2011 International Conference on Advanced Power System Automation and Protection 2011
DOI: 10.1109/apap.2011.6180968
|View full text |Cite
|
Sign up to set email alerts
|

Real-time signal time delay analysis of WAMS based on MPLS VPN technology

Abstract: A strong power dispatching communication network with high speed becomes the premise of the establishment of a reliable Wide Area Monitoring System (WAMS). Signal transmission of Phasor Measurement Unit (PMU) is taken into account in different collective layers in this paper. The time delay modes based on Multi-Protocol Label Switching-Virtual Private Network (MPLS VPN) and point-to-point 2M link illustrate that the time delay of the former is better than the latter. Building the VPN network under MPLS can pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…Data from all hosts can be pooled into one server, allowing all subscribers to access large amounts of data and services. However, the internet as a public network poses a significant challenge in terms of data security, and past research has employed standard formats for virtual private networks (VPNs) to ensure the security of data over public networks [4]- [6]. However, these approaches typically secure all types of applications using the same paradigm.…”
Section: Introductionmentioning
confidence: 99%
“…Data from all hosts can be pooled into one server, allowing all subscribers to access large amounts of data and services. However, the internet as a public network poses a significant challenge in terms of data security, and past research has employed standard formats for virtual private networks (VPNs) to ensure the security of data over public networks [4]- [6]. However, these approaches typically secure all types of applications using the same paradigm.…”
Section: Introductionmentioning
confidence: 99%