protection and control functions, as well as communication engineering for IEC
61850.
The installation manual contains instructions on how to install the IED. The
manual provides procedures for mechanical and electrical installation. The chapters
are organized in the chronological order in which the IED should be installed.
The commissioning manual contains instructions on how to commission the IED.
The manual can also be used by system engineers and maintenance personnel for
assistance during the testing phase. The manual provides procedures for the
checking of external circuitry and energizing the IED, parameter setting and
configuration as well as verifying settings by secondary injection. The manual
describes the process of testing an IED in a station which is not in service. The
chapters are organized in the chronological order in which the IED should be
commissioned. The relevant procedures may be followed also during the service
and maintenance activities.
The operation manual contains instructions on how to operate the IED once it has
been commissioned. The manual provides instructions for the monitoring,
controlling and setting of the IED. The manual also describes how to identify
disturbances and how to view calculated and measured power grid data to
determine the cause of a fault.
The application manual contains application descriptions and setting guidelines
sorted per function. The manual can be used to find out when and for what purpose
a typical protection function can be used. The manual can also provide assistance
for calculating settings.
The technical manual contains operation principle descriptions, and lists function
blocks, logic diagrams, input and output signals, setting parameters and technical
data, sorted per function. The manual can be used as a technical reference during
the engineering phase, installation and commissioning phase, and during normal
service.
The communication protocol manual describes the communication protocols
supported by the IED. The manual concentrates on the vendor-specific
implementations.
The point list manual describes the outlook and properties of the data points
specific to the IED. The manual should be used in conjunction with the
corresponding communication protocol manual.
The cyber security deployment guideline describes the process for handling cyber
security when communicating with the IED. Certification, Authorization with role
based access control, and product engineering for cyber security related events are
described and sorted by function. The guideline can be used as a technical
reference during the engineering phase, installation and commissioning phase, and
during normal service.
1MRK 500 128-UEN B
Section 1
Introduction
650 series 2.2 IEC
7
Operation manual