On the Impact of Using Public Network Communication Infrastructure for Voltage Control Coordination in Smart Grid Scenario

Author(s):  
Kamal Shahid ◽  
Lennart Petersen ◽  
Florin Iov ◽  
Rasmus L. Olsen
Electronics ◽  
2021 ◽  
Vol 10 (6) ◽  
pp. 644
Author(s):  
Michal Frivaldsky ◽  
Jan Morgos ◽  
Michal Prazenica ◽  
Kristian Takacs

In this paper, we describe a procedure for designing an accurate simulation model using a price-wised linear approach referred to as the power semiconductor converters of a DC microgrid concept. Initially, the selection of topologies of individual power stage blocs are identified. Due to the requirements for verifying the accuracy of the simulation model, physical samples of power converters are realized with a power ratio of 1:10. The focus was on optimization of operational parameters such as real-time behavior (variable waveforms within a time domain), efficiency, and the voltage/current ripples. The approach was compared to real-time operation and efficiency performance was evaluated showing the accuracy and suitability of the presented approach. The results show the potential for developing complex smart grid simulation models, with a high level of accuracy, and thus the possibility to investigate various operational scenarios and the impact of power converter characteristics on the performance of a smart gird. Two possible operational scenarios of the proposed smart grid concept are evaluated and demonstrate that an accurate hardware-in-the-loop (HIL) system can be designed.


Electronics ◽  
2021 ◽  
Vol 10 (16) ◽  
pp. 1881
Author(s):  
Jesús Lázaro ◽  
Armando Astarloa ◽  
Mikel Rodríguez ◽  
Unai Bidarte ◽  
Jaime Jiménez

Since the 1990s, the digitalization process has transformed the communication infrastructure within the electrical grid: proprietary infrastructures and protocols have been replaced by the IEC 61850 approach, which realizes interoperability among vendors. Furthermore, the latest networking solutions merge operational technologies (OTs) and informational technology (IT) traffics in the same media, such as time-sensitive networking (TSN)—standard, interoperable, deterministic, and Ethernet-based. It merges OT and IT worlds by defining three basic traffic types: scheduled, best-effort, and reserved traffic. However, TSN demands security against potential new cyberattacks, primarily, to protect real-time critical messages. Consequently, security in the smart grid has turned into a hot topic under regulation, standardization, and business. This survey collects vulnerabilities of the communication in the smart grid and reveals security mechanisms introduced by international electrotechnical commission (IEC) 62351-6 and how to apply them to time-sensitive networking.


2018 ◽  
Vol 10 (11) ◽  
pp. 4047 ◽  
Author(s):  
Jinchao Li ◽  
Tianzhi Li ◽  
Liu Han

In order to eliminate the impact of inter-regional differentiation of development demand on the objective evaluation of the development level of smart grid, this paper establishes the evaluation model of weight modification, transmission mechanism and combination of subjective and objective weights. Firstly, the Analytic Hierarchy Process method is used to calculate the weights of evaluation indices of effect layer and then the indices of development demand are used to modify the weights of them. The association analysis and the correlation coefficient are used to establish the weights conduction coefficient between the effect level and the base level. Then the subjective weights of the indices of the base layer are calculated. The objective weights of the indices of the base layer are obtained by using the entropy method. The subjective weights of the base layer and the objective weights obtained by the entropy method are averagely calculated, and the comprehensive weights of the evaluation indices of the base layer are obtained. Then each index is scored according to the weights and index values. Finally, the model is used to quantitatively inspect the level of development of smart grid in specific regions and make a horizontal comparison, which provides a useful reference for the development of smart grids. The relevant examples verify the correctness and validity of the model.


2014 ◽  
Vol 960-961 ◽  
pp. 841-844
Author(s):  
Yan Bin Li ◽  
Yun Li ◽  
Wei Guo Li

With the development of the smart grid , information network securityassessment affects the safe operation of the smart grid . In this paper, theimproved credibility theory and analytic hierarchy process , combined withstructural features of the smart grid network , From the wide area network ,access network, enterprise local network , local area network and the CPN-siteand home users to assess the impact of the five aspects of information networksfor smart grid security operation. And make the case for more security strategyto improve the reliability of the smart grid operation , thus providing a basisfor guiding the development and safe use of electricity grid users .


2017 ◽  
Vol 146 ◽  
pp. 308-320 ◽  
Author(s):  
D.X. Morales ◽  
Y. Besanger ◽  
S. Sami ◽  
C. Alvarez Bel

2022 ◽  
pp. 380-407
Author(s):  
Abdelmadjid Recioui ◽  
Youcef Grainat

The communication infrastructure constitutes the key element in smart grids. There have been great advances to enhance the way data is communicated among the different smart grid applications. The aim of this chapter is to present the data communication part of the smart grid with some pioneering developments in this topic. A succinct review of the state of art projects to improve the communication link is presented. An illustrative simulation using LABVIEW is included with a proposed idea of introducing some newly technologies involved in the current and future generations of wireless communication systems.


Author(s):  
Gunnar Stevens ◽  
Volkmar Pipek ◽  
Volker Wulf

End User Development offers technological flexibility to encourage the appropriation of software applications within specific contexts of use. Appropriation needs to be understood as a phenomenon of many collaborative and creative activities. To support appropriation, we propose integrating communication infrastructure into software application that follows an“easy-to-collaborate”-principle. Such an appropriation infrastructure stimulates the experience sharing among a heterogeneous product community and supports the situated development of usages. Taking the case of the BSCWeasel groupware, we demonstrate how an appropriation infrastructure can be realized. Empirical results from the BSCWeasel project demonstrate the impact of such an infrastructure on the appropriation and design process. Based on these results, we argue that the social construction of IT artifacts should be tightly integrated in the material construction of IT artifacts in bridging design and use discourses.


Author(s):  
Stephen C. Andrade ◽  
Hilary Mason

This chapter introduces the concept and activities of the digitally enabled tourist and the impact such as tourist has on the travel and tourism industry. It summarizes the existing and emerging technical environments that encourage the use of hand held digital recording devices and personal Internet communications. Additionally, it looks at ways tourists publish and exhibit digital visual and written artifacts of their travel experience. The chapter introduces general types of digital communication infrastructure to be considered by the industry to create an experience to support this type of tourism. The authors hope that further understanding of the digitally enabled tourist will inform travel professionals to better facilitate commerce and practice in the industry.


2001 ◽  
pp. 1-8
Author(s):  
Laku Chidambaram ◽  
Ilze Zigurs

Since the dawn of civilization, new technologies—from the plow to the locomotive to the computer—have transformed human lives. These changes have often been for the better, but occasionally also for the worse. No matter what the consequence, these changes have always been irrevocable and pervasive. Today’s new technologies, from the well-connected computer to the digital communication infrastructure, are no exception. They are dramatically changing the way we work, play and live. This book explores how these real changes have helped create our virtual world. It also examines the impact of these changes on individuals, organizations and society.


Sign in / Sign up

Export Citation Format

Share Document