Implementation of Autonomous Systems

  • Christian Rehtanz
  • Tatjana Kostic
  • Martin Naedele
Part of the Power Systems book series (POWSYS)


This chapter introduces the Information Technology (IT) architecture of autonomous systems. Autonomous systems in this context realize the control system of electrical power systems. The basic implementation aspects of the architecture are described in comparison to conventional approaches. The nowadays’ available methods and standards of IT are analyzed to show that the proposed approach can be implemented today. The topics addressed are communication systems, database systems, software services, interconnection protocols and international standards for data and application models as well as IT security issues.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    Fleischmann A (1994) Distributed Systems — Software Design & Implementation. SpringerzbMATHGoogle Scholar
  2. [2]
    Handschin E, Nikodem T, Palma R, Rehtanz C (1997) Object-Oriented Based Methods and Techniques in Control Centres Applied to Open Access Schemes. Proc. of 10th International Conference on Power System Automation and Control, PSAC ’97, Bled, SloveniaGoogle Scholar
  3. [3]
    Bose A, Green TA (1992) Open Systems Benefit Energy Control Centers. IEEE Computer Applications in Power, vol 5, issue 4, pp 45–50Google Scholar
  4. [4]
    International Organization for Standardization (1984) Basic Reference Model for Open Systems Interconnection, ISO 8072Google Scholar
  5. [5]
    Miller A (1994) From here to ATM, IEEE Spectrum, June, pp 20–24Google Scholar
  6. [6]
    Banhan D, Hill K (2000) The fusion of Internet and Ethernet Technologies ushers in a new era in Substation Automation. Conference Volume “Monitoring and Control by Internet”, ERA Report 2000–0102, ISBN 0.7008.0713.6Google Scholar
  7. [7]
    Stevens WR (1994) The Protocols — TCP/IP Illustrated, vol 1, Addison-WesleyGoogle Scholar
  8. [8]
    Loshin, P (1999) IP v6 — Clearly Explained. Morgan Kaufmann Publishers Inc.Google Scholar
  9. [9]
    ISO/IEC 9506: 1990, Manufacturing Message Specification (MMS)Google Scholar
  10. [10]
    IEC 61870–6: Telecontrol equipment and systems — Part 6: Telecontrol protocols compatible with ISO standards and ITU-T recommendations, 2001/2002Google Scholar
  11. [11]
    Draft IEC 61850: Communications networks and systems in substations, Nov 2002Google Scholar
  12. [12]
    Iwanitz F, Lange J (2002) OPC — Fundamentals, Implementation and Application. 2nd Edition, Hüthig Fachverlag, GermanyGoogle Scholar
  13. [13]
    Gudgin M, et al (2002) SOAP Version 1.2 Specification. Parts 1 and 2, XML Protocol Working Group, W3CGoogle Scholar
  14. [14]
    Tidwell D, Snell J, Kulchenko P (2001) Programming Web Services with SOAP. O’Reilly & Associates Inc.Google Scholar
  15. [15]
    Perez J, et al (2000) Browsing through a distribution network. Conference Volume “Monitoring and Control by Internet”, ERA Report 2000–0102, ISBN 0.7008.0713.6Google Scholar
  16. [16]
    T. Kostic, O. Preiss, Ch. Frei, “Towards the Formal Integration of Two Upcoming Standards: IEC 61970 and IEC 61850”, to appear in Proc. of LESCOPE 2003 Conference, Montreal, 7–9 May, 2003Google Scholar
  17. [17]
    Otto Preiss, Alain Wegmann, “Towards a Composition Model Problem Based on IEC61850,” Journal of Systems and Software, Special Issue on Component-Based Software Engineering, Elsevier Science, 2003, to appearGoogle Scholar
  18. [18]
    Draft IEC 61970: Energy Management System Application Programming Interface (EMS-API), Oct 2002. Available: (documents), (model view)
  19. [19]
    OMG Unified Modelling Language Specification, Version 1.4, Sep. 2001. [Online]. Available:
  20. [20]
    Arnold deVos, S.E. Widergren, J. Zhu, “XML for CIM Model Exchange”, Proc. IEEE Conference on Power Industry Computer Systems, Sydney, Australia, 2001. [Online]. Available: Scholar
  21. [21]
    W3C, RDF Primer, W3C Working Draft, April 2002
  22. [22]
    Draft IEC 61968: System Interfaces for Distribution Management, May 2001. Available: document download, only model view)
  23. [23]
    Schwartau W (1999) Time based Security. Interpact Press.Google Scholar
  24. [24]
    Northcutt S, et al (2002) Inside Network Perimeter Security. New RidersGoogle Scholar
  25. [25]
    Naedele M (2003) IT Security for Automation Systems — Motivations and Mechanisms, atp, vol 45, no 5Google Scholar
  26. [26]
    Öszu MT, Valduriez P (1999) Principles of Distributed Database Systems. 2nd Edition, Prentice Hall, New JerseyGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Christian Rehtanz
    • 1
  • Tatjana Kostic
    • 1
  • Martin Naedele
    • 1
  1. 1.Corporate ResearchABB Switzerland LtdBaden-DaettwilSwitzerland

Personalised recommendations