Document Revision History - ABB REB670 Applications Manual

Busbar protection 2.1 ansi, relion 670 series
Hide thumbs Also See for REB670:
Table of Contents

Advertisement

1MRK 505 337-UUS -
1.3.2
Application manual
The commissioning manual contains instructions on how to commission the IED. The
manual can also be used by system engineers and maintenance personnel for assistance
during the testing phase. The manual provides procedures for the checking of external
circuitry and energizing the IED, parameter setting and configuration as well as verifying
settings by secondary injection. The manual describes the process of testing an IED in a
substation which is not in service. The chapters are organized in the chronological order
in which the IED should be commissioned. The relevant procedures may be followed also
during the service and maintenance activities.
The operation manual contains instructions on how to operate the IED once it has been
commissioned. The manual provides instructions for the monitoring, controlling and
setting of the IED. The manual also describes how to identify disturbances and how to
view calculated and measured power grid data to determine the cause of a fault.
The application manual contains application descriptions and setting guidelines sorted per
function. The manual can be used to find out when and for what purpose a typical
protection function can be used. The manual can also provide assistance for calculating
settings.
The technical manual contains operation principle descriptions, and lists function blocks,
logic diagrams, input and output signals, setting parameters and technical data, sorted per
function. The manual can be used as a technical reference during the engineering phase,
installation and commissioning phase, and during normal service.
The communication protocol manual describes the communication protocols supported
by the IED. The manual concentrates on the vendor-specific implementations.
The point list manual describes the outlook and properties of the data points specific to the
IED. The manual should be used in conjunction with the corresponding communication
protocol manual.
The cyber security deployment guideline describes the process for handling cyber security
when communicating with the IED. Certification, Authorization with role based access
control, and product engineering for cyber security related events are described and sorted
by function. The guideline can be used as a technical reference during the engineering
phase, installation and commissioning phase, and during normal service.

Document revision history

Document revision/date
December 2015
History
First release
Section 1
Introduction
19

Advertisement

Table of Contents
loading

Table of Contents