IEEE P1777/D1, February 2007 IEEE P1777™/D1 Draft Recommended Practice for Using Wireless Data Communications in Power System Operations Prepared by the <Working Group Name> Working Group of the <Committee Name> Committee Copyright © 2007 by the Institute of Electrical and Electronics Engineers, Inc. Three Park Avenue New York, New York 10016-5997, USA All rights reserved. This document is an unapproved draft of a proposed IEEE Standard. As such, this document is subject to change. USE AT YOUR OWN RISK! Because this is an unapproved draft, this document must not be utilized for any conformance/compliance purposes. Permission is hereby granted for IEEE Standards Committee participants to reproduce this document for purposes of IEEE standardization activities only. Prior to submitting this document to another standards development organization for standardization activities, permission must first be obtained from the Manager, Standards Licensing and Contracts, IEEE Standards Activities Department. Other entities seeking permission to reproduce this document, in whole or in part, must obtain permission from the Manager, Standards Licensing and Contracts, IEEE Standards Activities Department. IEEE Standards Activities Department Standards Licensing and Contracts 445 Hoes Lane, P.O. Box 1331 Piscataway, NJ 08855-1331, USA Copyright © 2007 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. IEEE 1777/D1, February 2007 Abstract: <Select this text and type or paste Abstract—contents of the Scope may be used> Keywords: <Select this text and type or paste keywords> Copyright © 2007 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. ii IEEE 1777/D1, February 2007 Introduction (This introduction is not part of IEEE P1777/D1, Draft Recommended Practice for Using Wireless Data Communications in Power System Operations.) <Select this text and type or paste introduction text> Patents Attention is called to the possibility that implementation of this recommended practice may require use of subject matter covered by patent rights. By publication of this recommended practice, no position is taken with respect to the existence or validity of any patent rights in connection therewith. The IEEE shall not be responsible for identifying patents or patent applications for which a license may be required to implement an IEEE standard or for conducting inquiries into the legal validity or scope of those patents that are brought to its attention. Participants At the time this draft recommended practice was completed, the <Working Group Name> Working Group had the following membership: Frances Celeveland and Marc Lacroix, Chair <Vice-chair Name>, Vice-chair Participant1 Participant2 Participant3 Participant4 Participant5 Participant6 Participant7 Participant8 Participant9 The following members of the balloting committee voted on this recommended practice. Balloters may have voted for approval, disapproval, or abstention. (to be supplied by IEEE) Copyright © 2007 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. iii IEEE P1777/D1, May 2007 CONTENTS 1. Introduction ................................................................................................................................................ 1 1.1 Scope ................................................................................................................................................... 1 1.2 Purpose ................................................................................................................................................ 1 1.3 Background .......................................................................................................................................... 2 2. Description of wireless technologies and architecture................................................................................ 3 2.1 WiFi – IEEE 802.11: ........................................................................................................................... 3 2.2 Bluetooth™ – IEEE 802.15.1: ............................................................................................................. 3 2.3 Zigbee – IEEE 802.15.4: ..................................................................................................................... 3 2.4 WiMax – IEEE 802.16: ....................................................................................................................... 3 2.5 Cellphone – Group Spéciale Mobile (GSM): ...................................................................................... 4 2.6 Older wireless systems: ....................................................................................................................... 4 3. Expected benefits from the use of wireless communications ..................................................................... 5 3.1 Comparison of wired and wireless benefits ......................................................................................... 5 3.2 Cost benefits ........................................................................................................................................ 5 3.3 Benefits of intrinsic wireless characteristics ........................................................................................ 5 3.4 Installation and maintenance benefits .................................................................................................. 6 3.5 Mobility benefits.................................................................................................................................. 6 4. Possible concerns about using wireless communications ........................................................................... 7 4.1 Comparison of wired and wireless concerns ....................................................................................... 7 4.1.1 Common reliability and security concerns for wired media and wireless media ......................... 7 4.1.2 Reliability and security concerns that are more of an issue for wired systems ............................ 7 4.1.3 Reliability and security concerns that are more of an issue for wireless systems ........................ 8 4.2 Concerns about WiFi technologies ...................................................................................................... 8 4.3 Concerns about Bluetooth technologies............................................................................................... 8 4.4 Concerns about Zigbee networks ......................................................................................................... 9 4.5 Concerns about WiMax (IEEE 802.16) wireless technologies ............................................................ 9 4.6 Concerns about cellphone/GPRS wireless technologies ...................................................................... 9 5. Description of applications that can benefit from wireless technologies ...................................................10 5.1 Communication issues covered for each application ..........................................................................10 5.1.1 What wireless technology (one or more) might you, or did you, use? ........................................10 5.1.2 What communication configuration (one or more) might you, or did you, use? ........................10 5.1.3 Identify any specific wireless configuration issues of concern? .................................................11 5.1.4 What are the power supply requirements for the wireless devices? ............................................11 5.1.5 What is the typical periodicity of data transmitted? ....................................................................11 5.1.6 Is data (also) transmitted upon event? .........................................................................................11 5.1.7 What is the time sensitivity (maximum latency) of the data being transmitted? .........................12 5.1.8 What amount of data traffic is transmitted per end node (e.g. per sensor)? ................................12 5.1.9 What are the availability requirements? ......................................................................................12 5.1.10 What are the security requirements? .........................................................................................12 5.1.11 What data protocol (one or more) is (will be) used over the wireless portion of the system? ..12 5.2 Condition monitoring within substations, generating plants, and other electrical sites ......................13 5.3 SCADA monitoring and control from substations, generating plants, etc. to control center ..............13 5.4 Condition monitoring along transmission and feeder circuits ............................................................13 5.5 Local communications between feeder equipment such as automated switching ..............................13 Copyright © 2007 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. iv IEEE P1777/D1, May 2007 5.5.1 Control of load tap changing transformers in paralleling applications – Jim Harlow .................13 5.6 SCADA monitoring and control of equipment on feeder circuits ......................................................13 5.7 Maintenance monitoring and assessment of primary and secondary equipment in substations, plants, along T&D circuits, in vaults, and at customer sites ................................................................................13 5.8 Engineering interactions to determine status, update settings, acquire archival information .............13 5.9 Mobile data communications for data acquisition and control from outside substation or vault sites 13 5.10 Temporary installations for construction, calibration, repairing power systems, testing systems, or upgrading primary or secondary equipment .............................................................................................14 5.11 Emergency applications to restore failed or inadequate communications ........................................14 5.12 Metering, outage detection, connect/disconnect at customer sites ...................................................14 5.13 Distance protective relaying .............................................................................................................14 5.14 Substation protective relaying ..........................................................................................................14 6. Description of new capabilities which might become feasible if wireless communications were available .......................................................................................................................................................................15 6.1 Transformer monitoring......................................................................................................................15 6.2 Power line monitoring ........................................................................................................................15 6.3 IEEE 802.x standardization efforts .....................................................................................................15 6.4 ISA SP100 standardization efforts ......................................................................................................15 7. Classification of performance and availability requirements ....................................................................16 7.1 Categories of performance requirements ............................................................................................16 7.2 Quality of Service ...............................................................................................................................16 7.3 Environmental ....................................................................................................................................16 7.4 Management issues and policies .........................................................................................................16 7.5 EMI .....................................................................................................................................................17 8. Potential new requirements for wireless technologies to meet new power system applications ...............18 9. Recommended practices matrix of application requirements versus wireless capabilities ........................19 Copyright © 2007 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. v IEEE P1777/D1, May 2007 Draft Recommended Practice for Using Wireless Data Communications in Power System Operations Copyright © 2007 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. 1 IEEE P1777/D1, May 2007 1. Introduction This section will be completed by Marc and Frances. {Draft text} 1.1 Scope The primary scope of this work is to develop the functional, performance, security, and on-site testing requirements for wireless data communication technologies to be used in different aspects (types, classes) of power system operations. The locations for wireless include within electric power substations, in underground vaults, along transmission and distribution circuits, for generation and distributed energy resources plants, to customer electrical equipment, and other electric power environments. The different types of communication needs will include high-speed, high reliability protective relaying, “real-time” monitoring within electric sites with high EMI, control within electric sites, non-operational monitoring and control (e.g. maintenance, archival data, physical plan monitoring, etc.), mobile functions, temporary functions, and emergency functions. The focus of these requirements will be for the implementation of the IEEE 802.x standards for power system operational functions, but will also be applicable to data over commercial cellular systems. The scope also includes the development of guidelines for using the results in the electric power industry. 1.2 Purpose The electric power industry has long used some types of wireless data communications, including microwave systems, ISM-band (900 MHz) multiple address radio (MAS) and spread spectrum radio systems, some 450 MHz short range systems, and mobile radio systems for limited data exchanges. Many vendors offer industrial-strength wireless products to the power system industry. However, great strides have been made in new types of wireless systems in the non-industrial arena, in particular, data over cellular phone systems and the IEEE 802 series. Personal and commercial wireless data communications systems are becoming widespread, with increasingly mature technologies and standards, as well as decreasing costs. As such, they offer the benefits of inexpensive products, rapid deployment, low cost installations, widespread access, and mobile communications which wired technologies and even the older wireless technologies often cannot provide. In addition, with cyber security becoming of greater importance to the power industry, the newer wireless systems are including improved security technologies, such as in the IEEE 802.11i standards. And new wireless standards are being developed in the IEEE 802.11, 802.15, and 802.16 series which could become very useful in certain power system applications. Nonetheless, many of these standards are aimed primarily at the mass market of home and office users, not at harsh and demanding industrial environments. Wireless technologies have a number of vulnerabilities related to the impact of noisy electrical environments on wireless media, the reliability of the commercial wireless equipment, the consequences of many users in the unlicensed frequencies, the performance for time-sensitive data, and the security of communications. Therefore, specific functional requirements need to be developed for the wireless equipment and technologies to provide the necessary reliability, availability, and security of communications for different power system functions in the electrical environments. In addition, guidelines for using wireless need to be developed so that users can better understand the issues, pros, and cons of implementing wireless communications for different applications. Copyright © 2007 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. 1 IEEE P1777/D1, May 2007 1.3 Background Substations are complex entities, involving not only the power equipment they are principally designed for, but also the communication and information infrastructure that is increasingly critical to the reliable operation and physical security of the substation power equipment. Traditional communications within a substation have consisted of point-to-point wires, usually between control equipment in control house and power system equipment in the substation yard. For instance, current transducers (CTs) and voltage transducers (PTs) connect to wires which carry 4-20 mA analog signals of current and voltage values as input to devices in the control house. Protective relays send communication signals between each other over dedicated wires, or, if they need to communicate between substations, over dedicated pilot wires, microwave channels, power line carrier, or fiber links. Upon an event, the relays issue trip commands over dedicated wires to the circuit breakers in the substation yard. SCADA data is monitored via a Remote Terminal Unit (RTU) and transmitted over a dedicated or multidrop, slow speed channel (e.g. 1200 bps) to the control center. These channels are often leased lines from a telephone company, or a dedicated microwave or fiber optic channel. Neither of these traditional communications systems are able to handle all of the newer requirements for increased information from substations, cyber security requirements, and physical surveillance of substation equipment. More modern and newer substations are embracing some of the networking communications technologies which can decrease significantly the sheer number of wires that must be installed and maintained. With networks, interactions between devices do not need dedicated wires, but just a connect to a local area network (LAN). These LANs are usually fiber optic cables because of their imperviousness to electromagnetic interference. However, in most utilities, the steps toward the use of LANs were taken carefully. The communications equipment had to be proven to meet the stringent timing and reliability requirements that were expected from dedicated wires. In reality, some substation functions that did not have the most stringent requirements were quick to embrace networks because of the convenience and the reduction in costs. Security monitoring of gates, doors, and other access points required less stringent availability of communications, and were very quick to use LANs. Leased telephone lines were chronically unreliable, so the move to using company Wide Area Networks (WANs) (once these were available) for carrying SCADA data was a no-brainer. As Intelligent Electronic Devices (IEDs) and other substation automation equipment were developed, they were provided with LAN interfaces by the vendors, at least for managing settings and supporting maintenance activities. Eventually, as LAN technologies evolved to higher speeds, increased reliability, and more robust LAN equipment, then protective relays, sensors, and other devices with higher timeliness and precision requirements started interconnecting over these LANs. The key to the acceptance of LANs within the substation environment was the development of highly reliable LAN routers, hubs, and interface equipment by recognized utility-industry vendors who could vouch for their equipment still meeting the unique and stringent requirements even using the new communications technology. This same process of developing the highly reliable, industry-strength wireless equipment is needed for wireless technologies to be able to fulfill whatever their potential is in the various substation environments. Many of the “consumer” wireless products do not have the robustness and reliability needed for industrial applications. The key is to determine which communications “niches” can be fulfilled by wireless solutions, develop the performance and security requirement standards, and then urge vendors to build the necessary robust wireless systems to meet these standards. Guidelines will be particularly important to allow power system engineers to make good decisions on whether and which wireless technologies can be used to fill their needs. Copyright © 2007 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. 2 IEEE P1777/D1, May 2007 2. Description of wireless technologies and architecture This section will be completed by John Newbury. 2.1 WiFi – IEEE 802.11: Currently WiFi is the most popular wireless standard for networking computer systems and other computer applications IEEE 802.11b data rate is 11Mbps IEEE 802.11g data rate is 54Mbps Frequency band is the 2.4Ghz band Range of 100-150 feet 2.2 Bluetooth™ – IEEE 802.15.1: Bluetooth is used in cellphones, Personal Digital Assistants (PDAs) and other mobile wireless devices, primarily for communicating with computers, Intelligent Electronic Devices (IEDs), headsets, hands-free systems, and other gadgets. Very short range of only 33 feet (approx 10m) Frequency band is the 2.4Ghz band. Relatively low data rate of 1.5Mbps Bluetooth is designed for low-traffic serial point-to-point links, which is why it's being used in devices like wireless mobile phone headsets. 2.3 Zigbee – IEEE 802.15.4: IEEE 802.15.4 defines low-rate (<250 kbps), very low duty cycle, wireless personal area networks often termed “meshed networks” as opposed to point-to-point. Distances between devices is 30300 feet. ZigBee builds upon this 802.15.4 standard to define application profiles that can be shared among different manufacturers to provide system-to-system interoperability. This effort is still a work in progress, although of great interest to industries (such as the power industry) that have extensive sensor networks. 2.4 WiMax – IEEE 802.16: Addresses the "first-mile/last-mile" connection for longer (45-75 Mbps) The main focus of the IEEE 802.16 standards is to enable a wireless alternative for cable, DSL, and T1 communication channels for consumer last-mile access to the Internet, including highspeed data, Voice over IP (VoIP), Video on Demand (VoD), and backhaul for IEEE 802.11 LANs. distances (5-30 miles) and faster rates Copyright © 2007 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. 3 IEEE P1777/D1, May 2007 2.5 Cellphone – Group Spéciale Mobile (GSM): GSM was established to create a common European mobile telephone standard for a panEuropean mobile cellular radio system (and now worldwide) The resulting mobile telephone standard allows cellphone users to “roam” across many cellphone systems and between most countries world-wide. New generations of cellphone technologies, termed 2.5G, 3G, and 4G are deployed in certain countries or are still under development. GPRS commonly used for data, with 30-80 kbps typical. EDGE (enhancement to GPRS) provides 160-236 kbps The range is wherever cellphone coverage is available! 2.6 Older wireless systems: Microwave systems Multiple address radio systems Satellite, particularly VSAT Spread spectrum radio, 928 MHz point-to-point Copyright © 2007 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. 4 IEEE P1777/D1, May 2007 3. Expected benefits from the use of wireless communications This section will be completed by Ken Fodero. {Draft from P1777 Questionnaire} Wireless communications can provide many benefits, but these vary in importance from application to application, as well as from specific circumstances. Assess each benefit on its importance in a business case in justifying the use of wireless technologies for this application. 3.1 Comparison of wired and wireless benefits Less expensive because cabling does not need to be installed. While fiber optic cables cost about $25k per mile, wireless media is “free” More rapid implementation, since no trenching through and around substation equipment is required. Less experienced technicians can often be used, because they do not need to be concerned with ground potential rise or have to run cables around HV equipment. More mobile and portable so that the same equipment with wireless communications can easily be moved from one spot to another, either continuously (e.g. in a truck) or periodically (e.g. for spot maintenance). Additional wireless equipment can automatically interconnect with only the appropriate security features enabled. Less susceptible to ground potential rise because no cabling is needed. Failure location in wireless systems can be easier, since only need to test the end devices. New wireless applications may be feasible that were not cost-effective with wired communications. These applications might improve power system reliability and efficiency, or provide increased personnel safety. 3.2 Cost benefits Lower cost for media since wireless media is free while cables cost money Lower cost for installing wireless devices since no trenching or running of cables is needed Lower installation effort and disruption caused by trenching, rights-of-way issues, and cable installation Low cost of wireless technologies makes application cost-effective, while using wired solutions prevented implementation of the application The now-feasible, cost-beneficial application provides additional benefits to other applications, such as more data for condition monitoring also may provide data for future equipment specifications 3.3 Benefits of intrinsic wireless characteristics Characteristics of wireless technologies make the application technically feasible Avoid ground potential rise problems Copyright © 2007 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. 5 IEEE P1777/D1, May 2007 “Air-gap” electrical isolation is automatically provided between wireless devices connected to power equipment and other devices 3.4 Installation and maintenance benefits Faster and easier installation of wireless technologies since licensing requirements are avoided (e.g. microwave path licensing) Power system technicians are not needed, so faster, easier, and less expensive installation of wireless technologies Easier maintenance since only need to test the end devices, not a cable Improved safety for users since they do not need to be close to power equipment: outside vault Improved environmental conditions for users, since they may be outside the substation in their warm/cool van 3.5 Mobility benefits Mobility of wireless devices so that they can be used while in motion Ease of moving wireless systems to new locations, particularly during emergency situations or during temporary construction activities Copyright © 2007 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. 6 IEEE P1777/D1, May 2007 4. Possible concerns about using wireless communications This section will be completed by Frances Cleveland and Stan Klein. {Draft from P1777 Questionnaire} 4.1 Comparison of wired and wireless concerns 4.1.1 Common reliability and security concerns for wired media and wireless media Some reliability and security concerns/problems/issues are the same for both wired and wireless media. These need to be identified so that only the differences can be compared: apples to apples. Data protocols. Robustness and security of data are related to the actual protocol, not to the media it goes over. The security (or lack of security) of Modbus is the same whether it goes over fiber optic cable or a wireless system. Internet hackers. Hackers trying to access systems through the Internet do not care or even know about the media. Overloading of the communications network by the utility. The data volume that a network can handle is related to the bit-per-second rate of the media, as well as configuration, response requirements, the degree of “bursty” data, and other network parameters. Again, this is mediaindependent. Single points of failure. The network configuration, not the type of media, is responsible for possible single points of failure. Utility security policies. If authorization procedures are not solid or are not followed, it does not matter what media you use. This includes not updating default passwords, vendor “backdoors” into their equipment, lost or stolen equipment, bypassing security checks, etc. 4.1.2 Reliability and security concerns that are more of an issue for wired systems Wired systems can have reliability and security issues that are not a factor in wireless systems Cutting or breaking the cable. Cables can always be cut or broken, whether by a backhoe, by corrosion, by repeated bending, or by a disgruntled employee with a large pair of wire cutters. Poorly connected wires or stressed wires. Poor connections on wires can lead to noisy or intermittent communications and could potentially lead to breakage of the wire. Physical theft of wire. Long stretches of wire in unsecured areas may pose a problem of physical theft of the cable, a rampant problem in many countries in the world. Eavesdropping on metallic wires. If physical access is available, metallic wires can easily permit eavesdropping with very simple techniques. Ground potential rise on metallic wires. Metallic wires are susceptible to ground potential rise in substations due to power equipment and lightening strikes Lack of mobility for additions, changes, upgrades, and movement of equipment. Wired networks are more difficult to move or modify as new equipment is added and the configurations are changed, particularly if parts of the wiring are in inaccessible ducts or trenches. Copyright © 2007 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. 7 IEEE P1777/D1, May 2007 4.1.3 Reliability and security concerns that are more of an issue for wireless systems Wireless systems can have reliability and security issues that are not a factor in wired systems. These are often associated with denial-of-service and/or the unreliability of time-sensitive interactions. Eavesdropping on non-secured channels. Since wireless signals can be received by users outside the immediate environment, their data can be listened to, and if not encrypted, can be understood. However, if the data is adequately encrypted (IEEE 802.11i) or authenticated (SHA-1), then the information does remain secure. Disruption of the wireless signal due to electromagnetic interference (EMI). Substations and power plants are very electrically noisy environments, particularly during breaker operations and other equipment actions. Faded signals. Many factors can cause the wireless signal to fade, including too long a distance between wireless transmitter and receivers, atmospheric conditions, metallic surfaces that reflect the wireless radio waves, obstacles in the line-of-sight, and other factors. Overloading of bandwidth. Nearby users can overload the available bandwidth in the frequencies being used in the substation, thus causing delays and the potential need to retransmit data. Immaturity of wireless lower layer protocols. Wireless lower layer protocols (as opposed to data protocols like Modbus and DNP) have only been developed recently and are still undergoing significant upgrades, modifications, and testing. 4.2 Concerns about WiFi technologies Wireless equipment may not work well in an electrically noisy substation Wireless equipment may not survive in a harsh outdoor environment Internet hackers may be able to eavesdrop on information Unauthorized users may be able to eavesdrop on information Unauthorized users may be able to disrupt wireless communications Unauthorized users may be able to issue unauthorized control commands Limited range of transmission Low data rates Availability less than needed due to potential interference Vendor products do not provide adequate industrial-level reliability Standards are not yet solidified 4.3 Concerns about Bluetooth technologies Wireless equipment may not work well in an electrically noisy substation Wireless equipment may not survive in harsh substation environment Unauthorized users may be able to disrupt wireless communications Unauthorized users may be able to issue unauthorized control commands Limited range of transmission Low data rates Availability less than needed due to potential interference Vendor equipment does not provide adequate industrial-level reliability Copyright © 2007 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. 8 IEEE P1777/D1, May 2007 4.4 Concerns about Zigbee networks Wireless equipment may not work well in an electrically noisy substation Wireless equipment may not survive in harsh substation environment Unauthorized users may be able to disrupt wireless communications Unauthorized users may be able to issue unauthorized control commands Limited range of transmission Low data rates Availability less than needed due to potential interference Vendor equipment does not provide adequate industrial-level reliability Standards are not yet solidified 4.5 Concerns about WiMax (IEEE 802.16) wireless technologies Wireless equipment may not work well in an electrically noisy substation Wireless equipment may not survive in harsh substation environment Unauthorized users may be able to disrupt wireless communications Unauthorized users may be able to issue unauthorized control commands Limited range of transmission Low data rates Availability less than needed due to potential interference Vendor equipment does not provide adequate industrial-level reliability Standards are not yet solidified 4.6 Concerns about cellphone/GPRS wireless technologies Wireless equipment may not work well in an electrically noisy substation Wireless equipment may not survive in harsh substation environment Unauthorized users may be able to disrupt wireless communications Unauthorized users may be able to issue unauthorized control commands Low data rates Availability less than needed due to potential interference Vendor equipment does not provide adequate industrial-level reliability Standards are not yet solidified or are changing Copyright © 2007 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. 9 IEEE P1777/D1, May 2007 5. Description of applications that can benefit from wireless technologies This section will be completed by Damien Tholomier and all other contributors of application descriptions. {Draft input from Questionnaire} 5.1 Communication issues covered for each application {This subsection will eventually be moved to Section 7 – it is here for now to help those providing application descriptions.} Each application description will cover at least the following issues: 5.1.1 What wireless technology (one or more) might you, or did you, use? WiFi (multi-user, 100-150 foot range, 54 Mbps) (IEEE 802.11x) Bluetooth (point-to-point, 30+ foot range, 1.5 Mbps) (IEEE 802.15.1-based) Zigbee (meshed network, 30-300 foot range, <250 kbps) (IEEE 802.15.4-based) WiMax (multi-user, 5-30 mile range, 45-75 Mbps) (IEEE 802.16-based) Cellular phone systems (dial-up, world-wide, 30-236 kbps) (GPRS or CDMA) Microwave system Multiple Address Radio System (MAS) Non IEEE 802.x-based spread spectrum radio Satellite-based VSAT or other Proprietary radio Do not know Other (please specify) 5.1.2 What communication configuration (one or more) might you, or did you, use? Point-to-point Meshed communications network LAN WAN Using/piggybacking over existing communications network Local mobile Wide area mobile Other (please specify) Copyright © 2007 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. 10 IEEE P1777/D1, May 2007 5.1.3 Identify any specific wireless configuration issues of concern? Electrically noisy environment Potential interference from other known radio sources Potential interference from other unknown radio sources Need for multiple wireless networks Long distance between end point and wireless node Long distances for wireless transmissions Outdoor temperature extremes Outdoor weather conditions Other (please specify) 5.1.4 What are the power supply requirements for the wireless devices? If battery power is preferred or required, indicate how long between battery replacements would be desired. Mains power is available Station battery power is available Battery power only, available without recharging or replacement for a few weeks Battery power only, available without recharging or replacement for 1 year Battery power only, available without recharging or replacement for 5 years Battery power only, available without recharging or replacement for 10+ years Alternative power source possible: e.g. solar cells, power “harvesting” Other (please specify) 5.1.5 What is the typical periodicity of data transmitted? Periodically, between 100 milliseconds and 1 second Periodically, between 1 and 10 seconds Periodically, between 10 and 60 seconds Periodically, every few minutes up to once an hour Periodically, every few hours Periodically, longer than a few hours Other (please specify) 5.1.6 Is data (also) transmitted upon event? Not transmitted upon event Upon event (alarm condition) only Upon event (alarm condition) as well as periodically Other (please specify) Copyright © 2007 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. 11 IEEE P1777/D1, May 2007 5.1.7 What is the time sensitivity (maximum latency) of the data being transmitted? Must be received within a few milliseconds of occurrence Must be received within a few seconds of occurrence Must be received within a few minutes of occurrence Time sensitivity/latency is not an issue Some transmissions may be “lost” without impact on the application Other (please specify) 5.1.8 What amount of data traffic is transmitted per end node (e.g. per sensor)? < 100 bps < 1kbps < 500 kbps < 1 Mbps > 1 Mbps Varies/Don’t Know Average bits per second gfedc Peak bits per second g 5.1.9 What are the availability requirements? Availability > 99.999% (less than 5 minutes outage per year) Availability > 99.99% (less than 1 hour outage per year) Availability > 99.9% (less than 9 hours outage per year) Availability > 99% (less than 4 days outage per year) Availability not an issue Other (please specify) 5.1.10 What are the security requirements? No security is needed Physical security (against theft or damage) is needed Authentication of users (human and software) is required Confidentiality (e.g. encryption) is required Integrity of data (against tampering, errors, or failures) is required Other (please specify) 5.1.11 What data protocol (one or more) is (will be) used over the wireless portion of the system? Don’t care: will convert any protocol to desired protocol with a protocol converter Don’t care, so long as it runs over IP DNP3 Modbus Fieldbus IEC 61850 GOOSE/GSE/SMV IEC 61850 ACSI Copyright © 2007 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. 12 IEEE P1777/D1, May 2007 Web services Don’t know Other (please specify) 5.2 Condition monitoring within substations, generating plants, and other electrical sites 5.3 SCADA monitoring and control from substations, generating plants, etc. to control center 5.4 Condition monitoring along transmission and feeder circuits 5.5 Local communications between feeder equipment such as automated switching 5.5.1 Control of load tap changing transformers in paralleling applications – Jim Harlow 5.6 SCADA monitoring and control of equipment on feeder circuits 5.7 Maintenance monitoring and assessment of primary and secondary equipment in substations, plants, along T&D circuits, in vaults, and at customer sites 5.8 Engineering interactions to determine status, update settings, acquire archival information 5.9 Mobile data communications for data acquisition and control from outside substation or vault sites Copyright © 2007 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. 13 IEEE P1777/D1, May 2007 5.10 Temporary installations for construction, calibration, repairing power systems, testing systems, or upgrading primary or secondary equipment 5.11 Emergency applications to restore failed or inadequate communications 5.12 Metering, outage detection, connect/disconnect at customer sites 5.13 Distance protective relaying 5.14 Substation protective relaying Copyright © 2007 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. 14 IEEE P1777/D1, May 2007 6. Description of new capabilities which might become feasible if wireless communications were available This section will include the new functions that can be improved with the use of wireless communication. This section will list all the functions collected in the survey. 6.1 Transformer monitoring 6.2 Power line monitoring Present standardisation activities This section is not yet assigned. 6.3 IEEE 802.x standardization efforts 6.4 ISA SP100 standardization efforts Copyright © 2007 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. 15 IEEE P1777/D1, May 2007 7. Classification of performance and availability requirements This section will be completed by Frances Cleveland. {Draft from P1777 Questionnaire} 7.1 Categories of performance requirements {This section will use the information from Section 5.1} Time latency – required timeframe within which the data must be received Data volumes – peak and continuous – bandwidth requirements Data frequency of transmissions Security – degree of criticality of data, authentication, confidentiality, avoidance of denial of service Availability of non-redundant equipment and communication paths Reliability of systems – alternate paths, backup equipment, failover/switchover times Power supply – access to mains or other source of external power, battery life times, recharge, Communication protocols Maintenance capabilities, response times, preventative maintenance cycles Network management requirements Event logs, audit logs, and other records Service Level Agreements 7.2 Quality of Service This section will be completed by Joe Gould. 7.3 Environmental This section will be completed by Joe Gould. 7.4 Management issues and policies This section will be completed by Joe Hughes and Frances Cleveland. Business Case assessment whether to use wireless technologies for specific applications Specification of wireless requirements, including contractual ramifications Service Level Agreements (SLAs) with any external companies Validation that wireless is meeting the requirements Copyright © 2007 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. 16 IEEE P1777/D1, May 2007 7.5 EMI Copyright © 2007 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. 17 IEEE P1777/D1, May 2007 8. Potential new requirements for wireless technologies to meet new power system applications TBD Copyright © 2007 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. 18 IEEE P1777/D1, May 2007 9. Recommended practices matrix of application requirements versus wireless capabilities TBD Copyright © 2007 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. 19