计算机科学 ›› 2025, Vol. 52 ›› Issue (11A): 241100111-6.doi: 10.11896/jsjkx.241100111

• 交叉&应用 • 上一篇    下一篇

全面监控下厂站主辅业务信息流时效性研究

周正1, 陈晨1, 王松1, 宋晓帆1,2   

  1. 1 国网河南省电力公司经济技术研究院 郑州 450000
    2重庆大学电气学院 重庆 400044
  • 出版日期:2025-11-15 发布日期:2025-11-10
  • 通讯作者: 周正(nysjyc@163.com)
  • 基金资助:
    国网公司基金项目(5200-202324488A-3-2-ZN)

Research on Timeliness of Information Flow of Main and Auxiliary Business of Plant and StationUnder Comprehensive Monitoring

ZHOU Zheng1, CHEN Chen1, WANG Song1, SONG Xiaofan1,2   

  1. 1 State Grid Henan Economic Research Institute,Zhengzhou 450000,China
    2 School of Electrical Engineering,Chongqing University,Chongqing 400044,China
  • Online:2025-11-15 Published:2025-11-10
  • Supported by:
    State Grid(5200-202324488A-3-2-ZN).

摘要: 为解决全面监控下厂站主辅业务信息流时效性问题,构建厂站主辅业务信息流拓扑模型,将信源节点、网络节点和信宿节点抽象为信息流的传输结构,并利用物理连接矩阵和虚拟连接矩阵表征各节点间的物理和逻辑连接状态。在断路器失灵、网络传输、一键顺控和主辅联动4种典型业务场景下,定量分析信息流传输路径和延迟特性,识别在多发情况下的路径瓶颈和优化需求。结果表明,不同业务流在交换机端口的竞争导致延迟显著增加,特别是高间隔数场景下,路径时延显现递增趋势。因此,合理优化网络拓扑和配置优先级调度策略可显著改善主辅业务的信息流传输效率。

关键词: 全面监控, 厂站主辅业务, 信息流时效性, 拓扑模型

Abstract: In order to solve the problem of timeliness of the information flow of main and auxiliary services of plant and station under comprehensive monitoring,the topological model of the information flow of the main and auxiliary services of the plant and station is constructed,the source node,the network node and the host node are abstracted into the transmission structure of the information flow,and the physical connection matrix and the virtual connection matrix are used to represent the physical and logical connection states between the nodes.In four typical business scenarios:circuit breaker failure,network transmission,one-key sequential control,and active and auxiliary linkage,the information flow transmission path and delay characteristics are quantitatively analyzed,and the path bottleneck and optimization requirements in the case of multiple events are identified.The results show that the delay of different service flows increases significantly due to the competition of switch ports,especially in the scenario of high interval number,the path delay shows an increasing trend.Therefore,it is concluded that reasonable optimization of network topology and configuration of priority scheduling strategies can significantly improve the information flow transmission efficiency of primary and secondary services.

Key words: Comprehensive monitoring, Main and auxiliary services of factories and stations, Timeliness of information flow, Topological model

中图分类号: 

  • TP39
[1]YAO Z Q,CHANG N C,DOU R,et al.Optimization of Data Stream Between Substation and Dispatching Adapting to Centralized Control[J].Power System Technology,2022,46(10):4113-4121.
[2]ZHANG X,XIAO P,GUO L J,et al.The Design and Applica-tion of the High Available Network of Supervisor Information System[J].Computer Applications and Software,2022,39(10):35-41,70.
[3]SONG B,PENG W J,CHEN S.Design and Implementation of Intelligent Maintenance Management and Monitoring System Based on BIM[J].Computer Applications and Software,2024,41(4):28-33.
[4]LI X S,CHANG G H,SU S,et al.Review and prospect on cyberthreat indicators of substation monitoring system[J].Journal of Electric Power Science and Technology,2024,39(4):1-10.
[5]FENG C J,ZHU J,ZHU Y,et al.Unified Management Architecture and Practice of Power Monitoring Network Security Equipment[J].Journal of Information Security Research,2024,10(5):481-488.
[6]DU Q W,XU H Q,ZHENG X,et al.Defense Strategy Design for Electric Power Monitoring System Under Malicious Network Attacks[J].Control Engineering of China,2024,31(1):185-192.
[7]CAO X M,ZHANG H B,YE S S,et al.Security Access Protocolof Power Monitoring Network Based on ECC Algorithm[J].Journal of Shenyang University of Technology,2024,46(1):60-65.
[8]WANG B,HAN J F,LI Y,et al.Research on Power Grid Security Early Warning Technology Based on Intelligent Monitoring Platform[J].Power System and Clean Energy,2023,39(6):33-38.
[9]SEOL Y,HYEON D,MIN J H,et al.Timely survey of time sensitive networking:past and future directions[J]IEEE Access,2021,9:142506-142527.
[10]BING Y A,WANG W T,SUN S Z,et al.Network Reliability Analysis of Power Monitoring System Based on Improved Fuzzy Comprehensive Evaluation Method[J].Computer Science,2023,50(S1):784-790.
[11]WANG Z N,ZHANG J,HUANG T.Determining delay bounds for a chain of virtual network functions using network calculus[J].IEEE Communications Letters,2021,25(8):2550-2553.
[12]HE R W,LONG L,ZHANG B R,et al.Cyber System Physica-lizing Modeling and Analysis Method in Cyber-physical Power Systems[C]//Proceedings of the CSEE.2024:72-85.
[13]HUSSAIN S M S,FAROOQ S M,USTUN T S.A method forachieving confidentiality and integrity in IEC 61850 GOOSE messages[J].IEEE Transactions on Power Delivery,2020,35(5):2565-2567.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!