Latch
Latch
The analysis of relay control systems: Electrical schematics with latch, step and
lockout relays
In previous parts of this ‘Electrical Schematics’ series, we covered many
important topics, so I advise you to study those articles as well (I, II, III, IV, V,
and VI).
As we embark on an exploration of these relay systems, we delve into the
intricate mechanisms behind their operation and applications. The journey begins
with latch or bi-stable relays, where we unravel the principles governing setting
1
coil energization, the latch state, resetting coil activation, and the maintained
state.
Through this examination, we gain insight into how these relays uphold their
positions, providing stability and reliability in electrical systems.
Table of Contents:
1. Latch / Bi-Stable Relay:
1. Setting Coil Energization
2. Latch State
3. Resetting Coil Activation
4. Maintained State
2. Step Relay
3. DC Motor Control Circuit Using Step Relay:
1. Relay K1 (Step Relay)
2. Relay K2
3. Control Push Buttons (S1 and S2):
1. S1 (Start Push Button)
2. S2 (Stop Push Button)
4. Lock Out Relay or Master Trip Relay (ANSI Code 86)
2
5. BONUS: Download Motor Circuit Design Guide (PDF)
3
1.1 Setting Coil Energization
When the setting coil is energized, the contacts of the latch relay change their
position, either from open to closed or closed to open, depending on the design
and configuration of the relay.
Upon closer examination of the relay symbol, we notice a subtle but significant
difference from the standard auxiliary relay symbol. Two additional lines are
incorporated into the symbol, indicating the presence of two coils within the
relay. This visual cue serves to differentiate the bi-stable relay from other relay
types and signifies its bi-stable nature, capable of maintaining two stable
conditions.
Within the symbol, the relay itself, denoted as K, is depicted in its normal
position. This normal position signifies the state of the relay when it is not
energized or activated. The associated contacts are labeled accordingly: 13-14
represents the normally open contact, while 11-12 signifies the normally closed
contact.
These contacts play a crucial role in controlling the flow of electrical current
within the circuit, depending on the state of the relay.
5
Additionally, we observe another set of contacts labeled as 15-16-18, which
represent the changeover contact of the relay. This contact enables the relay to
switch between two different electrical circuits or states, depending on the
energization status of its coils.
By transitioning between these contacts, the bistable relay facilitates the desired
functionality within the electrical system, providing versatility and control in
various applications.
In summary, Figure 1 offers a comprehensive visual representation of a bi-stable
relay, highlighting its dual-coil configuration, distinctive symbol, and key
contacts. Through this illustration, we gain a deeper understanding of the relay’s
structure and functionality, setting the stage for further exploration into its
operation and applications in electrical circuits.
6
through the contact, enabling the completion of a specific circuit or the activation
of downstream components.
https://electrical-engineering-portal.com/analysis-relay-control-systems-schematics-bi-stable-
step-lockout-relays
Mastering switchgear control circuits: trip, BCPU and alarm, indication, and interlock
circuits
7
Fortunately, the main principles are the same, meaning that the tools used in the last
article are good for this article, too. These principles are related to the contact default
status, drawing reading basics, etc.
One of the main concepts is the breaker default position, which is charged spring, test
position, open status.
Table of Contents:
1. Switchgear Auxiliary Switches
2. Circuit Breaker Tripping Circuit
1. Circuit Breaker Failure
2. Trip Circuit Supervising
3. Bay Control-Protection Unit (BCPU) and Alarm Circuit
4. Indication Circuit
5. Mechanical Interlocking Circuit
8
MOC switch and MOC operating pantograph
https://electrical-engineering-portal.com/switchgear-control-circuits-trip-bcpu-alarm-
indication-interlock
The goods & bad of digital substations
Here at EEP, we have already covered multiple aspects of digital substations,
ranging from design, upgradations, and whatnot. We may continue writing till
eternity and still be left playing catchups with the latest addition to advancements
in power systems design and operation. Nevertheless, in this article, our focus
shall be on the possible contingencies and turn of events when the coveted
connectivity of modern digital substations goes haywire.
9
What will happen to digital substations once the internet drops dead? Massive
blackouts?
Or, how to cope if the internet or ethernet is down in digital substations?
Normally, a fully automated digital substation in a power grid is connected to a
remote server through the internet over an optical channel.
Table of Contents:
1. Demarcation of digital substations
2. Emergence of ethernet and internet in digital substations
3. What if no ethernet?
4. Internet in digital substations
1. Remote supervision and control
2. Teleprotection
3. Remote maintenance
5. Conclusion and frequent queries
1. Do digital substations fail to operate when the internet is
down?
2. Are digital substations ready for offline or analog operation?
10
3. What could engineers do in that situation to maintain the
power supply?
4. Bracing against the internet failure: “Redundancy, contingency
plans, and skilled technicians.”
11
Figure 1 – A concept diagram of a digital substation
Although very capable, they had their limitation in data transfer rate and
coverage, which eventually pushed for the inception of ethernet, a more
advanced serial data communication standard.
12
was a suitable option for relaying information to SCADA systems and not for
automation systems due to their point-to-point connectivity, low data transfer
rate, and transmission coverage.
RS 485 was a clear upgrade over RS 232 due to its fast data transmission rate
and differential mode of operation that allows multidrop connections suitable for
automation systems.
Still, the substation automation systems were never at full potential until the
introduction of ethernet as the ultimate serial communication option for
digital substations. Their fast data transfer rate, connection flexibility via cable
or fiber, and support for redundant connection topologies made them stand out
from the rest.
As the substations now depend on ethernet connectivity more than ever, IEC
61850, an international standard defining communication protocols for
intelligent devices at electrical substations, has readily succeeded the MODBUS,
DNP3, and IEC 60870-5-103 communication protocols.
https://electrical-engineering-portal.com/digital-substations-internet-drops-dead
13
Rogowski Coils in protective relaying in electric power systems (on diagram: Relay
protection zones and RC locations)
Signal processing is required to extract the power frequency signal for
applications in phasor-based protective relays and microprocessor-based
equipment must be designed to accept these types of signals.
14
Figure 1 – Application of Rogowski Coils used for Protective Relaying Purposes
15
Rogowski Coils may be connected to relays via twisted pair shielded cables with
connectors (Figure 3). Terminal blocks are not required since the coil output
signal is a minimal voltage from the safety aspect, and this voltage does not
increase when the secondary circuit is open.
Figure 3 shows Rogowski Coil width and weight are much smaller than that of a
CT. This coil has the same size window as the CT from Figure 2, but can be
applied to a significantly larger current range than the CT.
16
Figure 4 – Volt/Current Sensor Interface to Relays
The EITs were designed based on IEC 60044-7 and IEC 60044-8.
https://electrical-engineering-portal.com/download-center/books-and-guides/relays/
rogowski-coil-cts
17
Substation degital communication
Typically, substations comprise power elements like power transformers, switches,
busbars, etc. and control elements like protection units, metering units, RTUs, SCADA,
etc. While the power elements are mandatory requirements, the control elements vary
as per the function of a substation and the capital investment available.
Advanced communication protocols were not ready to be used in the power sector back
then. To bring it in perspective, IEC 61850, an international standard that defines the
modern communication protocol for digital electronic devices within substations, was
introduced only in 2003.
18
This article will discuss the fundamentals of the up-gradation of old substations into
digital substations capable of full automation, real-time data acquisition, and
monitoring, along with lots of additional features.
Table of contents:
1. Typical operation and communication mechanism of old substations
2. Digital substation and communication protocol in a nutshell
3. Why convert old substations into digital?
4. Architecture and essentials of conversion
1. Equipment selection
1. Primary sensing elements and interfacing devices
2. Integrating existing digital devices and new IEDs
3. Provision for synchronization and switches
4. SCADA and HMI
2. Selecting bus architecture
3. Final integration with the existing components
https://electrical-engineering-portal.com/convert-old-substation-to-digital
19
Introduction
The Digital Substation is a term applied to electrical substations where operation
is managed between distributed intelligent electronic devices (IEDs)
interconnected by communications networks. It became possible by using
computing technology in the substation environment.
20
provide operators with informative interfaces using software packages running
on personal computers.
Significantly they developed to enable the transmission of data between the
different substation devices. As computing power became greater and cheaper,
it became possible to integrate multiple functionalities into single devices,
resulting in fewer devices being required to implement the same traditional
functionality.
The digital substation brings major benefits in terms of design and engineering,
installation, and operation. Off-the-shelf solutions can be offered, modifications
can be easily accommodated, cabling (and hence costs), are reduced, and
embedded diagnostics assure system integrity.
This article takes a tour through the enablers of the digital substation, looking at
communications (and how to ensure that they are sufficiently secure, reliable,
and dependable) concluding with an introduction to the standard IEC 61850.
Contents:
1. Communications
1. The OSI Model for Computer Communications
2. Communications Between IEDs
1. Physical Connection to IEDs for Substation Control
and Automation
1. EIA 232
2. EIA 485
3. Ethernet
2. Network Topologies
3. Serial Communications
1. Serial Communications Protocols
1. Modbus
2. IEC 60870-5-103
3. DNP3
4. Ethernet Communications
3. IEC 61850
1. IEC61850-9.2
4. Concluson
21
Communications
Communication is the conveyance of information from a source to a destination.
In 1949 C. E. Shannon and W. Weaver produced a mathematical model for
communications as shown in Figure 1.
The model shows that for the information to transfer from the source to the
destination, a transmitter (encoder) and a receiver (decoder), both connected by a
channel are required.
It also demonstrates that sources of noise can interfere with the process.
Considering communication between two people, the source is the brain of the
person who wants to get the message across, the transmitter could be that
person’s voice and the channel is the atmosphere.
At the receiving end, the receiver would be the other person’s ears and the
destination that person’s brain. Audible noise could drown out the message
causing it not to be received and this is a possible cause of communication
breakdown, but it is not the only one.
If the source is speaking but the destination is not listening (i.e. they are not
synchronised), communication won’t be successful.
Similarly, if the two people talking don’t share a common language, and/or if
certain protocols are not observed (e.g. not both speaking at the same time),
failure is inevitable. Successful communication requires common understanding
between source and destination.
22
1. The OSI Model for Computer Communications
In the context of substation automation, communication is the transfer of
information from one computing device to another but, as with the example
above, problems with synchronisation, language, and protocol can all cause
communication failure.
23
1.1 OSI Layer 1 – The Physical Layer
Every data message is transmitted on some medium. This medium usually takes
the form of cables, wires, or optical fibres, but it could just as well be wireless,
with the data being carried on electromagnetic waves.
The physical layer specifies the type of medium to be used between one end of
the data exchange and the other, the type of connectors to be used and the
voltage and current levels, and if applicable, optical characteristics defining the
state of the data bits.
A very common medium, particularly in Ethernet systems started with the CAT
5 UTP cable (Category 5 Unshielded Twisted Pair), which consists of four
colour-coded twisted pairs of wires terminated with RJ45 connectors. As the
name implies, this type of cable is not shielded against electromagnetic
interference.
There is also a version of this cable called CAT 5 STP (Category 5 Shielded
Twisted Pair) that has a metallic outer sheath, providing electromagnetic
shielding. This type of cable is often used in noisy environments like the
substation.
CAT 5, has more recently evolved into new standards such as CAT 6 and CAT 7,
which offer even more robust shielding, fire protection etc.
24
The physical layer provides the Data Link layer with bits. The Data Link layer
now provides some intelligence to this sequence of bits by defining Data Frames.
These Data Frames are packets of data containing the data to be transmitted and
some control information governing the transmission.
The control information comprises flags to indicate the start and end of the
message. The standards used at this layer must ensure that the control flags
are not mistaken for data and that the data frames are checked for errors.
An example is given in Figure 3 below.
Fig
ure 3 – Example of a data frame
25
1.4 OSI Layer 4 – The Transport Layer
The transport layer is the first layer that is not concerned with the mechanics of
the data transfer. It is concerned with managing and sequencing the packets once
they have arrived.
There is an array of transport layer protocols ranging from the very simple,
which simply accepts the data as it comes in, not caring about whether the
packets have errors nor even if they are in the right order, through to quite
complex protocols which check the data for errors, send out an
acknowledgement to the sending equipment, order the packets into the correct
sequence and present the data to the next layer guaranteed error-free and
correctly sequenced.
An example of a simple protocol is UDP (User Datagram Protocol). A more
sophisticated widely used transport layer protocol used is TCP (Transmission
Control Protocol).
Layer 4 functionality is achieved by the devices at either end of the transmission path,
the IED.
26
As the name implies, the presentation layer concerns itself with how the data is
presented. A good example of this is ASCII (American Standard Code for
Information Interchange).
An ASCII code is an 8-bit binary code, which defines the familiar character
set used to produce text. For example the character ‘A’ is defined by the binary
code 01000001, which is 41 hexadecimal or 65 decimal.
The presentation layer, if compliant with the ASCII format, can interpret this.
EIA 232
EIA 485
Ethernet
EIA (Electronic Industries Association) is a set of standards defined for
connecting electronic devices together. They were formerly known as the
recommended standards (RS) and often people will still refer to them as RS 232
and RS 485.
NOTE! Although, traditionally the standards were designed with metallic connections
between devices, more recent times have seen an increase in optical fibre as the
27
medium connecting networks and devices . Any of the physical layer and data link layer
protocols have now been modified to work over optical fibre as well.
EIA 232 was designed to allow computers to connect using Modems and is
suitable only for point-to-point connection. It uses switched single-sided 12V
(nominal) signals for data transmission as well as handshake signals to control
the communication.
If transmission over longer distances is required, some form of EIA 232 to fibre-
optic converter and a fibre-optic communications link should be used.
28
https://electrical-engineering-portal.com/digital-substation
Since EIA 232 provides only point to point connectivity it is not used in automation
29
Figure 4 – Multi-drop connection of RS485 devices
EIA 485 uses differential signalling on twisted pairs and can be isolated. The multi-
drop connection (sometimes called daisy-chaining) generally has a limit of 1km, and
although in theory the number of devices connected (nodes) is not limited, a practical
limit is normally 32 per bus, with repeaters being
used if further expansion is required.
Communication speeds of 64kbits per second (kbps) can be reliably achieved. EIA 485
allows relatively simple networks to be constructed very efficiently and cost
effectively.
2.1.3 Ethernet
Ethernet is a standard, which defines the connection of computing devices to local
area networks (LANs). As per IEEE 802.3, standard signalling speeds are 10Mbps,
100Mbps or 1Gbps. It is the most widespread LAN technology.
The specification allows connection to be made either electrically using an RJ45
connector, or by direct fibre-optic connection.
Ethernet over fibre-optic cables provide a mechanism for extremely high speed and
noise resistant communication, making it the ideal communication medium for the
substation.
30
commands in return. This tree-type structure typifies the kind of connection that the
point-to-point EIA 232 communications can bring.
Systems based on Ethernet technology provide more scope for different topologies by
An example of parallel communication is the LPT printer port that used to feature on
computers, printers, and office equipment before the widespread deployment
of Ethernet in the working environment.
EIA 232, EIA 485, and Ethernet are all forms of serial communication. The much
higher speed of Ethernet sets it apart from the others. As a consequence, in the
domain of substation automation, communications based on EIA 232 and EIA 485 tend
to be referred to as “serial” communications, with Ethernet being singled out for
separate attention.
This article adheres to that convention and continues with a discussion on “serial”
communications based on EIA 232 and EIA 485, later followed by Ethernet
communication.
https://youtu.be/cu8iFT7xARA
Put another way, for devices to be able to speak to each other, they need to share a
common language and rules of engagement.
31
When digital communication facilities were first added to computer based protection
devices, no standard protocol existed for this communication. Manufacturers developed
their own proprietary solutions to exploit the benefits of the communication interfaces.
An example of a proprietary protocol is the Courier protocol that was developed by
the former GEC Measurements (ex Alstom and now GE). A substation control system
is required to communicate with all the distributed functionality in the system. If
devices from different vendors are to be included in the system, then the different
protocols will need to be supported. This increases the system engineering work and
consequently the cost.
Consider a relatively simple system, with a bay controller connected to IEDs from
different manufacturers A, B, and C as depicted in Figure 5.
If the three products all contain key elements to implement the control system, then
either the bay controller would need to support three communications protocols (as
shown in the figure), or some form of protocol converter devices would need to be
included.
Either way, it can be seen that the use of different protocols increases the engineering
time, and the component costs associated with implementing the system. From the
systems’ engineering perspective, as well as the utilities’ perspective, the adoption of a
standard protocol by the manufacturers brings clear benefits.
Efforts were made to develop a standard solution and from the protocols
available, three open standards for IED serial communications emerged:
1. MODBUS
2. IEC 60870-5-103
32
3. DNP3
Modbus
Modbus was published in 1979 by Modicon. Originally designed for programmable
logic controllers of the time, it is a master-slave protocol that allows a master
to read or write bits in registers of the slave devices.
It can be implemented on simple serial connections (EIA 485), but has also been
migrated to Ethernet.
IEC 60870-5-103
IEC 60870-5-103 was developed by Technical Committee 57 of the International
Electro-technical Committee (IEC TC57). It is based on, and is a superset of, the
German VDEW communications standard.
DNP3
DNP3 was developed by Harris in the 1990s. It drew on early work of TC57 on the IEC
60870-5 (before it was standardised) to develop something with a specific focus on the
North American market that could be quickly implemented.
In general, the open standards of Modbus, IEC60870-5-103 and DNP3 cover layers 1-4
of the OSI model. They allow automation systems engineers to mix and match IEDs
from different manufacturers with the same protocol, satisfying the clients’ needs for
protection and control better than if a mix of proprietary protocols were used.
33
Figure – Example of Secure Authentication Challenge Reply Sequence DNP3 SA
Challenge Reply Sequence
Each of the protocols has particular advantages, but they all suffer disadvantages
too:
1. Although they are standard protocols, all have ambiguities that result in
different implementations in different IEDs.
2. The IED data model (i.e. the way the data representing the IED is structured
and presented over the communications link) varies between vendors, and
can sometimes vary between different versions of the same IED from the
same vendor.
3. Different functionalities are supported by the different protocols, and
different IED vendors may support different levels of those functionalities.
4. The provision of private codes in the IEC 60870-5-103 protocol permits
much greater functionality, but at the same time hinders interoperability of
equipment from different vendors because there is no need for the format of
such messages to be made public. In effect, the use of ‘private’ messages by
vendors of devices essentially turns the standard into several
proprietary ones.
Due to continuing developments in the fields of computing and communications, there
is a need for a truly open communications architecture allowing ‘plug-and-
play’ connectivity between devices from different manufacturers for effective, efficient
substation automation.
34
At the physical layer the specification allows connection to be made either electrically
using an RJ45 connector, or by direct fibre-optic connection using LC or ST
(otherwise known as BFOC2.5) type connectors.
Standard signalling speeds for Ethernet communications are 10Mbps, 100Mbps,
1Gbps and 10Gbps.
At the data link layer (layer 2 of the OSI model), MAC (Media Access Control)
addresses take care of the physical addressing of devices on a network. These physical
addresses are set in the manufacturing process. MAC uses a 48 bit addressing scheme
allowing a unique address for every piece of equipment manufactured.
The most commonly used network protocol (layer 3 of the OSI model) is the Internet
Protocol (IP), and the most commonly used transport layer mechanism (OSI layer 4) is
the Transmission Control Protocol (TCP). Often these are put together as ‘TCP/IP’
and are synonymous with Ethernet and the internet.
https://youtu.be/xrkusLDQ8pw
At the network layer, IP is used to transfer packets of data on the network and across
network boundaries from the source to the destination.
To do this, devices are assigned IP addresses and these addresses have two
purposes:
The first is to identify the host network (which may be subdivided into subnetworks),
whilst the second is to identify the device on the network or sub-network (subnet). The
IP address is a 32 bit binary number, which can be written in the
form nnn.nnn.nnn.nnn, where nnn represents a binary octet, and is an integer value
between 0 and 255.
A typical IP address is, therefore, 192.168.0.2. Each device on the network will have an
IP address that is unique and may be configured by a network server, a system
administrator, or by an address auto-configuration.
The most significant bits of the address are used for network identification and are
known as the routing prefix. The least significant bits are known as the rest
field and provide unique identification of the device on the local network to which it is
connected.
Typically the two most significant octets identify the network. The two least significant
octets are used for device identification, but can also be used to create subnets. A so
called subnet mask is then used to identify the subnet address.
For example if the third octet were used as a subnet identifier, then performing a logical
AND between the IP address and 255.255.255.0 (the subnet mask) would identify that,
in the case above, the subnet address is 192.168.0.0 and the device is at address 2 on
that subnet. When a packet of data is placed on the IP network, it is sent to its
destination network by means of routers, switches and hubs.
35
4.5 IEC 61850
In the early 1990s the Electric Power Research Institute (EPRI) in the US started work
on a Utility Communications Architecture (UCA). The goal was to produce industry
consensus regarding substation integrated control, protection, and data acquisition, to
allow interoperability of substation devices from different manufacturers.
The work developed to produce UCA2 which showed that true interoperability
was possible. UCA2 was taken forward by IEC TC57 to produce the standard
IEC61850 that revolutionises substation automation.
https://youtu.be/ahd0V8qwbPY
36
6. Standardised substation configuration language (SCL): SCL enables the
configuration of a device and its role in the power system to be precisely
defined using extensible mark-up language (XML) files.
The major benefits of the standard are as follows:
1. Eliminates procurement ambiguity: As well as for configuration purposes,
SCL can be used to precisely define user requirements for substations and
devices.
2. Lower installation cost: IEC 61850 enables devices to exchange data using
GOOSE over the station LAN without having to wire separate links for each
IED.
4.5.6 IEC61850-9.2
37
In IEC61850-9.2, the wiring that traditionally connected transformers and switchgear to
protection control and monitoring devices is replaced by a process bus, where
the process bus is a high-speed Ethernet communications network.
Merging units form the data acquisition layer in the network and present sampled
measured values to IEDs via the process bus.
The interface of the merging unit with the primary plant may either be in the form of
conventional transformers, or with non-conventional instrument transformers (NCIT),
but the output is the same: time-stamped sampled measured values.
The use of the IEC 61850-9.2 process bus introduces a number of opportunities for
lifecycle cost reduction. This lifecycle cost comprises configuration, installation
and commissioning costs, plus costs beyond commissioning.
These later-life costs include any need for extension, upgrade or retrofitting, and also
any periodic maintenance.
https://youtu.be/E66oxWosK6o
4.6 Conclusion
IEC61850-9.2, and IEC61850 in general are at the heart of the digital
substation. Together they have revolutionised substation engineering.
This article has aimed to equip engineers with an understanding of the terminology
and concepts in order to be able to function in this new world focused on Ethernet
communication technology.
38