Relay protection, SCADA, Metering, and Cybersecurity for electrical infrastructure.
A contractor hands over an SCD file claiming it matches the actual device configuration. But how do you verify that quickly and provably when there are 76 IEDs on site and no permanent monitoring system? A field case from Tekvel: the verification module in the Tekvel Magic software automatically compared the device configurations against the SCD and produced an engineering deviation report covering DataSets, GOOSE, Sampled Values and MMS reports in 15 minutes.
How to use the dumpcap command-line utility for stable long-term network traffic capture — without Wireshark freezes or crashes.
8 out of 10 configurators fail to fully recognize SCD files. We analyze the confRev attribute in GOOSE and SV: what happens when the value does not match the expected one, and how this nearly derailed the commissioning of a real project with 43 IEDs.
GOOSE-messaging has been covered a lot in many technical papers and to add anything valuable to the subject is rather difficult. But we will try. And functional constrained data will help us with that.
В предыдущей публикации [1] мы рассмотрели один из важных и наиболее обсуждаемых коммуникационных протоколов, описанных стандартом МЭК 61850 — протокол GOOSE, — предназначенный для передачи, в первую очередь, дискретных сигналов между устройствами релейной...
The GOOSE protocol, described in chapter International Electrotechnical Commission (IEC) 61850-8-1...