SlideShare ist ein Scribd-Unternehmen logo
1 von 81
Downloaden Sie, um offline zu lesen
FLORIDA STATE UNIVERSITY
COLLEGE OF ENGINEERING
PERFORMANCE MODELING AND ANALYSIS OF
A CENTRALIZED FAULT LOCATION AND IDENTIFICATION SYSTEM
By
SHRAVAN TAMASKAR
A Thesis submitted to the
Department of Electrical and Computer Engineering
in partial fulfillment of the
requirements for the degree of
Master of Science
2016
ii
Shravan Tamaskar defended this thesis on June 06, 2016.
The members of the supervisory committee were:
Ming Yu
Professor Directing Thesis
Michael Steurer
Professor Co-Directing Thesis
Hui Li
Committee Member
The Graduate School has verified and approved the above-named committee members, and
certifies that the thesis has been approved in accordance with university requirements.
iii
To my Family
iv
ACKNOWLEDGMENTS
First of all, I would like to thank my research advisor Dr. Michael Steurer for allowing me a chance
to work on the project and being a part of the research team at Center for Advance Power System
(CAPS) at Florida State University and for his guidance and encouragement. I would also like to
thank my academic advisor Dr. Ming Yu for guiding me through the various challenges I faced in
the course of my thesis. I would also like to thank Dr. Helen Li to be a part of my thesis committee.
I would like to thanks Michael Sloderbeck, Harsha Ravindra, Mark Stanovich and Isaac Leonard
for their support, advice and suggestions that helped me in my thesis and also patiently discussion
about my work.
Last and the most important, I would like to thank my family for believing in me.
v
TABLE OF CONTENTS
List of Tables ................................................................................................................................ vii
List of Figures.............................................................................................................................. viii
List of Abbreviations .......................................................................................................................x
Abstract.......................................................................................................................................... xi
1. INTRODUCTION ......................................................................................................................1
1.1 Introduction..........................................................................................................................1
1.2 Motivation............................................................................................................................1
1.3 Literature review..................................................................................................................2
1.4 Outline..................................................................................................................................3
2. STRUCTURE OF CENTRALIZED FAULT LOCATION SYSTEM.......................................4
2.1 Protection of MVDC system................................................................................................4
2.2 Basic CFL architecture ........................................................................................................5
2.3 The CFL operation...............................................................................................................6
2.4 The CFL algorithm ..............................................................................................................9
2.5 Summary............................................................................................................................13
3. CFL COMMUNICATION SYSTEM.......................................................................................14
3.1 EtherCAT...........................................................................................................................14
3.2 Hardware............................................................................................................................16
3.3 Topology............................................................................................................................17
3.4 Modeling of an EtherCAT frame.......................................................................................18
3.5 Modeling of roundtrip communication cycle time ............................................................25
3.6 Decision time modeling.....................................................................................................28
3.6.1 RTDS processing ....................................................................................................30
3.6.2 Beckhoff processing................................................................................................31
3.6.3 Hardware synchronization ......................................................................................32
3.7 Factors affecting performance of CFL...............................................................................36
3.7.1 Topology .................................................................................................................36
3.7.2 Jitter.........................................................................................................................38
3.7.3 Bandwidth ...............................................................................................................39
3.7.4 Network propagation time.......................................................................................40
3.7.5 Noise .......................................................................................................................41
3.8 Summary............................................................................................................................51
vi
4. CFL IMPLEMENTATION ON SHIPBOARD POWER SYSTEM ........................................52
4.1 Hardware in the loop testbed .............................................................................................52
4.2 Fault clearance process in MVDC system.........................................................................56
4.3 CHIL implementation of CFL ...........................................................................................57
4.3.1 Faster CFL implementation ......................................................................................59
4.3.2 CFL response under various fault impedances .........................................................59
4.3.3 CFL response for different system configurations....................................................60
4.3.4 CFL response under different loading conditions.....................................................61
4.3.5 CFL response under different MMC operations.......................................................61
4.4 Summary............................................................................................................................63
5. CONCLUSION AND FUTURE WORK .................................................................................64
5.1 Conclusion .........................................................................................................................64
5.2 Future Work.......................................................................................................................65
5.2.1 Hardware implementation of a ring topology...........................................................65
5.2.2 Validating the system resiliency for cable cut condition..........................................65
5.2.3 System Level Control ...............................................................................................65
5.2.4 Exhaustive noise analysis .........................................................................................65
5.2.5 Integrating multiple CFL units..................................................................................65
5.2.6 Sensitivity analysis of the differential protection scheme ........................................66
References......................................................................................................................................66
Biographical Sketch.......................................................................................................................69
vii
LIST OF TABLES
Table 3.1 Executable commands in EtherCAT master configuration……………….. 19
Table 3.2 EtherCAT Frame configuration parameters………………………………. 22
Table 3.3 Parameters defining communication cycle time…………………………... 26
Table 3.4 Parameters defining decision time………………………………………… 29
Table 3.5 Timing of different delays of master……………………………………… 37
Table 4.1 Describing the fault location and the respective disconnect switch
associated with the particular fault location……………………………….
54
Table 4.2 CFL decision time with respect to different system operating conditions…. 62
viii
LIST OF FIGURES
Figure 2.1 Basic structure of the CFL system………………………………………… 6
Figure 2.2 2: The steps in the CFL system……………………………………………. 7
Figure 2.3 Kirchoff’s current law……………………………………………………... 9
Figure 2.4 Graphical representation of the percentage differential curve……….…….. 10
Figure 2.5 Describing the flow of current in normal operation and during fault.……... 10
Figure 2.6 Currents flowing through the disconnect switch…………………….……... 11
Figure 2.7 Fault clearance process of MVDC system………………………….………. 12
Figure 3.1 EtherCAT processing “on the fly”………………………………….………. 15
Figure 3.2 Standard EtherCAT frame………………………………………….………. 15
Figure 3.3 Physical Topologies………………………………………………..……...... 17
Figure 3.4 Master-Slave line topology showing direction of data flow………………... 18
Figure 3.5 A TwinCAT view showing the sequential execution of commands and its
respective size………..……………………………………………………...
20
Figure 3.6 The placement of slaves and the number of I/O units connected to each
slave……………………………………………………………………....
21
Figure 3.7 Plot showing the size of EtherCAT frame to the number of slaves………… 23
Figure 3.9 Frame propagation time of the EtherCAT frame………………………..... 25
Figure 3.9 : Number of frames as per the slaves connected in the topology…………. 24
Figure 3.10 Showing the round trip cycle time to the number of slaves in the network... 27
Figure 3.12 Individual timing split-up in the decision time……………………………... 29
Figure 3.13 The two timestamp processing of the RTDS model………………………... 30
Figure 3.14 6 (n+1) cycle times at 50 µs cycle time…………………………………….. 31
Figure 3.15 6 (n+1) cycle times at 100 µs cycle time………………………………….... 32
Figure 3.16 A two cycle time, worst case, EtherCAT response ………………………… 33
Figure 3.17 The time taken by master to compute a fault and generate a trip signal….... 33
Figure 3.18 Events happening in the fault detection by a CFL system for a 50 µs 5
iterations……………………………………………………………….........
34
Figure 3.19 Fault detection time by the CFL for a 50 µs and 3 iterations for each
individual slave in the network…………………….…………......................
35
ix
Figure 3.20 Fault detection time by the CFL for a 100 µs and 3 iterations for each
individual slave in the network…….………………………………………..
36
Figure 3.21 Comparison of a round trip cycle time of a line and a ring topology……..… 38
Figure 3.22 Bandwidth relationship between minimum cycle time and number of
slaves………………………………………………………………………...
39
Figure 3.23 The network propagation time with respect to number of slaves…………... 40
Figure 3.24 Random motion of electrons due to increase in temperature………………. 42
Figure 3.25 Additive White Gaussian Noise model……………………………………... 44
Figure 3.26 Depicting the uniform frequency of white noise…………………………….. 45
Figure 3.27 SNR with respect to noise in the signal……………………………………… 46
Figure 3.28 Noise levels………………………………………......................................... 46
Figure 3.29 Node B receiving noisy signal………………………………………............. 47
Figure 3.30 The effect of noise on the current signal…………………………………….. 48
Figure 3.31 Effect of Noise on Slope calculated by the algorithm of the CFL system….. 48
Figure 3.32 Noise in both Node A and Node B…………………………..……………... 49
Figure 3.33 Noise profile in node A and node B………………………………………... 50
Figure 3.34 Effect of Noise on Slope calculated by the algorithm of the CFL system….. 50
Figure 4.1 MVDC shipboard power system with the communication architecture…... 53
Figure 4.2 The location of cable section and disconnect switches as seen in the
RSCAD Model…….………….……………………………………………..
54
Figure 4.3 Selectivity of CFL operation….……………………………………............. 55
Figure 4.4 Execution of the fault clearing sequence………………….……………….. 57
Figure 4.5 Block diagram describing Hardware in the loop (HIL) testing system…… 58
Figure 4.6 HIL testbed………………………………………........................................ 58
Figure 4.7 Showing the fault detection by CFL………………………………………. 59
Figure 4.8 CFL response in different fault impedance conditions……………………. 60
Figure 4.9 CFL response in closed ring and open ring bus system…………………… 60
Figure 4.10 CFL test waveforms under different loading conditions………………… 61
Figure 4.11 CFL detection in various operating modes of MMC's…………………… 62
x
LIST OF ABBREVIATIONS
EtherCAT- Ethernet for Control Automation Technology
CFL- Centralized Fault Location
RTE- Real-Time Ethernet
ESC- EtherCAT Slave Controller
WKC- Working Counter
MVDC- Medium Voltage DC
SPS- Ship-board Power System
PDP- Percentage differential protection
AI- Analog Input
DO- Digital Output
XFC- eXtreme Fast Control
XAE- eXtended Automation Engineering
CU- Copper
FO- Fiber Optic
SNR- Signal to noise ratio
AWGN- Additive white Gaussian noise
xi
ABSTRACT
The increasing interest and gradual adaptation of a medium voltage direct current (MVDC)
electrical distribution system by the US navy and smart grid designs has demanded a change to the
structure of the traditional electrical distribution system. The development of the power electronics
has led to faster-operating devices and the goal to achieve fault management in time frame of ~ 8
ms demanded a need for an ultrafast fault location and identification system. The traditional
protection system used in alternating current power distribution is well-understood and applied to
a radial distribution system but may lack sufficient response times for a dynamic, intelligent,
looped distribution structure. Hence the centralized fault detection and location (CFL) system is
proposed.
The CFL system, based on ultrafast data communications and processing of sensor data to identify
and determine the location of a fault in the medium voltage direct current (MVDC) shipboard
power system (SPS). This research presents the mathematical models describing the relationship
like the frame size, decision time and the operating time of the CFL system were developed and
verified with the results obtained from an implemented CFL system. The models assess the
performance of the CFL system and assist in estimation of the scaling of the CFL architecture. A
controller-hardware-in-the-loop (CHIL) testbed, interfacing RTDS with an industrial automation
hardware, to demonstrate the methodology and to perform a comprehensive testing and analysis
of a prototype of CFL system.
The results of CHIL experiments demonstrate ultrafast fault detection and precise fault location
operation of the CFL system on a fault current limited MVDC SPS for a line-to-line fault under
different operating conditions of the SPS. Factors affecting the performance and scaling for a
practical CFL implementations were identified and analyzed. The models and analysis in this
thesis are validated by experimental results.
1
CHAPTER 1
INTRODUCTION
1.1 Introduction
ESRDC and U.S. Navy envision a medium-voltage direct current (MVDC) power system to meet
the increasing power requirements on a navy vessel. MVDC power systems are expected to be
advantageous in terms of flexibility and efficiency but have not been widely considered due to
concerns over insufficient fault protection. A centralized fault identification and location (CFL)
system, based on coordinated interaction between the shipboard power system (SPS) and
communication system was developed for an ultra-fast fault identification and location [1]. The
performance models were developed to analysis the CFL system operation and configuration of
the CFL system. This CFL system demonstrated necessary functionality, analyzed based on the
network and physical topology, evaluated for its network performance and tested [2] under various
system configurations on a controller hardware-in-loop (CHIL) cyber-physical testbed in real time.
1.2 Motivation
Traditional relays used in the electric distribution systems cannot meet the highly adaptive
requirements of the new notional breakerless SPS architecture. The development of power
electronic devices provides high operating speed and efficiency. To be on par with these
developments, SPS requires an intelligent and adaptive system to quickly identify and locate a
fault in the power system. To obtain high-speed requirements along with the intelligence and
adaptability, the communication architecture is used as a backbone for the centralized fault
identification and location system (CFL). The CFL system was developed at Center for Advanced
Power Systems (CAPS) [1] and tested on the CHIL testbed [2], [3]. The power system was
modeled and simulated on RTDS and data communication was provided by an industrial
automation hardware. EtherCAT, a network communication protocol, was used for real-time data
acquisition. A systemic approach is followed evaluating the capabilities and performance of the
CFL system and the communication architecture were modeled, tested, verified and presented in
this research.
2
1.3 Literature review
The protective relays are a necessary part of the power system architecture. When a fault occurs
on any part of the system, it should be quickly located and the faulty section needs to be
disconnected. The fundamental requirement of any protective relays are [4]:
1. Selectivity
2. Speed
3. Sensitivity
4. Accuracy
Protective relays have evolved from the electro-mechanical over-current relay to the modern day
microprocessor based relays. The electrical distribution system is divided into two basic protection
zones i.e. primary protection zone and the secondary protection zone. These zones overlap each
other in order to provide redundant system and also to avoid blind areas in the distribution system.
There are many protection schemes designed to perform power system protection. Some of them
are:
1. Overcurrent protection
2. Differential protection.
The overcurrent protection scheme is the simplest and the oldest among the protection schemes.
Overcurrent protection can be classified into two:
 Instantaneous overcurrent protection
Instantaneous relays operate without intentional time delays in the system. As the fault
occurs in the system, the logic computes the existence of a fault in the system and sends a
command to the instantaneous overcurrent relays to open. This type of relay is used in
protection from high fault current.
 Time-delayed overcurrent protection
In this protection scheme, the operation time of the overcurrent relay is inversely
proportional to the magnitude of fault current. The time-delayed protection scheme
depends on two factors i.e. pickup current and the time delay.
The differential relays operate when the phasor difference between the electrical quantities exceed
the pre-determined value. A current differential relay is based on basic principle of Kirchhoff’s
current law. The basic concept is to sum all the currents in a protection zone. During the normal
3
operation, the sum of currents will be zero but during the faulty condition, the sum of current will
not be zero and hence detects a fault in the system. Differential protection scheme can be applied
to almost all type of faults and hence it is adapted for the fault identification for the MVDC SPS.
A notional breakerless model was proposed for the MVDC SPS architecture. It also emphasizes
the need for an effective fault protection strategy to support the MVDC architecture. The zonal
electric grid architecture for an integrated power system which could be highly survivable and
criteria for fault protection in MVDC system was studied from [5]. The SPS simulation model
which is developed and simulated in RTDS for the study of CFL system was a derivative of the
model proposed in [6]. CFL system, based on an adaptive percentage differential protection
scheme is proposed in [7], [8]. The protection scheme makes decisions by monitoring
instantaneous current values from its various nodes distributed throughout the power system. The
instantaneous current signals are read, digitized and transported in real time through the EtherCAT
protocol developed by [9] and is described and documented in [10], [11], [12]. The cyber-physical
testbed for the testing of the CFL system is shown in [2].
1.4 Outline
This thesis is divided into five chapters. Chapter 2 describes the CFL architecture and details the
algorithm used for fault identification. It also explains the events that generally follow once a fault
is located. Chapter 3 describes the communication system used to achieve ultrafast fault
identification and location. It also provides the mathematical models for reasoning about the
impact of scaling the CFL system and the factors affecting the performance of the CFL system.
Chapter 4 details the CHIL testbed on which the communication and power system architecture
are implemented to perform the Centralized Fault Identification and Location and demonstrates
the implementation of the CFL system on a MVDC SPS. Chapter 5 draws conclusion from the
research and described future work.
4
CHAPTER 2
STRUCTURE OF CENTRALIZED FAULT LOCATION SYSTEM
This chapter discusses the structure of centralized fault location and identification system and the
protection algorithm. The goal is to explore and analyze a faster method of fault location and
identification for the next generation naval ships. For this purpose, CFL system was developed at
CAPS [1] to integrate power system and the communication systems in a highly coordinated
fashion. The MVDC power distribute system may be used to deliver the electrical power in the
next generation naval ships. The CFL leverages digital data acquisition techniques to gather
instantaneous changes in system operation to identify and locate faults in the SPS.
2.1 Protection of MVDC system
The rapid growth in the power electronics led to lower cost and reduction in the size of the power
electronic devices (PED) and the goal to clear the fault in the MVDC system in about 8 ms. Other
advancements to follow were the increase in the performance, efficiency and switching frequencies
of the PED. These, along with the other benefits of using a DC system in terms of power density
and power distribution efficiency, over a conventional AC system led to increased focus in
researching MVDC power system. DC power distribution system is hampered by a lack of
appropriate study in electrical protection strategies. In fact, the protection of DC distribution
systems, especially at the medium voltage level, is recognized to be a notable challenge [5], [6].
The unavailability of DC disconnect switch for the appropriate rating is considered to be a major
factor in the adoption of MVDC for ship power distribution system. In traditional MVAC systems,
fault protection strategies are based on a mechanical switch and occur at zero-current crossing of
the AC wave which occurs at every half cycle. This approach cannot be applied in MVDC systems
because they do not have periodic current zero crossings. The proposed method based on
differential protection can detect and locate fault in DC system and can provide selectivity by
comparing the currents of the two sides of the section which is to be protected is explained in the
sections below.
5
2.2 Basic CFL architecture
A CFL system consists of a master unit and multiple measurements units called slaves. A slave is
a collection of one or more than one analog input cards, digital output cards or combination of
both analog input cards and digital output cards. The master unit is usually located in a remote
location such as a control center and the slaves are distributed at different locations throughout the
power system. The master and the slaves interact over a communication protocol to enable fast
and reliable data communication between each other. The simplified version of a CFL system is
shown in the Figure 2.1 below. The figure, shows a diagrammatic representation of a power
system, with one generator and two loads, on which a CFL scheme is to be implemented. It also
shows the location of the various
In the following power system, as shown in the Figure 2.1, there are multiple disconnect switches
(D), located at multiple location throughout the power system. The disconnect switch is closed
during normal operation of the power system. Once a fault occurs, the function of these disconnect
switch is to open and isolate the respective section of the power system in which the fault has
occurred and hence protect it. The disconnect switch receive instantaneous data measurements to
the analog input (AI) terminals (numbered 1 through 5). The analog input terminals measure the
instantaneous currents, and digitizes the current using an analog to digital (A/D) converter and
transmits the digital signal via the real-time Ethernet (RTE) communication channel to the master.
A fault protection algorithm, which is simultaneously being simulated into the master unit receives
the instantaneous current measurements and executes the protection algorithm, by performing the
necessary calculations, to determine the fault in the power system. Once the fault is identified and
the location is determined by the master, it sends out a control signal, as a response, to the
respective disconnect switches to open and isolate the faulty section from the non-faulty section
of the power system.
2.3 The CFL operation
The operation of the centralized fault location and identification system (CFL) is designed with
the main focus of identification of the presence of a fault in the power system and locating the
specific section where the fault has occurred.
6
Figure 2.1: Basic structure of the CFL system
The CFL system monitors and evaluates the operating condition of all the protection zones of the
power system simultaneously to check for a fault in the normal operating conditions. Once it
detects and locates a fault, it generates a trip signal to initiate the process to isolate the faulty
section and restore stable operating conditions in the system.
The key features which makes the CFL system so important is its operating speed which will be
explained in this section. The Figure 2.2 shows a flowchart explaining the different steps involved
in the operation of the CFL system.
The Master unit is the one which controls and coordinates all the processes in the CFL system.
When the master unit is configured, it establishes communication with all the slaves or
measurement points connected in the master-slave network. The measurement points (M1, M2)
are differential units measuring voltage in the range of (-10 V to +10 V). During the configuration
process of the master, it locates all the slaves physically connected in the master-slave network
and determines the topology (line, ring, star, daisy-chain) in which they are connected to each
other.
Gen.
Load Load
D
D D
D D
Master 1 4 52 3
7
Figure 2.2: The steps in the CFL system
During the configuration process, the master also assigns a specific address to each of the slaves
in order to ensure proper communication between them. This addressing also helps the master to
attain a synchronized operation with its slaves [14]. Once the communication is established
between the master and slaves, the master acquires the data from each of the slaves, it processes
the data by applying it to the algorithm which is simultaneously being run in the master. When the
master determines the algorithm condition to be true, it increments the counter by one which is
initialized at zero. As the counter reaches a threshold value, a trip signal is generated. If the master
determines the algorithm condition to be false, it resets the counter to zero and rechecks the
condition. The reason for setting up of the counter threshold is to improve the reliability of the
algorithm and avoid the false trip in the system. For example, if the counter threshold is set at 1,
sensor noise, switching of generators and loads in the system which might lead to a sudden spike
in the voltage conditions, can result in the generation of a false trip and may lead to the isolation
Master
Condition
check
Counter
Increment
Counter
threshold
Trip
True
slave1slave n
False
EtherCAT Frame
YesNo
Data signal
Logic signal
Reset
counter
8
of a healthy section of the system. Hence, the counter threshold has to be set at a higher value and
hence will evaluate the status of the algorithm for multiple consecutive timestamps instead of one
timestamp.
The operating time of the CFL system depend on factors like:
1. Processing time (𝑇𝑃)
The processing time of the master unit can be assumed in nanoseconds considering
the processing capabilities of the computers these days.
2. Threshold counter (C)
A small counter (1 or 2) threshold can lead to a faster location and detection speed but
can also lead to an unreliable system as it could lead to a false trip. A larger counter
can cause the CFL system to be reliable but can lead to a longer protection time.
3. Sampling time (𝑇𝑆)
Sampling time is the time between two consecutive samples
The equation 1 below shows as
𝑇𝑜𝑝 = 𝑇𝑃 + 𝐶 × 𝑇𝑆 (2.1)
2.4 The CFL algorithm
To meet the high speed and adaptability of the CFL system, the CFL algorithm is based on
percentage differential protection (PDP) algorithm [7], [8] which makes decisions based on
instantaneous values of the current. Differential protection works on the basic principle of
Kirchoff’s current law stating that the currents flowing into a node must be equal to the current
flowing out of the node as can be seen in the Figure 2.3 below.
The percentage restraint characteristic operates on the ratio of operating current to restraint current
in the in the section to be protected. The operating current can be defined as the magnitude of
differential current in the protection zone.
9
Figure 2.3: Kirchoff’s current law
Several different methods have been identified to quantify the amount of restraint current in the
protection zone, which is a measure of the through current in the zone of protection. The restraint
current magnitude will have an impact on the effective sensitivity of a given percentage slope
characteristic and hence to avoid false system response.
The percentage differential protection scheme presented in [7]can be expressed as:
𝐼 𝑜𝑝 = | ∑ 𝐼 𝑛|𝑛
𝑛=2 (2.2)
𝐼𝑟𝑒𝑠𝑡 = ∑ |𝐼 𝑛|𝑛
𝑛=2 (2.3)
| ∑ 𝐼 𝑛|𝑛
𝑛=2 − 𝑆 . ∑ |𝐼 𝑛|𝑛
𝑛=2 ≥ 𝐼𝑚𝑖𝑛 (2.4)
Where,
Irestraint is the restraint current;
Ioperating current is the operate current;
S is slope coefficient;
Imin is the minimum operating current value.
Operating current is the vector sum (keeping in mind the direction of current flow) of all the
currents flowing through the protected zone. Restraint current is the magnitude sum of all the
currents in the particular system. The slope is calculated as the ratio of the operate quantity and
the restraint quantity.
10
Figure 2.4: Graphical representation of the percentage differential curve
The protection calculation for the PDP scheme can be done by calculating the operating current
and the restraint current.
During normal operation, the ratio of the two currents does not exceed the threshold i.e. the slope
lies in the restraint region and hence it's a no-fault condition, therefore, no trip signal is generated.
But, during the fault condition, the slope lies in the operating region which indicated the fault in
the system and hence a trip signal has to be sent to initiate the fault clearance sequence. Figure 2.4
shows the slope of the differential protection scheme.
Figure 2.5: Describing the flow of current in normal operation and during fault
Fault
No Fault
CS- Cable Section
Ioperate
Irestraint
CS
CS
Switch
A
Switch
A
Switch
B
Switch
B
A
B
B
Normal Operation
During Fault
11
During normal operation, the currents flow through disconnect switches and the cable sections as
shown in the Figure 2.5A. When a fault occurs at any point on the cable section, the current
direction changes and all the fault current starts to flow through the fault location to as shown in
Figure 2.5B.
Figure 2.6: Currents flowing through the disconnect switch
Figure 2.6 shows the plot of the currents flowing through the disconnect switches A and B. Before
the fault has occurred, the flow of current can be seen at the point before time 3.5 ms. At time t =
~3.5 ms, the fault occurs and the currents in the two switches now feed into the cable section.
When the CFL system detects the fault in the power system, it sends out a trip signal to the fault
management system to trigger its operations.
The task of clearing short circuit faults in the MVDC systems by DC disconnect switches led to
the development of a new protection strategy for the system: coordinated control operation of the
power converters and mechanical contactors and the fault is clearance by total de-energization of
the affected portion of the MVDC system. Once the power system is de-energized, the system
reconfigures i.e. it isolates the faulty section via DC disconnect switches, and finally re-energizes
the remaining healthy part of the system [15]- [18]. The Figure 2.7 shows the generic voltage and
12
current waveforms of the system during a fault clearing process: fault detection and localization
of the affected section, completely de-energizing of the entire system, isolation of faulted branch
and re-energizing the remaining healthy system.
Figure 2.7: Fault clearance process of MVDC system
The fault clearing process begins with the power converters being forced into current-limiting
mode which will force the fault current to remain at a set limit, identify the fault location by PDP
algorithm via centralized fault identification and location (CFL) system and then shut-down all
sources by bringing the system voltages to zero (i.e.de-energize the system) as soon as the fault
location is identified and open the appropriate disconnect switches to isolate the fault section from
healthy section and finally re-energize the remaining part of the system which is still non-faulty.
The target for the full system response time (SRT), i.e the time taken for the entire fault clearing
process, from fault detection to system re-energization, has been targeted to 8 ms (equivalent to
approximately one-half of a 60 Hz cycle).
Detect and
localize fault
Re-energize
system
De-energize
system
Isolate
faulted
segment
13
Due to the fact that the notional SPS is breakerless, the fault clearance sequence for this MVDC
SPS can be defined as follows [19]:
1. Fault detection and localization – As a fault occurs in any section of the SPS, all power
converters that are connected to the MVDC bus will be forced into current-limiting mode.
This is done by the overcurrent protection feature which is built-in in these converters. The
CFL which is constantly monitoring the system, will work towards detecting and locating
the fault.
2. De-energization of the system – After the fault is detected and the location is identified,
the system will be completely de-energized by bringing the system voltage levels to zero.
3. Isolation of faulty section – Once the system is de-energized, disconnect switches
corresponding to the particular faulty section will be triggered to open once the initial
discharge current from all the capacitance in the MVDC system decays to zero. The
opening of these disconnect switches will isolate the faulty section.
4. Re-energizing the system – After the fault is isolated by opening of the respective
disconnect switches, the converters re-energize the system and hence restart the stable
operation of the entire power system.
2.5 Summary
This chapter discusses the need for protection for the MVDC power system and the basic structure
and operation of the centralized fault location and identification system. This also discusses the
algorithm which makes a decision of the fault in the system.
14
CHAPTER 3
CFL COMMUNICATION SYSTEM
This section discusses the communication architecture and topology of the CFL system. The
section also explains the mathematical modeling of various performance parameters of the CFL
system like the EtherCAT frame size, round trip cycle time of the CFL system and the modeling
of the decision timings of the CFL system. The EtherCAT cycle time model is used to properly
configure the EtherCAT system and the decision time model is used to provide an understanding
of the response time that needs to be satisfied for the CFL system. Factors affecting the
performance of the CFL system like topology, jitter, bandwidth and noise have been listed and
analyzed.
3.1 EtherCAT
EtherCAT (Ethernet for Control Automation Technology) is an industrial automation system and
is widely being adopted as the Real-Time Ethernet (RTE) solutions. The communication efficiency
of EtherCAT makes it suitable for cycle time ≤ 100 µs [9], [13], [20]. The EtherCAT protocol is
optimized for process data and is transported directly within the standard IEEE 802.3 Ethernet
frame. The master is the only node in the EtherCAT segment which is allowed to actively send an
EtherCAT frame and configures, maps the process data on the slave devices; all the input and
output nodes perform frame forwarding towards the next i/o node or slave. The EtherCAT master
sends a telegram that passes through each node. Each EtherCAT slave device uses an EtherCAT
Slave Controller (ESC) which reads and processes the data received by the slave “on the fly”, [14]
and inserts its data in the frame as the frame travels further. When the frame reaches last node in
a segment or branch, it detects an open port and sends the frame back to the master. Figure 3.1
shows the diagrammatic representation of the EtherCAT processing “on the fly”. It shows that
when the frame reaches the slave, it reads the data from the analog inputs and writes the data to
the digital output terminals simultaneously.
15
Figure 3.1: EtherCAT processing “on the fly”
Figure 3.2: Standard EtherCAT frame
16
EtherCAT adds its data into the standard Ethernet frame. Figure 3.2 shows the structure of a basic
EtherCAT frame. Each EtherCAT frame consists of a 2 byte header and may contain one or more
datagrams. The header indicates the type of functionality the master would like to execute i.e.
reading, writing or both read and write. Master configures the number of telegrams in the datagram
corresponding to the number of slaves connected in the topology. Each datagram consists of a 10
byte header. The header is followed by the data payload which represents the payload section in
which the slave reads or writes its data. Finally, the data payload is followed by a 2 byte of working
counter to check for the correct execution of the operation assigned by the master to the datagram
header.
3.2 Hardware
The hardware implementation of EtherCAT devices for the medium voltage DC (MVDC)
shipboard power system (SPS) consists of one master and multiple slaves distributed over the SPS.
EtherCAT master (CX 5140) is an embedded PC from the CX 5100 series based on the Intel®
Atom™ multi-core processors for deterministic Ethernet with real time applications. The master
unit, supplied by a DC voltage of 24 V, is integrated with Microsoft Windows 7 based operating
system consists of a single-core processor operating at 1.46GHz and a non-expandable 2 GB
DDR3 RAM. The slave unit consists of analog input (AI) unit EL 3702, digital output (DO) unit
EL 2262, a coupler or chassis EK 1501 and an Ethernet fiber-optic junction EK 1521. The data
acquisition unit consists of EL 3702 and EL 2262 i.e. the analog input unit and the digital output
unit. EL 3702, based on eXtreme Fast Control (XFC) technology, is a two channel differential
input terminal operating in a voltage range of -10 to +10 V. The EL 3702 block clocks a conversion
time of less than 10 µs, digitizes the voltage to a 16 bit resolution and has a signal oversampling.
The digital output terminal EL 2262, operates on 24V DC voltage, is developed on eXtreme Fast
Control (XFC) technology and supports resistive, Inductive and lamp loads. It is a 2 terminal
digital output terminal with oversampling and can have a 1 µs cycle time. The oversampling factor
is the integer multiple of the cycle time. EK 1521 is a single port fiber optic junction providing
data transfer rate of 100 Mbaud. It enables a conversion from 100BASE-TX to 100BASE-FX.
multimode glass fiber having a thickness of 50/125 micrometer can be used to connect two stations
kept at a maximum distance of 2000 meter with a delay of 1 µs. EtherCAT coupler EK 1501
connects EtherCAT with its terminals using a multimode glass fiber over a distance of 2000 meter.
17
The vendor claims to connect 65,534 terminals to a single coupler unit and achieve data transfer
at 100 Mbaud with a delay of just 1 µs. TwinCAT 3.1 XAE (eXtended Automation Engineering)
is the software supporting the Automation hardware. Integration of TwinCAT in Microsoft Visual
Studio makes it possible to program automation in various languages like C, C++, .NET,
Matlab/Simulink. TwinCAT is divided into various components, for the developmental purposes
of this project we use TwinCAT 3 Engineering.
3.3 Topology
EtherCAT supports multiple physical topologies like line, ring, star and daisy chain as can be seen
in Figure 3.3. An EtherCAT network consists of a master which is connected to multiple slaves.
Figure 3.4 below shows the line topology of an EtherCAT network consisting of one master and
six slaves. A slave unit consists of one or more analog input terminals and digital output terminals.
The sloid arrow shows the direction of data train when it leaves the master and the dashed arrows
show the direction of data train when it reaches the last node.
Figure 3.3: Physical Topologies
18
Figure 3.4: Master-Slave line topology showing direction of data flow
3.4 Modeling of an EtherCAT frame
The EtherCAT master is the only node within the EtherCAT network allowed to actively send an
EtherCAT frame. EtherCAT slave devices use an EtherCAT Slave Controller (ESC) to process
frames “on the fly”. During startup, the master device configures and maps the process data on the
slave devices. The master device can assign each node a configured node address and communicate
with the node via this fixed address. Different amounts of data can be exchanged with each slave,
from one bit to a few bytes. The EtherCAT frame contains one or more datagrams. The datagram
header indicates the type of access the master device has with respect to the particular
node. Execution of an EtherCAT frame may consist of one or more commands. Each of these
commands has an expected working counter value. In other words, the master knows, how many
slave devices are addressed by an individual command and can calculate the expected working
counter. If the master receives a wrong working counter this indicates, that one or more slaves
have a problem [20].
The Figure 3.5 shows the TwinCAT diagnostic view describing the various occurrences of
commands during the execution of a TwinCAT project. In this particular case, only one frame
(Frame0) is sent cyclically during process data communication. The column named cmd in the
Figure 3.5, lists the sequential execution of all the commands used to configure and execute the
Master- Slave network.
Master
CU-FO
converter FO
node
Analog
Input
Digital
Output
FO
node
Analog
Input
Digital
Output
FO
node
Analog
Input
Digital
Output
FO
node
Analog
Input
Digital
Output
FO
node
Analog
Input
Digital
Output
FO
node
Analog
Input
Digital
Output
CU- Copper
FO- Fiber Optic
Slave 1 Slave 2 Slave 3 Slave 4 Slave 5 Slave 6
19
Table 3.1: Executable commands in EtherCAT master configuration [21]
Table 3.1: Executable commands in EtherCAT master configuration lists and explains all the
commands. The diagnostic also shows the EtherCAT frame size (238 B) and the round trip cycle
time (20.96 µs) for the master-slave network configuration. The round trip cycle time shown in
the TwinCAT scope view comprises of the time taken by the slaves to read the data, conversion
of analog data into digital values that can be written down into EtherCAT frame and the
computation of the algorithm. The computation time of the algorithm can be measured using the
Pentium clock in the master. The master unit essentially a windows machine and can be used to
measure the algorithm computation time by timestamping the start time and the end time of the
Command Abbreviation Name Description Size (B)
1 NOP No Operation Slave ignores command 4
2 ARMW Auto
Increment
Read Multiple
Write
Slave increments address. Slave puts
read data into the EtherCAT datagram
if received address is zero, otherwise
slave writes the data into memory
location.
4
3 LWR Logical
Memory
Write
Slaves writes data to into memory
location if received address matches
with one of the configured FMMU
areas for writing.
4 LRD Logical
Memory Read
Slave puts read data into the EtherCAT
datagram if received address matches
with one of the configured FMMU
areas for reading
5 BRD Broadcast
Read
All slaves put logical OR of data of the
memory area and data of the EtherCAT
datagram into the EtherCAT datagram.
All slaves increment position field.
2
20
algorithm. It takes 530 ns to compute the algorithm for fault identification and location as used in
the present CFL system.
Figure 3.5: A TwinCAT view showing the
sequential execution of commands and its respective size
The Beckhoff master configures all the slave devices connected in the topology and assigns them
an individual address. Master and Slaves communicate over that address. The master calculates
the size of EtherCAT datagram and the size of the entire EtherCAT frame corresponding to the
number of AI and DO channels connected in the topology which will be explained in the later
section.
Cyclic EtherCAT Frame
21
Figure 3.6: The placement of slaves and the number of I/O units connected to each slave
Master generates the number of datagrams equivalent to the number of slaves configured in the
topology i.e. for six slaves connected to a master, the number of datagrams generated will be six.
Each EtherCAT datagram consists of a 10 Byte datagram header, datagram payload and a 2 Byte
working counter. The datagram payload is the numerical sum of the number of fiber-optic
connecter (2 bytes), AI channels (4 bytes) and the DO channels (3 bytes) connected. As per the
present hardware setup as shown in the Figure 3.6, there were 4 slave units each with one fiber-
optic connecter and four analog input and four digital output channels and two slave units each
with one fiber-optic connecter and 2 analog input and digital output channels each, connected in a
line topology. Table 3.2 shows the parameters and their respective size in bytes in creating an
EtherCAT frame.
22
Table 3.2: EtherCAT Frame configuration parameters
Description Abbreviation Size (Byte)
EtherType 𝐸 𝑇𝑦𝑝𝑒 2
Commands 𝐿 𝑐𝑚𝑑 10
EtherCAT Header 𝐸𝑐𝑎𝑡 𝐻 2
Datagram Header 𝐷𝐺 𝐻 10
No. of Slaves 𝑛 𝑠𝑙𝑎𝑣𝑒𝑠 6
No. of Analog Input channel 𝑛 𝐴𝐼 4
No. of Digital Output channel 𝑛 𝐷𝑂 4
No. of Fiber Optic connecter 𝑛 𝐹𝑂 1
Size of Analog Input 𝐿 𝐴𝐼 4
Size of Digital Output 𝐿 𝐷𝑂 3
Size of Fiber Optic connecter 𝐿 𝐹𝑂 2
Datagram working counter 𝐷𝐺 𝑤𝑘𝑐 2
The size of EtherCAT frame (Lframe), number of EtherCAT frames (nframe) payload of a datagram
(DGpl) and size of each individual datagram (LDG) can be calculates by the equations 3.1, 3.2, 3.3,
and 3.4 below:
𝐿 𝐹𝑟𝑎𝑚𝑒 = 𝐸 𝑇𝑦𝑝𝑒 + 𝐿 𝑐𝑚𝑑 + 𝐸𝑐𝑎𝑡 𝐻 + 𝐿 𝐷𝐺 (3.1)
nFrame = ceiling (
LFrame
1500
) (3.2)
𝐿 𝐷𝐺 =∑ (𝐷𝐺 𝐻 + 𝐷𝐺 𝑝𝑙 + 𝐷𝐺 𝑤𝑘𝑐 )𝑛
𝐷𝐺=1 (3.3)
𝐷𝐺 𝑝𝑙 = (𝑛 𝐹𝑂 x 𝐿 𝐹𝑂 + 𝑛 𝐴𝐼 x 𝐿 𝐴𝐼 + 𝑛 𝐷𝑂 x 𝐿 𝐷𝑂 ) (3.4)
23
Figure 3.7: Plot showing the size of EtherCAT frame to the number of slaves
The Figure 3.7 above shows the frame size with respect to the number of slaves connected to the
master. This gives an understanding of the number of bytes of data that can be exchanged with the
number of slaves in the system. As we can see from the Figure 3.7, the x axis shown in the plot
represents the 6 slaves and the y axis represents the size of the frame. As we can compare from the
equation and the number of bytes in the frame match with the TwinCAT scope view shows in
Figure 3.5 and hence can validate the use of the equations 3.1, 3.3, 3.4 to model the EtherCAT
frame size.
Figure 3.8 shows the number of frames that the EtherCAT master needs to generate with respect
to the number of slaves connected to the master- slave topology. The equation 3.2 calculates the
number of EtherCAT frames. The frame number determined by the equation and the number of
frames as can be seen in the TwinCAT scope view in Figure 3.5 match and hence can be used to
24
validate the use of the equation 3.2 to model the number of frames generated by the EtherCAT
slaves.
Figure 3.8: Number of frames as per the slaves connected in the topology
The time taken by the frame (𝑇𝑓𝑟𝑎𝑚𝑒) [22] to send and receive all the bits of data and propagate
through the topology can be represented by the equation 3.5. It is a function of the bandwidth (bw)
of the network and the length of the frame (𝐿 𝑓𝑟𝑎𝑚𝑒).
𝑇𝑓𝑟𝑎𝑚𝑒 =
𝐿 𝑓𝑟𝑎𝑚𝑒 ×8
𝑏𝑤
(3.5)
The Figure 3.9 shows the frame propagation time of the EtherCAT Frame in the network with
respect to the slaves in the system. The EtherCAT hardware used to perform the experiments for
this thesis uses a 100 BASE FX which is a version of fast ethernet over optical fiber and operates
on a bandwidth of 100 Mbps.
25
Figure 3.9: Frame propagation time of the EtherCAT frame
3.5 Modeling of round trip communication cycle time
EtherCAT cycle time can be used to describe the performance index of EtherCAT for an ultrafast
protection system on a real-time Ethernet (RTE)/ EtherCAT network. The minimum round trip
communication cycle time can be denoted as Tc and can be computed as a weighted sum of the
following parameters as shown in Table 3.3: Parameters defining communication cycle timebelow.
The transmission delay of the master [10] can be calculated using the equation below.
𝑇 𝑀
𝑓
= ( 𝑁𝐹 × (𝑆 𝐹𝐻 + 𝑆𝐼𝐹𝐺) + 𝑁 𝑇 × (𝑆 𝑇𝐻 + 𝑆 𝑇)) × 𝑇𝐵) (3.6)
The purpose of the cycle time modeling is to achieve a minimum theoretical cycle time which can
be seen from the equation below.
𝑇𝑐 = 2 × ( 𝑁 𝑇 + 1) × 𝑇𝑝+ 𝑇 𝑀
𝑓
+ (𝑁 𝑇 × 𝑇𝑆
𝑓
) + 𝑇𝑐
𝑝
) (3.7)
26
The Figure 3.10 shows the minimum round trip cycle time with respect to the number of slave
devices connected to the master for a physical line topology.
Table 3.3: Parameters defining communication cycle time
Description Abbreviation
Round trip Cycle Time Tc Formula below
Number of Slaves NT 6
Number of Ethernet Frame NF 1
Number of Frame Header SFH 12 B
Size of Inter-frame gap SIFG 0
Size of the telegram STH 12 B
Number of Ethernet Frame ST 27
Transmission time of one Byte TB 0.028 µs
Maximum delay of Physical Tp 0.5 µs
Master transmission delay TM
f
Formula below
Delay introduced by slave TS
f
0.5 µs
Propagation delay along the cable Tc
P
0.5 µs
As we can see from the Figure 3.10, with six slaves connected in the network, the frame
propagation time is 20.22 µs which is approximately equal to the configured time as can be seen
from the TwinCAT diagnostic in Figure 3.5 hence validates the use of this model for modeling the
cycle time. Figure 3.11 shows the zoomed in graph of the minimum cycle time with respect to the
number of slaves. The Figure 3.10, also gives us an understanding of the cycle time to be
configured in the master according to the number of slaves connected in the topology.
27
Figure 3.10: Showing the round trip cycle time to the number of slaves in the network
As we can see in the Figure 3.5, for the number of slave devices at 15, we achieve a theoretical
cycle time of ~50 µs and hence need to configure a cycle time longer than 50 µs. The equation 3.7
can help in estimating the cycle time of the master- slave system which resemble closely to the
actual cycle time configured by the master and hence can justify the use of equation 3.7 to model
the cycle time of the beckhoff master- slave system.
28
Figure 3.11: Zoomed in on the minimum calculated cycle time from the Figure 3.10
3.6 Decision time modeling
The understanding of the frame size and the round trip cycle time of the master slave network help
us to determine the configuration settings of the automation hardware system and hence the CFL
system in whole. But to understand the decision time of the CFL system it is necessary to
understand the errors and delays added to the systems operation. The decision time of the CFL
system can be divided into three sections i.e. and can be defined as:
1. Time taken by RTDS (TRTDS) to process the signals and its logical operation.
2. Extra time added to the system due to delays and errors (Terror) in the logic processing and
hardware interfacing.
3. The time taken by the Beckhoff (Tbeckhoff) system to read the signals and compute the
algorithm and generate a response signal.
The decision time (Td) is the sum of all the individual timings and can be represented by the
equation below.
Td = TRTDS + Terror + Tbeckhoff (3.8)
TRTDS = nprocessor x TRct (3.9)
Tbeckhoff = (niter + 1) x Tct (3.10)
29
T
error
= T
hsr
+ T
bpr (3.11)
The Table 3.4 shows the description of each of the terms mentioned in the equations above. The
following sections will explain each of the three split up as described above. The Figure 3.12:
Individual timing split-up in the decision time shows the individual timestamps of the processes
involved in the decision time of CFL.
Figure 3.12: Individual timing split-up in the decision time
Table 3.4: Parameters defining decision time
Td Decision time
TRTDS RTDS simulation time
Terror Time due to errors
Tbeckhoff Beckhoff cycle time
nproc step RTDS processing step
TRct RTDS cycle time
niter Number of iteration
TBct Beckhoff cycle time
Thsr Hardware sync error (RTDS & Beckhoff)
Tbpr Beckhoff processing error
30
3.6.1 RTDS processing
The ship power system model is simulated in RTDS at a time step of 50 µs. The fault is initiated
in RTDS as can be seen by a blue curve in the Figure 3.13. After the fault is initialized, it computes
a logic which enables the analog signals to be sent out of the RTDS. This RTDS logic is processed
onto two different controls processer and accounts for two timestamp processing time. The signals
are sent out from the front panel analog output and in the range of (-5 V to +5 V). The Figure 3.13
shows the two timestamp process, (50 µs each) required to process and send the signal out from
the RTDS.
Figure 3.13: The two timestamp processing of the RTDS model
tRTDS = nprocessor x tRct (3.12)
The equation shows the number of processing steps taken multiplied by the simulation time of
each step determines the time taken by RTDS to compute the logic and send the output.
100 µs
31
3.6.2 Beckhoff processing
The front panel analog input from RTDS sends the signal to the Beckhoff analog input terminals
which reads the analog signal. These analog signals are converted to digital signals by an A/D
converter and subsequently uploaded onto the data train eventually arriving at the master. The
master reads the data train and extracts values from the slaves. This extracted information is used
to process the protection algorithm. The counter threshold for the protection algorithm is set to
five, the algorithm computes for five consecutive iteration to determine a fault in the SPS. The
master reads the data when the first data train arrives at the analog input terminal and sends out
the decision it makes from the first dataset in the second data train, resulting in n+1 cycles (where
n is the number of iterations). The cycle time of the master can be configured from 50 µs and
above.
Figure 3.14: 6 (n+1) cycle times at 50 µs cycle time
32
Figure 3.15: 6 (n+1) cycle times at 100 µs cycle time
tbeckhoff = (niter + 1) x tct (3.13)
The equation above computes the time taken by the master to determine the fault. Substituting tct
as 50 µs and niter as 5, the time taken by the master to compute the algorithm and send out the
response is 300 µs as can be seen from the Figure 3.14 and for the cycle time of 100 µs for a 5
iteration process, the master takes 600 µs to respond to a fault as shown in Figure 3.15. Figure
3.14 and Figure 3.15 above shows an oscilloscope plot of the n+1 cycles.
3.6.3 Hardware synchronization
A master-slave network has various components distributed throughout the topology and it is
useful to make them operate in synchronization with each other. At times closely linked to each
other. The slave units are governed by local clock embedded in the EtherCAT slave controller
33
(ESC). The distributed clock (DC) [21] concept of the EtherCAT is used to synchronize the local
clocks. The master is assigned with the task to synchronize the DC at less than 100 ns system
accuracy irrespective of the distances between the individual controller and the network topology.
Figure 3.16: A two cycle time, worst case, EtherCAT response [21]
Figure 3.17: The time taken by master to compute a fault and generate a trip signal
Worst
34
There is another synchronization error between interfacing of the RTDS and the slaves. The slaves
and RTDS are not synchronized by means of an external clock. Due to the phase shift in the local
clocks of each controller, there may be a single timestamp error.
The Figure 3.17 shows the time taken by RTDS to simulate the fault in the SPS model and the
time taken by the beckhoff to compute the fault and give a response. The 450 µs duration between
the initiation of the fault and the response from the master as shown in the figure consists of the
RTDS processing time, hardware synchronization error and the beckhoff processing time.
In the Figure 3.18 shows the timing of each of the events happening in the complete CFL
process.
Figure 3.18: Events happening in the fault detection by a CFL system for a 50 µs 5 iterations
As we can see in the Figure 3.18 the time taken by the CFL to respond to a fault in a SPS consists
of three sections i.e. the time taken by RTDS, time taken by beckhoff system and the hardware
synchronization error. The blue curve shows the initiation of fault in RTDS which takes 100 us to
simulate the logic and send out the current signal from its front panel analog output terminals
(shown in green) to the analog input terminals of the slaves. There is no synchronization between
the simulation tool and the controller hardware and hence there may exist a 1 time step delay. The
35
beckhoff delay of 2 time step will cause another 100 us delay in read of signals by the analg input
of the slaves. The slaves read and send the data to the master for processing in the algorithm and
this is don for 5 consecutive iterations and hence take 300 us to generate a response signal as shown
in the red. This decision of the beckhoff system is sent back to RTDS again and which triggers
some further simulation and finally generates a signal which triggers the fault clearing sequence
to operate.
Figure 3.19: Fault detection time by CFL for a
50 µs and 3 iterations for each individual slave in the network
The Figure 3.19 and Figure 3.20 above shows the fault detection time when each slave is added to
the master- slave topology. The underlying assumption in testing above is that the last slave unit
is connected to the fault location. Figure 3.19 shows the CFL detection time for a 50 µs EtherCAT
cycle time and 3 iterations.
Figure 3.20 shows the CFL detection time for a 100 µs EtherCAT cycle time and 3 iterations. As
we can see, there is a one cycle or two cycle time latency in the CFL detection.
36
Figure 3.20: Fault detection time by CFL for a
100 µs and 3 iterations for each individual slave in the network
3.7 Factors affecting performance of CFL
In order to fully understand the capabilities of the CFL system, understanding of the parameters
affecting the response of CFL is very critical. The few parameters which can affect the system
response are as follows:
3.7.1 Topology
This is one of the indices which could affect the performance of the CFL system. The network
which master and slaves connects can affect the achievable cycle time of the system. This section
discusses about the two topologies, line topology and ring topology.
The equations listed below can be used to calculate the communication cycle time. Where Tcycle
represents the communication cycle time, Tframe represents the time taken by the frame to propagate
through the network. Tnetwork consists of the forwarding delays produced by the slave devices and
the delays caused by physical layer components [22].
Tcycle = Tframe + Tnetwork (3.14)
37
The factors determining the length of frame has been discussed in the previous section. The time
for frame propagation also depends on the bandwidth (bw) and can be shown in the equation
below.
Tframe = Lframe x 8 / bw (3.15)
1. Line topology
Line topology is the simplest network topology and also one of the most widely used. This
topology avoids creation of a complex mesh of cables and leads to easy maintenance of the system.
The equations below show the calculations for the network propagation time and the forwarding
time by each node. These timings combined with the frame propagation time accounts for the total
communication cycle time.
Tnetwork = Tcable + Tmaster + (n-1) x Tnode + tEndNode (3.16)
Tnode = tMMp + tMMf + 2 (tRx + tTx) (3.17)
As the frame propagates through the slaves it reaches the last slave and the master detects an open
node. The last slave will send the frame straight back to the master and can be computed by the
equation below.
TEndNode = tMMP + tRx + tTx (3.18)
Table 3.5: Timing of different delays of master
Symbol Description Value (ns)
tMMf Forwarding delay 265
tMMP Processing delay 305
tRx Receive delay 320
tTx Transmit delay 140
2. Ring topology
Ring topology provides an advantage over the line topology by creating a return path for the data
train to return to the master. The last slave will have a return path to forward the data from the last
slave back to the master. This return path can also lead to a redundant topology as there is an
additional path for the data to flow once a section of the cable is lost.
38
Tnetwork = Tcable + Tmaster + ∑ Tnode (3.19)
Tnode = tMMp + tMMf + 2 (tRx + tTx) (3.20)
The Figure 3.21 shows the comparison of round trip cycle time of a line and ring topology. The
line and ring topology can have comparable performance for a small network but ring topology
has greater performance for a large network.
Figure 3.21: Comparison of a round trip cycle time of a line and a ring topology
3.7.2 Jitter
Jitter is the short-term variation of the times of the respective bits from their ideal times [26] In
short jitter can be described as latencies in the network stations which result in the variation of the
cycle time [23]. The equation below can be used to calculate the jitter occurring in the system.
Jitter can be caused in the master-slave network if the master is not configured for a proper cycle
time. If the master cycle time is lesser than the total communication cycle time, jitter may occur..
39
A large jitter in the network can cause the CFL system to miss a cycle of data collection and can
cause delays in the fault identification and location.
J =|Tc − Tcm| / Tc (3.21)
Where,
Tc is the nominal cycle time configured at the beginning of the network
Tcm is the actual measured network time
Figure 3.22: Bandwidth relationship between minimum cycle time and number of slaves
3.7.3 Bandwidth
Bandwidth can be defined as the amount of data that can be transmitted in a fixed amount of time.
In the equation below [23], MCT represents the minimum pooling period of the slave devices. For
an EtherCAT system, the MCT is calculated to be 17.28 µs. For a 100 Mbps transmission speed,
non-real-time bandwidth (NRB) can be computed from the equation 3.22 below.
NRB =
|Tc − MCT|
𝑇𝑐
× 100 (3.22)
40
Figure 3.22 shows the bandwidth relationship between minimum cycle time to the number of
slaves connected in the master-slave topology [22]. This relationship is developed for a fast
Ethernet of 100 Mbps and Gigabit Ethernet of 1 Gbps for a 4 byte data. As we can see, the gigabit
Ethernet performs better than the fast Ethernet and can achieve faster round trip cycle time. The
analysis of the effect of bandwidth on the round trip cycle time of the system can help in better
selection of the parameter of the CFL system for an actual ship.
Figure 3.23: The network propagation time with respect to number of slaves
3.7.4 Network propagation time
The time taken by the frame to propagate throughout the network depends on factors like payload
size of the data, the length of the cable section and the number of nodes connected in the network.
For a transmission speed of 100 Mbps and a constant payload size of 4 bytes, the network
propagation time with respect to the number of slaves connected in the topology can be shown in
the Figure 3.23.
41
3.7.5 Noise
The CFL system relies on reliable data communication for performing its fault location and
identification function. Noise can be a critical factor causing a disturbance in the communication
channel and could possibly lead to an incorrect CFL fault detection. Noise is a relative concept
and can mean differently for different conditions, hence, defining noise is important.
Noise can be defined as a random, undesirable energy that enters the communication system via
the communicating medium and interferes with the transmitted message [27], [28].
A preliminary analysis of effects of noise on the CFL system was performed. The aim of this study
was to explore on the question: At what amount of noise in the measurements will the CFL system
generate a false decision.
3.7.5.1 Sources of noise in a system
Noise in the system can arise due to many internal and external factors and it is practically
unavoidable. The noise can cause degradation in the performance of both analog and digital
systems in which the receiver receives an adulterated version of the data sent to it by the sender
and hence it is unable perform its required functionality thereby reducing the efficiency of
communication system.
Sources of noise can be classified into two
1. Internal noise
2. External noise
1. Internal noise
Internal noise is caused by the disturbances in the internal electric due to design imperfections or
random motion of the electrons. Some examples of internal noise are listed below:
 THERMAL NOISE (JOHNSON NOISE)
Thermal noise or Johnson-Nyquist noise is an electronic noise generated by the thermal agitation
of the electrons flowing inside the electrical conductors. Thermal noise is generated by all devices
which cause resistances to the flow of electrons. As the temperature increases, the kinetic energy
in the conductor increases which increases the random motion increases which increases the
thermal noise can be seen in the Figure 3.24.
42
Figure 3.24: Random motion of electrons due to increase in temperature
Results of experiments performed by Johnson stated that the power of noise measured in a
conductor is directly proportional to the absolute temperature and bandwidth of the measuring
instrument. This was theoretically studies by Nyquist which resulted in the formulation of the
mean square noise voltage which can be defined as shown in the equation (3.23).
V2
= 4kTBR (3.23)
Where,
k is the Boltzmann’s constant,
T is the absolute Temperature,
B is the bandwidth of noise,
R is the resistance offered by the conductor.
 SHOT NOISE
Shot noise is used to describe the type of noise which arise from the random fluctuations in the
emission of electrons from cathodes in vacuum tubes. Shot noise, occurs due to the ejection of
charge career, in semiconductors that have a considerable amount of charge in the pn junction.
This charge creates a current which is effectively a summation of current pulses. The equation 3.24
shows the current generated due to shot noise as a series of current pulses.
i(t) = Io + in(t) (3.24)
Where
43
𝑖(𝑡)- total current (A)
0I - constant current (A)
𝑛(𝑡)- noise current (A)
2. External noise
External noise is caused by factors external to the system like lightning, switching of electrical
equipment, signal interference and may also be caused due to faults in the system. Below is the
list of some external sources of noise.
 Electrostatic interference
 Electromagnetic interference
 Radio frequency interference
The devices which lead to sudden changes in the voltage or current levels are sources of noise. It
is also called as impulse noise. Some of the common sources of impulse noise are listed below
[29], [30]:
 Switching of large electrical devices
 Lightning strikes
 Electrical Faults
 High power equipment.
The mitigation of noise is essential for the CFL system as an improper signal could cause the
system to detect false trip and might lead to the isolation of a healthy section of the power system.
The following techniques can be applied to reduce the effects of noise.
 Physical isolation of noise generating equipment from noise-sensitive equipment
 Electrical isolation
 Shielding or screening of noise sources and equipment affected by noise
44
Figure 3.25: Additive White Gaussian Noise model
3.7.5.2 Additive White Gaussian noise
Additive white Gaussian noise is one of the most widely used models to represent a random
process. For modeling purposes, it is fair to assume the noise in the communication systems to be
Additive White Gaussian Noise (AWGN) [27], [28].
Additive
Noise can be assumed to be additive because the noise signal is usually added to the information
bearing clean signal. The Figure 3.25 shows the representation of a noise model. In this, the clean
signal is added with a noise and hence the receiver receives the signal with additive noise.
White
White noise is assumed to be a random signal with a constant power spectral density, given that
the noise is not band limited by some filter bandwidth.
Power spectral density of a white noise can by expressed as  fpo can be seen in the Figure 3.26.
White noise =  fpo = Constant
Gaussian
We generally term noise as a random power and hence it can also be assumed to have voltage
amplitudes following a Gaussian distribution.
45
Figure 3.26: Depicting the uniform frequency of white noise
3.7.5.3 Signal to Noise ratio (SNR)
The ratio of signal voltage to noise voltage read by the receiver can be used to determine the
strength of the signal. The SNR model can be used to determine how well the communication
system will operate. In communication systems, generally, the signal voltage at the source remains
stable. The noise is added to the signal voltage during its propagation in the cable can depend on
the length of the cable and the cable resistance. The equation 3.25 can be used to calculate the
SNR.
SNR= 20 × log10(
𝑉𝑠𝑖𝑔𝑛𝑎𝑙
𝑉𝑛𝑜𝑖𝑠𝑒
) (3.25)
The SNR is usually expressed in decibels (dB), it is defined as the logarithmic ratio of the signal
voltage (Vsignal) and noise voltage (Vnoise).
The Figure 3.27 shows a relation between the SNR and noise percentage in a signal. It can be seen
that the higher the SNR, the lower the noise percentage and hence easier to provide acceptable
performance.
Figure 3.28 shows the noise levels which are added to the signal when the SNR is 10 dB, 15 dB
and 20 dB, the blue curve representing SNR of 10 dB shows a higher variation in the signal levels
when compared to the SNR of 15 dB or 20 dB. This can also lead to an understanding that the
higher signal to noise ratio provides a better chance for a cleaner signal.
Noise
Frequency
Constant
46
Figure 3.27: SNR with respect to noise in the signal
Figure 3.28: Noise levels
3.7.5.4 Noise modeling on CFL system
The CFL system is based on instantaneous data measurements from analog input terminals
distributed throughout the power system. Using the AWGN model and SNR model, it is possible
47
to mimic the effect of noise that is possible to be observed on the fault identification process. To
model the noise in the CFL system, two cases were studied. In case 1, only one of the two analog
input nodes receive a noise and the second receives a clean signal. In case 2, both the nodes of the
analog inputs receive noise signal. This study has an underlying assumption that 2 analog input
nodes are being monitored for a line-to-line fault in the SPS model described in the previous
chapters.
CASE 1: Only one node receives noise
In Figure 3.29, there are two nodes i.e. “Node A” and “Node B”. In this case we assume having
noise only in one of the two nodes (Node B). Hence the “Node B” receives a clean signal with an
additive noise signal. The current signal is generated by RTDS for a line-to-line fault in the SPS
simulation model and the noise signal with the particular SNR is being modeled in Matlab.
Figure 3.29: Node B receiving noisy signal
Figure 3.30 shows the effect of noise on the current signal. The figure represents the condition
when a fault has occurred in the SPS. The blue curve represents a clean signal which is being
generated by RTDS. The other curves represent a noise added to the clean signal. As can be seen
from the Figure 3.30, the SNR of 10 dB has a higher amplitude of variation compared to the others
which also validates the statement that the signal with higher value of SNR can be read better by
a receiver.
48
Figure 3.30: The effect of noise on the current signal
Figure 3.31: Effect of Noise on Slope calculated by the algorithm of the CFL system
Figure 3.31 shows the effect of noise on the slope calculation of PDP algorithm which determines
the fault in the SPS. The slope value to determine a fault in the system is assumed to be 0.4. The
49
curve representing SNR 10 dB represent a noise level of approximately 30%. As we can see, the
fault occurs at time 8 µs and at 9 µs the slope value crosses the threshold of 0.4, but due to noise
in the signal, the slope appears to be ~0 leading to a faulty decision. Also at time 5 µs and 6 µs,
the clean signal reads ~0 but the amplitude of the noise is ~0.4. This could possibly lead to a faulty
operation of CFL. This is also a factor to be considered when setting the slope and the counter
threshold for the CFL system.
CASE 2: Noise in both the nodes
In Figure 3.32, there are two nodes i.e. “Node A” and “Node B”, in this case we assume both the
nodes (Node A and Node B) receive noisy signal. The current signal is being generated by RTDS
for a line to line fault in the SPS simulation model and SNR model is used to add the noise to the
clean signal in Matlab.
Figure 3.32: Noise in both Node A and Node B
Figure 3.33 shows the noise profile for the two nodes (Node A and Node B) for SNR of 10 dB, 15
dB, and 20 dB.
Figure 3.34 below shows the effect of noise on the slope calculation by PDP algorithm for the
CFL system. The slope threshold is set at 0.4. We can see for SNR of 10 dB and 15 dB, the
magnitude of variation caused by the noise, for some instances, is greater than 0.4 and could
possibly lead to a false detection or no detection by the CFL system.
50
Figure 3.33: Noise profile in node A and node B
We can see from the curve of SNR 10 dB, the slope crosses the threshold of 0.4 for two consecutive
iterations on two occasions. This will lead to a faulty counter increment but ay not lead to a faulty
CFL detection. The fact that this event occurs twice with an interval of one timestep indicates a
possibility of false detection by CFL system. This analysis raises the question on the amount of
filtering needed to prevent this occurrence and also on indicates a deeper analysis on the slope
threshold value and the counter threshold value.
Figure 3.34: Effect of Noise on Slope calculated by the algorithm of the CFL system
51
3.8 Summary
This chapter describes the various models used to predict the CFL system performance. These
performance models like round trip cycle time, frame size, decision time can also be used to
understand the CFL system scaling for a full ship system. Various factors affecting the CFL
performance like topology, jitter, bandwidth, noise were identified and were studied.
52
CHAPTER 4
CFL IMPLEMENTATION ON SHIPBOARD POWER SYSTEM
This chapter presents the hardware implementation of the CFL system on a Beckhoff automation
hardware with EtherCAT as a network protocol for data communication. The CFL system was
implemented and demonstrated on a hardware in the loop (HIL) simulation on RTDS and tested
for various fault impedance and system operation conditions.
4.1 Hardware in the loop testbed
The CFL system follows a master-slave line topology communicating over a deterministic real-
time Ethernet (EtherCAT). The Figure 4.1 shows the 1 MW, 5 kV MVDC SPS, along with the
master-slave serial topology, modeled for the study. There are two AC generators each rated at 1
MW. Each generator is interfaced to the 5 kV MVDC bus through a 1 MW MMC. An average
value model of the MMC which has been derived from experimental results of CHIL
implementation of MMC has been used. Each MMC is current limited to 228 A (rated operation,
1 MW, 200 A at 5 kV). There are 12 cable sections in this model. The impedances and lengths of
the cable sections are presented in [3] MMC 1 and MMC 3 are source MMCs to which the 1 MW
generators are interfaced. There are two loads on the system, each rated at 500 kW on the 5 kV
DC bus. The MMC's can be operated in voltage source mode (VSM) or current source mode
(CSM). The 5 kV DC bus ring bus has dc disconnects at each end of the cable section so as to
maintain stable operation of the system in an occurrence of a fault by rerouting the power generated
to the load centers. The MVDC ship power system model is implemented on a real time digital
simulator (RTDS) operating at a 50 µs time step and interfaced with an industrial automation
hardware on which the protection scheme is implemented. The communication protocol between
master and its various slaves is EtherCAT.
The 1 MW MVDC SPS is simulated in RTDS, it consists of a centrally located master along with
slaves distributed throughout the MVDC SPS. The slaves consist of a fiber-optic converter, which
converts 100 base TX to 100 base FX, along with multiple analog input channel and digital output
channel connected to the fiber-optic connector for read and write of data to and from the simulation
model. This HIL simulation model [2] consists of has nine analog input channels gathering
53
instantaneous current values from the disconnect switches located across each cable section
throughout the SPS and nine digital output terminals sending the status signal out to indicate the
fault location and also to trigger the fault clearing sequence. The analog and the digital terminals
communicate with the master over EtherCAT and the data packet is transmitted over fiber optic
cables between each slave.
Figure 4.1: MVDC shipboard power system with the communication architecture
The location of protection zones on the SPS are designated in an overlapping manner such that
they provide redundant protection to each of the cable sections of the SPS and at the same time do
not create a false trip signal to open the disconnect switches in the adjacent cable. The Figure 4.2
is a screenshot of the RSCAD runtime from the SPS model. There are five cable sections on which
line-to-line fault can be applied. The Table 4.1 shows the fault location and the respective
disconnect switch which needs to open in order to isolate the faulty cable section.
Figure: MVDC shipboard Power system with the communication architecture
CS1 CS2 CS3
CS4
CS5CS6CS7
CS8
F I O
FIO
F
IO
F I O
F
I
O
Master
F
I
O
MMC 4
Input signals (Current) from RTDS to Beckhoff Analog Input
Output signal from Beckhoff Digital Output to RTDS GTDI
Master Slave Connection (Fiber)
Disconnect Switch
F- Fiber optic converter junction
CS- Cable Section
I- Analog Input Terminal
O- Digital Output Terminal
F
I
O
Slave
UnitMMC 3 MMC 2
MMC 1PGM
PGM
Load
Load
54
Figure 4.2: The location of cable section and disconnect switches
as seen in the RSCAD Model
Table 4.1: Fault location and the respective disconnect switch
associated with the particular fault location
Fault Disconnect Switch
Cable 1 A B -
Cable 2 B J C
Cable 3 C Q D
Cable 4 D L F
Cable 5 F N A
Cable 1
Cable 2
Cable 3
Cable 4Cable 5
55
As we can see from the Table 4.1, if there is a fault in cable 1, disconnect switches A and B need
to open. But disconnect switch A is also associated with a fault in cable 5 and disconnect switch
B is associated with the fault in cable 2. The CFL system needs to ensure that it only sends
commands to isolate the fault in cable 1 and do not affect the healthy sections of the remaining
power system.
The Figure 4.3 shows the plots of faults in each cable sections. As it can be seen from the plots
below, the disconnect switches guarding the respective cable sections open and cause the trip
signal to initiate the fault clearing sequence.
Cable Fault 1
Cable Fault 3
Cable Fault 2
Cable Fault 4
Figure 4.3: Selectivity of CFL operation
56
4.2 Fault clearance process of MVDC system
The fault clearing in the breakerless MVDC system can be achieved by the total de-energization
of the affected section of the MVDC shipboard power system leading to isolation of the affected
section via the opening operation of the disconnect switches while the system is de-energized and
finally re-energization of the remaining section of the shipboard power system.
The Figure 4.4 shows the sequential execution of the fault clearing sequence.
As the fault may happen in any part of the SPS (e), the fault current rises (a, b), the power
converters feeding the ring bus will be forced into current limiting mode by their built-in
overcurrent protection scheme. It then leads to a complete de-energization of the system by
ramping the system voltage to zero as shown in (c, d). The CFL system detects and locates the
fault (f) and initiates the fault clearing sequence. The fault clearing sequence isolates the faulty
section from the healthy section and commands the opening of the disconnect switch. Once the
faulty section is isolated, a control signal (g) indicating the clearance of the fault will be sent to
the converters to initiate the system recovery. The system recovers by raising up the voltages (c,
d) for zero to operating conditions. Hence completes the recovery of the MVDC system.
4.3 CHIL implementation of CFL
To analyze the performance of the CFL scheme, a HIL simulation model was developed as
described in the section above i.e. a 1 MW, 5 kV model with two generating units represented by
MMC’s capable of operating in VSM and/or CSM and two loads connected to the DC ring bus
configuration.
Cable Fault 5
57
Figure 4.4: Execution of the fault clearing sequence
The Figure 4.5 shows a block diagrammatic representation of the various sections of the CHIL
testbed and Figure 4.6 shows a photograph of the actual CHIL test bed with the CFL system and
the RTDS at CAPS. The CFL hardware setup consists of one master unit interacting with six slave
units over EtherCAT. The testbed is a scaled down representation of the anticipated full-scale
MVDC shipboard power system. The various tests and the simulation results performed on the
CHIL setup are described in the sub-sections below [2].
58
Figure 4.5: Block diagram describing Hardware in the loop (HIL) testing system
Figure 4.6: HIL testbed
59
4.3.1 Faster CFL implementation
To validate and evaluate the implementation of CFL scheme on the new hardware setup a CHIL
test-bed was created as shown in the block diagram in Figure 4.7. The core motive behind this test
was to test the fault identification and location timings and to compare them with the previously
used hardware. The RTDS simulates the SPS model at a 50 µs time step while the round trip cycle
time of CFL hardware is 50 µs. A bolted rail to rail fault was tested at various location on the DC
ring bus. The time taken by the new CFL hardware to identify the fault in the system is 800 µs, as
shown in Figure 4.7, which is nearly four times faster than the fault identification time in the
previously used hardware.
Figure 4.7: Showing the fault detection by CFL
4.3.2 CFL response under various fault impedances
This section describes the response of CFL scheme for various fault impedances. During a high
impedance fault, the fault current is relatively low and it may become difficult to distinguish
between load currents and fault currents. But CFL, which operates on PDP scheme, is able to
perform its fault location and identification job even in this fault condition. The Figure 4.8 below
shows the CFL response under low impedance (fault impedance 0.1 Ω) fault and high impedance
(fault impedance 20 Ω) fault conditions. As we observe, the fault detection time in either of the
fault impedance conditions was similar and hence we can validate the CFL operation under various
fault impedance conditions.
60
Figure 4.8: CFL response in different fault impedance conditions
4.3.3 CFL response for different system configurations
The CFL scheme was tested to determine if a fault can be identified in the system irrespective of
whether the SPS is run in radial or ring bus configuration. Figure 4.9 shows the CFL fault detection
under the closed ring and open ring SPS configuration. As we can see, the CFL system is able to
detect the fault in the system in the event of a fault in the open ring configuration of the SPS. Hence
validates the CFL operation.
Figure 4.9: CFL response in closed ring and open ring bus system
61
4.3.4 CFL response for different loading conditions
This section aims to verify the operation of CFL under different loading conditions. The higher
loading condition may lead to the slower rise in the magnitude of the fault current which might
cause inaccurate operation of CFL system. The SPS was loaded differently in the two test cases
that in case one the generators were producing 0.544 MW and in the case two the generators were
producing 0.125 MW. As we can see in Figure 4.10, the CFL scheme demonstrates the fault
detection in both the system loading condition.
Figure 4.10: CFL test waveforms under different loading conditions
4.3.4 CFL response under mmc VSM and CSM operation
To observe the CFL response under various MMC operating configuration, two cases were created.
In the first case, both the MMC's were made to operate in VSM whereas in the second case, MMC1
was operating in VSM and MMC 3 was operating in CSM. Figure 4.11 shows the fault detection
time by CFL in both the conditions when both the MMC’s i.e. MMC1 and MMC 3 are being
operated in VSM and the curve in green represent the CFL detection time when MMC1 is being
operated in VSM and MMC 3 is being operated in CSM. Figure 4.11 it is shown that the CFL
operates with satisfactory performance under different system configurations.
62
Figure 4.11: CFL detection in various operating modes of MMC's
r system.
Table 4.2: CFL decision time with respect to the different system operating conditionslists all the
above experiments to check and validate the operation of the CFL system in different SPS
configurations. As we can see, the CFL system is able to operate in a fast and precise manner. This
table also shows the comparison of the older CFL system with the new CFL system and shows
that the new system is ~4 times faster than the older system.
Table 4.2: CFL decision time with respect to the different system operating conditions
CONDITION TYPE TIME (µs)
FASTER IMPLEMENTATION NEW SYSTEM 800
OLDER SYSTEM 4 ms
FAULT IMPEDANCE LOW IMPEDANCE FAULT 750
HIGH IMPEDANCE FAULT 800
POWER SYSTEM
CONFIGURATION
OPEN RING 750
CLOSED RING 800
LOADING CONDITION 0.544 MW 750
0.125 MW 800
OPERATING MODES VSM- CSM 750
63
VSM- VSM 800
4.4 Summary
This chapter provides an overview of the CHIL testbed used to demonstrate the ultrafast CFL
system operation. The new system is more than 4 times faster than the older CFL system. The
CFL system was tested for different system operating conditions and the whole fault clearing
process is described.
64
CHAPTER 5
CONCLUSION AND FUTURE WORK
5.1 Conclusion
A system which is ultrafast and precise in fault detection and location called centralized fault
location and identification (CFL) is seen to perform its necessary functionality. The factors aiding
to assess the scaling and the performance of the CFL system were identified and analyzed for a
line-to-line fault in the medium voltage DC shipboard power system. This research presents a
demonstration of a faster CFL system and the analysis of the performance models of the centralized
fault identification and location (CFL) system for a MVDC shipboard power system.
Two types of CFL topology were discussed and were tested for the fault current limited MVDC
power system. The performance models demonstrate a methodology to configure the CFL system
and to scale the prototype system for a real world operation. The key feature of the research can
be summarized as follows:
1. Mathematical models to understand the performance of the CFL system were designed
and validated with experimental results.
2. Models were used to understand scaling of the prototype CFL system for an actual
shipboard power system.
3. The fault identification system was implemented on a new, industrial automation
system hardware platform based on data acquisition and was tested on a CHIL testbed
to detect and locate fault in the SPS.
4. The CFL system is intelligent and ultrafast in fault detection and precise in fault
location.
5. The performance models indicate the number of slaves as a major factor affecting the
design of the CFL system.
6. Two type of physical topology were studied and its effects on CFL system were
analyzed. It is found that the ring topology could have multiple possible benefits than
using a line topology.
65
7. The CFL system was tested of various configurations of the SPS and was found to
accurately and rapidly detect the line-to-line fault in the cable section in around 300 µs.
5.2 Future Work
5.2.1 Hardware Implementation of a ring topology
Line topology can provide with the basic functionality of fault location and identification
but faster response time can be achieved with a ring topology. Using ring topology can provide
additional benefits like faster cycle time, resiliency in loss of one communication cable.
5.2.2 Validating the system resiliency for cable cut condition
Due to some reasons, there can arouse a condition where a cable is cut in the system.
Testing of system response and maintaining the CFL functionality is an important task under such
conditions.
5.2.3 System level control
CFL system as described in the chapters above, provides a standard functionality of fault
location and identification for a MVDC power system. After the fault has been detected, a system
level control has to take over the responsibility of system recovery
5.2.4 Exhaustive Noise analysis
Noise is a major source of disturbance and can lead to faulty operation and loss of
sensitivity of the CFL system. A detailed noise analysis using various noise models and
determining the appropriate noise level which this system can withstand can provide better
understanding of the system performance.
5.2.5 Integrating multiple CFL units
The CFL system was tested for a 1 MW model of MVDC power system which has 5 cable
section. A larger system with multiple protection zones and multiple master-slave system
interaction with each other can provide redundancy to CFL functionality. To achieve the desired
CFL decision time with respect to the size of the power system would require multiple CFL units
interacting with each other. For example, with 1 master and 50 us cycle time, we can have
approximately 15 slaves connected in the topology. But in the real ship there may be a need for
66
more than 15 slaves and hence having multiple CFL units interacting with each other can provide
the necessary 50 us cycle time
5.2.6 Sensitivity analysis of the differential protection scheme
Percentage differential protection (PDP) scheme used for fault identification and location
in the CFL system need to analyzed for sensitivity and adaptiveness of slope based on shipboard
power system operation. The values of restraint current and the minimum pickup current can be
modified to change the sensitivity of slope calculation.
67
REFERENCES
[1].Liu, X., Ph.D. Thesis. “A Centralized Fault Management Approach for Smart Grid
Protection,” Center for Advanced Power Systems, Florida State University, 2014.
[2].Tamaskar, Shravan, Harsha Ravindra, Mike Sloderbeck, Ruturaj Soman, and Michael
Steurer. "CHIL-based Demonstration of Centralized Fault Location Strategy for a MVDC
Shipboard Power System."
[3].Qiu Deng; Xing Liu; Soman, R.; Steurer, M.; Dougal, R.A., "Primary and backup
protection for fault current limited MVDC shipboard power systems," in Electric Ship
Technologies Symposium (ESTS), 2015 IEEE , vol., no., pp.40-47, 21-24 June 2015.
[4]. Mehta, V.K. principles of power systems. S Chand. 2005
[5].Cuzner, R, DRS Power & Control Technologies, Inc., “Next Generation MVDC
Architecture Study” 2015
[6].Doerry, N., and J. Amy Jr. "MVDC Shipboard Power System Considerations for
Electromagnetic Railguns."
[7].Thompson, Michael J. "Percentage restrained differential, percentage of what?."
In Protective Relay Engineers, 2011 64th Annual Conference for, pp. 278-289. IEEE,
2011.
[8].Miao, Shihong, Pei Liu, and Xiangning Lin. "An adaptive operating characteristic to
improve the operation stability of percentage differential protection." Power Delivery,
IEEE Transactions on 25, no. 3 (2010): 1410-1417.
[9].https://www.ethercat.org/
[10]. CAI, Ziyuan, and Ming YU. "Modeling and Simulation of a Real-time Ethernet Protocol
for Smart Grids." International Journal Of Intelligent Control And Systems 17, no. 3
(2012): 69-78.Df
[11]. Knezic, Mladen, Branko Dokic, and Z. E. L. J. K. O. Ivanovic. "Topology aspects in
EtherCAT networks." In Proceedings of 14th International Power Electronics and
Motion Control Conference EPE-PEMC 2010. 2010.Df
[12]. Prytz, Gunnar. "A performance analysis of EtherCAT and PROFINET IRT." In Emerging
Technologies and Factory Automation, 2008. ETFA 2008. IEEE International Conference
on, pp. 408-415. IEEE, 2008
[13]. http://infosys.beckhoff.com/
ShravanTamaskar_Thesis
ShravanTamaskar_Thesis
ShravanTamaskar_Thesis

Weitere ähnliche Inhalte

Was ist angesagt?

Laboratory Prototype Documentation 1
Laboratory Prototype Documentation 1Laboratory Prototype Documentation 1
Laboratory Prototype Documentation 1
Vadim Artishuk
 
Executive Summary
Executive Summary Executive Summary
Executive Summary
Adam Burck
 
2014 Namibia Science Report Final-1
2014 Namibia Science Report Final-12014 Namibia Science Report Final-1
2014 Namibia Science Report Final-1
Ronald Guthrie
 
Stories Of The Sahabah For Children
Stories Of The  Sahabah For  ChildrenStories Of The  Sahabah For  Children
Stories Of The Sahabah For Children
Soledad000
 

Was ist angesagt? (18)

Minnesota Faculty Teaching Contract mscf final 2013_2015
Minnesota Faculty Teaching Contract mscf final 2013_2015Minnesota Faculty Teaching Contract mscf final 2013_2015
Minnesota Faculty Teaching Contract mscf final 2013_2015
 
Inglés 3º medio teacher´s book
Inglés 3º medio   teacher´s bookInglés 3º medio   teacher´s book
Inglés 3º medio teacher´s book
 
Thesis on barriers to e commerce in jamaica - Patrick Thompson
Thesis on barriers to e commerce in jamaica - Patrick Thompson Thesis on barriers to e commerce in jamaica - Patrick Thompson
Thesis on barriers to e commerce in jamaica - Patrick Thompson
 
Laboratory Prototype Documentation 1
Laboratory Prototype Documentation 1Laboratory Prototype Documentation 1
Laboratory Prototype Documentation 1
 
World of the Unseen - II
World of the Unseen - IIWorld of the Unseen - II
World of the Unseen - II
 
Dafis fsd16
Dafis fsd16Dafis fsd16
Dafis fsd16
 
Odesa report
Odesa report Odesa report
Odesa report
 
jlboyd0616
jlboyd0616jlboyd0616
jlboyd0616
 
Rapport de la Banque Mondiale sur la Production et la Consommation du Charbon...
Rapport de la Banque Mondiale sur la Production et la Consommation du Charbon...Rapport de la Banque Mondiale sur la Production et la Consommation du Charbon...
Rapport de la Banque Mondiale sur la Production et la Consommation du Charbon...
 
Executive Summary
Executive Summary Executive Summary
Executive Summary
 
ใบงาน พุทธประวัติ2
ใบงาน พุทธประวัติ2ใบงาน พุทธประวัติ2
ใบงาน พุทธประวัติ2
 
SHOPO contract
SHOPO contractSHOPO contract
SHOPO contract
 
2014 Namibia Science Report Final-1
2014 Namibia Science Report Final-12014 Namibia Science Report Final-1
2014 Namibia Science Report Final-1
 
Urban Violence Survey in Nakuru County
Urban Violence Survey in Nakuru CountyUrban Violence Survey in Nakuru County
Urban Violence Survey in Nakuru County
 
Harvard referencing 2016
Harvard referencing 2016Harvard referencing 2016
Harvard referencing 2016
 
Stories Of The Sahabah For Children
Stories Of The  Sahabah For  ChildrenStories Of The  Sahabah For  Children
Stories Of The Sahabah For Children
 
Stories of the Sahabah [r.a] for Children by Shaykh Hamid Ahmad Tahir
Stories of the Sahabah [r.a] for Children by Shaykh Hamid Ahmad TahirStories of the Sahabah [r.a] for Children by Shaykh Hamid Ahmad Tahir
Stories of the Sahabah [r.a] for Children by Shaykh Hamid Ahmad Tahir
 
Mi manual fisica 2
Mi manual fisica 2Mi manual fisica 2
Mi manual fisica 2
 

Andere mochten auch (8)

Cass Cities - RuimteVlaanderen presentatie gecoro Machelen/Vilvoorde
Cass Cities - RuimteVlaanderen presentatie gecoro Machelen/VilvoordeCass Cities - RuimteVlaanderen presentatie gecoro Machelen/Vilvoorde
Cass Cities - RuimteVlaanderen presentatie gecoro Machelen/Vilvoorde
 
mb resume (1) (1)
mb resume (1) (1)mb resume (1) (1)
mb resume (1) (1)
 
5+ yrs engineers transmission line conductors, hardware & accessories
5+ yrs engineers   transmission line conductors, hardware & accessories5+ yrs engineers   transmission line conductors, hardware & accessories
5+ yrs engineers transmission line conductors, hardware & accessories
 
"Labo Ruimte en T.OP's" (Jan Zaman, Ruimte Vlaanderen)
"Labo Ruimte en T.OP's" (Jan Zaman, Ruimte Vlaanderen)"Labo Ruimte en T.OP's" (Jan Zaman, Ruimte Vlaanderen)
"Labo Ruimte en T.OP's" (Jan Zaman, Ruimte Vlaanderen)
 
El control ambiental
El control ambientalEl control ambiental
El control ambiental
 
Cuadro comparativo procedimientos civiles especiales
Cuadro comparativo procedimientos civiles especialesCuadro comparativo procedimientos civiles especiales
Cuadro comparativo procedimientos civiles especiales
 
Minal_Bhatkar
Minal_BhatkarMinal_Bhatkar
Minal_Bhatkar
 
SOQ
SOQSOQ
SOQ
 

Ähnlich wie ShravanTamaskar_Thesis

Elias El-Zouki- 4491 Thesis
Elias El-Zouki- 4491 ThesisElias El-Zouki- 4491 Thesis
Elias El-Zouki- 4491 Thesis
Eli Z
 
Acing the Orthopedic Board Exam - Brett Levine , 1E.pdf
Acing the Orthopedic Board Exam - Brett Levine , 1E.pdfAcing the Orthopedic Board Exam - Brett Levine , 1E.pdf
Acing the Orthopedic Board Exam - Brett Levine , 1E.pdf
deepjha1
 
The relationship between school climate and student growth
The relationship between school climate and student growthThe relationship between school climate and student growth
The relationship between school climate and student growth
Siti Khalijah Zainol
 
Patterns of Reading Impairments in Cases of Anomia - Dr Christopher Williams
Patterns of Reading Impairments in Cases of Anomia - Dr Christopher WilliamsPatterns of Reading Impairments in Cases of Anomia - Dr Christopher Williams
Patterns of Reading Impairments in Cases of Anomia - Dr Christopher Williams
Dr Christopher Williams
 

Ähnlich wie ShravanTamaskar_Thesis (20)

Elias El-Zouki- 4491 Thesis
Elias El-Zouki- 4491 ThesisElias El-Zouki- 4491 Thesis
Elias El-Zouki- 4491 Thesis
 
Genetu thesis
Genetu thesisGenetu thesis
Genetu thesis
 
Dr. Karen Deller RPL Thesis
Dr. Karen Deller RPL ThesisDr. Karen Deller RPL Thesis
Dr. Karen Deller RPL Thesis
 
Deller rpl thesis
Deller rpl thesisDeller rpl thesis
Deller rpl thesis
 
GHopkins_BSc_2014
GHopkins_BSc_2014GHopkins_BSc_2014
GHopkins_BSc_2014
 
CID review
CID reviewCID review
CID review
 
THE IMPACT OF SOCIALMEDIA ON ENTREPRENEURIAL NETWORKS
THE IMPACT OF SOCIALMEDIA ON ENTREPRENEURIAL NETWORKSTHE IMPACT OF SOCIALMEDIA ON ENTREPRENEURIAL NETWORKS
THE IMPACT OF SOCIALMEDIA ON ENTREPRENEURIAL NETWORKS
 
Acing the Orthopedic Board Exam - Brett Levine , 1E.pdf
Acing the Orthopedic Board Exam - Brett Levine , 1E.pdfAcing the Orthopedic Board Exam - Brett Levine , 1E.pdf
Acing the Orthopedic Board Exam - Brett Levine , 1E.pdf
 
The relationship between school climate and student growth
The relationship between school climate and student growthThe relationship between school climate and student growth
The relationship between school climate and student growth
 
Calculus Volume 1
Calculus Volume 1Calculus Volume 1
Calculus Volume 1
 
Adaptive Networking Protocol for Rapid Mobility
Adaptive Networking Protocol for Rapid MobilityAdaptive Networking Protocol for Rapid Mobility
Adaptive Networking Protocol for Rapid Mobility
 
Tomaszewski, Mark - Thesis: Application of Consumer-Off-The-Shelf (COTS) Devi...
Tomaszewski, Mark - Thesis: Application of Consumer-Off-The-Shelf (COTS) Devi...Tomaszewski, Mark - Thesis: Application of Consumer-Off-The-Shelf (COTS) Devi...
Tomaszewski, Mark - Thesis: Application of Consumer-Off-The-Shelf (COTS) Devi...
 
Ebp
EbpEbp
Ebp
 
Hssttx3
Hssttx3Hssttx3
Hssttx3
 
UniversityPhysicsVolume2
UniversityPhysicsVolume2UniversityPhysicsVolume2
UniversityPhysicsVolume2
 
Tap21
Tap21Tap21
Tap21
 
Patterns of Reading Impairments in Cases of Anomia - Dr Christopher Williams
Patterns of Reading Impairments in Cases of Anomia - Dr Christopher WilliamsPatterns of Reading Impairments in Cases of Anomia - Dr Christopher Williams
Patterns of Reading Impairments in Cases of Anomia - Dr Christopher Williams
 
mack_y
mack_ymack_y
mack_y
 
Misconception in Chemestry Hans Dieter
Misconception in Chemestry Hans DieterMisconception in Chemestry Hans Dieter
Misconception in Chemestry Hans Dieter
 
NP problems
NP problemsNP problems
NP problems
 

ShravanTamaskar_Thesis

  • 1. FLORIDA STATE UNIVERSITY COLLEGE OF ENGINEERING PERFORMANCE MODELING AND ANALYSIS OF A CENTRALIZED FAULT LOCATION AND IDENTIFICATION SYSTEM By SHRAVAN TAMASKAR A Thesis submitted to the Department of Electrical and Computer Engineering in partial fulfillment of the requirements for the degree of Master of Science 2016
  • 2. ii Shravan Tamaskar defended this thesis on June 06, 2016. The members of the supervisory committee were: Ming Yu Professor Directing Thesis Michael Steurer Professor Co-Directing Thesis Hui Li Committee Member The Graduate School has verified and approved the above-named committee members, and certifies that the thesis has been approved in accordance with university requirements.
  • 4. iv ACKNOWLEDGMENTS First of all, I would like to thank my research advisor Dr. Michael Steurer for allowing me a chance to work on the project and being a part of the research team at Center for Advance Power System (CAPS) at Florida State University and for his guidance and encouragement. I would also like to thank my academic advisor Dr. Ming Yu for guiding me through the various challenges I faced in the course of my thesis. I would also like to thank Dr. Helen Li to be a part of my thesis committee. I would like to thanks Michael Sloderbeck, Harsha Ravindra, Mark Stanovich and Isaac Leonard for their support, advice and suggestions that helped me in my thesis and also patiently discussion about my work. Last and the most important, I would like to thank my family for believing in me.
  • 5. v TABLE OF CONTENTS List of Tables ................................................................................................................................ vii List of Figures.............................................................................................................................. viii List of Abbreviations .......................................................................................................................x Abstract.......................................................................................................................................... xi 1. INTRODUCTION ......................................................................................................................1 1.1 Introduction..........................................................................................................................1 1.2 Motivation............................................................................................................................1 1.3 Literature review..................................................................................................................2 1.4 Outline..................................................................................................................................3 2. STRUCTURE OF CENTRALIZED FAULT LOCATION SYSTEM.......................................4 2.1 Protection of MVDC system................................................................................................4 2.2 Basic CFL architecture ........................................................................................................5 2.3 The CFL operation...............................................................................................................6 2.4 The CFL algorithm ..............................................................................................................9 2.5 Summary............................................................................................................................13 3. CFL COMMUNICATION SYSTEM.......................................................................................14 3.1 EtherCAT...........................................................................................................................14 3.2 Hardware............................................................................................................................16 3.3 Topology............................................................................................................................17 3.4 Modeling of an EtherCAT frame.......................................................................................18 3.5 Modeling of roundtrip communication cycle time ............................................................25 3.6 Decision time modeling.....................................................................................................28 3.6.1 RTDS processing ....................................................................................................30 3.6.2 Beckhoff processing................................................................................................31 3.6.3 Hardware synchronization ......................................................................................32 3.7 Factors affecting performance of CFL...............................................................................36 3.7.1 Topology .................................................................................................................36 3.7.2 Jitter.........................................................................................................................38 3.7.3 Bandwidth ...............................................................................................................39 3.7.4 Network propagation time.......................................................................................40 3.7.5 Noise .......................................................................................................................41 3.8 Summary............................................................................................................................51
  • 6. vi 4. CFL IMPLEMENTATION ON SHIPBOARD POWER SYSTEM ........................................52 4.1 Hardware in the loop testbed .............................................................................................52 4.2 Fault clearance process in MVDC system.........................................................................56 4.3 CHIL implementation of CFL ...........................................................................................57 4.3.1 Faster CFL implementation ......................................................................................59 4.3.2 CFL response under various fault impedances .........................................................59 4.3.3 CFL response for different system configurations....................................................60 4.3.4 CFL response under different loading conditions.....................................................61 4.3.5 CFL response under different MMC operations.......................................................61 4.4 Summary............................................................................................................................63 5. CONCLUSION AND FUTURE WORK .................................................................................64 5.1 Conclusion .........................................................................................................................64 5.2 Future Work.......................................................................................................................65 5.2.1 Hardware implementation of a ring topology...........................................................65 5.2.2 Validating the system resiliency for cable cut condition..........................................65 5.2.3 System Level Control ...............................................................................................65 5.2.4 Exhaustive noise analysis .........................................................................................65 5.2.5 Integrating multiple CFL units..................................................................................65 5.2.6 Sensitivity analysis of the differential protection scheme ........................................66 References......................................................................................................................................66 Biographical Sketch.......................................................................................................................69
  • 7. vii LIST OF TABLES Table 3.1 Executable commands in EtherCAT master configuration……………….. 19 Table 3.2 EtherCAT Frame configuration parameters………………………………. 22 Table 3.3 Parameters defining communication cycle time…………………………... 26 Table 3.4 Parameters defining decision time………………………………………… 29 Table 3.5 Timing of different delays of master……………………………………… 37 Table 4.1 Describing the fault location and the respective disconnect switch associated with the particular fault location………………………………. 54 Table 4.2 CFL decision time with respect to different system operating conditions…. 62
  • 8. viii LIST OF FIGURES Figure 2.1 Basic structure of the CFL system………………………………………… 6 Figure 2.2 2: The steps in the CFL system……………………………………………. 7 Figure 2.3 Kirchoff’s current law……………………………………………………... 9 Figure 2.4 Graphical representation of the percentage differential curve……….…….. 10 Figure 2.5 Describing the flow of current in normal operation and during fault.……... 10 Figure 2.6 Currents flowing through the disconnect switch…………………….……... 11 Figure 2.7 Fault clearance process of MVDC system………………………….………. 12 Figure 3.1 EtherCAT processing “on the fly”………………………………….………. 15 Figure 3.2 Standard EtherCAT frame………………………………………….………. 15 Figure 3.3 Physical Topologies………………………………………………..……...... 17 Figure 3.4 Master-Slave line topology showing direction of data flow………………... 18 Figure 3.5 A TwinCAT view showing the sequential execution of commands and its respective size………..……………………………………………………... 20 Figure 3.6 The placement of slaves and the number of I/O units connected to each slave…………………………………………………………………….... 21 Figure 3.7 Plot showing the size of EtherCAT frame to the number of slaves………… 23 Figure 3.9 Frame propagation time of the EtherCAT frame………………………..... 25 Figure 3.9 : Number of frames as per the slaves connected in the topology…………. 24 Figure 3.10 Showing the round trip cycle time to the number of slaves in the network... 27 Figure 3.12 Individual timing split-up in the decision time……………………………... 29 Figure 3.13 The two timestamp processing of the RTDS model………………………... 30 Figure 3.14 6 (n+1) cycle times at 50 µs cycle time…………………………………….. 31 Figure 3.15 6 (n+1) cycle times at 100 µs cycle time………………………………….... 32 Figure 3.16 A two cycle time, worst case, EtherCAT response ………………………… 33 Figure 3.17 The time taken by master to compute a fault and generate a trip signal….... 33 Figure 3.18 Events happening in the fault detection by a CFL system for a 50 µs 5 iterations………………………………………………………………......... 34 Figure 3.19 Fault detection time by the CFL for a 50 µs and 3 iterations for each individual slave in the network…………………….…………...................... 35
  • 9. ix Figure 3.20 Fault detection time by the CFL for a 100 µs and 3 iterations for each individual slave in the network…….……………………………………….. 36 Figure 3.21 Comparison of a round trip cycle time of a line and a ring topology……..… 38 Figure 3.22 Bandwidth relationship between minimum cycle time and number of slaves………………………………………………………………………... 39 Figure 3.23 The network propagation time with respect to number of slaves…………... 40 Figure 3.24 Random motion of electrons due to increase in temperature………………. 42 Figure 3.25 Additive White Gaussian Noise model……………………………………... 44 Figure 3.26 Depicting the uniform frequency of white noise…………………………….. 45 Figure 3.27 SNR with respect to noise in the signal……………………………………… 46 Figure 3.28 Noise levels………………………………………......................................... 46 Figure 3.29 Node B receiving noisy signal………………………………………............. 47 Figure 3.30 The effect of noise on the current signal…………………………………….. 48 Figure 3.31 Effect of Noise on Slope calculated by the algorithm of the CFL system….. 48 Figure 3.32 Noise in both Node A and Node B…………………………..……………... 49 Figure 3.33 Noise profile in node A and node B………………………………………... 50 Figure 3.34 Effect of Noise on Slope calculated by the algorithm of the CFL system….. 50 Figure 4.1 MVDC shipboard power system with the communication architecture…... 53 Figure 4.2 The location of cable section and disconnect switches as seen in the RSCAD Model…….………….…………………………………………….. 54 Figure 4.3 Selectivity of CFL operation….……………………………………............. 55 Figure 4.4 Execution of the fault clearing sequence………………….……………….. 57 Figure 4.5 Block diagram describing Hardware in the loop (HIL) testing system…… 58 Figure 4.6 HIL testbed………………………………………........................................ 58 Figure 4.7 Showing the fault detection by CFL………………………………………. 59 Figure 4.8 CFL response in different fault impedance conditions……………………. 60 Figure 4.9 CFL response in closed ring and open ring bus system…………………… 60 Figure 4.10 CFL test waveforms under different loading conditions………………… 61 Figure 4.11 CFL detection in various operating modes of MMC's…………………… 62
  • 10. x LIST OF ABBREVIATIONS EtherCAT- Ethernet for Control Automation Technology CFL- Centralized Fault Location RTE- Real-Time Ethernet ESC- EtherCAT Slave Controller WKC- Working Counter MVDC- Medium Voltage DC SPS- Ship-board Power System PDP- Percentage differential protection AI- Analog Input DO- Digital Output XFC- eXtreme Fast Control XAE- eXtended Automation Engineering CU- Copper FO- Fiber Optic SNR- Signal to noise ratio AWGN- Additive white Gaussian noise
  • 11. xi ABSTRACT The increasing interest and gradual adaptation of a medium voltage direct current (MVDC) electrical distribution system by the US navy and smart grid designs has demanded a change to the structure of the traditional electrical distribution system. The development of the power electronics has led to faster-operating devices and the goal to achieve fault management in time frame of ~ 8 ms demanded a need for an ultrafast fault location and identification system. The traditional protection system used in alternating current power distribution is well-understood and applied to a radial distribution system but may lack sufficient response times for a dynamic, intelligent, looped distribution structure. Hence the centralized fault detection and location (CFL) system is proposed. The CFL system, based on ultrafast data communications and processing of sensor data to identify and determine the location of a fault in the medium voltage direct current (MVDC) shipboard power system (SPS). This research presents the mathematical models describing the relationship like the frame size, decision time and the operating time of the CFL system were developed and verified with the results obtained from an implemented CFL system. The models assess the performance of the CFL system and assist in estimation of the scaling of the CFL architecture. A controller-hardware-in-the-loop (CHIL) testbed, interfacing RTDS with an industrial automation hardware, to demonstrate the methodology and to perform a comprehensive testing and analysis of a prototype of CFL system. The results of CHIL experiments demonstrate ultrafast fault detection and precise fault location operation of the CFL system on a fault current limited MVDC SPS for a line-to-line fault under different operating conditions of the SPS. Factors affecting the performance and scaling for a practical CFL implementations were identified and analyzed. The models and analysis in this thesis are validated by experimental results.
  • 12. 1 CHAPTER 1 INTRODUCTION 1.1 Introduction ESRDC and U.S. Navy envision a medium-voltage direct current (MVDC) power system to meet the increasing power requirements on a navy vessel. MVDC power systems are expected to be advantageous in terms of flexibility and efficiency but have not been widely considered due to concerns over insufficient fault protection. A centralized fault identification and location (CFL) system, based on coordinated interaction between the shipboard power system (SPS) and communication system was developed for an ultra-fast fault identification and location [1]. The performance models were developed to analysis the CFL system operation and configuration of the CFL system. This CFL system demonstrated necessary functionality, analyzed based on the network and physical topology, evaluated for its network performance and tested [2] under various system configurations on a controller hardware-in-loop (CHIL) cyber-physical testbed in real time. 1.2 Motivation Traditional relays used in the electric distribution systems cannot meet the highly adaptive requirements of the new notional breakerless SPS architecture. The development of power electronic devices provides high operating speed and efficiency. To be on par with these developments, SPS requires an intelligent and adaptive system to quickly identify and locate a fault in the power system. To obtain high-speed requirements along with the intelligence and adaptability, the communication architecture is used as a backbone for the centralized fault identification and location system (CFL). The CFL system was developed at Center for Advanced Power Systems (CAPS) [1] and tested on the CHIL testbed [2], [3]. The power system was modeled and simulated on RTDS and data communication was provided by an industrial automation hardware. EtherCAT, a network communication protocol, was used for real-time data acquisition. A systemic approach is followed evaluating the capabilities and performance of the CFL system and the communication architecture were modeled, tested, verified and presented in this research.
  • 13. 2 1.3 Literature review The protective relays are a necessary part of the power system architecture. When a fault occurs on any part of the system, it should be quickly located and the faulty section needs to be disconnected. The fundamental requirement of any protective relays are [4]: 1. Selectivity 2. Speed 3. Sensitivity 4. Accuracy Protective relays have evolved from the electro-mechanical over-current relay to the modern day microprocessor based relays. The electrical distribution system is divided into two basic protection zones i.e. primary protection zone and the secondary protection zone. These zones overlap each other in order to provide redundant system and also to avoid blind areas in the distribution system. There are many protection schemes designed to perform power system protection. Some of them are: 1. Overcurrent protection 2. Differential protection. The overcurrent protection scheme is the simplest and the oldest among the protection schemes. Overcurrent protection can be classified into two:  Instantaneous overcurrent protection Instantaneous relays operate without intentional time delays in the system. As the fault occurs in the system, the logic computes the existence of a fault in the system and sends a command to the instantaneous overcurrent relays to open. This type of relay is used in protection from high fault current.  Time-delayed overcurrent protection In this protection scheme, the operation time of the overcurrent relay is inversely proportional to the magnitude of fault current. The time-delayed protection scheme depends on two factors i.e. pickup current and the time delay. The differential relays operate when the phasor difference between the electrical quantities exceed the pre-determined value. A current differential relay is based on basic principle of Kirchhoff’s current law. The basic concept is to sum all the currents in a protection zone. During the normal
  • 14. 3 operation, the sum of currents will be zero but during the faulty condition, the sum of current will not be zero and hence detects a fault in the system. Differential protection scheme can be applied to almost all type of faults and hence it is adapted for the fault identification for the MVDC SPS. A notional breakerless model was proposed for the MVDC SPS architecture. It also emphasizes the need for an effective fault protection strategy to support the MVDC architecture. The zonal electric grid architecture for an integrated power system which could be highly survivable and criteria for fault protection in MVDC system was studied from [5]. The SPS simulation model which is developed and simulated in RTDS for the study of CFL system was a derivative of the model proposed in [6]. CFL system, based on an adaptive percentage differential protection scheme is proposed in [7], [8]. The protection scheme makes decisions by monitoring instantaneous current values from its various nodes distributed throughout the power system. The instantaneous current signals are read, digitized and transported in real time through the EtherCAT protocol developed by [9] and is described and documented in [10], [11], [12]. The cyber-physical testbed for the testing of the CFL system is shown in [2]. 1.4 Outline This thesis is divided into five chapters. Chapter 2 describes the CFL architecture and details the algorithm used for fault identification. It also explains the events that generally follow once a fault is located. Chapter 3 describes the communication system used to achieve ultrafast fault identification and location. It also provides the mathematical models for reasoning about the impact of scaling the CFL system and the factors affecting the performance of the CFL system. Chapter 4 details the CHIL testbed on which the communication and power system architecture are implemented to perform the Centralized Fault Identification and Location and demonstrates the implementation of the CFL system on a MVDC SPS. Chapter 5 draws conclusion from the research and described future work.
  • 15. 4 CHAPTER 2 STRUCTURE OF CENTRALIZED FAULT LOCATION SYSTEM This chapter discusses the structure of centralized fault location and identification system and the protection algorithm. The goal is to explore and analyze a faster method of fault location and identification for the next generation naval ships. For this purpose, CFL system was developed at CAPS [1] to integrate power system and the communication systems in a highly coordinated fashion. The MVDC power distribute system may be used to deliver the electrical power in the next generation naval ships. The CFL leverages digital data acquisition techniques to gather instantaneous changes in system operation to identify and locate faults in the SPS. 2.1 Protection of MVDC system The rapid growth in the power electronics led to lower cost and reduction in the size of the power electronic devices (PED) and the goal to clear the fault in the MVDC system in about 8 ms. Other advancements to follow were the increase in the performance, efficiency and switching frequencies of the PED. These, along with the other benefits of using a DC system in terms of power density and power distribution efficiency, over a conventional AC system led to increased focus in researching MVDC power system. DC power distribution system is hampered by a lack of appropriate study in electrical protection strategies. In fact, the protection of DC distribution systems, especially at the medium voltage level, is recognized to be a notable challenge [5], [6]. The unavailability of DC disconnect switch for the appropriate rating is considered to be a major factor in the adoption of MVDC for ship power distribution system. In traditional MVAC systems, fault protection strategies are based on a mechanical switch and occur at zero-current crossing of the AC wave which occurs at every half cycle. This approach cannot be applied in MVDC systems because they do not have periodic current zero crossings. The proposed method based on differential protection can detect and locate fault in DC system and can provide selectivity by comparing the currents of the two sides of the section which is to be protected is explained in the sections below.
  • 16. 5 2.2 Basic CFL architecture A CFL system consists of a master unit and multiple measurements units called slaves. A slave is a collection of one or more than one analog input cards, digital output cards or combination of both analog input cards and digital output cards. The master unit is usually located in a remote location such as a control center and the slaves are distributed at different locations throughout the power system. The master and the slaves interact over a communication protocol to enable fast and reliable data communication between each other. The simplified version of a CFL system is shown in the Figure 2.1 below. The figure, shows a diagrammatic representation of a power system, with one generator and two loads, on which a CFL scheme is to be implemented. It also shows the location of the various In the following power system, as shown in the Figure 2.1, there are multiple disconnect switches (D), located at multiple location throughout the power system. The disconnect switch is closed during normal operation of the power system. Once a fault occurs, the function of these disconnect switch is to open and isolate the respective section of the power system in which the fault has occurred and hence protect it. The disconnect switch receive instantaneous data measurements to the analog input (AI) terminals (numbered 1 through 5). The analog input terminals measure the instantaneous currents, and digitizes the current using an analog to digital (A/D) converter and transmits the digital signal via the real-time Ethernet (RTE) communication channel to the master. A fault protection algorithm, which is simultaneously being simulated into the master unit receives the instantaneous current measurements and executes the protection algorithm, by performing the necessary calculations, to determine the fault in the power system. Once the fault is identified and the location is determined by the master, it sends out a control signal, as a response, to the respective disconnect switches to open and isolate the faulty section from the non-faulty section of the power system. 2.3 The CFL operation The operation of the centralized fault location and identification system (CFL) is designed with the main focus of identification of the presence of a fault in the power system and locating the specific section where the fault has occurred.
  • 17. 6 Figure 2.1: Basic structure of the CFL system The CFL system monitors and evaluates the operating condition of all the protection zones of the power system simultaneously to check for a fault in the normal operating conditions. Once it detects and locates a fault, it generates a trip signal to initiate the process to isolate the faulty section and restore stable operating conditions in the system. The key features which makes the CFL system so important is its operating speed which will be explained in this section. The Figure 2.2 shows a flowchart explaining the different steps involved in the operation of the CFL system. The Master unit is the one which controls and coordinates all the processes in the CFL system. When the master unit is configured, it establishes communication with all the slaves or measurement points connected in the master-slave network. The measurement points (M1, M2) are differential units measuring voltage in the range of (-10 V to +10 V). During the configuration process of the master, it locates all the slaves physically connected in the master-slave network and determines the topology (line, ring, star, daisy-chain) in which they are connected to each other. Gen. Load Load D D D D D Master 1 4 52 3
  • 18. 7 Figure 2.2: The steps in the CFL system During the configuration process, the master also assigns a specific address to each of the slaves in order to ensure proper communication between them. This addressing also helps the master to attain a synchronized operation with its slaves [14]. Once the communication is established between the master and slaves, the master acquires the data from each of the slaves, it processes the data by applying it to the algorithm which is simultaneously being run in the master. When the master determines the algorithm condition to be true, it increments the counter by one which is initialized at zero. As the counter reaches a threshold value, a trip signal is generated. If the master determines the algorithm condition to be false, it resets the counter to zero and rechecks the condition. The reason for setting up of the counter threshold is to improve the reliability of the algorithm and avoid the false trip in the system. For example, if the counter threshold is set at 1, sensor noise, switching of generators and loads in the system which might lead to a sudden spike in the voltage conditions, can result in the generation of a false trip and may lead to the isolation Master Condition check Counter Increment Counter threshold Trip True slave1slave n False EtherCAT Frame YesNo Data signal Logic signal Reset counter
  • 19. 8 of a healthy section of the system. Hence, the counter threshold has to be set at a higher value and hence will evaluate the status of the algorithm for multiple consecutive timestamps instead of one timestamp. The operating time of the CFL system depend on factors like: 1. Processing time (𝑇𝑃) The processing time of the master unit can be assumed in nanoseconds considering the processing capabilities of the computers these days. 2. Threshold counter (C) A small counter (1 or 2) threshold can lead to a faster location and detection speed but can also lead to an unreliable system as it could lead to a false trip. A larger counter can cause the CFL system to be reliable but can lead to a longer protection time. 3. Sampling time (𝑇𝑆) Sampling time is the time between two consecutive samples The equation 1 below shows as 𝑇𝑜𝑝 = 𝑇𝑃 + 𝐶 × 𝑇𝑆 (2.1) 2.4 The CFL algorithm To meet the high speed and adaptability of the CFL system, the CFL algorithm is based on percentage differential protection (PDP) algorithm [7], [8] which makes decisions based on instantaneous values of the current. Differential protection works on the basic principle of Kirchoff’s current law stating that the currents flowing into a node must be equal to the current flowing out of the node as can be seen in the Figure 2.3 below. The percentage restraint characteristic operates on the ratio of operating current to restraint current in the in the section to be protected. The operating current can be defined as the magnitude of differential current in the protection zone.
  • 20. 9 Figure 2.3: Kirchoff’s current law Several different methods have been identified to quantify the amount of restraint current in the protection zone, which is a measure of the through current in the zone of protection. The restraint current magnitude will have an impact on the effective sensitivity of a given percentage slope characteristic and hence to avoid false system response. The percentage differential protection scheme presented in [7]can be expressed as: 𝐼 𝑜𝑝 = | ∑ 𝐼 𝑛|𝑛 𝑛=2 (2.2) 𝐼𝑟𝑒𝑠𝑡 = ∑ |𝐼 𝑛|𝑛 𝑛=2 (2.3) | ∑ 𝐼 𝑛|𝑛 𝑛=2 − 𝑆 . ∑ |𝐼 𝑛|𝑛 𝑛=2 ≥ 𝐼𝑚𝑖𝑛 (2.4) Where, Irestraint is the restraint current; Ioperating current is the operate current; S is slope coefficient; Imin is the minimum operating current value. Operating current is the vector sum (keeping in mind the direction of current flow) of all the currents flowing through the protected zone. Restraint current is the magnitude sum of all the currents in the particular system. The slope is calculated as the ratio of the operate quantity and the restraint quantity.
  • 21. 10 Figure 2.4: Graphical representation of the percentage differential curve The protection calculation for the PDP scheme can be done by calculating the operating current and the restraint current. During normal operation, the ratio of the two currents does not exceed the threshold i.e. the slope lies in the restraint region and hence it's a no-fault condition, therefore, no trip signal is generated. But, during the fault condition, the slope lies in the operating region which indicated the fault in the system and hence a trip signal has to be sent to initiate the fault clearance sequence. Figure 2.4 shows the slope of the differential protection scheme. Figure 2.5: Describing the flow of current in normal operation and during fault Fault No Fault CS- Cable Section Ioperate Irestraint CS CS Switch A Switch A Switch B Switch B A B B Normal Operation During Fault
  • 22. 11 During normal operation, the currents flow through disconnect switches and the cable sections as shown in the Figure 2.5A. When a fault occurs at any point on the cable section, the current direction changes and all the fault current starts to flow through the fault location to as shown in Figure 2.5B. Figure 2.6: Currents flowing through the disconnect switch Figure 2.6 shows the plot of the currents flowing through the disconnect switches A and B. Before the fault has occurred, the flow of current can be seen at the point before time 3.5 ms. At time t = ~3.5 ms, the fault occurs and the currents in the two switches now feed into the cable section. When the CFL system detects the fault in the power system, it sends out a trip signal to the fault management system to trigger its operations. The task of clearing short circuit faults in the MVDC systems by DC disconnect switches led to the development of a new protection strategy for the system: coordinated control operation of the power converters and mechanical contactors and the fault is clearance by total de-energization of the affected portion of the MVDC system. Once the power system is de-energized, the system reconfigures i.e. it isolates the faulty section via DC disconnect switches, and finally re-energizes the remaining healthy part of the system [15]- [18]. The Figure 2.7 shows the generic voltage and
  • 23. 12 current waveforms of the system during a fault clearing process: fault detection and localization of the affected section, completely de-energizing of the entire system, isolation of faulted branch and re-energizing the remaining healthy system. Figure 2.7: Fault clearance process of MVDC system The fault clearing process begins with the power converters being forced into current-limiting mode which will force the fault current to remain at a set limit, identify the fault location by PDP algorithm via centralized fault identification and location (CFL) system and then shut-down all sources by bringing the system voltages to zero (i.e.de-energize the system) as soon as the fault location is identified and open the appropriate disconnect switches to isolate the fault section from healthy section and finally re-energize the remaining part of the system which is still non-faulty. The target for the full system response time (SRT), i.e the time taken for the entire fault clearing process, from fault detection to system re-energization, has been targeted to 8 ms (equivalent to approximately one-half of a 60 Hz cycle). Detect and localize fault Re-energize system De-energize system Isolate faulted segment
  • 24. 13 Due to the fact that the notional SPS is breakerless, the fault clearance sequence for this MVDC SPS can be defined as follows [19]: 1. Fault detection and localization – As a fault occurs in any section of the SPS, all power converters that are connected to the MVDC bus will be forced into current-limiting mode. This is done by the overcurrent protection feature which is built-in in these converters. The CFL which is constantly monitoring the system, will work towards detecting and locating the fault. 2. De-energization of the system – After the fault is detected and the location is identified, the system will be completely de-energized by bringing the system voltage levels to zero. 3. Isolation of faulty section – Once the system is de-energized, disconnect switches corresponding to the particular faulty section will be triggered to open once the initial discharge current from all the capacitance in the MVDC system decays to zero. The opening of these disconnect switches will isolate the faulty section. 4. Re-energizing the system – After the fault is isolated by opening of the respective disconnect switches, the converters re-energize the system and hence restart the stable operation of the entire power system. 2.5 Summary This chapter discusses the need for protection for the MVDC power system and the basic structure and operation of the centralized fault location and identification system. This also discusses the algorithm which makes a decision of the fault in the system.
  • 25. 14 CHAPTER 3 CFL COMMUNICATION SYSTEM This section discusses the communication architecture and topology of the CFL system. The section also explains the mathematical modeling of various performance parameters of the CFL system like the EtherCAT frame size, round trip cycle time of the CFL system and the modeling of the decision timings of the CFL system. The EtherCAT cycle time model is used to properly configure the EtherCAT system and the decision time model is used to provide an understanding of the response time that needs to be satisfied for the CFL system. Factors affecting the performance of the CFL system like topology, jitter, bandwidth and noise have been listed and analyzed. 3.1 EtherCAT EtherCAT (Ethernet for Control Automation Technology) is an industrial automation system and is widely being adopted as the Real-Time Ethernet (RTE) solutions. The communication efficiency of EtherCAT makes it suitable for cycle time ≤ 100 µs [9], [13], [20]. The EtherCAT protocol is optimized for process data and is transported directly within the standard IEEE 802.3 Ethernet frame. The master is the only node in the EtherCAT segment which is allowed to actively send an EtherCAT frame and configures, maps the process data on the slave devices; all the input and output nodes perform frame forwarding towards the next i/o node or slave. The EtherCAT master sends a telegram that passes through each node. Each EtherCAT slave device uses an EtherCAT Slave Controller (ESC) which reads and processes the data received by the slave “on the fly”, [14] and inserts its data in the frame as the frame travels further. When the frame reaches last node in a segment or branch, it detects an open port and sends the frame back to the master. Figure 3.1 shows the diagrammatic representation of the EtherCAT processing “on the fly”. It shows that when the frame reaches the slave, it reads the data from the analog inputs and writes the data to the digital output terminals simultaneously.
  • 26. 15 Figure 3.1: EtherCAT processing “on the fly” Figure 3.2: Standard EtherCAT frame
  • 27. 16 EtherCAT adds its data into the standard Ethernet frame. Figure 3.2 shows the structure of a basic EtherCAT frame. Each EtherCAT frame consists of a 2 byte header and may contain one or more datagrams. The header indicates the type of functionality the master would like to execute i.e. reading, writing or both read and write. Master configures the number of telegrams in the datagram corresponding to the number of slaves connected in the topology. Each datagram consists of a 10 byte header. The header is followed by the data payload which represents the payload section in which the slave reads or writes its data. Finally, the data payload is followed by a 2 byte of working counter to check for the correct execution of the operation assigned by the master to the datagram header. 3.2 Hardware The hardware implementation of EtherCAT devices for the medium voltage DC (MVDC) shipboard power system (SPS) consists of one master and multiple slaves distributed over the SPS. EtherCAT master (CX 5140) is an embedded PC from the CX 5100 series based on the Intel® Atom™ multi-core processors for deterministic Ethernet with real time applications. The master unit, supplied by a DC voltage of 24 V, is integrated with Microsoft Windows 7 based operating system consists of a single-core processor operating at 1.46GHz and a non-expandable 2 GB DDR3 RAM. The slave unit consists of analog input (AI) unit EL 3702, digital output (DO) unit EL 2262, a coupler or chassis EK 1501 and an Ethernet fiber-optic junction EK 1521. The data acquisition unit consists of EL 3702 and EL 2262 i.e. the analog input unit and the digital output unit. EL 3702, based on eXtreme Fast Control (XFC) technology, is a two channel differential input terminal operating in a voltage range of -10 to +10 V. The EL 3702 block clocks a conversion time of less than 10 µs, digitizes the voltage to a 16 bit resolution and has a signal oversampling. The digital output terminal EL 2262, operates on 24V DC voltage, is developed on eXtreme Fast Control (XFC) technology and supports resistive, Inductive and lamp loads. It is a 2 terminal digital output terminal with oversampling and can have a 1 µs cycle time. The oversampling factor is the integer multiple of the cycle time. EK 1521 is a single port fiber optic junction providing data transfer rate of 100 Mbaud. It enables a conversion from 100BASE-TX to 100BASE-FX. multimode glass fiber having a thickness of 50/125 micrometer can be used to connect two stations kept at a maximum distance of 2000 meter with a delay of 1 µs. EtherCAT coupler EK 1501 connects EtherCAT with its terminals using a multimode glass fiber over a distance of 2000 meter.
  • 28. 17 The vendor claims to connect 65,534 terminals to a single coupler unit and achieve data transfer at 100 Mbaud with a delay of just 1 µs. TwinCAT 3.1 XAE (eXtended Automation Engineering) is the software supporting the Automation hardware. Integration of TwinCAT in Microsoft Visual Studio makes it possible to program automation in various languages like C, C++, .NET, Matlab/Simulink. TwinCAT is divided into various components, for the developmental purposes of this project we use TwinCAT 3 Engineering. 3.3 Topology EtherCAT supports multiple physical topologies like line, ring, star and daisy chain as can be seen in Figure 3.3. An EtherCAT network consists of a master which is connected to multiple slaves. Figure 3.4 below shows the line topology of an EtherCAT network consisting of one master and six slaves. A slave unit consists of one or more analog input terminals and digital output terminals. The sloid arrow shows the direction of data train when it leaves the master and the dashed arrows show the direction of data train when it reaches the last node. Figure 3.3: Physical Topologies
  • 29. 18 Figure 3.4: Master-Slave line topology showing direction of data flow 3.4 Modeling of an EtherCAT frame The EtherCAT master is the only node within the EtherCAT network allowed to actively send an EtherCAT frame. EtherCAT slave devices use an EtherCAT Slave Controller (ESC) to process frames “on the fly”. During startup, the master device configures and maps the process data on the slave devices. The master device can assign each node a configured node address and communicate with the node via this fixed address. Different amounts of data can be exchanged with each slave, from one bit to a few bytes. The EtherCAT frame contains one or more datagrams. The datagram header indicates the type of access the master device has with respect to the particular node. Execution of an EtherCAT frame may consist of one or more commands. Each of these commands has an expected working counter value. In other words, the master knows, how many slave devices are addressed by an individual command and can calculate the expected working counter. If the master receives a wrong working counter this indicates, that one or more slaves have a problem [20]. The Figure 3.5 shows the TwinCAT diagnostic view describing the various occurrences of commands during the execution of a TwinCAT project. In this particular case, only one frame (Frame0) is sent cyclically during process data communication. The column named cmd in the Figure 3.5, lists the sequential execution of all the commands used to configure and execute the Master- Slave network. Master CU-FO converter FO node Analog Input Digital Output FO node Analog Input Digital Output FO node Analog Input Digital Output FO node Analog Input Digital Output FO node Analog Input Digital Output FO node Analog Input Digital Output CU- Copper FO- Fiber Optic Slave 1 Slave 2 Slave 3 Slave 4 Slave 5 Slave 6
  • 30. 19 Table 3.1: Executable commands in EtherCAT master configuration [21] Table 3.1: Executable commands in EtherCAT master configuration lists and explains all the commands. The diagnostic also shows the EtherCAT frame size (238 B) and the round trip cycle time (20.96 µs) for the master-slave network configuration. The round trip cycle time shown in the TwinCAT scope view comprises of the time taken by the slaves to read the data, conversion of analog data into digital values that can be written down into EtherCAT frame and the computation of the algorithm. The computation time of the algorithm can be measured using the Pentium clock in the master. The master unit essentially a windows machine and can be used to measure the algorithm computation time by timestamping the start time and the end time of the Command Abbreviation Name Description Size (B) 1 NOP No Operation Slave ignores command 4 2 ARMW Auto Increment Read Multiple Write Slave increments address. Slave puts read data into the EtherCAT datagram if received address is zero, otherwise slave writes the data into memory location. 4 3 LWR Logical Memory Write Slaves writes data to into memory location if received address matches with one of the configured FMMU areas for writing. 4 LRD Logical Memory Read Slave puts read data into the EtherCAT datagram if received address matches with one of the configured FMMU areas for reading 5 BRD Broadcast Read All slaves put logical OR of data of the memory area and data of the EtherCAT datagram into the EtherCAT datagram. All slaves increment position field. 2
  • 31. 20 algorithm. It takes 530 ns to compute the algorithm for fault identification and location as used in the present CFL system. Figure 3.5: A TwinCAT view showing the sequential execution of commands and its respective size The Beckhoff master configures all the slave devices connected in the topology and assigns them an individual address. Master and Slaves communicate over that address. The master calculates the size of EtherCAT datagram and the size of the entire EtherCAT frame corresponding to the number of AI and DO channels connected in the topology which will be explained in the later section. Cyclic EtherCAT Frame
  • 32. 21 Figure 3.6: The placement of slaves and the number of I/O units connected to each slave Master generates the number of datagrams equivalent to the number of slaves configured in the topology i.e. for six slaves connected to a master, the number of datagrams generated will be six. Each EtherCAT datagram consists of a 10 Byte datagram header, datagram payload and a 2 Byte working counter. The datagram payload is the numerical sum of the number of fiber-optic connecter (2 bytes), AI channels (4 bytes) and the DO channels (3 bytes) connected. As per the present hardware setup as shown in the Figure 3.6, there were 4 slave units each with one fiber- optic connecter and four analog input and four digital output channels and two slave units each with one fiber-optic connecter and 2 analog input and digital output channels each, connected in a line topology. Table 3.2 shows the parameters and their respective size in bytes in creating an EtherCAT frame.
  • 33. 22 Table 3.2: EtherCAT Frame configuration parameters Description Abbreviation Size (Byte) EtherType 𝐸 𝑇𝑦𝑝𝑒 2 Commands 𝐿 𝑐𝑚𝑑 10 EtherCAT Header 𝐸𝑐𝑎𝑡 𝐻 2 Datagram Header 𝐷𝐺 𝐻 10 No. of Slaves 𝑛 𝑠𝑙𝑎𝑣𝑒𝑠 6 No. of Analog Input channel 𝑛 𝐴𝐼 4 No. of Digital Output channel 𝑛 𝐷𝑂 4 No. of Fiber Optic connecter 𝑛 𝐹𝑂 1 Size of Analog Input 𝐿 𝐴𝐼 4 Size of Digital Output 𝐿 𝐷𝑂 3 Size of Fiber Optic connecter 𝐿 𝐹𝑂 2 Datagram working counter 𝐷𝐺 𝑤𝑘𝑐 2 The size of EtherCAT frame (Lframe), number of EtherCAT frames (nframe) payload of a datagram (DGpl) and size of each individual datagram (LDG) can be calculates by the equations 3.1, 3.2, 3.3, and 3.4 below: 𝐿 𝐹𝑟𝑎𝑚𝑒 = 𝐸 𝑇𝑦𝑝𝑒 + 𝐿 𝑐𝑚𝑑 + 𝐸𝑐𝑎𝑡 𝐻 + 𝐿 𝐷𝐺 (3.1) nFrame = ceiling ( LFrame 1500 ) (3.2) 𝐿 𝐷𝐺 =∑ (𝐷𝐺 𝐻 + 𝐷𝐺 𝑝𝑙 + 𝐷𝐺 𝑤𝑘𝑐 )𝑛 𝐷𝐺=1 (3.3) 𝐷𝐺 𝑝𝑙 = (𝑛 𝐹𝑂 x 𝐿 𝐹𝑂 + 𝑛 𝐴𝐼 x 𝐿 𝐴𝐼 + 𝑛 𝐷𝑂 x 𝐿 𝐷𝑂 ) (3.4)
  • 34. 23 Figure 3.7: Plot showing the size of EtherCAT frame to the number of slaves The Figure 3.7 above shows the frame size with respect to the number of slaves connected to the master. This gives an understanding of the number of bytes of data that can be exchanged with the number of slaves in the system. As we can see from the Figure 3.7, the x axis shown in the plot represents the 6 slaves and the y axis represents the size of the frame. As we can compare from the equation and the number of bytes in the frame match with the TwinCAT scope view shows in Figure 3.5 and hence can validate the use of the equations 3.1, 3.3, 3.4 to model the EtherCAT frame size. Figure 3.8 shows the number of frames that the EtherCAT master needs to generate with respect to the number of slaves connected to the master- slave topology. The equation 3.2 calculates the number of EtherCAT frames. The frame number determined by the equation and the number of frames as can be seen in the TwinCAT scope view in Figure 3.5 match and hence can be used to
  • 35. 24 validate the use of the equation 3.2 to model the number of frames generated by the EtherCAT slaves. Figure 3.8: Number of frames as per the slaves connected in the topology The time taken by the frame (𝑇𝑓𝑟𝑎𝑚𝑒) [22] to send and receive all the bits of data and propagate through the topology can be represented by the equation 3.5. It is a function of the bandwidth (bw) of the network and the length of the frame (𝐿 𝑓𝑟𝑎𝑚𝑒). 𝑇𝑓𝑟𝑎𝑚𝑒 = 𝐿 𝑓𝑟𝑎𝑚𝑒 ×8 𝑏𝑤 (3.5) The Figure 3.9 shows the frame propagation time of the EtherCAT Frame in the network with respect to the slaves in the system. The EtherCAT hardware used to perform the experiments for this thesis uses a 100 BASE FX which is a version of fast ethernet over optical fiber and operates on a bandwidth of 100 Mbps.
  • 36. 25 Figure 3.9: Frame propagation time of the EtherCAT frame 3.5 Modeling of round trip communication cycle time EtherCAT cycle time can be used to describe the performance index of EtherCAT for an ultrafast protection system on a real-time Ethernet (RTE)/ EtherCAT network. The minimum round trip communication cycle time can be denoted as Tc and can be computed as a weighted sum of the following parameters as shown in Table 3.3: Parameters defining communication cycle timebelow. The transmission delay of the master [10] can be calculated using the equation below. 𝑇 𝑀 𝑓 = ( 𝑁𝐹 × (𝑆 𝐹𝐻 + 𝑆𝐼𝐹𝐺) + 𝑁 𝑇 × (𝑆 𝑇𝐻 + 𝑆 𝑇)) × 𝑇𝐵) (3.6) The purpose of the cycle time modeling is to achieve a minimum theoretical cycle time which can be seen from the equation below. 𝑇𝑐 = 2 × ( 𝑁 𝑇 + 1) × 𝑇𝑝+ 𝑇 𝑀 𝑓 + (𝑁 𝑇 × 𝑇𝑆 𝑓 ) + 𝑇𝑐 𝑝 ) (3.7)
  • 37. 26 The Figure 3.10 shows the minimum round trip cycle time with respect to the number of slave devices connected to the master for a physical line topology. Table 3.3: Parameters defining communication cycle time Description Abbreviation Round trip Cycle Time Tc Formula below Number of Slaves NT 6 Number of Ethernet Frame NF 1 Number of Frame Header SFH 12 B Size of Inter-frame gap SIFG 0 Size of the telegram STH 12 B Number of Ethernet Frame ST 27 Transmission time of one Byte TB 0.028 µs Maximum delay of Physical Tp 0.5 µs Master transmission delay TM f Formula below Delay introduced by slave TS f 0.5 µs Propagation delay along the cable Tc P 0.5 µs As we can see from the Figure 3.10, with six slaves connected in the network, the frame propagation time is 20.22 µs which is approximately equal to the configured time as can be seen from the TwinCAT diagnostic in Figure 3.5 hence validates the use of this model for modeling the cycle time. Figure 3.11 shows the zoomed in graph of the minimum cycle time with respect to the number of slaves. The Figure 3.10, also gives us an understanding of the cycle time to be configured in the master according to the number of slaves connected in the topology.
  • 38. 27 Figure 3.10: Showing the round trip cycle time to the number of slaves in the network As we can see in the Figure 3.5, for the number of slave devices at 15, we achieve a theoretical cycle time of ~50 µs and hence need to configure a cycle time longer than 50 µs. The equation 3.7 can help in estimating the cycle time of the master- slave system which resemble closely to the actual cycle time configured by the master and hence can justify the use of equation 3.7 to model the cycle time of the beckhoff master- slave system.
  • 39. 28 Figure 3.11: Zoomed in on the minimum calculated cycle time from the Figure 3.10 3.6 Decision time modeling The understanding of the frame size and the round trip cycle time of the master slave network help us to determine the configuration settings of the automation hardware system and hence the CFL system in whole. But to understand the decision time of the CFL system it is necessary to understand the errors and delays added to the systems operation. The decision time of the CFL system can be divided into three sections i.e. and can be defined as: 1. Time taken by RTDS (TRTDS) to process the signals and its logical operation. 2. Extra time added to the system due to delays and errors (Terror) in the logic processing and hardware interfacing. 3. The time taken by the Beckhoff (Tbeckhoff) system to read the signals and compute the algorithm and generate a response signal. The decision time (Td) is the sum of all the individual timings and can be represented by the equation below. Td = TRTDS + Terror + Tbeckhoff (3.8) TRTDS = nprocessor x TRct (3.9) Tbeckhoff = (niter + 1) x Tct (3.10)
  • 40. 29 T error = T hsr + T bpr (3.11) The Table 3.4 shows the description of each of the terms mentioned in the equations above. The following sections will explain each of the three split up as described above. The Figure 3.12: Individual timing split-up in the decision time shows the individual timestamps of the processes involved in the decision time of CFL. Figure 3.12: Individual timing split-up in the decision time Table 3.4: Parameters defining decision time Td Decision time TRTDS RTDS simulation time Terror Time due to errors Tbeckhoff Beckhoff cycle time nproc step RTDS processing step TRct RTDS cycle time niter Number of iteration TBct Beckhoff cycle time Thsr Hardware sync error (RTDS & Beckhoff) Tbpr Beckhoff processing error
  • 41. 30 3.6.1 RTDS processing The ship power system model is simulated in RTDS at a time step of 50 µs. The fault is initiated in RTDS as can be seen by a blue curve in the Figure 3.13. After the fault is initialized, it computes a logic which enables the analog signals to be sent out of the RTDS. This RTDS logic is processed onto two different controls processer and accounts for two timestamp processing time. The signals are sent out from the front panel analog output and in the range of (-5 V to +5 V). The Figure 3.13 shows the two timestamp process, (50 µs each) required to process and send the signal out from the RTDS. Figure 3.13: The two timestamp processing of the RTDS model tRTDS = nprocessor x tRct (3.12) The equation shows the number of processing steps taken multiplied by the simulation time of each step determines the time taken by RTDS to compute the logic and send the output. 100 µs
  • 42. 31 3.6.2 Beckhoff processing The front panel analog input from RTDS sends the signal to the Beckhoff analog input terminals which reads the analog signal. These analog signals are converted to digital signals by an A/D converter and subsequently uploaded onto the data train eventually arriving at the master. The master reads the data train and extracts values from the slaves. This extracted information is used to process the protection algorithm. The counter threshold for the protection algorithm is set to five, the algorithm computes for five consecutive iteration to determine a fault in the SPS. The master reads the data when the first data train arrives at the analog input terminal and sends out the decision it makes from the first dataset in the second data train, resulting in n+1 cycles (where n is the number of iterations). The cycle time of the master can be configured from 50 µs and above. Figure 3.14: 6 (n+1) cycle times at 50 µs cycle time
  • 43. 32 Figure 3.15: 6 (n+1) cycle times at 100 µs cycle time tbeckhoff = (niter + 1) x tct (3.13) The equation above computes the time taken by the master to determine the fault. Substituting tct as 50 µs and niter as 5, the time taken by the master to compute the algorithm and send out the response is 300 µs as can be seen from the Figure 3.14 and for the cycle time of 100 µs for a 5 iteration process, the master takes 600 µs to respond to a fault as shown in Figure 3.15. Figure 3.14 and Figure 3.15 above shows an oscilloscope plot of the n+1 cycles. 3.6.3 Hardware synchronization A master-slave network has various components distributed throughout the topology and it is useful to make them operate in synchronization with each other. At times closely linked to each other. The slave units are governed by local clock embedded in the EtherCAT slave controller
  • 44. 33 (ESC). The distributed clock (DC) [21] concept of the EtherCAT is used to synchronize the local clocks. The master is assigned with the task to synchronize the DC at less than 100 ns system accuracy irrespective of the distances between the individual controller and the network topology. Figure 3.16: A two cycle time, worst case, EtherCAT response [21] Figure 3.17: The time taken by master to compute a fault and generate a trip signal Worst
  • 45. 34 There is another synchronization error between interfacing of the RTDS and the slaves. The slaves and RTDS are not synchronized by means of an external clock. Due to the phase shift in the local clocks of each controller, there may be a single timestamp error. The Figure 3.17 shows the time taken by RTDS to simulate the fault in the SPS model and the time taken by the beckhoff to compute the fault and give a response. The 450 µs duration between the initiation of the fault and the response from the master as shown in the figure consists of the RTDS processing time, hardware synchronization error and the beckhoff processing time. In the Figure 3.18 shows the timing of each of the events happening in the complete CFL process. Figure 3.18: Events happening in the fault detection by a CFL system for a 50 µs 5 iterations As we can see in the Figure 3.18 the time taken by the CFL to respond to a fault in a SPS consists of three sections i.e. the time taken by RTDS, time taken by beckhoff system and the hardware synchronization error. The blue curve shows the initiation of fault in RTDS which takes 100 us to simulate the logic and send out the current signal from its front panel analog output terminals (shown in green) to the analog input terminals of the slaves. There is no synchronization between the simulation tool and the controller hardware and hence there may exist a 1 time step delay. The
  • 46. 35 beckhoff delay of 2 time step will cause another 100 us delay in read of signals by the analg input of the slaves. The slaves read and send the data to the master for processing in the algorithm and this is don for 5 consecutive iterations and hence take 300 us to generate a response signal as shown in the red. This decision of the beckhoff system is sent back to RTDS again and which triggers some further simulation and finally generates a signal which triggers the fault clearing sequence to operate. Figure 3.19: Fault detection time by CFL for a 50 µs and 3 iterations for each individual slave in the network The Figure 3.19 and Figure 3.20 above shows the fault detection time when each slave is added to the master- slave topology. The underlying assumption in testing above is that the last slave unit is connected to the fault location. Figure 3.19 shows the CFL detection time for a 50 µs EtherCAT cycle time and 3 iterations. Figure 3.20 shows the CFL detection time for a 100 µs EtherCAT cycle time and 3 iterations. As we can see, there is a one cycle or two cycle time latency in the CFL detection.
  • 47. 36 Figure 3.20: Fault detection time by CFL for a 100 µs and 3 iterations for each individual slave in the network 3.7 Factors affecting performance of CFL In order to fully understand the capabilities of the CFL system, understanding of the parameters affecting the response of CFL is very critical. The few parameters which can affect the system response are as follows: 3.7.1 Topology This is one of the indices which could affect the performance of the CFL system. The network which master and slaves connects can affect the achievable cycle time of the system. This section discusses about the two topologies, line topology and ring topology. The equations listed below can be used to calculate the communication cycle time. Where Tcycle represents the communication cycle time, Tframe represents the time taken by the frame to propagate through the network. Tnetwork consists of the forwarding delays produced by the slave devices and the delays caused by physical layer components [22]. Tcycle = Tframe + Tnetwork (3.14)
  • 48. 37 The factors determining the length of frame has been discussed in the previous section. The time for frame propagation also depends on the bandwidth (bw) and can be shown in the equation below. Tframe = Lframe x 8 / bw (3.15) 1. Line topology Line topology is the simplest network topology and also one of the most widely used. This topology avoids creation of a complex mesh of cables and leads to easy maintenance of the system. The equations below show the calculations for the network propagation time and the forwarding time by each node. These timings combined with the frame propagation time accounts for the total communication cycle time. Tnetwork = Tcable + Tmaster + (n-1) x Tnode + tEndNode (3.16) Tnode = tMMp + tMMf + 2 (tRx + tTx) (3.17) As the frame propagates through the slaves it reaches the last slave and the master detects an open node. The last slave will send the frame straight back to the master and can be computed by the equation below. TEndNode = tMMP + tRx + tTx (3.18) Table 3.5: Timing of different delays of master Symbol Description Value (ns) tMMf Forwarding delay 265 tMMP Processing delay 305 tRx Receive delay 320 tTx Transmit delay 140 2. Ring topology Ring topology provides an advantage over the line topology by creating a return path for the data train to return to the master. The last slave will have a return path to forward the data from the last slave back to the master. This return path can also lead to a redundant topology as there is an additional path for the data to flow once a section of the cable is lost.
  • 49. 38 Tnetwork = Tcable + Tmaster + ∑ Tnode (3.19) Tnode = tMMp + tMMf + 2 (tRx + tTx) (3.20) The Figure 3.21 shows the comparison of round trip cycle time of a line and ring topology. The line and ring topology can have comparable performance for a small network but ring topology has greater performance for a large network. Figure 3.21: Comparison of a round trip cycle time of a line and a ring topology 3.7.2 Jitter Jitter is the short-term variation of the times of the respective bits from their ideal times [26] In short jitter can be described as latencies in the network stations which result in the variation of the cycle time [23]. The equation below can be used to calculate the jitter occurring in the system. Jitter can be caused in the master-slave network if the master is not configured for a proper cycle time. If the master cycle time is lesser than the total communication cycle time, jitter may occur..
  • 50. 39 A large jitter in the network can cause the CFL system to miss a cycle of data collection and can cause delays in the fault identification and location. J =|Tc − Tcm| / Tc (3.21) Where, Tc is the nominal cycle time configured at the beginning of the network Tcm is the actual measured network time Figure 3.22: Bandwidth relationship between minimum cycle time and number of slaves 3.7.3 Bandwidth Bandwidth can be defined as the amount of data that can be transmitted in a fixed amount of time. In the equation below [23], MCT represents the minimum pooling period of the slave devices. For an EtherCAT system, the MCT is calculated to be 17.28 µs. For a 100 Mbps transmission speed, non-real-time bandwidth (NRB) can be computed from the equation 3.22 below. NRB = |Tc − MCT| 𝑇𝑐 × 100 (3.22)
  • 51. 40 Figure 3.22 shows the bandwidth relationship between minimum cycle time to the number of slaves connected in the master-slave topology [22]. This relationship is developed for a fast Ethernet of 100 Mbps and Gigabit Ethernet of 1 Gbps for a 4 byte data. As we can see, the gigabit Ethernet performs better than the fast Ethernet and can achieve faster round trip cycle time. The analysis of the effect of bandwidth on the round trip cycle time of the system can help in better selection of the parameter of the CFL system for an actual ship. Figure 3.23: The network propagation time with respect to number of slaves 3.7.4 Network propagation time The time taken by the frame to propagate throughout the network depends on factors like payload size of the data, the length of the cable section and the number of nodes connected in the network. For a transmission speed of 100 Mbps and a constant payload size of 4 bytes, the network propagation time with respect to the number of slaves connected in the topology can be shown in the Figure 3.23.
  • 52. 41 3.7.5 Noise The CFL system relies on reliable data communication for performing its fault location and identification function. Noise can be a critical factor causing a disturbance in the communication channel and could possibly lead to an incorrect CFL fault detection. Noise is a relative concept and can mean differently for different conditions, hence, defining noise is important. Noise can be defined as a random, undesirable energy that enters the communication system via the communicating medium and interferes with the transmitted message [27], [28]. A preliminary analysis of effects of noise on the CFL system was performed. The aim of this study was to explore on the question: At what amount of noise in the measurements will the CFL system generate a false decision. 3.7.5.1 Sources of noise in a system Noise in the system can arise due to many internal and external factors and it is practically unavoidable. The noise can cause degradation in the performance of both analog and digital systems in which the receiver receives an adulterated version of the data sent to it by the sender and hence it is unable perform its required functionality thereby reducing the efficiency of communication system. Sources of noise can be classified into two 1. Internal noise 2. External noise 1. Internal noise Internal noise is caused by the disturbances in the internal electric due to design imperfections or random motion of the electrons. Some examples of internal noise are listed below:  THERMAL NOISE (JOHNSON NOISE) Thermal noise or Johnson-Nyquist noise is an electronic noise generated by the thermal agitation of the electrons flowing inside the electrical conductors. Thermal noise is generated by all devices which cause resistances to the flow of electrons. As the temperature increases, the kinetic energy in the conductor increases which increases the random motion increases which increases the thermal noise can be seen in the Figure 3.24.
  • 53. 42 Figure 3.24: Random motion of electrons due to increase in temperature Results of experiments performed by Johnson stated that the power of noise measured in a conductor is directly proportional to the absolute temperature and bandwidth of the measuring instrument. This was theoretically studies by Nyquist which resulted in the formulation of the mean square noise voltage which can be defined as shown in the equation (3.23). V2 = 4kTBR (3.23) Where, k is the Boltzmann’s constant, T is the absolute Temperature, B is the bandwidth of noise, R is the resistance offered by the conductor.  SHOT NOISE Shot noise is used to describe the type of noise which arise from the random fluctuations in the emission of electrons from cathodes in vacuum tubes. Shot noise, occurs due to the ejection of charge career, in semiconductors that have a considerable amount of charge in the pn junction. This charge creates a current which is effectively a summation of current pulses. The equation 3.24 shows the current generated due to shot noise as a series of current pulses. i(t) = Io + in(t) (3.24) Where
  • 54. 43 𝑖(𝑡)- total current (A) 0I - constant current (A) 𝑛(𝑡)- noise current (A) 2. External noise External noise is caused by factors external to the system like lightning, switching of electrical equipment, signal interference and may also be caused due to faults in the system. Below is the list of some external sources of noise.  Electrostatic interference  Electromagnetic interference  Radio frequency interference The devices which lead to sudden changes in the voltage or current levels are sources of noise. It is also called as impulse noise. Some of the common sources of impulse noise are listed below [29], [30]:  Switching of large electrical devices  Lightning strikes  Electrical Faults  High power equipment. The mitigation of noise is essential for the CFL system as an improper signal could cause the system to detect false trip and might lead to the isolation of a healthy section of the power system. The following techniques can be applied to reduce the effects of noise.  Physical isolation of noise generating equipment from noise-sensitive equipment  Electrical isolation  Shielding or screening of noise sources and equipment affected by noise
  • 55. 44 Figure 3.25: Additive White Gaussian Noise model 3.7.5.2 Additive White Gaussian noise Additive white Gaussian noise is one of the most widely used models to represent a random process. For modeling purposes, it is fair to assume the noise in the communication systems to be Additive White Gaussian Noise (AWGN) [27], [28]. Additive Noise can be assumed to be additive because the noise signal is usually added to the information bearing clean signal. The Figure 3.25 shows the representation of a noise model. In this, the clean signal is added with a noise and hence the receiver receives the signal with additive noise. White White noise is assumed to be a random signal with a constant power spectral density, given that the noise is not band limited by some filter bandwidth. Power spectral density of a white noise can by expressed as  fpo can be seen in the Figure 3.26. White noise =  fpo = Constant Gaussian We generally term noise as a random power and hence it can also be assumed to have voltage amplitudes following a Gaussian distribution.
  • 56. 45 Figure 3.26: Depicting the uniform frequency of white noise 3.7.5.3 Signal to Noise ratio (SNR) The ratio of signal voltage to noise voltage read by the receiver can be used to determine the strength of the signal. The SNR model can be used to determine how well the communication system will operate. In communication systems, generally, the signal voltage at the source remains stable. The noise is added to the signal voltage during its propagation in the cable can depend on the length of the cable and the cable resistance. The equation 3.25 can be used to calculate the SNR. SNR= 20 × log10( 𝑉𝑠𝑖𝑔𝑛𝑎𝑙 𝑉𝑛𝑜𝑖𝑠𝑒 ) (3.25) The SNR is usually expressed in decibels (dB), it is defined as the logarithmic ratio of the signal voltage (Vsignal) and noise voltage (Vnoise). The Figure 3.27 shows a relation between the SNR and noise percentage in a signal. It can be seen that the higher the SNR, the lower the noise percentage and hence easier to provide acceptable performance. Figure 3.28 shows the noise levels which are added to the signal when the SNR is 10 dB, 15 dB and 20 dB, the blue curve representing SNR of 10 dB shows a higher variation in the signal levels when compared to the SNR of 15 dB or 20 dB. This can also lead to an understanding that the higher signal to noise ratio provides a better chance for a cleaner signal. Noise Frequency Constant
  • 57. 46 Figure 3.27: SNR with respect to noise in the signal Figure 3.28: Noise levels 3.7.5.4 Noise modeling on CFL system The CFL system is based on instantaneous data measurements from analog input terminals distributed throughout the power system. Using the AWGN model and SNR model, it is possible
  • 58. 47 to mimic the effect of noise that is possible to be observed on the fault identification process. To model the noise in the CFL system, two cases were studied. In case 1, only one of the two analog input nodes receive a noise and the second receives a clean signal. In case 2, both the nodes of the analog inputs receive noise signal. This study has an underlying assumption that 2 analog input nodes are being monitored for a line-to-line fault in the SPS model described in the previous chapters. CASE 1: Only one node receives noise In Figure 3.29, there are two nodes i.e. “Node A” and “Node B”. In this case we assume having noise only in one of the two nodes (Node B). Hence the “Node B” receives a clean signal with an additive noise signal. The current signal is generated by RTDS for a line-to-line fault in the SPS simulation model and the noise signal with the particular SNR is being modeled in Matlab. Figure 3.29: Node B receiving noisy signal Figure 3.30 shows the effect of noise on the current signal. The figure represents the condition when a fault has occurred in the SPS. The blue curve represents a clean signal which is being generated by RTDS. The other curves represent a noise added to the clean signal. As can be seen from the Figure 3.30, the SNR of 10 dB has a higher amplitude of variation compared to the others which also validates the statement that the signal with higher value of SNR can be read better by a receiver.
  • 59. 48 Figure 3.30: The effect of noise on the current signal Figure 3.31: Effect of Noise on Slope calculated by the algorithm of the CFL system Figure 3.31 shows the effect of noise on the slope calculation of PDP algorithm which determines the fault in the SPS. The slope value to determine a fault in the system is assumed to be 0.4. The
  • 60. 49 curve representing SNR 10 dB represent a noise level of approximately 30%. As we can see, the fault occurs at time 8 µs and at 9 µs the slope value crosses the threshold of 0.4, but due to noise in the signal, the slope appears to be ~0 leading to a faulty decision. Also at time 5 µs and 6 µs, the clean signal reads ~0 but the amplitude of the noise is ~0.4. This could possibly lead to a faulty operation of CFL. This is also a factor to be considered when setting the slope and the counter threshold for the CFL system. CASE 2: Noise in both the nodes In Figure 3.32, there are two nodes i.e. “Node A” and “Node B”, in this case we assume both the nodes (Node A and Node B) receive noisy signal. The current signal is being generated by RTDS for a line to line fault in the SPS simulation model and SNR model is used to add the noise to the clean signal in Matlab. Figure 3.32: Noise in both Node A and Node B Figure 3.33 shows the noise profile for the two nodes (Node A and Node B) for SNR of 10 dB, 15 dB, and 20 dB. Figure 3.34 below shows the effect of noise on the slope calculation by PDP algorithm for the CFL system. The slope threshold is set at 0.4. We can see for SNR of 10 dB and 15 dB, the magnitude of variation caused by the noise, for some instances, is greater than 0.4 and could possibly lead to a false detection or no detection by the CFL system.
  • 61. 50 Figure 3.33: Noise profile in node A and node B We can see from the curve of SNR 10 dB, the slope crosses the threshold of 0.4 for two consecutive iterations on two occasions. This will lead to a faulty counter increment but ay not lead to a faulty CFL detection. The fact that this event occurs twice with an interval of one timestep indicates a possibility of false detection by CFL system. This analysis raises the question on the amount of filtering needed to prevent this occurrence and also on indicates a deeper analysis on the slope threshold value and the counter threshold value. Figure 3.34: Effect of Noise on Slope calculated by the algorithm of the CFL system
  • 62. 51 3.8 Summary This chapter describes the various models used to predict the CFL system performance. These performance models like round trip cycle time, frame size, decision time can also be used to understand the CFL system scaling for a full ship system. Various factors affecting the CFL performance like topology, jitter, bandwidth, noise were identified and were studied.
  • 63. 52 CHAPTER 4 CFL IMPLEMENTATION ON SHIPBOARD POWER SYSTEM This chapter presents the hardware implementation of the CFL system on a Beckhoff automation hardware with EtherCAT as a network protocol for data communication. The CFL system was implemented and demonstrated on a hardware in the loop (HIL) simulation on RTDS and tested for various fault impedance and system operation conditions. 4.1 Hardware in the loop testbed The CFL system follows a master-slave line topology communicating over a deterministic real- time Ethernet (EtherCAT). The Figure 4.1 shows the 1 MW, 5 kV MVDC SPS, along with the master-slave serial topology, modeled for the study. There are two AC generators each rated at 1 MW. Each generator is interfaced to the 5 kV MVDC bus through a 1 MW MMC. An average value model of the MMC which has been derived from experimental results of CHIL implementation of MMC has been used. Each MMC is current limited to 228 A (rated operation, 1 MW, 200 A at 5 kV). There are 12 cable sections in this model. The impedances and lengths of the cable sections are presented in [3] MMC 1 and MMC 3 are source MMCs to which the 1 MW generators are interfaced. There are two loads on the system, each rated at 500 kW on the 5 kV DC bus. The MMC's can be operated in voltage source mode (VSM) or current source mode (CSM). The 5 kV DC bus ring bus has dc disconnects at each end of the cable section so as to maintain stable operation of the system in an occurrence of a fault by rerouting the power generated to the load centers. The MVDC ship power system model is implemented on a real time digital simulator (RTDS) operating at a 50 µs time step and interfaced with an industrial automation hardware on which the protection scheme is implemented. The communication protocol between master and its various slaves is EtherCAT. The 1 MW MVDC SPS is simulated in RTDS, it consists of a centrally located master along with slaves distributed throughout the MVDC SPS. The slaves consist of a fiber-optic converter, which converts 100 base TX to 100 base FX, along with multiple analog input channel and digital output channel connected to the fiber-optic connector for read and write of data to and from the simulation model. This HIL simulation model [2] consists of has nine analog input channels gathering
  • 64. 53 instantaneous current values from the disconnect switches located across each cable section throughout the SPS and nine digital output terminals sending the status signal out to indicate the fault location and also to trigger the fault clearing sequence. The analog and the digital terminals communicate with the master over EtherCAT and the data packet is transmitted over fiber optic cables between each slave. Figure 4.1: MVDC shipboard power system with the communication architecture The location of protection zones on the SPS are designated in an overlapping manner such that they provide redundant protection to each of the cable sections of the SPS and at the same time do not create a false trip signal to open the disconnect switches in the adjacent cable. The Figure 4.2 is a screenshot of the RSCAD runtime from the SPS model. There are five cable sections on which line-to-line fault can be applied. The Table 4.1 shows the fault location and the respective disconnect switch which needs to open in order to isolate the faulty cable section. Figure: MVDC shipboard Power system with the communication architecture CS1 CS2 CS3 CS4 CS5CS6CS7 CS8 F I O FIO F IO F I O F I O Master F I O MMC 4 Input signals (Current) from RTDS to Beckhoff Analog Input Output signal from Beckhoff Digital Output to RTDS GTDI Master Slave Connection (Fiber) Disconnect Switch F- Fiber optic converter junction CS- Cable Section I- Analog Input Terminal O- Digital Output Terminal F I O Slave UnitMMC 3 MMC 2 MMC 1PGM PGM Load Load
  • 65. 54 Figure 4.2: The location of cable section and disconnect switches as seen in the RSCAD Model Table 4.1: Fault location and the respective disconnect switch associated with the particular fault location Fault Disconnect Switch Cable 1 A B - Cable 2 B J C Cable 3 C Q D Cable 4 D L F Cable 5 F N A Cable 1 Cable 2 Cable 3 Cable 4Cable 5
  • 66. 55 As we can see from the Table 4.1, if there is a fault in cable 1, disconnect switches A and B need to open. But disconnect switch A is also associated with a fault in cable 5 and disconnect switch B is associated with the fault in cable 2. The CFL system needs to ensure that it only sends commands to isolate the fault in cable 1 and do not affect the healthy sections of the remaining power system. The Figure 4.3 shows the plots of faults in each cable sections. As it can be seen from the plots below, the disconnect switches guarding the respective cable sections open and cause the trip signal to initiate the fault clearing sequence. Cable Fault 1 Cable Fault 3 Cable Fault 2 Cable Fault 4 Figure 4.3: Selectivity of CFL operation
  • 67. 56 4.2 Fault clearance process of MVDC system The fault clearing in the breakerless MVDC system can be achieved by the total de-energization of the affected section of the MVDC shipboard power system leading to isolation of the affected section via the opening operation of the disconnect switches while the system is de-energized and finally re-energization of the remaining section of the shipboard power system. The Figure 4.4 shows the sequential execution of the fault clearing sequence. As the fault may happen in any part of the SPS (e), the fault current rises (a, b), the power converters feeding the ring bus will be forced into current limiting mode by their built-in overcurrent protection scheme. It then leads to a complete de-energization of the system by ramping the system voltage to zero as shown in (c, d). The CFL system detects and locates the fault (f) and initiates the fault clearing sequence. The fault clearing sequence isolates the faulty section from the healthy section and commands the opening of the disconnect switch. Once the faulty section is isolated, a control signal (g) indicating the clearance of the fault will be sent to the converters to initiate the system recovery. The system recovers by raising up the voltages (c, d) for zero to operating conditions. Hence completes the recovery of the MVDC system. 4.3 CHIL implementation of CFL To analyze the performance of the CFL scheme, a HIL simulation model was developed as described in the section above i.e. a 1 MW, 5 kV model with two generating units represented by MMC’s capable of operating in VSM and/or CSM and two loads connected to the DC ring bus configuration. Cable Fault 5
  • 68. 57 Figure 4.4: Execution of the fault clearing sequence The Figure 4.5 shows a block diagrammatic representation of the various sections of the CHIL testbed and Figure 4.6 shows a photograph of the actual CHIL test bed with the CFL system and the RTDS at CAPS. The CFL hardware setup consists of one master unit interacting with six slave units over EtherCAT. The testbed is a scaled down representation of the anticipated full-scale MVDC shipboard power system. The various tests and the simulation results performed on the CHIL setup are described in the sub-sections below [2].
  • 69. 58 Figure 4.5: Block diagram describing Hardware in the loop (HIL) testing system Figure 4.6: HIL testbed
  • 70. 59 4.3.1 Faster CFL implementation To validate and evaluate the implementation of CFL scheme on the new hardware setup a CHIL test-bed was created as shown in the block diagram in Figure 4.7. The core motive behind this test was to test the fault identification and location timings and to compare them with the previously used hardware. The RTDS simulates the SPS model at a 50 µs time step while the round trip cycle time of CFL hardware is 50 µs. A bolted rail to rail fault was tested at various location on the DC ring bus. The time taken by the new CFL hardware to identify the fault in the system is 800 µs, as shown in Figure 4.7, which is nearly four times faster than the fault identification time in the previously used hardware. Figure 4.7: Showing the fault detection by CFL 4.3.2 CFL response under various fault impedances This section describes the response of CFL scheme for various fault impedances. During a high impedance fault, the fault current is relatively low and it may become difficult to distinguish between load currents and fault currents. But CFL, which operates on PDP scheme, is able to perform its fault location and identification job even in this fault condition. The Figure 4.8 below shows the CFL response under low impedance (fault impedance 0.1 Ω) fault and high impedance (fault impedance 20 Ω) fault conditions. As we observe, the fault detection time in either of the fault impedance conditions was similar and hence we can validate the CFL operation under various fault impedance conditions.
  • 71. 60 Figure 4.8: CFL response in different fault impedance conditions 4.3.3 CFL response for different system configurations The CFL scheme was tested to determine if a fault can be identified in the system irrespective of whether the SPS is run in radial or ring bus configuration. Figure 4.9 shows the CFL fault detection under the closed ring and open ring SPS configuration. As we can see, the CFL system is able to detect the fault in the system in the event of a fault in the open ring configuration of the SPS. Hence validates the CFL operation. Figure 4.9: CFL response in closed ring and open ring bus system
  • 72. 61 4.3.4 CFL response for different loading conditions This section aims to verify the operation of CFL under different loading conditions. The higher loading condition may lead to the slower rise in the magnitude of the fault current which might cause inaccurate operation of CFL system. The SPS was loaded differently in the two test cases that in case one the generators were producing 0.544 MW and in the case two the generators were producing 0.125 MW. As we can see in Figure 4.10, the CFL scheme demonstrates the fault detection in both the system loading condition. Figure 4.10: CFL test waveforms under different loading conditions 4.3.4 CFL response under mmc VSM and CSM operation To observe the CFL response under various MMC operating configuration, two cases were created. In the first case, both the MMC's were made to operate in VSM whereas in the second case, MMC1 was operating in VSM and MMC 3 was operating in CSM. Figure 4.11 shows the fault detection time by CFL in both the conditions when both the MMC’s i.e. MMC1 and MMC 3 are being operated in VSM and the curve in green represent the CFL detection time when MMC1 is being operated in VSM and MMC 3 is being operated in CSM. Figure 4.11 it is shown that the CFL operates with satisfactory performance under different system configurations.
  • 73. 62 Figure 4.11: CFL detection in various operating modes of MMC's r system. Table 4.2: CFL decision time with respect to the different system operating conditionslists all the above experiments to check and validate the operation of the CFL system in different SPS configurations. As we can see, the CFL system is able to operate in a fast and precise manner. This table also shows the comparison of the older CFL system with the new CFL system and shows that the new system is ~4 times faster than the older system. Table 4.2: CFL decision time with respect to the different system operating conditions CONDITION TYPE TIME (µs) FASTER IMPLEMENTATION NEW SYSTEM 800 OLDER SYSTEM 4 ms FAULT IMPEDANCE LOW IMPEDANCE FAULT 750 HIGH IMPEDANCE FAULT 800 POWER SYSTEM CONFIGURATION OPEN RING 750 CLOSED RING 800 LOADING CONDITION 0.544 MW 750 0.125 MW 800 OPERATING MODES VSM- CSM 750
  • 74. 63 VSM- VSM 800 4.4 Summary This chapter provides an overview of the CHIL testbed used to demonstrate the ultrafast CFL system operation. The new system is more than 4 times faster than the older CFL system. The CFL system was tested for different system operating conditions and the whole fault clearing process is described.
  • 75. 64 CHAPTER 5 CONCLUSION AND FUTURE WORK 5.1 Conclusion A system which is ultrafast and precise in fault detection and location called centralized fault location and identification (CFL) is seen to perform its necessary functionality. The factors aiding to assess the scaling and the performance of the CFL system were identified and analyzed for a line-to-line fault in the medium voltage DC shipboard power system. This research presents a demonstration of a faster CFL system and the analysis of the performance models of the centralized fault identification and location (CFL) system for a MVDC shipboard power system. Two types of CFL topology were discussed and were tested for the fault current limited MVDC power system. The performance models demonstrate a methodology to configure the CFL system and to scale the prototype system for a real world operation. The key feature of the research can be summarized as follows: 1. Mathematical models to understand the performance of the CFL system were designed and validated with experimental results. 2. Models were used to understand scaling of the prototype CFL system for an actual shipboard power system. 3. The fault identification system was implemented on a new, industrial automation system hardware platform based on data acquisition and was tested on a CHIL testbed to detect and locate fault in the SPS. 4. The CFL system is intelligent and ultrafast in fault detection and precise in fault location. 5. The performance models indicate the number of slaves as a major factor affecting the design of the CFL system. 6. Two type of physical topology were studied and its effects on CFL system were analyzed. It is found that the ring topology could have multiple possible benefits than using a line topology.
  • 76. 65 7. The CFL system was tested of various configurations of the SPS and was found to accurately and rapidly detect the line-to-line fault in the cable section in around 300 µs. 5.2 Future Work 5.2.1 Hardware Implementation of a ring topology Line topology can provide with the basic functionality of fault location and identification but faster response time can be achieved with a ring topology. Using ring topology can provide additional benefits like faster cycle time, resiliency in loss of one communication cable. 5.2.2 Validating the system resiliency for cable cut condition Due to some reasons, there can arouse a condition where a cable is cut in the system. Testing of system response and maintaining the CFL functionality is an important task under such conditions. 5.2.3 System level control CFL system as described in the chapters above, provides a standard functionality of fault location and identification for a MVDC power system. After the fault has been detected, a system level control has to take over the responsibility of system recovery 5.2.4 Exhaustive Noise analysis Noise is a major source of disturbance and can lead to faulty operation and loss of sensitivity of the CFL system. A detailed noise analysis using various noise models and determining the appropriate noise level which this system can withstand can provide better understanding of the system performance. 5.2.5 Integrating multiple CFL units The CFL system was tested for a 1 MW model of MVDC power system which has 5 cable section. A larger system with multiple protection zones and multiple master-slave system interaction with each other can provide redundancy to CFL functionality. To achieve the desired CFL decision time with respect to the size of the power system would require multiple CFL units interacting with each other. For example, with 1 master and 50 us cycle time, we can have approximately 15 slaves connected in the topology. But in the real ship there may be a need for
  • 77. 66 more than 15 slaves and hence having multiple CFL units interacting with each other can provide the necessary 50 us cycle time 5.2.6 Sensitivity analysis of the differential protection scheme Percentage differential protection (PDP) scheme used for fault identification and location in the CFL system need to analyzed for sensitivity and adaptiveness of slope based on shipboard power system operation. The values of restraint current and the minimum pickup current can be modified to change the sensitivity of slope calculation.
  • 78. 67 REFERENCES [1].Liu, X., Ph.D. Thesis. “A Centralized Fault Management Approach for Smart Grid Protection,” Center for Advanced Power Systems, Florida State University, 2014. [2].Tamaskar, Shravan, Harsha Ravindra, Mike Sloderbeck, Ruturaj Soman, and Michael Steurer. "CHIL-based Demonstration of Centralized Fault Location Strategy for a MVDC Shipboard Power System." [3].Qiu Deng; Xing Liu; Soman, R.; Steurer, M.; Dougal, R.A., "Primary and backup protection for fault current limited MVDC shipboard power systems," in Electric Ship Technologies Symposium (ESTS), 2015 IEEE , vol., no., pp.40-47, 21-24 June 2015. [4]. Mehta, V.K. principles of power systems. S Chand. 2005 [5].Cuzner, R, DRS Power & Control Technologies, Inc., “Next Generation MVDC Architecture Study” 2015 [6].Doerry, N., and J. Amy Jr. "MVDC Shipboard Power System Considerations for Electromagnetic Railguns." [7].Thompson, Michael J. "Percentage restrained differential, percentage of what?." In Protective Relay Engineers, 2011 64th Annual Conference for, pp. 278-289. IEEE, 2011. [8].Miao, Shihong, Pei Liu, and Xiangning Lin. "An adaptive operating characteristic to improve the operation stability of percentage differential protection." Power Delivery, IEEE Transactions on 25, no. 3 (2010): 1410-1417. [9].https://www.ethercat.org/ [10]. CAI, Ziyuan, and Ming YU. "Modeling and Simulation of a Real-time Ethernet Protocol for Smart Grids." International Journal Of Intelligent Control And Systems 17, no. 3 (2012): 69-78.Df [11]. Knezic, Mladen, Branko Dokic, and Z. E. L. J. K. O. Ivanovic. "Topology aspects in EtherCAT networks." In Proceedings of 14th International Power Electronics and Motion Control Conference EPE-PEMC 2010. 2010.Df [12]. Prytz, Gunnar. "A performance analysis of EtherCAT and PROFINET IRT." In Emerging Technologies and Factory Automation, 2008. ETFA 2008. IEEE International Conference on, pp. 408-415. IEEE, 2008 [13]. http://infosys.beckhoff.com/