CN114285600B - Data transmission system of wind power plant - Google Patents
Data transmission system of wind power plant Download PDFInfo
- Publication number
- CN114285600B CN114285600B CN202111403976.XA CN202111403976A CN114285600B CN 114285600 B CN114285600 B CN 114285600B CN 202111403976 A CN202111403976 A CN 202111403976A CN 114285600 B CN114285600 B CN 114285600B
- Authority
- CN
- China
- Prior art keywords
- switch
- encryption
- fan
- data stream
- encryption device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 43
- 238000012544 monitoring process Methods 0.000 claims description 17
- 238000004891 communication Methods 0.000 abstract description 8
- 238000000034 method Methods 0.000 description 13
- 238000010586 diagram Methods 0.000 description 7
- 238000012545 processing Methods 0.000 description 6
- 230000006855 networking Effects 0.000 description 5
- 230000008569 process Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 230000003993 interaction Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000010248 power generation Methods 0.000 description 2
- 238000004590 computer program Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000007789 sealing Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]
Landscapes
- Selective Calling Equipment (AREA)
Abstract
The invention discloses a data transmission system of a wind farm, which is used for communicating a central control room with the wind farm, wherein the central control room comprises a SCADA system and a non-SCADA system, and comprises: a central control room side transmission unit and a plurality of wind farm side data transmission units; the central control room side data transmission unit comprises: the first switch, the first longitudinal encryption device and the second switch are positioned in the central control room and are connected in sequence. The first switch is connected with an encryption service device in the SCADA system; the second switch is connected with a SCADA system or a non-encryption service device in the non-SCADA system; each wind power plant side data transmission unit comprises a third switch, a second longitudinal encryption device and a fourth switch which are positioned in the fan and are connected in sequence; the third exchanger is respectively connected with the second exchanger and the fan non-encryption device; the fourth exchanger is connected with the fan encryption device. The invention solves the problem that the fan state on the SCADA system is the fan communication interruption caused by the congestion of the longitudinal encryption device.
Description
Technical Field
The invention relates to the field of safety of wind power generation equipment, in particular to a data transmission system of a wind power plant.
Background
In the case that the plant station adopts a longitudinal encryption device for the wind field network, as shown in fig. 1, the current longitudinal encryption device is placed between the fan side and the SCADA system (server) side in series, and the longitudinal encryption scheme is to encrypt and transmit all data streams from the fan side to the SCADA system side.
Specifically, as shown in fig. 1, the existing encryption system includes: in the central control room, a SCADA system (Supervisory Control And Data Acquisition system, namely a data acquisition and monitoring control system) is included, a first longitudinal encryption device and a first layer switch, wherein the SCADA system is connected with the first layer switch through the first longitudinal encryption device. Further comprises: the wind power generation system comprises a plurality of groups of wind power generators, and each wind power generator group comprises: a second layer of switches (also called wind field ring network switches), a second longitudinal encryption device and a fan device; the fan device is connected with the second-layer switch through the second longitudinal encryption device.
The first-layer exchanger in the central control room is connected with the second-layer exchanger of the wind generating set to form an annular redundant networking (wind field network for short), and the SCADA system is connected to related equipment in the wind field ring network exchanger and the fan device for communication through a longitudinal encryption device (a first longitudinal encryption device and a second longitudinal encryption device).
The original application scene of the longitudinal encryption scheme is positioned between the plant stations and the province stations, and the power dispatching data network communication is adopted between the plant stations, and the scene is characterized in that only dispatching data are exchanged between the province stations and the plant stations, the data flow is very small, but after the longitudinal encryption scheme is applied to the plant station longitudinal encryption scene, the following problems exist:
1. And a miniature longitudinal encryption device (second longitudinal encryption device) with low processing performance is arranged at the side of the fan, the bandwidth of the processed encrypted message is only 10Mbit, if all message encryption is processed, the processing faces a wind field with insufficient performance, thereby causing the SCADA system to lose heartbeat messages of a fan monitoring PLC in the fan device, and finally causing the fan state to be represented on the SCADA system as fan communication interruption.
2. If a miniature longitudinal encryption device with lower performance processing capability is also deployed in the first longitudinal encryption device deployed at the SCADA system side, the processing of the encrypted message is only 10Mbit bandwidth, which also causes the loss of the heartbeat message of the SCADA system side and the fan monitoring PLC, and finally causes the fan state on the SCADA system to be the fan communication interruption. Fan communication interruption is an unacceptable failure of the wind farm and there is currently no effective solution in situations where the performance-limited longitudinal encryption device (especially the fan-side longitudinal encryption device) equipment cannot be replaced.
Disclosure of Invention
The invention aims to provide a data transmission system of a wind power plant, which is used for solving the problem that wind power plant network safety equipment cannot normally operate in a scene that a longitudinal encryption device with limited performance cannot be replaced.
In order to solve the problems, the invention is realized by the following technical scheme:
A data transmission system for a wind farm for communicating a central office 10 and a wind farm, the central office 10 comprising a SCADA system and a non-SCADA system, comprising: a central control room side transmission unit and a plurality of wind farm side data transmission units; the central control room side data transmission unit comprises: a first switch 111, a first longitudinal encryption device 121 and a second switch 112 located within the central office 10 and connected in sequence. The first switch 111 is connected to the encryption service apparatus 100 in the SCADA system. The second switch 112 is connected to the non-encrypted service device 101 in the SCADA system or the non-SCADA system. Each wind farm side data transmission unit comprises a third switch 113, a second longitudinal encryption device 122 and a fourth switch 114 which are positioned in the fan 30 and are connected in sequence; the third switch 113 is connected to the second switch 112 and the fan non-encryption device 302, respectively; the fourth switch 114 is connected with a fan encryption device 301, the second switch 112, and a plurality of third switches 113 form a wind field network 20.
Optionally, when the central office 10 needs to transmit data to the wind farm, the first switch 111 is configured to transmit a first data stream of the encryption service device 100 to the first longitudinal encryption device 121. The first longitudinal encryption device 121 is configured to encrypt the received first data stream and transmit the encrypted first data stream to the second switch 112. The second switch 112 is configured to split the received second data stream output by the unencrypted service device and the received encrypted first data stream and transmit the split second data stream and the split first data stream to the corresponding third switch 113. Each of the third switches 113 is configured to transmit the received encrypted first data stream to the blower encryption device 301 through the second longitudinal encryption device 122 and the fourth switch 114; each of the third switches 113 is further configured to transmit the received second data stream to the blower non-encryption device 302.
Optionally, when the central office 10 side needs to transmit data to the wind farm side, the second longitudinal encryption device 122 is configured to decrypt the received encrypted first data stream; the fourth switch 114 is configured to transmit the decrypted first data stream to the blower encryption device 301.
Optionally, the first switch 111 is configured to forward the first data stream to the first longitudinal encryption device 121 through a MAC switching function of a two-layer switch according to a MAC address of the encryption service device 100. The second switch 112 forwards the encrypted first data stream and the second data stream to the corresponding third switch 113 according to destination MAC addresses of the encryption service apparatus 100 and the non-encryption service apparatus 101.
Optionally, when the wind farm side needs to transmit data to the central office 10 side, the fourth switch 114 in each fan 30 forwards the third data stream output by the fan encryption device 301 to the second longitudinal encryption device 122 according to the MAC address of the fan encryption device 301.
The second longitudinal encryption device 122 is configured to encrypt the received third data stream, and transmit the encrypted third data stream to the third switch 113. The third switch 113 is configured to forward the received encrypted third data stream and the fourth data stream output by the fan non-encryption device 302 to the second switch 112 according to the destination MAC addresses of the fan encryption device 301 and the fan non-encryption device 302.
The second switch 112 is configured to forward the received encrypted third data stream to the first longitudinal encryption device 121 according to the destination MAC address of the fan encryption device 301. The second switch 112 is further configured to correspondingly forward the received fourth data stream to the non-encryption service device 101 according to a destination MAC address of the fan non-encryption device 302; said first longitudinal encryption means 121 is configured to decrypt said received encrypted third data stream; the first switch 111 is configured to forward the received decrypted third data stream to the encryption service 100.
Optionally, the encryption service device 100 is a SCADA server, and the non-encryption service device 101 is a vibration monitoring server and/or a video server.
Optionally, the fan encryption device 301 is a fan monitoring PLC and/or a box transformer monitoring PLC; the fan non-encryption device 302 is a vibration monitoring PLC and/or video sensor.
Optionally, the first data stream is control flow information sent by the SCADA server to the fan encryption device 301; the third data stream is control flow information sent by the fan encryption device 301 to the SCADA server; the second data stream is non-control stream information sent by the non-encryption service device 101 to the fan non-encryption device 302; the fourth data stream is non-control stream information sent by the fan non-encryption device 302 to the non-encryption service device 101.
The invention has at least one of the following advantages:
According to the data transmission system of the wind power plant, data stream transmission is carried out according to whether the service stream of the wind power plant is control stream information and non-control stream information; when the control flow information needs to be transmitted, encrypting the control flow through a first longitudinal encryption device and transmitting the control flow information; when the non-control flow information needs to be transmitted, the transmission control flow is encrypted through a third switch and a second switch of the system, and then the transmission is carried out; this non-control flow information is mainly a large amount of data, if all are longitudinally encrypted, which would cause the longitudinal encryption device to be congested and cause the problems described herein to occur. However, due to the existence of the second switch and the third switch, the non-control flow information does not need to be longitudinally encrypted, so that the problem that the fan state appears on the SCADA system as the fan communication is interrupted due to the congestion of a longitudinal encryption device is solved.
By adopting the secure encryption and distribution scheme, the invention can support the longitudinal encryption and security scheme under the existing limited micro-longitudinal processing capacity, simultaneously support other traffic without encryption such as traffic such as video and the like and the common network deployment of the wind farm network, and simultaneously support the common network deployment scheme and simplify the wind farm network architecture while meeting the longitudinal encryption and security scheme.
Drawings
FIG. 1 is a schematic diagram of a data transmission system for a wind farm according to the prior art;
Fig. 2 is a schematic diagram of a data transmission system of a wind farm provided by the invention.
Detailed Description
The data transmission system of the seed wind power plant provided by the invention is further described in detail below with reference to the accompanying drawings and the detailed description. The advantages and features of the present invention will become more apparent from the following description. It should be noted that the drawings are in a very simplified form and are all to a non-precise scale, merely for the purpose of facilitating and clearly aiding in the description of embodiments of the invention. For a better understanding of the invention with objects, features and advantages, refer to the drawings. It should be understood that the structures, proportions, sizes, etc. shown in the drawings are for illustration purposes only and should not be construed as limiting the invention to the extent that any modifications, changes in the proportions, or adjustments of the sizes of structures, proportions, or otherwise, used in the practice of the invention, are included in the spirit and scope of the invention which is otherwise, without departing from the spirit or essential characteristics thereof.
As shown in fig. 2, the present embodiment provides a data transmission method of a wind farm, which is used for communicating a central control room 10 with the wind farm, where the central control room 10 includes a SCADA system and a non-SCADA system, specifically, is used for communicating an encryption service device 100 of the SCADA system of the central control room 10 with other non-encryption service devices 101 of the wind farm and a fan encryption device 301 of the fan side with a fan non-confidential device 302 respectively, so as to implement information interaction between the two devices, and includes: a central control room side transmission unit and a plurality of wind power plant side data transmission units. The central control room side data transmission unit comprises: a first switch 111, a first longitudinal encryption device 121 and a second switch 112 located within the central office 10 and connected in sequence. The first switch 111 is connected to the encryption service apparatus 100 in the SCADA system; the second switch 112 is connected to the non-encrypted service device 101 in the SCADA system or the non-SCADA system.
Each wind farm side data transmission unit comprises: a third switch 113, a second longitudinal encryption device 122 and a fourth switch 114 located within the blower 30 and connected in sequence; the third switch 113 is connected to the second switch 112 and the fan non-encryption device 302, respectively; the fourth switch 114 is connected to a fan encryption device 301. The second switch 112 and the third switches 113 form a wind farm network 20, and the network topology is usually a ring network.
When the central office 10 needs to transmit data to the wind farm, the first switch 111 is configured to transmit the first data stream of the encryption service device 100 to the first longitudinal encryption device 121.
The first longitudinal encryption device 121 is configured to encrypt the received first data stream and transmit the encrypted first data stream to the second switch 112.
The second switch 112 is configured to split the received second data stream output by the unencrypted service apparatus 101 and the received encrypted first data stream and transmit the split data stream to the corresponding third switch 113.
Each third switch 113 is configured to transmit the received encrypted first data stream to the fan encryption device 301 sequentially through the second longitudinal encryption device 122 and the fourth switch 114; each of the third switches 113 is further configured to transmit the received second data stream to the blower non-encryption device 302.
In this embodiment, when the SCADA system side needs to transmit data to the wind farm side, the corresponding second longitudinal encryption device 122 is configured to decrypt the received encrypted first data stream. The corresponding fourth switch 114 is configured to transmit the decrypted first data stream to the corresponding blower encryption device 301.
In this embodiment, the first switch 111 is configured to forward the first data stream to the first longitudinal encryption device 121 through a MAC switching function of a two-layer switch according to a MAC address of the encryption service device 100. The second switch 112 forwards the encrypted first data stream and the second data stream to the corresponding third switch 113 according to destination MAC addresses of the encryption service apparatus 100 and the non-encryption service apparatus 101.
In this embodiment, when the wind farm side needs to transmit data to the central control room 10 side, the fourth switch 114 in each fan 30 forwards the third data stream output by the fan encryption device 301 to the second longitudinal encryption device 122 according to the MAC address of the fan encryption device 301.
The second longitudinal encryption device 122 is configured to encrypt the received third data stream, and transmit the encrypted third data stream to the third switch 113.
The third switch 113 is configured to forward the received encrypted third data stream and the fourth data stream output by the fan non-encryption device 302 to the second switch 112 according to the destination MAC addresses of the fan encryption device 301 and the fan non-encryption device 302.
The second switch 112 is configured to forward the received encrypted third data stream to the first longitudinal encryption device 121 according to the destination MAC address of the fan encryption device 301. The second switch 112 is further configured to correspondingly forward the received fourth data stream to the non-encryption service device 101 according to a destination MAC address of the fan non-encryption device 302; said first longitudinal encryption means 121 is configured to decrypt said received encrypted third data stream; the first switch 111 is configured to forward the received decrypted third data stream to the encryption service 100.
In this embodiment, the encryption service device is a SCADA server, and the non-encryption service device 101 is a vibration monitoring server and/or a video server.
In this embodiment, the fan encryption device 301 is a fan monitoring PLC and/or a box transformer monitoring PLC; the fan non-encryption device 302 is a vibration monitoring PLC and/or video sensor.
In this embodiment, the first data stream is control flow information sent by the SCADA server to the blower encryption device 301; the third data stream is control flow information sent by the fan encryption device 301 to the SCADA server; the second data stream is non-control stream information sent by the non-encryption service device 101 to the fan non-encryption device 302; the fourth data stream is non-control stream information sent by the fan non-encryption device 302 to the non-encryption service device 101.
It will be appreciated that in this embodiment, the process of information interaction between each of the fans 30 and the central control room is the same as that described above.
The encrypted and unencrypted split networking is shown in fig. 2: means for unencrypted streaming: the server side is directly connected to the convergence layer switch of the wind field network, and the fan side is directly connected to the switch at the bottom of the fan side.
Means for encrypting the stream: the server side is accessed through the newly added first switch, and the fan side is accessed through the fourth switch. Vertical sealing device: the server side is accessed between the first switch and the second switch; the wind turbine side is accessed at the third switch and the fourth switch.
General principle of distinguishing between encrypted and non-encrypted streams:
the dividing principle mainly depends on whether the service flow of the wind field is control flow information or not, and specifically comprises the following steps:
encryption stream: the longitudinal cipher mainly encrypts the control flow, such as SCADA to fan monitoring PLC
Non-encrypted stream: the uncontrolled flow of the wind farm, such as vibration detection flow of the fan, video monitoring, etc., is mainly large in data volume, and if all is longitudinally encrypted, the longitudinally encrypting device will be jammed, so that the problems described herein are caused.
It will be appreciated that the encryption split is implemented in this embodiment: the wind field networks are all TCP/IP networks, and the encrypted stream and the unencrypted stream are identified by IP addresses (source IP address and destination IP address) under the IP networking. The diversion is different in the method according to the different wind field network networking, and can be realized by the exchange, forwarding and diversion of the two-layer MAC address under the end-to-end two-layer network as shown in figure 2; the method is also applicable to the encryption shunt transmission method under the end-to-end three-layer networking.
According to the data transmission system of the wind power plant, data stream transmission is carried out according to whether the service stream of the wind power plant is control stream information and non-control stream information; when the control flow information needs to be transmitted, encrypting the control flow through a first longitudinal encryption device and transmitting the control flow information; when the non-control flow information needs to be transmitted, the transmission control flow is encrypted through a third switch and a second switch of the system, and then the transmission is carried out; this non-control flow information is mainly a large amount of data, if all are longitudinally encrypted, which would cause the longitudinal encryption device to be congested and cause the problems described herein to occur. However, due to the existence of the second switch and the third switch, the non-control flow information does not need to be longitudinally encrypted, so that the problem that the fan state appears on the SCADA system as the fan communication is interrupted due to the congestion of a longitudinal encryption device is solved.
By adopting the secure encryption and distribution scheme, the embodiment can support the longitudinal encryption and security scheme under the existing limited micro-longitudinal processing capability, simultaneously support other traffic without encryption such as traffic such as video and the like and the common network deployment of the wind farm network, and simultaneously support the common network deployment scheme while meeting the longitudinal encryption and security scheme, thereby simplifying the wind farm network architecture.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
It should be noted that the apparatus and methods disclosed in the embodiments herein may be implemented in other ways. The apparatus embodiments described above are merely illustrative, for example, flow diagrams and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments herein. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, the functional modules in the embodiments herein may be integrated together to form a single part, or the modules may exist alone, or two or more modules may be integrated to form a single part.
While the present invention has been described in detail through the foregoing description of the preferred embodiment, it should be understood that the foregoing description is not to be considered as limiting the invention. Many modifications and substitutions of the present invention will become apparent to those of ordinary skill in the art upon reading the foregoing. Accordingly, the scope of the invention should be limited only by the attached claims.
Claims (8)
1. A data transmission system for a wind farm for communicating with a central control room (10) and the wind farm, the central control room (10) comprising a SCADA system and a non-SCADA system, comprising: a central control room side transmission unit and a plurality of wind farm side data transmission units;
The central room side transmission unit includes: a first switch (111), a first longitudinal encryption device (121) and a second switch (112) located in the central control room (10) and connected in sequence; the first switch (111) is connected with an encryption service device (100) in the SCADA system; the second switch (112) is connected with a non-encryption service device (101) in the SCADA system or a non-SCADA system;
Each wind farm side data transmission unit comprises: a third exchanger (113), a second longitudinal encryption device (122) and a fourth exchanger (114) which are positioned in the fan (30) and are connected in sequence; the third switch (113) is respectively connected with the second switch (112) and a fan non-encryption device (302); the fourth switch (114) is connected with a fan encryption device (301); the second switch (112) and a plurality of third switches (113) form a wind field network (20);
When the central control room (10) side needs to transmit data to the wind power plant side,
-Said first switch (111) is adapted to transmit a first data stream of said encryption service means (100) to said first longitudinal encryption means (121);
-said first longitudinal encryption means (121) for encrypting said received first data stream and transmitting said encrypted first data stream to said second switch (112);
the second switch (112) is configured to split the received second data stream outputted by the unencrypted service apparatus and the received encrypted first data stream and transmit the split data stream to the corresponding third switch (113).
2. A data transmission system for a wind farm according to claim 1,
The third switch (113) is configured to transmit the received encrypted first data stream to the fan encryption device (301) sequentially through the second longitudinal encryption device (122) and the fourth switch (114); each of the third switches (113) is further configured to transmit the received second data stream to the blower non-encryption device (302).
3. A data transmission system for a wind farm according to claim 2, wherein when a central office (10) side is required to transmit data to the wind farm side,
-Said second longitudinal encryption means (122) for decrypting said received encrypted first data stream;
The fourth switch (114) is configured to transmit the decrypted first data stream to the blower encryption device (301).
4. A data transmission system for a wind farm according to claim 3,
The first switch (111) is configured to forward the first data stream to the first longitudinal encryption device (121) according to the MAC address of the encryption service device (100) through the MAC switching function of the two-layer switch;
The second switch (112) forwards the encrypted first and second data streams to the corresponding third switch (113) according to destination MAC addresses of the encryption service device (100) and the non-encryption service device (101).
5. A data transmission system for a wind farm according to claim 1,
When the wind farm side needs to transmit data to the central control room (10) side,
The fourth switch (114) in each fan (30) forwards the third data stream output by the fan encryption device (301) to the second longitudinal encryption device (122) according to the MAC address of the fan encryption device (301);
-said second longitudinal encryption means (122) for encrypting said received third data stream and transmitting said encrypted third data stream to said third switch (113);
The third switch (113) is configured to forward the received encrypted third data stream and a fourth data stream output by the fan non-encryption device (302) to the second switch (112) according to a destination MAC address of the fan encryption device (301) and the fan non-encryption device (302);
The second switch (112) is configured to forward the received encrypted third data stream to the first longitudinal encryption device (121) according to a destination MAC address of the fan encryption device (301);
The second switch (112) is further configured to correspondingly forward the received fourth data stream to the non-encryption service device (101) according to a destination MAC address of the fan non-encryption device (302);
-said first longitudinal encryption means (121) are adapted to decrypt said received encrypted third data stream;
The first switch (111) is configured to forward the received decrypted third data stream to the encryption service (100).
6. The data transmission system of a wind farm according to claim 5, wherein the encryption service device (100) is a SCADA server and the non-encryption service device (101) is a vibration monitoring server and/or a video server.
7. The data transmission system of a wind farm according to claim 6, wherein the fan encryption device (301) is a fan monitoring PLC and/or a box transformer monitoring PLC; the fan non-encryption device (302) is a vibration monitoring PLC and/or a video sensor.
8. A data transmission system of a wind farm according to claim 7, wherein the first data stream is control stream information sent by the SCADA server to the fan encryption device (301);
The third data stream is control stream information sent by the fan encryption device (301) to the SCADA server;
the second data stream is non-control stream information sent by the non-encryption service device (101) to the fan non-encryption device (302);
the fourth data stream is non-control stream information sent by the fan non-encryption device (302) to the non-encryption service device (101).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111403976.XA CN114285600B (en) | 2021-11-24 | 2021-11-24 | Data transmission system of wind power plant |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111403976.XA CN114285600B (en) | 2021-11-24 | 2021-11-24 | Data transmission system of wind power plant |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114285600A CN114285600A (en) | 2022-04-05 |
CN114285600B true CN114285600B (en) | 2024-07-26 |
Family
ID=80870021
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111403976.XA Active CN114285600B (en) | 2021-11-24 | 2021-11-24 | Data transmission system of wind power plant |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114285600B (en) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109639466A (en) * | 2018-11-28 | 2019-04-16 | 国网江苏省电力有限公司南京供电分公司 | One kind being based on the electric power industrial control system network security detection system of " source net lotus " |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050005093A1 (en) * | 2003-07-01 | 2005-01-06 | Andrew Bartels | Methods, systems and devices for securing supervisory control and data acquisition (SCADA) communications |
CN103903187A (en) * | 2014-03-07 | 2014-07-02 | 国家电网公司 | Fast detection method for potential safety hazards of power distribution automation system information |
US10992461B2 (en) * | 2015-11-20 | 2021-04-27 | Genetec Inc. | Secure layered encryption of data streams |
CN106230032B (en) * | 2016-09-17 | 2019-06-04 | 河北工业大学 | A Wind Farm Group Production Scheduling Operation and Maintenance System Based on Power Scheduling Data Network |
CN107566353B (en) * | 2017-08-21 | 2019-08-30 | 浙江大学 | A security experiment platform for industrial control system for experiment research of encryption controller |
CN108390846A (en) * | 2017-12-29 | 2018-08-10 | 国网浙江武义县供电有限公司 | A kind of Organization of African Unity's tune power plant aut omation information access safety management system and method |
CN210422883U (en) * | 2019-11-27 | 2020-04-28 | 国电电力山东新能源开发有限公司 | Multi-wind-field fan electric centralized control system based on c/s framework |
-
2021
- 2021-11-24 CN CN202111403976.XA patent/CN114285600B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109639466A (en) * | 2018-11-28 | 2019-04-16 | 国网江苏省电力有限公司南京供电分公司 | One kind being based on the electric power industrial control system network security detection system of " source net lotus " |
Non-Patent Citations (1)
Title |
---|
国内油气SCADA系统信息安全管理问题及防护措施;左果;;中国仪器仪表(第01期);正文第2节 * |
Also Published As
Publication number | Publication date |
---|---|
CN114285600A (en) | 2022-04-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1692814B1 (en) | System and method for grouping multiple vlans into a single 802.11 ip multicast domain | |
CN1976317B (en) | Bridged cryptographic VLAN | |
CN111010274B (en) | Safe and low-overhead SRv6 implementation method | |
US8953801B2 (en) | System and method for multicasting IPSEC protected communications | |
US11134066B2 (en) | Methods and devices for providing cyber security for time aware end-to-end packet flow networks | |
CN109905246B (en) | Power Line Communication (PLC) network node with segmentation and then encryption security | |
CN101141241A (en) | Method for realizing MAC security and network equipment | |
CN1938980A (en) | Method and apparatus for cryptographically processing data | |
US20040158706A1 (en) | System, method, and device for facilitating multi-path cryptographic communication | |
US20240015009A1 (en) | AUTOMATIC IN-BAND MEDIA ACCESS CONTROL SECURITY (MACsec) KEY UPDATE FOR RETIMER DEVICE | |
CN114285600B (en) | Data transmission system of wind power plant | |
CN117040846B (en) | Access type OTN device and data transmission encryption and decryption method thereof | |
KR102400940B1 (en) | Apparatus for securing communication in autonomous vehicle and method thereof | |
JP2009159220A (en) | Communication apparatus and encryption conversion method | |
CN101656649B (en) | RPR station, method for sending and receiving data to and from RPR loop network | |
Xu et al. | Virtually isolated network: a hybrid network to achieve high level security | |
KR102694199B1 (en) | L2-based virtual private network management device for network separation between apartment houses | |
US11729216B1 (en) | Messaging layer security (MLS) delivery service for real-time group confidentiality using hybrid information-centric networking (hICN) | |
US9025600B1 (en) | Multicast proxy for partitioned networks | |
CN113395170B (en) | Intelligent robot data transmission method based on linear topology transmission | |
CN118741493A (en) | Wireless communication method, device and electronic equipment for power transmission lines | |
Jie et al. | On-line decrypting: a homomorphic realization for network coding | |
CN119652622A (en) | A data transmission network system based on mobile communication | |
SHAHINA et al. | SECURED DATA AGGREGATION METHODS IN WIRELESS SENSOR NETWORKS USING HOMOMORPHIC OPERATION-A REVIEW | |
CN115441942A (en) | Industrial measurement and control terminal encryption ring network system and data transmission control method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |