Font Size: a A A

Design And Implementation Of Secondary Electric Power System Network Information Security

Posted on:2015-09-05Degree:MasterType:Thesis
Country:ChinaCandidate:L PanFull Text:PDF
GTID:2272330422981492Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
In today’s rapid development of information technology, network technology continuesto be applied to a variety of power control systems, while improving the overall efficiency ofthe national electricity system, in particular the power supply unit by remote control, reduceoperating personnel, increasing the efficiency. With the increasing power system networkapplications on demand, at the same time, but also on security aspects of the power systemput forward higher requirements. In order to further promote the reform of the electricitysystem, establish and improve the electricity market, according to the actual situation ofChina’s national power system, referring to foreign advanced management experience in thepower system, the development of the relevant safety regulations for secondary power systemsecurity, the purpose is to standardize China’s electric power system for a secondary safetysystem, unified planning security programs and their effective implementation andsupervision, to ensure a stable national electricity system to run, create greater benefits forthe community.In this paper, according to the State Electricity Regulatory Commission issued [2005]5orders "secondary power system security requirements" and electrical safety supervision[2006] No.34"national secondary power system security general scheme" and other relevantsafety regulations, by the implementation of "security partition, network-specific, horizontalsegregation, vertical certification"[1], utilization of various security technologies, combinedwith my extensive experience in project design and implementation, to meet the SERCmandatory premise, according to a power plant The actual situation, to carry out the projectdesign and implementation of security power secondary system, and ultimately achieve thefollowing functions: First, the plant network system of strict business district, into real-timearea, the non-real-time information management area and a large area; Second, in real-time toachieve the dual zone vertical line Backup, triple safety protection, quadruple redundancy;Third, in the area of non-real-time to achieve the double vertical line backup, security triplequadruple redundancy; four horizontal (ie, in real time between the district and thenon-real-time area) to achieve the dual line backup, triple safety protection, triple redundancy;five, management information region and non-controlled areas to achieve the dual line backup,dual redundancy, triple safety protection; six, management information large area and controlarea to achieve quadruple line backup, four heavy equipment redundancy, five heavy security protection. Through the design and implementation of a power plant secondary power systemsecurity, so that a power plant power system can be further stable, safe and reliable operation,more efficient service for the general public.
Keywords/Search Tags:Secondary power system security, power of information security, HSRP, IDS, firewall
PDF Full Text Request
Related items