GE C30 Instruction Manual page 329

Controller system
Hide thumbs Also See for C30:
Table of Contents

Advertisement

CHAPTER 5: SETTINGS
Example 3: Pilot-aided schemes
Consider a three-terminal line protection application shown in the following figure.
Assume the Hybrid Permissive Overreaching Transfer Trip (Hybrid POTT) scheme is applied using the architecture shown as
follows. The scheme output operand
In this architecture, Devices 1 and 3 do not communicate directly. Therefore, Device 2 must act as a 'bridge'. The following
settings are applied:
UR IEC 1:
:
"HYB POTT
DIRECT OUT 2 OPERAND
: "2"
DIRECT INPUT 5 DEVICE ID
DIRECT INPUT 5 BIT NUMBER
: "2"
DIRECT INPUT 6 DEVICE ID
DIRECT INPUT 6 BIT NUMBER
UR IED 3:
:
"HYB POTT
DIRECT OUT 2 OPERAND
: "2"
DIRECT INPUT 5 DEVICE ID
DIRECT INPUT 5 BIT NUMBER
: "2"
DIRECT INPUT 6 DEVICE ID
DIRECT INPUT 6 BIT NUMBER
UR IED 2:
: "1"
DIRECT INPUT 5 DEVICE ID
DIRECT INPUT 5 BIT NUMBER
: "3"
DIRECT INPUT 6 DEVICE ID
DIRECT INPUT 6 BIT NUMBER
:
"HYB POTT
DIRECT OUT 2 OPERAND
:
"DIRECT INPUT
DIRECT OUT 3 OPERAND
:
"DIRECT INPUT
DIRECT OUT 4 OPERAND
C30 CONTROLLER SYSTEM – INSTRUCTION MANUAL
Figure 5-87: Three-terminal line application
is used to key the permission.
HYB POTT TX1
Figure 5-88: Single-channel open-loop configuration
TX1"
: "2" (this is a message from IED 2)
: "4" (effectively, this is a message from IED 3)
TX1"
: "2" (this is a message from IED 2)
: "3" (effectively, this is a message from IED 1)
: "2"
: "2"
TX1"
5" (forward a message from 1 to 3)
6" (forward a message from 3 to 1)
INPUTS/OUTPUTS
5
5-173

Advertisement

Table of Contents
loading

Table of Contents