Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 241100111-6.doi: 10.11896/jsjkx.241100111

• Interdiscipline & Application • Previous Articles     Next Articles

Research on Timeliness of Information Flow of Main and Auxiliary Business of Plant and StationUnder Comprehensive Monitoring

ZHOU Zheng1, CHEN Chen1, WANG Song1, SONG Xiaofan1,2   

  1. 1 State Grid Henan Economic Research Institute,Zhengzhou 450000,China
    2 School of Electrical Engineering,Chongqing University,Chongqing 400044,China
  • Online:2025-11-15 Published:2025-11-10
  • Supported by:
    State Grid(5200-202324488A-3-2-ZN).

Abstract: In order to solve the problem of timeliness of the information flow of main and auxiliary services of plant and station under comprehensive monitoring,the topological model of the information flow of the main and auxiliary services of the plant and station is constructed,the source node,the network node and the host node are abstracted into the transmission structure of the information flow,and the physical connection matrix and the virtual connection matrix are used to represent the physical and logical connection states between the nodes.In four typical business scenarios:circuit breaker failure,network transmission,one-key sequential control,and active and auxiliary linkage,the information flow transmission path and delay characteristics are quantitatively analyzed,and the path bottleneck and optimization requirements in the case of multiple events are identified.The results show that the delay of different service flows increases significantly due to the competition of switch ports,especially in the scenario of high interval number,the path delay shows an increasing trend.Therefore,it is concluded that reasonable optimization of network topology and configuration of priority scheduling strategies can significantly improve the information flow transmission efficiency of primary and secondary services.

Key words: Comprehensive monitoring, Main and auxiliary services of factories and stations, Timeliness of information flow, Topological model

CLC Number: 

  • TP39
[1]YAO Z Q,CHANG N C,DOU R,et al.Optimization of Data Stream Between Substation and Dispatching Adapting to Centralized Control[J].Power System Technology,2022,46(10):4113-4121.
[2]ZHANG X,XIAO P,GUO L J,et al.The Design and Applica-tion of the High Available Network of Supervisor Information System[J].Computer Applications and Software,2022,39(10):35-41,70.
[3]SONG B,PENG W J,CHEN S.Design and Implementation of Intelligent Maintenance Management and Monitoring System Based on BIM[J].Computer Applications and Software,2024,41(4):28-33.
[4]LI X S,CHANG G H,SU S,et al.Review and prospect on cyberthreat indicators of substation monitoring system[J].Journal of Electric Power Science and Technology,2024,39(4):1-10.
[5]FENG C J,ZHU J,ZHU Y,et al.Unified Management Architecture and Practice of Power Monitoring Network Security Equipment[J].Journal of Information Security Research,2024,10(5):481-488.
[6]DU Q W,XU H Q,ZHENG X,et al.Defense Strategy Design for Electric Power Monitoring System Under Malicious Network Attacks[J].Control Engineering of China,2024,31(1):185-192.
[7]CAO X M,ZHANG H B,YE S S,et al.Security Access Protocolof Power Monitoring Network Based on ECC Algorithm[J].Journal of Shenyang University of Technology,2024,46(1):60-65.
[8]WANG B,HAN J F,LI Y,et al.Research on Power Grid Security Early Warning Technology Based on Intelligent Monitoring Platform[J].Power System and Clean Energy,2023,39(6):33-38.
[9]SEOL Y,HYEON D,MIN J H,et al.Timely survey of time sensitive networking:past and future directions[J]IEEE Access,2021,9:142506-142527.
[10]BING Y A,WANG W T,SUN S Z,et al.Network Reliability Analysis of Power Monitoring System Based on Improved Fuzzy Comprehensive Evaluation Method[J].Computer Science,2023,50(S1):784-790.
[11]WANG Z N,ZHANG J,HUANG T.Determining delay bounds for a chain of virtual network functions using network calculus[J].IEEE Communications Letters,2021,25(8):2550-2553.
[12]HE R W,LONG L,ZHANG B R,et al.Cyber System Physica-lizing Modeling and Analysis Method in Cyber-physical Power Systems[C]//Proceedings of the CSEE.2024:72-85.
[13]HUSSAIN S M S,FAROOQ S M,USTUN T S.A method forachieving confidentiality and integrity in IEC 61850 GOOSE messages[J].IEEE Transactions on Power Delivery,2020,35(5):2565-2567.
[1] FANG Quan, ZHANG Jinlong, WANG Bingqian, HU Jun. Research on Domain Knowledge Question Answering via Large Language Models withCompositional Context Prompting [J]. Computer Science, 2025, 52(11): 13-21.
[2] PI Qiankun, LU Jicang, ZHU Taojie, PENG Yueling. Zero-shot Knowledge Extraction Method Based on Large Language Model Enhanced [J]. Computer Science, 2025, 52(11): 22-29.
[3] ZHANG Haoran, HAO Wenning, JIN Dawei, CHENG Kai, ZHAI Ying. DF-RAG:A Retrieval-augmented Generation Method Based on Query Rewriting and Knowledge Selection [J]. Computer Science, 2025, 52(11): 30-39.
[4] WANG Zhengquan, PENG Zhiyong. Truster:Efficient Query-oriented Clustered Storage Solution for Autonomous Vehicle TrajectoryData [J]. Computer Science, 2025, 52(11): 62-70.
[5] HU Jintao, XIAN Guangming. Self-attention-based Graph Contrastive Learning for Recommendation [J]. Computer Science, 2025, 52(11): 82-89.
[6] WANG Wenpeng, GE Hongwei, LI Ting. Adversarial Generative Multi-sensitive Attribute Data Biasing Method [J]. Computer Science, 2025, 52(11): 90-97.
[7] CHEN Kang, LIN Jianhan, LIU Yuanjie. Survey on Image Deblurring Algorithms [J]. Computer Science, 2025, 52(11): 98-112.
[8] QIN Yi, ZHAN Pengxiang, XIAN Feng, LIU Chenlong, WANG Minghui. FE-DARFormer:Image Desnowing Model Based on Frequency Enhancement and Degradation- aware Routing Transformer [J]. Computer Science, 2025, 52(11): 113-122.
[9] YAN Zhilin, NIE Rencan. Infrared and Visible Image Fusion Cross-modality Contrastive Representation Network Based on Rolling MLP Feature Extraction [J]. Computer Science, 2025, 52(11): 123-130.
[10] CHEN Chongyang, PENG Li, YANG Jielong. UAV Small Object Detection Algorithm Based on Feature Enhancement and Context Fusion [J]. Computer Science, 2025, 52(11): 131-140.
[11] DING Yuanbo, BAI Lin, LI Taoshen. Human-Object Interaction Detection Based on Fine-grained Attention Mechanism [J]. Computer Science, 2025, 52(11): 141-149.
[12] LI Xiaoyu, QIAN Yi, WEN Yimin, MIU Yuqing. Multi-level Feature Fusion Image Emotion Recognition Based on Color Enhancement [J]. Computer Science, 2025, 52(11): 157-165.
[13] WANG Yang, WANG Guodong, ZHAO Junli, SHENG Xiaomeng. Neural Radiance Field for Human Reconstruction Based on Multi-scale Hierarchical Network [J]. Computer Science, 2025, 52(11): 175-183.
[14] WANG Xiaofeng, HUANG Junjun, TAN Wenya, SHEN Zixuan. Object Detection Based on Deep Feature Enhancement and Path Aggregation Optimization [J]. Computer Science, 2025, 52(11): 184-195.
[15] GU Chengjie, MENG Yi, ZHU Dongjun, ZHANG Junjun. Medical Image Target Detection Method Based on Multi-branch Attention and Deep Down- sampling [J]. Computer Science, 2025, 52(11): 196-205.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!