计算机科学 ›› 2025, Vol. 52 ›› Issue (11A): 241100111-6.doi: 10.11896/jsjkx.241100111
周正1, 陈晨1, 王松1, 宋晓帆1,2
ZHOU Zheng1, CHEN Chen1, WANG Song1, SONG Xiaofan1,2
摘要: 为解决全面监控下厂站主辅业务信息流时效性问题,构建厂站主辅业务信息流拓扑模型,将信源节点、网络节点和信宿节点抽象为信息流的传输结构,并利用物理连接矩阵和虚拟连接矩阵表征各节点间的物理和逻辑连接状态。在断路器失灵、网络传输、一键顺控和主辅联动4种典型业务场景下,定量分析信息流传输路径和延迟特性,识别在多发情况下的路径瓶颈和优化需求。结果表明,不同业务流在交换机端口的竞争导致延迟显著增加,特别是高间隔数场景下,路径时延显现递增趋势。因此,合理优化网络拓扑和配置优先级调度策略可显著改善主辅业务的信息流传输效率。
中图分类号:
| [1]YAO Z Q,CHANG N C,DOU R,et al.Optimization of Data Stream Between Substation and Dispatching Adapting to Centralized Control[J].Power System Technology,2022,46(10):4113-4121. [2]ZHANG X,XIAO P,GUO L J,et al.The Design and Applica-tion of the High Available Network of Supervisor Information System[J].Computer Applications and Software,2022,39(10):35-41,70. [3]SONG B,PENG W J,CHEN S.Design and Implementation of Intelligent Maintenance Management and Monitoring System Based on BIM[J].Computer Applications and Software,2024,41(4):28-33. [4]LI X S,CHANG G H,SU S,et al.Review and prospect on cyberthreat indicators of substation monitoring system[J].Journal of Electric Power Science and Technology,2024,39(4):1-10. [5]FENG C J,ZHU J,ZHU Y,et al.Unified Management Architecture and Practice of Power Monitoring Network Security Equipment[J].Journal of Information Security Research,2024,10(5):481-488. [6]DU Q W,XU H Q,ZHENG X,et al.Defense Strategy Design for Electric Power Monitoring System Under Malicious Network Attacks[J].Control Engineering of China,2024,31(1):185-192. [7]CAO X M,ZHANG H B,YE S S,et al.Security Access Protocolof Power Monitoring Network Based on ECC Algorithm[J].Journal of Shenyang University of Technology,2024,46(1):60-65. [8]WANG B,HAN J F,LI Y,et al.Research on Power Grid Security Early Warning Technology Based on Intelligent Monitoring Platform[J].Power System and Clean Energy,2023,39(6):33-38. [9]SEOL Y,HYEON D,MIN J H,et al.Timely survey of time sensitive networking:past and future directions[J]IEEE Access,2021,9:142506-142527. [10]BING Y A,WANG W T,SUN S Z,et al.Network Reliability Analysis of Power Monitoring System Based on Improved Fuzzy Comprehensive Evaluation Method[J].Computer Science,2023,50(S1):784-790. [11]WANG Z N,ZHANG J,HUANG T.Determining delay bounds for a chain of virtual network functions using network calculus[J].IEEE Communications Letters,2021,25(8):2550-2553. [12]HE R W,LONG L,ZHANG B R,et al.Cyber System Physica-lizing Modeling and Analysis Method in Cyber-physical Power Systems[C]//Proceedings of the CSEE.2024:72-85. [13]HUSSAIN S M S,FAROOQ S M,USTUN T S.A method forachieving confidentiality and integrity in IEC 61850 GOOSE messages[J].IEEE Transactions on Power Delivery,2020,35(5):2565-2567. |
|
||