated by an opposite change in generation at the

    reference bus, and that all other generators remain fixed.

  • 8/10/2019 Power System Security_ppt

    28/55

    Continue..

    If the generator in question was generating MW and it was

    lost, then

    New power flow on each line in the network can be calculated by

    precalculated set of a is given by,

    for 1.....l L

    Where, = flow on lineafter the generator on bus i fails.

    = flow before the failure.

    The outage flow on each line can be compared to its limit

    and those exceeding their limit flagged for alarming.

    This would tell the operations personnel that the loss of the

    generator on bus i would result in an overload on line.

  • 8/10/2019 Power System Security_ppt

    29/55

    The generation shift sensitivity factors are linear estimates of

    thechange in flowwith achange in powerat a bus. therefore

    the effects of simultaneous change on several generating busescan be calculated by superposition.

  • 8/10/2019 Power System Security_ppt

    30/55

    Line outage distribution factor

    It is apply to the testing for overloads when transmission

    circuits are lost.

    Where ,

    = line outage distribution factor when monitoring linea er an ou age on ne .

    = Change in MW flow on line .

    = Original flow on line k before it was outage.

    If we know the power flow on lineand k,

    The flow on linewith k out can be given by,

  • 8/10/2019 Power System Security_ppt

    31/55

    Continue.. Where,

    , = Preoutage flows on linesand k, respectively.

    = Flow on linewith line k out.

    By precalculating the line outage distribution factor a very fast

    overload for the outage of a particular line.

  • 8/10/2019 Power System Security_ppt

    32/55

    Contingency analysis using sensitivity factors

  • 8/10/2019 Power System Security_ppt

    33/55

    AC Power flow method The calculations made by network sensitivity methods are

    faster than those made by AC power flow methods.

    There are many power systems wherevoltage magnitudesare

    the critical factor in assessing contingencies. In addition, there

    are some systems where VAR flows predominate on some

    circuits, such as underground cables, and an analysis of onlye ows w no e a equa e o n ca e over oa s.

    When AC power flow is to be used to study each contingency

    case, speed of solution and no. of cases to be studied are

    critical. So, AC power flow program used NR method or decoupled

    power flow method.

  • 8/10/2019 Power System Security_ppt

    34/55

    AC Power flow security analysis

  • 8/10/2019 Power System Security_ppt

    35/55

    Continue.

    This procedure will determine theoverloadsandvoltage limit

    violationsaccurately.

    Drawback:- Its take moretimeto execute.

    If the list of outages has several thousands entries then total

    time to test for all of the outages can be too long.

    .

    involvingaanddfactors can give rapid analysis but cant give

    MVAR flows and voltages. Where as AC power flow gives

    full accuracy but take long time.

    Solution:-Select contingencies in such a way that only those

    that are likely to result in an overload or voltage limit violation

    will study. The other cases will go unanalyzed.

  • 8/10/2019 Power System Security_ppt

    36/55

    AC power flow security analysis with contingency case selection

  • 8/10/2019 Power System Security_ppt

    37/55

    Continue..

    There are two sources of error can arise during selecting the

    bad cases from full outage case list.

    1. Placing too many cases on the short list :-This is conservative

    approach which leads to longer run times for the security

    analysis procedure to execute.

    2. Skipping cases :-A case that would have shown a problem is

    not placed on the short list and results in possibly having that

    outage take place and cause trouble without the operators

    being warned.

  • 8/10/2019 Power System Security_ppt

    38/55

  • 8/10/2019 Power System Security_ppt

    39/55

    However, when n=1, PI dose not snap from near zero to near

    infinity as branch limit exceeds. Instead its rises as a quadratic

    function.

    A line that isjustjust belowbelow itsits limitlimitcontributes to PI almost equal to

    one that isjustjust overover itsits limitlimit.

    Thus the PIS ability to distinguish or detect bad cases is limited

    when n =1. Trying to develop an algorithm that can quicklycalculate PI when n = 2 or larger has proven extremely difficult.

    The solution procedure is interrupted after one iteration (one P -)

    calculation and one Q V calculation; thus, the name 1P1Q.

  • 8/10/2019 Power System Security_ppt

    40/55

  • 8/10/2019 Power System Security_ppt

    41/55

  • 8/10/2019 Power System Security_ppt

    42/55

    Concentric Relaxation An idea is considered to enter the field of security analysis in

    power systems is that an outage only has a limitedgeographical effect.

    The loss of a transmission line does not cause much effect a

    thousand miles away; in fact, we might it doesn't cause much

    trouble beyond 20 miles from the outage, although if the linewere a eav y oa e , g - o tage ne, ts oss w e tmoremore

    thanthan 2020 milesmiles awayaway..

    To realize the benefit from the limited geographical effect of

    an outage, power system is divided in 2 parts.(1) affected part (2) unaffected part.

    To make this division, the buses at the end of the outaged line

    are marked aslayer zero. The buses that are one transmission

    line or transformer from layer zero are then labeledlayer one.

  • 8/10/2019 Power System Security_ppt

    43/55

    This same process can be carried out, layer by layer, until all

    the buses in the entire network are included.

    Some arbitrary number of layers is chosen and all buses

    included in that layer and lower-numbered layers are solved asa power flow with the outage in place.The buses in the higher-

    numbered layers are kept as constant voltage and phase angle

    (i.e. as reference buses).

    ThisThis procedureprocedure cancan bebe usedused inin twotwo waysways::either the solutiono t e ayers nc u e ecomes t e na so ut on o t at case

    and all overloads and voltage violations are determined from

    this power flow, or the solution simply is used to form a

    performance index for that outage.

    Disadvantages:-It requires more layers for circuits.

    B di

  • 8/10/2019 Power System Security_ppt

    44/55

    Bounding N1 = the subsystem immediately surrounding the outaged line

    N2 = the external subsystem that we shall not solve in detail

    N3 = the set of boundary buses that separate N1 and N2

    This method is based on the assumptions about the phase angle

    spread across the lines in N2, given the injections in N1and the

    maximum phase angle appearing across any two buses in N3.

    angles on buses k and m simulate the outage of line k-m.k m

  • 8/10/2019 Power System Security_ppt

    45/55

    If we are given a transmission line in N2 with flow then

    there is a maximum amount that the flow on pq can shift. i.e. it

    can increase to its upper limit or it can decrease to its lowerlimit. Then,

    0

    pqf

    we can translate this into a maximum change in phase angle

    difference as follows:

    ------- (1)

    And finally

    Thus, we can define the maximum change in the phase angle

    difference across pq.

    ------ (2)

  • 8/10/2019 Power System Security_ppt

    46/55

    The theorem states that

    i,j = any pair of buses in N3, is the largest in N3 and is the

    smallest in N3.

    Eq.3 provides an upper limit to the maximum change in

    angular spread across any circuit in N2. Thus it provides us a

    ------ (3)

    i j

    By combining eq. (2) and (3),we obtain:

    m as ow ar any o e 2c rcu s can c ange e r ow.

    ------ (4)

  • 8/10/2019 Power System Security_ppt

    47/55

    Interpretation of bounding

    shows a graphical interpretation of the bounding process. There

    are two cases represented in above Figure: a circuiton the top

    of the figure thatcant go over limit, while that on the bottombottomcouldcould..

    The horizontal line represents the change in flow on circuit pq

    times its reactance, .

    represents the point where circuit pq will go intooverload and is determined as explained previously.

    q pqf xmax

    pq pq

    f x

  • 8/10/2019 Power System Security_ppt

    48/55

    Any value of to the right of the dotted line representsAny value of to the right of the dotted line represents

    an overload.an overload.

    The solid line labeled represents the upper limit on

    Thus, if the solid line is below (to the left) of the dotted line,

    then the circuit theory upper limit predicts that the circuit

    cannot go into overload; if on the other hand, the solid line is

    above (to the rightof) the dotted line, the circuit may be shifted

    in flow due to the outage so as to violate a limit.

    max

    pq pqf x

    j

    pq pqx

    A completely safe N2 region would be one in which the

    maximum will become smaller and smaller. Therefore,

    the test to determine whether the N1 region encompasses all

    possible overloaded circuits should be as follows: All circuits in N2 are safe from overloadif the value of

    is less than the smallest value of over all pairs pq,

    where pq corresponds to the buses. at the ends of circuits in N2 .

    j

    j

    m ax

    q p qf x

  • 8/10/2019 Power System Security_ppt

    49/55

    If this condition fails, then we have to expand N1, calculate a

    new in N3, and rerun the test over the newly defined

    N2region circuits. When an N2is found which passes the test,

    we are done and only region N1need be studied in detail.

    j

  • 8/10/2019 Power System Security_ppt

    50/55

    REFERENCES

    1. Modern Power System Analysis by D.P.Kothari &

    I.J.Nagrath .

    2. Power Generation, Operation and Control by

    A.J.Wood & B.F.Wollenberg

  • 8/10/2019 Power System Security_ppt

    51/55

  • 8/10/2019 Power System Security_ppt

    52/55

    1. An operationally secure power system is one with____________.

    A. Medium probability of system blackout.

    B. Low probability of system blackout.

    C. High probability of system blackout.

    D. Zero probability of system blackout.

    2. Contingency analysis provides operating constrains to be employed in______________.

    A. Unit commitment.

    B. Emission dispatch.

    C. Economic dispatch.

    D. (A) and (B).

    3. A Security analysis program normally uses_____________.

    A. DC load flow.

    B. AC load flow.

    C. AC-DC flow.

    D. Any of the above.

    4. Energy management system ensures_____________.

    A. Minimum cost.

    B. Minimum environment cost.

    C. High security.

    D. Any of the above.

  • 8/10/2019 Power System Security_ppt

    53/55

    5. Energy control center is supposed to perform the following security functions____________.

    A. System monitoring.

    B. Contingency analysis.

    C. Corrective action analysis.

    D. All of the above.

    6. A Power system is operationally secure means______________.

    A. All line flows and load bus voltages are within limit.

    B. The operating cost is minimum.

    C. It is safe from lightning strokes .

    D. It is safe against switching surges.

    7. Line outage distribution factors are primarily useful for________________.

    A. System monitoring.

    B. Contingency definition.

    C. Contingency selection.

    D. Security control.

    8. Pre-contingency corrective rescheduling is required for system operation to be___________.

    A. Most Economical.

    B. In corrective by secure.

    C. In security level-I.

    D. None of the above.

    9 Contingency definition gives the list of component outages

  • 8/10/2019 Power System Security_ppt

    54/55

    9. Contingency definition gives the list of component outages_____________.

    A. Which provides the contingency in decreasing order of severity.

    B. Which includes the contingency with high probability of occurence.

    C. For outage simulation.

    D. Any one of the above.

    10. A power system has secure and economic operation implies that__________.

    A. Operating cost is minimum subject to emission constraints.

    B. Operating cost is minimum subject to line flow constraints.

    C. Magnitude of the line flows are minimum.

    D. Transmission real power losses are minimum.

    . __________ .

    A. Accurate results are required.

    B. Masking is to be removed.

    C. Limited accuracy results are required.

    D. All of the above.

    12. Pre-plus post-contingency corrective rescheduling is required at times for___________.

    A. The network operation is required in alert state .

    B. The network operation is non-corrective emergency.

    C. The network corrective capability is limited.

    D. None of the above.

  • 8/10/2019 Power System Security_ppt

    55/55