Amazon cover image
Image from Amazon.com

IEC 61850 demystified / Herbert Falk.

By: Material type: TextTextSeries: Artech House power engineering seriesPublisher: Norwood, MA : Artech House, [2019]Copyright date: ©2019Description: 1 online resource (xiv, 303 pages) : illustrations, chartsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781630816612
  • 1630816612
Other title:
  • IEC sixty-one thousand eight hundred and fifty demystified
  • International Electrotechnical Commission sixty-one thousand eight hundred and fifty demystified
Subject(s): Genre/Form: Additional physical formats: Print version:: IEC 61850 demystified.DDC classification:
  • 621.31 23
LOC classification:
  • TK1751 .F35 2019eb
Online resources:
Contents:
Intro; IEC 61850 Demystified; Contents; Preface; Introduction; Chapter 1 What Makes IEC 61850 Different?; 1.1 Designed for the Future; 1.2 Functions and Semantics Instead of Numbers; 1.3 Automation Instead of SCADA Focus; 1.4 Engineering Workflow and File Exchange Standardization; 1.5 Adoption and Barriers; Reference; Chapter 2 History of IEC 61850; 2.1 Prior to 1980; 2.1.1 Foundational Principles; 2.1.2 The 1970s: Moore's Law and Computational Power; 2.1.3 Computer Communication and Internet; 2.2 1980 to 1989; 2.2.1 Foundational Principles; 2.2.2 Computers: Personal Computers
2.2.3 Communications; 2.2.4 The Rise and Demise of MAP/TOP; 2.2.5 The Rise of the Utility Communication Architecture; 2.3 1990 to 1999; 2.3.1 Founcational Technologies; 2.3.2 Communications; 2.3.3 Utility Communication Architecture; 2.3.4 IEC 61850 Begins; 2.4 2000 to 2009; 2.4.1 Security; 2.4.2 Synchrophasor; 2.4.3 IEC 61850; 2.5 2010 to Today; References; Chapter 3 The Need for Speed: Networking versus Hardwire; 3.1 Use Case for Digital Network-Based Protection; 3.1.1 Signal Distribution Requirements; 3.1.2 Timing; 3.1.3 Quality of Message Delivery Service
3.1.4 Requirements and Decisions Based on Use Cases; 3.2 Mathematical Analysis of the Technologies; 3.2.1 Profibus; 3.2.2 Ethernet; 3.3 Mathematical Truth but Numbers Can Lie; 3.3.1 Profibus versus Ethernet Test Results; 3.3.2 Skepticism and Ethernet Scalability Test Results; 3.3.3 Wondering What Happened; Chapter 4 Harmonizing IEC 61850 and IEEE TR 1550; Chapter 5 Structure of the IEC 61850 Standard; Chapter 6 Read Before Proceeding: Use of UML in This Book; 6.1 Classes, Attributes, Operations, and Multiplicity; 6.2 Generalization; 6.3 Association, Composition, and Aggregation
6.4 Dependency, Instantiation, and Stereotypes; 6.5 Stereotype; 6.6 UML Cheat Sheet; Chapter 7 Integration Patterns; 7.1 Client and Server; 7.2 Publish and Subscribe; Chapter 8 Basic IEC 61850; 8.1 Intelligent Electronic Devices; 8.1.1 IED and Their Applications; 8.1.2 Naming of IEDs; 8.1.3 When Is an IED Not a Physical Box; 8.1.4 Access Point; 8.2 Logical Device and Logical Nodes; 8.2.1 Logical Device; 8.2.2 Logical Nodes; Chapter 9 IEC 61850-7-2 and IEC 61850-7-3; 9.1 Base Types; 9.1.1 Timestamp and Synchronization; 9.1.2 Quality (IEC 61850-7-3); Chapter 10 Engineering
10.1 Workflow Specifics; 10.1.1 Specification Phase; 10.1.2 Binding to IEDs; 10.1.3 Information Exchange Requirements; 10.1.4 Communication Configuration; 10.1.5 Iteration and Export; 10.2 SCL Service Declarations; 10.2.1 Server Capabilities; 10.2.2 Client Capabilities; Chapter 11 Client and Server Communications; 11.1 History of IEC 61850 Client/Server; 11.2 IEC 61850 Client/Server Over the Wire; 11.3 ASN. 1; 11.3.1 Protocol Definition Syntax (Bakus-Naur Form Notation); 11.3.2 Encoding Rules; Chapter 12 Impact of Cybersecurity; 12.1 SCL; 12.2 61850 Application Role-Based Access Control
12.3 Protocol Related
Item type:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Home library Collection Call number Materials specified Status Date due Barcode
Electronic-Books Electronic-Books OPJGU Sonepat- Campus E-Books EBSCO Available

Includes bibliographical references and index.

Intro; IEC 61850 Demystified; Contents; Preface; Introduction; Chapter 1 What Makes IEC 61850 Different?; 1.1 Designed for the Future; 1.2 Functions and Semantics Instead of Numbers; 1.3 Automation Instead of SCADA Focus; 1.4 Engineering Workflow and File Exchange Standardization; 1.5 Adoption and Barriers; Reference; Chapter 2 History of IEC 61850; 2.1 Prior to 1980; 2.1.1 Foundational Principles; 2.1.2 The 1970s: Moore's Law and Computational Power; 2.1.3 Computer Communication and Internet; 2.2 1980 to 1989; 2.2.1 Foundational Principles; 2.2.2 Computers: Personal Computers

2.2.3 Communications; 2.2.4 The Rise and Demise of MAP/TOP; 2.2.5 The Rise of the Utility Communication Architecture; 2.3 1990 to 1999; 2.3.1 Founcational Technologies; 2.3.2 Communications; 2.3.3 Utility Communication Architecture; 2.3.4 IEC 61850 Begins; 2.4 2000 to 2009; 2.4.1 Security; 2.4.2 Synchrophasor; 2.4.3 IEC 61850; 2.5 2010 to Today; References; Chapter 3 The Need for Speed: Networking versus Hardwire; 3.1 Use Case for Digital Network-Based Protection; 3.1.1 Signal Distribution Requirements; 3.1.2 Timing; 3.1.3 Quality of Message Delivery Service

3.1.4 Requirements and Decisions Based on Use Cases; 3.2 Mathematical Analysis of the Technologies; 3.2.1 Profibus; 3.2.2 Ethernet; 3.3 Mathematical Truth but Numbers Can Lie; 3.3.1 Profibus versus Ethernet Test Results; 3.3.2 Skepticism and Ethernet Scalability Test Results; 3.3.3 Wondering What Happened; Chapter 4 Harmonizing IEC 61850 and IEEE TR 1550; Chapter 5 Structure of the IEC 61850 Standard; Chapter 6 Read Before Proceeding: Use of UML in This Book; 6.1 Classes, Attributes, Operations, and Multiplicity; 6.2 Generalization; 6.3 Association, Composition, and Aggregation

6.4 Dependency, Instantiation, and Stereotypes; 6.5 Stereotype; 6.6 UML Cheat Sheet; Chapter 7 Integration Patterns; 7.1 Client and Server; 7.2 Publish and Subscribe; Chapter 8 Basic IEC 61850; 8.1 Intelligent Electronic Devices; 8.1.1 IED and Their Applications; 8.1.2 Naming of IEDs; 8.1.3 When Is an IED Not a Physical Box; 8.1.4 Access Point; 8.2 Logical Device and Logical Nodes; 8.2.1 Logical Device; 8.2.2 Logical Nodes; Chapter 9 IEC 61850-7-2 and IEC 61850-7-3; 9.1 Base Types; 9.1.1 Timestamp and Synchronization; 9.1.2 Quality (IEC 61850-7-3); Chapter 10 Engineering

10.1 Workflow Specifics; 10.1.1 Specification Phase; 10.1.2 Binding to IEDs; 10.1.3 Information Exchange Requirements; 10.1.4 Communication Configuration; 10.1.5 Iteration and Export; 10.2 SCL Service Declarations; 10.2.1 Server Capabilities; 10.2.2 Client Capabilities; Chapter 11 Client and Server Communications; 11.1 History of IEC 61850 Client/Server; 11.2 IEC 61850 Client/Server Over the Wire; 11.3 ASN. 1; 11.3.1 Protocol Definition Syntax (Bakus-Naur Form Notation); 11.3.2 Encoding Rules; Chapter 12 Impact of Cybersecurity; 12.1 SCL; 12.2 61850 Application Role-Based Access Control

12.3 Protocol Related

Print version record.

eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - Worldwide

There are no comments on this title.

to post a comment.

O.P. Jindal Global University, Sonepat-Narela Road, Sonepat, Haryana (India) - 131001

Send your feedback to glus@jgu.edu.in

Hosted, Implemented & Customized by: BestBookBuddies   |   Maintained by: Global Library