
I.2
SEL-351-5, -6, -7 Relay
Instruction Manual
Date Code 20070117
M
IRRORED
B
ITS
(in Firmware Versions 6 and 7)
Operation
Operation
Message
Transmission
All messages are transmitted without idle bits between characters. Idle bits are
allowed between messages.
➤
At 4800 baud, one message is transmitted each 1/2 power
system cycle.
➤
At 9600 baud, one message is transmitted each 1/4 power
system cycle.
➤
At 19200 and 38400 baud, one message is transmitted each 1/8
power system cycle for the SEL-321 and 1/4 power system
cycle for the SEL-351.
Message Decoding
and Integrity Checks
The relay will deassert a user-accessible flag per channel (hereafter called
ROK
x
) upon failing any of the following received-data checks:
➤
Parity, framing, or overrun errors.
➤
Receive data redundancy error.
➤
Receive message identification error.
➤
No message received in the time three messages have been
sent.
While ROK
x
is not asserted, the relay will:
1. Prevent new data from being transferred to the pickup dropout
security counters described later. Instead, the relay will send
one of the following user selectable values (hereafter called
default values) to the security counter inputs:
➢
1
➢
0
➢
The last valid value
The user will be allowed to select one of the default values for each RMB.
2. Enter the synchronization process described below.
The relay will assert ROK
x
only after successful synchronization as described
below and two consecutive messages pass all of the data checks described
above. After ROK
x
is reasserted, received data may be delayed while passing
through the security counters described below.
Transfer of received data to RMB1
x
–RMB8
x
is supervised by eight user-
programmable pickup/dropout security counters settable from one (allow
every occurrence to pass) to at least eight (require eight consecutive
occurrences to pass). The pickup and dropout security count settings are
separate.
A pickup/dropout security counter operates identically to a pickup/dropout
timer, except that it is set in counts of received messages instead of time. An
SEL-351 talking to another SEL-351 sends and receives M
IRRORED
B
ITS
messages four times per power system cycle. Therefore, a security counter set
to two counts will delay a bit by about 1/2 power system cycle. Things get a
little more complicated when two relays of different processing rates are
connected via M
IRRORED
B
ITS
. For instance an SEL-321 talking to an
SEL-351. The SEL-321 processes power system information each 1/8 power
system cycle, but processes the pickup/dropout security counters as messages
are received. Since the SEL-321 is receiving messages from the SEL-351, it
Summary of Contents for SEL-351-5
Page 10: ...This page intentionally left blank ...
Page 22: ...This page intentionally left blank ...
Page 40: ...This page intentionally left blank ...
Page 80: ...This page intentionally left blank ...
Page 202: ...This page intentionally left blank ...
Page 238: ...This page intentionally left blank ...
Page 320: ...This page intentionally left blank ...
Page 402: ...This page intentionally left blank ...
Page 436: ...This page intentionally left blank ...
Page 478: ...This page intentionally left blank ...
Page 500: ...This page intentionally left blank ...
Page 594: ...This page intentionally left blank ...
Page 598: ...This page intentionally left blank ...
Page 622: ...This page intentionally left blank ...
Page 644: ...This page intentionally left blank ...
Page 674: ...This page intentionally left blank ...