SlideShare a Scribd company logo
SMART METERING AND
CONTROL OF TRANSMISSION
SYSTEM
BY
M.SAI MANOBHIRAM
G.DURGA RAO
D.MOHITH
“Smart Grids”
“A smart grid uses digital technology to
improve reliability, security, and efficiency
(both economic and energy) of the electric
system from large generation, through the
delivery systems to electricity consumers and a
growing number of distributed-generation and
storage resources.”
Characteristics of Smart Grid
 Self-healing
 Motivates and includes the consumer
 Increases power quality
 Accommodates all generation and storage
options
 Enables electrical markets
 Optimizes assets and operates efficiently
SMART GRID vs EXISTING SYSTEM
Existing
• Not self healing
• Does not allow integration of
sources
• Real time data is not available
• Slow and manual
• Mostly involves analog functions
smart grid
• Self healing
• Smart grid is designed
to integrate sources
• Real time data is
available
• Fast and automatic
• A complete digital
system

Recommended for you

Wireless power theft monitoring
Wireless power theft monitoringWireless power theft monitoring
Wireless power theft monitoring

This document proposes a microcontroller-based wireless power theft monitoring system. The system uses wireless sensor nodes connected to consumers, transformers, and transmission lines to monitor power usage. If differences are detected between measured and reported usage, it could indicate power theft. The system aims to reduce energy wastage and theft by detecting where illegal usage occurs and notifying authorities. Some limitations are an inability to identify exact theft locations or individuals, and potential challenges implementing on a large scale.

Primry & backup protection
Primry & backup protectionPrimry & backup protection
Primry & backup protection

This document discusses power system protection components and devices. It describes the key elements which include current and voltage transformers, protective relays, circuit breakers, batteries, and fuses. These components work together to isolate faults and protect different elements of the electrical network. The document also discusses primary and backup protection methods, types of backup protection, and measures for evaluating protection system performance such as reliability, selectivity, speed and economy.

222
Chapter 01- High Voltage Engineering Introduction
Chapter 01- High Voltage Engineering IntroductionChapter 01- High Voltage Engineering Introduction
Chapter 01- High Voltage Engineering Introduction

This document discusses the history and development of high voltage engineering. It begins with early experiments with static electricity by ancient Greeks. Key figures who contributed include Franklin, Faraday, Tesla, and Edison. Faraday's law established that a magnetic field can induce current in a wire. Advances allowed longer distance power transmission. Challenges included developing high voltage insulation. Numerical methods like finite element analysis are now used to model electric field distributions in complex high voltage components.

SMART GRID INCLUDES:
• Integrated communications
• Sensing and measurement
• Smart meters
• Superconductive wires
• Storage devices
• Wireless communication
Smart metering and control of transmission system
ADVANTAGES OF SMART GRID
TECHNOLOGY:
• Peak Leveling
• Self-Healing
• More Reliable Power
• More Efficient Renewable Power
• A Cleaner Mix of Energy Sources
• Reducing our carbon Footprints
Disadvantages of smart grid
technology:
 Security and privacy cost.
 Two way communications can be
hacked.
 Technology components are expensive.
 Present Infrastructure is inadequate and
requires augmentation to support the
growth of Smart Grids.

Recommended for you

automatic meter reading
automatic meter readingautomatic meter reading
automatic meter reading

The document provides an overview of automatic meter reading (AMR) technology. It discusses how AMR allows for remote collection of meter data like electricity, gas, and water usage to improve billing accuracy and provide customers insight into their consumption. The document summarizes different AMR technologies including handheld, mobile, fixed network, and radio frequency systems. It also describes the benefits of AMR for both utility companies and customers in areas like improved customer service and resource management.

PROJECT REPORT
PROJECT REPORTPROJECT REPORT
PROJECT REPORT

This document describes a wireless power theft monitoring system and indication at a local substation. It includes chapters on hardware components like the energy meter, sensors, microcontroller, RF transmitter and receiver. It also covers the software used, including Kiel μVision and C programming. The working of the system is explained, with the consumer side transmitting data to the substation side via RF. Results and future work are discussed. The aim is to design a system to detect electricity theft and backtrack the location using radio frequency technology.

A Training Report Of Saltlake 132/33kv Substation
A Training Report Of Saltlake 132/33kv SubstationA Training Report Of Saltlake 132/33kv Substation
A Training Report Of Saltlake 132/33kv Substation

This document provides a summary of a report on winter training at a 132/33kV substation in West Bengal, India. It defines an electrical substation and introduces the 132/33kV substation. It describes key equipment found at the substation, including busbars, insulators, isolating switches, circuit breakers, protective relays, transformers, direct lightning stroke protection, line isolators, wave traps, and metering instruments. It also discusses site selection, layout, insulation coordination, and common transformer faults and protection schemes.

Challenges in adopting smart grid:
 Costly
 Complicated structure
 Gain control of meters
 Security and privacy
 Hacker
 Power theft
Smart Metering Infrastructure
SMI is the totality of the systems and networks that
are used to measure, collect, store, analyse, and
use energy usage data.
In other words, SMI includes smart meters and all
other infrastructure components—hardware,
software, and communication networks that are
needed to offer advanced capabilities.
 A typical SMI network employs a two-way
communication system and smart metering
technology.
 SMI also uses the same system equipment to
send information back through the network to
meters to capture additional data, control the
meters, or update the meters’ firmware.
Major System components of SMI
 A SMI system is comprised of a number of
technologies and applications that have been
integrated into one solution. The four major SMI
components are:
• Smart meters
• Communication system
• Meter data management systems (MDMS)
• Home area networks (HAN)

Recommended for you

Underground cables
Underground cablesUnderground cables
Underground cables

This document discusses underground cables for electrical power distribution. It covers the construction of cables including conductors, insulation, metallic sheathing, bedding, armouring and serving. Common insulating materials like XLPE are described. Cables are classified based on voltage level. Methods of laying cables underground include direct laying, draw-in systems and solid systems. Potential cable faults include open circuits, short circuits and earth faults. Underground cables have advantages over overhead systems like better appearance, lower maintenance needs and fewer faults, but the installation costs are higher.

types of cablesunderground cables
Electricity load forecasting by artificial neural network model
Electricity load forecasting by artificial neural network modelElectricity load forecasting by artificial neural network model
Electricity load forecasting by artificial neural network model

This document summarizes a research paper on electricity load forecasting using an artificial neural network model with weather data. The paper proposes a short-term load forecasting model that uses both historical electricity load and temperature data as inputs to neural networks. Non-decimated wavelet transforms are used to pre-process the data and improve forecasting accuracy. The model was tested on load data from India and achieved a mean absolute percentage error of 1.24%, demonstrating high forecasting accuracy. The paper also reviews other load forecasting methods and their errors, finding neural networks to be the most accurate approach.

Advance Metering Infrastructure: Smart Meter
Advance Metering Infrastructure: Smart MeterAdvance Metering Infrastructure: Smart Meter
Advance Metering Infrastructure: Smart Meter

This document presents information on advanced metering infrastructure (AMI) and smart meters. It discusses AMI as an integration of technologies that provides communication between utilities and consumers. Smart meters are described as solid state devices that perform functions like time-based pricing and remote operations. The document outlines different types of smart meters and their communication media like power line carrier and wireless. It also discusses the working principle, functions and benefits of smart meters, as well as potential vulnerabilities and future applications.

Smart Meters
 The measurements from both electromechanical meters
and non-smart digital meters are collected manually by
physical site visits and, thus, record only the readings at
the time of the visit.
 Smart meters are intelligent, solid-state, programmable
devices that can perform many functions beyond
energy consumption recordings.
 By using built-in memories, smart meters can record and
store readings at present intervals (e.g., 15 min, 30 min, or
hourly) and prescheduled times.
 Typical smart meter functionalities include the following:
i. Record interval (daily, hourly, or sub hourly) energy
consumption and demand data
ii. Provide bidirectional metering, which will
accommodate distributed generations at customer
sites
iii. Provide notification on loss of power and service
restoration
iv. Provide tamper alarms and enable theft detection
v. Provide voltage measurement, voltage alarms, and
power quality monitoring
 Enable TOU rate billing
 Protect meter data security
 Communicate and interact with intelligent appliances or
devices in a customer’s locality
Smart Meter Communications
 Smart Meter communicates with the base station or the
control centre on a bi-directional mode.
 Some of the important channels that are available in
India for communication are: GSM, Wi-Fi, PLCC, PSTN,etc
 The type of communication available depends severely
on the geographic location. Thus the communication
mode used should be a combination of available
options.
 Here we present a brief description of technology and
viability in Indian context.

Recommended for you

Introduction of wide area mesurement syatem
Introduction of wide area mesurement syatemIntroduction of wide area mesurement syatem
Introduction of wide area mesurement syatem

This document summarizes a seminar presentation on Wide Area Measurement Systems (WAMS). WAMS uses Phasor Measurement Units (PMUs) synchronized by GPS to monitor power grids. PMUs measure voltage and current phasors, while Phasor Data Concentrators (PDCs) collect and process data from multiple PMUs. The seminar discusses the components of WAMS including PMUs, PDCs, and communication protocols. It also reviews several implementations of WAMS and their applications in monitoring the electric grid.

Protection against overvoltage
Protection against overvoltageProtection against overvoltage
Protection against overvoltage

Protection against overvoltage overvoltage causes of overvoltage lightning types of lightning strokes harmful effect of lightning protection against lightning

Traction Motors and Control
Traction Motors and ControlTraction Motors and Control
Traction Motors and Control

This document discusses traction motors and their control. It describes the desirable characteristics of traction motors, including high starting torque, simple speed control, and self-relieving properties. It evaluates the suitability of DC series motors, AC series motors, and linear induction motors for traction applications. It also examines speed control methods for DC traction motors like series parallel control, transition methods, regenerative braking, and the self-relieving property of DC series motors. Numerical examples are provided on series parallel control and regenerative braking.

sppuuee
PLCC
 PLCC – Power Line Carrier Communication.
 As the name indicates PLCC associates the use of power
conductor for communication by imposing a modulated
carrier frequency signal over them.
 They are the prime modes of communication between
substation in power sector.
 The carrier signal degrades gradually along the length of
the line. So public repeaters are used which improve the
strength of the signal by demodulation and re-
modulation
Zigbee
 Zigbee is the only standard based wireless technology
designed to address the unique needs of low cost low
power wireless sensor and control networks.
 The technology specified by short distance data
transmission.
 It operates in the region of 2.4GHz
 This bandwidth is enough for the implementation of SMI
and home automation
 It is faster response than any other type of
communication
 It can be made to work in 3 modes
 Coordinator: It forms the basic root of the system. It has
the capability to communicate with any other node
connected to network. It can even acts as a bridge
between two networks.
 Router: As the name indicates it indicates like a route
decider. It routes the data based on address information
received and pass it to respective destination
 End Device: It has very limited functionality of just
communicating with the network co-ordinator.
Wi-Fi
 Operating in the unlicensed 2.4GHz ISM band.
 It involves broadcast and reception of data through
radio signals in an encrypted format and its advantage
is it cut the cost of the cables.
 The main advantage of this over Zigbee is it can be used
for the communications over the range of 1-10KM

Recommended for you

Power Quality Audit.pptx
Power Quality Audit.pptxPower Quality Audit.pptx
Power Quality Audit.pptx

This presentation is developed for the topic "Power Quality Audit" in the AU course "EE8019-Smart Grid"

power quality auditaudit measuresneed for pq audit
Power system planing and operation (pce5312) chapter five
Power system planing and operation (pce5312) chapter fivePower system planing and operation (pce5312) chapter five
Power system planing and operation (pce5312) chapter five

This chapter deals with the power system operation of different power system parts which includes the generation, transmission and distribution systems. This slide is specifically prepared for ASTU 5th year power and control engineering students.

power system planning and operationpower system analysispower system operation
Power flow analysis
Power flow analysisPower flow analysis
Power flow analysis

The document discusses power flow analysis, which determines the voltage, current, real power, and reactive power at points in an electrical network under normal operating conditions. It provides three key points: 1. Power flow analysis is important for planning, operations, and future expansion of power systems by studying the effects of new loads, generators, or transmission lines. 2. The analysis involves classifying buses as slack, generator, or load buses and formulating the network equations based on the bus admittance matrix. 3. Solving the load flow problem involves determining the complex voltages across all buses given the network configuration and bus demands. This provides critical information for monitoring overloads and voltage deviations.

importancesignificancepower flow analysis
Proposed Communication
architecture
 Nodes 1-7 represent the customers or the meters associated
with them.
 The nodes or meters are connected to main module placed
at distribution transformer through Zigbee
 As the ordinary meter transmits data of nearly 34MB per
month. Based on memory it transfers it will be charged.
 As the range of Zigbee is less the distance between
Distribution transformer and nearest residential customer
ranges from 10-50m
 The data collected at various distribution trsnformer is sent to
its parent substation through WiFi network as the distance
varies from 1-10KM
Smart metering and control of transmission system
 The backbone of the Smart Grid will be its network.
 This network will connect the different components of the Smart Grid
together, and allow two-way communication between them.
 Net- working the components together will introduce security risks
into the system.
 The number of entry points that can be used to gain access to the
electrical power system will increase when all of the components
are networked together.
Cyber security
 Cyber security is a concept that has become increasingly prevalent
with the development of the smart grid technology with the
increased use of digital information and controls technology to
improve reliability, security, efficiency of the electric grid and the
deployment of smart technologies (real - time, automated,
interactive technologies that optimize the physical operation of
appliances and consumer devices) for metering, communications
concerning grid operations and status, and distribution automation.

Recommended for you

automatic power factor correction report
automatic power factor correction reportautomatic power factor correction report
automatic power factor correction report

The document describes a project to develop an automatic power factor correction system using a microcontroller. Power factor is an important measure of efficiency in power systems but decreases with increasing inductive loads. The project aims to design a microcontroller-based control system that can monitor power factor and switch capacitor banks in and out to maintain a high power factor close to unity. This will reduce losses in the power system and increase efficiency for both consumers and suppliers. The system design includes current and voltage sensors, a zero-crossing detector, microcontroller calculation of power factor, and relays to switch capacitors banks to compensate for inductive loads.

power factorarduinocapacitor
Ppt power theft identification and detection using gsm
Ppt power theft identification and detection using gsmPpt power theft identification and detection using gsm
Ppt power theft identification and detection using gsm

This document describes a project to identify and locate power theft using GSM. It includes a block diagram and description of the components used, including a microcontroller, GSM module, touch sensor, LCD display, and buzzer. The system works by detecting unauthorized access to the power supply through the touch sensor and sending an SMS using the GSM module to alert authorities. It aims to reduce power theft in India in an optimized and automated way. Some limitations are that it requires power and a large-scale implementation would take time, but it can effectively curb theft by detecting locations.

powergsm
Smart metering-system
Smart metering-systemSmart metering-system
Smart metering-system

The topic gives a brief insight into the working and infrastructure of the Smart Meters and the networking protocols.

smart meters
Problems Occurred Due to Lack Of
Cyber Security
 In 2001, hackers penetrated the California Independent System Operator, which
oversees most of the State’s electricity transmission grid; attacks were routed
through California, Oklahoma, and China.
 Ohio’s Davis-Besse (Oak Harbor, Ohio, the United States )nuclear power plant
safety monitoring system was offline for five (5) hours due to the Slammer worm
in January 2003.
 In March 2005, security consultants within the electric industry reported that
hackers were targeting the U.S. electric power grid and had gained access to
U.S. utilities electronic control systems.
 In April 2009, the Wall Street Journal reported that spies hacked into the U.S.
electric grid and left behind computer programs that could allow them to
disrupt service. Associated Press on August 4, 2010 reported “Hackers Try to Take
overPower Plants.” In September 2010, cyber experts discovered for the first time
a malicious computer code, called a worm, specifically created to take over
systems that control the inner workings of industrial plants.
Worm
 A worm is a small piece of software that uses security holes within
networks to replicate itself. The worm scans the network for another
computer that has a specific security hole. It copies itself to the new
machine exploiting the security hole, and then starts replicating
from that system as well. Once infected, the worm may send itself to
everyone in your address book. Using a network in this manner,
worms expand extremely quickly. The greatest danger from worms is
that they will eventually use all the memory available to a computer
or a network.
 The Stuxnet Worm was reported in an Industrial Control Systems
Cyber Emergency Response Team Advisory on September 29, 2010.
Stuxnet is a Malware Targeting Siemens Control Software. It can be
used to infiltrate industrial control systems used in the power grid,
power plants and other infrastructure. It is reported to have the
ability to damage or possibly destroy control systems.
 The North American Electric Reliability Corporation (NERC) and
DOE released a report titled High-Impact, Low-Frequency Event Risk
to the North American Bulk Power System (June 2, 2010)16 that
identifies a certain class of high-impact, low-frequency risk shown to
have the potential to significantly affect the reliability of the North
American bulk power system..
Smart metering and control of transmission system

Recommended for you

5 pen pc technology ppt for seminor
5 pen pc technology ppt for seminor5 pen pc technology ppt for seminor
5 pen pc technology ppt for seminor

This document discusses the P-ISM, a pen-style personal networking gadget created in 2003 by Japanese company NCE. It describes the history and features of the P-ISM, which allows connection of different pen-shaped computers using wireless technology. The pens have functions like CPU, camera, keyboard, and communication. They are powered by batteries that can last up to two weeks. The document outlines the merits of portability and wireless features, as well as challenges around cost and unclear positioning. It concludes that this was an early example of increasingly small communication devices.

Spillways
SpillwaysSpillways
Spillways

This document discusses and defines different types of spillways used in dams. It describes controlled and uncontrolled spillways. Controlled spillways have gates to regulate water flow, while uncontrolled spillways release water once it reaches the spillway crest. The document then outlines and provides diagrams for several types of spillways including: straight drop, overflow, chute, side channel, shaft, siphon, labyrinth, and cascade spillways. Each type has distinct structural features and purposes in safely releasing water from reservoirs.

spillway typesspillwayskinds of spillways
Spillway
Spillway Spillway
Spillway

Spillways are structures used to safely discharge water from a reservoir during periods of high inflow or flooding. They are designed to maintain structural stability of the dam and pass excess water without raising the reservoir level above its maximum. Different types of spillways include overflow, chute, shaft, saddle and side channel spillways. Energy dissipation methods are also important to safely convey water discharged from spillways downstream.

introductionfunctionlocation of spillway
 Cyber Security includes
 Availability
 Integrity
 Confidentiality
Availability
 Availability refers to ensuring timely and reliable access to
information, which is the primary security goal of a smart-grid
metering and control system. Malicious attacks targeting availability
can be considered as denial-of-service attacks, which intend to
delay, block, or even corrupt the communication in the system.
 The jamming attack is able to defer the transmission of messages
and to distort the transmitted data signal. As a result, the legitimate
receiver cannot recover messages out of the damaged data
packets.
 On the other hand, many man-in-the-middle attacks can be
launched only when the full or partial communication channels can
be jammed.
Integrity
 Integrity refers to preventing or detecting the modification or
destruction of information by unauthorized persons or systems.
Malicious attacks targeting the integrity of a smart grid attempt to
stealthily manipulate critical data such as meter readings, billing
information, or control commands
 Integrity protection can be achieved by authentication,
certification, and attestation

Recommended for you

Electric Traction
Electric TractionElectric Traction
Electric Traction

Traction refers to the mechanism that drives a vehicle forward. Traction systems can be classified as non-electric or electric. Electric traction systems use electrical power to drive railways, trams, and trolleys. Electric traction is cleaner and more cost-effective than diesel traction. It provides high starting torque and regenerative braking that feeds energy back. While expensive initially, electric traction requires no coal and has lower maintenance costs than steam systems. Common electric systems include AC at various voltages and DC at 600V, 1200V, and 3000V. Thyristor control and separately excited DC motors allow efficient control of AC electric locomotives.

electrical students
1 Smart Meter Presentation
1 Smart Meter Presentation1 Smart Meter Presentation
1 Smart Meter Presentation

The document discusses challenges and solutions regarding the implementation of smart meters in Los Angeles homes. It outlines concerns from residential customers about the technology and aims to provide an equitable solution that maintains transparency and efficiency. Key challenges include reducing customer anxiety. Various alternatives are evaluated, including education, incentives, and installation methods. The recommendation is a multi-pronged approach combining workshops, free monitoring devices, training contractors, and staged messaging around the installation process.

meter implementationequitable solutionsmart meters
Solar energy
Solar energySolar energy
Solar energy

Solar energy is the conversion of sunlight into electricity or heat. It is a renewable and non-polluting energy source. Solar energy can be captured using photovoltaic cells or concentrated solar power systems and has many applications including generating electricity, heating water, drying crops, and powering vehicles. While solar energy has high initial costs, it has benefits such as being renewable, producing no emissions, and allowing energy production in remote areas not connected to power grids.

physicsalternative energysolar energy
Confidentiality
 Confidentiality refers to protecting personal privacy and proprietary
information from unauthorized access. Malicious attacks targeting
confidentiality aim at obtaining desirable information(e.g., power
usage, customer’s account information).
 An emerging trend is for the smart meters to aggregate usage data
for billing purposes and support load-balancing and other
monitoring functions through peer-to-peer protocols that preserve
the consumer’s privacy.
Cyber Solutions
 Data encrypton
 Authentication
 Digital signatures
Data Encryption
 Cryptography
 Cryptography has been the most widely used
technique to protect information from
adversaries. A message to be protected is
transformed using a Key that is only known to the
Sender and Receiver. The process of
transformation is called encryption and the
message to be encrypted is called Plain text.
The transformed or encrypted message is called
Cipher text. At the Receiver, the encrypted
message is decrypted.
Substitution cipher
Transposition cipher

Recommended for you

Energy meter
Energy meterEnergy meter
Energy meter

An energy meter measures the amount of electrical energy consumed. It works by using magnetic fields to rotate an aluminum disk, whose rotation is proportional to energy usage. The disk's rotation is retarded by permanent magnets to prevent over-rotation. Its movement is registered by mechanical counters displaying the energy consumed. Traditional meters have drawbacks like friction and flux inaccuracies over time. Smart meters provide more accuracy, longer life, and digital displays to address these issues.

Smart Meters
Smart MetersSmart Meters
Smart Meters

The document discusses smart meters and the smart grid. It defines the electric grid and how smart grids modernize it using communication technologies. Smart meters are two-way communicating electric meters that provide more detailed energy usage data to utilities in real-time. They are different than conventional meters by being bi-directional and able to connect to home networks and the smart grid. The benefits of smart meters include more accurate billing, outage detection, load management capabilities, and energy savings.

smart meters for smart grid
Solar Energy
Solar EnergySolar Energy
Solar Energy

This document provides an overview of solar energy. It discusses that solar energy originates from thermonuclear fusion in the sun and consists of radiant light and heat. It also discusses different types of solar radiation and how solar energy can be used for heating, cooling, and generating electricity through solar thermal technologies and photovoltaic cells. The document also discusses current and future prospects of solar power development in Pakistan.

Authentication
 Authentication is required to verify the identities of communicating
parties to avoid imposters gaining access to information.
Digital Signatures
A digital signature allows the signing of digital messages by the Sender
in such a way that:
 1. The Receiver can verify the claimed identity of the Sender
(authentication).
 2. The Receiver can prove and the Sender cannot deny that the
message has been sent by the specific user (non-repudiation).
 3. The Receiver cannot modify the message and claim that the
modified message is the one that was received from the Sender
 Cyber solutions (academic)
 An experimental study about the performance of a symmetric-key
cipher (i.e., DES-CBC) and a public-key cipher (i.e., RSA) on an
intelligent electronic device (IED) called TS7250 has been
conducted (Wang and Lu, 2013), where the IED is used for sending
the transformer status and receiving commands from the control
centre.
 These experimental results show that the computational ability of an
IED becomes a bottleneck for the delay performance when
performing asymmetric-key cryptography
 Due to the limited computational capabilities of devices, stringent
timing requirements, and high data-sampling rates in the smart grid,
traditional authentication schemes might not be applicable.

Recommended for you

Smart grid ppt
Smart grid pptSmart grid ppt
Smart grid ppt

This document discusses smart grid technology. It defines smart grid as an electric grid that uses information and communication technology to gather data and act on information about supplier and consumer behavior. The key components of a smart grid are smart meters, phasor measurement, information transfer, and distributed generation. A smart grid offers benefits like reduced carbon footprint, improved distribution management, self-healing capabilities, and increased efficiency. Specific ideas presented for a smart grid include a power management app that provides household electricity usage insights and allows selling regenerative power back to the grid.

smart grid
smart gridsmart grid
smart grid

this gives u information of smart grid infrastructure and smart metering and self healing and cyber security.

smart gridsmart metering
Nucleus of Smart Grid: Communication
Nucleus of Smart Grid: CommunicationNucleus of Smart Grid: Communication
Nucleus of Smart Grid: Communication

Networking technologies have gained tremendous development in the past decades as a separate industry sector. The creation of the Internet, mobile cellular networks, satellite networks, community networks, wired and wireless local area and personal networks, as well as the invention of diversified networking services has enormously enhanced our capability for information exchange. However, the modern networking technologies have not been leveraged sufficiently in power systems for optimized management. When we deploy smart grid, it is critical to take advantage of the advancements in networking technologies to enable the automated and intelligent system management. Although the currently available networking technologies have greatly satisfied our personal communication needs, applying them to power systems and addressing the specific requirements for power communications are challenging by all means.

smart gridamiutilities
 Universal Key:The heterogeneous communication architecture of
the smart grid has made the key management particularly
challenging, and it is not practical to design a universal key-
management scheme for the entire smart grid.
Authentication Security
 Authentication is crucial to protect the integrity of data and devices
in the smart grid.
 A number of authentication schemes have been proposed in the
literature for smart grids. Szilagyi and Koopman (2009 and 2010)
proposed flexible and low-cost multicast authentication schemes for
embedded control systems
 The basic idea is to verify truncated message authentication codes
(MACs) across multiple packets, thereby achieving a good trade-off
among authentication cost, delay performance, and tolerance to
attacks.
 Although many encryption, authentication, and key-management
schemes have been proposed, their performance does not seem to
fulfill the stringent timing requirements of the smart grid. Therefore,
fine-grained and advanced security protocols still need to be
developed for protecting different communication networks in
smart grids.
MACs
 Imagine that you are communicating with your friend through a
chat client. How will your friend's machine know that the message
he received is exactly the same message that you send?. And how
will he verify that the message was not altered in the middle.
 Even after implementing a secure authentication and data
encryption, integrity of the message needs to be versified, to
confirm, that the data was not tampered in the middle.

Recommended for you

Smart Grid & SCADA Systems
Smart Grid & SCADA SystemsSmart Grid & SCADA Systems
Smart Grid & SCADA Systems

The document discusses India's power grid network and the transition to a smart grid system. It provides information on: - India's existing regional power grids and their interconnections. - The definition and key characteristics of a smart grid, including its use of digital technology, smart meters, and two-way communication. - The advantages of a smart grid like enabling renewable energy integration, demand response programs, and modernizing transmission and distribution systems.

Journal new horizons volume 81-82
Journal new horizons volume 81-82Journal new horizons volume 81-82
Journal new horizons volume 81-82

Smart grids integrate traditional and renewable energy sources to create an efficient, reliable, and sustainable electricity system. They use two-way communication between utilities and consumers to manage energy production and consumption. This allows for more efficient transmission of power, better integration of distributed energy resources, and demand response programs. Real-time monitoring throughout the network improves reliability, power quality, and integration of electric vehicles. However, fully implementing smart grid capabilities requires upgrading infrastructure like meters, distribution automation, and communication networks.

ieeepakistanelectronics
Smart grid communications
Smart grid communicationsSmart grid communications
Smart grid communications

Advanced communications and metering plays a crucial role in Smart Grid. This presentation outlines the various technologies available for the same.

wide area monitoringsmart appliancesadvanced metering.
 In communication everything send over wire is data. So the thing
that will give the sender and the receiver the assurance, of
untampered data is also a small fixed length data called
MAC(Message authentication code).
Confidentiality Security
 In a smart grid, the utility company needs the real-time power-
consumption data for planning purposes as well as for providing
accurate and authentic billing. For the utility company, the
correctness of the calculated bills is the most important issue
 Researchers have designed privacy-preserving billing protocols
using advanced cryptographic techniques such as zero-knowledge
proof and homomorphic encryption
Zero-knowledge proof
 If proving the statement requires knowledge of some secret
information on the part of the prover, the definition implies that the
verifier will not be able to prove the statement in turn to anyone
else, since the verifier does not possess the secret information.
Homomorphic Encryption
 Homomorphic encryption is a form of encryption which allows
specific types of computations to be carried out on ciphertext and
generate an encrypted result which, when decrypted, matches the
result of operations performed on the plaintext.
 This is a desirable feature in modern communication system
architectures. Homomorphic encryption would allow the chaining
together of different services without exposing the data to each of
those services, for example a chain of different services from
different companies could 1) calculate the tax 2) the currency
exchange rate 3) shipping, on a transaction without exposing the
unencrypted data to each of those services.[

Recommended for you

1678 1683
1678 16831678 1683
1678 1683

This document summarizes a research paper that proposes a design for a secure and sophisticated electricity meter called an Impregnable Device for Secured Metering (IDSM). The IDSM uses a microcontroller integrated with a smart meter to securely transmit power consumption data via a legacy Wi-Fi system. Random number addressing cryptography (RAC) is used for encryption due to its high speed, low power usage, and security. The IDSM system connects individual household meters to a centralized server that calculates billing amounts and sends updates back to the meters for display. The goal is to provide secure metering and billing that reduces human error and electricity theft while lowering costs.

1678 1683
1678 16831678 1683
1678 1683

This document summarizes a research paper that proposes a design for a secure, Wi-Fi integrated electricity meter called an Impregnable Device for Secured Metering (IDSM). The IDSM consists of a sophisticated meter with additional security features compared to traditional meters. It uses Wi-Fi communication, a microcontroller, and a centralized monitoring and control unit. Random number addressing cryptography (RAC) is chosen as the most secure encryption technique. The meter in each home connects via a wireless network to a server that calculates billing amounts and sends updates to be displayed on the home meter, reducing labor while increasing transparency. The design aims to provide secure communication at high speeds with an advanced metering system and unique database backend.

Advance Metering Infrastructure:Smart Meter
Advance Metering Infrastructure:Smart MeterAdvance Metering Infrastructure:Smart Meter
Advance Metering Infrastructure:Smart Meter

1) Traditional electromechanical meters have issues like drift over time and temperature that digital smart meters improve on. Smart meters allow for automated and remote reading to improve efficiency. 2) Advanced Metering Infrastructure involves integrating smart meters, communication networks, and data management systems to allow two-way communication between utilities and customers. This enables features like time-of-use pricing and remote service disconnects. 3) Key components of AMI include smart meters, wide area communication networks, home area networks connected to devices, and meter data management systems to aggregate and analyze usage data.

 Using those advanced cryptographic techniques, utility companies
only receive the commitments of the real-time power consumption
instead of the raw data from smart meters, and customers can
prove to the utility company that a utility bill has been correctly
generated
 However, from the customer’s perspective, privacy is the main
concern.
 Garcia and Jacobs (2012) proposed the use of homomorphic
encryption to prevent the utility company from accessing the power
consumption data of individual households. Using those advanced
cryptographic techniques, utility companies only receive the
commitments of the real-time power consumption instead of the
raw data from smart meters, and customers can prove to the utility
company that a utility bill has been correctly generated
SELF HEALING
What is Self Healing??
 SELF-HEALING of power delivery systems is a concept that enables
the identification and isolation of faulted system components and
the restoration of service to customers supplied by healthy elements.
 Self-healing of power distribution systems is conducted via
Distribution Automation (DA), specifically through smart protective
and switching devices that minimize the number of interrupted
customers during contingency conditions by automatically isolating
faulted components and transferring customers to an optional
source when their normal supply has been lost.
 Distribution Automation: Distribution Automation (DA) is a set of
technologies that enable an electric utility to monitor, coordinate,
and operate distribution components in a real-time mode from
remote locations.

Recommended for you

Concepts of smart meter
Concepts of smart meterConcepts of smart meter
Concepts of smart meter

Smart meters are advanced electric meters that allow two-way communication between the utility and customers. They provide benefits like more accurate billing, outage detection, and potential cost savings through time-based pricing programs. However, some are concerned about the health effects of the radiofrequency radiation emitted by smart meters and their mesh networks. Opponents argue that smart meters increase overall radiation exposure and fossil fuel usage compared to traditional analog meters. The World Health Organization has classified radiofrequency electromagnetic fields as possibly carcinogenic to humans based on some evidence of increased cancer risk from cell phone use.

A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...

This document discusses challenges at the MAC layer for machine-to-machine (M2M) communications. It first describes issues around efficient, scalable and fair channel access for large numbers of M2M devices. It then discusses application layer protocols used to connect devices and applications to the internet, including CoAP, MQTT, and WebSocket. Finally, it analyzes MAC layer issues for a smart home example using M2M for power management, security and assisted living for the elderly. Key challenges include supporting diverse quality of service needs, large numbers of devices sharing channels, energy efficiency needs, and low-cost hardware requirements.

irjet
Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)
Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)
Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)

This document provides a review and analysis of communication network schemes for Advanced Metering Infrastructure (AMI). It begins with an overview of AMI components and communication framework, including smart meters, Meter Data Management Systems (MDMS), and the two-layer network of a smart meter network and backhaul network. Popular wired (power line communication, fiber optic) and wireless (cellular, WiFi, ZigBee) communication technologies for AMI are then discussed in terms of their advantages and disadvantages. Finally, a hybrid WiMAX-fiber optic solution is recommended and its performance is evaluated through simulation.

An illustration of self healing
 Automatic fail over scheme for transmission fault
 so that if one supply line fails, the customers supplied via that circuit are quickly
transferred to the backup source by automatic failover control circuitry.
 The limitation is while switching the load from second line to first line, the we
need to check supply should be greater than load
 There are several additional practical aspects that need to be
considered when implementing self-restoration, besides the DA
system architecture it is necessary to consider loading ratings and
voltage limits, since transferring load to a highly loaded and long
feeder may end up generating power quality complaints (low
voltage in this case),
FLISR an application of Distribution
Automation
 The smart grid concept is driving the implementation of a series of self-
restoration schemes in the form of DA applications. The most popular of these is
FLISR, which consists of the utilization of advanced protective and switching
devices to automatically locate and isolate faulted feeder sections and restore
the maximum number of customers possible located on healthy sections.
 FLISR benefits include
 Improve SAIDI, SAIFI, and other reliability statistics
 Reduce “energy not supplied” (kWh)
 Reduce fault investigation time
 Provide “premium quality” service
Monetary benefits:
 Reduce customer cost of outage
 Increase revenue (sell more energy)
Advantages of implementing FLISR
 the advantages of implementing FLISR versus conventional
operation for a typical distribution feeder when conventional
operation (without FLISR)
 there is a need for investigating the specific fault location and
conducting manual switching to isolate the faulted area and restore
service to customers located on healthy feeder sections.
 Here customer trouble call may play an important role.
 FLISR on the other side allows detecting faults and restoring affected
customers faster and with limited human intervention.
 When FLISR is used power is quickly restored to customers located on
healthy sections of a feeder.

Recommended for you

Smart Grid technicalDraw neat diagram for equivalent circuit of transformer.
Smart Grid technicalDraw neat diagram for equivalent circuit of transformer.Smart Grid technicalDraw neat diagram for equivalent circuit of transformer.
Smart Grid technicalDraw neat diagram for equivalent circuit of transformer.

The document provides an overview of smart grids, including: 1) Smart grids use digital technology and communication to make the electric grid more efficient, reliable, and able to integrate renewable energy sources. 2) Key components of a smart grid include smart meters, sensors, communication networks, and data management systems to provide two-way communication between utilities and consumers. 3) Potential benefits of smart grids include reduced costs, fewer power outages, lower emissions, and giving consumers more control over their energy usage.

Wireless meter reading system
Wireless meter reading systemWireless meter reading system
Wireless meter reading system

The document describes the development of a Wireless Automatic Meter Reading System (WAMRS) in Oman. Key aspects include: 1) WAMRS allows for non-intrusive and wireless collection of electricity consumption data from customer premises via a premises unit that transmits to central points and a billing office server. 2) The premises unit utilizes a digital meter, microcontroller, wireless transmitter chip, and memory to periodically transmit consumption data. 3) Central points receive data from premises units and retransmit over longer distances to the billing office server and database. 4) The system authenticates devices and transmissions using a three-way handshake protocol and random number table for security.

microcontrol
Paper id 24201457
Paper id 24201457Paper id 24201457
Paper id 24201457

This document describes a wireless SCADA system for industrial automation using M2M communication. The system uses various sensors to measure parameters like temperature, humidity, light, and LPG. An ADC converts the analog sensor readings to digital values, which a microcontroller processes and sends via GSM to a remote computer. The system allows monitoring and controlling industrial processes from anywhere via the internet. It aims to provide low-cost, low-power automation without distance barriers compared to traditional SCADAs. Future work may add switches/routers for networking and wireless cameras to improve security and monitoring capabilities.

Smart metering and control of transmission system
Smart metering and control of transmission system
Smart metering and control of transmission system
Smart metering and control of transmission system

Recommended for you

Final paperenhancing distribution system through the use of real time etherne...
Final paperenhancing distribution system through the use of real time etherne...Final paperenhancing distribution system through the use of real time etherne...
Final paperenhancing distribution system through the use of real time etherne...

This document discusses enhancing distribution systems through the use of real-time Ethernet in smart grids. It proposes using modern SCADA operation with RMUs installed at key locations on feeders interfacing with communication systems for quick fault identification and control. The paper compares conventional SCADA operations to modern operations in fault identification and restoration. Conventional methods took 30-45 minutes for partial restoration after manual isolator opening, while modern methods using remote RMU opening allowed partial restoration in a very short time. The document highlights communication architectures using Ethernet TCP/IP and various communication standards used to enhance grid performance.

Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues

The future power system will be an innovative administration of existing power grids, which is called smart grid. Above all, the application of advanced communication and computing tools is going to significantly improve the productivity and consistency of smart grid systems with renewable energy resources. Together with the topographies of the smart grid, cyber security appears as a serious concern since a huge number of automatic devices are linked through communication networks. Cyber attacks on those devices had a direct influence on the reliability of extensive infrastructure of the power system. In this survey, several published works related to smart grid system vulnerabilities, potential intentional attacks, and suggested countermeasures for these threats have been investigated.

Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security

This document discusses the cyber security risks of smart grids and proposes an integrated security framework to address these risks. Smart grids integrate information infrastructure with electrical infrastructure, improving performance but also increasing vulnerability to cyber attacks. The framework features security agents, managed security switches, and a security manager to provide layered protection, intrusion detection, and access control across the power automation network in a scalable and extensible manner. This integrated approach is needed as power systems have different security needs than traditional IT networks.

scadasmart gridcyber security
Smart metering and control of transmission system
Smart metering and control of transmission system
The overall objective of this approach is to identify those locations and
combinations of devices that attain the greatest cost-benefit ratio.
RENEWABLE
RESOURCES

Recommended for you

Smart meters.pptx
Smart meters.pptxSmart meters.pptx
Smart meters.pptx

Smart meters allow for two-way communication between utilities and customers, providing more accurate and timely consumption data than traditional electromechanical meters. This enables features like remote billing and service restoration. Smart meter infrastructure includes home area networks (HANs) connecting meters to devices, and wide area networks (WANs) transmitting data to the utility for billing, outage management and other analytics. Standards help ensure interoperability between the various communication and data processing components that make up advanced metering infrastructure (AMI).

smart metersevolution of metersami
The efficacy and challenges of scada and smart grid integration
The efficacy and challenges of scada and smart grid integrationThe efficacy and challenges of scada and smart grid integration
The efficacy and challenges of scada and smart grid integration

To initiate a 2 way communication between the load center's and the substation so they can monitor the electricity distribution at real time • To detect faults at their onset so that a resultant blackouts can be prevented • To regulate the energy consumption of utilities based on energy availability

electricitycommunication
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEMA ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM

This document presents a smart security system using Zigbee wireless technology, GSM, sensors, and a smartphone. The system allows a homeowner to monitor and control their home security from a remote location. When a sensor detects an intrusion, a signal is sent to a microcontroller and then to the homeowner's phone via Zigbee and GSM. The owner can then make a video call to view their home and optionally activate a gas spray or lock the doors for added protection. The system provides remote monitoring and control of a home security system in a low-cost and easy to install package.

zc (zigbee coordinator)mcu (micro controller)gsm (global system for mobile
 The key goal of smart grid is to promote active customer
participation and decision making as well as to create the
operation environment in which both utilities and electricity users
influence each other.
 In smart grids, users can influence utilities by adding distributed
generation sources such as photovoltaic (PV) modules or energy
storage at the point of use, and reacting pricing signals.
SMART GRID RENEWABLE ENERGY
SYSTEM
 The electricity grid to accommodate higher percentage of
renewable energy would need large quantities of conventional
back up power and huge energy storage.
 Smart grid technologies and concepts reduce barriers to the
integration of renewable resources and allow power grids to support
a greater percentage of variable renewable resources.
 Enabling smart grid technology, such as distributed storage,
demand response, advanced sensing, control software, information
infrastructure, and market signals, increases the ability to influence
and balance supply and demand.
 With smart grid technology, grid operators can better coordinate
and control the system in response to grid conditions, thus allowing
integration of increasingly greater levels of renewable resources
more effectively and at lower cost.
 Advanced Metering Instrument (AMI) and internet-based services
engage demand response and distributed storage to
accommodate higher penetration and cost-effective integration of
renewable energy generation.
 Advanced and automated integration systems, such as inverters
and converters with communications software interfaces, enable
distributed management and application integration for renewable
generation.

Recommended for you

PMSM-Motor-Control : A research about FOC
PMSM-Motor-Control : A research about FOCPMSM-Motor-Control : A research about FOC
PMSM-Motor-Control : A research about FOC

This is research about a process called field-oriented control (FOC) that is used to control the pmsm motor.

#pmsmfoc
UNIT I INCEPTION OF INFORMATION DESIGN 20CDE09-ID
UNIT I INCEPTION OF INFORMATION DESIGN 20CDE09-IDUNIT I INCEPTION OF INFORMATION DESIGN 20CDE09-ID
UNIT I INCEPTION OF INFORMATION DESIGN 20CDE09-ID

20CDE09- INFORMATION DESIGN UNIT I INCEPTION OF INFORMATION DESIGN Introduction and Definition History of Information Design Need of Information Design Types of Information Design Identifying audience Defining the audience and their needs Inclusivity and Visual impairment Case study.

information designinceptiondefine
Online music portal management system project report.pdf
Online music portal management system project report.pdfOnline music portal management system project report.pdf
Online music portal management system project report.pdf

The iMMS is a unique application that is synchronizing both user experience and copyrights while providing services like online music management, legal downloads, artists’ management. There are several other applications available in the market that either provides some specific services or large scale integrated solutions. Our product differs from the rest in a way that we give more power to the users remaining within the copyrights circle.

computer technologyscience and technologyproject management
SOLAR PV DESIGNS FOR SMART GRID
INTEGRATION
 A typical solar PV should provide two-way flows of power and
communication between the smart grid and the solar PV system.
 Three solar PV inverters are available which are the string, the
central and the newly developed micro inverter, known also as
integrated AC module inverter.
CENTRAL INVERTERS:
 The conventional solar PV installations feed DC voltage to a central inverter for
conditioning and distribution locally or across the power grid.
 The DC voltage carried through the array to the
central inverter may have significant fire and safety
hazards, leading to increased costs for cabling and,
in turn, higher costs for installation and
maintenance.
STRING INVERTERS
 string inverters eliminate the need for a central inverter
by providing DC-AC conversion at the output of
each string.
MICRO INVERTERS:
 Recent researches focus on micro inverters
which take the concept of string inverters to the
next level - providing DC-AC conversion from
each individual panel rather than an entire string.
 algorithms for efficient DC-AC conversion, circuit protection
and PV panel power optimization through maximum power-point tracking
(MPPT) (di/dv) + (i/v) of the PV array is zero (derived from dP/dv = 0).

Recommended for you

LeetCode Database problems solved using PySpark.pdf
LeetCode Database problems solved using PySpark.pdfLeetCode Database problems solved using PySpark.pdf
LeetCode Database problems solved using PySpark.pdf

Pyspark

Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...

For Ad Post Contact :- adityaroy0215@gmail.com Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel With 100% Satisfaction

GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdfGUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf

Energy market

 This concept is shown in this Fig. The processor and control unit is used to control
power flow from the PV panel to the grid and executes the MPPT algorithm, fault
control, and digital communication routines.
BENEFITS OF SMART GRID RENEWABLE
ENERGIES
 First, enabling renewable energy resources to accommodate higher
penetration with cost effective while improving power quality and
reliability.
 Second, integrating consumers as active players in the electricity
system; savings, achieved by reducing peaks in demand and
improving energy efficiency, as well as cutting greenhouse gas
emissions.
 Finally, voltage regulation and load following enables reducing cost
of operations based on marginal production costs.
Future Advances and
Implementations of SMART
GRID
WinD EnergY

Recommended for you

Chlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptxChlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptx

Chlorine and Nitric acid

Response & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITHResponse & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITH

Talk covering Guardrails , Jailbreak, What is an alignment problem? RLHF, EU AI Act, Machine & Graph unlearning, Bias, Inconsistency, Probing, Interpretability, Bias

machine learningchatgptaisafety
Unblocking The Main Thread - Solving ANRs and Frozen Frames
Unblocking The Main Thread - Solving ANRs and Frozen FramesUnblocking The Main Thread - Solving ANRs and Frozen Frames
Unblocking The Main Thread - Solving ANRs and Frozen Frames

In the realm of Android development, the main thread is our stage, but too often, it becomes a battleground where performance issues arise, leading to ANRS, frozen frames, and sluggish Uls. As we strive for excellence in user experience, understanding and optimizing the main thread becomes essential to prevent these common perforrmance bottlenecks. We have strategies and best practices for keeping the main thread uncluttered. We'll examine the root causes of performance issues and techniques for monitoring and improving main thread health as wel as app performance. In this talk, participants will walk away with practical knowledge on enhancing app performance by mastering the main thread. We'll share proven approaches to eliminate real-life ANRS and frozen frames to build apps that deliver butter smooth experience.

androidperformance
Smart grid integrates
all the small electric
heat pumps.
It controls or
coordinates a whole
lot of heat pumps
according to the
variations in the
demand side.
If wind energy is
utilized properly, it
would even satisfy the
electrical needs of the
country easily.
ElectriC VehicleS
We can say that the invention of
electric vehicles was a great
Achievement, even though it was
Invented a long time ago, its
Importance is seen with the advent
of this great technology Smart Grid.
Due to the use of electric vehicles,
there is a significant reduce in the
amounts of usage of fossil fuels and
thereby reducing the green house effect.
We can charge these vehicles whenever we need electricity and discharge this and
give it back to the system whenever the system needs it.
ActivatioN Of EquipmentS
This is the best feature
of SMART GRID. We
can know
Peak hours times and
the availability of
electricity at low cost
times. We can
therefore use the
electricity efficiently
and economically.
ProsumerS

Recommended for you

IS Code SP 23: Handbook on concrete mixes
IS Code SP 23: Handbook  on concrete mixesIS Code SP 23: Handbook  on concrete mixes
IS Code SP 23: Handbook on concrete mixes

SP-23: Hand Bank on Concrete Mixes required at the time designing

sp-23: hand bank of concrete
Unit 1 Information Storage and Retrieval
Unit 1 Information Storage and RetrievalUnit 1 Information Storage and Retrieval
Unit 1 Information Storage and Retrieval

Introduction to information retrieval, Major challenges in IR

1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT

1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT

1239_2.pdf for procurement
The producer is alerted
the condition of a low
electricity status, he can
thereby transfer the stored
energy to the required
place, with just a click on
his phone.
No mediators are
involved in this process
ZerO EnergY HousE
 A zero-energy building, also known as a zero net energy (ZNE)
building, net-zero energy building (NZEB), or net zero building, is a
building with zero net energy consumption, meaning the total
amount of energy used by the building on an annual basis is roughly
equal to the amount of renewable energy created on the site.
 These buildings still produce greenhouse gases because on cloudy
(or non-windy) days, at night when the sun isn't shining, and on short
winter days, conventional grid power is still the main energy source.
 The zero net energy consumption principle is viewed as a means to
reduce carbon emissions and reduce dependence on fossil fuels.
ZerO EnergY HousE
Conclusion
 Smart grid is the key to integrating large amounts of renewable
energy into the power system. The smart grid intelligently binds the
entire energy system together and the most effective way of
expanding the power system to meet the challenges of the future.
 After few years smart grid roll out will revolutionize the day–to-day
life we use energy . With the advent of this technology people get
familiar with the theories of power systems.
 In the 19th and 20th century electrification developed to the
industrial revolution, likewise in the 21th century is most likely to the
significant contribution to the transition to the sustainable society
based on renewables to the benefit of people , the economy and
the environment through out the world

Recommended for you

OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdfOCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf

OCS Training Institute is pleased to co-operate with a Global provider of Rig Inspection/Audits, Commission-ing, Compliance & Acceptance as well as & Engineering for Offshore Drilling Rigs, to deliver Drilling Rig Inspec-tion Workshops (RIW) which teaches the inspection & maintenance procedures required to ensure equipment integrity. Candidates learn to implement the relevant standards & understand industry requirements so that they can verify the condition of a rig’s equipment & improve safety, thus reducing the number of accidents and protecting the asset.

traininginspectiontrainingcourse
Rohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Rohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model SafeRohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Rohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe

Rohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe

Press Tool and It's Primary Components.pdf
Press Tool and It's Primary Components.pdfPress Tool and It's Primary Components.pdf
Press Tool and It's Primary Components.pdf

Press Tool and It's Primary Components

THANK YOU

More Related Content

What's hot

Load Forecasting
Load ForecastingLoad Forecasting
Load Forecasting
linsstalex
 
Reactive power compensation
Reactive power compensationReactive power compensation
Reactive power compensation
Venkata Satya Naveen KSS
 
Load flow studies 19
Load flow studies 19Load flow studies 19
Load flow studies 19
Asha Anu Kurian
 
Wireless power theft monitoring
Wireless power theft monitoringWireless power theft monitoring
Wireless power theft monitoring
Biswajit Pratihari
 
Primry & backup protection
Primry & backup protectionPrimry & backup protection
Primry & backup protection
qasmi100
 
Chapter 01- High Voltage Engineering Introduction
Chapter 01- High Voltage Engineering IntroductionChapter 01- High Voltage Engineering Introduction
Chapter 01- High Voltage Engineering Introduction
MUET SZAB Campus Khairpur Mir's Sindh Pakistan
 
automatic meter reading
automatic meter readingautomatic meter reading
automatic meter reading
msubashece001
 
PROJECT REPORT
PROJECT REPORTPROJECT REPORT
PROJECT REPORT
ShivarajaDM
 
A Training Report Of Saltlake 132/33kv Substation
A Training Report Of Saltlake 132/33kv SubstationA Training Report Of Saltlake 132/33kv Substation
A Training Report Of Saltlake 132/33kv Substation
Subhrajit Ghosh
 
Underground cables
Underground cablesUnderground cables
Underground cables
siddheshsawant31
 
Electricity load forecasting by artificial neural network model
Electricity load forecasting by artificial neural network modelElectricity load forecasting by artificial neural network model
Electricity load forecasting by artificial neural network model
IAEME Publication
 
Advance Metering Infrastructure: Smart Meter
Advance Metering Infrastructure: Smart MeterAdvance Metering Infrastructure: Smart Meter
Advance Metering Infrastructure: Smart Meter
MD NAWAZ
 
Introduction of wide area mesurement syatem
Introduction of wide area mesurement syatemIntroduction of wide area mesurement syatem
Introduction of wide area mesurement syatem
PanditNitesh
 
Protection against overvoltage
Protection against overvoltageProtection against overvoltage
Protection against overvoltage
vishalgohel12195
 
Traction Motors and Control
Traction Motors and ControlTraction Motors and Control
Traction Motors and Control
SANTOSH GADEKAR
 
Power Quality Audit.pptx
Power Quality Audit.pptxPower Quality Audit.pptx
Power Quality Audit.pptx
KarthikeyanK816516
 
Power system planing and operation (pce5312) chapter five
Power system planing and operation (pce5312) chapter fivePower system planing and operation (pce5312) chapter five
Power system planing and operation (pce5312) chapter five
Adama Science and Technology University
 
Power flow analysis
Power flow analysisPower flow analysis
Power flow analysis
Revathi Subramaniam
 
automatic power factor correction report
automatic power factor correction reportautomatic power factor correction report
automatic power factor correction report
amaljo joju e
 
Ppt power theft identification and detection using gsm
Ppt power theft identification and detection using gsmPpt power theft identification and detection using gsm
Ppt power theft identification and detection using gsm
radha krishna
 

What's hot (20)

Load Forecasting
Load ForecastingLoad Forecasting
Load Forecasting
 
Reactive power compensation
Reactive power compensationReactive power compensation
Reactive power compensation
 
Load flow studies 19
Load flow studies 19Load flow studies 19
Load flow studies 19
 
Wireless power theft monitoring
Wireless power theft monitoringWireless power theft monitoring
Wireless power theft monitoring
 
Primry & backup protection
Primry & backup protectionPrimry & backup protection
Primry & backup protection
 
Chapter 01- High Voltage Engineering Introduction
Chapter 01- High Voltage Engineering IntroductionChapter 01- High Voltage Engineering Introduction
Chapter 01- High Voltage Engineering Introduction
 
automatic meter reading
automatic meter readingautomatic meter reading
automatic meter reading
 
PROJECT REPORT
PROJECT REPORTPROJECT REPORT
PROJECT REPORT
 
A Training Report Of Saltlake 132/33kv Substation
A Training Report Of Saltlake 132/33kv SubstationA Training Report Of Saltlake 132/33kv Substation
A Training Report Of Saltlake 132/33kv Substation
 
Underground cables
Underground cablesUnderground cables
Underground cables
 
Electricity load forecasting by artificial neural network model
Electricity load forecasting by artificial neural network modelElectricity load forecasting by artificial neural network model
Electricity load forecasting by artificial neural network model
 
Advance Metering Infrastructure: Smart Meter
Advance Metering Infrastructure: Smart MeterAdvance Metering Infrastructure: Smart Meter
Advance Metering Infrastructure: Smart Meter
 
Introduction of wide area mesurement syatem
Introduction of wide area mesurement syatemIntroduction of wide area mesurement syatem
Introduction of wide area mesurement syatem
 
Protection against overvoltage
Protection against overvoltageProtection against overvoltage
Protection against overvoltage
 
Traction Motors and Control
Traction Motors and ControlTraction Motors and Control
Traction Motors and Control
 
Power Quality Audit.pptx
Power Quality Audit.pptxPower Quality Audit.pptx
Power Quality Audit.pptx
 
Power system planing and operation (pce5312) chapter five
Power system planing and operation (pce5312) chapter fivePower system planing and operation (pce5312) chapter five
Power system planing and operation (pce5312) chapter five
 
Power flow analysis
Power flow analysisPower flow analysis
Power flow analysis
 
automatic power factor correction report
automatic power factor correction reportautomatic power factor correction report
automatic power factor correction report
 
Ppt power theft identification and detection using gsm
Ppt power theft identification and detection using gsmPpt power theft identification and detection using gsm
Ppt power theft identification and detection using gsm
 

Viewers also liked

Smart metering-system
Smart metering-systemSmart metering-system
Smart metering-system
NIT MEGHALAYA
 
5 pen pc technology ppt for seminor
5 pen pc technology ppt for seminor5 pen pc technology ppt for seminor
5 pen pc technology ppt for seminor
priyanka reddy
 
Spillways
SpillwaysSpillways
Spillways
Waleed Liaqat
 
Spillway
Spillway Spillway
Spillway
Naval Bandawar
 
Electric Traction
Electric TractionElectric Traction
Electric Traction
Nawaz Nz
 
1 Smart Meter Presentation
1 Smart Meter Presentation1 Smart Meter Presentation
1 Smart Meter Presentation
neumond
 
Solar energy
Solar energySolar energy
Solar energy
Ameenah
 
Energy meter
Energy meterEnergy meter
Energy meter
حیدر علی
 
Smart Meters
Smart MetersSmart Meters
Smart Meters
Anshul Shrivastava
 
Solar Energy
Solar EnergySolar Energy
Solar Energy
Tamseela Bibi
 
Smart grid ppt
Smart grid pptSmart grid ppt
Smart grid ppt
Ravish Pandey
 

Viewers also liked (11)

Smart metering-system
Smart metering-systemSmart metering-system
Smart metering-system
 
5 pen pc technology ppt for seminor
5 pen pc technology ppt for seminor5 pen pc technology ppt for seminor
5 pen pc technology ppt for seminor
 
Spillways
SpillwaysSpillways
Spillways
 
Spillway
Spillway Spillway
Spillway
 
Electric Traction
Electric TractionElectric Traction
Electric Traction
 
1 Smart Meter Presentation
1 Smart Meter Presentation1 Smart Meter Presentation
1 Smart Meter Presentation
 
Solar energy
Solar energySolar energy
Solar energy
 
Energy meter
Energy meterEnergy meter
Energy meter
 
Smart Meters
Smart MetersSmart Meters
Smart Meters
 
Solar Energy
Solar EnergySolar Energy
Solar Energy
 
Smart grid ppt
Smart grid pptSmart grid ppt
Smart grid ppt
 

Similar to Smart metering and control of transmission system

smart grid
smart gridsmart grid
smart grid
Gundu Durgarao
 
Nucleus of Smart Grid: Communication
Nucleus of Smart Grid: CommunicationNucleus of Smart Grid: Communication
Nucleus of Smart Grid: Communication
Sougata Mitra
 
Smart Grid & SCADA Systems
Smart Grid & SCADA SystemsSmart Grid & SCADA Systems
Smart Grid & SCADA Systems
Pratim Chakrabortty
 
Journal new horizons volume 81-82
Journal new horizons volume 81-82Journal new horizons volume 81-82
Journal new horizons volume 81-82
Muhammad Saad Ali
 
Smart grid communications
Smart grid communicationsSmart grid communications
Smart grid communications
srikanth reddy
 
1678 1683
1678 16831678 1683
1678 1683
Editor IJARCET
 
1678 1683
1678 16831678 1683
1678 1683
Editor IJARCET
 
Advance Metering Infrastructure:Smart Meter
Advance Metering Infrastructure:Smart MeterAdvance Metering Infrastructure:Smart Meter
Advance Metering Infrastructure:Smart Meter
MD NAWAZ
 
Concepts of smart meter
Concepts of smart meterConcepts of smart meter
Concepts of smart meter
Vasanthan Ravichandran
 
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
IRJET Journal
 
Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)
Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)
Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)
Desong Bian
 
Smart Grid technicalDraw neat diagram for equivalent circuit of transformer.
Smart Grid technicalDraw neat diagram for equivalent circuit of transformer.Smart Grid technicalDraw neat diagram for equivalent circuit of transformer.
Smart Grid technicalDraw neat diagram for equivalent circuit of transformer.
pravingauda84
 
Wireless meter reading system
Wireless meter reading systemWireless meter reading system
Wireless meter reading system
mangal das
 
Paper id 24201457
Paper id 24201457Paper id 24201457
Paper id 24201457
IJRAT
 
Final paperenhancing distribution system through the use of real time etherne...
Final paperenhancing distribution system through the use of real time etherne...Final paperenhancing distribution system through the use of real time etherne...
Final paperenhancing distribution system through the use of real time etherne...
Genc Gjergjani
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
journalBEEI
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
JAZEEL K T
 
Smart meters.pptx
Smart meters.pptxSmart meters.pptx
Smart meters.pptx
KarthikeyanK816516
 
The efficacy and challenges of scada and smart grid integration
The efficacy and challenges of scada and smart grid integrationThe efficacy and challenges of scada and smart grid integration
The efficacy and challenges of scada and smart grid integration
Faizal Faizi
 
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEMA ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM
ijistjournal
 

Similar to Smart metering and control of transmission system (20)

smart grid
smart gridsmart grid
smart grid
 
Nucleus of Smart Grid: Communication
Nucleus of Smart Grid: CommunicationNucleus of Smart Grid: Communication
Nucleus of Smart Grid: Communication
 
Smart Grid & SCADA Systems
Smart Grid & SCADA SystemsSmart Grid & SCADA Systems
Smart Grid & SCADA Systems
 
Journal new horizons volume 81-82
Journal new horizons volume 81-82Journal new horizons volume 81-82
Journal new horizons volume 81-82
 
Smart grid communications
Smart grid communicationsSmart grid communications
Smart grid communications
 
1678 1683
1678 16831678 1683
1678 1683
 
1678 1683
1678 16831678 1683
1678 1683
 
Advance Metering Infrastructure:Smart Meter
Advance Metering Infrastructure:Smart MeterAdvance Metering Infrastructure:Smart Meter
Advance Metering Infrastructure:Smart Meter
 
Concepts of smart meter
Concepts of smart meterConcepts of smart meter
Concepts of smart meter
 
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
 
Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)
Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)
Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)
 
Smart Grid technicalDraw neat diagram for equivalent circuit of transformer.
Smart Grid technicalDraw neat diagram for equivalent circuit of transformer.Smart Grid technicalDraw neat diagram for equivalent circuit of transformer.
Smart Grid technicalDraw neat diagram for equivalent circuit of transformer.
 
Wireless meter reading system
Wireless meter reading systemWireless meter reading system
Wireless meter reading system
 
Paper id 24201457
Paper id 24201457Paper id 24201457
Paper id 24201457
 
Final paperenhancing distribution system through the use of real time etherne...
Final paperenhancing distribution system through the use of real time etherne...Final paperenhancing distribution system through the use of real time etherne...
Final paperenhancing distribution system through the use of real time etherne...
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
 
Smart meters.pptx
Smart meters.pptxSmart meters.pptx
Smart meters.pptx
 
The efficacy and challenges of scada and smart grid integration
The efficacy and challenges of scada and smart grid integrationThe efficacy and challenges of scada and smart grid integration
The efficacy and challenges of scada and smart grid integration
 
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEMA ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM
 

Recently uploaded

PMSM-Motor-Control : A research about FOC
PMSM-Motor-Control : A research about FOCPMSM-Motor-Control : A research about FOC
PMSM-Motor-Control : A research about FOC
itssurajthakur06
 
UNIT I INCEPTION OF INFORMATION DESIGN 20CDE09-ID
UNIT I INCEPTION OF INFORMATION DESIGN 20CDE09-IDUNIT I INCEPTION OF INFORMATION DESIGN 20CDE09-ID
UNIT I INCEPTION OF INFORMATION DESIGN 20CDE09-ID
GOWSIKRAJA PALANISAMY
 
Online music portal management system project report.pdf
Online music portal management system project report.pdfOnline music portal management system project report.pdf
Online music portal management system project report.pdf
Kamal Acharya
 
LeetCode Database problems solved using PySpark.pdf
LeetCode Database problems solved using PySpark.pdfLeetCode Database problems solved using PySpark.pdf
LeetCode Database problems solved using PySpark.pdf
pavanaroshni1977
 
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Miss Khusi #V08
 
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdfGUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
ProexportColombia1
 
Chlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptxChlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptx
yadavsuyash008
 
Response & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITHResponse & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITH
IIIT Hyderabad
 
Unblocking The Main Thread - Solving ANRs and Frozen Frames
Unblocking The Main Thread - Solving ANRs and Frozen FramesUnblocking The Main Thread - Solving ANRs and Frozen Frames
Unblocking The Main Thread - Solving ANRs and Frozen Frames
Sinan KOZAK
 
IS Code SP 23: Handbook on concrete mixes
IS Code SP 23: Handbook  on concrete mixesIS Code SP 23: Handbook  on concrete mixes
IS Code SP 23: Handbook on concrete mixes
Mani Krishna Sarkar
 
Unit 1 Information Storage and Retrieval
Unit 1 Information Storage and RetrievalUnit 1 Information Storage and Retrieval
Unit 1 Information Storage and Retrieval
KishorMahale5
 
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
Mani Krishna Sarkar
 
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdfOCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
Muanisa Waras
 
Rohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Rohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model SafeRohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Rohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
binna singh$A17
 
Press Tool and It's Primary Components.pdf
Press Tool and It's Primary Components.pdfPress Tool and It's Primary Components.pdf
Press Tool and It's Primary Components.pdf
Tool and Die Tech
 
Development of Chatbot Using AI/ML Technologies
Development of  Chatbot Using AI/ML TechnologiesDevelopment of  Chatbot Using AI/ML Technologies
Development of Chatbot Using AI/ML Technologies
maisnampibarel
 
How to Manage Internal Notes in Odoo 17 POS
How to Manage Internal Notes in Odoo 17 POSHow to Manage Internal Notes in Odoo 17 POS
How to Manage Internal Notes in Odoo 17 POS
Celine George
 
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
Jim Mimlitz, P.E.
 
Net Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK EmpireNet Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK Empire
Global Network for Zero
 
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and PreventionUnderstanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Bert Blevins
 

Recently uploaded (20)

PMSM-Motor-Control : A research about FOC
PMSM-Motor-Control : A research about FOCPMSM-Motor-Control : A research about FOC
PMSM-Motor-Control : A research about FOC
 
UNIT I INCEPTION OF INFORMATION DESIGN 20CDE09-ID
UNIT I INCEPTION OF INFORMATION DESIGN 20CDE09-IDUNIT I INCEPTION OF INFORMATION DESIGN 20CDE09-ID
UNIT I INCEPTION OF INFORMATION DESIGN 20CDE09-ID
 
Online music portal management system project report.pdf
Online music portal management system project report.pdfOnline music portal management system project report.pdf
Online music portal management system project report.pdf
 
LeetCode Database problems solved using PySpark.pdf
LeetCode Database problems solved using PySpark.pdfLeetCode Database problems solved using PySpark.pdf
LeetCode Database problems solved using PySpark.pdf
 
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
 
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdfGUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
 
Chlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptxChlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptx
 
Response & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITHResponse & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITH
 
Unblocking The Main Thread - Solving ANRs and Frozen Frames
Unblocking The Main Thread - Solving ANRs and Frozen FramesUnblocking The Main Thread - Solving ANRs and Frozen Frames
Unblocking The Main Thread - Solving ANRs and Frozen Frames
 
IS Code SP 23: Handbook on concrete mixes
IS Code SP 23: Handbook  on concrete mixesIS Code SP 23: Handbook  on concrete mixes
IS Code SP 23: Handbook on concrete mixes
 
Unit 1 Information Storage and Retrieval
Unit 1 Information Storage and RetrievalUnit 1 Information Storage and Retrieval
Unit 1 Information Storage and Retrieval
 
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
 
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdfOCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
 
Rohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Rohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model SafeRohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Rohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
 
Press Tool and It's Primary Components.pdf
Press Tool and It's Primary Components.pdfPress Tool and It's Primary Components.pdf
Press Tool and It's Primary Components.pdf
 
Development of Chatbot Using AI/ML Technologies
Development of  Chatbot Using AI/ML TechnologiesDevelopment of  Chatbot Using AI/ML Technologies
Development of Chatbot Using AI/ML Technologies
 
How to Manage Internal Notes in Odoo 17 POS
How to Manage Internal Notes in Odoo 17 POSHow to Manage Internal Notes in Odoo 17 POS
How to Manage Internal Notes in Odoo 17 POS
 
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
 
Net Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK EmpireNet Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK Empire
 
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and PreventionUnderstanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
 

Smart metering and control of transmission system

  • 1. SMART METERING AND CONTROL OF TRANSMISSION SYSTEM BY M.SAI MANOBHIRAM G.DURGA RAO D.MOHITH
  • 2. “Smart Grids” “A smart grid uses digital technology to improve reliability, security, and efficiency (both economic and energy) of the electric system from large generation, through the delivery systems to electricity consumers and a growing number of distributed-generation and storage resources.”
  • 3. Characteristics of Smart Grid  Self-healing  Motivates and includes the consumer  Increases power quality  Accommodates all generation and storage options  Enables electrical markets  Optimizes assets and operates efficiently
  • 4. SMART GRID vs EXISTING SYSTEM Existing • Not self healing • Does not allow integration of sources • Real time data is not available • Slow and manual • Mostly involves analog functions smart grid • Self healing • Smart grid is designed to integrate sources • Real time data is available • Fast and automatic • A complete digital system
  • 5. SMART GRID INCLUDES: • Integrated communications • Sensing and measurement • Smart meters • Superconductive wires • Storage devices • Wireless communication
  • 7. ADVANTAGES OF SMART GRID TECHNOLOGY: • Peak Leveling • Self-Healing • More Reliable Power • More Efficient Renewable Power • A Cleaner Mix of Energy Sources • Reducing our carbon Footprints
  • 8. Disadvantages of smart grid technology:  Security and privacy cost.  Two way communications can be hacked.  Technology components are expensive.  Present Infrastructure is inadequate and requires augmentation to support the growth of Smart Grids.
  • 9. Challenges in adopting smart grid:  Costly  Complicated structure  Gain control of meters  Security and privacy  Hacker  Power theft
  • 10. Smart Metering Infrastructure SMI is the totality of the systems and networks that are used to measure, collect, store, analyse, and use energy usage data. In other words, SMI includes smart meters and all other infrastructure components—hardware, software, and communication networks that are needed to offer advanced capabilities.
  • 11.  A typical SMI network employs a two-way communication system and smart metering technology.  SMI also uses the same system equipment to send information back through the network to meters to capture additional data, control the meters, or update the meters’ firmware.
  • 12. Major System components of SMI  A SMI system is comprised of a number of technologies and applications that have been integrated into one solution. The four major SMI components are: • Smart meters • Communication system • Meter data management systems (MDMS) • Home area networks (HAN)
  • 13. Smart Meters  The measurements from both electromechanical meters and non-smart digital meters are collected manually by physical site visits and, thus, record only the readings at the time of the visit.  Smart meters are intelligent, solid-state, programmable devices that can perform many functions beyond energy consumption recordings.  By using built-in memories, smart meters can record and store readings at present intervals (e.g., 15 min, 30 min, or hourly) and prescheduled times.
  • 14.  Typical smart meter functionalities include the following: i. Record interval (daily, hourly, or sub hourly) energy consumption and demand data ii. Provide bidirectional metering, which will accommodate distributed generations at customer sites iii. Provide notification on loss of power and service restoration iv. Provide tamper alarms and enable theft detection v. Provide voltage measurement, voltage alarms, and power quality monitoring
  • 15.  Enable TOU rate billing  Protect meter data security  Communicate and interact with intelligent appliances or devices in a customer’s locality
  • 16. Smart Meter Communications  Smart Meter communicates with the base station or the control centre on a bi-directional mode.  Some of the important channels that are available in India for communication are: GSM, Wi-Fi, PLCC, PSTN,etc  The type of communication available depends severely on the geographic location. Thus the communication mode used should be a combination of available options.  Here we present a brief description of technology and viability in Indian context.
  • 17. PLCC  PLCC – Power Line Carrier Communication.  As the name indicates PLCC associates the use of power conductor for communication by imposing a modulated carrier frequency signal over them.  They are the prime modes of communication between substation in power sector.  The carrier signal degrades gradually along the length of the line. So public repeaters are used which improve the strength of the signal by demodulation and re- modulation
  • 18. Zigbee  Zigbee is the only standard based wireless technology designed to address the unique needs of low cost low power wireless sensor and control networks.  The technology specified by short distance data transmission.  It operates in the region of 2.4GHz  This bandwidth is enough for the implementation of SMI and home automation  It is faster response than any other type of communication
  • 19.  It can be made to work in 3 modes  Coordinator: It forms the basic root of the system. It has the capability to communicate with any other node connected to network. It can even acts as a bridge between two networks.  Router: As the name indicates it indicates like a route decider. It routes the data based on address information received and pass it to respective destination  End Device: It has very limited functionality of just communicating with the network co-ordinator.
  • 20. Wi-Fi  Operating in the unlicensed 2.4GHz ISM band.  It involves broadcast and reception of data through radio signals in an encrypted format and its advantage is it cut the cost of the cables.  The main advantage of this over Zigbee is it can be used for the communications over the range of 1-10KM
  • 21. Proposed Communication architecture  Nodes 1-7 represent the customers or the meters associated with them.  The nodes or meters are connected to main module placed at distribution transformer through Zigbee  As the ordinary meter transmits data of nearly 34MB per month. Based on memory it transfers it will be charged.  As the range of Zigbee is less the distance between Distribution transformer and nearest residential customer ranges from 10-50m  The data collected at various distribution trsnformer is sent to its parent substation through WiFi network as the distance varies from 1-10KM
  • 23.  The backbone of the Smart Grid will be its network.  This network will connect the different components of the Smart Grid together, and allow two-way communication between them.  Net- working the components together will introduce security risks into the system.  The number of entry points that can be used to gain access to the electrical power system will increase when all of the components are networked together.
  • 24. Cyber security  Cyber security is a concept that has become increasingly prevalent with the development of the smart grid technology with the increased use of digital information and controls technology to improve reliability, security, efficiency of the electric grid and the deployment of smart technologies (real - time, automated, interactive technologies that optimize the physical operation of appliances and consumer devices) for metering, communications concerning grid operations and status, and distribution automation.
  • 25. Problems Occurred Due to Lack Of Cyber Security  In 2001, hackers penetrated the California Independent System Operator, which oversees most of the State’s electricity transmission grid; attacks were routed through California, Oklahoma, and China.  Ohio’s Davis-Besse (Oak Harbor, Ohio, the United States )nuclear power plant safety monitoring system was offline for five (5) hours due to the Slammer worm in January 2003.  In March 2005, security consultants within the electric industry reported that hackers were targeting the U.S. electric power grid and had gained access to U.S. utilities electronic control systems.  In April 2009, the Wall Street Journal reported that spies hacked into the U.S. electric grid and left behind computer programs that could allow them to disrupt service. Associated Press on August 4, 2010 reported “Hackers Try to Take overPower Plants.” In September 2010, cyber experts discovered for the first time a malicious computer code, called a worm, specifically created to take over systems that control the inner workings of industrial plants.
  • 26. Worm  A worm is a small piece of software that uses security holes within networks to replicate itself. The worm scans the network for another computer that has a specific security hole. It copies itself to the new machine exploiting the security hole, and then starts replicating from that system as well. Once infected, the worm may send itself to everyone in your address book. Using a network in this manner, worms expand extremely quickly. The greatest danger from worms is that they will eventually use all the memory available to a computer or a network.
  • 27.  The Stuxnet Worm was reported in an Industrial Control Systems Cyber Emergency Response Team Advisory on September 29, 2010. Stuxnet is a Malware Targeting Siemens Control Software. It can be used to infiltrate industrial control systems used in the power grid, power plants and other infrastructure. It is reported to have the ability to damage or possibly destroy control systems.  The North American Electric Reliability Corporation (NERC) and DOE released a report titled High-Impact, Low-Frequency Event Risk to the North American Bulk Power System (June 2, 2010)16 that identifies a certain class of high-impact, low-frequency risk shown to have the potential to significantly affect the reliability of the North American bulk power system..
  • 29.  Cyber Security includes  Availability  Integrity  Confidentiality
  • 30. Availability  Availability refers to ensuring timely and reliable access to information, which is the primary security goal of a smart-grid metering and control system. Malicious attacks targeting availability can be considered as denial-of-service attacks, which intend to delay, block, or even corrupt the communication in the system.
  • 31.  The jamming attack is able to defer the transmission of messages and to distort the transmitted data signal. As a result, the legitimate receiver cannot recover messages out of the damaged data packets.  On the other hand, many man-in-the-middle attacks can be launched only when the full or partial communication channels can be jammed.
  • 32. Integrity  Integrity refers to preventing or detecting the modification or destruction of information by unauthorized persons or systems. Malicious attacks targeting the integrity of a smart grid attempt to stealthily manipulate critical data such as meter readings, billing information, or control commands  Integrity protection can be achieved by authentication, certification, and attestation
  • 33. Confidentiality  Confidentiality refers to protecting personal privacy and proprietary information from unauthorized access. Malicious attacks targeting confidentiality aim at obtaining desirable information(e.g., power usage, customer’s account information).  An emerging trend is for the smart meters to aggregate usage data for billing purposes and support load-balancing and other monitoring functions through peer-to-peer protocols that preserve the consumer’s privacy.
  • 34. Cyber Solutions  Data encrypton  Authentication  Digital signatures
  • 35. Data Encryption  Cryptography  Cryptography has been the most widely used technique to protect information from adversaries. A message to be protected is transformed using a Key that is only known to the Sender and Receiver. The process of transformation is called encryption and the message to be encrypted is called Plain text. The transformed or encrypted message is called Cipher text. At the Receiver, the encrypted message is decrypted.
  • 37. Authentication  Authentication is required to verify the identities of communicating parties to avoid imposters gaining access to information.
  • 38. Digital Signatures A digital signature allows the signing of digital messages by the Sender in such a way that:  1. The Receiver can verify the claimed identity of the Sender (authentication).  2. The Receiver can prove and the Sender cannot deny that the message has been sent by the specific user (non-repudiation).  3. The Receiver cannot modify the message and claim that the modified message is the one that was received from the Sender
  • 39.  Cyber solutions (academic)  An experimental study about the performance of a symmetric-key cipher (i.e., DES-CBC) and a public-key cipher (i.e., RSA) on an intelligent electronic device (IED) called TS7250 has been conducted (Wang and Lu, 2013), where the IED is used for sending the transformer status and receiving commands from the control centre.
  • 40.  These experimental results show that the computational ability of an IED becomes a bottleneck for the delay performance when performing asymmetric-key cryptography  Due to the limited computational capabilities of devices, stringent timing requirements, and high data-sampling rates in the smart grid, traditional authentication schemes might not be applicable.
  • 41.  Universal Key:The heterogeneous communication architecture of the smart grid has made the key management particularly challenging, and it is not practical to design a universal key- management scheme for the entire smart grid.
  • 42. Authentication Security  Authentication is crucial to protect the integrity of data and devices in the smart grid.  A number of authentication schemes have been proposed in the literature for smart grids. Szilagyi and Koopman (2009 and 2010) proposed flexible and low-cost multicast authentication schemes for embedded control systems
  • 43.  The basic idea is to verify truncated message authentication codes (MACs) across multiple packets, thereby achieving a good trade-off among authentication cost, delay performance, and tolerance to attacks.  Although many encryption, authentication, and key-management schemes have been proposed, their performance does not seem to fulfill the stringent timing requirements of the smart grid. Therefore, fine-grained and advanced security protocols still need to be developed for protecting different communication networks in smart grids.
  • 44. MACs  Imagine that you are communicating with your friend through a chat client. How will your friend's machine know that the message he received is exactly the same message that you send?. And how will he verify that the message was not altered in the middle.  Even after implementing a secure authentication and data encryption, integrity of the message needs to be versified, to confirm, that the data was not tampered in the middle.
  • 45.  In communication everything send over wire is data. So the thing that will give the sender and the receiver the assurance, of untampered data is also a small fixed length data called MAC(Message authentication code).
  • 46. Confidentiality Security  In a smart grid, the utility company needs the real-time power- consumption data for planning purposes as well as for providing accurate and authentic billing. For the utility company, the correctness of the calculated bills is the most important issue  Researchers have designed privacy-preserving billing protocols using advanced cryptographic techniques such as zero-knowledge proof and homomorphic encryption
  • 47. Zero-knowledge proof  If proving the statement requires knowledge of some secret information on the part of the prover, the definition implies that the verifier will not be able to prove the statement in turn to anyone else, since the verifier does not possess the secret information.
  • 48. Homomorphic Encryption  Homomorphic encryption is a form of encryption which allows specific types of computations to be carried out on ciphertext and generate an encrypted result which, when decrypted, matches the result of operations performed on the plaintext.  This is a desirable feature in modern communication system architectures. Homomorphic encryption would allow the chaining together of different services without exposing the data to each of those services, for example a chain of different services from different companies could 1) calculate the tax 2) the currency exchange rate 3) shipping, on a transaction without exposing the unencrypted data to each of those services.[
  • 49.  Using those advanced cryptographic techniques, utility companies only receive the commitments of the real-time power consumption instead of the raw data from smart meters, and customers can prove to the utility company that a utility bill has been correctly generated  However, from the customer’s perspective, privacy is the main concern.
  • 50.  Garcia and Jacobs (2012) proposed the use of homomorphic encryption to prevent the utility company from accessing the power consumption data of individual households. Using those advanced cryptographic techniques, utility companies only receive the commitments of the real-time power consumption instead of the raw data from smart meters, and customers can prove to the utility company that a utility bill has been correctly generated
  • 52. What is Self Healing??  SELF-HEALING of power delivery systems is a concept that enables the identification and isolation of faulted system components and the restoration of service to customers supplied by healthy elements.  Self-healing of power distribution systems is conducted via Distribution Automation (DA), specifically through smart protective and switching devices that minimize the number of interrupted customers during contingency conditions by automatically isolating faulted components and transferring customers to an optional source when their normal supply has been lost.  Distribution Automation: Distribution Automation (DA) is a set of technologies that enable an electric utility to monitor, coordinate, and operate distribution components in a real-time mode from remote locations.
  • 53. An illustration of self healing  Automatic fail over scheme for transmission fault  so that if one supply line fails, the customers supplied via that circuit are quickly transferred to the backup source by automatic failover control circuitry.  The limitation is while switching the load from second line to first line, the we need to check supply should be greater than load
  • 54.  There are several additional practical aspects that need to be considered when implementing self-restoration, besides the DA system architecture it is necessary to consider loading ratings and voltage limits, since transferring load to a highly loaded and long feeder may end up generating power quality complaints (low voltage in this case),
  • 55. FLISR an application of Distribution Automation  The smart grid concept is driving the implementation of a series of self- restoration schemes in the form of DA applications. The most popular of these is FLISR, which consists of the utilization of advanced protective and switching devices to automatically locate and isolate faulted feeder sections and restore the maximum number of customers possible located on healthy sections.  FLISR benefits include  Improve SAIDI, SAIFI, and other reliability statistics  Reduce “energy not supplied” (kWh)  Reduce fault investigation time  Provide “premium quality” service Monetary benefits:  Reduce customer cost of outage  Increase revenue (sell more energy)
  • 56. Advantages of implementing FLISR  the advantages of implementing FLISR versus conventional operation for a typical distribution feeder when conventional operation (without FLISR)  there is a need for investigating the specific fault location and conducting manual switching to isolate the faulted area and restore service to customers located on healthy feeder sections.  Here customer trouble call may play an important role.  FLISR on the other side allows detecting faults and restoring affected customers faster and with limited human intervention.  When FLISR is used power is quickly restored to customers located on healthy sections of a feeder.
  • 63. The overall objective of this approach is to identify those locations and combinations of devices that attain the greatest cost-benefit ratio.
  • 65.  The key goal of smart grid is to promote active customer participation and decision making as well as to create the operation environment in which both utilities and electricity users influence each other.  In smart grids, users can influence utilities by adding distributed generation sources such as photovoltaic (PV) modules or energy storage at the point of use, and reacting pricing signals.
  • 66. SMART GRID RENEWABLE ENERGY SYSTEM  The electricity grid to accommodate higher percentage of renewable energy would need large quantities of conventional back up power and huge energy storage.  Smart grid technologies and concepts reduce barriers to the integration of renewable resources and allow power grids to support a greater percentage of variable renewable resources.
  • 67.  Enabling smart grid technology, such as distributed storage, demand response, advanced sensing, control software, information infrastructure, and market signals, increases the ability to influence and balance supply and demand.  With smart grid technology, grid operators can better coordinate and control the system in response to grid conditions, thus allowing integration of increasingly greater levels of renewable resources more effectively and at lower cost.
  • 68.  Advanced Metering Instrument (AMI) and internet-based services engage demand response and distributed storage to accommodate higher penetration and cost-effective integration of renewable energy generation.  Advanced and automated integration systems, such as inverters and converters with communications software interfaces, enable distributed management and application integration for renewable generation.
  • 69. SOLAR PV DESIGNS FOR SMART GRID INTEGRATION  A typical solar PV should provide two-way flows of power and communication between the smart grid and the solar PV system.  Three solar PV inverters are available which are the string, the central and the newly developed micro inverter, known also as integrated AC module inverter.
  • 70. CENTRAL INVERTERS:  The conventional solar PV installations feed DC voltage to a central inverter for conditioning and distribution locally or across the power grid.  The DC voltage carried through the array to the central inverter may have significant fire and safety hazards, leading to increased costs for cabling and, in turn, higher costs for installation and maintenance.
  • 71. STRING INVERTERS  string inverters eliminate the need for a central inverter by providing DC-AC conversion at the output of each string.
  • 72. MICRO INVERTERS:  Recent researches focus on micro inverters which take the concept of string inverters to the next level - providing DC-AC conversion from each individual panel rather than an entire string.  algorithms for efficient DC-AC conversion, circuit protection and PV panel power optimization through maximum power-point tracking (MPPT) (di/dv) + (i/v) of the PV array is zero (derived from dP/dv = 0).
  • 73.  This concept is shown in this Fig. The processor and control unit is used to control power flow from the PV panel to the grid and executes the MPPT algorithm, fault control, and digital communication routines.
  • 74. BENEFITS OF SMART GRID RENEWABLE ENERGIES  First, enabling renewable energy resources to accommodate higher penetration with cost effective while improving power quality and reliability.  Second, integrating consumers as active players in the electricity system; savings, achieved by reducing peaks in demand and improving energy efficiency, as well as cutting greenhouse gas emissions.  Finally, voltage regulation and load following enables reducing cost of operations based on marginal production costs.
  • 77. Smart grid integrates all the small electric heat pumps. It controls or coordinates a whole lot of heat pumps according to the variations in the demand side. If wind energy is utilized properly, it would even satisfy the electrical needs of the country easily.
  • 78. ElectriC VehicleS We can say that the invention of electric vehicles was a great Achievement, even though it was Invented a long time ago, its Importance is seen with the advent of this great technology Smart Grid. Due to the use of electric vehicles, there is a significant reduce in the amounts of usage of fossil fuels and thereby reducing the green house effect. We can charge these vehicles whenever we need electricity and discharge this and give it back to the system whenever the system needs it.
  • 79. ActivatioN Of EquipmentS This is the best feature of SMART GRID. We can know Peak hours times and the availability of electricity at low cost times. We can therefore use the electricity efficiently and economically.
  • 81. The producer is alerted the condition of a low electricity status, he can thereby transfer the stored energy to the required place, with just a click on his phone. No mediators are involved in this process
  • 82. ZerO EnergY HousE  A zero-energy building, also known as a zero net energy (ZNE) building, net-zero energy building (NZEB), or net zero building, is a building with zero net energy consumption, meaning the total amount of energy used by the building on an annual basis is roughly equal to the amount of renewable energy created on the site.  These buildings still produce greenhouse gases because on cloudy (or non-windy) days, at night when the sun isn't shining, and on short winter days, conventional grid power is still the main energy source.  The zero net energy consumption principle is viewed as a means to reduce carbon emissions and reduce dependence on fossil fuels.
  • 84. Conclusion  Smart grid is the key to integrating large amounts of renewable energy into the power system. The smart grid intelligently binds the entire energy system together and the most effective way of expanding the power system to meet the challenges of the future.  After few years smart grid roll out will revolutionize the day–to-day life we use energy . With the advent of this technology people get familiar with the theories of power systems.  In the 19th and 20th century electrification developed to the industrial revolution, likewise in the 21th century is most likely to the significant contribution to the transition to the sustainable society based on renewables to the benefit of people , the economy and the environment through out the world