Preview

Transmission Line Protection

Powerful Essays
Open Document
Open Document
3745 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Transmission Line Protection
Fundamentals of
Distance Protection
GE Multilin

Outline
• Transmission line introduction
• What is distance protection?
• Non-pilot and pilot schemes
• Redundancy considerations
• Security for dual-breaker terminals • Out-of-step relaying
• Single-pole tripping
• Series-compensated lines
2/
GE /
December 7, 2014

Transmission Lines
A Vital Part of the Power System:
• Provide path to transfer power between generation and load
• Operate at voltage levels from 69kV to 765kV
• Deregulated markets, economic, environmental requirements have pushed utilities to operate transmission lines close to their limits.

3/
GE /
December 7, 2014

Transmission Lines
Classification of line length depends on:
 Source-to-line Impedance Ratio (SIR), and  Nominal voltage
Length considerations:
 Short Lines: SIR > 4
 Medium Lines: 0.5 < SIR < 4
 Long Lines: SIR < 0.5
4/
GE /
December 7, 2014

Typical Protection Schemes
Short Lines

• Current differential
• Phase comparison
• Permissive Overreach Transfer Trip
(POTT)
• Directional Comparison Blocking (DCB)

5/
GE /
December 7, 2014

Typical Protection Schemes
Medium Lines

• Phase comparison
• Directional Comparison Blocking (DCB)
• Permissive Underreach Transfer Trip (PUTT)
• Permissive Overreach Transfer Trip (POTT)
• Unblocking
• Step Distance
• Step or coordinated overcurrent
• Inverse time overcurrent
• Current Differential
6/
GE /
December 7, 2014

Typical Protection Schemes
Long Lines










Phase comparison
Directional Comparison Blocking (DCB)
Permissive Underreach Transfer Trip (PUTT)
Permissive Overreach Transfer Trip (POTT)
Unblocking
Step Distance
Step or coordinated overcurrent
Current Differential
7/
GE /
December 7, 2014

What is distance protection?
Intended
REACH point
F1
Z

I*Z
V=I*ZF
I*Z V

RELAY (V,I)

For internal faults:
> IZ – V and V approximately in phase (mho)
> IZ – V and IZ approximately in phase (reactance)
8/
GE /
December 7, 2014

What is distance protection?
F2

Intended
REACH point

You May Also Find These Documents Helpful

  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Securing Military Gear

    • 5047 Words
    • 21 Pages

    The definition of sensitive items is anything that considered classified or a mission essential item. They range anywhere from protective wear, maps, patrol routes, nods (night vision goggles) or simply your weapon. The meaning of securing your sensitive items mainly is maintaining accountability for opsec (operation security), mission success and a soldiers overall readiness. If an item is lost and the enemy gets his/her hands on that item it could compromise the mission at hand or give them intelligence on the items we as soldiers use each day. Using habits and exercising the securing of sensitive items will make it possible for the soldier and his or her team to operate at the top performance. Operational security is process that denied valuable information to an enemy. If an enemy were to obtain the presented it could be used against our forces. Not securing sensitive items increases the risk of loss by being intercepted by unauthorized personnel. Every soldier must maintain accountability and positive control of all sensitive material to allow full use by them and anyone involved with the mission at hand while still maintaining operational security. Operational security can be compromised through the loss of sensitive items due to loss of equipment used for operational planning, or items used for support missions. Also depending on the type of sensitive item that is being classified it could fall under a different level of security as it is deemed so by the U.S. Government. The levels included in the term classified are restricted (public disclosure could have undesirable effects or do some harm), confidential (unauthorized disclosure could damage national security example would be compromising information that indicates the strength of armed forces or disclosure of technical information about weapons), secret (unauthorized disclosure could seriously damage national security) and top secret (unauthorized disclosure could…

    • 5047 Words
    • 21 Pages
    Good Essays
  • Good Essays

    State the organisational procedures developed to report and rectify inappropriate information and unsuitable resources and how they are implemented.…

    • 807 Words
    • 4 Pages
    Good Essays
  • Good Essays

    My drawing can be divided into two dimensions, with the two police officers in the front, and two prison cells in the back.…

    • 287 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Physical abuse: Physical abuse involving contact planned to cause bodily harm, feelings of intimidation, other physical suffering or injury…

    • 3231 Words
    • 10 Pages
    Good Essays
  • Good Essays

    Network Hardening

    • 287 Words
    • 2 Pages

    It is very important to go through the process of hardening. Hardening is where you change the hardware and software configurations to make computers and devices as secure as possible. I picked the network layout 1-the workgroup . First with the workstations and laptops you need to shut down the unneeded services or programs or even uninstall them. I would also have some good anti-virus software on the workstations. You also need a hardened image for all of your workstations. To do this you need to install a new copy of the operating system and then harden it. After you have one good hardened workstation you can use it as a model for all other workstations and also laptops. For the router you definitely need to protect it from unauthorized access. The router needs to be password protected and you should periodically change that password. For the cable modem you should keep all unwanted ports closed. I would also schedule a regular scan of all the systems. Now for some of these next things I am talking about they will apply to all devices . Disable remote administration. Administration of your router / access point should be "local only", namely, there is no reason to let people from another country access to your network hardware. If you need to make changes, you should be local to the device. Update the firmware. Believe it or not, consumer network hardware needs to be patched also. Check the support site of the vendor of the device when you get it and check for an update. Sign up for e-mail alerts for updates, if available, or check back on a regular basis for…

    • 287 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Outcome 1: Know about the legislation, guidelines, policies and procedures for safeguarding the welfare of children and young people, including e-safety…

    • 4077 Words
    • 17 Pages
    Good Essays
  • Better Essays

    "The history of liberty has largely been the history of observance of procedural safeguards." We agree with this quote because our country is based on the right to have our guaranteed protection of life, liberty and property. Two of the greatest procedural guarantees that insure liberty are the Fifth and Fourteenth Amendments. According to the Fifth Amendment, a capital crime is punishable by death, while an infamous crime is punishable by death or imprisonment. This amendment guarantees that no one has to stand trial for such a federal crime unless indicted by a grand jury. Further, a person cannot be put in double jeopardy for the same offense by the same government. The amendment also guarantees that a person cannot be forced to testify against himself, and forbids the government from taking a person's…

    • 2354 Words
    • 10 Pages
    Better Essays
  • Better Essays

    Federal Shield Laws

    • 1475 Words
    • 6 Pages

    There is a definite need for a federal shield law, to protect journalists from being held in contempt for not revealing their sources. A shield law is a statute that protects journalists from being forced to reveal confidential sources, from which information has been received. There are state shield laws in place right new for many states within the United States, however there are 15 states in the United States that have not yet adopted any type of shield law protecting against being held in contempt (Shield Laws). There are some great reasons why a federal shield law is a good idea. One main reason for the law is to create a set of rules for reporters to follow when gathering information for a story. These rules would help keep reporters from being held in contempt for not abiding by subpoenas. Another aspect of the shield law is that it would stop some confusion that occurs with the many state statues. The need for a federal shield law is there, but the question is how much should journalists be protected? Should journalists be able to gather information and be completely protected when the need arises for government officials to know the source of this information? Or, should journalists be forced to comply with the government and hand over all sources and findings?…

    • 1475 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Assignment 26 Safeguarding

    • 4735 Words
    • 19 Pages

    Civil Law is in 2 areas Public Law which puts systems and processes to reduce the risk of children coming to harm and says what action should happen if they are at risk. Private Law sorts out family contact and divorce.…

    • 4735 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    • CYBERCRIME is formally defined as any criminal action perpetrated primarily through the use of a computer. • CYBERCRIMINALS are individuals who use computers, networks, and the Internet to perpetrate crime. • The existence of cybercrime means that computer users must take precautions to protect themselves.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Powerful Essays

    Nvq 3 Ccld Safeguarding

    • 2416 Words
    • 10 Pages

    When dealing with suspected or actual abuse it is important that we don’t make premature judgments and try to deal with the situation without having all information and evidence required. Just because (for example) a child comes into school regularly with cuts and bruises, this does not mean that they are being abuse. Observations can play a key role into getting actual evidence. By making premature judgments and proceeding to accuse parents/carers of abusing a child can cause a lot of unnecessary upset to both parent and child and make your workplace look inadequate.…

    • 2416 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Ncfe Safeguarding

    • 560 Words
    • 3 Pages

    1.5 Explain how the processes used by own work setting or service comply with legislation that covers data protection, information handling and sharing.…

    • 560 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Identify and discuss different types of digital subscriber line (DSL) technologies. Discuss the benefits of using xDSL technologies. Explain how ASDL works. Explain the basic concepts of signaling and modulation. Discuss additional DSL technologies (SDSL, HDSL, HDSL-2, G.SHDSL, IDSL, and VDSL).…

    • 4521 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Digital Subscriber Lines (DSL) are used to deliver high-rate digital data over existing ordinary phone-lines. A new modulation technology called Discrete Multitone (DMT) allows the transmission of high speed data. DSL facilitates the simultaneous use of normal telephone services, ISDN, and high speed data transmission, e.g., video. DMT-based DSL can be seen as the transition from existing copper-lines to the future fiber-cables. This makes DSL economically interesting for the local telephone companies. They can offer customers high speed data services even before switching to fiber-optics.…

    • 4575 Words
    • 19 Pages
    Good Essays