• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6
  • 3
  • 1
  • 1
  • 1
  • Tagged with
  • 12
  • 12
  • 12
  • 8
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Inteligentní systémy hromadného sběru dat v energetických sítích / Intelligent systems of mass data acquisition in power grids

Krejčír, Ľuboš January 2011 (has links)
This paper is describing the issues of data collection in power distribution networks. It discusses the posibilities of data communication over wide area networks using the communication protocol IEC 60870-5-104, used in power distribution systems for transmission of information over IP networks. Thesis presents 4 technologies, suitable for data collection, with respect to the use of existing infrastructure of the utility. It focuses on design of appropriate data types in correspondence with used IEC 60870-5-104 protocol, and estimates the minimum data requirements for transmission, through proposed hierarchical network, with collecting data concentrators. For verification of given design, simulations are carried out based on proposed data loads with subsequent analysis of network load and transmission delays. Consequently, the results are analyzed and selected parts of network optimized for improvement od selected results, of which causes of formation are discussed in debate.
2

Popis a testování komunikačních protokolů normy IEC 60870-5-103 a 60870-5-104 / Description and testing of communication protocols IEC 60870-5-103 and 60870-5-104

Pekárek, Dominik January 2017 (has links)
This thesis is focused on testing of communication protocols IEC 60870-5-103 and IEC 60870-5-104. Theoretical part of the thesis describes basic principles, services and possibilities of both communication protocols. Practical part of the thesis deals with configuration of the IEC 60870-5-103 communication standard of protective terminal REF630. PCVDEW6 tool was used to test this communication protocol. Next part of the thesis is focused on convertion of the communication standard IEC 61850 to IEC 61870-5-104 using control system COM600. The testing of both communication protocols was carried out in the laboratory of the protection relays on the testing panels at ABB Brno.
3

Återskapande och validering av konfiguration för kommunikationsstandarden IEC 61850 i fördelarstationer : Recreation and Validation of Configuration for the IEC 61850 Communication Standard in Distribution Substations

Lennartsson, Felix January 2023 (has links)
I en fördelarstation i Ellevios elnät i Stockholm har en viktig konfigurationsfil försvunnit. Filen används för att beskriva styr- och kommunikationssystemet för övervakning och fjärrmanövrering av stationen från en driftcentral. Dessutom behöver operativsystemet på en enhet i kommunikationssystemet uppdateras. Det misstänks att konfigurationsfilen som har försvunnit behövs för att genomföra uppdateringen. Det visar sig att konfigurationsfilen inte behövs för att genomföra uppdateringen av operativsystemet. Två metoder utvecklas därför, en för att genomföra uppdateringen av kommunikationsenheten, och en för att återskapa konfigurationsfilen. Den första metoden beskriver hur operativsystemet på en Remote Terminal Unit i ABB:s RTU500-serie kan uppdateras från firmwareversion 11 till version 12. Den andra metoden beskriver hur en fullständig konfigurationsfil, i form av en Substation Configuration Description (SCD) kan återskapas för stationen. Den senare metoden utvecklas specifikt för den enskilda stationen, men skulle kunna vidareutvecklas för att återskapa SCD-filen i fler stationer där samma problem idag finns. Metoden för att genomföra uppdatering av operativsystemet används framgångsrikt för att genomföra själva uppdateringen. Metoden för att återskapa konfigurationsfilen testas genom att en konfiguration för en ny kommunikationsenhet genereras baserat på den återskapade konfigurationen.  Genom att tillämpa dessa metoder kan tillförlitligheten för styr- och kommunikationssystem med IEC 61850-teknologi förbättras. Detta kan leda till ökad tillförlitlighet vid elleverans, eftersom kommunikationssystemet används för att övervaka elnätet och hantera fel genom fjärrstyrning. Detta minskar behovet av fysiska besök till stationen. Rapporten är ett examensarbete för programmet Högskoleingenjör i elektroteknik. Examensarbetet utfördes under våren 2023 på företaget Omexom Sweden. / In a distribution substation in Ellevio's power grid in Stockholm, an important configuration file has gone missing. The file is used to describe the control and communication system for monitoring and remote operation of the substation from a control centre. Additionally, the operating system on a device within the communication system needs to be updated. It is suspected that the missing configuration file is required to perform the update. It turns out that the configuration file is not needed to carry out the operating system update. As a result, two methods are developed: one for performing the update of the communication unit and another for recreating the configuration file. The first method describes how the operating system on a Remote Terminal Unit in ABB’s RTU500 series can be updated from firmware version 11 to version 12. The second method explains how a complete configuration file, in the form of a Substation Configuration Description (SCD) can be recreated for the substation. Although the latter method is specifically tailored for the individual substation, it could be further refined to recreate the SCD file in several other stations with the same issue. The method for performing the operating system update is successfully utilized to carry out the update itself. The method for recreating the configuration file is tested by generating a configuration for a new communication unit based on the reconstructed configuration. By implementing these methods, the reliability of the IEC 61850-based control and communication system can be enhanced. This can lead to improved reliability of power delivery since the communication system is used to monitor the power grid and manage faults through remote control. Thereby, the need for physical visits to the substation is reduced. The report is a thesis for the Bachelor program in Electrical Engineering. The thesis was carried out during the spring of 2023 at the company Omexom Sweden.
4

Proposta de integra??o das redes de comunica??o da COSERN como uma solu??o de contig?ncvia em caso de falhas nos enlaces do backbone de automa??o

Oliveira, Bernardo Em?dio Fernandes de 30 July 2004 (has links)
Made available in DSpace on 2014-12-17T14:55:18Z (GMT). No. of bitstreams: 1 BernardoEFO_da_capa_ate_pag_6.pdf: 6543613 bytes, checksum: e29df354784b19e68507e0beca1e614a (MD5) Previous issue date: 2004-07-30 / T'his dissertation proposes alternative models to allow the interconnectioin of the data communication networks of COSERN Companhia Energ?tica do Rio Grande do Norte. These networks comprise the oorporative data network, based on TCP/IP architecture, and the automation system linking remote electric energy distribution substations to the main Operatin Centre, based on digital radio links and using the IEC 60870-5-101 protoco1s. The envisaged interconnection aims to provide automation data originated from substations with a contingent route to the Operation Center, in moments of failure or maintenance of the digital radio links. Among the presented models, the one chosen for development consists of a computational prototype based on a standard personal computer, working under LINUX operational system and running na application, developesd in C language, wich functions as a Gateway between the protocols of the TCP/IP stack and the IEC 60870-5-101 suite. So, it is described this model analysis, implementation and tests of functionality and performance. During the test phase it was basically verified the delay introduced by the TCP/IP network when transporting automation data, in order to guarantee that it was cionsistent with the time periods present on the automation network. Besides , additional modules are suggested to the prototype, in order to handle other issues such as security and prioriz\ation of the automation system data, whenever they are travesing the TCP/IP network. Finally, a study h?s been done aiming to integrate, in more complete way, the two considered networks. It uses IP platform as a solution of convergence to the communication subsystem of na unified network, as the most recente market tendencies for supervisory and other automation systems indicate / Este trabalho prop?e modelos alternativos, capazes de permitir a interliga??o das redes de comunica??o de dados da Companhia Energ?tica do Rio Grande do Norte-COSERN. Essa interliga??o tem por objetivo possibilitar que os dados do sistema de automa??o das subesta??es de distribui??o de energia el?trica, que trafegam em uma rede baseada em enlaces de r?dios digitais e utilizam os protocolos da fam?lia IEC 60870-5-101, possam utilizar a rede corporativa de dados, baseada na arquitetura TCP/IP, como rota de conting?ncia para momentos de falha ou de manunten??o nos enlaces desta rede de automa??o. Dentre os modelos apresentados, escolheu-se para desenvolvimento uma solu??o que consiste de um prot?tipo computacional baseado em um microcomputador pessoal padr?o, com sistema operacional LINUX e aplicativos desenvolvidos em linguagem C, capaz de funcionar como um gateway entre os protocolos da pilha TCP/IP e os protocolos IEC 60870-5-101. O trabalho descreve, ent?o, a an?lise, a implementa??o e os testes de funcionalidade e desempenho deste modelo. Na fase de testes foram verificados, principalmente, os tempos relativos aos atrasos introduzidos pela rede TCP/IP, para assegurar que os mesmos sejam compat?veis com os tempos praticados na rede de automa??o. Al?m disso, s?o sugeridos m?dulos adicionais ao prot?tipo, para tratar de quest?es como seguran?a e prioriza??o dos dados do sistema de automa??o, quando estes trafegampela rede TCP/IP. Finalmente, foi feito um estudo visando uma integra??o mais completa entre as duas redes consideradas, usando a plataforma IP como solu??o de converg?ncia para o subsistema de comunica??o de uma rede unificada, como indica a tend?ncia mais recente no mercado como solu??o para sistemas supervis?rios e outros sistemas de automa??o
5

Identifikace dostupnosti zařízení v technologických sítích / Identification of Device Availability in Technological Networks

Vodehnal, Stanislav January 2018 (has links)
This diploma thesis deals with the monitoring of network elements of technological networks and distribution systems. There are described reasons why and what kind of values we want to monitor. Three monitoring systems are then selected, described their properties and functions. Based on their merits, one system for deploying the test environment is selected. The practical part is the configuration of the selected system and its subsequent deployment to the network.
6

Analýza protokolů pro komunikaci v energetických sítích / An Analysis of Smart Grid Communication Protocols

Sobotka, Lukáš January 2019 (has links)
This work deals security of SCADA industry systems which are used in energetic networks. It describes architecture of those systems and also analyze in details two communication protocols -- DNP3 and IEC 60870-5-104.  Next part is devoted to the analysis of anomaly and security threats which can be happen in SCADA systems. The main goal of this work is design and implementation of system which will be able to detect some of threats or anomalies. Also is necessary to propose simulation environment for testing.
7

Analýza řídících protokolů využívaných v průmyslových aplikacích / Analysis of distributed control protocols for indistrial applications

Horych, Vladimír January 2009 (has links)
This master's thesis deals with distributed control protocols for industrial applications. It explains term distributed control system, control protocol and it is dealing with properties, frame structures and ways of communication within CAN, Modbus, IEC60870-5-101 and DLMS protocols. This thesis includes informations, which are in most cases difficult to find. Second part of the thesis is dedicated to education system. This part is contained by information about protocols and their layers based on ISO/OSI model, pictures of structure of messages, knowledge test and an application based on JavaScript language. This JavaScript application emulates behavior of workstations, which are using communication based on IEC 60870-5-101 protocol. This application can set various conditions for influence of message transfer. These conditions are setting way of message transfer, data availability, filling of workstation’s buffer or intentional damage of message's content. It also contains a large amount of context help, activated after moving mouse cursor over most of application's elements. Even visitor without great knowledge of distributed control systems should understand how this protocol works, thanks to these context help and messages printed in lower part of the application. The conclusion of this work is aimed to positive and negative features and comparison of mentioned control protocols.
8

Generating Datasets Through the Introduction of an Attack Agent in a SCADA Testbed : A methodology of creating datasets for intrusion detection research in a SCADA system using IEC-60870-5-104

Fundin, August January 2021 (has links)
No description available.
9

Simulation of industrial control system field devices for cyber security

Andersson, Dorothea January 2017 (has links)
Industrial Control Systems (ICS) are an integral part of modernsociety, not least when it comes to controlling and protecting criticalinfrastructure such as power grids and water supply. There is a need to testthese systems for vulnerabilities, but it is often difficult if not impossible to doso in operational real time systems since they have been shown to be sensitiveeven to disturbances caused by benign diagnostic tools. This thesis exploreshow ICS field devices can be simulated in order to fool potential antagonists,and how they can be used in virtualized ICS for cyber security research. 8different field devices were simulated using the honeypot daemon Honeyd,and a generally applicable simulation methodology was developed. It was alsoexplored how these simulations can be further developed in order to functionlike real field devices in virtualized environments. / Industriella informations- och styrsystem utgör en viktig delav vårt moderna samhälle, inte minst när det gäller kontroll och skydd avkritisk infrastruktur som elnät och vattenförsörjning. Det finns stora behov avatt säkerhetstesta dessa typer av system, vilket ofta är omöjligt iproduktionsmiljöer med realtidskrav som är erkänt känsliga för störningar, tilloch med från vanligt förekommande analysverktyg. Denna rapport presenterarhur vanliga komponenter i industriella informations- och styrsystem kansimuleras för att lura potentiella antagonister, och hur de kan användas ivirtualiserade styrsystem för cybersäkerhetsforskning. 8 olika komponentersimulerades med hjälp av Honeyd, och en generellt applicerbarsimuleringsmetodik utvecklades. Hur dessa simuleringar kan vidareutvecklasför att fungera som riktiga styrsystemskomponenter i virtualiserade miljöer harockså undersökts.
10

Učení se automatů pro rychlou detekci anomálií v síťovém provozu / Automata Learning for Fast Detection of Anomalies in Network Traffic

Hošták, Viliam Samuel January 2021 (has links)
The focus of this thesis is the fast network anomaly detection based on automata learning. It describes and compares several chosen automata learning algorithms including their adaptation for the learning of network characteristics. In this work, various network anomaly detection methods based on learned automata are proposed which can detect sequential as well as statistical anomalies in target communication. For this purpose, they utilize automata's mechanisms, their transformations, and statistical analysis. Proposed detection methods were implemented and evaluated using network traffic of the protocol IEC 60870-5-104 which is commonly used in industrial control systems.

Page generated in 0.0224 seconds