• Title/Summary/Keyword: Network protection

Search Result 1,087, Processing Time 0.027 seconds

Static Switch Controller Based on Artificial Neural Network in Micro-Grid Systems

  • Saeedimoghadam, Mojtaba;Moazzami, Majid;Nabavi, Seyed. M.H.;Dehghani, Majid
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.6
    • /
    • pp.1822-1831
    • /
    • 2014
  • Micro-grid is connected to the main power grid through a static switch. One of the critical issues in micro-grids is protection which must disconnect the micro-grid from the network in short-circuit contingencies. Protective methods of micro-grid mainly follow the model of distribution system protection. This protection scheme suffers from improper operation due to the presence of single-phase loads, imbalance of three-phase loads and occurrence of power swings in micro-grid. In this paper, a new method which prevents from improper performance of static micro-grid protection is proposed. This method works based on artificial neural network (ANN) and able to differentiate short circuit from power swings by measuring impedance and the rate of impedance variations in PCC bus. This new technique provides a protective system with higher reliability.

Study on a Network for the Protection and Control in Substations (변전소용 자동화 네트워크의 구현을 위한 연구)

  • Kwon, Wook-Hyun;Chung, Beom-Jin;Yun, Man-Cheol;Kim, Il-Dong
    • Proceedings of the KIEE Conference
    • /
    • 1990.07a
    • /
    • pp.100-105
    • /
    • 1990
  • Associated with the protection and control functions in the substations, a new network scheme based on the IEEE 802.4 is proposed in this paper. This network is designed for supporting 3 data classes: 1st, it includes the highly time-critical data for the fault detection function. 2nd, routine data with a period is to served for monitoring the power status. Finally, it contains the control data which is used for reporting an event about protection or tuning some values related with power status. The way to allocate target_token_rotation timer is provided to guarantee the protection and control activities in the suggested network for the substation.

  • PDF

A Study on the Development of an Agent Communication Module for a Multi-Agent Based Power Distribution Network Protection System Using DNP 3.0 Protocols (DNP3.0 프로토콜을 이용한 배전계통 멀티 에이전트 보호시스템의 통신 모듈 개발에 관한 연구)

  • 최면송;이한웅;민병운;정광호;이승재;현승호
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.52 no.9
    • /
    • pp.506-512
    • /
    • 2003
  • In this paper, a communication module between Relay agents in a multi-agent system based power distribution network protection system is realized using DNP3.0(Distributed Network Protocol), which is the standard communication protocol of distribution automation system in KEPCO. The key words for agent communication in the multi-agent based protection system are defined and represented by use of DNP application function code. The communication module developed based on the proposed communication scheme is tested by use of the Communication Test Harness, a test tool for DNP protocol, then used to the multi-agent system based power distribution net work protection system.

Advance Reservation Framework with Protection Management for Virtual Circuit Services (가상회선 서비스를 위해 보호 관리 기능을 갖는 사전 예약 프레임워크)

  • Lim, Huhnkuk;Lee, Kyungmin;Cha, Youngwook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.11
    • /
    • pp.902-910
    • /
    • 2013
  • The most representative research network in Korea, KREONET, has developed DynamicKL, an advance reservation based Network Service Agent (NSA) for user driven virtual circuit services. DynamicKL provides reservation, provisioning, release, termination, and inquiry web services for network resources by using an open standard network service interface (NSI), as well as web services for network resources by using a GUI interface. In addition, it has the RICE interface to support a protection management function per VC for virtual circuits and reservations. In this article, a protection management per VC for provisioned VCs and reservations is addressed in the DynamicKL framework, as a contribution to the VC protection management issue, which results in more manageable and reliable VC services compared to other advance reservation frameworks. An administrator can detect successful or unsuccessful VC protections in the event of a primary link failure and successful or unsuccessful VC retrievals after a primary link repair, by using RICE.

Multi-level Protection Infrastructure for Virus Protection (다단계 바이러스 차단 구조 연구)

  • 노시춘;김귀남
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.187-198
    • /
    • 2004
  • Virus protection infrastructure management is network infrastructure management, traffic route management, virus protection zone expansion, and virus protection management for gateway area. This research paper provides a diagnosis of characteristics and weaknesses of the structure of existing virus protection infrastructure, and recommends an improved multi-level virus protection infrastructure as a measure for correcting these weaknesses. Unproved virus protection infrastructure fitters unnecessary mail at the gateway stage to reduce the toad on server. As a result, number of transmission accumulation decreases due to the reduction in the CPU load on the Virus wall and increase in virus treatment rate.

  • PDF

A study on an Infrastructure for Virus Protection (바이러스 차단 인프라 구조에 관한 연구)

  • Noh, Si-Choon;Kim, Su-Hee;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.1
    • /
    • pp.53-62
    • /
    • 2005
  • Virus protection infrastructure managementis network infrastructure management, traffic route management, virus protection zone expansion, and virus protection management for gateway area. This research paper provides a diagnosis of characteristics and weaknesses of the structure of existing virus protection infrastructure, and recommends an improved multi-level virus protection infrastructure as a measure for correcting these weaknesses. Improved virus protection infrastructure filters unnecessary mail at the gateway stage to reduce the load on server. As a result, numberof transmission accumulation decreases due to the reduction in the CPU load on the Virus wall and increase in virus treatment rate.

  • PDF

Automatic Protection Switching Schemesfor Network Survivability in ATM-PON Networks (ATM-PON망에서 망 생존성을 위한 자동보호절체)

  • 김영구
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.9A
    • /
    • pp.1441-1451
    • /
    • 2000
  • There are two types of protection switching : a) automatic switching and b) forced switching. The switching mechanism is generally realised by OAM functions, therefore, the required OAM information field should be reserved in the PLOAM cells. This paper proposes an unidirectional and a bidirectional protection switching method and potential advantages. The unidirectional protection switching method can be faster than the bidirectional method because the unidirectional method does not require an APS protocol for protection switching. The bidirectional protection switching method uses APS K1 byte and K2 byte, which is included in octets of a PST message through downstream or upstream PLOAM cells, for protection switching. As making comparisons between the unidirectional and the bidirectional protection. switching method, this paper proposes an effective constructing method for ATM-PON network.

  • PDF

Development of a New Islanding Detection Method for Distributed Resources (분산 전원의 고립 운전 검출 기법의 개발)

  • Jang, Seong-Il;Kim, Gwang-Ho
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.50 no.11
    • /
    • pp.506-513
    • /
    • 2001
  • The islanding detection for distributed resources (DR) becomes an important and emerging issue in power system protection since the distributed generator installations are rapidly increasing and most of the installed systems are interconnected with distribution network. In order to avoid the negative impacts from islanding operations of DR on protection, operation and management of distribution system, it is necessary to effectively detect the islanding operations of DR and rapidly disconnect it from distribution network. Generally, it is difficult to detect islanding operation by monitoring only one system parameter This paper presents a new logic based islanding detection method for distributed resources(DR) which are interconnected with distribution network. The proposed method detects the islanding operation by monitoring four system parameter: voltage variation, phase displacement, frequency variation, and the variation of total harmonic distortion(THD) of current; therefore, it effectively detects island operation of DR unit operating in parallel with the distribution network. We also verified the efficiency of the proposed algorithm using the radial distribution network of IEEE 34 bus model.

  • PDF

Flush Optimizations to Guarantee Less Transient Traffic in Ethernet Ring Protection

  • Lee, Kwang-Koog;Ryoo, Jeong-Dong
    • ETRI Journal
    • /
    • v.32 no.2
    • /
    • pp.184-194
    • /
    • 2010
  • Ethernet ring protection (ERP) technology, which is defined in ITU-T Recommendation G.8032, has been developed to provide carrier grade recovery for Ethernet ring networks. However, the filtering database (FDB) flush method adopted in the current ERP standard has the drawback of introducing a large amount of transient traffic overshoot caused by flooded Ethernet frames right after protection switching. This traffic overshooting is especially critical when a ring provides services to a large number of clients. According to our experimental results, the traditional FDB flush requires a link capacity about sixteen times greater than the steady state traffic bandwidth. This paper introduces four flush optimization schemes to resolve this issue and investigates how the proposed schemes deal with the transient traffic overshoot on a multi-ring network under failure conditions. With a network simulator, we evaluate the performance of the proposed schemes and compare them to the conventional FDB flush scheme. Among the proposed methods, the extended FDB advertisement method shows the fastest and most stable protection switching performance.

Analysis of DDoS Prevention Algorithm in Mobile Ad-hoc Network (MANET 환경에서의 DDoS 공격방지 알고리즘 분석)

  • Kim, Dong-Chul
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.11-17
    • /
    • 2013
  • In this paper, the information security requirements in the mobile ad-hoc network(MANET) are presented, and the algorithm to establish the protection node(gateway) is proposed to prevent the distributed denial of service(DDoS). The information security technology and security threats in the MANET are presented, and protection node is decided to minimize the total cost through the sending nodes and receiving nodes by way of protection node. To set up the protection node, the minimization algorithms of maximum cost and the average cost between the protection node and receiving nodes are compared with the optimal solutions, in which optimal solution is found out by all enumeration method. From the results, the total cost between the sending and receiving nodes is minimized under the average cost minimization algorithm rather than the using of the maximum cost.