agent technology

32

Upload: fitzgerald-hahn

Post on 02-Jan-2016

34 views

Category:

Documents


0 download

DESCRIPTION

Agent Technology. VINAY. “AGENT TECHNOLOGY”- APPLIED TO THE PROTECTION OF POWER SYSTEMS. VINAY. Autonomy. Mobile. Goal-oriented. Adaptivity. Communicative. Introduction to Technology. What is anAgent?. Definition of an agent. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Agent Technology
Page 2: Agent Technology

““AGENT TECHNOLOGY”-AGENT TECHNOLOGY”-APPLIED TO THE APPLIED TO THE

PROTECTION OF POWER PROTECTION OF POWER SYSTEMSSYSTEMS

VINAYVINAY

..

Page 3: Agent Technology

Introduction to Introduction to TechnologyTechnology

What is What is anAgent?anAgent?

Page 4: Agent Technology

Definition of an agentDefinition of an agent

WeWe define a define a software agent software agent to be a to be a computer computer program that program that has the basic has the basic properties properties as as shown above.shown above.

Page 5: Agent Technology

Agent architectureAgent architecture Our agent proposal uses geographically Our agent proposal uses geographically

distributed agents located in a number of distributed agents located in a number of IntelligentIntelligent Electronic Devices (IEDs)Electronic Devices (IEDs)

An IED is a hardware environment that has the An IED is a hardware environment that has the necessary computational, communication, and necessary computational, communication, and other I/O capabilities needed to support a software other I/O capabilities needed to support a software agent. agent.

An IED can be loaded with agents that can An IED can be loaded with agents that can perform control and/or protection functionality. perform control and/or protection functionality.

Page 6: Agent Technology

local area networks(LAN’s) and wide area local area networks(LAN’s) and wide area networks are used for the interaction networks are used for the interaction between the IED’s.between the IED’s.

For the purpose of this abstract, an IED For the purpose of this abstract, an IED must be capable of receiving andmust be capable of receiving and supporting user-based agent software.supporting user-based agent software.

Decision-making is made based on Decision-making is made based on knowledge received from other agents as knowledge received from other agents as well as on local measurements. well as on local measurements.

Local measurements might include of the Local measurements might include of the current, voltage, and breaker status. current, voltage, and breaker status.

Page 7: Agent Technology
Page 8: Agent Technology

Agents might even interface with legacy Agents might even interface with legacy systems such as systems such as Supervisory Control Supervisory Control andand Data Acquisition (SCADA) Data Acquisition (SCADA) systems.systems.

These networks will be based on Internet These networks will be based on Internet standards even if the systems remained standards even if the systems remained independent of the global network independent of the global network conglomeration. conglomeration.

Page 9: Agent Technology

EPOCHSEPOCHS

EPOCHSEPOCHS,, the Electric Power and the Electric Power and Communication Synchronizing SimulatorCommunication Synchronizing Simulator..

There is a requirement for the platform that There is a requirement for the platform that could simultaneously simulate both electric could simultaneously simulate both electric power and communication elements.power and communication elements.

An EPOCH is a new environment allowing An EPOCH is a new environment allowing users to create and test agent-based users to create and test agent-based communications scenarios involving electric communications scenarios involving electric power transientspower transients. .

Page 10: Agent Technology
Page 11: Agent Technology

AnAn EPOCHEPOCH makes use of three major makes use of three major simulatorssimulators

PSCAD/EMTDCPSCAD/EMTDC, , for electromagnetic for electromagnetic transient simulationtransient simulation

PSLFPSLF, , for electromechanical transient for electromechanical transient simulation.simulation.

NS2NS2, , to simulate network to simulate network communicationcommunication..

AnAn EPOCHEPOCH also adds two components of also adds two components of its own. its own.

i.Agent HQi.Agent HQ

ii.Run-Time Infrastructureii.Run-Time Infrastructure (RTI) (RTI)

Page 12: Agent Technology

PSCAD/EMTDC, PSLFPSCAD/EMTDC, PSLF, , andand NS2NS2 allow userallow user defined extensions.defined extensions.

AA PSCAD/EMTDC PSCAD/EMTDC scenario can scenario can include user-defined libraries that include user-defined libraries that add equipment definitions using the add equipment definitions using the C programming language that were C programming language that were not present in the original software. not present in the original software.

NS2NS2 uses C++ languageuses C++ language..

Page 13: Agent Technology

Agent HQAgent HQ presents a unified presents a unified worldview to all simulated agents worldview to all simulated agents and acts as a proxy for all inter-and acts as a proxy for all inter-simulation information exchange. simulation information exchange.

A A Run-Time InfrastructureRun-Time Infrastructure (RTI(RTI) ) is responsible for maintaining is responsible for maintaining consistent simulation timing between consistent simulation timing between all componentsall components

Page 14: Agent Technology

AgentAgent

CommunicationCommunication

Control andProtectionSchemes.

Control andProtectionSchemes.

Sensor input Actuator output

Ethernet LAN

EnvironmentAgent--based IED’s Agent--based IED’s structurestructure

Page 15: Agent Technology

AgentAgent

CommunicationCommunication

Control andProtectionSchemes.

Control andProtectionSchemes.

Sensor input Actuator output

Ethernet lan

Fault in Environment

Page 16: Agent Technology

AgentAgent

CommunicationCommunication

Control andProtectionSchemes.

Control andProtectionSchemes.

Sensor input Actuator output

Ethernet lan

Fault in Environment

Page 17: Agent Technology

AgentAgent

CommunicationCommunication

Control andProtectionSchemes.

Control andProtectionSchemes.

Sensor input Actuator output

Ethernet lan

Fault in Environment

Page 18: Agent Technology

AgentAgent

CommunicationCommunication

Control andProtectionSchemes.

Control andProtectionSchemes.

Sensor input Actuator output

Ethernet lan

Fault in Environment

Page 19: Agent Technology

AgentAgent

CommunicationCommunication

Control andProtectionSchemes.

Control andProtectionSchemes.

Sensor input Actuator output

Ethernet lan

Fault in Environment

Page 20: Agent Technology

AgentAgent

CommunicationCommunication

Control andProtectionSchemes.

Control andProtectionSchemes.

Sensor input Actuator output

Ethernet lan

Fault in Environment

Page 21: Agent Technology

AgentAgent

CommunicationCommunication

Control andProtectionSchemes.

Control andProtectionSchemes.

Sensor input Actuator output

Ethernet lan

Fault in Environment

Page 22: Agent Technology

AgentAgent

CommunicationCommunication

Control andProtectionSchemes.

Control andProtectionSchemes.

Sensor input Actuator output

Ethernet lan

Fault in Environment

Page 23: Agent Technology

AgentAgent

CommunicationCommunication

Control andProtectionSchemes.

Control andProtectionSchemes.

Sensor input Actuator output

Ethernet lan

Fault in Environment

Page 24: Agent Technology

AgentAgent

CommunicationCommunication

Control andProtectionSchemes.

Control andProtectionSchemes.

Sensor input Actuator output

Ethernet lan

Fault in Environment

Page 25: Agent Technology

AgentAgent

CommunicationCommunication

Control andProtectionSchemes.

Control andProtectionSchemes.

Sensor input Actuator output

Ethernet lan

Fault in Environment

Page 26: Agent Technology

AgentAgent

CommunicationCommunication

Control andProtectionSchemes.

Control andProtectionSchemes.

Sensor input Actuator output

Ethernet lan

Fault in Environment

Page 27: Agent Technology

AgentAgent

CommunicationCommunication

Control andProtectionSchemes.

Control andProtectionSchemes.

Sensor input Actuator output

Ethernet lan

Rectification to Environment

Page 28: Agent Technology

ConclusionsConclusions

We have described the use of agents for We have described the use of agents for power systems protectionpower systems protection..

One of the most fundamental features One of the most fundamental features of an agent is its ability to of an agent is its ability to communicate. communicate.

Agent-based systems necessarily rely Agent-based systems necessarily rely on communication networks to add on communication networks to add functionality beyond what can be functionality beyond what can be achieved by traditional methods. achieved by traditional methods.

Page 29: Agent Technology

It is still far too early to predict the future of It is still far too early to predict the future of agent-based protection and control systems. agent-based protection and control systems. There are many issues that must be dealt There are many issues that must be dealt with in agent-based protection and control. with in agent-based protection and control.

Communication security, proper Communication security, proper communication protocol selection, and the communication protocol selection, and the appropriate range of applications for agent-appropriate range of applications for agent-based methods are just a few of many issues based methods are just a few of many issues that must be dealt with before agents will be that must be dealt with before agents will be ready for use in real systems. ready for use in real systems.

Page 30: Agent Technology

References;References;–[1] Coury DV, Thorp JS, Hopkinson KM, Birman KP (2000) Agent Technology [1] Coury DV, Thorp JS, Hopkinson KM, Birman KP (2000) Agent Technology Applied to Adaptative Relay Setting for Multi-Terminal Lines. Presented at IEEE Applied to Adaptative Relay Setting for Multi-Terminal Lines. Presented at IEEE Power Engineering Society Summer Meeting,Seatle, Washington.Power Engineering Society Summer Meeting,Seatle, Washington.

–[2] Coury DV, Thorp JS, Hopkinson KM, Birman KP (2000) Improving the Protection [2] Coury DV, Thorp JS, Hopkinson KM, Birman KP (2000) Improving the Protection of EHV Teed Feeders Using Local Agents. Presented at IEEE Summer Meetingof EHV Teed Feeders Using Local Agents. Presented at IEEE Summer Meeting

–[3] General Electric (2003) PSLF Manual. [3] General Electric (2003) PSLF Manual.

–[4] McLean C, Riddick F (2001) The IMS Mission Architecture for Distributed[4] McLean C, Riddick F (2001) The IMS Mission Architecture for Distributed

Manufacturing Simulation. Presented at Summer Computer Simulation Manufacturing Simulation. Presented at Summer Computer Simulation ConferenceConference

–[5] Redfern MA, Chiwaya AAW (1994) A New Approach to Digital Current [5] Redfern MA, Chiwaya AAW (1994) A New Approach to Digital Current Differential Protection for Low and Medium Voltage Feeder Circuit using a Digital Differential Protection for Low and Medium Voltage Feeder Circuit using a Digital Voice-Frequency Grade Communication Channel.IEEE Transaction on Power Voice-Frequency Grade Communication Channel.IEEE Transaction on Power Delivery vol. 9:1352-1358Delivery vol. 9:1352-1358

–[6] Samad T, Harp S, Wollenberg B, Morton B,Pires L, Brignonne S (1999) [6] Samad T, Harp S, Wollenberg B, Morton B,Pires L, Brignonne S (1999) Siimulation of Complex Systems for the Power Industry with Adaptive Agents. EPRI, Siimulation of Complex Systems for the Power Industry with Adaptive Agents. EPRI, Palo Alto, CA TR112816Palo Alto, CA TR112816

Page 31: Agent Technology
Page 32: Agent Technology