Document Revision History - ABB RET670 Commissioning Manual

Transformer protection
Hide thumbs Also See for RET670:
Table of Contents

Advertisement

1MRK 504 165-UUS -
1.3.2
Transformer protection RET670 2.2 ANSI
Commissioning manual
The commissioning manual contains instructions on how to commission the IED. The
manual can also be used by system engineers and maintenance personnel for assistance
during the testing phase. The manual provides procedures for the checking of external
circuitry and energizing the IED, parameter setting and configuration as well as verifying
settings by secondary injection. The manual describes the process of testing an IED in a
substation which is not in service. The chapters are organized in the chronological order
in which the IED should be commissioned. The relevant procedures may be followed also
during the service and maintenance activities.
The operation manual contains instructions on how to operate the IED once it has been
commissioned. The manual provides instructions for the monitoring, controlling and
setting of the IED. The manual also describes how to identify disturbances and how to
view calculated and measured power grid data to determine the cause of a fault.
The application manual contains application descriptions and setting guidelines sorted per
function. The manual can be used to find out when and for what purpose a typical
protection function can be used. The manual can also provide assistance for calculating
settings.
The technical manual contains operation principle descriptions, and lists function blocks,
logic diagrams, input and output signals, setting parameters and technical data, sorted per
function. The manual can be used as a technical reference during the engineering phase,
installation and commissioning phase, and during normal service.
The communication protocol manual describes the communication protocols supported
by the IED. The manual concentrates on the vendor-specific implementations.
The point list manual describes the outlook and properties of the data points specific to the
IED. The manual should be used in conjunction with the corresponding communication
protocol manual.
The cyber security deployment guideline describes the process for handling cyber security
when communicating with the IED. Certification, Authorization with role based access
control, and product engineering for cyber security related events are described and sorted
by function. The guideline can be used as a technical reference during the engineering
phase, installation and commissioning phase, and during normal service.

Document revision history

Document revision/date
–/May 2017
History
First release
Section 1
Introduction
15

Advertisement

Table of Contents
loading

This manual is also suitable for:

Relion 670 series

Table of Contents