Do Settingless Relays truly improve Protection Ideas?

  • Thread starter Thread starter EverGreen1231
  • Start date Start date
  • Tags Tags
    Ideas Protection
AI Thread Summary
Settingless relays are discussed for their potential advantages over traditional methods, particularly in detecting high impedance faults, but their complexity raises concerns about reliability and vulnerability to cyber attacks. The debate emphasizes the KISS principle versus the benefits of "smart complexity," suggesting that while advanced systems could improve detection, they also introduce risks if not functioning correctly. The economic justification for adopting settingless relays remains uncertain, as high impedance faults are infrequent and may not warrant a complete paradigm shift. Cybersecurity risks are a significant consideration, as any digital system can potentially be hacked, impacting decision-making at the board level. Ultimately, a thorough analysis of costs, benefits, and risks is essential for evaluating the adoption of settingless relays in protection schemes.
EverGreen1231
Messages
75
Reaction score
11
I have more of a discussion type question than one about Electrical Concepts (though I suppose it will devolve into that area). I've been doing a bit of reading about settingless relaying schemes and was wondering how they really improve over the traditional methods?

The method of Dynamic State Estimation seems to do precisely the same thing as any other differential protection scheme, except it looks to be better at detecting high impedance faults.

Simplicity is beautiful, and, in many areas, superior to the obfuscation that "new technology" tends to introduce. If protection schemes are meant be as simple as functionally possible, would it be entirely prudent to complicate the methods by introducing State estimation and communication between remote areas? Thoughts?
 
Engineering news on Phys.org
The KISS principle versus "smart complexity" That's a pretty philosophical topic.

I could absolutely imagine that a state estimator, if working correctly, could detect many abnormal conditions on the grid, or in a power plant, or in almost any engineered creation. The problem is the "if working correctly" qualifier.

Need I point out that more complex software-based gadgets not only have more ways to go wrong naturally; they also necessarily make us more vulnerable to cyber attack.

Any KISS versus complexity debate must reduce to costs versus benefits. Costs and benefits can best be estimated by, first stop drinking the EPRI cool aid, and second by installing pilot advisory only demonstrations for a number of years. Collect data on reliability, true and false positives and true and false negatives.

Instead of the power grid, you might get a better conversation raising the same points in a Boeing versus Airbus philosophical debate about automation in aircraft cockpits.
 
  • Like
Likes EverGreen1231
This corroborates my thoughts. There doesn't, at first glance, seem to be enough economic "skin in the game" to get all excited and change an entire paradigm of thought. HIF are a problem, but not one that occurs frequently enough and in a manner damaging enough to worry too much about. The other proposed areas of improvement are similarly "small." One could correctly correlate this to the idea of High volume, slim margin: Settingless relays may make sense, but only over several years, and assuming the "if working correctly" caveat is not violated significantly within that time frame.

I'm not the one to speak intelligently on Cyber security as my knowledge of the discipline is lamentably slack, but the word "necessarily" caught my attention (as was, perhaps, intended). Would you explain?

I'll have to look-up more about the Boeing vs Airbus debate before I dare tread those pastures. ;)
 
Last edited:
EverGreen1231 said:
n Cyber security as my knowledge of the discipline is lamentably slack, but the word "necessarily" caught my attention (as was, perhaps, intended). Would you explain?

Perhaps in this instance the simplest explanation is, if you don't need to run an ethernet cable to it (ie mechanical safetys, contacts ect) you can't exactly hack into it. In other words what's not on a network is by definition not open to network intrusion. Introducing a cyber element into anything necessarily opens this door as no standalone system can differentiate between auhorized and unauthorized access.
 
krater said:
Perhaps in this instance the simplest explanation is, if you don't need to run an ethernet cable to it (ie mechanical safetys, contacts ect) you can't exactly hack into it. In other words what's not on a network is by definition not open to network intrusion. Introducing a cyber element into anything necessarily opens this door as no standalone system can differentiate between auhorized and unauthorized access.

Good advice. But the Stuxnet virus demonstrated conclusively that air-gapped systems with no net connection, can still be hacked.

Even if the probability of a successful hack is small, your board of directors will ask the question. "Do we own anything that is possible to hack by any means ; yes or no?". You are forced to say, "Yes."

A smaller board question, "Is this new thing impossible to hack ; yes or no?" You are forced to say, "No," if the thing is digital.

The board is not interested in actual risks. Their questions are for CYA purposes only.

The point is that you must include the risk of hacking in the cost-benefits to be fully transparent.
 
Hi all I have some confusion about piezoelectrical sensors combination. If i have three acoustic piezoelectrical sensors (with same receive sensitivity in dB ref V/1uPa) placed at specific distance, these sensors receive acoustic signal from a sound source placed at far field distance (Plane Wave) and from broadside. I receive output of these sensors through individual preamplifiers, add them through hardware like summer circuit adder or in software after digitization and in this way got an...
I have recently moved into a new (rather ancient) house and had a few trips of my Residual Current breaker. I dug out my old Socket tester which tell me the three pins are correct. But then the Red warning light tells me my socket(s) fail the loop test. I never had this before but my last house had an overhead supply with no Earth from the company. The tester said "get this checked" and the man said the (high but not ridiculous) earth resistance was acceptable. I stuck a new copper earth...
I am not an electrical engineering student, but a lowly apprentice electrician. I learn both on the job and also take classes for my apprenticeship. I recently wired my first transformer and I understand that the neutral and ground are bonded together in the transformer or in the service. What I don't understand is, if the neutral is a current carrying conductor, which is then bonded to the ground conductor, why does current only flow back to its source and not on the ground path...
Back
Top