dg contribution to network security_r1.pdf

Upload: muhannad11061975

Post on 03-Apr-2018

222 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/28/2019 DG Contribution to network security_R1.pdf

    1/92

    ETSU PROJECT K/EL/00287

    NETWORK SECURITY STANDARDS

    WITH INCREASING LEVELS

    OF EMBEDDED GENERATION

    Final Report 10 August 2002

    Professors Ron Allan and Goran Strbac

    Manchester Centre for Electrical Energy

    Department of Electrical Engineering and Electronics

    UMISTManchester M60 1 QD

    ______________________________________________________________

  • 7/28/2019 DG Contribution to network security_R1.pdf

    2/92

    ETSU Project K/EL/00287 Final Report

    ________________________________

    CONTENTS

    PREFACE TERMS OF REFERENCE

    1. Programme of work

    2. Constraints and scope of project

    3. Status of report and material

    EXECUTIVE SUMMARY

    MAIN REPORT

    Part I Introduction

    1. Background

    1.1. DTI/Ofgem targets and reports

    1.2. Aims and objectives of these studies

    1.3. Structure of report

    Part II Task A

    2. Security and its achievement in distribution systems

    2.1. General aspects

    2.2. Engineering Recommendation P2/5

    2.3. Effective generation2.4. Present-day position regarding P2/5

    2.5. Guaranteed and overall standards relationship with P2/5

    2.6. Information and incentives project (IIP)

    2.7. Future development of security standard

    2.8. Recent DTI/Ofgem developments

    2.9. Concluding comments

    Part III Task B

    3. Concepts for evaluating security

    3.1. Basic approaches3.2. Levels of evaluation

    3.2.1. Level 1 data

    3.2.2. Level 2 models

    3.2.3. Level 3 results

    3.2.4. Summary of staged developments

    4. Security considerations

    4.1. Review of P2/5 as a security standard

    4.2. Assessment of effective generation

    4.3. Direct application of P2/5

    5. Deterministic studies using an updated P2/5

    5.1. Introduction5.2. Effect of availability

    2

  • 7/28/2019 DG Contribution to network security_R1.pdf

    3/92

    ETSU Project K/EL/00287 Final Report

    ________________________________

    5.3. Effect of number of units

    5.4. Effect of technology of units

    5.5. Effect of common energy source

    5.6. Effect of location

    Part IV Task C

    6. Introductory remarks

    7. Formulating and extending the P2/5 approach

    7.1. Introductory comments

    7.2. Systems studied

    7.3. Capacity outage probability tables

    7.4. Expected load lost (ELL)

    7.4.1. Constant load

    7.4.2. Variable load

    7.5. Expected energy no supplied

    7.5.1. Constant load7.5.2. Variable load

    7.6. Sensitivity study for variable load curves

    7.7. Concluding comments

    7.8. Implementation

    8. Alternative approaches

    8.1. Introduction

    8.2. Expected demand that cannot be supported

    8.2.1. Base case studies

    8.2.2. Effect of unit availability

    8.2.3. Effect of load model

    8.2.4. Comments

    8.3. Generating capacity with specified availability

    8.3.1. Base case studies

    8.3.2. Capacity that can be relied on

    8.4. Effect of network

    8.4.1. Systems studied

    8.4.2. Expected load lost or not supported

    8.4.3. Ability to support demand for proportions of time

    8.5. Implementation

    8.5.1. Expected load lost or supported

    8.5.2. Capacity that can be relied on9. Extending P2/5 concepts to frequency and duration

    9.1. Considerations

    9.2. Suggested form of a frequency criterion

    9.3. Application of the approach

    9.3.1. Class A

    9.3.2. Class B

    9.3.3. Class C

    9.3.4. Other supply classes

    9.4. Effect of load duration curve

    9.5. Benefit of embedded generation

    9.6. Implementation10. An approach compatible with the Information and Incentives Project

    3

  • 7/28/2019 DG Contribution to network security_R1.pdf

    4/92

    ETSU Project K/EL/00287 Final Report

    ________________________________

    10.1. Background and concepts

    10.2. Systems studied

    10.3. Customer minutes lost

    10.3.1. Base analysis

    10.3.2. Ability of generation to substitute circuits

    10.3.3. Credit for reduction in CML10.4. Customer interruptions and customer minutes lost

    10.5. Overall comments

    10.6. Implementation

    11. Assessment of intermittent sources and correlation

    11.1. Generator considerations

    11.2. Load and correlation considerations

    11.3. Modelling and assessment approach

    11.4. Application

    11.4.1. Wind plant

    11.4.2. CHP plant

    Part V Task D

    12. Commercial arrangements for rewarding generators

    12.1. Introduction

    12.2. Form of payment to generators

    12.2.1. Option fee

    12.2.2. Exercise fee

    12.3. Funding arrangements

    12.3.1. Payments facilitated through network regulatory asset base

    12.3.2. Payments facilitated through network operating expenditure

    12.3.3. Payments facilitated through distribution use of system charges

    12.3.4. Payments facilitated through IIP incentive scheme

    12.4. Transparency and tendering process

    12.5. Concluding remarks

    Part VI Task E

    13. General conclusions

    13.1. Summary

    13.2. Governance

    14. Recommendations

    Part VII - Appendices

    A1. Capacity outage probability tables

    A2. Expected load lost

    A3. ELL with a load duration curve

    A4. Frequency and duration indices

    4

  • 7/28/2019 DG Contribution to network security_R1.pdf

    5/92

    ETSU Project K/EL/00287 Final Report

    ________________________________

    PREFACE

    Terms of Reference

    1. Programme of Work

    The agreed programme of work had the following five main tasks:-

    Task A - To identify the issues including the strengths and weaknesses of P2/5

    particularly those associated with the effect on embedded generation and the

    impact on financial and technical risk

    Task B - To determine how the present Table 2 in P2/5 can be amended to

    accommodate present types of embedded generation

    Task C - To determine how P2/5 could be more extensively amended in the longer term

    Task D - To suggest proposals for a framework for modelling the trading of security and

    corresponding contractual arrangements

    Task E - To develop conclusions and recommendations to provide focus for further

    discussion including Governance and future involvement by all relevant parties

    2. Constraints and Scope of Project

    At the first project meeting the following constraints and scope were confirmed:-

    the output of the project would be in the public domain

    the project is a discrete piece of work and would not form part of the workstreams

    being created by the DTI/Ofgem Distributed Generation Coordination Group

    (DGCG) and the Technical Steering Group (TSG). However it was hoped and

    anticipated that the output could provide input to, and could impact on the future

    ideas of, the DGCG and the TSG

    the project was not expected to provide answers to all questions, but it should

    raise issues in order to provide an understanding of the issues and the various

    possible ways forward. Also it was not expected to solve all these ways, but to

    identify them and to discuss the merits and demerits, the implications on the

    various parties, and the possible consequences

    the interim report due at the end of April was expected to address Tasks A and B

    only.

    3. Status of Final Report and Material

    This report is the Final Report of this project and therefore all the content, including

    concepts and ideas, results, discussions and conclusions are the definitive findings of

    our studies.

    5

  • 7/28/2019 DG Contribution to network security_R1.pdf

    6/92

    ETSU Project K/EL/00287 Final Report

    ________________________________

    EXECUTIVE SUMMARY

    The overall aims of this project were to improve the understanding of security and the

    contribution that embedded generation can make, and to propose improved methods forassessing security and the embedded generation contribution.

    This report has identified and discussed weaknesses and strengths of the present

    security standard P2/5. These include the inability to take into consideration the effect of unit

    availability, number of generating units, availability of primary energy source, features of

    modern generating plant and the impact of network reliability performance. A number of

    small examples are included to expose these weaknesses. It is important to stress that, by

    using relatively simplistic extensions to P2/5, these parameters could be taken into account,

    although the underlying weaknesses of P2/5 would not be resolved. Instead, it would still

    remain a deterministic standard with all the existing demerits remaining.

    A number of alternative approaches to designing new security standards, with various

    degrees of complexity, accuracy and ability to take the inherent probabilistic nature of system

    security into account, were developed and discussed. These include approaches based on:

    (i) extending the P2/5 approach using expected load lost (ELL) and expected

    energy not supplied (EENS) as criteria

    (ii) expected demand that cannot be supported

    (iii) generating capacity that can be relied on for proportions of time

    (iv) frequency and duration criteria

    (v) customer interruptions (CIs) and customer minutes lost (CMLs).

    These approaches were conceptually developed, their application illustrated on simple

    examples and the implementation procedure outlined. For any given situation, the

    contribution that a generator makes to system security, and consequently the monetary value

    of such contribution, will be driven by the approach on which the security standards are based

    and the criterion chosen would have a significant impact on the value of the generator

    contribution to network security.

    Furthermore, a number of issues associated with the development of commercial

    arrangements for rewarding generators for their contribution to network security were

    identified and discussed. These include the form of payment (option and exercise fee),

    alternative funding arrangements, allocation of risk, transparency and tendering for networksecurity support.

    In designing new security standards, the question as to how the potential application

    of each of these approaches would affect customers, generators and DNOs, would require

    appropriate reliability assessments to be performed (technical aspect) and the framework for

    commercial arrangements formulated (commercial aspect). The final choice of the approach

    would also be influenced by the overall regulatory and commercial environment within which

    network operators are being regulated and incentivised together with commercial

    arrangements for connecting to and using distribution networks. Therefore, the update of the

    present security standards should be conducted against a well-defined context in order to

    ensure consistency.

    6

  • 7/28/2019 DG Contribution to network security_R1.pdf

    7/92

    ETSU Project K/EL/00287 Final Report

    ________________________________

    PART I - INTRODUCTION

    1. Background

    1.1. DTI/Ofgem Targets and Reports

    The Government has already set targets for renewable energy and CHP plant

    to be achieved by 2010, and have recently issued a consultation document suggesting

    targets for 20201. Because of their individual relative size, this type of plant is

    expected to be connected into the distribution network, which imposes many technical

    and commercial challenges. In addition, the new regulatory structure requires

    distribution network operators (DNOs) to facilitate competition in generation and

    supply. It follows that DNOs are entering an era in which their modus operandi is

    rapidly changing with significantly different technical and commercial pressures

    placed upon them.

    This background led the DTI and OFGEM to set up a joint Working Group 2 to

    review all the relevant issues. This reported in January 2001. It is not appropriate to

    review or summarise the WG Report in the present report, but it is appropriate to

    indicate the connection between them. The WG Report made two overall

    recommendations. Recommendation 1 stated that Ofgem should review the structure

    of regulatory incentives on DNOs in the light of the new statutory duty on DNOs to

    facilitate competition. One of the activities identified under this recommendation

    was:-

    Review and prepare guidance that will allow DNOs to intepret design and

    operational codes in such a way as to allow the contribution of embedded generation

    to network performance to be fully taken into account. A review of the codesthemselves and of the governance arrangements for distribution networks should

    follow.

    One such code is Engineering Recommendation ER P2/53 dealing with

    Security of Supply and instituted by the then Electricity Council in 1978.

    Since the WG Report was issued, ETSU has created small scale projects

    addressing several of the issues raised by the WG. UMIST was commissioned to carry

    out one of these projects, and this is the subject of this report.

    1.2. Aims and Objectives of these Studies

    It is useful at this stage to state the aims and objectives proposed by UMIST

    and which were subsequently agreed with ETSU, the project sponsor.

    The overall aims were agreed as:-

    to improve the understanding of security and the contribution that embedded

    generation can make

    1 The Energy Review. Performance and Innovation Unit, Cabinet Office,www.piu.gov.uk/2002/energy/report/index.htm2 Joint Government Industry Working Group on Embedded Generation, Report into Network Access Issues.

    Department of Trade and Industry, January 20013Engineering Recommendation P2/5, Security of Supply. The Electricity Council, October 1978. (now the

    Electricity Association)

    7

  • 7/28/2019 DG Contribution to network security_R1.pdf

    8/92

    ETSU Project K/EL/00287 Final Report

    ________________________________

    to propose improved methods for assessing security and the EG contribution.

    The objectives were agreed as:-

    to review the present issues regarding security, the present strengths and

    weaknesses with P2/5, and why these limit the contribution that EG iscurrently allowed to make

    to identify short term procedures and measures so that Table 2 of P2/5 could

    be updated very simply in order to recognise modern types of generation

    plant including renewables

    to identify longer term procedures and measures that would allow security

    standards to treat all players equitably, and allow improved design and

    operating standards to be introduced

    to identify models for establishing a market in security in order to enhance

    trading opportunities

    to support the proposals by small-scale system studies, so the significanceand scale of the problem and issues are clearly apparent.

    These general aims and objectives led to the specific Tasks stated in the

    Preface, and repeated here for completeness. Five main tasks were agreed:-

    Task A - To identify the issues including the strengths and weaknesses of P2/5

    particularly those associated with the effect on embedded generation and

    the impact on financial and technical risk

    Task B - To determine how the present Table 2 in P2/5 can be amended to

    accommodate present types of embedded generation

    Task C - To determine how P2/5 could be more extensively amended in the longerterm

    Task D - To suggest proposals for a framework for modelling the trading of

    security and corresponding contractual arrangements

    Task E - To develop conclusions and recommendations to provide focus for

    further discussion including Governance and future involvement by all

    relevant parties

    1.3. Structure of Report

    This report is divided into separate parts, each dealing with one of the mainTasks set out above. This part addresses the background and general objectives of the

    project. Part II considers Task A, that is the general aspects of security, the historical

    developments, how it is presently achieved by DNOs taking into account the

    obligations set by the Regulator and Statutes and the wishes of customers, and the

    trends currently in place for the future. Part III considers Task B, that is a

    consideration of the approaches by which Table 2 of P2/5 could be amended in the

    short term. Part IV considers Task C, which addresses a range of alternative

    approaches, including discussion of their merits and demerits and suggestions for the

    implementation of each approach. Part V deals with Task D and considers alternative

    approaches for creating a commercial framework to reward embedded generators for

    their contribution to network security. Finally Part VI summarises the information andsuggests the next steps needed to create updated security standards.

    8

  • 7/28/2019 DG Contribution to network security_R1.pdf

    9/92

    ETSU Project K/EL/00287 Final Report

    ________________________________

    PART II - TASK A

    To identify the issues including the strengths and

    weaknesses of P2/5 particularly those associated with the

    effect on embedded generation and the impact on financial

    and technical risk

    2. Security and its Achievement in Distribution Systems

    2.1. General Aspects

    The term security can mean many different things depending on the context,

    whether it is an operational situation or planning situation, and the viewpoint of the

    utility or user of the system, including suppliers and end-customers. In the case of

    distribution systems, it generally refers to the ability to maintain a connection to theend-customers and to supply them with the power level and energy demanded. This

    appears to be synonymous with the term reliability, but care is needed in this

    interpretation.

    The term reliability is nowadays very specific in its meaning, and is

    accepted to be defined by a set of probabilistic indices even if only expected (average

    or mean) values are reported or predicted. Reported indices include frequency of

    interruptions, duration of interruptions, annual unavailability, and load and energy not

    supplied. In addition there is a growing interest in determining worth of supply and

    consequently indices representing cost of interruptions perceived by both customers

    and utilities are rapidly gaining importance. These indices include information

    regarding the likelihood of interruptions (frequency and duration) as well asinformation regarding the severity of the interruptions (load and energy not supplied).

    A combination of likelihood and severity provides a true measure of risk. If only

    average values are reported or predicted, it is important to recognise that these are not

    deterministic values, should not be treated as such, and that they are associated with

    probability distributions, the shape of which may be unknown.

    It can be argued that the term security should do likewise. However this is

    not usually the case although the situation is changing and gradually moving in this

    direction. Instead, security is often measured by deterministic indices that may

    include the severity of situations but ignore the likelihood. Examples are percentage

    reserve used in spinning reserve assessment, and the n-1 or n-D criteria used in

    transmission operation and planning. The current security criteria used in distribution

    planning and operation generally have similar deterministic characteristics, including

    the current P2/5 security standard with which all DNOs are obliged to conform. This

    is a potential weakness, which is partly, but not solely, the cause of embedded

    generation not being given any or much credit for security contributions. These

    aspects are discussed in more detail in the following section of this report.

    2.2. Engineering Recommendation P2/5

    Security is, and always has been, of high priority to the electricity supply

    industry (ESI). Therefore effort has always been made at both the planning andoperational stages to ensure that security is as high as possible commensurate with the

    9

  • 7/28/2019 DG Contribution to network security_R1.pdf

    10/92

    ETSU Project K/EL/00287 Final Report

    ________________________________

    cost of achieving it. Because of the need to balance cost against the benefit, different

    distribution systems inherently possess different levels of security: the security

    generally improves with increasing voltage level, and with increasing levels of

    underground cables compared with overhead lines. Therefore transmission is

    generally more secure than distribution, and urban systems more secure than rural

    ones. In order to ensure that all customers have a minimum level of security,guidelines and standards exist.

    Prior to privatisation of the ESI, the then Electricity Council was responsible

    for setting and maintaining a range of common technical and economic requirements,

    one of which was to determine and set appropriate levels of security. In order to create

    consistency between all distribution companies existing at that time, the Electricity

    Council formulated Engineering Recommendation P2/54 in 1978. This is intended to

    be a guide to system planning and design: it is not an operational standard or guide.

    Although departures from P2/5 recommendations are permitted, these have to be

    justified using detailed risk and economic studies. Whether any such studies have

    been done remains unknown although anecdotal information suggests that these are

    likely to be few in number. Primarily P2/5 consists of two tables. Table 1 specifies themaximum reconnection times following pre-specified events leading to an

    interruption. This time is dependent on the Group Demand affected by the

    interruption. Table 2 specifies the security contribution that could be credited to any

    embedded generation. P2/5 permits this contribution to be added to the cyclic rating

    of the remaining circuits and the transfer capacity of alternative sources in deciding

    whether the Group Demand could be satisfied in accordance with the values quoted in

    Table 1. Although intended to create consistency, P2/5 can not do so for several

    reasons, the most significant being the following:-

    it specifies duration of interruptions but does not specify frequency.

    Anecdotal information suggests that frequency was intended to be part of

    the standard at one stage of development but that this was subsequently

    deleted. Some in the industry have argued that frequency is considered

    implicitly in some instances because P2/5 states that Group Demands

    greater than 60MW must be reinstated immediately, implying that,

    although a circuit outage has occurred, an interruption is not seen by the

    end-customer. However, immediately is defined, as loss of supply

    should not exceed one minute. Consequently the interruption is seen and

    customers do experience loss of supply, even if the distribution companies

    do not, and need not, count it.

    it is treated as a deterministic standard and does not account for thestochastic variations of interruptions. This is frequently misunderstood and

    some in the industry believe and stress that it is a probabilistic standard:

    this is implied in P2/5 itself. There is no doubt that the Electricity Council

    wished to take into account the probabilistic nature of system failures in a

    more formal way than existing prior to P2/5 and did in fact use reliability

    evaluation techniques and computer programs (including UMISTs

    RELNET5 program) in deciding the values to specify in Tables 1 and 2.

    However, although these values may be based on reliability evaluations,

    they are used deterministically without recognising the stochastic nature of

    4

    Engineering Recommendation P2/5, Security of Supply. The Electricity Council, October 1978. (now theElectricity Association)5

    RELNET, Reliability Evaluation of Electrical Networks. UMIST

    10

  • 7/28/2019 DG Contribution to network security_R1.pdf

    11/92

    ETSU Project K/EL/00287 Final Report

    ________________________________

    system behaviour. For example, the values are equally applicable to

    Hydro-Electric which operates in a very adverse environment and with a

    very low customer density, and to London Electricity which operates in a

    very favourable environment and with a very high customer density.

    one of the weaknesses associated with the deterministic nature of P2/5 is

    the basis of the values quoted in Table 2. This table implies that, in mostcases, 67% of the installed generating capacity can be considered as the

    effective capacity and this can be considered as the contribution which

    should be credited to the embedded generation. Very little justification for

    this is provided in P2/5. As this is at the heart of the debate regarding the

    contribution that embedded generation can make to security, this is

    discussed in more detail in the next section.

    Before considering this concept of effective generation in more detail, it is

    worth re-iterating that P2/5 is a design standard, not an operational one. The

    significance of this is very important. A design standard simply implies that, if the

    design conforms with a specified set of conditions, then the designer has satisfied thestandard. This does not mean that these conditions will be satisfied under all

    operational circumstances. If violations occur during the operational phase then

    perhaps one or more operational standards will not be satisfied, but this does not mean

    the design standard has been violated. Violations could mean that the embedded

    generation was insufficient at the time, i.e. the output was less that 67%. However it

    could also mean that insufficient network capacity was available at that time due to

    network outages being greater than that considered creditable. It follows therefore that

    a design standard is intended to minimise these violations, not necessarily to eliminate

    them.

    This does not mean that changes to the concept of design standards,

    particularly P2/5, are not warranted, quite the opposite, but it is important in putting

    the background and perspective of P2/5 into proper context.

    2.3. Effective Generation

    In the 1970s when P2/5 was developed, considerable amount of local or

    embedded generation existed in the distribution networks, this generation generally

    being that left over from the pre-nationalised industry. The main question at that time

    was whether this local generation had value in the system or should be neglected and

    declared obsolete. This provided the background logic for creating Table 2 of P2/5.However the reasoning and how the values were determined is not included in P2/5

    and little other documentation now seems to exist. Part of the reasoning is contained

    in an application report ACE Report 516 with reliability cost assessments provided in

    ACE Report 677.

    ACE Report 51 defines the effective generation contribution as the

    transmission circuit capacity which, when substituted for the generating plant in

    various generation/transmission systems, results in the same reliability of supply from

    each of these systems. No explanation is given of how this was done, although a

    6 ACE Report No. 51, Report on the Application of Engineering Recommendation P2/5, Security of Supply.

    The Electricity Council, May 1979. (now the Electricity Association)7ACE Report No. 67, Report on Reliability Investment in Radial H.V. Distribution Systems with Overhead

    Lines. The Electricity Council, March 1979. (now the Electricity Association)

    11

  • 7/28/2019 DG Contribution to network security_R1.pdf

    12/92

    ETSU Project K/EL/00287 Final Report

    ________________________________

    summary of the outcomes is provided. The report states that the availability of

    generator units was assumed to be 86% and the reliability of the circuits with which

    they are compared were considered to be perfectly reliable. The outcomes are quoted

    as the ratio of effective output to maximum output of generators. Depending on the

    set size, these ratios varied between 0.4 and 0.9. From these ratios the report

    concludes that an average ratio of 0.67 could be used, this being the value quoted inTable 2 of P2/5.

    Although this single value may be convenient for deterministically assessing

    system security, it does not take into account the fact that the ratios themselves are

    clearly variables, the availability of units can vary significantly, and lines and

    transformers with which they are compared are not perfectly reliable. Also it neglects

    the fact that a mean value is only the long-run average and this value may never be

    achievable in its own right. For example, a single unit either is capable of delivering

    full capacity or nothing, the average is only the weighted value of these two actual

    achievable levels.

    It follows therefore that the 67% is simply a level deemed to be the

    contribution that can be associated with the embedded generation. It does not meanthat this capacity level will always be available but can be considered to be available

    sufficiently frequently that violations of network reliability happen infrequently. It is

    therefore a value that can be added to the cyclic rating of the remaining transformers,

    which themselves may not always be available, or the actual capacity may be reduced

    due to adverse environmental conditions.

    However there is a tacit assumption in P2/5 that 67% of installed capacity can

    be relied on at all times. This is illusory. It also provides comfort that irrespective of

    when the original circuit outage occurs, the embedded generation will be able to

    supply 67% of its installed capacity. In reality this is not possible since it could only

    provide the capacity of available units, which could range from 100% of installed

    capacity to nothing at all. It may therefore not be possible to provide the capacity

    required to satisfy the requirements of Table 1 in P2/5.

    This aspect of effective generation is considered in more detail in Section 4.2

    during the discussion of Task B.

    2.4. Present-day Position Regarding P2/5

    P2/5 was developed prior to privatisation and the restructuring in 1990 of the

    ESI. It therefore really reflects the industry structure of the 1970s, and not that of

    today and certainly not that associated with the underlying market concepts. Despite

    this, P2/5 was incorporated without revision into the statutes dealing with theprivatisation of the industry and is now an inherent part of the licence of each DNO.

    The consequence is that it must be adhered to in all situations. This leads to several

    problems and inconsistencies in addition to those outlined above. These additional

    ones are briefly discussed below:-

    the types of generating units existing in the 1970s are different to those of

    today. P2/5 recognises two main types of plant, steam and gas turbines.

    Embedded steam plants operating on 1, 2 and 3 shifts no longer exist.

    Modern gas turbines should be more reliable. No consideration is given to

    renewables (wind, solar, water, etc), nor to CHP. Consequently the

    assumption of generating units having an availability of 0.86 is no longerjustified, gas turbines are likely to be better (may be up to about 0.95), and

    12

  • 7/28/2019 DG Contribution to network security_R1.pdf

    13/92

    ETSU Project K/EL/00287 Final Report

    ________________________________

    some renewables such as wind are likely to be much worse (perhaps less

    than 0.40). This means that the 0.67 factor used in Table 2 of P2/5 is likely

    to be inappropriate for reasons additional to those discussed above.

    the operation of generating capacity is no longer centrally controlled and

    dispatched as in the 1970s. Consequently, even if embedded generation

    exists in the distribution network suffering an interruption and this couldprovide energy to disconnected customers, there is no obligation on the

    generator to provide it. Therefore, since security is the sole responsibility

    of the DNOs, it is reasonable for DNOs to argue why should they rely on

    embedded generators which have no need to provide the cover unless they

    so wish.

    the Regulator determines the mechanism by which DNOs achieve their

    revenue stream during the price control review; this being done on a five-

    yearly cycle. Presently the current regulation process is one effectively

    based on value of assets, i.e. asset-based regulation. This process seems to

    financially encourage DNOs to increase the size of their asset base. DNOs

    are not incentivised to purchase security from some other supplier.

    2.5. Guaranteed and Overall Standards - Relationship with P2/5

    Since privatisation, the Regulator (Ofgem8, previously Offer9) has established

    two sets of operational standards, the Guaranteed Standards (GS) and the Overall

    Standards (OS). Guaranteed Standards set service levels that must be met in each

    individual case. If the DNO fails to provide the level of service specified, it must

    make a penalty payment to the customer affected. Overall Standards cover areas of

    service where it is not appropriate to give individual guarantees, but where customers

    in general have a right to expect from DNOs predetermined minimum levels of

    service. No penalty payments are made if these levels are not achieved.

    Presently the main GS from a security point of view is GS2 relating to

    restoration of supply. To ensure that inconvenience to customers is kept to a

    minimum, this GS requires companies to restore the supply within 18 (previously 24)

    hours of the company becoming aware of a fault on the distribution system.

    Additional requirements are being developed under the Information and Incentives

    Project (see Section 2.6).

    There is debate within the industry that centres on the relationship between

    P2/5 and these operational standards, and on the need for P2/5 now that DNOs are

    subject to the increasingly stringent requirements of these GS and OS. It has been

    argued in some quarters that P2/5 is no longer relevant or needed and has beensuperseded by these operational standards. This however ignores the fact that there is

    a fundamental difference between them. P2/5 is a design standard and the relevant GS

    and OS are operational standards. P2/5 therefore must be satisfied at the design and

    planning stages and ensures that all customers receive a minimum level of security.

    The ability to satisfy the relevant GS and OS however is only known after the system

    is in operation, an operational period that may be quite significant before the

    information becomes available. Consequently P2/5, or more specifically a standard

    similar to it but may be one that more truly reflects modern plant, operation and

    8Office of Gas and Electricity Markets

    9Office of Electricity Regulation

    13

  • 7/28/2019 DG Contribution to network security_R1.pdf

    14/92

    ETSU Project K/EL/00287 Final Report

    ________________________________

    structural aspects, is required if DNOs are to remain committed to obligations set by

    the Regulator.

    2.6. Information and Incentives Project (IIP)

    Ofgem are currently discussing a series of proposals with the industry thatcome within a project, which the Regulator has defined as the Information and

    Incentives Project (IIP). The basis of the project and its possible impact on P2/5 and

    any future enhancement of this security standard is worthy of reflection.

    All DNOs are required to report certain performance figures annually to the

    Regulator. These enable Ofgem to publish the annual Security (number of customer

    interruptions, CI) and Availability (number of customer minutes lost, CML)

    performance figures for each DNO. Although published and DNOs compared, these

    performance figures do not relate to any GS, and therefore are not associated with any

    penalty payments. Also they are not directly linked to the price control. The only

    security related GS is the time for reconnection of supply following an interruption.

    Through the IIP, the Regulator is proposing to increase the amount of information thata DNO must provide on an annual basis, and to extend the use of this information.

    As discussed in Section 2.4, the current regulation process is one based on the

    value of assets, i.e. asset-based regulation. This concept is being reviewed within the

    IIP with the intention of not only extending the information that must be provided, but

    also linking the network performance to the price control and thus moving towards a

    regulation process based on performance, i.e. performance-based regulation.

    Also as part of this IIP, Ofgem is intending to extend GS and OS to include

    interruption frequencies, with a GS requirement that no customer should experience

    more than a specified number of interruptions, a value that is not yet finalised. This

    would mean that P2/5 would have less requirements than the GS, a situation which

    itself may mean there is a need to review and revise P2/5.

    2.7. Future Development of Security Standard

    It is evident that, although P2/5 exists and is an integral part of the licence

    under which each DNO operates, it has many weaknesses. This is generally

    recognised within the industry. One of the most recent occasions when this problem

    was addressed and exhaustively discussed by all players in the industry (DTI, Ofgem,

    DNOs, generators, suppliers, customers), was by the DTI/Ofgem Working Group on

    Embedded Generation Network Issues10. It would not be appropriate to reproduce or

    specifically summarise the EGWG Report, but the Main Report and Annex 2 containseveral important concerns and issues which relate to the present dilemmas and

    suggestions for the future direction of security standards, particularly with respect to

    embedded generation. The following brief points are gleaned from this report, not to

    provide a comprehensive summary, but to indicate the thoughts within the minds of

    those participating in the discussions:-

    both DNOs and generators agree that the current regulatory framework

    inhibits DNOs taking account of the contribution that embedded

    generation could make to security.

    10Joint Government Industry Working Group on Embedded Generation, Report into Network Access Issues.

    Department of Trade and Industry, January 2001

    14

  • 7/28/2019 DG Contribution to network security_R1.pdf

    15/92

    ETSU Project K/EL/00287 Final Report

    ________________________________

    both DNOs and generators agree that there could be material benefits from

    the contribution that could be made by embedded generation, that this

    contribution to security has value to DNOs and that this value should be

    rewarded.

    both DNOs and generators agree that there is a need to review P2/5

    particularly regarding Table 2. One point of consensus is that a guidancenote should be agreed to supplement the treatment of the Effective

    contribution of generation to network capacity paragraphs in Section 3 of

    P2/5.

    embedded generators consider that any review should move towards a

    more probabilistic approach.

    DNOs consider that any review of P2/5 should take into account the

    diverse nature of current embedded generation as well as the obligation

    and risks that DNOs carry for maintaining security.

    DNOs consider that any method of assessing and valuing security

    contributions must be transparent.

    It follows from the above points that the industry is now willing to review

    P2/5, particularly with respect to embedded generation. However there remains a

    hesitance to establish a major review of the bulk of P2/5, despite acceptance that a

    number of weaknesses exist. One reason for this, which is understandable, is that the

    time required for conducting a major review and obtaining universal agreement could

    be substantial. On the other hand a short review only of Table 2 and its implications

    could be achieved very much more quickly. The EGWG Report recognises this

    dilemma and suggests that the review of Table 2 should then be associated with an

    early deliverable, with the full review and more extensive studies dealt with

    subsequently. On the basis of current knowledge, the future of P2/5 can be anticipated

    as follows:

    in the immediate future, no changes are likely to occur because of the need

    to obtain the agreement of all players in the industry and the difficulties of

    achieving this. This time-scale is likely to be at least 1-2 years

    in the intermediate future, the likely change is an enhancement of Table 2

    of P2/5. This would logically centre on extending the types of generating

    units considered and modifying the effective contributions that could be

    associated with each of these. The likelihood is that the industry players

    would wish these to be based on those underpinning the values in the

    current P2/5 - the debate however may centre on the difficulty of knowingexactly or even approximately how this was done. Although the EGWG

    anticipated that a target date of January 2003 would be possible, this is

    likely to slip

    in the more long-term, a view is that a more extensive review of the basis

    of P2/5 is required. This would be two-part. One part would be to review

    the underlying concepts of P2/5 with the intention of replacing Table 1 and

    enhancing the criteria. The other part would be to review the method of

    assessing the benefit that embedded generation could make to security.

    Both parts would need to address the probabilistic issues. A possible date

    for achieving this remains difficult to predict because it requires an

    agreement to proceed, and an agreement of the approach to be used. It isnot likely to happen within the next 3-5 years.

    15

  • 7/28/2019 DG Contribution to network security_R1.pdf

    16/92

    ETSU Project K/EL/00287 Final Report

    ________________________________

    2.8. Recent DTI/Ofgem Developments

    Since the EGWG Report was published, several developments have taken

    place at both the DTI and Ofgem. These include a Consultation Document11 issued by

    Ofgem and a joint DTI/Ofgem Workshop12

    organised by ETSU and UMIST.The Consultation Document in particular is of considerable interest since it

    outlined and summarised the current views and responses of Ofgem to the outcomes

    and proposals of the EGWG Report. The document covers many issues relating to the

    future pricing and incentivising of DNOs with respect to embedded generation, but

    only the points specific to the thrust of this report are highlighted. The following

    statements, extracted from the Consultation Document, are relevant and are worth

    noting:-

    Replacing investment in a relatively reliable network with investment in

    generating plant that may be less reliable could constitute a disbenefit

    During the period July 2001 to January 2002, we plan to participate inwork on: consideration of changes that might usefully be made to

    Engineering Recommendation P2/5

    In the current framework, DNOs are probably right to argue that there is

    no profit for them in connecting embedded generation

    DNOs can argue that existing and planned technical requirements act as

    disincentives to the connection of embedded generation

    DNOs are required, by their licences, to design networks in accordance

    with Engineering Recommendation P2/5. Reliance on embedded

    generation rather than on network reinforcement could breach P2/5

    In the longer term, it might be possible to review P2/5. Ofgem will be

    discussing the possibilities with other interested parties

    Ofgem notes that meeting IIP requirements will be a major concern for

    DNOs when considering embedded generation

    There are two specific implications that can be extracted from these

    statements. Firstly, Ofgem seems to recognise the difficulties that DNOs have with

    regard to embedded generation in the current climate and regulatory regime.

    Secondly, the time-scale by which changes to P2/5 may be made seem to be long term

    rather than short term, thus no immediate revisions to any part of P2/5 are imminent.

    The purpose of the Workshop was to respond to the proposals made by the

    EGWG, to identify possible work programmes, and to establish priorities and timeschedules. It was not intended to propose changes to the proposals, nor did it do so.

    However it reflected on these in light of the Ofgem Consultation Document.

    11

    Ofgem, Embedded Generation: Price Controls, Incentives and Connection Charging. A PreliminaryConsultation Document, September 200112

    DTI/Ofgem Joint Workshop on Embedded Generation, Stratford-on-Avon, 1-2 October 2001

    16

  • 7/28/2019 DG Contribution to network security_R1.pdf

    17/92

    ETSU Project K/EL/00287 Final Report

    ________________________________

    2.9. Concluding Comments

    At this point in time, the following aspects and issues are applicable regarding

    security and P2/5:-

    P2/5 as published in 1978 remains in force DNOs are compelled to comply with this version of P2/5 under their licence

    DNOs must design to the maximum interruption times specified in Table 1

    DNOs may, if they wish and can agree conditions, give some credit to the

    contribution that embedded generation could make to security

    this contribution would need to be based on the capacities specified in Table 2

    there is a mood within the industry for a review of Table 2, but no decision as

    to how has yet been proposed

    there is less inclination in the industry for a more radical review of P2/5

    the implication of recent Ofgem consultations is that no immediate changes

    are likely to be made to P2/5 in our opinion, this could lead to the following concerns:

    simple changes to the values in Table 2 leaves the underlying problem that

    the values in this table are only average values

    because no-one can guarantee that these average values would be available

    as actual values at all times, DNOs would still be inclined to ignore this

    possible contribution

    the weaknesses existing in the bulk of P2/5 would remain, including no

    association with frequency of interruptions and no recognition that systems

    behave stochastically.

    17

  • 7/28/2019 DG Contribution to network security_R1.pdf

    18/92

    ETSU Project K/EL/00287 Final Report

    ________________________________

    PART III - TASK B

    To determine how the present Table 2 in P2/5

    can be amended to accommodate present typesof embedded generation

    3. Concepts for Evaluating Security

    3.1. Basic Approaches

    In order to consider the principles underpinning P2/5 and to consideralternative approaches, it is first necessary to define the principle of the modelling

    procedure. This is shown schematically in Figure 1.

    data 1 data 2 data 3 . etc

    model 1 model 2 model 3 . etc

    result 1 result 2 result 3 . etc

    level 2

    level 1

    level 3

    Figure 1 - Hierarchical levels in the modelling procedure of security contribution

    This figure illustrates the hierarchical structure of the modelling procedure.

    The principle is that a set of input data is selected from known or unknown

    information (level 1), which is then processed using some defined model that reflects

    system behaviour (level 2), into a set of output data generally called results (level 3).

    It is important to recognise that these three levels apply equally to every type of

    system analysis, including security assessment, and is nothing more than data

    processing albeit a complex process. The essential problems in such processing is

    whether the data is known or known with sufficient certainty, whether a processing

    model can be developed with sufficient accuracy to reflect all system effects, and

    whether the results and assumptions embedded within them are fully recognised by

    decision makers and therefore used appropriately. One or more of these steps are

    frequently performed using significant approximations and simplifications. These are

    discussed in the following sections with respect to security assessment.

    18

  • 7/28/2019 DG Contribution to network security_R1.pdf

    19/92

    ETSU Project K/EL/00287 Final Report

    ________________________________

    3.2. Levels of Evaluation

    3.2.1. Level 1 - Data

    Level 1 could be expected to include such data as the number of units, the type

    of units, the availability of units, the system demand levels, and similar aspects. Sincesome of these are stochastic in nature, e.g. unit availability and system demand, it

    could also be expected that the probabilistic nature of these should be specified,

    perhaps in terms of average values, variances or probability distributions.

    In P2/5 however, the unit types are limited to conventional steam plant and gas

    turbines, and the availability of each set is fixed as 86%. Conventional steam plant no

    longer exists in distribution systems, and a single value of unit availability does not

    recognise the considerable variation that exists with modern generating plant. These

    are two of the main weaknesses of P2/5, as discussed in Section 2.4, and are likely to

    be two of the most significant reasons why DNOs and others remain reluctant to use

    P2/5 for assessing the contribution that could be made by embedded generation.

    In reality it can be argued that gas turbines do form part of modern embeddedgeneration and, since P2/5 does not include any restrictions or assumptions about such

    plant, the values included in P2/5 applicable to gas turbines could be used by DNOs

    without violating any of their licence conditions. The only logical reason why such

    applications are not done is because of uncertainty whether this argument is legally

    valid and because DNOs remain responsible for ensuring the required security levels,

    not a third party such as an embedded generator.

    The present studies address these weaknesses and take into account the

    stochastic variations that exist in the system attributes. These extensions however are

    included sequentially, rather than including them all simultaneously. The attributes to

    be considered are: unit availability, number of units, technology (gas, wind, etc),

    common source, and location.

    3.2.2. Level 2 - Models

    Modelling the process is the most complex part of the procedure and the most

    frequent cause of inappropriate results. In order to make the process tractable, or as

    easy and as straightforward as possible, simplifications and approximations are often

    made. Sometimes these have to be done because the exact system behaviour is not

    known or cannot be modelled. Such assumptions must be quantified and the impact of

    these should, if possible, be assessed by sensitivity studies. However simplifications

    and assumptions are also made in order to simply reduce the complexity of theevaluations. Downsizing of companies have resulted in some skill levels, particularly

    those that are used infrequently, being reduced or even eliminated. Therefore the

    ability for companies to perform complex analyses may no longer exist in certain

    areas. This is enhanced by companies expecting employees to be more generalist

    rather than specialist. Two of the most simplistic approaches are the use of look-up

    tables and the use of spread-sheet assessments.

    Look-up tables only require knowledge of some specified input data or

    information, and the result is found directly from the table. P2/5 clearly comes into

    this category. There is no suggestion that the look-up values quoted in P2/5 were

    not deduced by extensive evaluations, nor that the values are not appropriate for the

    set of input data and information specified. Extensive studies were certainly done bythe Electricity Council in the 1970s, although the procedures used have become lost

    19

  • 7/28/2019 DG Contribution to network security_R1.pdf

    20/92

    ETSU Project K/EL/00287 Final Report

    ________________________________

    with the passage of time. The weakness however is that the values then become

    rigidly fixed in time and are used deterministically.

    This is the present position with P2/5. It is fully understandable why such a

    position has been reached. Firstly, it is easy to demonstrate that a deterministic

    standard has or has not been satisfied. Secondly, uncertainty about the impact of a

    new set of standards deters the ready acceptance of such developments.These studies are staged in the usage of additional modelling:-

    Task B retains the methodology used in the original development of P2/5,

    at least as far as it is possible to decipher this. Therefore this addresses the

    problem deterministically and provides an approach for producing a

    suitable set of values, these values then being treated deterministically. It

    must be recognised that these values retain all the erroneous characteristics

    that the values in P2/5 possess. The essential difference between updated

    values and the previous ones is that the updated ones would reflect

    present-day attributes. The models used to obtain these values are based on

    probabilistic techniques and the values are therefore underpinned by

    consistent probability theory. However the results are then tabulated in theform of look-up tables. This Task is considered in this part of the report.

    Task C will extend the security assessment into a more substantial

    probabilistic domain with the intention of creating a more objective

    consideration of the contributions that embedded generation could make to

    security. Because of its stochastic nature, these considerations will be

    based more soundly on probabilistic approaches. The framework of

    assessment is likely to be more complex. One framework could structure

    the methodology on spread-sheet evaluations in which the elements are

    evaluated using probability theory and equations. Consequently, no

    predefined values would exist. Instead the user would identify appropriateattributes, choose these from options or input their values, and the spread-

    sheet elements would calculate the appropriate result. The second

    framework could structure the methodology on a sequence of theoretical

    equations and techniques, probably defined in terms of an algorithm. The

    benefit of this approach is that it would be completely flexible, and could

    be structured to reflect any system configuration, plant operation scheme

    and commercial agreement. This Task however is beyond the scope of this

    Interim Report, but is discussed in a little more detail in Section 7.

    3.2.3. Level 3 - Results

    The values of the output results clearly reflect the input data and the

    evaluation approach and theory. The range of results reflect the need within the

    decision making process. The output results quoted in Table 2 of P2/5 are the

    percentage of capacity that can be credited to the embedded generation. This is very

    restrictive, but evidently was sufficient for the purposes proposed for P2/5 in the

    1970s. Task B in these studies retains this restriction in order to be compatible with

    the constraints and structure of P2/5. However Task C extends this concept

    conceptually to a range of possible values including the possibility of addressing

    frequency of interruptions (i.e. Security or CIs) and duration of interruptions (i.e.

    Availability or CMLs). This would make any derivative of P2/5 more compatible with

    Ofgems IIP.

    20

  • 7/28/2019 DG Contribution to network security_R1.pdf

    21/92

    ETSU Project K/EL/00287 Final Report

    ________________________________

    3.2.4. Summary of Staged Developments

    The above discussion can be summarised as illustrated in Table 1.

    Table 1 - Summary of the scope in Task B and Task C

    Task Input data Model Results

    B to reflect present-

    day plant and

    attributes

    using P2/5 approach P2/5 format and scope

    presented as look-up table

    C to reflect present-

    day plant and

    attributes

    using probability

    theory, models and

    techniques

    extended set of output results and

    scope that could be presented as

    Look-up table

    spread-sheet format

    algorithmic theory

    4. Security Considerations

    4.1. Review of P2/5 as a Security Standard

    The underlying concept of security is that there should be sufficient

    connections and capacity in the system such that, when an outage event occurs,

    customers are able to continue receiving a supply or have it restored within anacceptable time period. The minimum level of security for different Group Demands

    are those specified in Table 1 of P2/5, and these must be achievable by licence and

    statute. There are various ways in which these levels can be achieved:-

    increasing the capacity of existing circuits

    constructing additional circuits

    using embedded generation to replace the capacity of circuits on outage.

    All three options are permitted by P2/5. The amount can easily be determined

    through power flow studies in the case of the first two options, i.e. those associated

    with circuit capacity and, in principle, from a simple comparison with Table 2 in thecase of the third option. The latter is the focus of these studies and therefore only this

    is addressed in this report.

    This is a relatively straightforward consideration using P2/5 because the only

    data required is the type of units and the capacities of each unit. P2/5 has an identified

    Type of Generation defined as Gas Turbine Units. These are not qualified in any way

    and a simple reading and interpretation of P2/5 would suggest that the values quoted

    in P2/5 could be used for any gas turbines. The debate for and against this are:-

    For - since the type of gas turbine is not qualified in P2/5 and the licence

    permits Table 2 to be used, then the licence will be satisfied if the values

    given in P2/5 are adhered to without amendment

    21

  • 7/28/2019 DG Contribution to network security_R1.pdf

    22/92

    ETSU Project K/EL/00287 Final Report

    ________________________________

    Against - although there may not be any qualifications given for gas

    turbines in P2/5, it is only reasonable to note that P2/5 was written in the

    1970s and modern gas turbines are likely to be different to those available

    at that time. Therefore it is unreasonable to continue using values

    determined in the 1970s for units being used in the 2000s

    The dilemma in this debate is that both points are true, although seemingly

    diametrically opposite. The distinction is solely whether one adheres rigidly to P2/5

    and the licence requirements, or whether one adds the qualification, is this adherence

    now reasonable?

    This section however is concerned only with reviewing the outcome of P2/5 if

    it is used without modification. In this case, the security levels must conform with the

    requirements of P2/5.

    Table 1 of P2/5 specifies the minimum Demand that must be met after certain

    specified circuit outages. This level is dependent on the Group Demand or Class of

    Supply. The amount of demand that can be supplied depends on the available circuit

    capacity and the amount of generation capacity that can be credited. In the latter case,this can be assessed from Table 2 of P2/5. This table indicates that the effective

    contribution of most units is 67% of its declared net capability, and that this

    contribution should be restricted to supplying that part of the demand which is not

    required to be supplied immediately following the first circuit outage.

    It is therefore necessary to determine the net capability of the embedded

    generation, i.e. the capacity that could be provided to the network in terms of security,

    which would then be weighted by the specified 67%. In many cases net capability will

    be the rating of the units, in which case the only required knowledge is the capacity

    and number of units. If restrictions are set by the generator owner or operator then, in

    addition, knowledge of the export agreements would be needed. The main problem is

    with CHP plant since the primary purpose of such plant is to supply local heat,

    electrical energy being a by-product. Because of this, the available electrical energy

    will be dependent on the amount of steam required at any time, and this may be less

    than that needed to produce the required electrical capacity levels. This problem is

    discussed separately later but briefly the effect could be dealt with by considering

    variation in the available capacity levels and therefore in the value of unit capability.

    4.2. Assessment of Effective Generation

    As discussed in Section 2.3, P2/5 was developed when the embedded

    generation that existed in the distribution networks was generally that left over fromthe pre-nationalised industry, and the main question was whether this local generation

    should be neglected and declared obsolete. Table 2 of P2/5 assisted in this decision

    making. However the only reasoning of how the values were determined is contained

    in the application report ACE Report 5113 with reliability cost assessments provided

    in ACE Report 6714.

    Since ACE Report 51 seems to be the only definitive document presently

    available that quantifies the reasoning behind the values specified in P2/5, it is

    appropriate to consider this report in some detail. The most significant part appears to

    13 ACE Report No. 51, Report on the Application of Engineering Recommendation P2/5, Security of Supply.

    The Electricity Council, May 1979. (now the Electricity Association)14ACE Report No. 67, Report on Reliability Investment in Radial H.V. Distribution Systems with Overhead

    Lines. The Electricity Council, March 1979. (now the Electricity Association)

    22

  • 7/28/2019 DG Contribution to network security_R1.pdf

    23/92

    ETSU Project K/EL/00287 Final Report

    ________________________________

    be Appendix A3 of ACE Report 51 headed Comparison of Generation and

    Transmission/Distribution Firm Capacity, and it is therefore worthy to quote the

    relevant paragraphs. These are:-

    The effective generation contribution was estimated by determining the

    transmission circuit capacities which, when substituted for the generating plant in

    various generation/transmission systems, would result in the same reliability ofsupply from each of these systems. This substituted capacity was considered as the

    effective generation contribution; the ratio of effective output to maximum output

    was determined in each case. For the various combinations of generators and

    transmission circuits examined, the ratio of effective output to maximum output of

    generators was not constant, but varied mainly as a function of the ratio of generator

    unit size to the transmission circuit capacity. Thus, where the set size was about one

    quarter of the circuit size the ratio ranged between 0.8 and 0.9; with set sizes of one

    half the circuit size the ratio ranged between 0.7 and 0.8, and with set sizes equal to

    the circuit size the ratio ranged between 0.4 and 0.5. It should be noted that

    throughout these studies a winter-time average availability of generation of 86% was

    assumed.Based on an examination of networks with local generation, it was decided

    that for the purpose of developing Table 2 of P2/5 a factor of two-thirds for the ratio

    of effective output to maximum output could be adopted.

    The following comments and critical assessments can be made:-

    the effective generation contribution is defined as the transmission circuit capacity

    which, when substituted for the generating plant, results in the same reliability of

    supply.

    no explanation is given of how this was done, what the combinations of

    generation and transmission were, or what the same reliability of supply

    means. Presumably the transmission capacity and generating plant capacity are

    the total capacities in each case, in which case the total generating capacity

    will be greater, perhaps much greater, than the total circuit capacity. Although

    the reliability parameter is not specified, it was possibly expected energy not

    supplied since this was one output parameter of the REFOS program15 stated

    to be used in the studies.

    several studies have been performed during this project but it has not been

    possible to replicate the values given in ACE Report 51. The main problem is

    that the reliability of supply (e.g. expected energy not supplied) depends on

    whether a load duration curve or a fixed loading level is used, and the value ofpeak load compared with the installed generation capacity. This information is

    not provided.

    a solution to this problem requires extensive system studies, which are out of

    range of the scope of this project. However they could be done given

    appropriate time and resources.

    instead the basic concept of P2/5 is used in this project in order to establish the

    important issues and to identify appropriate approaches and procedures

    15

    REFOS: CEGB CS/C/P205. This program is said to perform a risk evaluation of parallel connectedtransmission circuits and apparently calculates the expected annual outage time for which the demand at asupply point will exceed the available capacity, and the energy lost

    23

  • 7/28/2019 DG Contribution to network security_R1.pdf

    24/92

    ETSU Project K/EL/00287 Final Report

    ________________________________

    one of the most significant points is that the values of 0.4 to 0.9 are the ratios

    between the effective generation (equivalent to the circuit capacity) and the total

    generation capacity. This provides the following information for the case when a

    transmission line is used in comparison with a group of generators:-

    assume all generating units in the group are identical and of equal size in each

    of the following cases, and let:set size = SS

    circuit capacity = CC

    total generation = TG

    ratio of effective generation to maximum generation = R

    number of generating units = n

    then:

    R = CC/TG = CC/n.SS

    when SS equals CC, R = 0.4 - 0.5. This implies that the number of generating

    units lies between 2 and 2.5, on average.

    when SS equals one half of CC, R = 0.7 - 0.8. This implies that the number ofgenerating units lies between 2.5 and 2.9, on average.

    when SS equals one quarter of CC, R = 0.8 - 0.9. This implies that the number

    of generating units lies between 4.5 and 5, on average.

    the value of two-thirds (0.67) is stated to be the average of the range of ratios

    between 0.4 and 0.9. However, how this average was calculated is not explained.

    Although the single value of 0.67 may be convenient for deterministically

    assessing system security, it does not take into account the fact that the ratios

    themselves are clearly variables, the number of units varies, the availability of

    units can vary significantly, and lines and transformers with which they are

    compared are not perfectly reliable. Also it neglects the fact that a mean value isonly the long-run average and this value may never be achievable in its own right.

    For example, a single unit either is capable of delivering full capacity or nothing,

    the average is only the weighted value of these two actual achievable levels.

    there is a tacit assumption in P2/5 that 67% of installed capacity can be relied on

    at all times. This is illusory. It also provides comfort that irrespective of when

    the original circuit outage occurs, the embedded generation will be able to supply

    67% of its installed capacity. In reality this is not possible since it could only

    provide the capacity of available units, which could range from 100% of installed

    capacity to nothing at all. It may therefore not be possible to provide the capacity

    required to satisfy the requirements of Table 1 in P2/5. The significance and a

    balanced perspective of this is discussed in more detail in Sections 2.2 and 2.3.

    4.3. Direct Application of P2/5

    Direct application of P2/5 is straightforward. All that is required is to identify

    the types of units in the system, assume these conform with P2/5 and have a

    corresponding effective contribution of 67%.

    Example 1.1 Consider four units each of 60MW capacity

    Total Effective Contribution = (4 x 60) x 0.67= 160.8 MW

    24

  • 7/28/2019 DG Contribution to network security_R1.pdf

    25/92

    ETSU Project K/EL/00287 Final Report

    ________________________________

    Example 1.2 Consider 30 units each of 1MW capacity

    Total Effective Contribution = (30 x 1) x 0.67

    = 20.1 MW

    Example 1.3 Consider a single unit of 60MW capacity and 30 units each of 1MWcapacity

    Total Effective Contribution = (1 x 60 + 30 x 1) x 0.67

    = 60.3 MW

    Note: a) These examples assume that all the units considered conform with P2/5.

    5. Deterministic Studies Using an Updated P2/5

    5.1. Introduction

    In order to understand how P2/5 might be updated, the current restrictions and

    assumptions must be recognised. The assumptions underpinning P2/5 are the

    following:-

    P2/5 assumes that units have an availability of 0.86. {It is likely that many

    modern units, e.g. gas turbines, have availabilities greater than 0.86, and

    other units, e.g. wind turbines, have availabilities much less than 0.86.

    How much greater or less is difficult to assess, as data concerning these

    values are often difficult to obtain. The main current reason is that most

    generating companies treat this information as commercially confidential.

    Therefore all values used in these studies are estimated and it has proved

    useful to perform a series of sensitivity studies and to observe the effect of

    changes in the values of the availabilities - It will be essential for

    transparency of data to be established}.

    gas turbines in the 1970s were usually installed for security or system

    support purposes. They were controlled centrally and were available on

    demand. {Gas turbines and other units in the 2000s are owned by private

    generating companies who operate them according to commercial

    principles. They are frequently operated as CHP plant, when their primary

    purpose is to supply heat and energy to local sites, with external system

    support being of secondary importance. Therefore they may not beavailable for system security and support on demand unless a commercial

    agreement has been established between the generating company and the

    relevant DNO in advance. This is rarely, if ever, done at present - It will

    be essential for commercial agreements to be reached}

    the capability of gas turbines in the 1970s was usually equal to the rated

    capacity since their primary purpose was to provide system support. {The

    capability of gas turbines and other units to support the system in the

    2000s may be less, or much less, than the rating if only part of the

    capability is available on demand because of the need to maintain

    capacity for their primary function of CHP plant - It will be essential for

    available capacity to be declared and provided when required}

    25

  • 7/28/2019 DG Contribution to network security_R1.pdf

    26/92

    ETSU Project K/EL/00287 Final Report

    ________________________________

    These considerations imply the following:-

    the availability of modern units may be greater than those of the 1970s and

    therefore their effective contribution would also be greater

    the availability of modern units may be less, even much less, than those of

    the 1970s and therefore their effective contribution would be less the net capability of modern units may be less as a percentage of installed

    capacity due to operational practices and therefore their effective

    contribution could also be less,

    and that the following attributes are not considered explicitly or in most

    instances not even implicitly:-

    the effect of unit availability

    the effect of number of units

    the effect of a wide range of unit technologies

    the effect of common energy source

    the effect of location of units

    All of these aspects need to be taken into account. This requires knowledge of

    the relationship, if one exists, between the unit availability and the effective capacity

    as deduced by the Electricity Council in the 1970s. Since the methodology is not, to

    the authors knowledge, described in any public document, this is virtually impossible

    to determine. Instead various approaches that seem compatible with the outcome of

    P2/5, have been tried and several assumptions have been made. These are described in

    the following application studies. The attributes are studied sequentially as follows:-

    the effect of unit availability

    the effect of number of unitsthe effect of technology of units

    the effect of common energy source

    the effect of location of units.

    It is important to note at this point that the following considerations and

    examples have significant assumptions and approximations embedded within them.

    These are clearly indicated within the text. The results are therefore not intended to be

    exhaustive nor firm proposals, only indicative of the variations that may exist and the

    approaches that may be used. Consequently they illustrate the underlying principles

    and the impact that may be observed if the input values and modelling procedures

    used to produce them more truly reflect the parameters of modern generating plantand operational strategies.

    In order to produce more precise results, agreement is required between all the

    players on the values of relevant input data and on the relationship between them. In

    addition, a more exhaustive set of studies is needed than is possible in this short

    exploratory study.

    5.2. Effect of Availability

    P2/5 assumes all units have an availability of 86% and that such units make an

    effective contribution of 67% of declared net capability. The first step in updating

    26

  • 7/28/2019 DG Contribution to network security_R1.pdf

    27/92

    ETSU Project K/EL/00287 Final Report

    ________________________________

    P2/5 is to allow flexibility in the value of availability. In order to deduce a possible,

    but simplistic relationship, the following corresponding values are known or can be

    assumed. A unit availability of 86% corresponds to an effective capacity of 67%, as

    given in P2/5. It seems reasonable to assume that unit availabilities of zero and 100%

    correspond to effective capacities of zero and 100% respectively. From a plot of these

    three points, one can interpolate the values of effective capacities that correspond to arange of unit availabilities. These are shown in Table 2.

    Table 2 - Effective generation contribution as function of unit availability

    unit availability

    %

    effective contribution

    %

    25

    35

    40

    5060

    70

    80

    86 - P2/5

    90

    95

    99

    12

    17

    20

    2836

    46

    58

    67

    75

    85

    98

    It is evident, as would be expected, that the effective contribution of the

    embedded generation increases as the unit availability increases. The main questionsthat follow are:

    what value of availability is reasonable?

    is the assumed relationship reasonable?

    is the approach used (as per P2/5) reasonable?

    There are no simple answers to these questions but the following comments

    are pertinent:-

    the limited data that exists concerning unit availabilities of gas and steam

    turbines suggests that a value in the vicinity of 0.90 - 0.95 could be consideredreasonable

    since the approach used in P2/5 is not described in any public document, it is

    not possible to be prescriptive as to whether the relationship between

    availability and effective capacity given in Table 2 complies with the approach

    used in the 1970s. However it is not likely to be greatly distant from the

    reality. Therefore the capacity credit that appears to be implicit from these

    results is probably fairly consistent with the approach, and that the values

    given are indicative of the improvements gained from modern types of units.

    A more important and dubious point is whether the approach itself is

    reasonable - the third question listed above.

    the approach used in this section is essentially the same as that used in P2/5. Ittherefore has all the weaknesses associated with the underlying concepts of the

    27

  • 7/28/2019 DG Contribution to network security_R1.pdf

    28/92

    ETSU Project K/EL/00287 Final Report

    ________________________________

    P2/5 approach. Most of these have been discussed before but need to be

    highlighted once again:

    it assumes that a constant value of effective generation can be used

    irrespective of number of units and availability of units. This is known

    to be incorrect

    it tacitly assumes that this effective generation (credit value) isconstant at all times and neglects the fact that units can be in one of

    several states, including complete failure

    the credit value is only the long-run average value, and in some cases

    can not itself be achieved. For example, a single unit is either up and

    working or down and not working: it is never in the average output

    state

    these assumptions can give a false sense of security. They imply that a

    demand of this level can be restored at all times irrespective of any

    other system situation, whereas in reality a demand greater than this

    level may be restored but at other times a demand maybe much less

    than this is possible. The only other alternative is the use of anapproach based on probabilistic assessment.

    Application of this enhancement to P2/5 is straightforward. All that is required

    is to identify the types of units in the system, select an appropriate value of

    availability, and then to look up the corresponding effective contribution.

    Example 2.1 Consider four units each of 60MW capacity and availability of 90%

    Total Effective Contribution = (4 x 60) x 0.75

    = 180 MW

    Example 2.2 Consider 30 units each of 1MW capacity and availability of 40%

    Total Effective Contribution = (30 x 1) x 0.20

    = 6 MW

    Example 2.3 Consider a single unit of 60MW capacity and availability of 90% and

    30 units each of 1MW capacity and availability of 40%

    Total Effective Contribution = (1 x 60) x 0.75 + (30 x 1) x 0.20

    = 51 MW

    Notes: a) These examples assume that the effective contribution is only affected by

    the unit availability and not by the number of units.b) The effective contribution of Example 2.1 is greater than that of Example

    1.1, but that of the other two examples move in the opposite direction,

    reflecting the relative changes in the percentage credit with unit availability.

    c) These results are illustrative only and would need more extensive studies

    in order to confirm actual and appropriate values

    5.3. Effect of Number of Units

    P2/5 assumes that each unit of a group contributes 67% of its capacity

    irrespective of the number of units in the group. In fact, as discussed in Section 4.2,ACE Report 51 concludes this value to be an average value only and that, depending

    28

  • 7/28/2019 DG Contribution to network security_R1.pdf

    29/92

    ETSU Project K/EL/00287 Final Report

    ________________________________

    on the set size, the actual value varies between 0.4 and 0.9. Also as illustrated in

    Section 4.2, these ratios depend on the number of units, although ACE Report 51 is

    not explicit, or even implicit, in this respect. In order to reflect this effect, it is

    necessary to consider the outcome of the ACE Report 51 studies in a little more detail.

    The results included in Section 4.2 imply that, if all units of a group are

    identical, which may not have been the case in the development of P2/5, and each hasan availability of 86%, then:-

    effective contribution = 0.4 - 0.5 if number of units is between 2 and 2.5

    = 0.7 - 0.8 if number of units is between 2.5 and 2.9

    = 0.8 - 0.9 if number of units is between 4.5 and 5.

    Using these results, a plot of effective generation contribution as a function of

    number of units can be plotted. This proved to be a difficult task because of the

    limited information and the significant scatter in the values. This indicates the need

    for a more extensive set of studies and a known and consistent approach for

    determining the same reliability of supply. However the results are sufficient toillustrate the effect of number of units and to demonstrate a possible approach. On the

    basis of these results, the Effective Generation ratios for units having an availability

    of 86% are shown in Table 3. If similar characteristics are constructed for effective

    contribution as a function of number of units but for different unit availabilities, then

    the effect of number and availability can be observed. Such plots were drawn, from

    which the results shown in Table 3 for unit availabilities of 40% and 90% were

    deduced.

    Although no categorical assurance can be given to the preciseness of the

    values shown in Table 3, the following exhibited trends in the values are certainly

    expected:-

    the percentage contribution will increase as the number of units is

    increased because a single unit failure will have less relative impact

    the percentage contribution will increase as the availability of units

    increases because of the reduced number of failures

    the percentage contribution will never reach 100% but only asymptote to

    100% as the number of units approaches infinity. Therefore the greatest

    variation occurs with a relatively small number of units, less than 3 - 4, and

    changes very little when the number exceeds 5 - 8 units. This effect is

    clearly beneficial when wind farms with relatively large number of

    turbines are considered because any change in actual number of units will

    have little effect on the effective contribution.

    29

  • 7/28/2019 DG Contribution to network security_R1.pdf

    30/92

    ETSU Project K/EL/00287 Final Report

    ________________________________

    Table 3 - Effective generation contributions as a function of number

    of units and unit availability

    effective generation contribution (%)

    for unit availabilities of

    number of

    units

    86% 40% 90%

    5

    15

    20e

    30

    35

    40

    50

    54

    58

    35

    58

    75e

    84

    87

    90

    94

    96

    97

    1

    2

    P2/5

    3

    4

    5

    10

    20

    30

    25

    50

    67

    70

    80

    85

    93

    95

    96e = estimated

    The information given in Table 3 is used to deduce results for the following

    examples. Examples 3.1 - 3.3 assume that each unit has an availability of 0.86, and

    Examples 4.1 - 4.3 assume that the units have the availabilities defined in the

    example.

    Example 3.1 Consider four units each of 60MW capacity and availability of 86%Total Effective Contribution = (4 x 60) x 0.80

    = 192 MW

    Example 3.2 Consider 30 units each of 1MW capacity and availability of 86%

    Total Effective Contribution = (30 x 1) x 0.96

    = 28.8 MW

    Example 3.3 Consider a single unit of 60MW capacity and availability of 86% and

    30 units each of 1MW capacity and availability of 86%

    Total Effective Contribution = (1 x 60) x 0.25 + (30 x 1) x 0.96

    = 43.8 MW

    Example 4.1 Consider four units each of 60MW capacity and availability of 90%

    Total Effective Contribution = (4 x 60) x 0.87

    = 208.8 MW

    Example 4.2 Consider 30 units each of 1MW capacity and availability of 40%

    Total Effective Contribution = (30 x 1) x 0.58

    = 17.4 MW

    Example 4.3 Consider a single unit of 60MW capacity and availability of 90% and30 units each of 1MW capacity and availability of 40%

    30

  • 7/28/2019 DG Contribution to network security_R1.pdf

    31/92

    ETSU Project K/EL/00287 Final Report

    ________________________________

    Total Effective Contribution = (1 x 60) x 0.35 + (30 x 1) x 0.58

    = 38.4 MW

    Notes: a) These examples assume that the effective contribution is affected by the

    unit availability and by the number of units using the information provided in

    Table 3. The previous assumptions underpinning these values should benoted.

    b) The effective contributions vary significantly depending on the parameters

    included. These clearly demonstrate the need for including all relevant

    parameters and attributes if appropriate credit is to be given to the

    contribution that embedded generation can make to security.

    c) The benefit of a large number of units in Examples 3.2 and 4.2 partly

    overcomes the reduced contribution made by these units due to a low value

    of unit availability.

    d) These results are illustrative only and would need more extensive studies

    in order to confirm suitable values

    5.4. Effect of Technology of Units

    This effect is implicitly