Application of Information Management Technology in Power Substation

Application of Information Management Technology in Power Substation With the application of information management technology in substation operation, advanced security includes not only physical security but also various types of intrusion from the outside world brought about by the Internet. If the power system is used or attacked, it will result in Unpredictable loss. Effectively improving the application of information management technology in the operation of power transformation is an important issue that must be solved before us.

I. Overview of Information Management and Power Informatization

1. Information Management Concept Information management is the realization of organizational goals, meeting organizational requirements, solving organizational environmental issues, and developing, planning, integrating, controlling, and utilizing information resources to increase information utilization and maximize information utility value. A strategic management.

2. Power informatization Power enterprise information construction is more scientific, practical, safe, and profitable. Electric power companies have developed a series of application systems related to enterprise management and economic operations with the aim of improving production and management efficiency and information. The actual use of the system. Electric energy can be instantaneously generated by power generation, transmission, and distribution until electricity is used. The production and use of electricity has the characteristics of continuity, equal volume and at the same time. To ensure the safe production of electricity and the rational allocation of resources, production must be done according to the dispatching directive. All aspects of the power system react instantaneously. The control center and dispatch center of the power system must simultaneously master all kinds of data on power generation, distribution, transmission, and power consumption, and analyze, schedule, and process them in a timely manner to make production operations. Scientific arrangements must handle large-scale, complicated and complicated information in a timely manner, which makes the information processing work face certain challenges. The emergence of information management technology has brought great convenience to the processing of information. It combines GIS technology, enables the rapid integration of multi-source data, facilitates the informatization management of the power system, and can comprehensively manage a large number of attribute data and Geographic information data can provide scientific decision support and modern management methods for business management. Combined with network technology, it is more conducive to improving the sharing of information, promoting the sharing of power information in information management systems, and facilitating information management in power systems. Transparent. The power system involves a very wide geographic area. It requires multiple departments to edit the same layer. The traditional GIS layer data does not support multiple concurrent operations. It is only suitable for single-user use. It uses a file format and uses a file server. If you want to share a layer, if you do not perform special processing, conflicts will occur when multiple users update the same layer file at the same time. The new ORDBMS technology can make up for this shortcoming and will not cause sharing conflicts. It uses an object-oriented database technology that can centrally manage geographical attribute data and information space data, support version management and concurrent operations, and also supports full databases. The storage model can solve the problems of data security mechanisms, storage management of large amounts of data, data integrity, and multi-user editing.

Second, the advantages of using information management in power transformation operations
1. Advanced and open data warehouse technology has made data more widely available, easy to use, and convenient to interface with MIS and other systems. The combination of the system's architecture and the Internet model has good prospects.

2. Practicality The strong information management technology is conducive to the sharing and use of various types of data sources in the second part of the power transformation operation, especially for transformer protection technicians, which is conducive to improving system analysis and data statistics work efficiency. It will help improve the level of protection operations.

3. High reliability, easy maintenance and upgrade The adoption of the method library and data warehouse makes the entire information management system run centrally in the network center rule base and database, no longer distributing reliability among users at all levels, even if one of the client's workstations Suddenly damaged, it will not affect the performance of other parts of the system, and it is easy to recover. Software developers can change and update the method library, which is convenient and fast.

Third, the security strategy used in power transformation operation

1. Security Technology Strategies In order to ensure the security of information, the necessary security technical measures taken are: 1) Virus protection technology. A sound management system should be established to integrate the management of computer virus database upgrades and the prevention and detection of viruses. A comprehensive anti-virus strategy should be applied to all aspects of the information system to effectively prevent and protect against viruses; 2) Firewall technology. Firewall technology is mainly used to isolate trusted networks from untrusted networks. The check method is implemented through a single centralized security checkpoint, enforced security policies to avoid illegal access and access to important information resources, and 3) data and system backups. technology. The power company must establish data backup strategies, regularly back up the database, divide the level of data backup according to the degree of importance, establish an enterprise data backup center, use disaster recovery technology to back up the application system and key business data, and develop a detailed database recovery plan And application database backup, and regular rehearsal to prevent timely repair in the event of data destruction or system crashes, so that information systems have better reliability and availability; 4) security auditing technology. Under the background of continuous expansion of system scale and continuous improvement of safety facilities, electric companies should introduce centralized intelligent safety auditing systems and adopt effective technical means to automatically audit and audit network equipment logs, business application system operating logs, and operating system operations. Logs and security facility running logs quickly and automatically analyze system security events and run the security management system.

2. Organizational management strategies Organizational management measures and technical measures are unified within the scope of information security. Since the proportion of computer security incidents caused by management is over 70%, the necessary organizational management strategies should be adopted: 1) Security policy and system. Electric companies should formulate relevant policy guidelines to guide the overall information security of the enterprise. Only by formulating a unified and instructive security strategy and system can we effectively measure the security of information in order to form a safe protection system and follow the information security system. Only by formulating effective security policies and systems can concrete and formalized legal management be achieved, and regulations and management can be linked together to ensure the security of information. 2) Safety awareness and safety skills. Electric companies should organize employees to train, popularize their safety knowledge, strengthen employees' safety awareness, enable them to have safety awareness, have basic safety skills, and be able to handle common safety issues. Through safety training to improve the staff's safety operation skills, combined with third-party safety technologies and products to enhance information security; 3) security organizations and positions. In order to protect the security of corporate information, electrical companies should establish an independent information security department to manage the security of corporate information, implement a "unified organization, decentralized management" approach to make the information security department fully responsible for corporate information security management and maintenance. The security post is an information system security management institution established according to the system security needs. This post is mainly responsible for one or several security affairs, and forms a dedicated information security management work in the entire enterprise so that all information technology departments can also cooperate and implement. Information security work.

3. Intrusion Prevention Detection Strategy Intrusion detection system is a new type of network security technology that has emerged in recent years. The purpose is to provide real-time intrusion detection and take corresponding protection measures, such as recording evidence for tracking and recovery, and disconnecting the network connection. Real-time intrusion detection ability is important because it can deal with attacks from inside and outside the network, and secondly because it can shorten the invasion time of the hacker. Unlike firewalls, network intrusion detection systems identify hackers' invading behavior by analyzing the contents of data packets. Therefore, the network intrusion detection system can determine the intrusion of the application layer, which greatly improves the accuracy of judging the hacking behavior. The intrusion detection system runs on the monitoring machine in the form of processes to provide real-time hacker attack detection and protection for the network system. At the same time, the network intrusion detection system will make a detailed record of the attack process and provide clues for future investigation and evidence collection. The firewall can only isolate attacks from outside the network segment. The network intrusion detection system monitors the operations of all networks. Therefore, it can identify all the attack behaviors from this network segment, other network segments, and external networks. Solved the security threat caused by user's misoperation or internal personnel malicious attack after coming from the firewall.

The Strain Clamp is primarily used to fix the conductor, ground wire terminals on tension towers of overhead lines, distribution lines and distribution equipments in substations, power plants. Suspension Strain Clamp also can fix the guy wire terminals on poles. Moreover, Strain Clamp For Overhead Line bears all the tension of conductors, ground wires and lightning conductors. Strain Cable Clamp is used to tension conductors and earth wires and must therefore satisfy the most stringent requirements.

There are two basic systems of tension clamps, as follows:
1.Detachable clamps, such as wedge-type tension clamps, thimbles,bolted type tension clamps, which allow for subsequent adjustment.
2.Non-detachable clamps, such as compression dead-end clamps which require absolute matching to the conductor length.


According to its configuration and installation means, the strain clamp can be divided into compression type, bolt type and wedge type. Generally, the compression type includes hydraulic compression type and explosive compression type.
Generally, malleable cast iron, steel, and aluminum alloy are used as it's materials.

Features

1.High strength and versatility, can be used with a variety of metal fittings.
2.Good corrosion resistance
3.Simple installation
4.Installation quality is easy to guarantee
5.Optional anti-theft ring to effectively solve the anti-theft problem.


Strain clamps

We warmly welcome friends both domestic and abroad to visit our company, if you have any questions, please contact with us directly.

Strain Clamp

Strain Clamp,Suspension Strain Clamp,Strain Cable Clamp,Strain Clamp For Overhead Line

FUZHOU SINGREE IMP.& EXP.CO.,LTD. , https://www.cninsulators.com

Posted on