Remote Access of Intelligent Electronic Devices (IED) Basics September 13, 2021 Many Power utilities intend to upgrade their substations to enable remote operation from a centralized master Control Room(CR) to achieve operational efficiency.
Full Answer
What is an IED?
What is IED? In the power sector, intelligent electronic devices (IED) are microprocessor based power system equipment, such as circuit breakers, transformers and capacitor banks, providing control and automation functions.
How does remote access work at Kindred?
Remote Access Employee Remote Access Menu Kindred provides employees the ability to access a variety of company resources while working in a home office or while on-the-go. As a reminder, Kindred employees must follow our Acceptable Use Policy to ensure the safety and security of our data and information, even when working remotely.
What are modmodErn IEDs?
Modern IEDs are also designed to support the IEC 61850 standard for substation automation, which provides full interoperability and enables advanced protection and communication functions.
What is IED software?
An acronym for Intelligent Electronic Device. An IED, as it relates to the protection and power system automation industry, is a device that performs electrical protection functions, advanced local control intelligence, has the ability to monitor processes and can communicate directly to a SCADA system.
What is IED management?
With two-way digital communication, Centralized IED Management system together with Automatic Fault Analysis Systems can collect disturbance data remotely, analyse disturbances and initiate corrective action. Utilities can therefore take proactive action to manage grid disturbances and prevent blackouts.
What is IED communication?
IEDs are devices that can be connected to a LAN and communicate with other devices over the LAN and have processing capabilities. A large number of IEDs are available currently, relay IEDs being the most commonly used for automation purposes.
What is the difference between RTU and IED?
IEDs are used as a more modern alternative to, or a complement of, setup with traditional remote terminal units (RTUs). Unlike the RTUs, IEDs are integrated with the devices they control and offer a standardized set of measuring and control points that is easier to configure and require less wiring.
What are the 5 components of IED?
Improvised explosive devices (IEDs) are easy to assemble, homemade explosives, made by unauthorised persons and/or placed in an improvised way2. They are composed of at least five key components: a switch, a power source, an initiator, a container and an explosive charge3.
What are the 5 indicators of an IED?
In particular, this may increase the opportunity for command IEDs. Bottlenecks often occur when a route or track changes width, causing vehicles to slow down. There are six primary categories of signs that are fundamental to understand: Regularity, flattening, transfer, colour change, discardables, disturbances.
What are the 4 C's of IED?
IED / UXO Report REMEMBER THE 4 C's – CLEAR, CORDON, CONTROL, and CALL EOD.
What are the 5 elements of cages IED?
Although IEDs can vary widely in shape and size, there are five components common to all IEDs which consist of the switch, the initiator, the main charge, the power source and the container. Switch.
Secure, company-wide data access
IMS supports IEDs from most vendors, including Eaton, SEL, GE and others. Not only does it integrate all IEDs into a cohesive, manageable whole but it also provides complete company-wide access to operational and non-operational data in a highly secure environment.
IED asset management for substation automation
In addition to data access, the network infrastructure provides the capability to perform remote maintenance, significantly reducing costs. However, this introduces significant security risks that require industry-specific solutions in order to meet NERC CIP regulatory requirements.
IED asset management for distribution automation
Devices are deployed in widely distributed geographical areas and often requires expensive scheduled maintenance. Operations need to be performed simultaneously on a large number of devices to change seasonal settings and perform firmware updates to address security or operational issues.