All the IEDs were configured as per their intended run time functionality. For example, real IED1 receives binary inputs from the external world. Upon receiving the binary input, IED1 triggers GOOSE message to another real IED2. It also sends the same message to simulated IED as well. With fully functional setup, the tools captured the bandwidth utilization and transfer time for one of the messages on network. Hence, the bandwidth utilization and message transfer time is within limits and satisfactory.
Healthcare Segment KAM
Solved! Go to Solution.
Discuss challenges in energy and automation with 30,000+ experts and peers.
Find answers in 10,000+ support articles to help solve your product and business challenges.
Find peer based solutions to your questions. Provide answers for fellow community members!