All the IEDs were configured as per their intended run time functionality. For example, real IED1 receives binary inputs from the external world. Upon receiving the binary input, IED1 triggers GOOSE message to another real IED2. It also sends the same message to simulated IED as well. With fully functional setup, the tools captured the bandwidth utilization and transfer time for one of the messages on network. Hence, the bandwidth utilization and message transfer time is within limits and satisfactory.
Healthcare Segment KAM