Method of operation a differential protection scheme
10749335 ยท 2020-08-18
Assignee
Inventors
Cpc classification
H02J13/00006
ELECTRICITY
H04J3/0641
ELECTRICITY
H02J13/00
ELECTRICITY
H04J3/0638
ELECTRICITY
H02H7/261
ELECTRICITY
H02H3/28
ELECTRICITY
Y02E60/00
GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
Y04S40/12
GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
International classification
H02H7/26
ELECTRICITY
H02J13/00
ELECTRICITY
H02H3/28
ELECTRICITY
Abstract
There is provided a method of operating a reconfigurable differential protection scheme for carrying out differential protection of an electrical power network, the electrical power network comprising terminals, each of the terminals configured to be in communication with each other within a communications network. The method includes controlling the differential protection scheme to deactivate the differential protection, and selecting a terminal to be configured out of or into the differential protection scheme. The method also includes communicating reconfiguration information among the terminals, the reconfiguration information including the selection of the terminal to be configured out of or into the differential protection scheme. The method also includes modifying a respective differential protection algorithm at each of the non-selected terminals so as to configure the selected terminal out of or into the differential protection scheme, and controlling the differential protection scheme to reactivate the differential protection.
Claims
1. A method of operating a reconfigurable differential protection scheme for carrying out differential protection of an electrical power network, the electrical power network comprising a plurality of terminals, each of the plurality of terminals configured to be in communication with each other of the plurality of terminals within a communications network, the method comprising: controlling the differential protection scheme to deactivate the differential protection; selecting a terminal of the plurality of terminals to be configured out of or into the differential protection scheme; communicating reconfiguration information among the plurality of terminals via the communications network, the reconfiguration information including the selection of the terminal to be configured out of or into the differential protection scheme, wherein the communications network is any one of: a daisy-chain communications network; a ring communications network; a meshed communications network; a star communications network; a bus communications network; a tree communications network; or a hybrid thereof; after communicating the reconfiguration information among the plurality of terminals, modifying a respective differential protection algorithm at each of the non-selected terminals so as to configure the selected terminal out of or into the differential protection scheme; and controlling the differential protection scheme to reactivate the differential protection.
2. The method according to claim 1, when the terminal is selected to be configured out of the differential protection scheme, the method further including enabling an interlock on the selected terminal, wherein the interlock when disabled inhibits the configuration of the selected terminal out of the differential protection scheme, and the interlock when enabled permits the configuration of the selected terminal out of the differential protection scheme.
3. The method according to claim 1, further including confirming that the status of the communication of each of the plurality of terminals with each other of the plurality of terminals is healthy prior to the step of communicating reconfiguration information among the plurality of terminals via the communications network.
4. The method according to claim 1, when the terminal of the plurality of terminals is selected to be configured into the differential protection scheme, the method further including the step of confirming that the selected terminal is configured out of the differential protection scheme prior to the step of communicating reconfiguration information among the plurality of terminals via the communications network.
5. The method according to claim 1 further including the step of confirming that the reconfiguration information has been communicated among the plurality of terminals within a preset time prior to modifying a respective differential protection algorithm at each of the non-selected terminals so as to configure the selected terminal out of or into the differential protection scheme.
6. The method according to claim 1, further including confirming that the reconfigured differential protection scheme has stabilised subsequent to modifying a respective differential protection algorithm at each of the non-selected terminals of the plurality of terminals so as to configure the selected terminal out of or into the differential protection scheme.
7. The method according to claim 1, when the terminal of the plurality of terminals is selected to be configured out of the differential protection scheme, the method further including deactivating the selected terminal and/or inhibiting communication to the selected terminal subsequent to the modification of the respective differential protection algorithm so as to configure the selected terminal out of the differential protection scheme.
8. The method according to claim 1, when a terminal is selected to be configured into the differential protection scheme, the method further including modifying a differential protection algorithm at the selected terminal so as to configure the selected terminal into the differential protection scheme.
9. The method according to claim 1, wherein one of the plurality of terminals has failed, the method further including: replacing the failed terminal with a substitute terminal; configuring each of the remaining terminals to be in communication with the substitute terminal within the communications network; communicating the reconfiguration information to the substitute terminal via the communications network; and after communicating the reconfiguration information to the substitute terminal, modifying the differential protection algorithm at the substitute terminal so as to configure the selected terminal out of or into the differential protection scheme.
10. An electrical power network comprising a plurality of terminals, each of the plurality of terminals configured to be in communication with each other of the plurality of terminals within a communications network, the electrical power network further including a reconfigurable differential protection scheme for carrying out differential protection of the electrical power network, the differential protection scheme configured to: control the differential protection scheme to deactivate the differential protection; select a terminal of the plurality of terminals to be configured out of or into the differential protection scheme; communicate reconfiguration information among the plurality of terminals via the communications network, the reconfiguration information including the selection of the terminal to be configured out of or into the differential protection scheme, wherein the communications network is any one of: a daisy-chain communications network; a ring communications network; a meshed communications network; a star communications network; a bus communications network; a tree communications network; or a hybrid thereof; after communicating the reconfiguration information among the plurality of terminals, modify a respective differential protection algorithm at each of the non-selected terminals so as to configure the selected terminal out of or into the differential protection scheme; and control the differential protection scheme to reactivate the differential protection.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) Embodiments of the invention will now be described, by way of non-limiting examples, with reference to the accompanying drawings in which:
(2)
(3)
(4)
(5)
DETAILED DESCRIPTION
(6) An exemplary electrical power network is shown in Figure Land is designated generally by reference numeral 10.
(7) The electrical power network 10 includes first, second, third and fourth terminals 12, 14, 16 and 18 that are interconnected by a portion of transmission medium 20 which, in the example shown is an overhead transmission line. In other arrangements of the electrical power network (not shown) the transmission medium 20 may be an underground transmission cable.
(8) Each terminal 12, 14, 16, 18 includes a differential protection element (not shown) which may, for example, be a circuit breaker. Each terminal 12, 14, 16, 18 also includes a control unit 22 which may take the form of, e.g. a programmable microcontroller or an intelligent electronic device. Each control unit 22 controls operation of the corresponding differential protection element, and the terminals via their control units 22 are arranged to communicate with one another via communications links 24 arranged to form a ring communications network. The terminals 12, 14, 16, 18 (in particular their respective differential protection elements and control units 22) form part of a multi-ended differential protection scheme for carrying out differential protection of the electrical power network 10.
(9) In the electrical power network 10, the terminals 12, 14, 16, 18 are associated with respective terminal addresses A, B, C, D. The provision of the ring communications network to link the control units 22 of terminals 12, 14, 16, 18 means that the terminals 12, 14, 16, 18 communicate with each other in the address order A-B-C-D-A. That is to say, as shown in
(10) The topology of the ring communications network also permits indirect communication between terminals 12, 14, 16, 18 that are not directly linked to each other. That is to say, the terminals 12 and 16 communicate with each other via the terminals 14 and 18, and the terminals 14 and 18 communicate with each other via the terminals 12 and 16.
(11) The basic principle of current differential protection is based on a calculation of a difference between the currents entering and leaving a protected zone. Tripping of a local differential protection element (e.g. circuit breaker) is carried out when the difference exceeds a set trip threshold. In addition to tripping the local differential protection element, a local terminal sends an intertrip signal to the remote terminals to ensure tripping at all ends of the protected zone. Each terminal 12, 14, 16, 18 operates in accordance with a differential protection algorithm, which is stored locally in the corresponding control unit 22, in order to perform its role in the differential protection scheme. The differential protection algorithm at each terminal 12, 14, 16, 18 is devised to take into account all of the terminals 12, 14, 16, 18 in the differential protection scheme.
(12) There may be a need to reconfigure the differential protection scheme under certain circumstances. Reconfiguration of the differential protection scheme involves configuring a selected terminal out of or into the differential protection scheme. A selected terminal may be required to be configured out of the differential protection scheme due to, for example, failure of the selected terminal or the need to perform maintenance on the selected terminal, while a selected terminal may be required to be configured into the differential protection scheme due to, for example, restoration of the selected terminal to a normal operating state.
(13) Configuring a selected terminal out of the differential protection scheme out requires the differential protection algorithm at each remaining terminal to be adapted to take into account the remaining terminals in the differential protection scheme but ignore the configured-out terminal. Configuring a selected terminal into the differential protection scheme out requires the differential protection algorithm at each remaining terminal to be adapted to take into account all of the terminals in the differential protection scheme, including the newly configured-in terminal.
(14) A method according to a first embodiment of the invention reconfigures the differential protection scheme by configuring a selected terminal out of or into the differential protection scheme.
(15) Control data is saved locally in the control unit 22 of each terminal 12, 14, 16, 18. The method of the first embodiment of the invention involves the transmission of the control data in an identical message among the terminals 12, 14, 16, 18 via the ring communications network, which permits the reconfiguration of the differential protection scheme to be carried out by accessing the control unit 22 of a local terminal. For ease of reference, the local terminal is referred to hereon as a master terminal, while the other terminals are referred to hereon as slave terminals.
(16) In the method according to the first embodiment of the invention, the terminal 12 is designated as the master terminal, while the other terminals 14, 16 and 18 are designated as slave terminals. It will be appreciated that any of the plurality of terminals 12, 14, 16, 18 may be designated as the master terminal.
(17) In the embodiment shown, the message is in the form of one byte of information, but it will be appreciated that the message may take other forms.
(18) The first three bits in the control data define reconfiguration information, which includes an encoded terminal address A, B, C, D of the selected terminal to be configured out of or into the scheme, as follows:
(19) 0.sup.th, 1.sup.st and 2.sup.nd bits: (0, 0, 1)terminal 12 selected;
(20) 0.sup.th, 1.sup.st and 2.sup.nd bits: (0, 1, 0)terminal 14 selected;
(21) 0.sup.th, 1.sup.st and 2.sup.nd bits: 1, 1)terminal 16 selected; and
(22) 0.sup.th, 1.sup.st and 2.sup.nd bits: (1, 0, 0)terminal 18 selected.
(23) For the purposes of illustrating the working of the method according to the first embodiment of the invention, the terminal 14 is designated as the selected terminal, but it will be appreciated that the method according to the first embodiment of the invention applies mutatis mutandis to any of the other terminals 12, 16, 18 as the selected terminal.
(24) Encoding the 0.sup.th, 1.sup.st and 2.sup.nd bits as (0, 0, 0) indicates that the reconfiguration of the differential protection scheme is disabled, while the remaining possible combinations of the 0.sup.th, 1.sup.st and 2.sup.nd bits are unused and can be reserved for future use, e.g. if the method is applied to the electrical power network 10 with more than four terminals.
(25) The 3.sup.rd and 4.sup.th bits in the control data are used as flags for the configuration state of the differential protection scheme, as follows:
(26) 3.sup.rd and 4.sup.th bits: (0, 0)stable scheme with all terminals restored state;
(27) 3.sup.rd and 4.sup.th bits: (0, 1)terminal configure-out command;
(28) 3.sup.rd and 4.sup.th bits: (1, 0)terminal configure-in command; and
(29) 3.sup.rd and 4.sup.th bits: (1, 1)stable scheme with one terminal configured out state.
(30) The 5.sup.th bit is used to indicate the deactivation of the differential protection, and is set to 1 for true and 0 for false. The 6.sup.th bit is used to indicate the enablement of an interlock associated with the selected terminal 14, and is set to 1 for true and 0 for false. The 7.sup.th bit is unused and can be reserved for future use.
(31) The default states of the control data in the transmitted message will be as follows: the reconfiguration information will be set to (0, 0, 0) to indicate that the reconfiguration of the differential protection scheme is disabled;
(32) the 3.sup.rd and 4.sup.th bits for the configuration state of the differential protection scheme will be set to (0, 0) to indicate a stable scheme with all terminals restored state;
(33) the 5.sup.th bit for the differential protection deactivation flag will be set to false;
(34) the 6.sup.th bit for the interlock flag will be set to false.
(35) The following steps apply to the method of the first embodiment of the invention when the differential protection scheme is reconfigured by configuring a selected terminal 14 out of the differential protection scheme, with reference to
(36) Initially the control units 22 are operated to deactivate the differential protection. The deactivation may be carried out through binary input or control communications.
(37) A terminal 14 is then selected to be configured out of the differential protection scheme. The control unit 22 of the master terminal 12 will display a setting/command cell (which is also available on the controls units of the other terminals 14, 16, 18) which will allow the user to select which terminal is be configured out of the differential protection scheme. The reconfiguration information is then altered to include the encoded terminal address B of the selected terminal 14 for configuration out of the differential protection scheme.
(38) If there is any alarm set to indicate that a previous reconfiguration was successful or has failed, the alarm is cleared.
(39) A check is carried out to confirm that the differential protection has been deactivated throughout the differential protection scheme. If the differential protection is not deactivated throughout the differential protection scheme, the reconfiguration is deemed to have failed and a corresponding alarm is activated.
(40) If the differential protection is deactivated throughout the differential protection scheme, an interlock on the selected terminal 14 is enabled by using an optical isolated input. The interlock when disabled inhibits the configuration of the selected terminal 14 out of the differential protection scheme, and when enabled permits the configuration of the selected terminal 14 out of the differential protection scheme. Failure to enable the interlock on the selected terminal 14 will result in the reconfiguration being deemed to have failed and a corresponding alarm being activated.
(41) The operation of the interlock is linked to the status of the corresponding differential protection element. When a differential protection element is opened, the corresponding interlock can be safely enabled. When a differential protection element is closed, the corresponding interlock is disabled. The link between the operation of the interlock and the status of the corresponding differential protection element provides a safety mechanism that prevents the configuration of a live terminal out of the differential protection scheme.
(42) Following enablement of the interlock on the selected terminal 14, the master terminal 12 checks to confirm that the status of the communication of each of the plurality of terminals 12, 14, 16, 18 with each other of the plurality of terminals 12, 14, 16, 18 is healthy, i.e. communication throughout the ring communications network is healthy. Thereafter, the master terminal 12 checks to confirm that there are at least 3 terminals 12, 14, 16, 18 presently configured in the differential protection scheme. If either the communication throughout the ring communications network is healthy or there are two or fewer terminals presently configured in the differential protection scheme, the reconfiguration is deemed to have failed and a corresponding alarm is activated.
(43) After confirming that the communication throughout the ring communications network is healthy and there are at least 3 terminals presently configured in the differential protection scheme, the reconfiguration information and a terminal configure-out command is then communicated to the slave terminals 14, 16, 18.
(44) The master terminal 12 then waits for confirmation that the terminal configure-out command has been communicated to the slave terminals 14, 16, 18 within a preset time, e.g. 500 ms to 1 s. Meanwhile, with the saved configuration state at each slave terminal 14, 16, 18 being set as (0, 0), the receipt of the terminal configure-out command initiates the local saving of the reconfiguration information and the terminal configure-out command in the control unit 22 of each slave terminal 14, 16, 18. The control unit 22 of each slave terminal 14, 16, 18 then echoes the saved terminal configure-out command in the 3.sup.rd and 4.sup.th bits in the control data in the transmitted message.
(45) If the confirmation is not received by the master terminal 12 in time, the reconfiguration is deemed to have failed and a corresponding alarm is activated.
(46) If the confirmation is received by the master terminal 12 in time, the reconfiguration information and the terminal configure-out command is saved in the control unit 22 of the master terminal 12.
(47) This is followed by modification of the differential protection algorithm at the master terminal 12 to configure the selected terminal 14 out of the differential protection scheme, and the communication of a stable scheme with one terminal configured out state from the master terminal 12 to the slave terminals 14, 16, 18. The master terminal 12 then waits for confirmation that the stable scheme with one terminal configured out state has been communicated to the slave terminals 14, 16, 18 within a preset time, e.g. 500 ms to 1 s.
(48) With the saved configuration state at each slave terminal 14, 16, 18 presently being set as (0, 1), the receipt of the stable scheme with one terminal configured out state initiates the local saving of the reconfiguration information and the stable scheme with one terminal configured out state in the control unit 22 of each slave terminal 14, 16, 18. Receipt of the stable scheme with one terminal configured out state also triggers a check to ensure that the reconfiguration information is not set at (0, 0, 0) to indicate that the reconfiguration of the differential protection scheme is disabled. If the reconfiguration information is set at (0, 0, 0), then the local saving is inhibited.
(49) Following initiation of the local saving, the differential protection algorithm at the terminals 16, 18 are then adapted to configure the selected terminal 14 out of the differential protection scheme. No change is made to the differential protection algorithm at the selected terminal 14, since the configured-out terminal 14 does not play a role in the differential protection of the electrical power network and therefore does not require its differential protection algorithm to be updated.
(50) Thereafter, communication between the terminal 16 and the configured-out terminal 14 is inhibited, the corresponding alarm indicating failure of communication to the configured-out terminal 14 is suppressed, and then the control unit 22 of each slave terminal 14, 16, 18 then echoes the stable scheme with one terminal configured out state in the 3.sup.rd and 4.sup.th bits in the control data in the transmitted message.
(51) If the confirmation is not received by the master terminal 12 in time, the reconfiguration is deemed to have failed and a corresponding alarm is activated.
(52) If the confirmation is received by the master terminal 12 in time, the differential protection scheme is confirmed to have stabilised. Communication between the configured-out terminal 14 and the master terminal 12 is inhibited, and the corresponding alarm indicating failure of communication to the configured-out terminal 14 is suppressed. Finally a message confirming the successful reconfiguration of the differential protection scheme is issued.
(53) At this stage, the configured-out terminal 14 is deactivated, the interlock on the configured-out terminal 14 is disabled, and the control units 22 of the terminals 12, 16, 18 are operated to reactivate the differential protection throughout the differential protection scheme.
(54) The following steps apply to the method of the first embodiment of the invention when the differential protection scheme is reconfigured by configuring a selected terminal 14 into the differential protection scheme, with reference to
(55) Initially the control units 22 are operated to deactivate the differential protection. The deactivation may be carried out through binary input or control communications.
(56) A terminal 14 is then selected to be configured into the differential protection scheme. The control unit 22 of the master terminal 12 will display a setting/command cell (which is also available on the controls units of the other terminals 14, 16, 18) which will allow the user to select which terminal is be configured into the differential protection scheme. The reconfiguration information is then altered to include the encoded terminal address B of the selected terminal 14 for configuration into the differential protection scheme.
(57) If there is any alarm set to indicate that a previous reconfiguration was successful or has failed, the alarm is cleared.
(58) A check is carried out to confirm that a terminal 14 is configured out of the differential protection scheme. If the check returns a negative result, the reconfiguration is deemed to have failed and a corresponding alarm is activated.
(59) If the check returns a positive result, another check is carried out to confirm that the differential protection has been deactivated throughout the differential protection scheme. If the differential protection is not deactivated throughout the differential protection scheme, the reconfiguration is deemed to have failed and a corresponding alarm is activated.
(60) If the differential protection is deactivated throughout the differential protection scheme, the master terminal 12 checks to confirm that the status of the communication of each of the plurality of terminals 12, 14, 16, 18 with each other of the plurality of terminals 12, 14, 16, 18 is healthy, i.e. communication throughout the ring communications network is healthy. Thereafter, the master terminal 12 checks to confirm that the saved configuration state in the control unit 22 of the master terminal 12 is the stable scheme with one terminal configured out state. If either the communication throughout the ring communications network is healthy or the saved configuration state in the control unit 22 of the master terminal 12 is not the stable scheme with one terminal configured out state, the reconfiguration is deemed to have failed and a corresponding alarm is activated.
(61) After confirming that the communication throughout the ring communications network is healthy and the saved configuration state in the control unit 22 of the master terminal 12 is the stable scheme with one terminal configured out state, the reconfiguration information and a terminal configure-in command is then communicated to the slave terminals 14, 16, 18.
(62) The master terminal 12 then waits for confirmation that the terminal configure-in command has been communicated to the slave terminals 14, 16, 18 within a preset time, e.g. 500 ms to 1 s. Meanwhile, with the saved configuration state at each slave terminal 14, 16, 18 being set as (1, 1), the receipt of the terminal configure-in command initiates the local saving of the reconfiguration information and the terminal configure-in command in the control unit 22 of each slave terminal 14, 16, 18. The control unit 22 of each slave terminal 14, 16, 18 then echoes the saved terminal configure-in command in the 3.sup.rd and 4.sup.th bits in the control data in the transmitted message.
(63) If the confirmation is not received by the master terminal 12 in time, the reconfiguration is deemed to have failed and a corresponding alarm is activated.
(64) If the confirmation is received by the master terminal 12 in time, the reconfiguration information and the terminal configure-in command is saved in the control unit 22 of the master terminal 12.
(65) This is followed by modification of the differential protection algorithm at the master terminal 12 to configure the selected terminal 14 into the differential protection scheme, and the communication of a stable scheme with all terminals restored state from the master terminal 12 to the slave terminals 14, 16, 18. The master terminal 12 then waits for confirmation that the stable scheme with all terminals restored state has been communicated to the slave terminals 14, 16, 18 within a preset time, e.g. 500 ms to 1 s.
(66) With the saved configuration state at each slave terminal 14, 16, 18 presently being set as (1, 0), the receipt of the stable scheme with all terminals restored state initiates the local saving of the reconfiguration information and the stable scheme with all terminals restored state in the control unit 22 of each slave terminal 14, 16, 18. The differential protection algorithm at the terminals 16, 18 are then adapted to configure the selected terminal 14 into the differential protection scheme. No change is made to the differential protection algorithm at the selected terminal 14, which was not previously altered. However, if necessary, a step of modifying the differential protection algorithm at the selected terminal 14 so as to configure the selected terminal 14 into the differential protection scheme may be taken if the differential protection algorithm needs to be updated or was previously altered.
(67) Thereafter, communication between the terminal 16 and the configured-in terminal 14 is restored, the corresponding alarm indicating failure of communication to the configured-in terminal 14 is restored, and then the control unit 22 of each slave terminal 14, 16, 18 then echoes the stable scheme with all terminals restored state in the 3.sup.rd and 4.sup.th bits in the control data in the transmitted message.
(68) If the confirmation is not received by the master terminal 12 in time, the reconfiguration is deemed to have failed and a corresponding alarm is activated.
(69) If the confirmation is received by the master terminal 12 in time, the differential protection scheme is confirmed to have stabilised. Communication between the configured-in terminal 14 and the master terminal 12 is restored, and the corresponding alarm indicating failure of communication to the configured-in terminal 14 is restored. Finally a message confirming the successful reconfiguration of the differential protection scheme is issued.
(70) At this stage, the configured-in terminal 14 is reactivated, and the control units 22 of the terminals 12, 14, 16, 18 are operated to reactivate the differential protection throughout the differential protection scheme.
(71) It can be seen from the foregoing that the provision of a ring communications network to communicate the reconfiguration information among the plurality of terminals renders the method of the invention readily scalable to accommodate any number of terminals in the electrical power network, while at the same time obviating the need for any substantial redesign in terms of communications protocol and hardware, and renders it practical to employ a reconfigurable differential protection scheme based on a ring communications network in an electrical power network with more than 3 terminals.
(72) It is envisaged that, in other embodiments of the invention, the ring communications network may be replaced by or combined with any one of: a daisy-chain communications network; a meshed communications network; a star communications network; a bus communications network; a tree communications network; or a hybrid thereof, while maintaining the aforementioned advantages associated with the use of the ring communications network.
(73) A method according to a second embodiment of the invention reconfigures the differential protection scheme by configuring a selected terminal out of the differential protection scheme, with the addition of steps of replacing a failed terminal being replaced by a substitute terminal.
(74) For the purposes of illustrating the working of the method according to the second embodiment of the invention, the terminal 16 is designated as the failed terminal to be replaced, but it will be appreciated that the method according to the first embodiment of the invention applies mutatis mutandis to any of the other terminals 12, 14, 18 as the failed terminal to be replaced.
(75) The functions of the master terminal 12 and the slave terminals 14, 18 in the method according to the second embodiment of the invention are identical to the functions of their counterparts in the method according to the first embodiment of the invention, with reference to
(76) The additional steps of replacing a failed terminal being replaced by a substitute terminal are described as follows, with reference to
(77) Initially the control data saved in the control unit 22 of the terminal 16 is uploaded to the control unit 22 of the substitute terminal. The substitute terminal is assigned a terminal address C, a first communications channel of the terminal 14 is directly connected to a second communications channel of the substitute terminal to link the corresponding control units 22, and a first communications channel of the substitute terminal is directly connected to a second communications channel of the terminal 18 to link the corresponding control units 22.
(78) The substitute terminal will initially transmit the default states of the control data. At this stage no action is taken by the substitute terminal to configure the selected terminal 14 out of the differential protection scheme. This is due to the combination of the reconfiguration information being set to indicate that the reconfiguration of the differential protection scheme is disabled, the saved configuration state at the substitute terminal being set to indicate a stable scheme with one terminal configured out state, and a received configuration state set to indicate a stable state with all terminals restored state.
(79) After the substitute terminal receives the terminal configure-out command from the master terminal 12, the reconfiguration information and the terminal configure-out command is locally saved in the control unit 22 of the substitute terminal. This is followed by the communication of a stable scheme with one terminal configured out state from the master terminal 12 to the substitute terminal. With the saved configuration state at each slave terminal 14, 18 presently being set as (0, 1), the receipt of the stable scheme with one terminal configured out state initiates the local saving of the reconfiguration information and the stable scheme with one terminal configured out state in the control unit 22 of each slave terminal 14, 18. Receipt of the stable scheme with one terminal configured out state also triggers a check to ensure that the reconfiguration information is not set at (0, 0, 0) to indicate that the reconfiguration of the differential protection scheme is disabled. If the reconfiguration information is set at (0, 0, 0), then the local saving is inhibited.
(80) Following initiation of the local saving, the differential protection algorithm at the substitute terminal is then adapted to configure the selected terminal 14 out of the differential protection scheme. Thereafter, communication between the substitute terminal and the configured-out terminal 14 is inhibited, the corresponding alarm indicating failure of communication to the configured-out terminal 14 is suppressed, and then the control unit 22 of the substitute terminal then echoes the stable scheme with one terminal configured out state in the 3.sup.rd and 4.sup.th bits in the control data in the transmitted message.
(81) In this way reconfiguration of the differential protection scheme can still take place in the event of failure of one of the plurality of terminals 12, 14, 16, 18 of the electrical power network.
(82) It will be appreciated that the method according to the second embodiment of the invention apply mutatis mutandis to the reconfiguration of the differential protection scheme to configure a selected terminal into the differential protection scheme.
(83) It will be understood that the topology of the electrical power network of the above-described specific embodiment of the invention is merely chosen as a non-limiting example to describe the principle of the invention and that the electrical power network may include a different number of terminals, e.g. 3, 5, 6 or higher.
(84) It will also be understood that the sequence of steps of the method of the above-described and other embodiments of the invention is not fixed as described above. More particularly, it will be appreciated that some steps can be carried out in parallel or in reverse sequence if the steps are not required to be performed in a specific order.