In order to bring you the best possible user experience, this site uses Javascript. If you are seeing this message, it is likely that the Javascript option in your browser is disabled. For optimal viewing of this site, please ensure that Javascript is enabled for your browser.
Home Resources White Papers

Teleprotection over Packet

Network Migration for Utilities


Teleprotection signals from protective relays are among the most critical data transmitted across utility networks, as they help manage the power grid load, as well as to protect equipment within the power network from severe damages resulting from faulty HV lines. By enabling load-sharing, grid adjustments and immediate fault clearance, Teleprotection has a decisive role in ensuring uninterrupted power supply and therefore requires special attention with regards to network performance and reliability. Specifically, protection commands must be assured immediate delivery when problems are detected, so that faulty equipment can be disconnected before causing a system-wide damage.

The complexity involved in meeting such targets is compounded when moving from legacy SDH/SONET to non-deterministic, packet-based networks. This paper reviews the performance requirements that are unique to protection systems and explains how these challenges are met in a next generation packet environment.

Download Network Migration for Utilities – Teleprotection over Packet

 


Table of Contents

  • Introduction
  • Utilities Communications: Network in Transition
    • Migration challenges
  • Teleprotection Connectivity
    • Teleprotection Communications Performance
      • Latency Budget
      • Asymmetric
    • Latency Sources in Teleprotection
  • Additional Issues Relating to Teleprotection Connectivity
    • Resiliency
    • Traffic Management and Quality of Service
    • Performance Monitoring and Testing
    • Timing Synchronization over Packet
    • Choosing the Right Packet Network
  • Teleprotection over Packet Test Case
  • RAD’s Teleprotection over Packet Solutions
  • Conclusion
  • Appendix – Pseudowire Emulation

For the complete White Paper, download the PDF.