Iec61850 90 5 Draft2
Iec61850 90 5 Draft2
Iec61850 90 5 Draft2
IEC/TC or SC Secretariat
TC 57 Germany
Distributed on Voting terminates on
2011-06-10 2011-08-12
Also of interest to the following committees Supersedes document
TC 95 57/1086/DC - 57/1141/INF
Functions concerned
RECIPIENTS OF THIS DOCUMENT ARE INVITED TO SUBMIT, W ITH THEIR COMMENTS, NOTIFICATION OF ANY RELEVANT PATENT RIGHTS OF W HICH
THEY ARE AW ARE AND TO PROVIDE SUPPORTING DOCUMENTATION.
Title
IEC 61850-90-5 TR Ed.1:
Communication networks and systems for power utility automation – Part 90-5:
Use of IEC 61850 to transmit synchrophasor information according to IEEE
C37.118
NOTE 1: The French NC stated that it will not provide a French version for this project.
NOTE 2: It has been agreed to include the following note in the foreword of the future IEC technical
report:
“This technical report has been prepared in a joint effort between IEC and IEEE as a response to
57/999/NP. A task force consisting of members from the IEC WG10 as well as the IEEE Power System
Relay Committee has prepared that report with task force meetings both at the regular meetings of
WG10 as well as at the regular meetings of the IEEE Power System relay Committee.
A first version of this document has been circulated as 57/1086/DC. Once the technical report is
approved and published, the results will be integrated as amendments into the relevant parts of IEC
61850.”
CONTENTS
1 Scope ............................................................................................................................... 9
2 Normative references ....................................................................................................... 9
3 Terms and definitions ..................................................................................................... 11
4 Abbreviated terms .......................................................................................................... 12
5 Use cases ...................................................................................................................... 15
5.1 Wide Area Applications Utilizing Synchrophasors .................................................. 15
5.2 Synchro-check ....................................................................................................... 16
5.3 Adaptive relaying ................................................................................................... 17
5.4 Out-of-step (OOS) protection ................................................................................. 20
5.5 Situational awareness ........................................................................................... 22
5.6 State Estimation and on-line security assessment ................................................. 25
5.7 Archive data (event & continuous) ......................................................................... 27
5.8 Wide Area Controls ............................................................................................... 29
5.8.1 Special Protection Schemes ...................................................................... 29
5.8.2 Predictive Dynamic Stability Maintaining System ....................................... 31
5.8.3 Under Voltage Load Shedding ................................................................... 33
5.8.4 Phenomenon assumption type WAMPAC ................................................... 34
6 Modeling considerations ................................................................................................. 35
6.1 System Hierarchy .................................................................................................. 36
6.2 PMU Model ............................................................................................................ 37
6.3 Phasor Data Concentrators (PDCs) ....................................................................... 38
6.3.1 Substation PDC Model ............................................................................... 38
6.3.2 Regional or System Level PDC .................................................................. 39
7 Communication requirements ......................................................................................... 40
7.1 Direct connection with tunnelling or R-SV service .................................................. 40
7.2 The gateway approach .......................................................................................... 42
7.3 Requirement summary ........................................................................................... 43
7.4 TCP use ................................................................................................................ 44
8 Security Model ................................................................................................................ 46
8.1 Key Management and Cryptographic Support ........................................................ 49
8.2 Key Distribution Center (KDC) ............................................................................... 50
9 Services ......................................................................................................................... 52
9.1 Command Service ................................................................................................. 52
9.1.1 Control Blocks ........................................................................................... 53
9.1.1.1 Sampled Values over IP Control Block: R-MSVCB ...................... 54
9.1.1.2 GOOSE over IP Control Block: R-GOCB ..................................... 55
9.1.1.3 Explanation of additional attributes ............................................. 55
9.2 Configuration Request Service .............................................................................. 56
9.2.1 CFG-1 Type of Configuration Data – Capabilities ....................................... 57
9.2.2 CFG-2 or CFG-3 Type of Configuration Data – Measurements ................... 57
9.2.3 Online access to CFG-1 configuration information ..................................... 57
9.2.4 Offline access to CFG-2 and CFG-3 configuration information ................... 57
9.3 Header Information Service ................................................................................... 57
9.4 Data Transmission Service .................................................................................... 57
9.4.1 General ..................................................................................................... 57
9.4.2 Coding Synchrophasors Data .................................................................... 58
9.4.2.1 GOOSE Data Coding .................................................................. 58
61850-90-5/DTR IEC:201X (E) –3–
Figures:
Tables:
INTRODUCTION
The synchrophasors and related message formats to transmit synchrophasor data over long
distances are defined in IEEE C37.118.
Even though the communication according to IEEE C37.118 has proven to be well usable and
working, there is a desire to have a communication mechanism that is compliant to the
concept of IEC 61850. This document lays out how this shall be done.
61850-90-5/DTR IEC:201X (E) –9–
1 Scope
The primary scope of this document is to provide a way of exchanging synchrophasor data
between PMUs, PDCs WAMPAC ( Wide Area Monitoring, Protection, and Control), and between
control center applications.The data, to the extent covered in IEEE C37.118-2005, is
transported in a way that is compliant to the concepts of IEC 61850.
However, given the primary scope and use cases, this document also provides routable
profiles for IEC 61850-8-1 GOOSE and IEC 61850-9-2 SV packets. These routable packets
can be utilized to transport data that general IEC 61850 data as well as synchrophasor data.
2 Normative references
The following referenced documents are indispensable for the application of this document.
For dated references, only the edition cited applies. For undated references, the latest edition
of the referenced document (including any amendments) applies.
For the purposes of this technical report, the terms and definitions given in the following
standards apply:
• IEC 61850-2
• IEC 61850-7-2
• IEEE C37.118
IED Tool short for IED configuration tool or IED configurator in the sense of 61850-6
Part(ial) System a part of a complete system, with a defined, self consistent part functionality
Project a system part with ownership of a set of IEDs, typically those located in one
substation, and handled by one system configuration tool.
Gateway Per IEC TR 61850-90-1: Gateways connect multiple substation networks by
establishing "indirect access" to functions in remote stations.
Within the context of this document, Gateways connect multiple networks by
establishing “indirect” or proxied access to functions.
System the complete system considered, with all functionality. Spans in this context several
substations.
System Tool short for system configuration tool or system configurator in the sense of 61850-6
4 Abbreviated terms
SEQ Sequence
SHA-1 Secure Hash 1.
SI Session Identifier. This identifier is used to identify the session protocol that is in use.
SIPS System Integrity Protection System
SONET Synchronous Optical NETwork
SP Synchrophasor
SPDC Substation Phasor Data Concentrator
SPDU Session Protocol Data Unit
SPS Special Protection Scheme
SS Substation System
SSDU Session Service Data Unit
SV Sampled Values
SVCB Sampled Value control block; here used to send synchrophasor data periodically
R-SV Routable Sampled Value service via UDP
R-GOOSE Routable GOOSE via UDP
SW Software
TCI Tag Control Information
TCP Transmission Control Protocol
TOS Type of Service
TPDU Transport Protocol Data Unit
TPID Priority Tagging Identification (for IEEE 802.1Q networks)
T-Profile Transport Profile
TSAP Transport Service Access Point.
TSDU Transport Service Data Unit
TSEL Transport Selector
UDP User Datagram Protocol
61850-90-5/DTR IEC:201X (E) – 14 –
NOTE Abbreviations used for the identification of the common data classes and as names of the attributes are
specified in the specific clauses of this document and are not repeated here.
61850-90-5/DTR IEC:201X (E) – 15 –
5 Use cases
In the following use cases, the arrows indicate data flow from one device to another. The
solid like arrows are the basic data flow for all illustrated applications, and the dashed arrows
are optional data frow from additional locations. The dashed boxes around groups of objects
are co-located equipment as labelled.
One of the options to transmit data over arbitrary large distances is using the Internet Protocol
(IP). The IP allows the routing of data packets (IP packets) between different networks over
any distance. This document focuses on options that utilize IP.
The use of UDP for the streaming of the synchrophasor data is a proven and functional
method. The many working applications of the IEEE C37.118 protocol confirm this. Thus, a
method utilizing UDP for streaming the SV data is again required. TCP can also be and has
been used but with the reservations outlined in 6.4.
In all use cases, the latency requirement refers to end-to-end communications delay. This is
the interval of time from when the message is sent from the measurement device to when it is
received by the application. It includes all communication delays including LAN, WAN, and
router delays as well as delay in intermediate processing units such at SPDC and PDC units.
It does not include measurement delays from the signal input to synchrophasor calculation. It
is specified for each use case as a general guideline for communication planning for the
described application. Individual application needs will vary and those particular requirements
need to be assessed at the time of implementation.
For an application which takes an action based on data it receives, lost packets effectively
increase delay in response. A single lost packet will cause a delay equivalent to the interval
between packets set by the data reporting rate. The application can tolerate lost packets up
to the allowable delay for response. It can thereby tolerate greater numbers of successive
lost packets by using higher data rates. Some applications may be able to estimate values for
lost data from previous ones, but even this will result in a delayed action. In all cases,
applications dependent on transmitted data require a time out to detect excessive packet loss
and a fall back operating mode and/or alarm when this occurs.
Applications that record data or build response curves for calculation or visualisation will
usually tolerate some data loss with little problem. They can approximate missing values with
various patching techniques. The problem is more in the pattern of loss rather than just loss.
Short loss intervals are much easier to patch with reasonable accuracy than long ones. Loss
consisting of short dropouts of a few successive samples is more tolerable than less frequent
longer dropouts. Any response will be delayed as previously described. A data loss detection
timeout and fall-back operating mode and/or alarms are also required.
Jitter, or variation in delay, will cause a variation in action time of any application that uses
the data. As long as the jitter is considerably lower than the data rate interval, it should not
have much effect on the application. If it approaches the allowable delay time which could be
larger or smaller than the interval between successive data samples, it will have an effect on
the response and can be the limiting factor. Data concentration will be delayed by jitter as the
61850-90-5/DTR IEC:201X (E) – 16 –
process must wait for all data to arrive before assembling a complete packet and forwarding
it. In all cases, jitter needs to be included in the worst case delay calculations.
5.2 Synchro-check
In this application data is sent from one or more PMU devices to a sync check relay. The
relay uses this information to assure the phase angles of the voltage on two sides of a
breaker are close enough that the breaker can be closed without harm.
V, I
PMU
Sync-
check Breaker
Phasor
values Relay
V, I
PMU
Close
signal
Actors:
Name Role description
PMU Computes synchrophasors & frequency
Relay Checks phase angle between selected inputs
Breaker Connects/disconnects power line
Operations:
Name Service or information provided
Data sampling & phasor estimate PMU estimates synchrophasor and frequency values from voltages and
currents
Data sending & receiving PMU sends values that are received by relay
Relay decision Checks phase angle between selected inputs and issues a signal to
breaker if included angle is within limits
Basic flow:
Constraints:
V, I
PMU
Phasor Relay
values Supervision
V, I
PMU
Other measurements
if needed
Operations:
Basic flow:
Constraints:
PMU
PMU
V, I
V, I …
Substation 2 Substation n
Operations:
Basic flow:
Constraints:
OOS control actions must take place within a limited time. The measurements must be
validated within a short period of time. The data rate has to be rapid enough to support the
allowed latency between samples. The following table summarizes the minimum
measurement transmission rate, allowable latency range, and maximum measurement timing
error that can be tolerated in this application.
Control Center
Selected
PDC phasor values Display, processing,
and alarm
Application
All phasor
values
SPDC
Phasor
values
PMU PMU PMU PMU
V, I V, I V, I V, I
Operations:
Basic flow:
Data receiving
Constraints:
61850-90-5/DTR IEC:201X (E) – 24 –
Control Center
Selected
PDC phasor values State estimation and
security assessment
applications
All phasor
values
SPDC
Phasor
values
PMU PMU PMU PMU
V, I
V, I V, I V, I
Operations:
Basic flow:
Data receiving
Constraints:
Control Center
Phasor data
PDC
Data archiver (DA)
Event Trigger
(ET)
Phasor
values
SPDC DA
Phasor
values
PMU PMU PMU PMU
V, I V, I V, I V, I
Operations:
Basic flow:
Data receiving
Constraints:
Latency and bandwidth are unlikely to be constraints in the archival process, since it is not a
real-time or near-real-time application. The main constraint is that the archival process be
lossless, i.e., the measurements generated at the PMUs on the system should be the same
measurements stored within the data archive.
61850-90-5/DTR IEC:201X (E) – 29 –
Control
All phasor commands
values
SPDC
Phasor
values
PMU PMU PMU PMU
V, I V, I V, I V, I
Actors:
System control equipment Power system control elements including breakers, switches, FACTS power
controllers, DC controls, and similar equipment
Operations:
Basic flow:
Data receiving
Controller actions
Constraints:
Control actions must take place within a limited time. Some may need to be executed within
milliseconds, and some only within seconds. The data rate and latency must support
requirements of the particular control action. Control action speed will be limited by how
frequently data is sent (data rate) and the time it takes to receive the data after it has been
sent (latency). A wide variety of control actions can be implemented using a synchrophasor
based wide area system. The following table is only an example for some control actions but
by no means covers all situations. It should be used as a guideline for the higher-speed
applications regarding measurement transmission rate, timetag error, latency range, and
measurement timing error.
a. Purpose
When a severe fault occurs in a loop or mesh network connecting two major power systems, an out-of-
step condition can occur between the two systems. By checking for a suitable indicator that would
denote the occurrence of a disturbance having a gradual onset of between 5 to 10 seconds an out-of-
step condition can be detected and by subsequently splitting the system at a specific point it is
possible to prevent the out-of-step occurring.
b. System description
The system is composed of PMUs which are used to gather information and are located at each major
point of the power system; the IED enables the splitting of the power system. The IED and PMU are
connected within a communication network.
Each PMU sends the voltage angle for its own part of the power system to the IED. The IED compares
the angles between the PMUs and predicts the future angle. If the predicted angles between the PMUs
in system A and the PMUs in system B exceed pre-determined values, the IED determines that an out-
of-step condition will occur and trips the CB.
Alternative method: The IED measures the angular difference between PMUs under normal
conditions. When a disturbance occurs, the change in angular difference is calculated from the
generator rotor angle (speed) or from frequency deviation.
~ V-phasor V-phasor
~
(Speed,Δf)
V
V PMU (Speed,Δf) PMU (Speed)
(Speed)
Power
LOAD LOAD
Grid TRIP
IED
~
~ V-phasor
(Speed,Δf) PMU V
V PMU V-phasor (Speed)
(Speed) (Speed,Δf)
System A System B
c. Communication Requirement
1. Transmission: PMUs to IED
- Data transmitted: Voltage angle, Voltage amplitude, other status (CB; ON/OFF),
(Generator speed, ∆f)
- Data transmission interval: 2-cycles (40ms @ 50Hz)
- Transmission delay: within 20ms
2. PMU performance
- Synchronisation: within 0.05ms
- Time of data sampling to data sending: within 40ms
References
[1] Y. Ohura, M. Suzuki, K. Yanagihashi, M. Yamaura, K. Omata, T. Nakamura, S. Mitamura &
H. Watanabe: “A Predictive Out-of-step Protection Based on Observation of the Phase
Difference between Substations”, IEEE Trans. Power Delivery, PWRD-5. No.4 Nov.1990
61850-90-5/DTR IEC:201X (E) – 33 –
a. Purpose
Major blackouts such as those that occurred in Tokyo and France in 1987 and those in the North
American eastern interconnections and southern Europe in 2003 were related to voltage instability.
Since transmission reinforcements are hard to justify as solutions to voltage instability and cascading
outages experienced under extreme conditions, under voltage load shedding would seem to be a
suitable alternative contingency.
b. System description
This scheme is composed of PMUs installed at four 500kV substations and IEDs installed at several
275 or 154/66 kV substations. The IEDs are connected to all PMUs.
One of the purposes of the IED is to detect long-term voltage collapse; this is executed at the 500kV
network level as opposed to the 275kV or lower voltage networks which are automatically regulated by
tap changing on the 500/275kV or 154kV transformers.
The IED affords high reliability by use of the following procedure. The IEDs detect slow types of
voltage collapse, in the range of eight seconds to two minutes by detecting unusual continuous ∆V/∆t
values. Fast voltage collapse can also be detected using a ∆V/∆t calculation with a one second data
window. Each IED can trip more than one line. When the IED detects a voltage collapse, it trips each
line CB following expiration of an on-delay timer which can be set independently for each line.
(Independent time settings are applied for each line)
275kV, 154kV
Radial network V-phasor
V-phasor
IED IED
Sub-station
275,154/66kV Voltage collapse detection
& Load Shedding
c. Communication Requirement
1. Transmission: PMUs to IED
- Data content transmitted: Voltage amplitude, other status (CB; ON/OFF)
- Data transmission interval: 2-cycles (40ms @ 50Hz)
- Transmission delay: within 20ms
2. PMU performance
- Synchronisation: within 100ms
- Time of data sampling to data sending: within 40ms
References
61850-90-5/DTR IEC:201X (E) – 34 –
[1] “Undervoltage load shedding protection”, IEEE Power System Relaying Committee, C13
Working Group Report (available in http://www.pes-psrc.org/c/)
[2] Imai, S.; “Undervoltage load shedding improving security as reasonable measure for extreme
contingencies”, IEEE Power Engineering Society General Meeting, 2005, IEEE
a. Purpose
When a very severe fault occurs, such as the complete loss of an important power corridor, generators
may lose synchronisation with the power network. It may also cause overload of transmission lines or
transformers. Imbalance between generation and consumption can occur when a power system
network is separated resulting in abnormal frequency conditions.
Phenomenon assumption type WAMPAC (Wide Area Monitoring, Protection and Control) executes
generator shedding or load shedding in order to avoid these types of unstable conditions on the power
system network based on a pre-fault calculation using on-line power system information.
b. System description
(1) System configuration
Phenomenon assumption type WAMPAC is composed of data collecting Terminal Equipment
(PMU_M: PMU class M), collecting and Triggering Terminal Equipment (PMU_P: PMU class P),
Controller Terminal Unit (IED) and Central Equipment (CE). PMU_M is located at the main substation
and the power station. PMU_P is located at the substation in which the detection of the faults predicted
(such as line faults) is possible. IED units are located at power stations in which the generators to be
shed are located. PDC and CE are typically located in a central control centre where on-line power
system information from PMU_M and PMU_P can be obtained.
Generators Bus
CB CT
G1 PMU_M
Bus PMU_M
LP
T-Line CB CT
G2 Power Grid
G3
LP
: VT PMU_M PMU_M
PMU_P V-phasor,
Gn I-phasor, V-phasor,
status I-phasor,
status
VT
V-phasor, I-phasor,
status PDC
IED PMU_M
LP: Line Protection relay, PDC: Phasor Data Concentrator, CE: Center Equipment
CE retrieves the operational status of the power system i.e. connections and topology etc. and V and I
from PMU_M and PMU_P via the PDC in the form of on-line power system information. A power
system model representing the current status and the distribution of the flow of power on the grid is
generated in CE for analysis from the on-line power system information and stored as system facility
data. A transient stability calculation is undertaken for the assumed fault cases using the power
system model and the transient stability is checked for each case. The level of generator shedding
required to maintain stability is then calculated. The result is summarised in a tabular format and sent
to the IED. CE repeats this process every few tens of seconds. PMU_P detects faults within the power
system from information gathered from the operation of protection relays, change of CB status and
sends the information to the IED.
Under normal conditions, PMU_P and PMU-M measure V and I and obtains the status of the circuit
breakers and line disconnectors, and this information is sent to the PDC. Periodically the IED detects
changes in the information measured by PMU_P which is stored in a tabular format in CE. It contains
information identifying which generators are to be tripped to maintain stability for the severe faults
predicted.
c. Communication Requirement
1. Transmission: PMU_P to IED
- Data transmitted: Voltage angle, Voltage amplitude, other status (CB; ON/OFF, the
operation of protection relays)
- Data transmission interval: 1-cycle (20ms @ 50Hz)
- Transmission delay: within 20ms
2. PMU_P performance
- Synchronisation: within 0.05ms
- Time of data sampling to data sending: within 20ms
4. PMU_M performance
- Synchronisation: within 0.05ms
- Time of data sampling to data sending: within 1s
6 Modeling considerations
To describe a system in IEC 61850, each client and server needs to be modelled as a logical
node on some IED. In case of substation internal synchrophasor applications probably
existing logical nodes can be used, like RSYN for the synchrocheck function and PPAM for
generator out-of-step protection. In case that the application itself is outside the IEC 61850
scope e.g. for pure monitoring and archiving purpose, the ITMI, IHMI or IARC logical nodes
can be used. In case that any controls are done with classical client server services like
Operate, the ITCI logical node can be used like for a network control center. However, there
are some wide area control and frequency stability applications, where controls must be given
in a time scale for which the classical Operate method might be too slow, so that UDP based
GOOSE needs to be used. In this case we need a logical node which is able to produce data
which can be packed into a GOOSE (command) message. The current IEC 61850-7-4
foresees for this purpose the GAPC logical node. However, to support a better semantic
description e.g. for automated engineering it might be worthwhile to introduce e.g. generic
WAC logical node (e.g. GWAC or CWAN) and a generic WAP logical node (e.g. GWAP or
PWAN). In special cases even the definition of application specific logical nodes might be
61850-90-5/DTR IEC:201X (E) – 36 –
worthwhile. This needs a more detailed analysis of function implementation and needs to be
decided later on a per application base.
WAMPAC function
IEC61970
Topological Node Power System
Generator, Line Angle/Freq. Monitoring
…… Voltage Stability Monitoring
Measurement Thermal Overload Monitoring
Control State Estimation
GWAP PTRC Real-Time Control
Power System Separation
IEC61850-90-5 Adaptive Protection
IEC61850
The following clauses provide modelling guidance for synchrophasor based devices including:
PMUs and PDCs.
These calculations are based on sampled values produced by the analog input module within the IED
containing the PMU function or based on streaming sampled values produced by one or more merging
units in the substation that the IED containing the PMU function is subscribing to.
61850-90-5/DTR IEC:201X (E) – 38 –
If the PMU is publishing phase currents and voltages, one or more instances of MMXU will be used.
If the PMU is publishing sequence currents and voltages, one or more instances of MSQI will be used.
There are several recognized deployment options for PDCs: Substation and Regional. The
following clauses give guidance of the modelling of these entities.
It is recommended to model the PDC function as a PDC logical device with the Proxy data object in
logical node LPHD Proxy set to True.
The PDC model is based on the nesting of logical devices defined in Edition 2 of IEC 61850.
A data set containing a representative set of data as required by the upper levels of the system
hierarchy is created and published over a wide area interface using UDP multicast.
It is recommended to model the PDC function as a PDC logical device with the Proxy data object in
logical node LPHD Proxy set to True.
The Regional PDC model is based on the nesting of logical devices defined in Edition 2 of IEC 61850.
61850-90-5/DTR IEC:201X (E) – 40 –
7 Communication requirements
The communication mechanisms laid out in this document shall serve the needs for Wide Area
Monitoring, Protection, and Control (WAMPAC) applications utilizing synchrophasors
measured according to IEEE C37.118.1.
The fast cyclic communication within the substation in IEC 61850 will typically be based on
the sampled value (SV) service, while additional event data can be communicated with
GOOSE or by reporting, dependent on its time criticality. Communication to receivers outside
a substation can be done either by tunnelling the SV service across some high speed
communication network like SDH or SONET, or via IP networks, if their communication delays
and delay jitter are acceptable by the application. For the second purpose the current IEC
61850 has to be enhanced by a mapping of samples and GOOSE messages onto an IP based
protocol. Due to the basically periodic nature of these services, UDP with multicast
addressing is the transport protocol chosen for this purpose. In the following it is assumed
that this new mapping of the SV service will be based on routable UDP, and therefore shortly
be called R-SV.
The usage of tunnelling Ethernet level messages across some other high speed medium is
already described in IEC61850-90-1. From an engineering point of view this is similar to
engineering within a substation, with additional use of SED files to exchange the phasor
related interface definitions between the different substation projects and the center
project(s).
The source of periodic data like synchrophasors to be sent across a wide area communication
system can reside in an IED near the switch yard, or in a gateway from the substation to the
WAN, like a PDC. In case that R-SV data sources reside within the substation instead only at
its WAN boundary (like a PDC), these sources shall be the only ones visible for engineering of
the wide area communication connections. This can be handled from engineering point of
view like tunnelling of SV services across the WAN, i.e. by exchange of interface definition
files (SED) between the source LAN project containing these R-SV sources and the
destination LAN project at the other side of the WAN. It is up to this destination project to
decide how far routers at the WAN border shall be contained in the system interface exchange
description (SED file). This mechanism is called ‘direct connection’ (with or without
tunnelling).
Another approach often used for synchrophasors is to assemble different phasor sources into
one telegram with synchronised phasor data, possibly even with resampling of the data. This
is done by a phasor data concentrator (PDC), which acts like a gateway from different sources
of phasor data streams to several sinks, most probably all needing the same now
synchronized phasor information (see also 5.5). Such a phasor concentrator acts from an IEC
61850 perspective like a gateway with data selection and possibly filtering function, however
with the additional functionality to forward all received phasor data synchronised and
resampled into one telegram to several intended destinations .
Center AA10KA1
SW1/1 SW2/2
Figure 7-1 shows two substations AA1 and AA2, each having a protection device or PMU providing
synchrophasor data, namely IED AA1F1 in AA1, and AA2F1 in AA2. To engineer the data flow
to the center IED AA10KA1 in the center project, the SED1 file is exchanged between the AA1
project and the center project, and the SED2 interface file is exchanged between the AA2
project and the center project. The result is the center project containing the center IED
AA10KA1 as well as the PMUs AA1F1 and AA2F1 (grey area in Figure 7-1).
• If tunnelling is used, the two interfacing devices SW1/1 and SW1/2 (resp. SW2/1 and
SW2/2) look like providing different ports of the same switch, hiding the tunnel
connection (thick blue connecting line between them). In case of R-SV these may be
routers instead, which could be modelled in the SCD and SED files, if needed.
• The semantics of incoming signals can be kept in data objects of CDC ORG,
containing the object reference of the incoming signal source.
• If the SubNetwork identifications within all projects are identical, then the SED files
can be directly imported, else the SubNetwork name in the imported SED file has to be
adapted before import.
• As the names of the IEDs in the center project must be unique, these should be
harmonized across all projects. By using project specific substation designations (e.g.
AA1, AA2 in the example) this is automatically fulfilled.
• The semantic related to the power system can be exchanged by keeping the relevant
Substation parts in the SED files. Again this needs either harmonized power network
naming, or an appropriate renaming of the Substation section elements before import.
More details about usage of SED files and exchange of engineering rights for this purpose is
described in IEC 61850-6:2009.
61850-90-5/DTR IEC:201X (E) – 42 –
The PDC approach is illustrated in Figure 7-2. The PDC AA10TH1 concentrates phasor data
streams coming from AA1F1 and AA10F1. The names shall indicate that AA10F1 is a PMU in
the same project as AA10TH1 (and possibly even AA10KA1), while the interface to AA1F1 is
imported by means of a SED file e.g. as described in 7.1. The solid line ellipse indicates the
IEDs which belong to the PDC project, while the dotted ellipse contains the IEDs relevant for
the center project. The PDC AA10TH1 is the common connection between them.
AA10KA1
Center project
AA10TH1 PDC
LD AA1F1 LD AA10F1
• The PDC is a client to several synchrophasor data streams. The synchrophasor data,
provided in the streams, can be provided by different protocols (e.g. IEEE C37.118,
IEEE 1815, IEC 61850, and others).This asynchronously delivered data needs to be
synchronized and forwarded. If the data is coming directly from substations, this is
handled as described in 7.1 for the direct communication. If it is coming from PMUs or
other PDCs, this is handled like a normal 61850 project, i.e. ICD and IID files of PMUs
and PDCs are needed. In some cases, the PDC may need to provide protocol
translation. Within the scope of this document, such translation is considered to be to
IEC 61850, and thus the PDC acts like a gateway being an IEC 61850 device
described with an IID file.
• The PDC acts as server to higher level clients / subscribers. In this view the PDC is a
‘normal’ IEC 61850 IED in the center project, and is handled together with the client
and probably other PDCs and PMUs like a normal IEC 61850 IED. Especially it needs
a formal description in form of an IID file.
61850-90-5/DTR IEC:201X (E) – 43 –
The special point for gateways in general and the PDC in this case is how to come from the
step 1 input to the IID file of the PDC needed in step 2 as input for higher level system
engineering. As this is from the IEC 61850 perspective IED engineering, it is private to the
implementation / tool of the gateway (PDC). However, as the data semantics inclusive the
connection to the power system shall be preserved during the engineering, there are
recommendations for the gateway engineering, especially those gateways whose primary
functionality is not concerned with data concentration rather with filtering and message
bundling.
• Map all LDs of lower level (source) IEDs, whose data shall be forwarded, as Proxy
LDs. Optional data objects not needed may be removed.
• Name the proxy LDs according to the source IED, e.g. proxy LD name := Source IED
name + Source LD name (note LD name length restrictions!). Don’t forget to state the
IED name in the Proxy-LPHD.PhyNam data object.
• Take over all Substation sections from the source SED / SCD files to which data
source LNs are mapped, and replace the link to the source IED logical node by a link
to the PDC proxy LD logical node.
The following table summarizes the requirements outlined in chapter 5. Columns have been
added for sensitivity to transmission jitter, lost data packets, and if the required service is
currently covered in 61850 services. The first 3 columns are derived directly from the
individual use cases. The jitter and lost packet columns indicate qualitative sensitivity based
on the expected operation of the application. The actual requirements will depend on the
details of the application and will need to be assessed in each individual case. In this table,
jitter is understood to be less than the time interval between successive samples.
service
As can be seen, the SV service covers in principle all applications. However, due to its direct
mapping to Ethernet it is not usable across wide area communication systems. Here is where
the R-SV mapping can be used. R-SV does not cover the most stringent requirements for
sampled values as needed for classical protection, however it can be used for application
requirements listed above in most cases. Figure 7-3 gives a rough overview on this. The
‘Sampled value’ range needs the SV service directly mapped to Ethernet, the ‘Rms’ range is
covered with event based or periodic reporting. The UDP based R-SV service roughly covers
the ‘Phasor’ range.
associations between client and servers, however allow security by authentication as well as
by encryption with existing means as needed.
61850-90-5/DTR IEC:201X (E) – 46 –
8 Security Model
The security model, for IEC TR 61850-90-5, provides security functions based upon the
security threats and security functions found in IEC 62351-1:2007 and IEC 62351-2:2008.
Several aspects of security are addressed within this document with the following basic
assumptions:
• Confidentiality is optional.
IEC 62351-6 specifies the use of digital signatures using asymmetric cryptography. However,
some members of IEC TC57 WG15 have expressed concerns about the impact of this specific
technology in terms of cost and CPU performance given the current class of hardware found
in PMUs, Relays, and Merging Units today. These concerns increase as the messaging rates
for Sample Values increases. Therefore, the security model needs to take performance
issues into account for use of the profiles/technologies specified within this document. This
document provides specifications for both asymmetric and symmetric key signature creation
as well as symmetric key encryption. The encryption is used to provide optional
confidentiality.
There are two explicit uses for the mapping of the SampledValues Application Protocol Data
Unit (APDU) within this document. The APDU will be used to carry at least two types of
information: CT/PT information per IEC 61850-7-2 and Synchronized Measured Values per
IEEE C37.118.1. The messaging rates of these two types of data are different:
• CT/PT Information messaging rates can range from 50-240 messages/cycle and can
consume approximately 7.2-34.6 Mbits/second, or more, of Local Area Network traffic.
Based upon the security requirements defined above, this technical report defines a means of
message Authentication and Tamper detection regardless of the route of the message. The
base security construct used to provide these types of security functions also provides the
integrity of the selected security mechanisms on an end-to-end basis. Within the context of
this technical report, several different types of endpoints have been identified:
Figure 8-1 shows the various cryptographic endpoints, protocols used, and the
specifications used to provide the cryptographic integrity between the
endpoints.
IEC TR 61850-90-5
IEC 62351-6:2007
The use of end-to-end cryptographic integrity, within IEC TR 61850-90-5, allows packets to be sent
across multiple Physical Security Perimeters (PSPs) and multiple Electronic Security Perimeters
61850-90-5/DTR IEC:201X (E) – 48 –
(ESPs). The actual definition of an actual PSP or ESP is established by the governance of the
defining utility. However, in general, the following examples of PSPs and ESPs can be shown:
Substation: This would typically not be classified as an ESP or a PSP due to the fact that many utilities
do not provide adequate access control/audit facilities that are typically required for a PSP (e.g. a
Substation fence does not inherently create a PSP). Note that substation devices located outside the
substation control house may need to be considered their own PSP and ESP.
Substation Control House: This would typically be considered a PSP and ESP.
Substation Devices not within the control house: These would typically need to be considered their
own PSP and ESP.
Control Center: These would typically need to be considered their own PSP and ESP.
From a security perspective, messages exchanged across PSP/ESP boundaries require end-to-end
cryptographic integrity. However, the need for confidentiality is typically determined by the path of the
packet transmission/delivery and the sensitivity of the information being conveyed. If the information is
accessible at endpoints that have varying levels of trust, the need for confidentiality would be
determined based upon the sensitivity of the information.
This standard specifies the use of encryption technology that can be applied within the
communicating end systems (e.g. PMUs, relays, PDCs, etc) and/or between communication
intermediate systems (e.g. routers). Although this technical report specifies an optional
mechanism to provide encryption within the end systems, this document also implements the
concept of “edge” security functions that allow intermediate systems to provide communication
path selection, but also encryption capability.
One additional security protection an Edge Security Node might provide is confidentiality.
Although it is up to the manager of the Edge Security Node, there are two recognized
mechanisms for an Edge Security Node to provide confidentiality:
The security model does not specify the actual mechanism for encryption, rather a
authentication mechanism that would allow the Edge Security Node to identify the
need for encryption. Thus, as new technologies become available they can be
deployed.
• The Edge Security Node can provide transmission path selection/assurance similar to
the red-zone/green-zone paradigms used in the past (e.g. selection of a trusted
61850-90-5/DTR IEC:201X (E) – 49 –
communication path).
This document provides for APDU authentication and integrity through the use of a digital
signature. Although it is desirable to provide end-to-end authentication and integrity
protection, such protection can not be assured if the contents of multiple APDUs are
repackaged into another APDU. Such repackaging may occur within Phasor Data
Concentrators, Phasor Gateway, or data concentrators in general. The repackaging of IEC
62351-6:2007 based packets should include the integrity parameters in those packets.
From a security model perspective, it becomes incumbent upon the intermediate systems (e.g.
PDC, etc.) to provide an audit trail and chain of trust capability should repackaging occur.
Key management and cryptographic support needs to be designed to provide the following
functionality:
The use of multicast, coupled with the need to support symmetric keys, requires the use of
what is known as a Key Distribution Center (KDC). It is the KDC that provides the symmetric
key coordination between the publisher and subscribers. Normal implementation practice
would have the KDC deployed as a separate standalone node that manages the coordination
for multiple publishers and subscribers. However, such a standalone entity raises concerns
regarding redundancy. Additionally, the use of separate KDCs can cause issues in providing
the un-interrupted delivery of information.
Therefore, the KDC function, for IEC TR 61850-90-5 shall allow the publishing IED, or
equivalent, to be its own KDC or to use an external KDC function. There is a benefit in having
the IED providing its own KDC function in that device can determine when to apply the next
key. Given this intelligence a mechanism for informing the subscribers of an impending key
change can allow the subscribers enough time to acquire the new key thereby being prepared
for the key change and thus allowing continuous information exchange. In order to accomplish
this, the IEC TR 61850-90-5 protocol needs to:
This mechanism is provided through the TimeofNextKey session attribute (see page
72).
• Provide a mechanism to inform the subscribers that a key change has occurred.
This mechanism is provided through the TimeofCurrentKey session attribute (see page
72).
and signature algorithms need to be provided. This mechanism is provided through the
SecurityAlgorithms session attribute (see page 73).
The publisher shall be configured to periodically change the symmetric keys used for the
signature and optional encryption. It is recommended that symmetric keys be changed at least
every forty-eight (48) hours. Additionally, the configuration shall allow the definition of the
maximum and minimum TimeofNext key values. The maximum value shall be used for
periodic updates of the keys. The minimum value shall be used for updates of the keys in
situations where the current key has been compromised. Should no configuration be
provided, the default values shall be:
Idle Idle
T1
Set
TimeToNextKey
Request next key
from GKRM
Wait 1 minute
Decrement
No
TimeToNextKey
Wait for
TimeToNextKey=0 TimeOfCurrentKey
to change
Yes
Publisher Subscriber
Figure 8-2 shows the interaction between the publisher and subscribers regarding key usage. When
the publisher starts the update process (T1) a new key is assigned within the KDC function. The
publisher sets the TimeToNextKey attribute value. Once a minute, the publisher checks to determine
if the TimeToNextKey has reached a value of zero (0). If not, the value is decremented. If the value is
zero, the new key starts being used as the current key and the TimeOfCurrentKey is updated with the
current timestamp.
When a subscriber detects a positive TimeToNextKey value, the subscriber interacts with the KDC to
obtain the next key. The subscriber then waits until the TimeOfCurrentKey value changes. The PDU
that has the changed value shall be the first PDU to use formerly next key as the current key.
There are several aspects to the functionality required by an IEC 61850-90-5 KDC server
function. These are:
61850-90-5/DTR IEC:201X (E) – 51 –
• The KDC must be capable of authenticating KDC clients on a per information stream
basis.
There are several types of information streams within the IEC 61850 domain. These
are:
Each information stream type needs to be further constrained in order to allow a more
granular authentication/key exchange. As an example, there may be two(2) publishers
(e.g. IED1 and IED2) to two(2) different destination multicast addresses (e.g. DMAC1
and DMAC2) A subscriber may be need to be restricted to a group that is only allowed
to be a group key member for DMAC1 and not DMAC2. Therefore, the KDC must allow
key group management based upon either the destination Ethernet or IP address.
• The KDC shall support clients requesting keys as opposed to publishing keys to an
established group. The ability to publish the keys to a key group is out-of-scope of
this specification.
• The KDC shall allow Asymmetric cryptography to be used for identity establishment
and authentication of a client requesting a key.
• The KDC deployment architecture shall support KDC functions that are internal or
external functions to an IED/Server that is publishing IEC 61850-90-5.
61850-90-5/DTR IEC:201X (E) – 52 –
9 Services
IEEE C37.118 does not explicitly talk of "services". Instead, it specifies the synchrophasor
message format in chapter 6. It describes four message types (frames types):
The functions performed by exchanging the different frame types from IEEE C37.118 have to
be mapped to services of IEC 61850.
The different functions as specified by the command word in IEEE C37.118 can be performed
by equivalent IEC 61850 actions or services as specified in Table 9-1:
In order to provide backward compatibility, the currently defined IEC 61850-8-1 GOOSE and
SV control blocks will remain unchanged. Therefore, there are two new functional constraints
that will be added to LN0:
• RS – Indicates a functional constraint for routable SV packets based upon the profile
defined in this document. The control blocks with this constraint will be defined as
ROUTABLE-MULTICAST-SAMPLED-VALUE-CONTROL-BLOCK (R-MSVCB).
• RG – Indicates a functional constraint for routable GOOSE packets based upon the
profile defined in this document. The control blocks with this constraint will be defined
as ROUTABLE-GOOSE-CONTROL-BLOCK (R-GOCB).
The introduction of new control blocks has impact on several different parts of the IEC 61850
standard. The impacted parts are:
• IEC 61850-6 will need to be updated to allow the appropriate specification of both
the R-GOCB and R-MSVCB.
The following clauses specify the R-GOCB, R-MSVCB, and the Substation Configuration
Language changes that are required.
61850-90-5/DTR IEC:201X (E) – 54 –
The synchrophasor stream will be transmitted via the use of Sampled Values, but over a
transport profile that utilizes IPv4 or IPv6. In order to accomplish this, and to support the
existing Ethernet multicast, the R-MSVCB structure will be similar to the MSVCB, but with the
enhancements of a SecurityEnable attribute, and the use UDPCOMADDR.
In order to send events over IP, the R-GOCB requires the ability to support IPv4 and IPv6
multicast. The R-GOCB will be similar to the GoCB structure but will be enhanced by the
SecurityEnable attribute, and the UDPCOMADDR.
. Table 9-3 shows the additional attributes that need to be added to the GOCB.
GoID Visible-string r m
DatSet Visible-string r m
ConfRev Unsigned r m
NdsCom Boolean r m
DstAddress UDPCOMADDR* r m
MinTime Unsigned r o
MaxTime Unsigned r o
FixedOffs Boolean r o
9.1.1.3.1 UDPCOMADDR
The current definition of PHYCOMADDR, from IEC 61850-8-1, is shown in Table 9-4.
In order to configure the additional information in SCL, the following additions to SCL need to
be made. The following “P” types need to be added:
• IPv6FlowLabel
There are three(3) kinds of configuration information in IEEE C37.118, named CFG-1, CFG-2,
and CFG-3.
61850-90-5/DTR IEC:201X (E) – 57 –
Getting this configuration information is equivalent to obtaining the data model structure of the
server.
The defined semantics of the data in IEC 61850 provide a high degree of readability for
human users that are familiar with the concept.
Additional description attributes ("d" and dU") that can be used to provide further information
on the data attributes. This depends on the implementation of the data model. These
attributes reside under the functional constraint "DC" (description).
The access methods to the description data are the same as for the other configuration data.
No special methods need to be defined to resemble the functions of the header frames.
9.4.1 General
IEEE C37.118 specifies RS-232 serial or a UDP or TCP protocol for the transmission of the
data frames, which hold the actual synchrophasor data. RS232 is becoming less used in
favour of networks, so only network communication will be addressed here. UDP and TCP
protocols are in any case IP based and therefore routable. This property of being routable
over wide area IP networks is necessary and suited for a protocol to be used with for wide
area applications, where PMUs are applied.
61850-90-5/DTR IEC:201X (E) – 58 –
For data with periodic transmission, IEC 61850 provides the sampled value service.
As described in IEC 61850-9-2, this is a layer two protocol, mainly intended for applications
within a substation. As a layer 2 protocol, it is not routable and therefore not suited for wide
area applications.
The remarks in IEC 61850-90-1 on Synchrophasors (clause 5.1.1) are an approach for
exchanging the sampled values between substations, but this is not really a useful option
solution for synchrophasor applications.
As far as the TCP option is concerned, IEC 61850 reporting would be an option. It would be
imaginable to use integrity reports (with some additional definitions on how data are retrieved
and synchronized with the integrity period) for the periodic transmission of the data. But as
the applications show, the TCP option in IEEE C37.118 is rarely applied in real applications.
For obvious reasons, the bulk of the applications transfer the data frames using UDP, and this
document focuses on providing an IEC 61850 mechanism exactly for this case.
• Time stamp
directly from GPS. Satellite navigation systems are currently the only widely available source
capable of delivering time at the accuracy required for synchrophasor measurements.
9.8 Redundancy
Based upon the use cases in clause 5, there is a need to specify mechanisms for redundancy. The
needed availability of synchrophasor information for Wide Area Situational Awareness and Control
requires that at least communication redundancy be provided. The implementation of LAN based
redundancy shall be a selected mechanism/architecture from IEC TR 61850-90-4.
From a wide area communication perspective (e.g. substation-to-substation, substation-to-control
center, control center-to-control center, etc), there are several communication system architectures
that need to be considered. These architectures are discussed in the following clauses.
Communication redundancy
The architecture uses a single communication node (e.g. router, etc.) to connect to two (2)
independent communication media infrastructures (e.g. T1 and Microwave or Sonet Ring with counter
rotating tokens).
This redundancy mechanism is a system design issue and is out-of-scope for this document.
Multi-path delivery
The architecture uses a single communication node (e.g. router), with a single communication port, to
send packets into a mesh network.
The mesh network then provides parallel multi-path delivery of the packets.
For the purposes of communication failure detection, it is the responsibility of the receivers of the
communication profile packets, as defined in this document, to enunciate problems when the expected
packets are not delivered in a timely manner or based upon protocol expectations (e.g. GOOSE
APDUs). Receivers shall mark the quality of the dataset members that have not been delivered within
the appropriate time with a quality.validity of “invalid” or “questionable” and a quality.detailedQual of
“oldData”.
In the case of the profiles specified in this document, the use of multi-path delivery makes use of IP
based facilities to determine the appropriate paths. Such path determination shall be performed per
RFC 2991.
In order to provide duplicate packet delivery detection, at the receiving application the combination of
source IP address and SPDU number shall be unique. Security authentication must be performed
prior to duplicate packet discard.
61850-90-5/DTR IEC:201X (E) – 60 –
Since this standard refers to the measurement techniques and filtering requirements of IEEE
C37.118.1, it is the semantics of the performance classes of protection and measurement that
shall be expressed.
"P class is intended for applications requiring fast response; it mandates no explicit filtering. M
class is intended for applications which could be adversely affected by aliased signals but do not
require the fastest reporting speed. “
This standard does not allow the correlation of signal filtering versus reporting rate.
Therefore, this standard defines:
• P-Class mandates no explicit signal filtering and provides the shortest signal response
times
• M-Class requires anti-alias filtering which could result in longer signal response times.
In order to allow the construct of P-Class and M-Class to be specified within the
context of IEC 61850, the IEC 61850-7-4 ClcMth shall be used. The set of allowed
values shall be expanded as shown in Table 10-1 .
61850-90-5/DTR IEC:201X (E) – 61 –
The calculation method specifies how the Data Attributes that represent analogue values have
been calculated. The calculation method shall be the same for all Data Objects of a given logical
node instance.
The possible values shall be:
Value Description
PRES_OR_U Indicates that all analogue values (i.e. all common attributes I and f) are
NKNOWN present or, more precisely, actual values.
TRUE_RMS Indicates that all analogue values (i.e. all common attributes I and f) are
true r.m.s. values.
PEAK_FUND Indicates that all analogue values (i.e. all common attributes I and f) are
AMENTAL peak fundamental values.
RMS_FUNDA Indicates that all analogue values (i.e. all common attributes I and f) are
MENTAL r.m.s. fundamental values.
MIN Indicates that all analogue values (i.e. all common attributes i and f) are
minimum values.
MAX Indicates that all analogue values (i.e. all common attributes i and f) are
maximum values.
AVG Indicates that all analogue values (i.e. all common attributes i and f) are
ClcMth average values.
SDV Indicates that all analogue values (i.e. all common attributes i and f) are
standard deviation values.
PREDICTION Indicates that all analogue values (i.e. all common attributes i and f) are
long term changes over time.
RATE Indicates that all analogue values (i.e. all common attributes i and f) are
actual changes over time calculated with the actual value and value
before.
P-CLASS Indicates that all analogue values (i.e. all common attributes i and f)
meet the sampling and filtering characteristics specified in IEEE
C37.118.1 for P-class.
M-CLASS Indicates that all analogue values (i.e. all common attributes i and f)
meet the sampling and filtering characteristics specified in IEEE
C37.118.1 for M-class.
This DATA OBJECT shall be mandatory for all logical nodes that are intended to represent
statistical data, indicated by the common data classes, for example, CDC MV, CMV, WYE, etc.
NOTE 1 If different calculation periods are required for the Data Objects of a logical node, then
different logical nodes could be instantiated – with different calculation periods.
NOTE 2 The calculation algorithm and number of samples used for the calculation is an
implementation issue.
The control and configuration services use the conventional IEC 61850 methods with MMS
over TCP/IP. No extensions are required for this.
For the data transmission, new UDP mappings are required. However, it is also desirable to
be able to utilize/integrate the currently existing GOOSE and SV protocols without change.
Therefore, an ability to “tunnel” the currently existing Ethernet bound GOOSE and SV packets
over UDP/IP has been identified.
The figure depicts a general overview of the mapping of Synchrophasor Services. The
services identified in clause 9.1 will utilize the client/server A-profile as specified in IEC
61850-8-1 Ed.2 (Clause 6.2.2).
61850-90-5/DTR IEC:201X (E) – 62 –
11.1 A-Profiles
In general, the A-Profiles will consist of the current GOOSE and SV Application Protocol Data
Units (APDUs) encapsulated or tunnelled using session protocol that is defined in this
document.
In order to reuse port 102 for UDP, RFC 1240 needs to be implemented, this means that ISO
Connectionless Transport must be used as well (ITU X.234).
61850-90-5/DTR IEC:201X (E) – 63 –
OSI Layers
IEC 61850-90-5
Application extensions for IEC 61850-9-2
KDC function IEC 61850-8-1
Sampled
GOOSE
Presentation Values
RFC-3376
RFC-3547 (Internet Group IEC 61850 Protocol for sending
Management GOOSE and SV over
(Group
Protocol, OSI Connectionless Transport
Domain Version 3) ITU X.234
Session of
(OSI Connectionless Transport)
Interpretation)
RFC-1240
• IEC 61850-8-1 GOOSE and IEC 61850-9-2 as the application and presentation layers.
The session protocol consists of:
• RFC-3547 provides the KDC function. The RFC allows extensions to occur in a
standardized manner. This capabilility is used to provide IEC 61850-90-5 extensions.
• RFC-3376 provides the ability to have the routed networks configure IP multicast
routing paths based upon detecting client subscriptions.
The A-Profiles will be bound to one of the Transport Profiles (T-Profiles) specified in clause
11.2.
61850-90-5/DTR IEC:201X (E) – 64 –
This A-Profile allows for the transport of the GOOSE and SV APDUs, as defined in IEC
61850-8-1 and IEC 61850-9-2, to be sent in a secure and routable manner. It is intended that
these APDUs be utilized with a minimum of changes.
The following clauses detail the changes required to the GOOSE and SV APDUs in order to
achieve the functionality required by IEC 61850-90-5.
• Control block changes are required in order to accommodate the new profile(s).
These have been documented in clause 9.1.1.1.
Currently the Sampled Value message header contains the following information:
61850-90-5/DTR IEC:201X (E) – 65 –
11.1.1.1.1.1 t - Timestamp
There is need, for wide area network communications, to convey an absolute timestamp that
represents the contents of the stream. Currently, the only available timestamp is the attribute
RefrTm. However, in IEC 61850-9-2, EntryTime is defined as a “48-bit TimeStamp as
defined in IEC 61850-8-1”.
“EntryTime shall be mapped to the MMS DataType of BINARY-TIME. The size of the
BINARY-TIME value shall be six (6) octets.
The MMS TimeOfDay epoch began at 0 hours on 1 January 1984 (MJD 40 587).
Times measured are designated in this standard as MMS TimeOfDay milli-
seconds GMT and TimeOfDay days GMT, and represent offets from the epoch. It
should be noted that exceptions to this mapping do occur.”
This means that the “absolute timestamp”, of a resolution required for synchrophasors can be
calculated by:
RefrTm + SmpCnt/(SmpRate)
Therefore, for synchrophasor information, RefrTm, SmpCnt, and SmpRate shall be sent in a
SV message.
For DataSet elements that are not sampled at that time, the DataSet element will need to
include its own timestamp. Additionally, the QUALITY for each DataSet element may need to
be included. As such, it is recommended that Functionally Constrained Data (FCD) and not
Functionally Constrained Data Attributes (FCDA) be utilized as DataSet members.
The timestamp calculation, based upon RefrTm, is valid for PMUs and CTs/VTs where the
actual sampling is actually occuring. However, at the Phasor Data Gateway level, the concept
of SmpRate and SampleCount are not appropriate. Therefore, timestamp field (e.g. “t”) has
been added to the SV APDU to allow the same PDU structure to be used at any level in the
hierarchy.
added to IEC 61850-7-2. This means that the protocol productions (see clause 11.1.1.2.4.2.4)
will need to be added to IEC 61850-9-2.
It is recommended that the DataSet elements include their own timestamp. Additionally, the
QUALITY for each DataSet element may need to be included. As such, it is recommended
that Functionally Constrained Data (FCD) and not Functionally Constrained Data Attributes
(FCDA) be utilized as DataSet members.
Bits
Octet 8 7 6 5 4 3 2 1
SI LI PI LI PV PI LI PV
Editor’s Note: ITU X.235 reserves a Session Identifier (SI) value of 64 (decimal) to indicate
OSI Connectionless Session. Therefore, this value may not be used.
Figure 11-3 shows the general construction of the session protocol, and the bit/byte ordering
for the protocol for transmission. In general, there will be a Session Identifier (SI) which has a
single byte length. This length covers the length of all of the parameter fields for the session
header, but not the user data of the session protocol.
61850-90-5/DTR IEC:201X (E) – 68 –
• TimeofCurrentKey: The time at which the current signature and encryption key was
first used.
• TimeofNextKey: A relative time that indicates the time before another key is put into
use for the signature and encryption.
• SecurityAlgorithms: Used to indicate which cipher suites and algorithms are used to
generate the Signature and used to encrypt the user payload.
The Session Header is then followed by Session User Information. The user information
contains:
• User Payload: This represents a sequence of GOOSE, SV, or Tunnelled packets. The
actual contents are constrained based upon the actual Session Identifier.
• Signature: The contents of this field are calculated based upon the choice of security
algorithms specified in the value of the SecurityAlgorithm field. The signature is
calculated based upon the SPDU length including the Session Identifier, but not
including the Signature itself. Specifics of this will be provided in another clause.
The following ASN.1 production is used to show the structure and future expansion capability
of the session protocol, specifically the session identifier and header:
SessionHeader::= SEQUENCE {
commonHeader [0] IMPLICIT OCTETSTRING,
…,
}
For this part, there shall be three (3) Session Identifier values defined:
• For Tunnelled GOOSE and Sampled Value Packets: The SI shall have a hexadecimal
value of A0.
This SI allows for the Payload to contain both SV and GOOSE packets. However, the
Payload shall be constrained to only having a PDU type of Tunnelled.
• For SPDUs that contain non-tunnelled GOOSE APDUs: The SI shall have a
hexadecimal value of A1. This SI shall constrain the Payload to contain PDU types of
GOOSE APDU.
61850-90-5/DTR IEC:201X (E) – 70 –
• For SPDUs that contain non-tunnelled Sampled Value APDU: The SI shall have a
hexadecimal value of A2. This SI shall constrain the Payload to contain PDU types of
SV APDU.
• For SPDUs that contain non-tunnelled management APDU: The SI shall have a
hexadecimal value of A3. This SI shall constrain the Payload to contain PDU types of
MNGT APDU.
The associated LI field, for the SI, shall be the length of the entire session header.
The standardized common session header contents shall be indicated by a PI whose value is
zero (80 hexadecimal). The PV of the session header shall contain a sequence of the
following values:
• SPDU Length
• SPDU Number
• Version
• TimeofCurrentKey
• TimetoNextKey
• SignatureAlgorithm
The maximum size of the SPDU length is based upon the maximum packet size for UDP.
Version 1 of this protocol does not support the IPv6 capability of Jumbograms and therefore
the maximum UDP packet size shall be: 65,535 octets. However, in future versions of this
protocol, Jumbograms may be supported. Therefore, the SPDU Length value shall be a 32-bit
unsigned integer value. Therefore, the SPDU Length parameter shall be four (4) octets.
Its maximum allowed value, for this version, shall be: 65,519 octets.
Protocol data units received that have a value greater than the maximum value shall be
discarded.
61850-90-5/DTR IEC:201X (E) – 72 –
1 00 00 00 01
255 00 00 00 FF
32,765 00 00 7F FD
65,517 00 00 FF ED
The SPDU Number is a value that can be used by the subscriber to detect duplicate or out-of-
order packet delivery. The SPDU number attribute shall be four (4) octets and represent an
Unsigned Integer Value whose range of values is 0 to 4,294,967,295.
The SPDU Number shall be maintained, by the sender, on a per destination basis. The initial
SPDU Number sent shall be a value of zero. Subsequent SPDU Number values shall be
incremented. When the maximum value is reached, the value shall start at a value of zero
(0).
11.1.1.2.2.3 Version
The Version attribute shall contain the session protocol version number as specified by this
document. The attribute value shall be two (2) octets and represent an Unsigned Integer
Value.
The security fields, in the Session Header are described in the following clauses.
11.1.1.2.3.1 TimeofCurrentKey
The TimeofCurrentKey attribute shall be four (4) octets that represent an Unsigned Integer
value. The value of the attribute shall represent the SecondSinceEpoch. SecondSinceEpoch shall
be the interval in seconds continuously counted from the epoch 1970-01-01 00:00:00 UTC.
Editor’s Note: Some operating systems have a 32-bit Signed value that represents SecondsSinceEpoch (e.g. Unix). For
implementations in such operating systems, it shall be the implementation’s responsibility to provide the appropriate time offsets
to allow the full range of the Unsigned Integer value to be used.
11.1.1.2.3.2 TimetoNextKey
The TimetoNextKey attribute shall be two (2) octets that represent a Signed Integer value.
The value of the attribute represents the number of minutes prior to a new key being used. If
the Most Significant Bit is a value of one (1), representing a negative value, shall be used to
61850-90-5/DTR IEC:201X (E) – 73 –
indicate that no new key has been scheduled to be placed into service. Any positive value
shall be used to indicate the number of minutes prior to the new key being placed into service.
0 – remaining bits indicate time to new key being placed into service
1 – indicates no new key has been scheduled
15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0 Bit Numbers
The positive number shall be the relative time until the new key is put into service. Therefore,
the number is decremented until the new key is in actual use. When the new key is placed
into use, the TimeofCurrentKey attribute value is updated.
11.1.1.2.3.3 SecurityAlgorithms
The SecurityAlgorithms field is a two(2) octet field. The most significant octet shall be
reserved to indicate the type of encryption provided.
0 None
1 AES-128-GCM
2 AES-256-GCM
The least significant octet shall contain the HMAC algorithm information regarding the
signature generation. The value shall be one of the values from Table 11-3.
The session user data consists of two fields: Length and Payload.
11.1.1.2.4.1 Length
The maximum size of the Length is based upon the maximum packet size for SPDU Length.
The maximum value may be no greater than the SPDU Length – 14 – Signature Size.
The Length attribute shall be a four (4) octet field that is an Unsigned Integer value.
Note: One-hundred octets shall be reserved for the Signature part of User Data.
Therefore, the allowed maximum value, for this version, is 65,399 octets.
11.1.1.2.4.2 Payload
The payload section, as shown in Figure 11-4, allows multiple user data PDUs to be
aggregated within one SPDU. The types of PDUs that can be aggregated are constrained by
the Session Identifier (SI) of the SPDU (see page 69).
61850-90-5/DTR IEC:201X (E) – 74 –
The payloads of GOOSE, SV, or Tunnelled have two (2) common attributes: Simulation and
APPID. The following clauses define these common values.
11.1.1.2.4.2.1.1 Simulation
Simulation shall be a BOOLEAN value (e.g. one octet) and shall be as defined in IEC 61850-
8-1.
11.1.1.2.4.2.1.2 APPID
The APPID shall be a two (2) octet value and shall be as defined in IEC 61850-8-1.
The normative ASN.1 productions can be found in IEC 61850-8-1 and the following are provided for
information only.
The normative ASN.1 productions can be found in IEC 61850-8-1 and the following are
provided for information only.
Note: The savPdu and gseMngtPdu have the same ASN.1 tag (e.g. APPLICATION 0). There
is no conflict since the gseMngtPdu is out-of-scope of IEC TR 61850-90-5. Since the tags for
the goosePdu and savPdu are different, no additional tagging is needed for differentiation
within the user payload. This is important should the specification ever need to send GOOSE
and SV in a single user payload.
This clause adds additional service definitions to those defined in IEC 61805-8-1. The ASN.1
productions shall be:
If the offset is NULL, this shall indicated that the response shall contain all of the references if
the references are able to fit in the APDU. Otherwise the error responseTooLarge shall be
returned.
If the provided datSet (DataSet Reference) does not correspond with the ident value specified,
the response shall be controlBlockConfigurationError.
If the provided datSet (DataSet Reference) does not correspond with the ident value specified,
the respons shall be controlBlockConfigurationError.
RequestResults::= CHOICE {
offset [0] IMPLICIT INTEGER,
reference [1] IMPLICIT IA5STRING,
error [2] IMPLICIT ErrorReason
}
The MNGT APDU shall only be used with unicast addresses (source and destination).
11.1.1.2.4.2.5 Tunnelled
The tunnelled payload PDUs need to provide the key information required to re-emit the
appropriate frames at the end of the tunnel(s). In order to accomplish this, the following
information needs to be conveyed:
• Destination Address: This is the multicast destination Media Access Control (MAC)
address that the original GOOSE or SV message was sent to via Ethernet multicast.
• TPID and TCI: This is the VLAN tagging for VLAN identification as well as IEEE
priority tagging.
61850 Ethertype PDU and Ethernet padding: This information represents the Ethernet 61850
Ethertype field and associated information. In addition to the 61850 Ethertype PDUs, the
Ethernet padding needs to be included so that IEC 62351-6 security information can be
conveyed.
In Figure 11-6, the Ethertype PDU starts at octet 22 and includes all other octets except for
the Frame Check Sequence.
Octets 8 7 6 5 4 3 2 1 Notes
Preamble
Start of frame
0
1
2
Destination address
3
4
5 Refer to “Address
Header
6 MAC Fields” section.
7
8
Source address
9
10
11
12
TPID Refer to ”Priority
13 Priority
Tagging/VirtualLAN”
14 tagged
TCI section.
15
16 Link HSR Tag See IEC 62439-3
17 redundancy 0x88FB (HSR optional field)
18 header Path – Size H
19 Size L
61850-90-5/DTR IEC:201X (E) – 78 –
Octets 8 7 6 5 4 3 2 1 Notes
20 Sequence number H
21 Sequence Number L
22
61850 Ethertypes
23
24 Length Start
APPID
25
26 Ethertype PDU
Length (m + 8)
27
Refer to “Ethertype
28
Reserved 1 and Other Header
29 Information”
30 section.
Reserved 2
31
32
GOOSE or SV APDU (of
.
length m)
m + 32
. IEC 6235-6 Security and
≤1521 (Pad bytes if necessary)
.
.
Frame check sequence
.
≤1525
Figure 11-6: IEEE 802.3 Frame format for SV and GOOSE
The assigned IEC 61850 Ethertype values are shown in Table 11-2. The Ethertype values for
GOOSE Type 1, GOOSE Type 1A, and Sampled Values shall be allowed to be conveyed as
part of the tunnel. The GSE Management Ethertype, and its associated PDUs, are excluded
from use within the tunnel.
11.1.1.2.4.2.5.1 destinationMACAddress
The destination Media Access Control (MAC) address field shall be six(6) octets in size. It
shall contain the original MAC address that the tunnelled PDU was sent to. The value shall
be in transmission order as defined by ISO/IEC 8802-3:2000.
Oct
8 7 6 5 4 3 2 1
ets
0
TPID 0x8100 (as per 802.1Q)
1
2 User C
VID
TCI priority FI
3 VID
TPID (Tag Protocol Identifier) Field: Indicates the Ethertype assigned for 802.1Q Ethernet encoded
frames. This value shall be 0x8100.
TCI (Tag Control Information) Fields: User Priority: BS3; user priority value shall be set by
configuration to separate sampled values and time critical protection relevant GOOSE messages from
low priority busload. If the priority is not configured, then the default values shall be used.
CFI (Canonical Format Indicator): BS1 [0]; a single bit flag value. For this standard the CGI bit value
shall be reset (value = 0).
NOTE 1 If set (value = 1), an Embedded Resource Identification Field (E-RIF) follows the Length/Type field in the
ISO/IEC 8802-3 tagged frame.
VID: The use of Virtual LAN support is optional. If this mechanism will be used the VLAN Identifier
(VID) shall be set by configuration, if it is not used it shall be set to zero (0).
The TPIDandTCI field shall be four(4) octets and shall contain the values received by the
subscriber (e.g. publishing end of the tunnel). The Ethernet transmission order, as shown in
Figure 11-7 shall be maintained. However, due to some system designs, the information may
not be received by the subscriber. In this case, all octets shall be set to a value of zero(0).
It is recommended that the receiving entity, of a tunnelled PDU, have the ability to re-map the
TPID and TCI information as needed by the local LAN segment. This mapping should include
the capability of mapping zero(0) values. This mapping function is a local issue and out-of-
scope of this standard. .
11.1.1.2.4.2.5.3 tunnelledPduLength
The tunnelledPduLength field shall be an unsigned integer value of two(2) octets. The value
shall be the number of octets in the tunnelledPdu. The length shall include the IEC 61850
Ethertype octets through all other octets except the Frame Check Sequence as shown in
Figure 11-6.
61850-90-5/DTR IEC:201X (E) – 80 –
11.1.1.2.4.2.5.4 tunnelledPdu
11.1.1.2.5 Signature
The Signature production shall start with a one octet tag of a value of 84 hexademicmal. The
following octet shall be the length of the calculated signature. The third octet shall be the
most significant byte of the calculated signature value.
The calculated signature value shall be used for the authentication/integrity of the octets that
include the Session Identifier through the end of the user data payload. The
signature.calculations shall not include the Signature production. The value of the parameter
shall be calculated based upon the HMAC algorithm in RFC 2104.
The value of the HMAC and Signature production shall be treated as ASN.1 OCTETString
values.
The allowed HMAC functions are: HMAC-SHA1, HMAC-MD5, HMAC-SHA256, and HMAC-
SHA3.
Additionally, the calculated HMAC value may be truncated, per RFC 2104. The allowed
truncations are 80, 128, and 256 bits.
Therefore, the HMAC enumerated values, used in the Security Alogrithm field (see clause
11.1.1.2.3.3) shall be as defined in Table 11-3.
When a truncated value is used, the leftmost bytes of the computed value shall be used as the
value known as a Message Authentication Code (MAC). The output length, shall be no less
than ten(10) octets .
61850-90-5/DTR IEC:201X (E) – 81 –
ITU X.234 defines several transport parameters. This clause specifies the parameters that
shall be supported and lengths for those parameters.
The variable parts of X.234 shall not be used within this standard. Therefore, only the LI and UD fields
shall be present (e.g. 2 octets).
The IEC 61850-90-5 KDC profile is based upon RFC-3547: Group Domain of Interpretation
(GDOI). This RFC makes use of ISAKMP (RFC-2407) as part of the key requestion and
exchange mechanism. RFC-2407 allows user/private extensions in several areas, two of
which IEC 61850-90-5 makes use of:
1. The identification payload (clause 5.1 of RFC 3547): The payload identifier
indicates the information stream type for which a key is being requested.
2. The identification of the key payload (clause 5.5 of RFC 3547): The Key
Payload Type identifier indicates the type of the key being returned.
There are three phases of communication for GDOI for what is known as a GROUPKEY-
PULL:
Although there are two mechanisms of Authentication allowed by GDOI, IEC 61850-
90-5 implementations shall support the ability to use the GDOI client certificate
credentials exchanged at connection establishment time.
• Phase 2: Determining the policies in use for the group that is being requested.
If the client does not support the policies, the client shall abort (e.g. close the TCP
connection). If the client can support the policies, the client will issue the Key
Download (KD) payload request.
61850-90-5/DTR IEC:201X (E) – 82 –
The following clauses detail the IEC 61850-90-5 extensions to RFC 3547 for Phase 2 and
Phase 3.
RFC 3547 allows several different signature hash algorithms to be supported (see RFC 3547
clause 5.3.6). The RFC 3547 specified algorithms are shown in
RESERVED 0
SIG_HASH_MD5 1
SIG_HASH_SHA1 2
RESERVED 3-127
The GDOI Identification Payload (e.g. Phase 2 request) is shown in …. IEC 61850-90-5
defines a specific ID Type value and a format of the Identification Data.
RFC-3547, clause 5.4, specifies the following payload identifiers shown in Table 11-5:
Reserved 0-10
ID_KEY_ID 11
RESERVED 12-127
IEC 61850-90-5 shall assign the following additional payload identfier. This identifier shall be
a value of 161 (decimal).This identifier shall be used to identify a sequence of octets that
define a payload extension. This extension mechanism is designed to allow other protocols or
organizations to make use of the IEC 61850-90-5 payload extension. The general sequence
for the payload extension is shown in Figure 11-8.
61850-90-5/DTR IEC:201X (E) – 84 –
1 Length of
payload
2
5+n+1
The ObjectIdentifer values used by IEC 61850-90-5 are defined in Table 11-6.
KDCs claiming conformance to this document shall support the identifiers that are marked as
mandatory (e.g. m).
61850-90-5/DTR IEC:201X (E) – 85 –
The following clauses detail the IEC 61850-90-5 payload identification values,
In order to achieve common and reusable definitions, each payload may be constructed from
the following definitions.
11.1.2.3.1.1 VERSION
This is a single octet value that represents the version of the particular payload. Unless
otherwise specified, the value of the VERSION shall be one(1)
11.1.2.3.1.2 DEST_MULTICAST_ETHERNET_ADDRESS
This is a value that consist of six(6) octets. The value shall be in specified per Ethernet
transmission order.
61850-90-5/DTR IEC:201X (E) – 86 –
11.1.2.3.1.3 IP_ADDRESS
This value component allows the specification of either an IPv4 or IPv6 destination address
for which a key is being requested. The value component is a structure consisting of:
IP_ADDRESS::= {
type_of_address TYPE_OF_ADDRESS_ENUMERATION,
is_DNS_address BOOLEAN.
length_of_address UNSIGNED INTEGER16,
address octet[length_of_address]
}
Where:
Bit Number
Octet 0 1 2 3 4 5 6 7 8 9
Number
0 type_of_address
1 is_DNS_address
2 length_of_address(n)
3
4
address
3+n
11.1.2.3.1.4 DATASET
The DATASET value component allows the specification of an IEC 61850 DataSet Reference
(DSRef), as specified in IEC 61850-7-2.
DATASET::={
length_of_DataSet_Reference UNSIGNED INTEGER8,
61850-90-5/DTR IEC:201X (E) – 87 –
dataSet_Reference octet[length_of_DataSet_Reference]
}
The payload for the IP versions of GOOSE and SV are the same. The payload is defined as:
11.1.2.3.3 61850_UDP_Tunnel
The payload for the IEC 61850-90-5 Tunnel session protocol is defined as:
Editor’s Note: The reason that the dsRef is not present is that multiple Ethernet multicast
frames (e.g. GOOSE or SV) may be sent in one Tunnel SPDU. Therefore, only the
destination IP address allows for differentiation.
The payload for the Ethernet versions of GOOSE and SV are the same. The payload is
defined as:
Payload Identification::= {
version VERSION,
dstMAC DEST_MULTICAST_ETHERNET_ADDRESS,
dsRef DATASET
}
11.1.2.3.5 61850_IP_ISO9506
• Protocol ID (Prot-ID): Shall be the value of 161 decimal to indicate the use of IEC
61850-90-5.
61850-90-5/DTR IEC:201X (E) – 88 –
• Tag: Is the ASN.1 Tag, specified by IEC 61850-90-5 to represent the Object Identifier
that was requested by the client.
• ASN.1 for OID: The ASN.1 encoded value fo the Object Identifier.
• SA Life Type ID (RFC 2407): Specifies the time-to-live for the overall security
association. When the SA expires, all keys negotiated under the association (AH or
ESP) must be renegotiated. The SA Life Type ID field shall be a value of one (1).
Note: RFC 4306 has superseeded RFC 2407. However, RFC 3547 is designed to work with
RFC 2407 and has not been updated to work with RFC-4306. Furthermore, RFC 2407 is not
interoperable with RFC 4306. Therefore, this specification uses RFC 2407 as normative.
RESERVED 0
seconds 1
kilobytes 2
The value shall be a value of one(1) indicating the lifetime is specified in seconds.
• Remaining LifeTime Value: shall specify the number of seconds prior to the next
scheduled key change. A value of zero(0) shall indicate that no key change has been
scheduled.
• Key Algorithm: Shall be a value of 20 (decimal) and shall be used to indicate that the
next octet shall contain the Key Algorithm identification for the current key that is in
use.
• Key Length ID: As defined in RFC 2407. Used to indicate the current key length size.
• Current Key Key: The actual key being used currently. The number of octets is
governed by the Key Length that was specified.
• Next Key ID: shall be a value of 21 (decimal) and shall indicate that the payload
contains another key that should be used when the current key expires.
61850-90-5/DTR IEC:201X (E) – 89 –
• Key LifeTime Value: shall specify the number of seconds prior to the next scheduled
key change. A value of zero(0) shall indicate that no key change has been scheduled.
• Next Key Key: The next key to be used. The number of octets is governed by the Next
Key Length that was specified.
0 1 2 3
0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-! /* SA */
! NP = 0 ! RESERVED = 0 ! Payload Length !
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-!
! DOI = 2 !
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-!
! Situation = 0 !
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-!
! SA Attribute NP = 16 ! RESERVED2 = 0 !
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-!
! NP = 0 ! RESERVED = 0 ! Payload Length ! /* TEK */
+-+-+-+-+-+-+-+-+-+- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-!
! Prot-ID = 161 ! Tag = 0x80 ! Length of OID ! /* 90-5 */
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-!
! ASN.1 for OID used in Payload Identifier Request ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-!
! Cur KeyId = 1 ! SA LT ID = 1 ! SA LT V = 1 ! RESERVED = 0 ! /* CurKey */
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-! /* Policy */
! Remaining Lifetime Value = 0x3600 !
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-!
! AuthAlgID = 5 ! AuthAlg = 2 ! Key Alg = 20 !
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- !
! KT ID = 0 ! Key Length = 128 !
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-!
! Next KeyId = 2! SA LT ID = 1 ! SA LT V = 1 ! RESERVED = 0 ! /* NxtKey */
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-! /* Policy */
! Remaining Lifetime Value = 0xffff !
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-!
! AuthAlgID = 5 ! AuthAlg = 61440 ! Key Alg = 20 !
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-!
! KT ID = 1 ! Key Length = 256 !
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-!
Figure 11-9: Policy Response Frame
Figure 11-9 shows the field definitions and example values for a policy response frame.
The RFC 3547 field definitions are as follows:
• Domain of Informaiton (DOI): Shall be a value of two(2) to specify the GDOI protocol as
specified in RFC 3547.
61850-90-5/DTR IEC:201X (E) – 91 –
• SA Attribute Next Payload: The definition, per RFC 3547, are decimal values:
o 15 - SAK Payload
o 16 – SAT Payload
The definitions of the IEC 61850-90-5 specific values are defined in clause 11.1.2.3.6.
The octets following, and including the Next Key octet, shall not be present in the Key
Payload under the following conditions:
2. If the authentication credential of the client expires prior to the expiration of the
current key.
Clause 5.5 of RFC-3547 specifies the general format for the group keys that are to be
provided to group members. The key download (KD) Type allows for the definition of private
key download formats. It is this extensibility that IEC 61850-90-5 will utilize.
Reserved 0
TEK 1
KEK 2
LKH 3
RESERVED 4-127
61850_ETHERENT_GOOSE_OR_SV 192
61850_90_5_SESSION 193
61850_8_1_ISO9506 194
Within the scope of IEC 61850-90-5, there is a recognized need to provide authenticated
clients with the current key and the next key that is intended to be used. The payload
containing both of these keys shall be:
0 1 2 3
0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
Next Key ID SA Life Type ID SA Life Type Value Reserved– shall be a value of
zero(0)
Figure 11-10 depicts the format of a IEC 61850-90-5 Key Download Response Payload. The
definitions of the fields can be found in clause 11.1.2.3.6.
The octets following, and including the Next Key octet, shall not be present in the Key
Payload under the following conditions:
5. If the authentication credential of the client expires prior to the expiration of the
current key.
Clients that receive the the key download response shall compare the policies of the key
download with the actual policy response. If policies do not match, the client shall discard the
information.
IGMP version 3 (RFC 3376 shall be supported by implementations that are subscribers for
the routable GOOSE and SV as specified in clause 11.1.1.
11.2 T-Profiles
There are three (3) different A-Profiles, as specified in IEC 61850-90-5. Each of these A-
Profiles makes use of three (3) independent Transport Profiles (T-Profiles). The correlation
between the A-Profiles and T-Profiles is shown in Figure 11-11.
61850-90-5/DTR IEC:201X (E) – 94 –
UDP TCP
RFC 768 RFC 793 Transport
The following clauses detail the differences between the T-Profiles required to support the
various A-Profiles.
This T-Profile shall be as specified in IEC 61850-8-1 and IEC 61850-9-2 respectively. This T-
Profile is utilized to create a IEC 61850-90-5 Tunnel as specified by the Session layer within
this document.
Figure 11-12 is a normative extract from the UDP specification (RFC 768). The Destination
Port shall be port 102 as prescribed by RFC 1240. The source port shall be locally assigned
and the specification of these is out-of-scope of this specification.
UDP Mandatory/Optional/
eXcluded
Source Port M
Destination Port M
Length M
Checksum M
Table 11-9 specifies that all of the RFC 768 fields shall be implemented and transmitted.
Implementations claiming conformance to this standard shall provide a transport service data
interface that allows for the Destination IP Address, VLAN, and the Ethernet Class of Service
to be specified.
The destination port, for GDOI requests, shall be 898 as assigned by IANA. The source
portsshall be locally assigned and the specification of these is out-of-scope of this
specification.
61850-90-5/DTR IEC:201X (E) – 96 –
The Destination Port shall be port 465 as prescribed by RFC 1240. The source port shall be
locally assigned and the specification of these is out-of-scope of this specification.
The Network Layer protocols are common between the T-Profiles. However, the network
layer may be differentiated into support for IPv4 and IPv6 (see Annex D.1). Implementations
claiming conformance to this specification shall support IPv4 at a minimum.
Implementations claiming conformance to this specification shall implement the network layer
protocols shown in Table 11-10.
Table 11-10: Network Protocol Conformance Implementation Statement (PICS) for IPv4 based
T-Profiles
The following clauses specify additional constraints based upon that shall be implemented for
by implementations claiming conformance to this specification.
Bits: 4 8 16 20 32
The fields of the IP Header, as defined in RFC 791, are shown Figure 11-13 . Treatment of
packets under congestion can be signaled using information contained in what was originally
refered to as the the TOS (Type of Service) field (8-bits in length). This field is now treated as
consisting of two sub-fields, DSCP (Differentiated Services Code Point) and ECN (Explicit
Congestion Notification). The format for the TOS field is shown in Figure Figure 11-14.
0 1 2 3 4 5 6 7
DSCP ECN
How different types of traffic are treated within a particular domain must be relevant to the
policy set forth in the domain. Recommendations are available from various router vendors
regarding baseline settings for DSCP values for particular traffic classes (eg. VoIP, Video,
Data, Best Effort Traffic and others).
It is recommended that ECN bits are set per RFC-3168 by the intermediate systems.
Furthermore, it is recommended that IP packets, delivered to a subscriber, indicating
congestion should provide a notification to the application of packet loss. The actual
notification mechanism is out-of-scope of this specification.
Both T- an A-Profiles merit being marked as Expedited Forwarding (EF), described in RFC-
3246. Additionally, scheduling of this traffic into Low Latency Queues in order to expedite it’s
handling vs other types of traffic is indicated.
The actual specifics for classification will depend on the particular implementation and specific
mix of A- and T-Profile traffic within a utility network domain and their relative importance to
problem resolution. How traffic is handled in cross-domain situations will need to be
negotiated between the various domain administrations.
Additionally, RFC 791 includes the provision of an optional Security Field. (e.g. one of the IP
Option fields). However, the format and use of this field has been superseded by RFC 1108.
61850-90-5/DTR IEC:201X (E) – 98 –
Although this field is optional in RFC 791, implementations claiming conformance to this
standard shall implement and send this field per RFC 1108. A representation of the field
format
Implementations should be able to be configured with a range of values for the security field.
However, the default values shall be:
Editor’s Note: Some operating systems default the UDP/IP Time to Live (TTL) parameter
value to a value of one(1) that prevents the packet from being routed. Since the intent is to
have routable packets, the minimum allowed TTL needs to be specified.
The Time to Live parameter shall be set to a value of thirty-two(32), or greater, to allow the
routing of the UDP/IP packets. The value of 255 shall not be used. The value shall be
specified in the implementation’s PIXIT.
Additionally, the T-profile supporting the GOOSE and SV A-Profile shall implement IEEE
802.1Q per IEC 61850-8-1.
The current IEC 61850-5 standard does not have sufficient time class definitions to support the
synchrophasor use cases set forth within this document. Therefore, the following performance classes
should be added to IEC 61850-5.
This message type includes the output data from synchronized measuring devices independent from
the calculation and synchronization methods. The data will consist of continuous streams of
synchronized measurements from each IED, interleaved with data from other IEDs.
Transfer time means for the stream of synchronized measurements a constant delay resulting in a
delay for the functions using the measurements (e.g. for protection, visualization or other). Therefore,
this transfer time shall be dependent on the requirements of the application. For protection applications
it should be small, so no negative impact on an application function is experienced.
There are three (3) major identified impacts on the Substation Configuration Language (SCL)
as defined in IEC 61850-6. The extensions of IEC 61850-6 are required due to the need to:
• Express the new IEC 61850 UDP/IP profile, as defined in this document, and the new
synchrophasor functions.
Additionally, the creation of routable profiles has an impact on SCL. The following clauses
detail the extensions/changes needed.
• R-SV and R-GOOSE client capability shows that a client is able to receive appropriate
messages.
• The use of IPv4 or IPv6 in the profiles also requires extensions. These additions can
be found in clause 9.1.1.1 and 13.1.4.
The exchange of SED files and the connected engineering rights is already defined in IEC
61850-6:2009.
The description of routers and physical connections to switches and other IEDs is already
defined in IEC 61850-6:2009.
7. Import SED back to side A, and wire PDC/Center signals to A destinations (if needed
at all)
Note that steps 5, 6, 7 can be skipped, if there are no signals going down from the higher
level to the source substation (side A), and replaced by providing a client IED file to side A for
correct data flow presentation in step 1 and performing step 4 after step 1 with the side A
system tool.
The following clauses detail the extensions needed, within the Substation Configuration
Language, to support the R-GOCB and R-MSVCB.
The SCL XSD for a SV needs to be extended to include the security field and the new R-SV
service mapping:
<xs:complexType name="tSampledValueControl">
<xs:complexContent>
<xs:extension base="tControlWithIEDName">
<xs:sequence>
<xs:element name="SmvOpts">
<xs:complexType>
<xs:attributeGroup ref="agSmvOpts"/>
</xs:complexType>
</xs:element>
<xs:element name="Protocol" fixed="R-SV" minOccurs="0">
<xs:complexType>
<xs:simpleContent>
<xs:extension base="xs:normalizedString">
<xs:attribute name="mustUnderstand"
type="xs:boolean" use="required"
fixed="true"/>
</xs:extension>
</xs:simpleContent>
</xs:complexType>
</xs:element>
</xs:sequence>
<xs:attribute name="smvID" type="tMessageID" use="required"/>
<xs:attribute name="multicast" type="xs:boolean" default="true"/>
<xs:attribute name="smpRate" type="xs:unsignedInt" use="required"/>
<xs:attribute name="nofASDU" type="xs:unsignedInt" use="optional" default="1"/>
<xs:attribute name="smpMod" type="tSmpMod" use="optional" default="SmpPerPeriod"/>
<xs:attribute name="securityEnable" type="scl:tPredefinedTypeOfSecurityEnum" use="optional"
default="None"/>
</xs:extension>
</xs:complexContent>
</xs:complexType>
Figure 13-1: Extension to tSampledValueControl
61850-90-5/DTR IEC:201X (E) – 102 –
The Protocol element may only be used with multicast SV control blocks.
Note that agSmvOpts needs to be extended as follows:
<xs:attributeGroup name="agSmvOpts">
<xs:attribute name="refreshTime" type="xs:boolean" use="optional" default="false"/>
<xs:attribute name="sampleSynchronized" type="xs:boolean" use="optional" fixed="true"/>
<xs:attribute name="sampleRate" type="xs:boolean" use="optional" default="false"/>
<xs:attribute name="dataSet" type="xs:boolean" use="optional" default="false"/>
<xs:attribute name="security" type="xs:boolean" use="optional" default="false"/>
<xs:attribute name="timestamp" type="xs:boolean" use="optional" default="false"/>
</xs:attributeGroup>
Figure 13-2: Extension to agSmvOpts
In order to utilize SV over wide areas, the timestamp attribute shall be True.
The SCL XSD for a GSE Control block needs to be extended to allow for the security attribute
and the new R-GOOSE service mapping:
<xs:complexType name="tGSEControl">
<xs:complexContent>
<xs:extension base="tControlWithIEDName">
<xs:sequence>
<xs:element name="Protocol" fixed="R-GOOSE" minOccurs="0">
<xs:complexType>
<xs:simpleContent>
<xs:extension base="xs:normalizedString">
<xs:attribute name="mustUnderstand" type="xs:boolean" use="required"
fixed="true"/>
</xs:extension>
</xs:simpleContent>
</xs:complexType>
</xs:element>
</xs:sequence>
<xs:attribute name="type" type="tGSEControlTypeEnum" use="optional" default="GOOSE"/>
<xs:attribute name="appID" type="tMessageID" use="required"/>
<xs:attribute name="fixedOffs" type="xs:boolean" use="optional" default="false"/>
<xs:attribute name="securityEnable" type="scl:tPredefinedTypeOfSecurityEnum" use="optional"
default="None"/>
</xs:extension>
</xs:complexContent>
</xs:complexType>
Figure 13-3: Extension of tGSEControl
13.1.2.2.1 SecurityEnable
This attribute, if present, allows an IEC 61850 client to read the current usage of security. The
attribute may have the following enumerated values:
• Signature: This value indicates that the Session Security Parameter will be present.
Implementations claiming conformance to this document shall support the Signature value.
If the attribute is not present in the control block(s) then there shall be no security used.
In order to provide the proper enumeration, the SCL XSD needs to be extended with the
following new enumeration:
<xs:simpleType name="tPredefinedTypeOfSecurityEnum">
<xs:restriction base="xs:normalizedString">
<xs:enumeration value="None"/>
<xs:enumeration value="Signature"/>
<xs:enumeration value="SignatureAndEncryption"/>
</xs:restriction>
</xs:simpleType>
Figure 13-4: Definition of tPredefinedTypeOfSecurityEnum
The IEC 61850-6 SCL shall be extended to indicate if an Access Point contains a KDC
function. This shall be accomplished through the addition of the “kdc” attribute as show in
Figure 13-5.
<xs:complexType name="tAccessPoint">
<xs:complexContent>
<xs:extension base="tUnNaming">
<xs:sequence>
<xs:choice minOccurs="0">
<xs:element name="Server" type="scl:tServer">
<xs:unique name="uniqueAssociationInServer">
<xs:selector xpath="./scl:Association"/>
<xs:field xpath="@associationID"/>
</xs:unique>
</xs:element>
<xs:element ref="scl:LN" maxOccurs="unbounded"/>
<xs:element name="ServerAt" type="tServerAt"/>
</xs:choice>
<xs:element name="Services" type="scl:tServices" minOccurs="0"/>
<xs:element name="GOOSESecurity" type="tCertificate" minOccurs="0"
maxOccurs="7"/>
<xs:element name="SMVSecurity" type="tCertificate" minOccurs="0"
maxOccurs="7"/>
</xs:sequence>
<xs:attribute name="name" type="tAccessPointName" use="required"/>
<xs:attribute name="router" type="xs:boolean" use="optional" default="false"/>
<xs:attribute name="clock" type="xs:boolean" use="optional" default="false"/>
<xs:attribute name="kdc" type="xs:boolean" use="optional" default="false"/>
</xs:extension>
</xs:complexContent>
</xs:complexType>
SCL shall further be extended to indicate the KDC(s) that an IED will use. This shall be accomplished
throught the addition of any number of KDC elements as shown in Figure 13-6.
<xs:complexType name="tIED">
<xs:complexContent>
<xs:extension base="tUnNaming">
61850-90-5/DTR IEC:201X (E) – 104 –
<xs:sequence>
<xs:element name="Services" type="tServices" minOccurs="0"/>
<xs:element name="AccessPoint" type="tAccessPoint" maxOccurs="unbounded">
<xs:unique name="uniqueLNInAccessPoint">
<xs:selector xpath="./scl:LN"/>
<xs:field xpath="@inst"/>
<xs:field xpath="@lnClass"/>
<xs:field xpath="@prefix"/>
</xs:unique>
</xs:element>
<xs:element name="KDC" type="tKDC" minOccurs="0" maxOccurs="unbounded"/>
</xs:sequence>
<xs:attribute name="name" type="tIEDName" use="required"/>
<xs:attribute name="type" type="xs:normalizedString" use="optional"/>
<xs:attribute name="manufacturer" type="xs:normalizedString" use="optional"/>
<xs:attribute name="configVersion" type="xs:normalizedString" use="optional"/>
<xs:attribute name="originalSclVersion" type="tSclVersion" use="optional"/>
<xs:attribute name="originalSclRevision" type="tSclRevision" use="optional"/>
<xs:attribute name="engRight" type="tRightEnum" use="optional" default="full"/>
<xs:attribute name="owner" type="xs:normalizedString" use="optional"/>
</xs:extension>
</xs:complexContent>
</xs:complexType>
Figure 13-6: IED SCL producting indicating the KDC(s) to be used
In order to allow IPv4 and IPv6 addressing, as part of the tConnectedAP, the appropriate
enumerations must first be added to the tPredefinedPTypeEnum.
<xs:simpleType name="tPredefinedPTypeEnum">
<xs:restriction base="xs:Name">
<xs:enumeration value="IP"/>
<xs:enumeration value="IP-SUBNET"/>
<xs:enumeration value="IP-GATEWAY"/>
<xs:enumeration value="OSI-NSAP"/>
<xs:enumeration value="OSI-TSEL"/>
<xs:enumeration value="OSI-SSEL"/>
<xs:enumeration value="OSI-PSEL"/>
<xs:enumeration value="OSI-AP-Title"/>
<xs:enumeration value="OSI-AP-Invoke"/>
<xs:enumeration value="OSI-AE-Qualifier"/>
<xs:enumeration value="OSI-AE-Invoke"/>
<xs:enumeration value="MAC-Address"/>
<xs:enumeration value="APPID"/>
<xs:enumeration value="VLAN-PRIORITY"/>
<xs:enumeration value="VLAN-ID"/>
<xs:enumeration value="SNTP-Port"/>
<xs:enumeration value="MMS-Port"/>
<xs:enumeration value=”DNSName”/>
<xs:enumeration value=”C37-118-IP-Port”/>
</xs:restriction>
</xs:simpleType>
Figure 13-8: Extension to tPredefinedPTypeEnum
The extensions are: DNSName, and IPv6 syntax for the IP element. For describing the mapping of
C37.118 IEDs additionally the corresponding IP port needs to be configurable as C37-118-IP-Port. The
61850-90-5/DTR IEC:201X (E) – 105 –
extensions result in new P-Types needing to be defined. These definitions are found in the following
clauses.
In order to allow IPv6 addresses to be configured, the abstract type tP_IPbase needs to be
extended with a pattern for IPv6. The definition is found in Figure 13-9. This definition
supports only the standard presentation without suppression of zero fields.
This modification will then be automatically propagated to the concrete P-Types tP_IP, tP_IP-
GATEWAY, and tP_IP-SUBNET.
The default “id” type shall be IPv4 if the “id” is not present.
In order to provide wide area addressability between multiple addressing domains, as may be
required for Wide Area Measurement systems or exchanges between utilities, a DNS string
representation of an IP address may allow easier coordination between systems.
<xs:complexType name="tP_DNSName">
<xs:simpleContent>
<xs:restriction base="tP">
<xs:pattern value="\S*"/>
<xs:attribute name="type" type="tPTypeEnum" use="required" fixed="DNSName"/>
</xs:restriction>
</xs:simpleContent>
</xs:complexType>
Figure 13-10: Definition of tP_DNSName
The implementations of IEEE C37.118.2 do not have a specified IP Port address. The general
practice, in the industry has been that each vendor/installation assigns its own destination
port addresses. In order to allow IEEE C37.118.2 to be able to be represented in SCL, the P-
61850-90-5/DTR IEC:201X (E) – 106 –
Type of C37-118-IP-Port has been added. This P-Type shall not be used for any
configuration other than IEEE C37.118.2.
<xs:complexType name="tP_C37-118-IP-Portl">
<xs:simpleContent>
<xs:restriction base="xs:integer">
<xs:minInclusive value="1025"/>
<xs:maxInclusive value="65535"/>
<xs:attribute name="type" type="tPTypeEnum" use="required" fixed=" C37-118-IP-Portl"/>
</xs:restriction>
</xs:simpleContent>
</xs:complexType>
This mapping restricts on mapping process data to the IEC 61850 data model. Configuration
data is not mapped, but replaced by the IEC 61850 model itself respective its SCL description.
Due to the specific nature of the telegrams, which is similar to sampled value telegrams in IEC
61850, the mapping is done only to the process data values of the C37.118 telegrams. Any
time stamped IEC 61850 data needs to derive the time from the common time stamp of the
telegram, and the value quality from the appropriate quality bits as described in C37.118.
The mapping to the IEC 61850 vector data can be naturally made for the polar representation
of phasors. If the phasor data within the telegram is rectangular, AND it shall be converted to
an IEC61850 based access model, it has to be converted by the receiving client to polar
representation. If only the semantics of the data shall be communicated to the application, this
is not necessary, i.e. the application then must directly handle the rectangular representation,
and the SCL description is only used to transfer the semantics to the application.
The phasor data and the frequency contained in the telegram map directly to data objects of a
logical node of LN class MMXU within IEC 61850. The unspecified analog and digital data in a
C37.118 telegram can be mapped to any IEC 61850 data object fitting to the appropriate data
type and carrying the needed semantic. The appropriate IEC 61850 logical node class and
data object name has to be chosen to document the semantics of the value.
The IEC 61850 data object for rate of frequency needs to be defined. This definition is found
in clause 15.3 .It it is modelled by an extension of the LNs PFRC, MMXU or MMXN e.g. by a
data object HzRte. This is simpler to use than the first recommended method, however needs
to be standardized in IEC 61850-7-4.
Note: This version does not support the mapping of binary status data to switch positions (IEC
61850 attribute type Dbpos).
61850-90-5/DTR IEC:201X (E) – 107 –
• use the sAddr attribute at the data attribute level to map them to the telegram
• define a Private address type which may be allocated to the needed level of the data
model.
As the identification of a telegram source is done by its IP source address, and the values
within the telegram are identified only by their location in the telegram, a more hierarchical
addressing scheme than that at attribute level is not needed; therefore this is recommended
and suggested here. For Phasor Data Concentrator (PDC) telegrams, which might have a
repeating structure, it is optionally allowed to specify the repetition identification at the logical
device level, i.e. above the data attribute level.
Values map to the C37.118 data telegram only. The configuration telegrams are not mapped,
as their information respective equivalent information will be supplied by the IEC 61850 data
model itself. E.g. if the values of a PDC telegram belong to different PMUs, each one shall be
modelled by a different logical device.
To specify the repeatno at LDevice level, the following Private type is introduced:
C37.118-repeatno
Example:
<LDevice inst=”LD0”>
<Private type=”C37.118-repeatno”>5</Private>
<LN0>
…
</LN0>
….
</LDevice>
The following example illustrates the usage at the data object instance on the IED.
Observe that sAddr attributes can be attached at IED instance level as well as at
DataTypeTemplate level. The last choice might need more data type template definitions,
however saves the definition at instance level, if several PMUs of the same type (with same
address values) are in the same SCD file.
In order to provide the equivalent of the IEEE C37.118.1 CFG-2 and CFG-3 configuration
commands, GetSavReference and GetSavElementNumber service shall be added.
The namespace used to identifying the definition additions to IEC 61850-7-4, and potentially
other parts of IEC 61850, shall be: “IEC TR 61850-90-5:2011”.
The extension to the ClcMtd enumerated set of definitions to include P-CLASS and M-CLASS
(see Table 10-1).
IEEE C37.118.1 defines the estimation technique for the value representing the Rate of
Change of Frequency (ROCOF).
The normative estimation method is defined in IEEE C37.118.1. The following text is an
extract from IEEE C37.118.1 and shall be considered informative:
“A PMU shall calculate and be capable of reporting frequency and rate of change of frequency (ROCOF).
For this measurement, the following standard definitions shall be used. Given a sinusoidal signal
X(t) = Xm cos [ψ(t)]
frequency is defined by
Error! Objects cannot be created from editing field
codes.
Synchrophasors are always computed in relation to the system nominal frequency (f0). If the cosine
argument is represented as ψ(t) = ω0t + ϕ(t) = 2πf0t + ϕ(t) = 2π [f0t + ϕ(t)/ 2π], the formula for frequency
becomes
f(t) = f0 + d[ϕ(t)/2π]/dt = f0 + Δf (t)
where Δf(t) is the deviation of frequency from nominal and
ROCOF = d2[ϕ(t)/2π]/dt2 = d(Δf(t))/dt
Frequency in phasor measurements may be reported as the actual frequency f(t) or the deviation of
frequency from nominal, ∆f(t). In steady-state conditions, ∆f(t) can be represented as a scalar number
∆f.”
61850-90-5/DTR IEC:201X (E) – 110 –
For the purposes of IEC 61850, a conditional DataObject shall be added to the MMXU and / or MMXN
Logical Node definition in IEC 61850-7-4. The DataObject name shall be “HzRte” indicating the rate of
change of the frequency. “HzRte” shall be of the Common Data Class (CDC) MV. This DataObject
may only be present for MMXU or MMXN LNs that have ClcMth value of P-CLASS or M-CLASS.
It is recommended that the floating point representation be used. The units shall be Hz/second as
specified IEC 61850-7-3. It is recommended that the multiplier be “milli” as defined in IEC 61850-7-3.
61850-90-5/DTR IEC:201X (E) – 111 –
To make the example shorter, all address mappings are in the instance part, and the
DataTypeTemplate definitions are removed. Observe that the semantic is carried at two
levels: first the data model of the IED, second the allocation of IED logical nodes to the
substation single line.
This example is based on the bay single line shown in Figure 15-1, and describes one PMU
named AA1FP1, sending phasor data of this bay to a client AA1KA1.
AA1
D1
QBB
Q1
QB1 QB2
QC1
QA1
BU2
BI1
BI2
BI3
QC2
QB4
QC3
Line
<?xml version="1.0"?>
<SCL xmlns:sxy="http://www.iec.ch/61850/2003/SCLcoordinates" xmlns="http://www.iec.ch/61850/2003/SCL" version="2007" revision="B" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.iec.ch/61850/2003/SCL
C:\Data\sdps\SCL3.1\SCL.xsd">
<Header id="SynchroPhasor AA1 SED" toolID="SSI-Tool"/>
<Substation name="AA1" desc="Substation">
<VoltageLevel name="D1" desc="Voltage Level">
<Bay name="Q1" desc="Bay" sxy:x="55" sxy:y="62" sxy:dir="vertical">
<LNode iedName="AA1FP1" ldInst="PMU" lnClass="MMXU" lnInst="1"/>
<ConductingEquipment name="BI1" desc="Current Transformer" type="CTR"
sxy:x="8" sxy:y="15" sxy:dir="vertical">
<LNode iedName="AA1FP1" ldInst="PMU" lnClass="TCTR" lnInst="1"/>
<Terminal name="AA1D1Q1N2" connectivityNode="AA1/D1/Q1/N2"
substationName="AA1" voltageLevelName="D1" bayName="Q1"
cNodeName="N2"/>
<Terminal name="AA1D1Q1N3" connectivityNode="AA1/D1/Q1/N3" substationName="AA1" voltageLevelName="D1" bayName="Q1"
cNodeName="N3"/>
</ConductingEquipment>
<ConductingEquipment name="QC2" desc="Isolator" type="DIS" sxy:x="10"
sxy:y="21" sxy:dir="vertical">
<Terminal name="AA1D1Q1N6" connectivityNode="AA1/D1/Q1/N6" substationName="AA1" voltageLevelName="D1" bayName="Q1" cNodeName="N6"/>
<Terminal name="grounded" connectivityNode="AA1/D1/Q1/grounded" substationName="AA1" voltageLevelName="D1" bayName="Q1"
cNodeName="grounded"/>
</ConductingEquipment>
<ConductingEquipment name="BU2" desc="Voltage Transformer 3Phase" type="VTR" sxy:x="12" sxy:y="14" sxy:dir="vertical">
<LNode iedName="AA1FP1" ldInst="PMU" lnClass="TVTR" lnInst="1"/>
<Terminal name="AA1D1Q1N3" connectivityNode="AA1/D1/Q1/N3" substationName="AA1" voltageLevelName="D1" bayName="Q1" cNodeName="N3"/>
</ConductingEquipment>
<ConductingEquipment name="QB2" desc="Isolator" type="DIS" sxy:x="12" sxy:y="4" sxy:dir="vertical">
<Terminal name="AA1D1QBBN4" connectivityNode="AA1/D1/QBB/N4" substationName="AA1" voltageLevelName="D1" bayName="QBB" cNodeName="N4"/>
<Terminal name="AA1D1Q1N5" connectivityNode="AA1/D1/Q1/N5" substationName="AA1" voltageLevelName="D1" bayName="Q1" cNodeName="N5"/>
</ConductingEquipment>
<ConductingEquipment name="QC1" desc="Isolator" type="DIS" sxy:x="10" sxy:y="8" sxy:dir="vertical">
<Terminal name="AA1D1Q1N5" connectivityNode="AA1/D1/Q1/N5" substationName="AA1" voltageLevelName="D1" bayName="Q1" cNodeName="N5"/>
<Terminal name="grounded" connectivityNode="AA1/D1/Q1/grounded" substationName="AA1" voltageLevelName="D1" bayName="Q1"
cNodeName="grounded"/>
</ConductingEquipment>
<ConductingEquipment name="BI3" desc="Current Transformer" type="CTR" sxy:x="8" sxy:y="19" sxy:dir="vertical">
<Terminal name="AA1D1Q1N6" connectivityNode="AA1/D1/Q1/N6" substationName="AA1" voltageLevelName="D1" bayName="Q1" cNodeName="N6"/>
<Terminal name="AA1D1Q1N4" connectivityNode="AA1/D1/Q1/N4" substationName="AA1" voltageLevelName="D1" bayName="Q1" cNodeName="N4"/>
</ConductingEquipment>
<ConductingEquipment name="QA1" desc="Circuit Breaker" type="CBR" sxy:x="8" sxy:y="11" sxy:dir="vertical">
<Terminal name="AA1D1Q1N3" connectivityNode="AA1/D1/Q1/N3" substationName="AA1" voltageLevelName="D1" bayName="Q1" cNodeName="N3"/>
<Terminal name="AA1D1Q1N5" connectivityNode="AA1/D1/Q1/N5" substationName="AA1" voltageLevelName="D1" bayName="Q1" cNodeName="N5"/>
</ConductingEquipment>
<ConductingEquipment name="BI2" desc="Current Transformer" type="CTR" sxy:x="8" sxy:y="17" sxy:dir="vertical">
<Terminal name="AA1D1Q1N2" connectivityNode="AA1/D1/Q1/N2" substationName="AA1" voltageLevelName="D1" bayName="Q1" cNodeName="N2"/>
<Terminal name="AA1D1Q1N4" connectivityNode="AA1/D1/Q1/N4" substationName="AA1" voltageLevelName="D1" bayName="Q1" cNodeName="N4"/>
61850-90-5/DTR IEC:201X (E) – 113 –
</ConductingEquipment>
<ConductingEquipment name="QB1" desc="Isolator" type="DIS" sxy:x="6" sxy:y="4" sxy:dir="vertical">
<Terminal name="AA1D1Q1N5" connectivityNode="AA1/D1/Q1/N5" substationName="AA1" voltageLevelName="D1" bayName="Q1" cNodeName="N5"/>
<Terminal name="AA1D1QBBN1" connectivityNode="AA1/D1/QBB/N1" substationName="AA1" voltageLevelName="D1" bayName="QBB" cNodeName="N1"/>
</ConductingEquipment>
<ConductingEquipment name="QB4" desc="Isolator" type="DIS" sxy:x="8" sxy:y="23" sxy:dir="vertical">
<Terminal name="AA1D1Q1N1" connectivityNode="AA1/D1/Q1/N1" substationName="AA1" voltageLevelName="D1" bayName="Q1" cNodeName="N1"/>
<Terminal name="AA1D1Q1N6" connectivityNode="AA1/D1/Q1/N6" substationName="AA1" voltageLevelName="D1" bayName="Q1" cNodeName="N6"/>
</ConductingEquipment>
<ConductingEquipment name="QC3" desc="Isolator" type="DIS" sxy:x="10" sxy:y="35" sxy:dir="vertical">
<Terminal name="AA1D1Q1N1" connectivityNode="AA1/D1/Q1/N1" substationName="AA1" voltageLevelName="D1" bayName="Q1" cNodeName="N1"/>
<Terminal name="grounded" connectivityNode="AA1/D1/Q1/grounded" substationName="AA1" voltageLevelName="D1" bayName="Q1"
cNodeName="grounded"/>
</ConductingEquipment>
<ConnectivityNode name="N1" pathName="AA1/D1/Q1/N1" sxy:x="8" sxy:y="31"/>
<ConnectivityNode name="N2" pathName="AA1/D1/Q1/N2" sxy:x="8" sxy:y="16"/>
<ConnectivityNode name="N3" pathName="AA1/D1/Q1/N3" sxy:x="9" sxy:y="13"/>
<ConnectivityNode name="N6" pathName="AA1/D1/Q1/N6" sxy:x="8" sxy:y="21"/>
<ConnectivityNode name="N5" pathName="AA1/D1/Q1/N5" sxy:x="9" sxy:y="6"/>
<ConnectivityNode name="N4" pathName="AA1/D1/Q1/N4" sxy:x="8" sxy:y="18"/>
</Bay>
<Bay name="QBB" desc="Bay" sxy:x="63" sxy:y="36" sxy:dir="vertical">
<ConnectivityNode name="N3" pathName="AA1/D1/QBB/N3" sxy:x="48" sxy:y="12"/>
<ConnectivityNode name="N2" pathName="AA1/D1/QBB/N2" sxy:x="47" sxy:y="17"/>
<ConnectivityNode name="N4" pathName="AA1/D1/QBB/N4" sxy:x="25" sxy:y="18"/>
<ConnectivityNode name="N1" pathName="AA1/D1/QBB/N1" sxy:x="22" sxy:y="20"/>
</Bay>
</VoltageLevel>
</Substation>
<Communication>
<SubNetwork name="AA1WA1" desc="C37.118 UDP network" type="C37.118-UDP">
<ConnectedAP iedName="AA1KA1" apName="S1" desc="the client receiving the messages >
<Address>
<P type="IP">172.16.0.100</P>
<P type="IP-SUBNET">255.255.0.0</P>
<P type="C37-118-IP-Port">110</P>
</Address>
</ConnectedAP>
<ConnectedAP iedName="AA1FP1" apName="S1">
<Address>
<P type="IP">172.16.1.3</P>
<P type="IP-SUBNET">255.255.0.0</P>
</Address>
</ConnectedAP>
</SubNetwork>
</Communication>
<IED name="AA1KA1" desc="Client receiving Synchrophasor data" type="OPCServer" manufacturer="ME" configVersion="1.0" >
<AccessPoint name="S1">
<LN inst="1" lnClass="IHMI" lnType="IHMI_OPCServer_IEC61850"/>
61850-90-5/DTR IEC:201X (E) – 114 –
<!-- shall receive the phasor data from the PMU -->
</AccessPoint>
</IED>
<IED name="AA1FP1" type="PMU" manufacturer="Whatever" configVersion="1.0">
<Services>
<DynAssociation/>
<ConfDataSet max="50" maxAttributes="240"/>
<ReadWrite/>
<SMVSettings datSet="Conf">
<SmpRate>2</SmpRate>
</SMVSettings>
</Services>
<AccessPoint name="S1">
<Server>
<Authentication none="true"/>
<LDevice inst="PMU">
<LN0 inst="" lnClass="LLN0" lnType="LLN0_RELx_IEC61850">
<!-- SMV data set and control block definitions are optional. They might be used to define the logical data flow (i.e. to the clients) in case this is not
defined at the clients itself as incoming data. The link to the C37.118 message is done by means of the sAddr definitions at the data objects -->
<DataSet name="PMUdata">
<FCDA ldInst="PMU" prefix="" lnClass="MMXU" lnInst="1" doName="A.phsA" fc="MX"/>
<FCDA ldInst="PMU" prefix="" lnClass="MMXU" lnInst="1" doName="A.phsB" fc="MX"/>
<FCDA ldInst="PMU" prefix="" lnClass="MMXU" lnInst="1" doName="A.phsC" fc="MX"/>
<FCDA ldInst="PMU" prefix="" lnClass="MMXU" lnInst="1" doName="Health" fc="ST"/>
<FCDA ldInst="PMU" prefix="" lnClass="LPHD" lnInst="1" doName="PhyHealth" fc="ST"/>
</DataSet>
<SampledValueControl name="SyPh_SVCB1" desc="Phasor SVCB" datSet="PMUdata" confRev="1" smvID="MyPhasors AA1" smpRate="2"
nofASDU="1">
<IEDName>AA1OPC1</IEDName>
</SampledValueControl>
</LN0>
<LN inst="1" lnClass="LPHD" lnType="Physical Device_RELx_IEC61850">
<DOI name="PhyHealth">
<DAI name="stVal" sAddr="0, DIGITAL, 0,0" />
</DOI>
</LN>
<LN inst="1" lnClass="TCTR" lnType="CT_RELx_IEC61850"/>
<LN inst="1" lnClass="TVTR" lnType="VT_RELx_IEC61850">
<DOI name="FuFail">
<DAI name="stVal" sAddr="0, DIGITAL, 0,1" />
</DOI>
</LN>
<LN inst="1" desc="Synchrophasor measurements" lnClass="MMXU" lnType="Syph_RELx_IEC61850">
<DOI name="PhV">
<DAI name="angRef">
<Val>Synchrophasor</Val>
</DAI>
<SDI name="phsA">
<SDI name="cVal" >
61850-90-5/DTR IEC:201X (E) – 115 –
<SDI name="mag" >
<DAI name="f" sAddr="0,PHASORS,0" />
</SDI>
</SDI>
</SDI>
<SDI name="phsB">
<SDI name="cVal" >
<SDI name="mag" >
<DAI name="f" sAddr="0,PHASORS,1" />
</SDI>
</SDI>
</SDI>
<SDI name="phsC">
<SDI name="cVal" >
<SDI name="mag" >
<DAI name="f" sAddr="0,PHASORS,2" />
</SDI>
</SDI>
</SDI>
</DOI>
<DOI name="A">
<DAI name="angRef">
<Val>Synchrophasor</Val>
</DAI>
<SDI name="phsA">
<SDI name="cVal" >
<SDI name="mag" >
<DAI name="f" sAddr="0,PHASORS,3" />
</SDI>
</SDI>
</SDI>
<SDI name="phsB">
<SDI name="cVal" >
<SDI name="mag" >
<DAI name="f" sAddr="0,PHASORS,4" />
</SDI>
</SDI>
</SDI>
<SDI name="phsC">
<SDI name="cVal" >
<SDI name="mag" >
<DAI name="f" sAddr="0,PHASORS,5" />
</SDI>
</SDI>
</SDI>
</DOI>
<DOI name="Hz">
<SDI name="mag">
<DAI name="f" sAddr="0,FREQ" />
61850-90-5/DTR IEC:201X (E) – 116 –
</SDI>
</DOI>
</LN>
</LDevice>
</Server>
</AccessPoint>
</IED>
<DataTypeTemplates>
<LNodeType id="IHMI_OPCServer_IEC61850" lnClass="IHMI">
<DO name="Beh" type="aIns_OPCServer_IEC61850"/>
<DO name="Health" type="aIns_OPCServer_IEC61850"/>
<DO name="Mod" type="aInc_OPCServer_IEC61850"/>
<DO name="NamPlt" type="aLpl_OPCServer_IEC61850"/>
<DO name="EEHealth" type="aIns_OPCServer_IEC61850"/>
<DO name="EEName" type="aDpl_OPCServer_IEC61850"/>
<DO name="Loc" type="aSps_OPCServer_IEC61850"/>
<DO name="OpCnt" type="aIns_OPCServer_IEC61850"/>
<DO name="OpCntRs" type="aInc_OPCServer_IEC61850"/>
<DO name="OpTmh" type="aIns_OPCServer_IEC61850"/>
</LNodeType>
<LNodeType id="LLN0_RELx_IEC61850" lnClass="LLN0">
<DO name="Beh" type="tcBeh_RELx_IEC61850"/>
<DO name="Health" type="tcHealth_RELx_IEC61850"/>
<DO name="LEDRs" desc="LED Reset" type="tcSPCRO_RELx_IEC61850"/>
<DO name="Mod" type="tcROMod_RELx_IEC61850"/>
<DO name="NamPlt" type="tcLPLIdNs_RELx_IEC61850"/>
</LNodeType>
<LNodeType id="Syph_RELx_IEC61850" lnClass="MMXU">
<DO name="Beh" type="tcBeh_RECx_IEC61850"/>
<DO name="Health" type="tcHealth_RECx_IEC61850"/>
<DO name="Mod" type="tcROMod_RECx_IEC61850"/>
<DO name="NamPlt" type="tcLPL_RECx_IEC61850"/>
<DO name="PhV" desc="Voltage phasors" type="tcSyphWYE"/>
<DO name="A" desc="Current phasors" type="tcSyphWYE"/>
</LNodeType>
<LNodeType id="CT_RELx_IEC61850" lnClass="TCTR">
<DO name="Beh" type="tcBeh_RECx_IEC61850"/>
<DO name="Health" type="tcHealth_RECx_IEC61850"/>
<DO name="Mod" type="tcROMod_RECx_IEC61850"/>
<DO name="NamPlt" type="tcLPL_RECx_IEC61850"/>
</LNodeType>
<LNodeType id="VT_RELx_IEC61850" lnClass="TVTR">
<DO name="Beh" type="tcBeh_RECx_IEC61850"/>
<DO name="Health" type="tcHealth_RECx_IEC61850"/>
<DO name="Mod" type="tcROMod_RECx_IEC61850"/>
<DO name="NamPlt" type="tcLPL_RECx_IEC61850"/>
<DO name="FuFail" desc="VT supply failure (MCB)" type="tcSPS_RECx_IEC61850"/>
</LNodeType>
<LNodeType id="Physical Device_RELx_IEC61850" lnClass="LPHD">
61850-90-5/DTR IEC:201X (E) – 117 –
<DO name="PhyNam" type="tcDPL_RELx_IEC61850"/>
<DO name="Beh" type="tcBeh_RELx_IEC61850"/>
<DO name="PhyHealth" desc="Relay ready" type="tcHealth_RELx_IEC61850"/>
<DO name="Proxy" type="tcSPS_RELx_IEC61850"/>
</LNodeType>
………………………………………<!-- other data type definitions removed -->
<EnumType id="ctlModel">
<EnumVal ord="0">status-only</EnumVal>
<EnumVal ord="1">direct-with-normal-security</EnumVal>
<EnumVal ord="2">sbo-with-normal-security</EnumVal>
<EnumVal ord="3">direct-with-enhanced-security</EnumVal>
<EnumVal ord="4">sbo-with-enhanced-security</EnumVal>
</EnumType>
<EnumType id="Beh">
<EnumVal ord="1">on</EnumVal>
<EnumVal ord="2">blocked</EnumVal>
<EnumVal ord="3">test</EnumVal>
<EnumVal ord="4">test/blocked</EnumVal>
<EnumVal ord="5">off</EnumVal>
</EnumType>
<EnumType id="Health">
<EnumVal ord="1">Ok</EnumVal>
<EnumVal ord="2">Warning</EnumVal>
<EnumVal ord="3">Alarm</EnumVal>
</EnumType>
<EnumType id="Mod">
<EnumVal ord="1">on</EnumVal>
<EnumVal ord="2">blocked</EnumVal>
<EnumVal ord="3">test</EnumVal>
<EnumVal ord="4">test/blocked</EnumVal>
<EnumVal ord="5">off</EnumVal>
</EnumType>
<EnumType id="dir">
<EnumVal ord="0">unknown</EnumVal>
<EnumVal ord="1">forward</EnumVal>
<EnumVal ord="2">backward</EnumVal>
<EnumVal ord="3">both</EnumVal>
</EnumType>
<EnumType id="angid">
<EnumVal ord="0">Va</EnumVal>
<EnumVal ord="1">Vb</EnumVal>
<EnumVal ord="2">Vc</EnumVal>
<EnumVal ord="3">Aa</EnumVal>
<EnumVal ord="4">Ab</EnumVal>
<EnumVal ord="5">Ac</EnumVal>
<EnumVal ord="6">Vab</EnumVal>
<EnumVal ord="7">Vbc</EnumVal>
<EnumVal ord="8">Vca</EnumVal>
<EnumVal ord="9">Vother</EnumVal>
61850-90-5/DTR IEC:201X (E) – 118 –
<EnumVal ord="10">Aother</EnumVal>
<EnumVal ord="11">Synchrophasor</EnumVal>
</EnumType>
</DataTypeTemplates>
</SCL>
61850-90-5/DTR IEC:201X (E) – 119 –
Annex B - SCL Examples for Direct PMU and PDC oriented
Communication (Informative)
<?xml version="1.0"?>
<SCL xmlns:sxy = "http://www.iec.ch/61850/2003/SCLcoordinates" xmlns:xsi = "http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation = "http://www.iec.ch/61850/2003/SCL;C:\Data\data\IECTC57\SCL-XML\Schema2007\SCL2.0\SCL.xsd"
xmlns = "http://www.iec.ch/61850/2003/SCL">
<Header id = "SynchroPhasor AA1 SED" toolID = "SSI-Tool" nameStructure = "IEDName"/>
<Substation name = "AA1" desc = "Substation">
<VoltageLevel name = "D1" desc = "Voltage Level">
<Bay name = "Q1" desc = "Bay" sxy:x = "55" sxy:y = "62" sxy:dir = "vertical">
<LNode iedName = "AA1FP1" ldInst = "PMU" lnClass = "MMXU" lnInst = "1"/>
<ConductingEquipment name = "BI1" desc = "Current Transformer" type = "CTR" sxy:x = "8" sxy:y = "15" sxy:dir =
"vertical">
<LNode iedName = "AA1FP1" ldInst = "PMU" lnClass = "TCTR" lnInst = "1"/>
<Terminal name = "AA1D1Q1N2" connectivityNode = "AA1/D1/Q1/N2" substationName = "AA1" voltageLevelName =
"D1" bayName = "Q1" cNodeName = "N2"/>
<Terminal name = "AA1D1Q1N3" connectivityNode = "AA1/D1/Q1/N3" substationName = "AA1" voltageLevelName =
"D1" bayName = "Q1" cNodeName = "N3"/>
</ConductingEquipment>
<ConductingEquipment name = "QC2" desc = "Isolator" type = "DIS" sxy:x = "10" sxy:y = "21" sxy:dir = "vertical">
<Terminal name = "AA1D1Q1N6" connectivityNode = "AA1/D1/Q1/N6" substationName = "AA1" voltageLevelName =
"D1" bayName = "Q1" cNodeName = "N6"/>
<Terminal name = "grounded" connectivityNode = "AA1/D1/Q1/grounded" substationName = "AA1" voltageLevelName =
"D1" bayName = "Q1" cNodeName = "grounded"/>
</ConductingEquipment>
<ConductingEquipment name = "BU2" desc = "Voltage Transformer 3Phase" type = "VTR" sxy:x = "12" sxy:y = "14" sxy:dir
= "vertical">
<LNode iedName = "AA1FP1" ldInst = "PMU" lnClass = "TVTR" lnInst = "1"/>
<Terminal name = "AA1D1Q1N3" connectivityNode = "AA1/D1/Q1/N3" substationName = "AA1" voltageLevelName =
"D1" bayName = "Q1" cNodeName = "N3"/>
</ConductingEquipment>
<ConductingEquipment name = "QB2" desc = "Isolator" type = "DIS" sxy:x = "12" sxy:y = "4" sxy:dir = "vertical">
<Terminal name = "AA1D1QBBN4" connectivityNode = "AA1/D1/QBB/N4" substationName = "AA1" voltageLevelName =
"D1" bayName = "QBB" cNodeName = "N4"/>
<Terminal name = "AA1D1Q1N5" connectivityNode = "AA1/D1/Q1/N5" substationName = "AA1" voltageLevelName =
"D1" bayName = "Q1" cNodeName = "N5"/>
</ConductingEquipment>
<ConductingEquipment name = "QC1" desc = "Isolator" type = "DIS" sxy:x = "10" sxy:y = "8" sxy:dir = "vertical">
<Terminal name = "AA1D1Q1N5" connectivityNode = "AA1/D1/Q1/N5" substationName = "AA1" voltageLevelName =
"D1" bayName = "Q1" cNodeName = "N5"/>
<Terminal name = "grounded" connectivityNode = "AA1/D1/Q1/grounded" substationName = "AA1" voltageLevelName =
"D1" bayName = "Q1" cNodeName = "grounded"/>
</ConductingEquipment>
<ConductingEquipment name = "BI3" desc = "Current Transformer" type = "CTR" sxy:x = "8" sxy:y = "19" sxy:dir =
"vertical">
<Terminal name = "AA1D1Q1N6" connectivityNode = "AA1/D1/Q1/N6" substationName = "AA1" voltageLevelName =
"D1" bayName = "Q1" cNodeName = "N6"/>
<Terminal name = "AA1D1Q1N4" connectivityNode = "AA1/D1/Q1/N4" substationName = "AA1" voltageLevelName =
"D1" bayName = "Q1" cNodeName = "N4"/>
</ConductingEquipment>
<ConductingEquipment name = "QA1" desc = "Circuit Breaker" type = "CBR" sxy:x = "8" sxy:y = "11" sxy:dir = "vertical">
<Terminal name = "AA1D1Q1N3" connectivityNode = "AA1/D1/Q1/N3" substationName = "AA1" voltageLevelName =
"D1" bayName = "Q1" cNodeName = "N3"/>
<Terminal name = "AA1D1Q1N5" connectivityNode = "AA1/D1/Q1/N5" substationName = "AA1" voltageLevelName =
"D1" bayName = "Q1" cNodeName = "N5"/>
</ConductingEquipment>
61850-90-5/DTR IEC:201X (E) – 120 –
<ConductingEquipment name = "BI2" desc = "Current Transformer" type = "CTR" sxy:x = "8" sxy:y = "17" sxy:dir =
"vertical">
<Terminal name = "AA1D1Q1N2" connectivityNode = "AA1/D1/Q1/N2" substationName = "AA1" voltageLevelName =
"D1" bayName = "Q1" cNodeName = "N2"/>
<Terminal name = "AA1D1Q1N4" connectivityNode = "AA1/D1/Q1/N4" substationName = "AA1" voltageLevelName =
"D1" bayName = "Q1" cNodeName = "N4"/>
</ConductingEquipment>
<ConductingEquipment name = "QB1" desc = "Isolator" type = "DIS" sxy:x = "6" sxy:y = "4" sxy:dir = "vertical">
<Terminal name = "AA1D1Q1N5" connectivityNode = "AA1/D1/Q1/N5" substationName = "AA1" voltageLevelName =
"D1" bayName = "Q1" cNodeName = "N5"/>
<Terminal name = "AA1D1QBBN1" connectivityNode = "AA1/D1/QBB/N1" substationName = "AA1" voltageLevelName =
"D1" bayName = "QBB" cNodeName = "N1"/>
</ConductingEquipment>
<ConductingEquipment name = "QB4" desc = "Isolator" type = "DIS" sxy:x = "8" sxy:y = "23" sxy:dir = "vertical">
<Terminal name = "AA1D1Q1N1" connectivityNode = "AA1/D1/Q1/N1" substationName = "AA1" voltageLevelName =
"D1" bayName = "Q1" cNodeName = "N1"/>
<Terminal name = "AA1D1Q1N6" connectivityNode = "AA1/D1/Q1/N6" substationName = "AA1" voltageLevelName =
"D1" bayName = "Q1" cNodeName = "N6"/>
</ConductingEquipment>
<ConductingEquipment name = "QC3" desc = "Isolator" type = "DIS" sxy:x = "10" sxy:y = "35" sxy:dir = "vertical">
<Terminal name = "AA1D1Q1N1" connectivityNode = "AA1/D1/Q1/N1" substationName = "AA1" voltageLevelName =
"D1" bayName = "Q1" cNodeName = "N1"/>
<Terminal name = "grounded" connectivityNode = "AA1/D1/Q1/grounded" substationName = "AA1" voltageLevelName =
"D1" bayName = "Q1" cNodeName = "grounded"/>
</ConductingEquipment>
<ConnectivityNode name = "N1" pathName = "AA1/D1/Q1/N1" sxy:x = "8" sxy:y = "31"/>
<ConnectivityNode name = "N2" pathName = "AA1/D1/Q1/N2" sxy:x = "8" sxy:y = "16"/>
<ConnectivityNode name = "N3" pathName = "AA1/D1/Q1/N3" sxy:x = "9" sxy:y = "13"/>
<ConnectivityNode name = "N6" pathName = "AA1/D1/Q1/N6" sxy:x = "8" sxy:y = "21"/>
<ConnectivityNode name = "N5" pathName = "AA1/D1/Q1/N5" sxy:x = "9" sxy:y = "6"/>
<ConnectivityNode name = "N4" pathName = "AA1/D1/Q1/N4" sxy:x = "8" sxy:y = "18"/>
</Bay>
<Bay name = "QBB" desc = "Bay" sxy:x = "63" sxy:y = "36" sxy:dir = "vertical">
<ConnectivityNode name = "N3" pathName = "AA1/D1/QBB/N3" sxy:x = "48" sxy:y = "12"/>
<ConnectivityNode name = "N2" pathName = "AA1/D1/QBB/N2" sxy:x = "47" sxy:y = "17"/>
<ConnectivityNode name = "N4" pathName = "AA1/D1/QBB/N4" sxy:x = "25" sxy:y = "18"/>
<ConnectivityNode name = "N1" pathName = "AA1/D1/QBB/N1" sxy:x = "22" sxy:y = "20"/>
</Bay>
</VoltageLevel>
</Substation>
<Communication>
<SubNetwork name = "AA1WA1" desc = "IEC61850 through both stations" type = "8-MMS">
<ConnectedAP iedName = "AA1OPC1" apName = "S1">
<Address>
<P type = "SA">0</P>
<P type = "IP">172.16.0.100</P>
<P type = "IP-SUBNET">255.255.0.0</P>
<P type = "OSI-AP-Title">1,3,9999,23</P>
<P type = "OSI-AE-Qualifier">23</P>
<P type = "OSI-TSEL">0001</P>
<P type = "OSI-PSEL">00000001</P>
<P type = "OSI-SSEL">0001</P>
</Address>
</ConnectedAP>
<ConnectedAP iedName = "AA1FP1" apName = "S1">
<Address>
<P type = "SA">0</P>
<P type = "IP">172.16.1.3</P>
<P type = "IP-SUBNET">255.255.0.0</P>
<P type = "OSI-AP-Title">1,3,9999,23</P>
<P type = "OSI-AE-Qualifier">23</P>
<P type = "OSI-TSEL">0001</P>
<P type = "OSI-PSEL">00000001</P>
<P type = "OSI-SSEL">0001</P>
</Address>
<SMV desc = "Phasor SVCB" ldInst = "PMU" cbName = "SyPh_SVCB1">
<Address>
<P type="VLAN-ID">004</P>
<P type="VLAN-PRIORITY">4</P>
<P type="APPID">3001</P>
<P type = "IP">172.16.0.100</P>
<P type = "IP-SUBNET">255.255.0.0</P>
</Address>
</SMV>
61850-90-5/DTR IEC:201X (E) – 121 –
</ConnectedAP>
</SubNetwork>
</Communication>
<IED name = "AA1OPC1" desc = "OPC Server" type = "OPCServer" manufacturer = "Whatever" configVersion = "1.0"
engRight = "fix" owner = "AA1">
<AccessPoint name = "S1">
<LN inst = "1" lnClass = "IHMI" lnType = "IHMI_OPCServer_IEC61850"/>
</AccessPoint>
</IED>
<IED name = "AA1FP1" type = "PMU" manufacturer = "Whatever" configVersion = "1.0"
engRight = "dataflow" owner = "AA1">
<Services>
<DynAssociation/>
<SettingGroups>
<SGEdit/>
</SettingGroups>
<GetDirectory/>
<GetDataObjectDefinition/>
<DataObjectDirectory/>
<GetDataSetValue/>
<ConfDataSet max = "50" maxAttributes = "240"/>
<ReadWrite/>
<ConfReportControl max = "100"/>
<GetCBValues/>
<ReportSettings datSet = "Conf" rptID = "Dyn" optFields = "Dyn" bufTime = "Dyn" trgOps = "Dyn" intgPd = "Dyn"/>
<SMVSettings datSet = "Conf"/>
</Services>
<AccessPoint name = "S1">
<Server>
<Authentication none = "true"/>
<LDevice inst = "PMU">
<LN0 inst = "" lnClass = "LLN0" lnType = "LLN0_RELx_IEC61850">
<DataSet name = "PMUdata">
<FCDA ldInst = "PMU" prefix = "" lnClass = "MMXU" lnInst = "1" doName = "A.phsA" fc = "MX"/>
<FCDA ldInst = "PMU" prefix = "" lnClass = "MMXU" lnInst = "1" doName = "A.phsB" fc = "MX"/>
<FCDA ldInst = "PMU" prefix = "" lnClass = "MMXU" lnInst = "1" doName = "A.phsC" fc = "MX"/>
<FCDA ldInst = "PMU" prefix = "" lnClass = "MMXU" lnInst = "1" doName = "Health" fc = "ST"/>
<FCDA ldInst = "PMU" prefix = "" lnClass = "LPHD" lnInst = "1" doName = "PhyHealth" fc = "ST"/>
</DataSet>
<DataSet name = "StatUrgentA" desc = "Status Data used to update process pictures and to generate alarms.">
<FCDA ldInst = "PMU" prefix = "" lnClass = "LPHD" lnInst = "1" doName = "PhyHealth" fc = "ST"/>
<FCDA ldInst = "PMU" prefix = "" lnClass = "TVTR" lnInst = "1" doName = "FuFail" fc = "ST"/>
<FCDA ldInst = "PMU" prefix = "" lnClass = "LLN0" doName = "Mod" fc = "ST"/>
</DataSet>
<ReportControl name = "rcb_A" datSet = "StatUrgentA" confRev = "2" bufTime = "100" buffered = "true">
<TrgOps dchg = "true" qchg = "true"/>
<OptFields/>
<RptEnabled max = "5">
<ClientLN iedName = "AA1OPC1" ldInst = "none" lnInst = "1" lnClass = "IHMI"/>
</RptEnabled>
</ReportControl>
<SampledValueControl name = "SyPh_SVCB1" desc = "Phasor SVCB" datSet = "PMUdata" confRev = "1" smvID =
"MyPhasors AA1" smpRate = "2" nofASDU = "1">
<Protocol mustUnderstand=”true”>R-SV</Protocol>
<SmvOpts refreshTime = "true" sampleRate = "true"/>
<IEDName>AA1OPC1</IEDName> <!-- the destination IED -->
</SampledValueControl>
</LN0>
<LN inst = "1" lnClass = "LPHD" lnType = "Physical Device_RELx_IEC61850"/>
<LN inst = "1" lnClass = "TCTR" lnType = "CT_RELx_IEC61850"/>
<LN inst = "1" lnClass = "TVTR" lnType = "VT_RELx_IEC61850"/>
<LN inst = "1" desc = "Synchrophasor measurements" lnClass = "MMXU" lnType = "Syph_RELx_IEC61850">
<DOI name = "PhV">
<SDI name = "phsA">
<DAI name = "angRef">
<Val>Synchrophasor</Val>
</DAI>
</SDI>
<SDI name = "phsB">
<DAI name = "angRef">
<Val>Synchrophasor</Val>
</DAI>
</SDI>
<SDI name = "phsC">
61850-90-5/DTR IEC:201X (E) – 122 –
<DAI name = "angRef">
<Val>Synchrophasor</Val>
</DAI>
</SDI>
</DOI>
<DOI name = "A">
<SDI name = "phsA">
<DAI name = "angRef">
<Val>Synchrophasor</Val>
</DAI>
</SDI>
<SDI name = "phsB">
<DAI name = "angRef">
<Val>Synchrophasor</Val>
</DAI>
</SDI>
<SDI name = "phsC">
<DAI name = "angRef">
<Val>Synchrophasor</Val>
</DAI>
</SDI>
</DOI>
</LN>
</LDevice>
</Server>
</AccessPoint>
</IED>
<DataTypeTemplates>
...
<LNodeType id = "Syph_RELx_IEC61850" lnClass = "MMXU">
<DO name = "Beh" type = "tcBeh_RECx_IEC61850"/>
<DO name = "Health" type = "tcHealth_RECx_IEC61850"/>
<DO name = "Mod" type = "tcROMod_RECx_IEC61850"/>
<DO name = "NamPlt" type = "tcLPL_RECx_IEC61850"/>
<DO name = "PhV" desc = "Voltage phasors" type = "tcSyphWYE"/>
<DO name = "A" desc = "Current phasors" type = "tcSyphWYE"/>
</LNodeType>
<LNodeType id = "CT_RELx_IEC61850" lnClass = "TCTR">
<DO name = "Beh" type = "tcBeh_RECx_IEC61850"/>
<DO name = "Health" type = "tcHealth_RECx_IEC61850"/>
<DO name = "Mod" type = "tcROMod_RECx_IEC61850"/>
<DO name = "NamPlt" type = "tcLPL_RECx_IEC61850"/>
</LNodeType>
<LNodeType id = "VT_RELx_IEC61850" lnClass = "TVTR">
<DO name = "Beh" type = "tcBeh_RECx_IEC61850"/>
<DO name = "Health" type = "tcHealth_RECx_IEC61850"/>
<DO name = "Mod" type = "tcROMod_RECx_IEC61850"/>
<DO name = "NamPlt" type = "tcLPL_RECx_IEC61850"/>
<DO name = "FuFail" desc = "VT supply failure (MCB)" type = "tcSPS_RECx_IEC61850"/>
</LNodeType>
<LNodeType id = "Physical Device_RELx_IEC61850" lnClass = "LPHD">
<DO name = "PhyNam" type = "tcDPL_RELx_IEC61850"/>
<DO name = "Beh" type = "tcBeh_RELx_IEC61850"/>
<DO name = "PhyHealth" desc = "Relay ready" type = "tcHealth_RELx_IEC61850"/>
<DO name = "Proxy" type = "tcSPS_RELx_IEC61850"/>
</LNodeType>
...
<DOType id = "ABB_aWYECMV" cdc = "CMV">
<DA name = "cVal" fc = "MX" dchg = "true" bType = "Struct" type = "ABB_aVector"/>
<DA name = "q" fc = "MX" qchg = "true" bType = "Quality"/>
<DA name = "t" fc = "MX" bType = "Timestamp"/>
<DA name = "angRef" fc = "CF" bType = "Enum" type = "angid"/>
</DOType>
<DOType id = "tcSyphWYE" cdc = "WYE">
<SDO name = "phsA" type = "ABB_aWYECMV"/>
<SDO name = "phsB" type = "ABB_aWYECMV"/>
<SDO name = "phsC" type = "ABB_aWYECMV"/>
</DOType>
<DAType id = "ABB_aVector">
<BDA name = "mag" bType = "Struct" type = "ABB_aAnalogueValue"/>
<BDA name = "ang" bType = "Struct" type = "ABB_aAnalogueValue"/>
</DAType>
<DAType id = "ABB_aAnalogueValue">
<BDA name = "f" bType = "FLOAT32"/>
61850-90-5/DTR IEC:201X (E) – 123 –
</DAType>
<EnumType id = "ctlModel">
<EnumVal ord = "0">status-only</EnumVal>
<EnumVal ord = "1">direct-with-normal-security</EnumVal>
<EnumVal ord = "2">sbo-with-normal-security</EnumVal>
<EnumVal ord = "3">direct-with-enhanced-security</EnumVal>
<EnumVal ord = "4">sbo-with-enhanced-security</EnumVal>
</EnumType>
<EnumType id = "Beh">
<EnumVal ord = "1">on</EnumVal>
<EnumVal ord = "2">blocked</EnumVal>
<EnumVal ord = "3">test</EnumVal>
<EnumVal ord = "4">test/blocked</EnumVal>
<EnumVal ord = "5">off</EnumVal>
</EnumType>
<EnumType id = "Health">
<EnumVal ord = "1">Ok</EnumVal>
<EnumVal ord = "2">Warning</EnumVal>
<EnumVal ord = "3">Alarm</EnumVal>
</EnumType>
<EnumType id = "Mod">
<EnumVal ord = "1">on</EnumVal>
<EnumVal ord = "2">blocked</EnumVal>
<EnumVal ord = "3">test</EnumVal>
<EnumVal ord = "4">test/blocked</EnumVal>
<EnumVal ord = "5">off</EnumVal>
</EnumType>
<EnumType id = "angid">
<EnumVal ord = "0">Va</EnumVal>
<EnumVal ord = "1">Vb</EnumVal>
<EnumVal ord = "2">Vc</EnumVal>
<EnumVal ord = "3">Aa</EnumVal>
<EnumVal ord = "4">Ab</EnumVal>
<EnumVal ord = "5">Ac</EnumVal>
<EnumVal ord = "6">Vab</EnumVal>
<EnumVal ord = "7">Vbc</EnumVal>
<EnumVal ord = "8">Vca</EnumVal>
<EnumVal ord = "9">Vother</EnumVal>
<EnumVal ord = "10">Aother</EnumVal>
<EnumVal ord = "11">Synchrophasor</EnumVal>
</EnumType>
</DataTypeTemplates>
</SCL>
,,
61850-90-5/DTR IEC:201X (E) – 124 –
This example SCD file describes the center project of Figure 7-2 with IED AA1TH1 as PDC for
AA1F1 and AA10F1. The synchrphasor data belongs to bay AA1D1Q1, whose single line is
shown in Figure 15-1. From this it is easily seen how the IID file for AA1TH1 would look like
(just remove AA10KA1 and all references to it).
<?xml version="1.0"?>
<SCL xmlns:sxy="http://www.iec.ch/61850/2003/SCLcoordinates"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.iec.ch/61850/2003/SCL
C:\Data\data\IECTC57\SCL-
XML\Schema2007\SCL2.0\SCL.xsd" xmlns="http://www.iec.ch/61850/2003/SCL">
<Header id="SynchroPhasor AA1 SED" toolID="SSI-Tool" nameStructure="IEDName" />
<Substation name="AA1" desc="Substation">
<VoltageLevel name="D1" desc="Voltage Level">
<Bay name="Q1" desc="Bay" sxy:x="55" sxy:y="62" sxy:dir="vertical">
<LNode iedName="AA10TH1" ldInst="AA1F1PMU" lnClass="MMXU" lnInst="1" />
<ConductingEquipment name="BI1" desc="Current Transformer" type="CTR" sxy:x="8"
sxy:y="15" sxy:dir="vertical">
<LNode iedName="AA10TH1" ldInst="AA1F1PMU" lnClass="TCTR" lnInst="1" />
<Terminal name="AA1D1Q1N2" connectivityNode="AA1/D1/Q1/N2" substationName="AA1"
voltageLevelName="D1" bayName="Q1" cNodeName="N2" />
<Terminal name="AA1D1Q1N3" connectivityNode="AA1/D1/Q1/N3" substationName="AA1"
voltageLevelName="D1" bayName="Q1" cNodeName="N3" />
</ConductingEquipment>
<ConductingEquipment name="QC2" desc="Isolator" type="DIS" sxy:x="10" sxy:y="21"
sxy:dir="vertical">
<Terminal name="AA1D1Q1N6" connectivityNode="AA1/D1/Q1/N6" substationName="AA1"
voltageLevelName="D1" bayName="Q1" cNodeName="N6" />
<Terminal name="grounded" connectivityNode="AA1/D1/Q1/grounded"
substationName="AA1" voltageLevelName="D1" bayName="Q1" cNodeName="grounded" />
</ConductingEquipment>
<ConductingEquipment name="BU2" desc="Voltage Transformer 3Phase" type="VTR"
sxy:x="12" sxy:y="14" sxy:dir="vertical">
<LNode iedName="AA10TH1" ldInst="AA1F1PMU" lnClass="TVTR" lnInst="1" />
<Terminal name="AA1D1Q1N3" connectivityNode="AA1/D1/Q1/N3" substationName="AA1"
voltageLevelName="D1" bayName="Q1" cNodeName="N3" />
</ConductingEquipment>
<ConductingEquipment name="QB2" desc="Isolator" type="DIS" sxy:x="12" sxy:y="4"
sxy:dir="vertical">
<Terminal name="AA1D1QBBN4" connectivityNode="AA1/D1/QBB/N4"
substationName="AA1" voltageLevelName="D1" bayName="QBB" cNodeName="N4" />
<Terminal name="AA1D1Q1N5" connectivityNode="AA1/D1/Q1/N5" substationName="AA1"
voltageLevelName="D1" bayName="Q1" cNodeName="N5" />
</ConductingEquipment>
<ConductingEquipment name="QC1" desc="Isolator" type="DIS" sxy:x="10" sxy:y="8"
sxy:dir="vertical">
<Terminal name="AA1D1Q1N5" connectivityNode="AA1/D1/Q1/N5" substationName="AA1"
voltageLevelName="D1" bayName="Q1" cNodeName="N5" />
<Terminal name="grounded" connectivityNode="AA1/D1/Q1/grounded"
substationName="AA1" voltageLevelName="D1" bayName="Q1" cNodeName="grounded" />
</ConductingEquipment>
<ConductingEquipment name="BI3" desc="Current Transformer" type="CTR" sxy:x="8"
sxy:y="19" sxy:dir="vertical">
61850-90-5/DTR IEC:201X (E) – 125 –
<Terminal name="AA1D1Q1N6" connectivityNode="AA1/D1/Q1/N6" substationName="AA1"
voltageLevelName="D1" bayName="Q1" cNodeName="N6" />
<Terminal name="AA1D1Q1N4" connectivityNode="AA1/D1/Q1/N4" substationName="AA1"
voltageLevelName="D1" bayName="Q1" cNodeName="N4" />
</ConductingEquipment>
<ConductingEquipment name="QA1" desc="Circuit Breaker" type="CBR" sxy:x="8" sxy:y="11"
sxy:dir="vertical">
<Terminal name="AA1D1Q1N3" connectivityNode="AA1/D1/Q1/N3" substationName="AA1"
voltageLevelName="D1" bayName="Q1" cNodeName="N3" />
<Terminal name="AA1D1Q1N5" connectivityNode="AA1/D1/Q1/N5" substationName="AA1"
voltageLevelName="D1" bayName="Q1" cNodeName="N5" />
</ConductingEquipment>
<ConductingEquipment name="BI2" desc="Current Transformer" type="CTR" sxy:x="8"
sxy:y="17" sxy:dir="vertical">
<Terminal name="AA1D1Q1N2" connectivityNode="AA1/D1/Q1/N2" substationName="AA1"
voltageLevelName="D1" bayName="Q1" cNodeName="N2" />
<Terminal name="AA1D1Q1N4" connectivityNode="AA1/D1/Q1/N4" substationName="AA1"
voltageLevelName="D1" bayName="Q1" cNodeName="N4" />
</ConductingEquipment>
<ConductingEquipment name="QB1" desc="Isolator" type="DIS" sxy:x="6" sxy:y="4"
sxy:dir="vertical">
<Terminal name="AA1D1Q1N5" connectivityNode="AA1/D1/Q1/N5" substationName="AA1"
voltageLevelName="D1" bayName="Q1" cNodeName="N5" />
<Terminal name="AA1D1QBBN1" connectivityNode="AA1/D1/QBB/N1"
substationName="AA1" voltageLevelName="D1" bayName="QBB" cNodeName="N1" />
</ConductingEquipment>
<ConductingEquipment name="QB4" desc="Isolator" type="DIS" sxy:x="8" sxy:y="23"
sxy:dir="vertical">
<Terminal name="AA1D1Q1N1" connectivityNode="AA1/D1/Q1/N1" substationName="AA1"
voltageLevelName="D1" bayName="Q1" cNodeName="N1" />
<Terminal name="AA1D1Q1N6" connectivityNode="AA1/D1/Q1/N6" substationName="AA1"
voltageLevelName="D1" bayName="Q1" cNodeName="N6" />
</ConductingEquipment>
<ConductingEquipment name="QC3" desc="Isolator" type="DIS" sxy:x="10" sxy:y="35"
sxy:dir="vertical">
<Terminal name="AA1D1Q1N1" connectivityNode="AA1/D1/Q1/N1" substationName="AA1"
voltageLevelName="D1" bayName="Q1" cNodeName="N1" />
<Terminal name="grounded" connectivityNode="AA1/D1/Q1/grounded"
substationName="AA1" voltageLevelName="D1" bayName="Q1" cNodeName="grounded" />
</ConductingEquipment>
<ConnectivityNode name="N1" pathName="AA1/D1/Q1/N1" sxy:x="8" sxy:y="31" />
<ConnectivityNode name="N2" pathName="AA1/D1/Q1/N2" sxy:x="8" sxy:y="16" />
<ConnectivityNode name="N3" pathName="AA1/D1/Q1/N3" sxy:x="9" sxy:y="13" />
<ConnectivityNode name="N6" pathName="AA1/D1/Q1/N6" sxy:x="8" sxy:y="21" />
<ConnectivityNode name="N5" pathName="AA1/D1/Q1/N5" sxy:x="9" sxy:y="6" />
<ConnectivityNode name="N4" pathName="AA1/D1/Q1/N4" sxy:x="8" sxy:y="18" />
</Bay>
<Bay name="QBB" desc="Bay" sxy:x="63" sxy:y="36" sxy:dir="vertical">
<ConnectivityNode name="N3" pathName="AA1/D1/QBB/N3" sxy:x="48" sxy:y="12" />
<ConnectivityNode name="N2" pathName="AA1/D1/QBB/N2" sxy:x="47" sxy:y="17" />
<ConnectivityNode name="N4" pathName="AA1/D1/QBB/N4" sxy:x="25" sxy:y="18" />
<ConnectivityNode name="N1" pathName="AA1/D1/QBB/N1" sxy:x="22" sxy:y="20" />
</Bay>
</VoltageLevel>
</Substation>
<Substation name="AA2" desc="Substation" sxy:x="120" sxy:y="62">
<VoltageLevel name="D1" desc="Voltage Level">
<Bay name="Q1" desc="Bay" sxy:x="55" sxy:y="62" sxy:dir="vertical">
<LNode iedName="AA10TH1" ldInst="AA10F1PMU" lnClass="MMXU" lnInst="1" />
61850-90-5/DTR IEC:201X (E) – 126 –
<ConductingEquipment name="BI1" desc="Current Transformer" type="CTR" sxy:x="8"
sxy:y="15" sxy:dir="vertical">
<LNode iedName="AA10TH1" ldInst="AA10F1PMU" lnClass="TCTR" lnInst="1" />
<Terminal name="AA1D1Q1N2" connectivityNode="AA2/D1/Q1/N2" substationName="AA2"
voltageLevelName="D1" bayName="Q1" cNodeName="N2" />
<Terminal name="AA1D1Q1N3" connectivityNode="AA2/D1/Q1/N3" substationName="AA2"
voltageLevelName="D1" bayName="Q1" cNodeName="N3" />
</ConductingEquipment>
<ConductingEquipment name="QC2" desc="Isolator" type="DIS" sxy:x="10" sxy:y="21"
sxy:dir="vertical">
<Terminal name="AA1D1Q1N6" connectivityNode="AA2/D1/Q1/N6" substationName="AA2"
voltageLevelName="D1" bayName="Q1" cNodeName="N6" />
<Terminal name="grounded" connectivityNode="AA2/D1/Q1/grounded"
substationName="AA2" voltageLevelName="D1" bayName="Q1" cNodeName="grounded" />
</ConductingEquipment>
<ConductingEquipment name="BU2" desc="Voltage Transformer 3Phase" type="VTR"
sxy:x="12" sxy:y="14" sxy:dir="vertical">
<LNode iedName="AA10TH1" ldInst="AA10F1PMU" lnClass="TVTR" lnInst="1" />
<Terminal name="AA1D1Q1N3" connectivityNode="AA2/D1/Q1/N3" substationName="AA2"
voltageLevelName="D1" bayName="Q1" cNodeName="N3" />
</ConductingEquipment>
<ConductingEquipment name="QB2" desc="Isolator" type="DIS" sxy:x="12" sxy:y="4"
sxy:dir="vertical">
<Terminal name="AA1D1QBBN4" connectivityNode="AA2/D1/QBB/N4"
substationName="AA2" voltageLevelName="D1" bayName="QBB" cNodeName="N4" />
<Terminal name="AA1D1Q1N5" connectivityNode="AA2/D1/Q1/N5" substationName="AA2"
voltageLevelName="D1" bayName="Q1" cNodeName="N5" />
</ConductingEquipment>
<ConductingEquipment name="QC1" desc="Isolator" type="DIS" sxy:x="10" sxy:y="8"
sxy:dir="vertical">
<Terminal name="AA1D1Q1N5" connectivityNode="AA2/D1/Q1/N5" substationName="AA2"
voltageLevelName="D1" bayName="Q1" cNodeName="N5" />
<Terminal name="grounded" connectivityNode="AA2/D1/Q1/grounded"
substationName="AA2" voltageLevelName="D1" bayName="Q1" cNodeName="grounded" />
</ConductingEquipment>
<ConductingEquipment name="BI3" desc="Current Transformer" type="CTR" sxy:x="8"
sxy:y="19" sxy:dir="vertical">
<Terminal name="AA1D1Q1N6" connectivityNode="AA2/D1/Q1/N6" substationName="AA2"
voltageLevelName="D1" bayName="Q1" cNodeName="N6" />
<Terminal name="AA1D1Q1N4" connectivityNode="AA2/D1/Q1/N4" substationName="AA2"
voltageLevelName="D1" bayName="Q1" cNodeName="N4" />
</ConductingEquipment>
<ConductingEquipment name="QA1" desc="Circuit Breaker" type="CBR" sxy:x="8" sxy:y="11"
sxy:dir="vertical">
<Terminal name="AA1D1Q1N3" connectivityNode="AA2/D1/Q1/N3" substationName="AA2"
voltageLevelName="D1" bayName="Q1" cNodeName="N3" />
<Terminal name="AA1D1Q1N5" connectivityNode="AA2/D1/Q1/N5" substationName="AA2"
voltageLevelName="D1" bayName="Q1" cNodeName="N5" />
</ConductingEquipment>
<ConductingEquipment name="BI2" desc="Current Transformer" type="CTR" sxy:x="8"
sxy:y="17" sxy:dir="vertical">
<Terminal name="AA1D1Q1N2" connectivityNode="AA2/D1/Q1/N2" substationName="AA2"
voltageLevelName="D1" bayName="Q1" cNodeName="N2" />
<Terminal name="AA1D1Q1N4" connectivityNode="AA2/D1/Q1/N4" substationName="AA2"
voltageLevelName="D1" bayName="Q1" cNodeName="N4" />
</ConductingEquipment>
<ConductingEquipment name="QB1" desc="Isolator" type="DIS" sxy:x="6" sxy:y="4"
sxy:dir="vertical">
61850-90-5/DTR IEC:201X (E) – 127 –
<Terminal name="AA1D1Q1N5" connectivityNode="AA2/D1/Q1/N5" substationName="AA2"
voltageLevelName="D1" bayName="Q1" cNodeName="N5" />
<Terminal name="AA1D1QBBN1" connectivityNode="AA2/D1/QBB/N1"
substationName="AA2" voltageLevelName="D1" bayName="QBB" cNodeName="N1" />
</ConductingEquipment>
<ConductingEquipment name="QB4" desc="Isolator" type="DIS" sxy:x="8" sxy:y="23"
sxy:dir="vertical">
<Terminal name="AA1D1Q1N1" connectivityNode="AA2/D1/Q1/N1" substationName="AA2"
voltageLevelName="D1" bayName="Q1" cNodeName="N1" />
<Terminal name="AA1D1Q1N6" connectivityNode="AA2/D1/Q1/N6" substationName="AA2"
voltageLevelName="D1" bayName="Q1" cNodeName="N6" />
</ConductingEquipment>
<ConductingEquipment name="QC3" desc="Isolator" type="DIS" sxy:x="10" sxy:y="35"
sxy:dir="vertical">
<Terminal name="AA1D1Q1N1" connectivityNode="AA2/D1/Q1/N1" substationName="AA2"
voltageLevelName="D1" bayName="Q1" cNodeName="N1" />
<Terminal name="grounded" connectivityNode="AA2/D1/Q1/grounded"
substationName="AA2" voltageLevelName="D1" bayName="Q1" cNodeName="grounded" />
</ConductingEquipment>
<ConnectivityNode name="N1" pathName="AA2/D1/Q1/N1" sxy:x="8" sxy:y="31" />
<ConnectivityNode name="N2" pathName="AA2/D1/Q1/N2" sxy:x="8" sxy:y="16" />
<ConnectivityNode name="N3" pathName="AA2/D1/Q1/N3" sxy:x="9" sxy:y="13" />
<ConnectivityNode name="N6" pathName="AA2/D1/Q1/N6" sxy:x="8" sxy:y="21" />
<ConnectivityNode name="N5" pathName="AA2/D1/Q1/N5" sxy:x="9" sxy:y="6" />
<ConnectivityNode name="N4" pathName="AA2/D1/Q1/N4" sxy:x="8" sxy:y="18" />
</Bay>
<Bay name="QBB" desc="Bay" sxy:x="63" sxy:y="36" sxy:dir="vertical">
<ConnectivityNode name="N3" pathName="AA2/D1/QBB/N3" sxy:x="48" sxy:y="12" />
<ConnectivityNode name="N2" pathName="AA2/D1/QBB/N2" sxy:x="47" sxy:y="17" />
<ConnectivityNode name="N4" pathName="AA2/D1/QBB/N4" sxy:x="25" sxy:y="18" />
<ConnectivityNode name="N1" pathName="AA2/D1/QBB/N1" sxy:x="22" sxy:y="20" />
</Bay>
</VoltageLevel>
</Substation>
<Communication>
<SubNetwork name="AA1WA1" desc="IEC61850in center project" type="8-MMS">
<ConnectedAP iedName="AA10KA1" apName="S1">
<Address>
<P type="SA">0</P>
<P type="IP">172.20.0.100</P>
<P type="IP-SUBNET">255.255.0.0</P>
<P type="OSI-AP-Title">1,3,9999,23</P>
<P type="OSI-AE-Qualifier">23</P>
<P type="OSI-TSEL">0001</P>
<P type="OSI-PSEL">00000001</P>
<P type="OSI-SSEL">0001</P>
</Address>
</ConnectedAP>
<ConnectedAP iedName="AA10TH1" apName="S1">
<Address>
<P type="SA">0</P>
<P type="IP">172.20.1.3</P>
<P type="IP-SUBNET">255.255.0.0</P>
<P type="OSI-AP-Title">1,3,9999,23</P>
<P type="OSI-AE-Qualifier">23</P>
<P type="OSI-TSEL">0001</P>
<P type="OSI-PSEL">00000001</P>
<P type="OSI-SSEL">0001</P>
</Address>
61850-90-5/DTR IEC:201X (E) – 128 –
<SMV desc="Phasor SVCB" ldInst="PDC" cbName="SyPh_SVCB1" />
</ConnectedAP>
</SubNetwork>
</Communication>
<IED name="AA10KA1" desc="OPC Server" type="OPCServer" manufacturer="Whatever"
configVersion="1.0">
<AccessPoint name="S1">
<LN inst="1" lnClass="IHMI" lnType="IHMI_OPCServer_IEC61850" />
</AccessPoint>
</IED>
<IED name="AA10TH1" type="PDC" manufacturer="Whatever" configVersion="1.0">
<Services>
<DynAssociation />
<GetDirectory />
<GetDataObjectDefinition />
<DataObjectDirectory />
<GetDataSetValue />
<ConfDataSet max="50" maxAttributes="240" />
<ReadWrite />
<ConfReportControl max="100" />
<GetCBValues />
<ReportSettings datSet="Conf" rptID="Dyn" optFields="Dyn" bufTime="Dyn" trgOps="Dyn"
intgPd="Dyn" />
<SMVSettings datSet="Conf" />
</Services>
<AccessPoint name="S1">
<Server>
<Authentication none="true" />
<LDevice inst="PDC">
<LN0 inst="" lnClass="LLN0" lnType="LLN0_RELx_IEC61850">
<DataSet name="PMUdata" desc=”Common Synchrophasor message” >
<FCDA ldInst="AA1F1PMU" prefix="" lnClass="MMXU" lnInst="1" doName="A.phsA"
fc="MX" />
<FCDA ldInst="AA1F1PMU" prefix="" lnClass="MMXU" lnInst="1" doName="A.phsB"
fc="MX" />
<FCDA ldInst="AA1F1PMU" prefix="" lnClass="MMXU" lnInst="1" doName="A.phsC"
fc="MX" />
<FCDA ldInst="AA1F1PMU" prefix="" lnClass="MMXU" lnInst="1" doName="Health"
fc="ST" />
<FCDA ldInst="AA1F1PMU" prefix="" lnClass="LPHD" lnInst="1" doName="PhyHealth"
fc="ST" />
<FCDA ldInst="AA10F1PMU" prefix="" lnClass="MMXU" lnInst="1" doName="A.phsA"
fc="MX" />
<FCDA ldInst="AA10F1PMU" prefix="" lnClass="MMXU" lnInst="1" doName="A.phsB"
fc="MX" />
<FCDA ldInst="AA10F1PMU" prefix="" lnClass="MMXU" lnInst="1" doName="A.phsC"
fc="MX" />
<FCDA ldInst="AA10F1PMU" prefix="" lnClass="MMXU" lnInst="1" doName="Health"
fc="ST" />
<FCDA ldInst="AA10F1PMU" prefix="" lnClass="LPHD" lnInst="1" doName="PhyHealth"
fc="ST" />
</DataSet>
<DataSet name="StatUrgentA" desc="Status Data used to update process pictures and to
generate alarms.">
<FCDA ldInst="AA1F1PMU" prefix="" lnClass="LPHD" lnInst="1" doName="PhyHealth"
fc="ST" />
<FCDA ldInst="AA1F1PMU" prefix="" lnClass="TVTR" lnInst="1" doName="FuFail"
fc="ST" />
<FCDA ldInst="AA1F1PMU" prefix="" lnClass="LLN0" doName="Mod" fc="ST" />
61850-90-5/DTR IEC:201X (E) – 129 –
<FCDA ldInst="AA1F1PMU" prefix="" lnClass="LPHD" lnInst="1" doName="PhyHealth"
fc="ST" />
<FCDA ldInst="AA1F1PMU" prefix="" lnClass="TVTR" lnInst="1" doName="FuFail"
fc="ST" />
<FCDA ldInst="AA1F1PMU" prefix="" lnClass="LLN0" doName="Mod" fc="ST" />
<FCDA ldInst="PDC" prefix="" lnClass="LPHD" lnInst="1" doName="PhyHealth" fc="ST"
/>
<FCDA ldInst="PDC" prefix="" lnClass="LLN0" doName="Mod" fc="ST" />
</DataSet>
<ReportControl name="rcb_A" datSet="StatUrgentA" confRev="2" bufTime="100"
buffered="true">
<TrgOps dchg="true" qchg="true" />
<OptFields />
<RptEnabled max="5">
<ClientLN iedName="AA10KA1" ldInst="none" lnInst="1" lnClass="IHMI" />
</RptEnabled>
</ReportControl>
<SampledValueControl name="SyPh_SVCB1" desc="Phasor SVCB" datSet="PMUdata"
confRev="1" smvID="MyPhasors AA1+ AA2" smpRate="1" nofASDU="1" >
<Protocol mustUnderstand=”true”>R-SV</Protocol>
</SampledValueControl>
<IEDName>AA10KA1</IEDName>
<SmvOpts refreshTime="true" sampleRate="true" />
</SampledValueControl>
</LN0>
<LN inst="1" lnClass="LPHD" lnType="Physical Device_RELx_IEC61850">
<DOI name="Proxy">
<DAI name="stVal" valKind="RO">
<Val>0</Val>
</DAI>
</DOI>
</LN>
</LDevice>
<LDevice inst="AA1F1PMU">
<LN0 inst="" lnClass="LLN0" lnType="LLN0_RELx_IEC61850" />
<LN inst="1" lnClass="LPHD" lnType="Physical Device_RELx_IEC61850">
<DOI name="Proxy">
<DAI name="stVal" valKind="RO">
<Val>1</Val>
</DAI>
</DOI>
</LN>
<LN inst="1" lnClass="TCTR" lnType="CT_RELx_IEC61850" />
<LN inst="1" lnClass="TVTR" lnType="VT_RELx_IEC61850" />
<LN inst="1" desc="Synchrophasor measurements" lnClass="MMXU"
lnType="Syph_RELx_IEC61850">
<DOI name="PhV">
<SDI name="phsA">
<DAI name="angRef">
<Val>Synchrophasor</Val>
</DAI>
</SDI>
<SDI name="phsB">
<DAI name="angRef">
<Val>Synchrophasor</Val>
</DAI>
</SDI>
<SDI name="phsC">
<DAI name="angRef">
61850-90-5/DTR IEC:201X (E) – 130 –
<Val>Synchrophasor</Val>
</DAI>
</SDI>
</DOI>
<DOI name="A">
<SDI name="phsA">
<DAI name="angRef">
<Val>Synchrophasor</Val>
</DAI>
</SDI>
<SDI name="phsB">
<DAI name="angRef">
<Val>Synchrophasor</Val>
</DAI>
</SDI>
<SDI name="phsC">
<DAI name="angRef">
<Val>Synchrophasor</Val>
</DAI>
</SDI>
</DOI>
</LN>
</LDevice>
<LDevice inst="AA10F1PMU">
<LN0 inst="" lnClass="LLN0" lnType="LLN0_RELx_IEC61850" />
<LN inst="1" lnClass="LPHD" lnType="Physical Device_RELx_IEC61850">
<DOI name="Proxy">
<DAI name="stVal" valKind="RO">
<Val>1</Val>
</DAI>
</DOI>
</LN>
<LN inst="1" lnClass="TCTR" lnType="CT_RELx_IEC61850" />
<LN inst="1" lnClass="TVTR" lnType="VT_RELx_IEC61850" />
<LN inst="1" desc="Synchrophasor measurements" lnClass="MMXU"
lnType="Syph_RELx_IEC61850">
<DOI name="PhV">
<SDI name="phsA">
<DAI name="angRef">
<Val>Synchrophasor</Val>
</DAI>
</SDI>
<SDI name="phsB">
<DAI name="angRef">
<Val>Synchrophasor</Val>
</DAI>
</SDI>
<SDI name="phsC">
<DAI name="angRef">
<Val>Synchrophasor</Val>
</DAI>
</SDI>
</DOI>
<DOI name="A">
<SDI name="phsA">
<DAI name="angRef">
<Val>Synchrophasor</Val>
</DAI>
</SDI>
61850-90-5/DTR IEC:201X (E) – 131 –
<SDI name="phsB">
<DAI name="angRef">
<Val>Synchrophasor</Val>
</DAI>
</SDI>
<SDI name="phsC">
<DAI name="angRef">
<Val>Synchrophasor</Val>
</DAI>
</SDI>
</DOI>
</LN>
</LDevice>
</Server>
</AccessPoint>
</IED>
<DataTypeTemplates>
…. Same as in previous example
</DataTypeTemplates>
</SCL>
61850-90-5/DTR IEC:201X (E) – 132 –
Annex C - Migration from IEEE C37.118 to IEC 61850
(informative)
C.1 General
In 2005, IEEE C37.118 - Synchrophasors for Power Systems was published. The scope of
this standard was:
Based upon the scope, there are two aspects to the standard:
1. Measurement and time tagging specifications that allow for the creation of a
synchronized phasor measurement.
This message format specifies a packet structure, but does not standardize a
communication profile over which to exchange the packet.
During the standardization process, the use of IEC 61850 was discussed as an
alternative to the “packet” structure. However, due to time constraints and industry
pressures, the inclusion of IEC 61850 did not occur for the first publication of the
standard.
In the late 2008-early 2009, IEEE requested IEC for a joint logo regarding IEEE C37.118.
However, with the scope defined in IEEE C37.118, such a request needed to be coordinated
between two different IEC Technical Committees (TCs).
TC95 Scope: Standardization of measuring relays and protection equipment used in the
various fields of electrical engineering covered by the IEC, taking into account
combinations of devices to form schemes for power system protection including the
control, monitoring and process interface equipment used with those systems.
TC57 Scope: To prepare international standards for power systems control equipment
and systems including EMS (Energy Management Systems), SCADA (Supervisory
Control And Data Acquisition), distribution automation, teleprotection, and associated
information exchange for real-time and non-real-time information, used in the planning,
operation and maintenance of power systems. Power systems management comprises
control within control centres, substations and individual pieces of primary equipment
including telecontrol and interfaces to equipment, systems and databases, which may
be outside the scope of TC 57.
In order to accommodate IEEE coordination with the two (2) IEC TCs, and to allow
synchrophasor information to be exchanged via IEC 61850, IEEE issued a Project
Authorization Requests (PAR) in 2010 to split the IEEE C37.118 standard into two distinct
61850-90-5/DTR IEC:201X (E) – 133 –
parts.
IEEE C37.118.2 - A message format to convey the measured information. This part
supports te legacy C37.118 formats and will remain an IEEE standard.
The intent of the two standards is to provide as much backward compatibility with the IEEE
C37.118:2005 standard, but to provide some enhancements. In the case of IEEE C37.118.1,
substantial enhancements are ongoing to provide dynamic performance/measurement
standardization as well as providing standardization for testing and calibration.
In regards to IEEE C37.118.2, there was a substantial set of requested enhancements as well
as a limited set of problem resolutions. Upon evaluation of the enhancement requests, it was
recognized that an equivalent protocol suite to IEC 61850 would need to be developed and
that interoperability would probably not be able to be maintained should all of the
enhancements be implemented. A decision was made that the IEEE C37.118.2 should
standardize the current packet specification of IEEE C37.118:2005 with the resolution to
several of the problematic issues. It was further decided that IEC 61850 should be used to
provide the enhanced functionality.
The question became how to provide discrete and manageable steps from IEEE C37.118.2
into IEC 61850 for users/vendors that desired to use IEC 61850 or the enhanced functionality.
The sequence of “manageable steps” constitutes a migration strategy. As such, the starting
and end points of the strategy are readily understood. The starting point is IEEE
C37.118:2005 and soon IEEE C37.118.2. The end point, for synchrophasors, would be IEC
61850 as modified by TR 61850-90-5 (this document). For both endpoints, the measurement
techniques referenced would be IEEE C37.118.1.
This starting point provides the industry with the capability to proceed with
projects and deployments using internationally recognized and stable standards.
One of the major enhancement requests for C37.118 has been to provide a
mechanism to configure a Phasor Measurement Unit (PMU) or Phasor Data
Concentrator (PDC) to provide a subset the information available in the unit (e.g.
PMU or PDC) for communication within the C37.118 Data packet.
Note: In essence, this represents the ability to define the contents of IEEE
C37.118 CFG-2 responses based upon a subset of the IEEE C37.118 CFG-1
response.
In the world of IEC 61850, the Substation Configuration Language (SCL) is used
to define the overall information contents of a unit (e.g. CFG-1) and to define a
61850-90-5/DTR IEC:201X (E) – 134 –
subset of the information to be communicated (e.g. CFG-2) via a construct called
a DataSet. Therefore, in order to provide the aforementioned configuration
capability, Step 1 makes use of SCL to configure a C37.118 device.
There are several types of SCL files that are applicable for use: Instantiated IED
Description (IID) or IED Capability Description (ICD) SCL files. It is preferable to
utilize the IID file due to the fact that the file reflects the configuration of the
communication parameters as well as user definitions for the DataSet
configurations. The ICD file is provided by the vendor of the unit and represents a
default configuration.
This step provides a user the functionality for using the protocol, models, security,
etc. as published within IEC 61850-90-5 (e.g. this document) without the
requirement of using ISO 9506 (e.g. the MMS profile in IEC 61850-8-1). This step
basically provides a more enhanced protocol and service capability (e.g. supports
events in addition to streams) as well as security. In essence, this step utilizes
GOOSE and SV over a new routable profile. The configuration of the
communication streams is still performed via SCL (same as in Step 1). However,
without using ISO 9506, the enabling and disabling of the streams also needs to
be performed in the SCL file.
The end point provides the capabilities of Step 2 and adds the full capabilities of
the other services and features of IEC 61850. As an example, this allows the
Control blocks to be enabled/disabled dynamically (e.g. via communication and
not just through SCL) as well as dynamic creation of DataSets.
The Open System Interconnect (OSI) model is a layered representation of the communication
functionality required to implement communication interchange in an interoperable manner.
The model is often referred to as the 7-layer model, because it describes seven (7) layers of
functionality.
In general, the layers of functionality are recognized to be: Application; Presentation; Session;
Transport; Network; Datalink; and Physical Layers. Each layer can be considered to “answer”
a different set of questions about how to communicate with another device, as illustrated in
Figure 15-2.
Together, the seven layers are often known as a “stack”. The software at each layer of the
stack has its own address, its own data header that it adds to a message (an “envelope”), and
its own processing rules.
It is important to note that while the OSI model was developed to describe the International
Standards Organization (ISO) suite of protocols, it can be used to describe communications
using any set of protocols. Figure 15-3 shows roughly how OSI terminology corresponds to
Internet Protocol (IP) terminology for naming layers.
Application Application
Presentation
Session
Transport Transport
Network Network
Physical
In order to achieve interoperability, the software implementing each layer on a given device
must be the “peer” of the equivalent layer software on the remote device (i.e. both peers must
agree to use the same choices for protocols and implementation parameters).
Application
Presentation
Session
Transport
Network
DataLink
Physical
NPDU
NPDU
NPDU
NPDU
A message is called a Protocol Data Unit, or PDU.The diagram shows that a Presentation
Protocol Data Unit (PPDU) is passed to the Session layer. The session layer adds additional
information to the PPDU, and the combination is called a Session Protocol Data Unit (SPDU).
This is in turn passed onto the Transport layer, etc. as was previously described in the
“envelope” analogy.
It is the layer’s PDUs that are used to create the “peer” relationships that allow for information
to be exchanged.
In some cases, one service provided by a layer may be the ability to segment or re-assemble
information. Two Good examples of this are the Transport and Network layers. In particular,
the Network Layer is responsible for segmenting the information sent to it by the Transport
layer so that the packet size does not exceed the maximum packet size for the Data Link
layer. In this case, sending one TPDU can cause multiple Network Protocol Data Units
(NPDUs) to be transmitted.
A special naming convention is used to discuss this capability. While the name PDU is used
for the message produced out the “bottom” of a layer, the name “Service Data Unit” is used
for the data presented at the “top” of the next layer. Thus the concept of a Network Service
Data Unit (NSDU) is used to represent the entire TPDU that causes multiple NPDUs to be
sent. The service concept applies to other layers, particularly the Transport layer, where
segmentation can also occur. For layers that do not segment, the PDU produced by a layer
is equivalent to the Service Data Unit (SDU) it received with the header for that layer added
Session
Network
NSEL/EtherType
In the case of an incoming message arriving at the Network Layer from an Ethernet Data Link
layer, the selection of the use of RFC 791 (IP) is designated by the EtherType ID of 800 hex.A
message to be processed by a different network layer (say, the ISO connectionless network
layer, or Novell IPX) would be labelled with a different EtherType. Therefore, The EtherType
is the equivalent of an ISO Network Selector (NSEL).
The transport protocol to be used is chosen via a Transport Selector (TSEL). The equivalent
of a TSEL, in the IP world, is the Protocol Identifier used to differentiate between UDP and
TCP.
The next level protocol would be specified by a Session Selector (SSEL). In the Internet
world, the SSEL is the IANA TCP Port Number that specifies the actual application protocol to
be used (e.g. Port 80 for HTTP, Port 21 for FTP).
The total address information, including all of the selectors, is known as a Service Access
Point. As an example, the addressing information needed to locate a particular Session
protocol is known as a Session Service Access Point (SSAP). The SSAP includes all of the
lower layer selectors.
Annex E –IPv6 (informative)
This annex provides the information needed to use/specify the use of Internet Protocol version 6
(IPv6). It is anticipated that an IPv6 T-Profile will be used in parallel to the IPv4 T-Profile initially.
Additionally, it is the IPv6 T-Profile that will allow more wide area routing ability for larger scale
integration/information exchange.
E.2 A-Profile
However, with the use of IPv6, there is a potential to send UDP packets that exceed a length
supported by IPv4. These are called Jumbo Datagrams and shall not be used. This means
that the use of RFC 2147 is excluded.
E.3 T-Profile
RFC-768 UDP
IEEE 802.1Q
ISO/IEC 8802-3
E.3.1 IPv6 Options
The implementation of IPv6 shall support both unicast and multicast addressing.
Bits: 4 12 16 24 32
The current SCL definitions in IEC 61850-6 do not support the expression of an IPv6 address,
subnets, or gateways. Therefore, it will eventually be necessary to add a mechanism to
express this address.
Edge Authentication is typically a local issue. However, this specification recommends that
such authentication be performed using RFC 2406 – IP Encapsulating Security Payload.
The key negotiations, needed to support this protocol, are supported by the KDC mechanism
(e.g. RFC 3547).
Annex G – Example of A-Profile encodings (Informative)
The use of multicast (UDP or Ethernet) does not guarantee message/data delivery. In most multicast
protocols a lost packet is not automatically detected and re-transmitted.
The GOOSE send service and message, as specified in IEC 61850-8-1, addresses this issue through
a repeat mechanism where the transmitted dataset is repeated several times after the initial changed
data packet is sent. As such, there is a very high probability, given that the network is intact, that a
lost GOOSE message will eventually be received. The R-GOOSE, in that is inherits the operational
characteristics of the GOOSE, will possess this message repeat function.
Sample Values, on the other hand, does not possess a repeat mechanism. In certain circumstances
(especially at low message send rates), it may be desirable to increase the reliability of the received
data. This can be achieved through a re-transmit of the R-SV data packet. In as much as the
subscriber is designed to identify and reject duplicate packets, re-sending the exact same data packet
is an effective way to achieve higher-reliability when desired. The re-launch mechanism, number of
re-tries, and time between retries is a local issue.
For such re-transmissions, the SPDU Number needs to be identical to the original packet. This is
required in order to allow the subscriber to detect duplicate delivery should the original packet have
been received. It is further recommended that the contents of the entire SPDU be a duplicate of the
original packet that is being repeated.
Annex I – Guidance on HMAC and Truncation
(Informative)
HMAC is a standard approach for achieving two-party authentication via shared symmetric
keys. The HMAC standards and guidelines [3], [1], [2], [5], [6] provide techniques and
protocols to use HMAC such that the resulting authentication protocol is secure and resistant
to replay attacks. One effective approach for dealing with replay attacks is to ensure that
there is either a unique sequence number or a nonce for each message for any given shared
key. This can be achieved by using either sequence numbers or nonces [5]. When HMAC is
used for authentication, truncation of the output is an option occasionally used to conserve
bandwidth. Truncation is considered reasonable in HMAC standards [1], [6] and is also used
in practice; e.g., in TLS [4].
The following are some guidelines regarding the use of truncation from HMAC standards and
guidelines.
• “The results in this area are not absolute as for the overall security advantages of truncation.
... Applications of HMAC can choose to truncate the output of HMAC by outputting the t
leftmost bits of the HMAC computation for some parameter t ... We recommend that the output
length t be not less than half the length of the hash output (to match the birthday attack
bound) and not less than 80 bits.” [3]
• “When a truncated HMAC is used, the leftmost bytes of the HMAC computation shall be used
as the MAC. The output length, shall be no less than four bytes ... However, t shall be at least
L/2 bytes unless an application or protocol makes numerous trials impractical” [1]. Note that
FIPS 198 [1] has been superseded by FIPS 198-1 [2], which defers to NIST-SP800-107 for
truncation [6].
• “The length of a MacTag shall be sufficiently long to prevent false acceptance of forged
data. For most applications, a length of 64 to 96 bits is sufficient.” [6]
Citations here:
[1] National Institute of Standards and Technology, The Keyed-Hash Message Authentication
Code (HMAC), (Standard, 2002). Available at http://csrc.nist.gov/publications/fips/fips198/fips-
198a.pdf.
[2] National Institute of Standards and Technology, The Keyed-Hash Message Authentication
Code (HMAC), (July, 2008).
[3] Krawczyk, H., Bellare, M., and Canetti, R. 1997 Hmac: Keyed-Hashing for Message
Authentication. RFC. RFC Editor.
[4] S. Blake-Wilson, et. al. RFC 4336 Transport Layer Security (TLS) Extensions, Network
Working Group (IETF 2006). Available at http://www.ietf.org/rfc/rfc4366.txt.
[6] National Institute of Standards and Technology, Recommendation for Applications Us- ing
Approved Hash Algorithms, (Special Publication 800-107, 2009). Available at
http://csrc.nist.gov/publications/nistpubs/800-107/NIST-SP-800-107.pdf