CN / EN

Smart Grid

Typical networking solution

  • Prefecture company power wireless private network
  • Intelligent substation virtual private network subsystem networking scheme
  • Prefecture company power wireless private network

    The power wireless private network relies on the 4G/5G wireless communication network dedicated to the whole link of the construction of power-owned properties and backbone network facilities such as substations. It is mainly used to access control services such as power distribution automation, accurate negative control of source network charges, etc., and also takes into account the expansion of power information collection, mobile operations, video surveillance
    Compared with the wireless public network, the wireless private network has higher security and lower construction cost than the optical fiber private network. Together with the optical fiber private network and the wireless public network, it forms a terminal communication access network to support business access.
    It can mainly realize the following services: high-definition voice call service; video phone service; data information back transmission such as distribution automation "three remote" business; data information collection of power terminals such as power distribution rooms and opening and closing stations; robot inspection.

    Solution features

    It adopts 5G independent networking, 5G wireless private network is physically isolated from the public network, and the core network and base station are deployed locally to ensure data security and improve the security and reliability of data transmission.

  • Intelligent substation virtual private network subsystem networking scheme

    The system is mainly composed of an application platform combining terminal subsystem, transmission network subsystem, network subsystem, 5G network and grid service system.
    The transmission network subsystem can give priority to the optical fiber transmission network already available in the power grid business, and the insufficient part is supplemented by the operator's transmission network; the network subsystem is composed of 5G base station, core network and network management, which is mainly used to realize eM that provides high-bandwidth services according to the different types of business needs of the BB slicing, uRLLC slicing for low-latency business, and mMTC slicing with large connections; the network management part includes the switching management part, which is used to realize the planning, opening, maintenance and end of full-cycle management of slicing;
    The application platform combined with 5G network and power grid business system is used to provide a unified interface with the existing business system of the power grid for docking, including terminal management, slicing management, statistical analysis, advanced applications and other functions.
    Terminal management function: realize the monitoring and management of power communication terminal location, status, performance, card number, traffic, online status and other information;
    Slicing management function: realize the monitoring of network slicing status, including the monitoring of the business slicing attributes of the operator's network, slicing resource attempts, and slicing load operation status;
    Statistical analysis: realize the basic analysis of terminal business operation, SIM card status, network slicing and fault alarm lights;
    Advanced applications and other functions: realize comprehensive display based on big data situational awareness analysis, important scene security monitoring, regional hidden danger early warning, terminal early warning analysis and other functions.

    Solution features

    According to the overall requirements of the security protection of the power monitoring system, the whole system construction plan gives full play to the slicing flexibility of the 5G network, maps it to different network slices according to the security partition attributes of the power business, and formulates different security strategies for different regional businesses to provide reliable security services.