Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 241100111-6.doi: 10.11896/jsjkx.241100111

• Interdiscipline & Application • Previous Articles     Next Articles

Research on Timeliness of Information Flow of Main and Auxiliary Business of Plant and StationUnder Comprehensive Monitoring

ZHOU Zheng1, CHEN Chen1, WANG Song1, SONG Xiaofan1,2   

  1. 1 State Grid Henan Economic Research Institute,Zhengzhou 450000,China
    2 School of Electrical Engineering,Chongqing University,Chongqing 400044,China
  • Online:2025-11-15 Published:2025-11-10
  • About author:ZHOU Zheng,born in 1983,postgra-duate.His main research interest is power systems and automation.
  • Supported by:
    State Grid(5200-202324488A-3-2-ZN).

Abstract: In order to solve the problem of timeliness of the information flow of main and auxiliary services of plant and station under comprehensive monitoring,the topological model of the information flow of the main and auxiliary services of the plant and station is constructed,the source node,the network node and the host node are abstracted into the transmission structure of the information flow,and the physical connection matrix and the virtual connection matrix are used to represent the physical and logical connection states between the nodes.In four typical business scenarios:circuit breaker failure,network transmission,one-key sequential control,and active and auxiliary linkage,the information flow transmission path and delay characteristics are quantitatively analyzed,and the path bottleneck and optimization requirements in the case of multiple events are identified.The results show that the delay of different service flows increases significantly due to the competition of switch ports,especially in the scenario of high interval number,the path delay shows an increasing trend.Therefore,it is concluded that reasonable optimization of network topology and configuration of priority scheduling strategies can significantly improve the information flow transmission efficiency of primary and secondary services.

Key words: Comprehensive monitoring, Main and auxiliary services of factories and stations, Timeliness of information flow, Topological model

CLC Number: 

  • TP39
[1]YAO Z Q,CHANG N C,DOU R,et al.Optimization of Data Stream Between Substation and Dispatching Adapting to Centralized Control[J].Power System Technology,2022,46(10):4113-4121.
[2]ZHANG X,XIAO P,GUO L J,et al.The Design and Applica-tion of the High Available Network of Supervisor Information System[J].Computer Applications and Software,2022,39(10):35-41,70.
[3]SONG B,PENG W J,CHEN S.Design and Implementation of Intelligent Maintenance Management and Monitoring System Based on BIM[J].Computer Applications and Software,2024,41(4):28-33.
[4]LI X S,CHANG G H,SU S,et al.Review and prospect on cyberthreat indicators of substation monitoring system[J].Journal of Electric Power Science and Technology,2024,39(4):1-10.
[5]FENG C J,ZHU J,ZHU Y,et al.Unified Management Architecture and Practice of Power Monitoring Network Security Equipment[J].Journal of Information Security Research,2024,10(5):481-488.
[6]DU Q W,XU H Q,ZHENG X,et al.Defense Strategy Design for Electric Power Monitoring System Under Malicious Network Attacks[J].Control Engineering of China,2024,31(1):185-192.
[7]CAO X M,ZHANG H B,YE S S,et al.Security Access Protocolof Power Monitoring Network Based on ECC Algorithm[J].Journal of Shenyang University of Technology,2024,46(1):60-65.
[8]WANG B,HAN J F,LI Y,et al.Research on Power Grid Security Early Warning Technology Based on Intelligent Monitoring Platform[J].Power System and Clean Energy,2023,39(6):33-38.
[9]SEOL Y,HYEON D,MIN J H,et al.Timely survey of time sensitive networking:past and future directions[J]IEEE Access,2021,9:142506-142527.
[10]BING Y A,WANG W T,SUN S Z,et al.Network Reliability Analysis of Power Monitoring System Based on Improved Fuzzy Comprehensive Evaluation Method[J].Computer Science,2023,50(S1):784-790.
[11]WANG Z N,ZHANG J,HUANG T.Determining delay bounds for a chain of virtual network functions using network calculus[J].IEEE Communications Letters,2021,25(8):2550-2553.
[12]HE R W,LONG L,ZHANG B R,et al.Cyber System Physica-lizing Modeling and Analysis Method in Cyber-physical Power Systems[C]//Proceedings of the CSEE.2024:72-85.
[13]HUSSAIN S M S,FAROOQ S M,USTUN T S.A method forachieving confidentiality and integrity in IEC 61850 GOOSE messages[J].IEEE Transactions on Power Delivery,2020,35(5):2565-2567.
[1] CHEN Han, XU Zefeng, JIANG Jiu, FAN Fan, ZHANG Junjian, HE Chu, WANG Wenwei. Large Language Model and Deep Network Based Cognitive Assessment Automatic Diagnosis [J]. Computer Science, 2026, 53(3): 41-51.
[2] LI Zequn, DING Fei. Fatigue Driving Detection Based on Dual-branch Fusion and Segmented Domain AdaptationTransfer Learning [J]. Computer Science, 2026, 53(3): 78-87.
[3] CUI Mengtian, HE Liwen, XIE Qi, WANG Fang. Group Semantic-driven Hypergraph Network for Disinformation Detection with Fusion PropagationStructure [J]. Computer Science, 2026, 53(3): 88-96.
[4] QIAN Qing, CHEN Huicheng, CUI Yunhe, TANG Ruixue, FU Jinmei. Joint Entity and Relation Extraction Method with Multi-scale Collaborative Aggregation and Axial-semantic Guidance [J]. Computer Science, 2026, 53(3): 97-106.
[5] YU Chengcheng, JIANG Yongfa, CHEN Fangshu, WANG Jiahui, MENG Xiankai. Multi-view Exercise Representation and Forgetting Mechanism for Deep KnowledgeTracing [J]. Computer Science, 2026, 53(3): 107-114.
[6] FAN Wenshu, WAN Shenghua, LI Xinchun, SUN Haihang, HUANG Kaichen, GAN Le, ZHAN Dechuan. Twice Learning Revitalizes Behavior Cloning [J]. Computer Science, 2026, 53(3): 129-135.
[7] LI Hao, DING Lizhong, FU Jiarun, LINGHU Zhaohuan. Data Compression of Instruction Fine-tuning for Large Models:Refinement Based on Inference Contribution [J]. Computer Science, 2026, 53(3): 136-142.
[8] LIU Huashuai, TAO Houguo, YUE Kun, DUAN Liang. Bayesian Network Based Fault Root Cause Analysis [J]. Computer Science, 2026, 53(3): 143-150.
[9] HOU Jingle, LI Zhengjun, DAI Qiangqiang, LI Ronghua, WANG Guoren. Research on Maximal Directed k-plex Enumeration Problem [J]. Computer Science, 2026, 53(3): 166-172.
[10] WU Jiahao, PENG Li, YANG Jielong. Partial Domain Adaptation Based on Machine Unlearning [J]. Computer Science, 2026, 53(3): 173-180.
[11] SANG Shilong, CHEN Kejia. Type-steered Edge Matching for Heterogeneous Graph Similarity Learning [J]. Computer Science, 2026, 53(3): 181-187.
[12] WANG Jinghong, LI Pengchao, WANG Xizhao, ZHANG Zili. Dual-channel Graph Neural Network Based on KAN [J]. Computer Science, 2026, 53(3): 188-196.
[13] LI Linhao, XU Yanan, DONG Yongfeng, WANG Zhen. Social Learning Based on Multi-expert Collaboration and Information Interaction [J]. Computer Science, 2026, 53(3): 197-206.
[14] ZOU Xiaoyang, JU Hengrong, CAO Jinxin, MA Xingru, HUANG Jiashuang, DING Weiping. Overlapping Community Detection with Graph Regularized Fuzzy Autoencoder [J]. Computer Science, 2026, 53(3): 207-213.
[15] WANG Yizong, NING Hongbo, WANG Haofeng, MA Siwei, GAO Wen. Low-bitrate and Real-time Multiview Video Streaming with 3D Gaussian Splatting [J]. Computer Science, 2026, 53(3): 225-230.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!