Chapter 1 `
Introduction To The Project And Overview to power system security
CHAPTER ONE INTRODUCTION TO THE PROJECT AND OVERVIEW OF POWER SYSTEM SECURITY
1.1. INTRODUCTION:
A power system continually experiences changes in its operating state. An emergency state may occur as a result of a sudden increase in system demand; unexpected outages of generators or transmission lines or failure in any of the system components. However, any piece of equipment in the system can fail, either due to internal causes or due to external causes such as lightning strikes, objects hitting transmission towers, or human error in setting relays, also sometimes maintenance purposes of transmission lines or generators or any other equipment of the system make us to stop this equipment of operation. These emergency states may result to overloading a line, the protection devices feels overloading in this certain line and recognize that the power flow in this line is out of limit and capacity which it can withstand, so these devices are set to trip out this overloaded line for protection, now the system loss this line, and we have a contingency case (the contingency case will be mentioned in chapter 3). The demand of the system must be met, and the power which was flowing through this tripped line is not flowing through this line any more (its tripped out), this power must flow anyhow to meet the demand of the system so its going to flow through another lines, but also these lines have limits which not allowable to exceed, so there may be also causing of overloading to one or more than one line of the rest of the lines of the system, now the power flow in this line (or more) is
1
Chapter 1 `
Introduction To The Project And Overview to power system security
also exceeded the limit, so the protection devices of this line trip it out of the service, now we have two overloaded lines in the system (and maybe more), so every line overloaded will be tripped out and as a result to this tripping, there will be another overloaded line, and so on, this cause cascade outages of lines of the system, and finally the system will blackout. To prevent the system from cascade outages or blackout we have to overcome the overloading of lines before they tripped out, we have to analyze the system by doing a full contingency analysis to whole of the system lines by simulate every line outage and its affection to rest of the lines, and ranking this outages of lines from the most severe outage to the less severe one, now we select the severe contingencies, now our aim is to alleviate overloading in the lines of these severe contingencies. Alleviation of the transmission lines overload is critical problem in power system operation; hence, a control action strategy is necessary effectively to reduce the line overloads to the security limits in the minimum time, and it is an important tool in power system secure operation. The possible corrective control actions are generation rescheduling, load shedding, interchange adjustments and network switching, etc. An efficient, simple and fast technique is used to alleviate lines and transformers overload by corrective generation rescheduling, and we are going to discuss this technique in our project in chapter 4. Load shedding is also taken as a last option to alleviate the overload. As discussed in chapter4.
Chapter 1 `
Introduction To The Project And Overview to power system security
1.2. POWER SYSTEM SECURITY:
Power system security is defined as the ability of the power system to withstand disturbances like transmission elements outages or generators outages that can cause sudden and large changes in both the configuration and the state of the system. The power system is defined to be in a secure operating state if the power system is in a satisfactory operating state, and it will return to a satisfactory operating state following the occurrence of a single credible contingency. System security involves practices designed to keep the system operating when components fail due to out of hand reasons outages or planned and scheduled outages. Security assessment is a term used to describe the process of ensuring power system secure operation. Typically, power system remaining secure in healthy cases and in an (N -1) condition (A Single element outage condition). In a secure state, all system parameters are as desired with all buses voltage within their specified limits and no transmission line is being overloaded. 1.2.1. Factors that affect power system security: The system must be operated at all times in such a way that it will not be left in a dangerous condition should any credible initiating event occurs. Since all of the power system equipments are designed to operate within certain limits, most pieces of equipments are protected by automatic devices that can cause an equipment to be switched out of the system if these limits are violated. If any event occurs on a system that leaves it operating with limits violated, the event may be followed by a series of further actions that switch other equipments out of service.
Chapter 1 `
Introduction To The Project And Overview to power system security
If this process of cascading failures continues, the entire system or large parts of it may completely collapse; this is actually referred to as a system blackout. 1.2.1.1. These factors can be classified as follows: 1. System design effects: 1. Generation capacity: Enough generation must be available at all times to meet the load demand. Thus, generator units must be managed in such a way that planned outages of units as well as forced outages should not result in a shortage of generation. Obviously, the installed generation capacity has to be greater than the maximum demand. 2. Transmission lines capacity: Transmission lines must have excess capacity to withstand all single equipment failures. The state of Maine in USA survived the year 1965 blackout due to its weak ties to the rest of New England which tripped out. 3. Amount of the network meshing: The transmission lines have to be connected in the network so that the outage of a particular line leaves adequate parallel paths between the generators and the loads. The generators must be distributed in the network in a manner that insures supply continuity during outages through alternative paths. 2. Operating condition effects: 1. Voltage level: The amount of the overload of lines terminated with buses with low voltage is higher than the amount of overload of the same lines when the voltage level of the terminating buses is suitable. Contingency analysis is done in two levels of reactive power compensation to investigate the effect of voltage level on contingencies severity.
Chapter 1 `
Introduction To The Project And Overview to power system security
2. Loading condition: The most severe contingencies occur in the heavy load condition. Number of severe contingencies and a contingencys severity lessens in the medium load condition. There is no single severe contingency in the light load condition. Loading condition affects voltage level and worsens the case in the heavy load condition. 1.2.2. System security functions that must be carried out in an operations control center: Most of large power systems install equipments to allow operations personnel to monitor and operate the system in a reliable and secure manner. System security can be broken down into three major functions that are carried out in an operations control center: 1. System monitoring: Provides the operators of the power system with pertinent up to date information of the conditions of the power system. 2. Contingency analysis: It is studying the power system during contingencies, and during each contingency, studying system state to know which elements are overloaded or become with limit violated state due to a specific element outage. 3. Corrective actions: Correction of the violations in transmission lines flows, buses voltage limits, generators output limitsetc.
Chapter 1 `
Introduction To The Project And Overview to power system security
1.2.3. Factors that affect the power system operation from a reliability standpoint: We will assume that the engineering groups who have designed the power system's transmission and generation system have done so with reliability in mind. This means that adequate generation has been installed to meet the load and that adequate transmission has been installed to deliver the generated power to the load. If the operation of the system went on without sudden failures or without experiencing unanticipated operating states, we would probably have no reliability problems. It is highly uneconomical, if not impossible, to build a power system with so much redundancy (i.e.: extra transmission line, reserve generation, etc) that failures never cause load to be dropped on a system. Rather, systems are designed so that the probability of dropping load is acceptably small. Thus, most power systems are designed to have sufficient redundancy to withstand all major failure events, but this does not guarantee that the system will be 100% reliable. Within the design and economic limitations it is the job of the operators to try to maximize the reliability of the system they have at any given time, thus, the operators play a considerable role in seeing that the system is reliable. We will not be concerned with the entire events that can cause trouble on a power system, instead, we will concentrate on the possible consequences and remedial actions required by failure event of transmission line outage. Transmission line failures cause changes in the flow and voltage on the transmission equipment remaining connected to the system, therefore, the analysis of transmission failures requires methods to predict these flow and voltages so as to be sure they are within their respective limits.
6
Chapter 1 `
Introduction To The Project And Overview to power system security
Programs are based on a model of the power system and are used to study outage events and alarm the operators to any potential overloads out of limit voltages for example the simplest form of contingency analysis can be put together with a standard power flow program such as described together with procedures to set up the power flow data for each outage to be studied by the power flow program. Several variations of this type of contingency analysis scheme involve fast solution methods automatic contingency event selection and automatic initializing of the contingency power flow using actual system data and state estimation procedures. The third major security function is security constrained optimal power flow. In this function a contingency analysis is combined with an optimal power flow which seeks to make change to the optimal dispatch of generation. As well as other adjustments, So that when a security analysis is run, no contingencies result in violations. To show how this can be done we shall divide the power system into four operating states: Optimal dispatch: this is the state that the power system is in prior to any contingency. It is optimal with respect to economic operation, but it may not be secure. Post contingency: is the state of the power system after a contingency has occurred .we shall assume here that this condition has a security violation (line or transformer beyond its flow limit, or a bus voltage outside the limit). Secure dispatch: is the state of the system with no contingency outages, but with corrections to the operating parameter to account for security violations. Secure post contingency: is the state of the system when the contingency is applied to the base operating condition with corrections.
7
Chapter 1 `
Introduction To The Project And Overview to power system security
We shall illustrate the above with an example. Suppose the trivial power system consisting of two generators a load and a double circuit line is to be operated with both generators supplying the load as shown below:
Figure (1.1): Optimal dispatch We assume that the system as shown is in economic dispatch that is the 500Mw from unit 1 and the 700Mw from unit 2 is the optimum dispatch further. We assert that each circuit of the double circuit line can carry a maximum of 400MW. So there is no loading problem in the base operating condition. Now we shall postulate that one of the two circuits making up the transmission line has been opened because of a failure. This result in:
Figure (1.2): Post contingency state.
Chapter 1 `
Introduction To The Project And Overview to power system security
Now there is an overload on the remaining circuit. We shall assume for this example that we do not want this condition by lowering generator on unit 1 to 400Mw. The secure dispatch is:
Figure (1.3): Secure dispatch. Now, if the same contingency analysis is done the post contingency condition is:
Figure (1.4): Secure post contingency state. By adjusting the generation on unit 1 and unit 2, we have prevented the post contingency operating state from having an overload. This is the essence of what is called ''security correction''.